A Practical History of USA PATRIOT Act Section 215
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Proposed Authorities of a National Intelligence Director: Issues for Congress and Side-By-Side Comparison of S
Order Code RL32506 CRS Report for Congress Received through the CRS Web The Proposed Authorities of a National Intelligence Director: Issues for Congress and Side-by-Side Comparison of S. 2845, H.R. 10, and Current Law Updated October 5, 2004 -name redacted- Specialist in Intelligence and National Security Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress The Proposed Authorities of a Director of National Intelligence: Issues for Congress, and Side-by-Side Comparison of S. 2845, H.R. 10, and Current Law Summary The 9/11 Commission, in its recent report on the attacks of September 11, 2001, criticized the U.S. Intelligence Community’s (IC) fragmented management structure and questioned whether the U.S. government, and the IC, in particular, is organized adequately to direct resources and build the intelligence capabilities that the United States will need to counter terrorism, and to address the broader range of national security challenges in the decades ahead. The Commission made a number of recommendations, one of which was to replace the current position of Director of Central Intelligence (DCI) with a National Intelligence Director (NID) who would oversee national intelligence centers on specific subjects of interest — including a National Counterterrorism Center (NCTC) — across the U.S. government, manage the national intelligence program; oversee the agencies that contribute to it; and have hiring, firing, and budgetary authority over the IC’s 15 agencies. Although the Commission recommended that the director be located in the Executive Office of the President, the Commission Vice Chairman in testimony before Congress on September 7, 2004, withdrew that portion of the recommendation in light of concerns that the NID would be subject to undue influence. -
Drowning in Data 15 3
BRENNAN CENTER FOR JUSTICE WHAT THE GOVERNMENT DOES WITH AMERICANS’ DATA Rachel Levinson-Waldman Brennan Center for Justice at New York University School of Law about the brennan center for justice The Brennan Center for Justice at NYU School of Law is a nonpartisan law and policy institute that seeks to improve our systems of democracy and justice. We work to hold our political institutions and laws accountable to the twin American ideals of democracy and equal justice for all. The Center’s work ranges from voting rights to campaign finance reform, from racial justice in criminal law to Constitutional protection in the fight against terrorism. A singular institution — part think tank, part public interest law firm, part advocacy group, part communications hub — the Brennan Center seeks meaningful, measurable change in the systems by which our nation is governed. about the brennan center’s liberty and national security program The Brennan Center’s Liberty and National Security Program works to advance effective national security policies that respect Constitutional values and the rule of law, using innovative policy recommendations, litigation, and public advocacy. The program focuses on government transparency and accountability; domestic counterterrorism policies and their effects on privacy and First Amendment freedoms; detainee policy, including the detention, interrogation, and trial of terrorist suspects; and the need to safeguard our system of checks and balances. about the author Rachel Levinson-Waldman serves as Counsel to the Brennan Center’s Liberty and National Security Program, which seeks to advance effective national security policies that respect constitutional values and the rule of law. -
Intelligence Legalism and the National Security Agency's Civil Liberties
