The Problems with PRISM: How a Modern Definition of Privacy Necessarily Protects Privacy Interests in Digital Communications, 30 J

Total Page:16

File Type:pdf, Size:1020Kb

The Problems with PRISM: How a Modern Definition of Privacy Necessarily Protects Privacy Interests in Digital Communications, 30 J The John Marshall Journal of Information Technology & Privacy Law Volume 30 Issue 3 Article 5 Summer 2014 The Problems with PRISM: How A Modern Definition of Privacy Necessarily Protects Privacy Interests in Digital Communications, 30 J. Marshall J. Info. Tech. & Privacy L. 571 (2014) Adam Florek Follow this and additional works at: https://repository.law.uic.edu/jitpl Part of the Computer Law Commons, Internet Law Commons, Privacy Law Commons, and the Science and Technology Law Commons Recommended Citation Adam Florek, The Problems with PRISM: How A Modern Definition of Privacy Necessarily Protects Privacy Interests in Digital Communications, 30 J. Marshall J. Info. Tech. & Privacy L. 571 (2014) https://repository.law.uic.edu/jitpl/vol30/iss3/5 This Comments is brought to you for free and open access by UIC Law Open Access Repository. It has been accepted for inclusion in The John Marshall Journal of Information Technology & Privacy Law by an authorized administrator of UIC Law Open Access Repository. For more information, please contact [email protected]. THE PROBLEMS WITH PRISM: HOW A MODERN DEFINITION OF PRIVACY NECESSARILY PROTECTS PRIVACY INTERESTS IN DIGITAL COMMUNICATIONS ADAM FLOREK* I. INTRODUCTION In June 2013, National Security Agency (NSA) analyst Edward Snowden revealed the existence of clandestine government programs, codenamed PRISM and XKeyscore, designed to collect and aggregate information from numerous service providers into a single searchable database.1 The Guardian reporter Glen Greenwald first described the programs in a series of articles for the British paper, portraying PRISM as an Orwellian program that has infiltrated service providers from Mi- crosoft to Apple, and from Facebook to Google.2 The programs’ directive is to collect usage data and communications directly from the service providers on virtually every aspect of online life.3 It is common knowledge that social media sites collect personal da- ta from their users and in the majority of instances it is the user that is actually providing the information. How else would you be able to * Adam Florek is the former owner-operator of River’s Edge Group, Inc. He re- ceived his B.A. in Political Science from Purdue University in 2010 and is currently pur- suing his J.D. at The John Marshall Law School, expected May 2015. 1. Glenn Greenwald & Ewen MacAskill, NSA Prism Program Taps in to User Data of Apple, Google and Others, THE GUARDIAN (June 6, 2013), http://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data. 2. Id. 3. Glenn Greenwald, XKeyscore: NSA Tool Collects ‘Nearly Everything a User Does on the Internet,’ THE GUARDIAN (July 11, 2013), http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data. 571 572 J. INFORMATION TECHNOLOGY & PRIVACY LAW [Vol. XXX connect with your “friends” via Facebook or get technical support from Microsoft? Different sites, however, collect different types of infor- mation from their users. For instance, Google uses user search history to generate targeted ads4 whereas Facebook monitors an individual’s interests and activity to suggest friends and similar interests.5 In contrast, the PRISM program collects far more information. PRISM goes beyond the self-imposed limitations on data collection that private entities such as Google or Facebook adhere to.6 The PRISM program collects “audio and video chats, photographs, e-mails, docu- ments, and connection logs”7 and additional information from Microsoft, Yahoo!, Google, Facebook, PalTalk, YouTube, Skype, AOL, Apple, and other participating service providers.8 The information is allegedly col- lected directly from provider hardware via NSA technology and de- ployed at various private network locations allowing for more intimate access.9 The information, collected in real time, is indexed for analysis and search ability.10 PRISM is authorized under the 2008 Amendments to Section 702 of the Foreign Intelligence Surveillance Act of 1974 (FISA).11 The Act provides the federal government with expanded surveillance powers in connection with intelligence gathering and surveillance on foreign indi- viduals in the digital world.12 However, there are restrictions that ap- pear to prohibit surveillance of American citizens: target(s) must be 4. Privacy & Terms, GOOGLE, http://www.google.com/policies/privacy (last visited May 22, 2014). 