Law, Privacy and Surveillance in Canada in the Post-Snowden Era

Total Page:16

File Type:pdf, Size:1020Kb

Law, Privacy and Surveillance in Canada in the Post-Snowden Era Law, Privacy and Surveillance in Canada in the Post-Snowden Era Edited by Michael Geist University of Ottawa Press LAW, PRIVACY AND SURVEILLANCE IN CANADA IN THE POST-SNOWDEN ERA Law, Privacy and Surveillance in Canada in the Post-Snowden Era.indd 1 15-05-19 14:18 Page left blank intentionally 15-05-19 14:18 Law, Privacy and Surveillance in Canada in the Post-Snowden Era.indd 2 LAW, PRIVACY AND SURVEILLANCE IN CANADA IN THE POST-SNOWDEN ERA EDITED BY Michael Geist University of Ottawa Press 2015 Law, Privacy and Surveillance in Canada in the Post-Snowden Era.indd 3 15-05-19 14:18 The University of Ottawa Press gratefully acknowledges the support extended to its publishing list by Canadian Heritage through the Canada Book Fund, by the Canada Council for the Arts, by the Federation for the Humanities and Social Sciences through the Awards to Scholarly Publications Program and by the University of Ottawa. Copy editing: Joanne Muzak Proofreading: Susan James Typesetting: Édiscript enr. Cover design: Llama Communications and Édiscript enr. Library and Archives Canada Cataloguing in Publication Law, privacy, and surveillance in Canada in the post-Snowden era / edited by Michael Geist. (Law, technology and media) Includes bibliographical references. Issued in print and electronic formats. ISBN 978-0-7766-2207-1 (paperback). ISBN 978-0-7766-2183-8 (pdf). ISBN 978-0-7766-2182-1 (epub) 1. Electronic surveillance — Law and legislation — Canada. 2. Privacy, Right of — Canada. 3. Technology and law — Canada. I. Geist, Michael, 1968-, author, editor II. Series: Law, technology and media KE9328.L34 2015 345.71’052 C2015-903727-1 KF9670.L34 2015 C2015-903728-X © Michael Geist, 2015 under Creative Commons License Attribution — Non Commercial Share Alike 3.0 (CC BY-NC-SA 3.0) Printed in Canada Law, Privacy and Surveillance in Canada in the Post-Snowden Era.indd 4 15-05-19 14:18 T able of Contents Acknowledgements ........................................................................... vii Introduction ........................................................................................ 1 Part I: Understanding Surveillance I Canadian Internet “Boomerang” Traffic and Mass NSA Surveillance: Responding to Privacy and Network Sovereignty Challenges Andrew Clement and Jonathan A. Obar .................................... 13 II Forgotten Surveillance: Covert Human Intelligence Sources in Canada in a Post-9/11 World Steve Hewitt ............................................................................... 45 Part II: Legal Issues III Foreign Intelligence in an Inter-Networked World: Time for a Re-Evaluation Tamir Israel ................................................................................ 71 IV Lawful Illegality: What Snowden Has Taught Us about the Legal Infrastructure of the Surveillance State Lisa M. Austin ........................................................................... 103 V Law, Logarithms, and Liberties: Legal Issues Arising from CSE’s Metadata Collection Initiatives Craig Forcese .............................................................................. 127 Part III: Reforms and Accountability VI Permanent Accountability Gaps and Partial Remedies Kent Roach ................................................................................. 163 VII The Failure of Official Accountability and the Rise of Guerrilla Accountability Reg Whitaker ............................................................................. 205 Law, Privacy and Surveillance in Canada in the Post-Snowden Era.indd 5 15-05-19 14:18 VIII Why Watching the Watchers Isn’t Enough: Canadian Surveillance Law in the Post-Snowden Era Michael Geist ............................................................................. 225 IX Stuck on the Agenda: Drawing Lessons from the Stagnation of “Lawful Access” Legislation in Canada Christopher Parsons ................................................................... 257 About the Contributors .................................................................... 