112 Harvard National Security Journal / Vol. 6 ARTICLE Intelligence Legalism and the National Security Agency’s Civil Liberties Gap __________________________ Margo Schlanger* * Henry M. Butzel Professor of Law, University of Michigan. I have greatly benefited from conversations with John DeLong, Mort Halperin, Alex Joel, David Kris, Marty Lederman, Nancy Libin, Rick Perlstein, Becky Richards, and several officials who prefer not to be named, all of whom generously spent time with me, discussing the issues in this article, and many of whom also helped again after reading the piece in draft. I would also like to extend thanks to Sam Bagenstos, Rick Lempert, Daphna Renan, Alex Rossmiller, Adrian Vermeule, Steve Vladeck, Marcy Wheeler, Shirin Sinnar and other participants in the 7th Annual National Security Law Workshop, participants at the University of Iowa law faculty workshop, and my colleagues at the University of Michigan Legal Theory Workshop and governance group lunch, who offered me extremely helpful feedback. Jennifer Gitter and Lauren Dayton provided able research assistance. All errors are, of course, my responsibility. Copyright © 2015 by the Presidents and Fellows of Harvard College and Margo Schlanger. 2015 / Intelligence Legalism and the NSA’s Civil Liberties Gaps 113 Abstract Since June 2013, we have seen unprecedented security breaches and disclosures relating to American electronic surveillance. The nearly daily drip, and occasional gush, of once-secret policy and operational information makes it possible to analyze and understand National Security Agency activities, including the organizations and processes inside and outside the NSA that are supposed to safeguard American’s civil liberties as the agency goes about its intelligence gathering business. -
(U) Cryptologic Almanac 5Qth Anniversary Series
309855~ DOCID: Declass1_1ad and approved for release by NSA on 9 January 2007, pursuant to E.O. 12958, as amended. MDR-51909 (U) Cryptologic Almanac 5Qth Anniversary Series (U) The Time Of Investigations, Part 2 of 2 (U) SYNOPSIS: Stimulated by a climate of mistrust, a Senate committee chaired by Frank Church of Idaho investigated allegations of misdeeds by the U.S. intelligence community. After a period of adjustment, the committee and NSA learned to work together. The Church Committee substantiated charges that NSA had maintained "Watch Lists" of U.S. citizens and had a secret program to obtain copies of telegrams from private cable companies. The committee warned against NSA's potential for abuse and recommended legislation to protect American rights. (U) NOW, ON WITH OUR STORY. PIKE COMMITTEE (U) If the Church Committee and NSA learned to get along after an initial period of uneasiness, this did not happen with two other congressional committees that investigated NSA. (U) About the same time that the Senate established the Church Committee, the House of Representatives voted for a similar committee, under Otis Pike (D, NY). From the start, this committee had a broader mandate to investigate the entire intelligence community; in fact, it was set up not only to investigate alleged abuses but also to look at operational effectiveness and programming and budget issues. (U//FOUO) Some NSA seniors had already had less than positive experiences with Representative Pike. He had led a subcommittee investigating the PUEBLO incident of 1968; the subcommittee had leaked confidential testimony of then DIRNSA Marshall Carter to the press, angering many officials. -
S. 1123, the USA Freedom Act of 2015 Dear Members of the Senate
WASHINGTON LEGISLATIVE OFFICE May 23, 2015 RE: S. 1123, the USA Freedom Act of 2015 Dear Members of the Senate: Section 215 of the Patriot Act expanded the reach of the intelligence agencies in unprecedented ways and is the basis for collecting and retaining records on AMERICAN CIVIL millions of innocent Americans. The ACLU opposed Section 215 when it LIBERTIES UNION WASHINGTON was introduced, has fought it at each successive reauthorization, and urges LEGISLATIVE OFFICE Congress to let it sunset on June 1st. 915 15th STREET, NW, 6 TH FL WASHINGTON, DC 20005 T/202.544.1681 F/202.546.0738 This week, the Senate is scheduled to vote on S. 1123, the USA Freedom Act WWW.ACLU.ORG of 2015, which proposes modest reforms to Section 215, Section 214 (the pen MICHAEL W. MACLEOD-BALL register and trap and trace device provision, “PR/TT”), and national security ACTING DIRECTOR letter authorities. The bill also seeks to increase transparency over government NATIONAL OFFICE surveillance activities but could be construed to codify a new surveillance 125 BROAD STREET, 18 TH FL. regime of more limited, yet still massive scope. NEW YORK, NY 10004-2400 T/212.549.2500 Earlier this month, the Second Circuit unequivocally ruled that the OFFICERS AND DIRECTORS 1 SUSAN N. HERMAN government’s bulk metadata program violated the law. In light of this PRESIDENT decision, it is clear that more robust surveillance reform is needed. Though an ANTHONY D. ROMERO improvement over the status quo in some respects, the USA Freedom Act EXECUTIVE DIRECTOR does not go far enough to rein in NSA abuses and contains several concerning ROBERT REMAR provisions. -