5. Data Use Policy, FACEBOOK, https://www.facebook.com/about/privacy/your-info (last visited May 22, 2014). 6. Id. (analyzing their respective privacy policies, Google and Facebook each out- line the information that is collected from the user. For example, Facebook collects in- formation that the user chooses to share with it as well as information other people con- nected to the user choose to share with the user. Though this seems very broad, the specifics are outlined in the Facebook Data Use Policy). 7. Barton Gellman & Laura Poitras, U.S., British Intelligence Mining Data from Nine U.S. Internet Companies in Broad Secret Program, WASH. POST (June 6, 2013), http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us- internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845- d970ccb04497_story.html. 8. Greenwald & MacAskill, supra note 1. 9. Id. (“[T]he Prism program allows the intelligence services direct access to the companies’ servers. The Prism program allows the NSA, the world's largest surveil- lance organization, to obtain targeted communications without having to request them from the service providers and without having to obtain individual court orders.”). 10. Id. (“With this program, the NSA is able to reach directly into the servers of the participating companies and obtain both stored communications as well as perform real- time collection on targeted users.”). 11. 50 U.S.C. § 1881 (2008). 12. Id.; see also § 1881a(b)(l). 2014] THE PROBLEMS WITH PRISM 573 outside of the United States;13 may not be a U.S. person living abroad;14 and surveillance must be consistent with the Fourth Amendment.15 Surveillance is allowed in the instance where a party is outside of the United States or under certain other circumstances.16 The presence of a data aggregation program, such as PRISM or XKeyscore, raises a number of new and unique legal issues. The right to privacy is a recognized and protected constitutional right. While that right may be circumvented, there are due process mechanisms in place to ensure that the government cannot wantonly invade the privacy of its citizens. PRISM, as it has been portrayed, seems to be in violation of a number of these fundamental privacy rights. Because PRISM and other surveillance programs create a number of privacy concerns, it is doubtful that the current “reasonable expecta- tion”17 doctrine is sufficient to safeguard privacy interests in an increas- ingly monitored society. This Comment will first explore the right to privacy and its evolution from Warren and Brandeis’s “right to be let alone”18 to the modern two prong analysis established by Justice Harlan in Katz v. United States19 and its application to an increasingly techno- logical collection of cases. In Part II, this Comment will discuss the ap- plication of the right to privacy in cyberspace and society’s expectation therein. Part III will explore the impact of surveillance, particularly the NSA’s surveillance programs, on people and social interactions. Fi- nally, this Comment will conclude by advocating for a modernized defi- nition of privacy that affords increased protections to the individual in keeping with society’s expectations and the dismantlement of the NSA’s domestic data collection operations. 13. See § 1881a. 14. Id. 15. Id. 16. Id. 17. Katz v. United States, 389 U.S. 347, 361 (1967) (Harlan, J., concurring) (“[T]he expectation be one that society is prepared to recognize as ‘reasonable.’”). 18. Samuel D. Warren & Louis D. Brandeis, Comment, The Right to Privacy, 4 HARV. L. REV. 193, 193 (1890). 19. Katz, 389 U.S. at 360 (Harlan, J., concurring). 574 J. INFORMATION TECHNOLOGY & PRIVACY LAW [Vol. XXX II. BACKGROUND A. THE PRISM PROGRAM 1. Purpose The need for a comprehensive surveillance program was realized after the terrorist attacks on September 11, 2001.20 The mandate of the PRISM program is to monitor and aggregate foreign communications in an effort to protect American interests from foreign threats.21 The pro- gram is designed to give law enforcement officials an additional avenue to investigate terrorism and to “allow . intelligence professionals to quickly and effectively monitor the communications of terrorists abroad.”22 The 2008 Amendments to FISA provide a more comprehen- sive surveillance program while allegedly safeguarding American liber- ties and addressing the