285 Law, Privacy and Surveillance in Canada in the Post-Snowden Era.indd 6 15-05-19 14:18 Acknowledgements ublishing a peer-reviewed book with numerous contributors on Pa rapidly evolving, high-profile issue requires a special group of contributors, publishers, editors, and reviewers. Thanks are due first and foremost to the contributors. Each was presented with challeng- ing timelines to complete their submissions and often asked to submit revised versions based on reviewer comments within days. Each con- tributor embraced this project with enthusiasm and professionalism. Many thanks go to Wesley Wark, who contributed enormously to the vision behind the book and to the recruitment of contributors. Once the initial articles were delivered, many additional con- tributors emerged. Thanks to a terrific group of student editors, including Emily Murray, Jennifer Shamie, Chelsea Sauve, Kavi Sivasothy, Mila Falkenstein, and Karina Pogosyan, who provided citation and fact checking reviews. Thanks also to Elizabeth Schwaiger, who oversaw the produc- tion of the book from copy-editing through proofreading, layout, and printing. Thanks to the University of Ottawa Press, particularly Lara Mainville and Dominike Thomas, who offered tremendous support for this book project. Thanks as well to the Social Sciences and Humanities Research Council of Canada and the Canada Research Chair program, as this book benefited from their financial support. Thanks also to my colleagues and family for their support throughout this project. It is a great honour to work with such an exceptional, supportive group of colleagues at the University of Ottawa. My wife, Allison, remains the foundation of our family and a remarkable source of love and support. Jordan, Ethan, and Gabrielle are more than just fantastic children, who make their parents proud each and every day. They are true digital citizens, engaged with issues related to surveillance and privacy, as they are part of a gen- eration that does not know a world without the Internet, nor, it would appear, without network surveillance. March 2015 Ottawa, Ontario vii Law, Privacy and Surveillance in Canada in the Post-Snowden Era.indd 7 15-05-19 14:18 Page left blank intentionally 15-05-19 14:18 Law, Privacy and Surveillance in Canada in the Post-Snowden Era.indd 8 I ntroduction dward Snowden burst into the public consciousness in June 2013 Ewith a series of astonishing revelations about US surveillance activities. The Snowden leaks, which have continued for more than eighteen months, have confirmed that fears of all-encompassing network surveillance and data capture that were envisioned as worst- case scenarios more than a decade ago have become reality. With scant debate or public awareness, surveillance agencies around the world have become remarkably adept at capturing network commu- nications at the very time that billions of people have come to rely on the Internet as their primary tool for communication, social connec- tion, and information gathering. As a result, the “open Internet” is a far cry from what millions of users might have otherwise expected or believed, with openness more aptly referencing their openly acces- sible private communications. Snowden’s primary focus has been centred on the United States. However, the steady stream of documents have laid bare the notable role of allied surveillance agencies, including the Communications Security Establishment (CSE), Canada’s signals intelligence agency. The Canadian-related leaks — including disclosures regarding sur- veillance over millions of Internet downloads, airport wireless net- works, spying on the Brazilian government, and the facilitation of spying at the G8 and G20 meetings hosted in Toronto in 2010 — have Law, Privacy and Surveillance in Canada in the Post-Snowden Era.indd 1 15-05-19 14:18 2 LAW, PRIVACY AND SURVEILLANCE IN CANADA IN THE POST-SNOWDEN ERA unsurprisingly inspired some domestic discussion and increased media coverage of privacy and surveillance issues. Yet, despite increased public and media attention, the Snowden leaks have thus far failed to generate sustained political debate in Canada. Privacy issues, particularly lawful access and warrantless disclosure of Internet and telecom subscriber information, emerged as important issues in 2014 and forced the government to respond to mounting concerns over the privacy protections afforded to Canadians’ personal information. Moreover, the Supreme Court of Canada issued the landmark R. v. Spencer decision in June 2014, which removed any lingering doubt that Canadians have a reason- able expectation of privacy in subscriber information. While that decision may have led to changes in law enforcement practices, and revelations about subscriber information requests resulted in some uncomfortable questions in the House of Commons, neither had any discernable impact on the broader legislative agenda. Bill C-13, the government’s lawful access bill, received royal assent months after the Spencer decision, with no significant amendments or reforms incorporated into the bill in response to the decision. In fact, the shocking attack on Parliament Hill in the fall of 2014, in which a single gunman killed a Canadian soldier and then penetrated deep into the Parliament buildings, only stiffened government resolve for increased surveillance and police powers. By January 2015, the government moved swiftly to introduce Bill C-51, the anti-terrorism bill, which greatly expands information sharing between