Congressional Oversight of Intelligence: Background and Selected Options for Further Reform
Congressional Oversight of Intelligence: Background and Selected Options for Further Reform December 4, 2018 Congressional Research Service https://crsreports.congress.gov R45421 SUMMARY R45421 Congressional Oversight of Intelligence: December 4, 2018 Background and Selected Options for Further Michael E. DeVine Reform Analyst in Intelligence and National Security Prior to the establishment of the Senate Select Committee on Intelligence (SSCI) and the House Permanent Select Committee on Intelligence (HPSCI) in 1976 and 1977, respectively, Congress did not take much interest in conducting oversight of the Intelligence Community (IC). The Subcommittees on the Central Intelligence Agency (CIA) of the congressional Armed Services Committees had nominal oversight responsibility, though Congress generally trusted that IC could more or less regulate itself, conduct activities that complied with the law, were ethical, and shared a common understanding of national security priorities. Media reports in the 1970s of the CIA’s domestic surveillance of Americans opposed to the war in Vietnam, in addition to the agency’s activities relating to national elections in Chile, prompted Congress to change its approach. In 1975, Congress established two select committees to investigate intelligence activities, chaired by Senator Frank Church in the Senate (the “Church Committee”), and Representative Otis Pike in the House (the “Pike Committee”). Following their creation, the Church and Pike committees’ hearings revealed the possible extent of the abuse of authority by the IC and the potential need for permanent committee oversight focused solely on the IC and intelligence activities. SSCI and HPSCI oversight contributed substantially to Congress’s work to legislate improvements to intelligence organization, programs, and processes and it enabled a more structured, routine relationship with intelligence agencies. -
Keeping the US Hand Well Hidden: the Role of the Church Committee in Rethinking US Covert Intervention in the 1970S
Keeping the US Hand Well Hidden: The Role of the Church Committee in Rethinking US Covert Intervention in the 1970s Julia Kropa A thesis submitted in partial fulfillment of the requirements for the degree of BACHELOR OF ARTS WITH HONORS DEPARTMENT OF HISTORY UNIVERSITY OF MICHIGAN April 2, 2018 Advised by Professor Victoria Langland TABLE OF CONTENTS Acknowledgments…………………………………………………………………………..ii Timeline……………………………………………………………………………………iii Introduction…………………………………………………………………………………1 Chapter 1: US Covert Involvement and the Death of General Schneider…………………14 The Election of 1970 and Escalation of US Involvement…………………………16 Creating an Atmosphere of Overthrow……………………………………………26 The Aftermath of General Schneider’s Death……………………………………..37 Chapter 2: The Formation of the Church Committee……………………………………..42 The Origins of the Church Committee…………………………………………….45 White House Opposition to the Church Committee……………………………….59 The Committee’s Purpose for Investigating Assassination Plots………………….66 Chapter 3: The Church Committee Investigates Assassination Plots……………………..70 The Church Committee’s Investigation…………………………………………...73 The Investigation Reaches the White House………………………………………81 The Committee’s Interim Report and its Findings………………………………...91 Conclusion…………………………………………………………………………………96 Appendix 1……………………………………………………………………………….102 Appendix 2……………………………………………………………………………….107 Bibliography……………………………………………………………………………...109 i Acknowledgments First and foremost, thank you to my advisor, Professor Victoria Langland, for her guidance and encouragement at every stage of this project from my initial thoughts to the end product. I would like to thank the LSA Honors Program and the History Department for generously providing funding for my research and writing. I am also thankful to my writing group, Maggie and Noah, for reading my many drafts and offering feedback at every step in the process. Many thanks to Emily for listening to me for a year and a half talking and brainstorming out loud, and for forcing me to always keep on working. -
Classified Records of Congress: an Overview