inadequacies and issues of its predecessors.23 2. How Did We Get Here? The History of Post-9/11 Surveillance and its Present Authorization The PRISM program is only the latest iteration of a foreign surveil- lance program under FISA. In the months and years following the ter- rorist attacks of 9/11, the federal government initiated a number of pro- grams and operations to expand the scope of surveillance in an effort to ensure that the events of 9/11 were not repeated. These programs were carried out with varying degrees of success, and met with a wide range of public apprehension.24 President George W. Bush authorized the first of these programs called “Terrorist Surveillance Program,”25 via an Executive Order.26 20. NAT’L COMM. ON TERRORIST ATTACKS UPON THE U.S., U.S. SENATE, THE 9/11 COMMISSION REPORT 1-14, http://www.9-11commission.gov/report/911Report.pdf (last vis- ited Nov. 23, 2013). 21. President George W. Bush, statement upon signing H.R. 6304 (July 10, 2008) (the President, when signing the bill into law said, “The bill I sign today will help us meet our most solemn responsibility: to stop new attacks and to protect our people”).
Recommended publications
  • How Laura Poitras Helped Snowden Spill His Secrets
    How Laura Poitras Helped Snowden Spill His Secrets Documentary filmmaker Laura Poitras in Berlin. By PETER MAASS Published: August 13, 2013 This past January, Laura Poitras received a curious e-mail from an anonymous stranger requesting her public encryption key. For almost two years, Poitras had been working on a documentary about surveillance, and she occasionally received queries from strangers. She replied to this one and sent her public key — allowing him or her to send an encrypted e-mail that only Poitras could open, with her private key — but she didn’t think much would come of it. The stranger responded with instructions for creating an even more secure system to protect their exchanges. Promising sensitive information, the stranger told Poitras to select long pass phrases that could withstand a brute-force attack by networked computers. “Assume that your adversary is capable of a trillion guesses per second,” the stranger wrote. Before long, Poitras received an encrypted message that outlined a number of secret surveillance programs run by the government. She had heard of one of them but not the others. After describing each program, the stranger wrote some version of the phrase, “This I can prove.” 1 From www.nytimes.com/2013/08/18/magazine/laura-poitras-snowden.html?hpw 20 August 2013 Seconds after she decrypted and read the e-mail, Poitras disconnected from the Internet and removed the message from her computer. “I thought, O.K., if this is true, my life just changed,” she told me last month. “It was staggering, what he claimed to know and be able to provide.
    [Show full text]
  • The Nsa's Prism Program and the New Eu Privacy Regulation: Why U.S
    American University Business Law Review Volume 3 | Issue 2 Article 5 2013 The SN A'S Prism Program And The ewN EU Privacy Regulation: Why U.S. Companies With A Presence In The EU ouldC Be In Trouble Juhi Tariq American University Washington College of Law Follow this and additional works at: http://digitalcommons.wcl.american.edu/aublr Part of the International Law Commons, and the Internet Law Commons Recommended Citation Tariq, Juhi "The SAN 'S Prism Program And The eN w EU Privacy Regulation: Why U.S. Companies With A Presence In The EU ouldC Be In Trouble," American University Business Law Review, Vol. 3, No. 2 (2018) . Available at: http://digitalcommons.wcl.american.edu/aublr/vol3/iss2/5 This Note is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in American University Business Law Review by an authorized editor of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. NOTE THE NSA'S PRISM PROGRAM AND THE NEW EU PRIVACY REGULATION: WHY U.S. COMPANIES WITH A PRESENCE IN THE EU COULD BE IN TROUBLE JUHI TARIQ* Recent revelations about a clandestine data surveillance program operated by the NSA, Planning Tool for Resource Integration, Synchronization, and Management ("PRISM'), and a stringent proposed European Union ("EU") data protection regulation, will place U.S. companies with a businesspresence in EU member states in a problematic juxtaposition. The EU Proposed General Data Protection Regulation stipulates that a company can be fined up to two percent of its global revenue for misuse of users' data and requires the consent of data subjects prior to access.