Recommended publications
  • Understanding Schrems II and Its Impact on the EU-US Privacy Shield
    EU Data Transfer Requirements and U.S. Intelligence Laws: Understanding Schrems II and Its Impact on the EU-U.S. Privacy Shield March 17, 2021 Congressional Research Service https://crsreports.congress.gov R46724 SUMMARY R46724 EU Data Transfer Requirements and U.S. March 17, 2021 Intelligence Laws: Understanding Schrems II Chris D. Linebaugh and Its Impact on the EU-U.S. Privacy Shield Legislative Attorney On July 16, 2020, in a decision referred to as Schrems II, the Court of Justice of the European Edward C. Liu Union (CJEU) invalidated the EU-U.S. Privacy Shield (Privacy Shield). Privacy Shield is a Legislative Attorney framework developed by the European Union (EU) and the United States to facilitate cross- border transfers of personal data for commercial purposes. Privacy Shield requires companies and organizations that participate in the program to abide by various data protection requirements and, in return, assures the participants that the transfer is compliant with EU law. The CJEU, however, found Privacy Shield inadequate in part because it does not restrain U.S. intelligence authorities’ data collection activities. According to the CJEU, U.S. law allows intelligence agencies to collect and use the personal data transferred under the Privacy Shield framework in a manner that is inconsistent with rights guaranteed under EU law. The CJEU focused on Section 702 of the Foreign Intelligence Surveillance Act, Executive Order 12333, and Presidential Policy Directive 28, which govern how the U.S. government may conduct surveillance of non-U.S. persons located outside of the United States. The CJEU’s Schrems II ruling has significant implications for personal data transfers between the EU and the United States.
    [Show full text]
  • Canada's Different Criminal and Constitutional Standards of Fault
    Kent Roach* MIND THE GAP: CANADA’S DIFFERENT CRIMINAL AND CONSTITUTIONAL STANDARDS OF FAULT† This paper critically assesses the gap between Canada’s criminal law standards of fault articulated in the 1950s and 1970s and its constitutional standards of criminal fault articulated in the 1980s and 1990s. This gap is explained in terms of the Court’s ambivalence about subjective fault principles as manifested by its acceptance of criminal negligence. It is also explained by the Court’s unique treatment of section 7 of the Canadian Charter of Rights and Freedoms as a right that, unlike any other right in the Charter, is only subject to reasonable limitation under section 1 of the Charter in extraordinary emergency situations. The paper then suggests that the gap between crim- inal and constitutional fault standards is not sustainable and can only be closed if the Court rethinks its approach to the limitation of section 7 rights. Maintenance of the gap may erode respect for common-law presumptions of subjective fault. If this occurs, Canada’s apparently robust approach to the constitutionalization of fault will have actually diminished respect for and protection of subjective fault principles. Keywords: criminal law/Canada/fault/common law/constitutional/ fundamental justice i Introduction The Canadian experience with constitutionalization of criminal law fault principles seems at first glance to be positive and robust. Unlike in the United States, the Canadian courts have struck down felony murder and various absolute-liability provisions as inconsistent with constitutional requirements of fault.1 The Court has also gone farther than courts in Israel and Germany in constitutionalizing fault requirements,2 as well as principles that would prohibit convictions for physically3 or morally * Faculty of Law, University of Toronto † I thank the participants of the Criminal Law and Constitutionalism conference held at the University of Toronto and especially Hamish Stewart for helpful comments on an earlier draft of this article.