Executive Branch Classified National Security Information and Congress Prepared by the staff of the Information Security Oversight Office for the Public Interest Declassification Board, June 2007 Summary: The United States Senate and the House of Representatives, as part of the Legislative branch of the U.S. government, are not subject to the provisions of Executive Order 12958, as amended, which governs the classification of national security information within the Executive branch. Nonetheless, Congress, as part of its role in the oversight and appropriation of funds for intelligence and military affairs, possesses both classified records forwarded to it by Executive branch agencies and classified transcripts of closed hearings concerning military, foreign relations, and intelligence matters. How these classified records are handled varies between the two chambers, and individual committees within each chamber establish their own procedures for control of classified material. As Legislative branch records, committee and general records of Congress are not accessioned into the National Archives and Records Administration (NARA) as permanent Federal records. Instead, inactive records are transferred to the Center for Legislative Archives at NARA for preservation and access purposes, but they remain under the legal control of Congress. Declassification actions on records transferred to the Center for Legislative Archives have been done on a limited basis in response to individual requests submitted by researchers or as special projects initiated by Congress itself, such as actions to release records of the Senate Select Committee for POW/MIA Affairs in the mid-1990s. 1 1. Classified Records of Congress: Legislation and Authority The business of Congress gets done in its committees, and it is those committees who possess and produce classified records.1 Widespread access by lawmakers to classified records is a relatively recent development. -
Legal Responses and Countermeasures to National Security Letters
Washington University Journal of Law & Policy Volume 47 Intellectual Property: From Biodiversity to Technical Standards 2015 Legal Responses and Countermeasures to National Security Letters Brett Weinstein Washington University School of Law Follow this and additional works at: https://openscholarship.wustl.edu/law_journal_law_policy Part of the National Security Law Commons Recommended Citation Brett Weinstein, Legal Responses and Countermeasures to National Security Letters, 47 WASH. U. J. L. & POL’Y 217 (2015), https://openscholarship.wustl.edu/law_journal_law_policy/vol47/iss1/15 This Note is brought to you for free and open access by the Law School at Washington University Open Scholarship. It has been accepted for inclusion in Washington University Journal of Law & Policy by an authorized administrator of Washington University Open Scholarship. For more information, please contact [email protected]. Legal Responses and Countermeasures to National Security Letters Brett Weinstein INTRODUCTION In early June of 2013, governmental surveillance suddenly and dramatically entered the public consciousness, prompting a torrent of debate and backlash. The Guardian published a top secret court order requiring Verizon to hand over all telephone call records to the National Security Agency (NSA); the Washington Post disclosed a secret but widespread Internet surveillance program, and months of similar revelations followed, all stemming from leaks by former NSA contractor, Edward Snowden.1 As a result, the public and the press began to question the tools that the government uses for surveillance, including National Security Letters (NSLs), and the relationship between the government and the technology and telecommunications companies that seemingly possess all personal and private information generated in the modern, digital world.2 J.D. -
2008-IB-National-Security-Letters-And-Section-215-Of-The-USA-PATRIOT-Act