    [Show full text]
  • REPORTER "Eluding Electronic Servicing
    MAY, 1963 35 CENTS REPORTER "eluding Electronic Servicing Special Equipment Speeds Servicing A...,-`" _.. .., . _ . --:._ Molecular Electronics Explained Resistors With More Than One Job } www.americanradiohistory.com BIG -SYSTEM MUSCLE... _ . u . , . ... : .: : . .- . : . a .,...: .. e : : . ... a . + _.. a ! a . e s s . ! . 1 . ! . e i . 1 . s e e . / . a ' / 11 . / . / s f ! . e . ! ! e s . > . te...... cc..... / a e a a . 1 w . a f i . : / ! . / / . .. - / / . ! ! ! / . .. ....... ................... 18Í . e . .. t a a e + e1V . 7J / Ma/ i Qç } ; , ! a- ir '+4 . +. & ! ,. e ! ' "' ac. 4 .:.a a . SMALL -SYSTEM PRICE! NEW JERROLD TV DISTRIBUTION SYSTEM ENGINEERED FOR THE NEW COLOR -TV ERA Designed for TV shops, dealers' showrooms, The JERROLD "Challenger" Amplifier, small apartments and motels Model ACL-200, delivers 20db minimum gain Feeds up to 32 TV and FM sets over the low band, 19db No controls or adjustments over the high band. New "Quick -Disconnect" plug-in outlets Flat response-unique in a low-price amplifier, but necessary for good color TV. Easy to install, Here's the distribution system to sell to TV and no controls to adjust. Famous JERROLD qual- FM dealers for their color -TV showrooms .. ity is built in to stay. perfect too for the small apartment building or Model ACL-200, $38.97 net motel that's been needing an antenna system See your JERROLD distributor or write but couldn't afford one before. It's also ideal for Jerrold Electronics, Distributor Sales Division, your own service shop. Philadelphia 32, Pa. icz:=;`1 JER RO LO New crown -washer screw Exclusive "Gamma" ELECTRONICS New 4- and 8 -way nigh - terminals for stripped or chassis fittings for quick isolation networks.
    [Show full text]
  • Through a PRISM, Darkly(PDF)
    NANOG 59 – October 7, 2013 Through a PRISM, Darkly Mark Rumold Staff Attorney, EFF NANOG 59 – October 7, 2013 Electronic Frontier Foundation NANOG 59 – October 7, 2013 NANOG 59 – October 7, 2013 NANOG 59 – October 7, 2013 What we’ll cover today: • Background; what we know; what the problems are; and what we’re doing • Codenames. From Stellar Wind to the President’s Surveillance Program, PRISM to Boundless Informant • Spying Law. A healthy dose of acronyms and numbers. ECPA, FISA and FAA; 215 and 702. NANOG 59 – October 7, 2013 the background NANOG 59 – October 7, 2013 changes technologytimelaws …yet much has stayed the same NANOG 59 – October 7, 2013 The (Way) Background • Established in 1952 • Twin mission: – “Information Assurance” – “Signals Intelligence” • Secrecy: – “No Such Agency” & “Never Say Anything” NANOG 59 – October 7, 2013 The (Mid) Background • 1960s and 70s • Cold War and Vietnam • COINTELPRO and Watergate NANOG 59 – October 7, 2013 The Church Committee “[The NSA’s] capability at any time could be turned around on the American people and no American would have any privacy left, such is the capability to monitor everything. Telephone conversations, telegrams, it doesn't matter. There would be no place to hide.” Senator Frank Church, 1975 NANOG 59 – October 7, 2013 Reform • Permanent Congressional oversight committees (SSCI and HPSCI) • Foreign Intelligence Surveillance Act (FISA) – Established requirements for conducting domestic electronic surveillance of US persons – Still given free reign for international communications conducted outside U.S. NANOG 59 – October 7, 2013 Changing Technology • 1980s - 2000s: build-out of domestic surveillance infrastructure • NSA shifted surveillance focus from satellites to fiber optic cables • BUT: FISA gives greater protection for communications on the wire + surveillance conducted inside the U.S.
    [Show full text]
  • Canadian Privacy Law: the Personal Information Protection and Electronic Documents Act (PIPEDA)
    International In-house Counsel Journal Vol. 2, No. 7, Spring 2009, 1135–1146 Canadian Privacy Law: The Personal Information Protection and Electronic Documents Act (PIPEDA) DOMINIC JAAR PATRICK E. ZELLER Legal Counsel Vice President & Deputy General Counsel Ledjit Consulting, Inc. Guidance Software, Inc. Canada United States This white paper provides a general overview of the Personal Information Protection and Electronic Documents Act (“PIPEDA”), and discusses both the privacy requirements imposed by that Act as well as the rules governing the use of electronic documents that it sets out. Overview Introduction to PIPEDA PIPEDA is the federal legislative response to growing concerns over the protection and use of personal information that is accumulated by both public and private organizations in the course of their day-to-day operations.1 The Act sets out rules governing how such information should be handled by the organizations that collect it, and under what circumstances it may be disclosed, either to third parties or to the individual who is the subject of the information. The Act contains two main parts. The first part sets out the rules governing the collection, retention and disclosure of personal information, as well as the remedies available in the event of a suspected breach. In essence, this part of the Act establishes a framework which attempts to balance the privacy rights of individuals with the needs of organizations to collect, use, and disclose personal information in the course of commercial activities. This part of the Act is discussed in sections I and II of this document. The second part of the Act describes the circumstances in which electronic alternatives may be used to fulfill legal obligations, which, under federal laws, require the use of paper documents to record or communicate information or transactions.
    [Show full text]
  • Off the Grid: Pinpointing Location-Based Technologies and the Law
    Off the Grid: Pinpointing Location-based Technologies and the Law Written By: Geoffrey White, Barrister & Solicitor External Counsel The Public Interest Advocacy Centre 1204 - ONE Nicholas St. Ottawa, Ontario K1N 7B7 June 2015 Copyright 2015 PIAC Contents may not be commercially reproduced. Any other reproduction with acknowledgment is encouraged. The Public Interest Advocacy Centre (PIAC) Suite 1204 ONE Nicholas Street Ottawa, ON K1N 7B7 Tel: (613) 562-4002 Fax: (613) 562-0007 E-mail: [email protected] Website: www.piac.ca Canadian Cataloguing and Publication Data ISBN 978-1-927707-03-6 Off the Grid? Pinpointing Location-Based Technologies and the Law Off the Grid? Pinpointing Location-Based Technologies and the Law Page 2 of 109 Acknowledgement Financial support from Industry Canada to conduct the research on which this report is based is gratefully acknowledged. The views expressed in this report are not necessarily those of Industry Canada or of the Government of Canada. The author would also like to thank Kent Sebastian, PIAC Student-at-Law 2014-15, Sarah Mavula, PIAC Summer Student 2014, and Jonathan Bishop, PIAC’s Research & Parliamentary Affairs Analyst, for their research and contributions. Any mistakes are solely the author’s. Off the Grid? Pinpointing Location-Based Technologies and the Law Page 3 of 109 Executive Summary Knowledge of the whereabouts of a person, and of a person’s movement patterns, can be very valuable, from a marketing perspective. Indeed, the scale and scope of the business opportunities associated with so-called location-based behavioural marketing and location- based services (collectively, location-based technologies) have been well-documented in the business literature.