LIBERTY AND SECURITY: RECOMMENDATIONS FOR THE NEXT ADMINISTRATION AND CONGRESS A coalition of more than twenty organizations and over seventy-five individuals collaborated to create “Liberty and Security: Recommendations for the Next Administration and Congress.” The Constitution Project coordinated the production of the report, which was released in November 2008. “Liberty and Security” indexes policy proposals across 20 different issue areas, including privacy, secrecy and surveillance; detention, interrogation, and trials of so-called “enemy combatants”; and discrimination in immigration and charities policy. It includes recommendations for congressional and executive action, and provides in-depth background information to support action by policy makers. It also includes lists of issue- based resources and experts in the community. The report includes the following chapters: CHAPTER 1: Eliminate Unnecessary Barriers To Legitimate Charitable Work CHAPTER 2: Closing Guantánamo CHAPTER 3: End Illegal Detention, Torture, and Rendition CHAPTER 4: Prosecute Terrorist Suspects in Accordance with the Law CHAPTER 5: Failing to Protect Refugees and Asylum Seekers: Overly Broad Definition of Material support for Terrorism. CHAPTER 6: Ending Immigration Enforcement Based on National Origin, Ethnicity, and Religion CHAPTER 7: Misuse of Immigration Detention Laws in Counterterrorism Efforts CHAPTER 8: Revising Attorney General Guidelines on FBI Investigations CHAPTER 9: Updating the Law Governing the Privacy of Electronic Communications CHAPTER -
National Security Letters: Propopsed Amendments in the 111Th Congress
National Security Letters: Proposed Amendments in the 111th Congress Charles Doyle Senior Specialist in American Public Law December 27, 2010 Congressional Research Service 7-5700 www.crs.gov R40887 CRS Report for Congress Prepared for Members and Committees of Congress National Security Letters: Proposed Amendments in the 111th Congress Summary Five federal statutes authorize various intelligence agencies to demand, through National Security Letters (NSLs), certain customer information from communications providers, financial institutions, and consumer credit reporting agencies, under the Right to Financial Privacy Act, the Fair Credit Reporting Act, the National Security Act, and Electronic Communications Privacy Act. The USA PATRIOT Act expanded NSL authority. Later reports of the Department of Justice Inspector General indicated that (1) the FBI considered the expanded authority very useful; (2) after expansion the number of NSLs requests increased dramatically; (3) the number of requests relating to Americans increased substantially; and (4) FBI use of NSL authority had sometimes failed to comply with statutory, Attorney General, or FBI policies. Originally, the NSL statutes authorized nondisclosure requirements prohibiting recipients from disclosing receipt or the content of the NSL to anyone, ever. They now permit judicial review of these secrecy provisions. As understood by the courts, recipients may request the issuing agency to seek and justify to the court the continued binding effect of any secrecy requirement. Several USA PATRIOT Act provisions are scheduled to expire on February 28, 2011. The NSL statutory provisions are not among them. Nevertheless, several bills were introduced in the 111th Congress which would have amended and in some cases repealed NSL authority. -
The Freedom of Information Act and the Fight Against Secret (Surveillance) Law, 55 Santa Clara L
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Santa Clara University School of Law Santa Clara Law Review Volume 55 | Number 1 Article 4 10-7-2015 The rF eedom of Information Act and the Fight Against Secret (Surveillance) Law Mark Rumold Follow this and additional works at: http://digitalcommons.law.scu.edu/lawreview Recommended Citation Mark Rumold, The Freedom of Information Act and the Fight Against Secret (Surveillance) Law, 55 Santa Clara L. Rev. 161 (2015). Available at: http://digitalcommons.law.scu.edu/lawreview/vol55/iss1/4 This Article is brought to you for free and open access by the Journals at Santa Clara Law Digital Commons. It has been accepted for inclusion in Santa Clara Law Review by an authorized administrator of Santa Clara Law Digital Commons. For more information, please contact [email protected]. THE FREEDOM OF INFORMATION ACT AND THE FIGHT AGAINST SECRET (SURVEILLANCE) LAW Mark Rumold* TABLE OF CONTENTS Introduction ........................................................................... 161 I. The Secret Story of Section 215 ......................................... 164 II. The Problem of Secret (Surveillance) Law and the Traditional Ways to Avoid It ....................................... 169 A. The Problem of Secret (Surveillance) Law ........... 169 B. Traditional Ways of Avoiding Secret Law and Their Shortcomings: Congressional Investigation, Discovery, Leaks, and FOIA .......... 172 1. Congressional Investigation ............................ 172 2.