    [Show full text]
  • Doing Business in Canada 2019
    Doing Business in Canada A disciplined, team-driven approach focused squarely on the success of your business. Lawyers in offices across Canada, the United States, Europe and China — Toronto, Calgary, Vancouver, Montréal, Ottawa, New York, London and Beijing. Among the world’s most respected corporate law firms, with expertise in virtually every area of business law. When it comes to dealmaking, Blakes Means Business. Blakes Guide to Doing Business in Canada Doing Business in Canada is intended as an introductory summary. Specific advice should be sought in connection with particular transactions. If you have any questions with respect to Doing Business in Canada, please contact our Firm Chair, Brock Gibson by email at [email protected]. Blake, Cassels & Graydon LLP produces regular reports and special publications on Canadian legal developments. For further information about these reports and publications, please contact the Blakes Client Relations & Marketing Department at [email protected]. Contents I. Introduction ............................................................................................................... 1 II. Government and Legal System ............................................................................... 2 1. Brief Canadian History ............................................................................................. 2 2. Federal Government ................................................................................................. 3 3. Provincial and Territorial Governments
    [Show full text]
  • The Right to Privacy and the Future of Mass Surveillance’
    ‘The Right to Privacy and the Future of Mass Surveillance’ ABSTRACT This article considers the feasibility of the adoption by the Council of Europe Member States of a multilateral binding treaty, called the Intelligence Codex (the Codex), aimed at regulating the working methods of state intelligence agencies. The Codex is the result of deep concerns about mass surveillance practices conducted by the United States’ National Security Agency (NSA) and the United Kingdom Government Communications Headquarters (GCHQ). The article explores the reasons for such a treaty. To that end, it identifies the discriminatory nature of the United States’ and the United Kingdom’s domestic legislation, pursuant to which foreign cyber surveillance programmes are operated, which reinforces the need to broaden the scope of extraterritorial application of the human rights treaties. Furthermore, it demonstrates that the US and UK foreign mass surveillance se practices interferes with the right to privacy of communications and cannot be justified under Article 17 ICCPR and Article 8 ECHR. As mass surveillance seems set to continue unabated, the article supports the calls from the Council of Europe to ban cyber espionage and mass untargeted cyber surveillance. The response to the proposal of a legally binding Intelligence Codexhard law solution to mass surveillance problem from the 47 Council of Europe governments has been so far muted, however a soft law option may be a viable way forward. Key Words: privacy, cyber surveillance, non-discrimination, Intelligence Codex, soft law. Introduction Peacetime espionage is by no means a new phenomenon in international relations.1 It has always been a prevalent method of gathering intelligence from afar, including through electronic means.2 However, foreign cyber surveillance on the scale revealed by Edward Snowden performed by the United States National Security Agency (NSA), the United Kingdom Government Communications Headquarters (GCHQ) and their Five Eyes partners3 1 Geoffrey B.
    [Show full text]
  • A Failure of Intelligence: the Echelon Interception System & the Fundamental Right to Privacy in Europe
    Pace International Law Review Volume 14 Issue 2 Fall 2002 Article 7 September 2002 Post-Sept. 11th International Surveillance Activity - A Failure of Intelligence: The Echelon Interception System & the Fundamental Right to Privacy in Europe Kevin J. Lawner Follow this and additional works at: https://digitalcommons.pace.edu/pilr Recommended Citation Kevin J. Lawner, Post-Sept. 11th International Surveillance Activity - A Failure of Intelligence: The Echelon Interception System & the Fundamental Right to Privacy in Europe, 14 Pace Int'l L. Rev. 435 (2002) Available at: https://digitalcommons.pace.edu/pilr/vol14/iss2/7 This Article is brought to you for free and open access by the School of Law at DigitalCommons@Pace. It has been accepted for inclusion in Pace International Law Review by an authorized administrator of DigitalCommons@Pace. For more information, please contact [email protected]. POST-SEPT. 11TH INTERNATIONAL SURVEILLANCE ACTIVITY - A FAILURE OF INTELLIGENCE: THE ECHELON INTERCEPTION SYSTEM & THE FUNDAMENTAL RIGHT TO PRIVACY IN EUROPE Kevin J. Lawner* I. Introduction ....................................... 436 II. Communications Intelligence & the United Kingdom - United States Security Agreement ..... 443 A. September 11th - A Failure of Intelligence .... 446 B. The Three Warning Flags ..................... 449 III. The Echelon Interception System .................. 452 A. The Menwith Hill and Bad Aibling Interception Stations .......................... 452 B. Echelon: The Abuse of Power .................. 454 IV. Anti-Terror Measures in the Wake of September 11th ............................................... 456 V. Surveillance Activity and the Fundamental Right to Privacy in Europe .............................. 460 A. The United Nations International Covenant on Civil and Political Rights and the Charter of Fundamental Rights of the European Union... 464 B.
    [Show full text]
  • Bibliography
    Bibliography [1] M Aamir Ali, B Arief, M Emms, A van Moorsel, “Does the Online Card Payment Landscape Unwittingly Facilitate Fraud?” IEEE Security & Pri- vacy Magazine (2017) [2] M Abadi, RM Needham, “Prudent Engineering Practice for Cryptographic Protocols”, IEEE Transactions on Software Engineering v 22 no 1 (Jan 96) pp 6–15; also as DEC SRC Research Report no 125 (June 1 1994) [3] A Abbasi, HC Chen, “Visualizing Authorship for Identification”, in ISI 2006, LNCS 3975 pp 60–71 [4] H Abelson, RJ Anderson, SM Bellovin, J Benaloh, M Blaze, W Diffie, J Gilmore, PG Neumann, RL Rivest, JI Schiller, B Schneier, “The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption”, in World Wide Web Journal v 2 no 3 (Summer 1997) pp 241–257 [5] H Abelson, RJ Anderson, SM Bellovin, J Benaloh, M Blaze, W Diffie, J Gilmore, M Green, PG Neumann, RL Rivest, JI Schiller, B Schneier, M Specter, D Weizmann, “Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications”, MIT CSAIL Tech Report 2015-026 (July 6, 2015); abridged version in Communications of the ACM v 58 no 10 (Oct 2015) [6] M Abrahms, “What Terrorists Really Want”,International Security v 32 no 4 (2008) pp 78–105 [7] M Abrahms, J Weiss, “Malicious Control System Cyber Security Attack Case Study – Maroochy Water Services, Australia”, ACSAC 2008 [8] A Abulafia, S Brown, S Abramovich-Bar, “A Fraudulent Case Involving Novel Ink Eradication Methods”, in Journal of Forensic Sciences v41(1996) pp 300-302 [9] DG Abraham, GM Dolan, GP Double, JV Stevens,
    [Show full text]
  • A Public Accountability Defense for National Security Leakers and Whistleblowers
    A Public Accountability Defense For National Security Leakers and Whistleblowers The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Yochai Benkler, A Public Accountability Defense For National Security Leakers and Whistleblowers, 8 Harv. L. & Pol'y Rev. 281 (2014). Published Version http://www3.law.harvard.edu/journals/hlpr/files/2014/08/ HLP203.pdf Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:12786017 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Open Access Policy Articles, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#OAP A Public Accountability Defense for National Security Leakers and Whistleblowers Yochai Benkler* In June 2013 Glenn Greenwald, Laura Poitras, and Barton Gellman be- gan to publish stories in The Guardian and The Washington Post based on arguably the most significant national security leak in American history.1 By leaking a large cache of classified documents to these reporters, Edward Snowden launched the most extensive public reassessment of surveillance practices by the American security establishment since the mid-1970s.2 Within six months, nineteen bills had been introduced in Congress to sub- stantially reform the National Security Agency’s (“NSA”) bulk collection program and its oversight process;3 a federal judge had held that one of the major disclosed programs violated the
    [Show full text]
  • Summary of U.S. Foreign Intelligence Surveillance Law, Practice, Remedies, and Oversight
    ___________________________ SUMMARY OF U.S. FOREIGN INTELLIGENCE SURVEILLANCE LAW, PRACTICE, REMEDIES, AND OVERSIGHT ASHLEY GORSKI AMERICAN CIVIL LIBERTIES UNION FOUNDATION AUGUST 30, 2018 _________________________________ TABLE OF CONTENTS QUALIFICATIONS AS AN EXPERT ............................................................................................. iii INTRODUCTION ......................................................................................................................... 1 I. U.S. Surveillance Law and Practice ................................................................................... 2 A. Legal Framework ......................................................................................................... 3 1. Presidential Power to Conduct Foreign Intelligence Surveillance ....................... 3 2. The Expansion of U.S. Government Surveillance .................................................. 4 B. The Foreign Intelligence Surveillance Act of 1978 ..................................................... 5 1. Traditional FISA: Individual Orders ..................................................................... 6 2. Bulk Searches Under Traditional FISA ................................................................. 7 C. Section 702 of the Foreign Intelligence Surveillance Act ........................................... 8 D. How The U.S. Government Uses Section 702 in Practice ......................................... 12 1. Data Collection: PRISM and Upstream Surveillance ........................................
    [Show full text]