    [Show full text]
  • George Thorley Class 12 Project
    SURVEILLANCE !1 Surveillance Watch The Many, To Catch The Few George J. Thorley Norwich Steiner School Author Note George J. Thorley, Level 3 Steiner School Certificate, Norwich Steiner School. This report is the piece of work required for the Steiner School Certificate Level 3 Class 12 Project. Correspondence concerning this report should be addressed to George Thorley, Norwich Steiner School, Hospital Lane, Norwich, NR1 2HW. Contact: [email protected] 11 - 05 - 2017 SURVEILLANCE !2 Contents Title 1 Summary 3 Introduction 4 Historical Context 5 9/11 7 USA PATRIOT Act 2001 8 Presidents Surveillance Program 10 The Timeline 12 Edward J Snowden 16 Prism 17 Tempora 20 Treasure Map 21 Conclusion 23 Diagrams 26 References 27 11 - 05 - 2017 SURVEILLANCE !3 Summary In this report, my main question will be: What was the extent of government mass surveillance, in particular the NSA in the United States, running from the September 11 attacks in 2001, to the Edward Snowden revelations in 2013? In answering this I will focus on how public and political feelings prompted the conditions possible for the security forces to be doing what they do in todays world. In particular, I will be looking at the National Security Agency (NSA) in the United States (US) and some of the revelations brought forward by Edward Snowden in 2013, along with the scale of involvement of the United Kingdom’s (UK) Government Communication Headquarters (GCHQ). I will then look at some of the fundamental questions that surround the world of mass surveillance, such as the effectiveness of the programs that were acted upon by security agencies, who they were really looking for, and whether, in my eyes, their methods were morally right.
    [Show full text]
  • High Technology, Consumer Privacy, and U.S. National Security
    Georgetown University Law Center Scholarship @ GEORGETOWN LAW 2015 High Technology, Consumer Privacy, and U.S. National Security Laura K. Donohue Georgetown University Law Center, [email protected] This paper can be downloaded free of charge from: https://scholarship.law.georgetown.edu/facpub/1457 http://ssrn.com/abstract=2563573 Bus. L. Rev. (forthcoming) This open-access article is brought to you by the Georgetown Law Library. Posted with permission of the author. Follow this and additional works at: https://scholarship.law.georgetown.edu/facpub Part of the Constitutional Law Commons, Consumer Protection Law Commons, Fourth Amendment Commons, and the National Security Law Commons HIGH TECHNOLOGY, CONSUMER PRIVACY, AND U.S. NATIONAL SECURITY Laura K. Donohue* I. INTRODUCTION Documents released over the past year detailing the National Security Agency’s (“NSA”) telephony metadata collection program and interception of international content under the Foreign Intelligence Surveillance Act (FISA) implicated U.S. high technology companies in government surveillance. 1 The result was an immediate, and detrimental, impact on U.S. corporations, the economy, and U.S. national security. The first Snowden documents, printed on June 5, 2013, revealed that the government had served orders on Verizon, directing the company to turn over telephony metadata under Section 215 of the USA PATRIOT Act.2 The following day, The Guardian published classified slides detailing how the NSA had intercepted international content under Section 702 of the FISA Amendments Act.3 The type of information obtained ranged from E-mail, video and voice chat, videos, photos, and stored data, to Voice over Internet Protocol, file transfers, video conferencing, notifications of target activity, and online social networking.4 The companies involved read like a who’s who of U.S.
    [Show full text]
  • SURVEILLE NSA Paper Based on D2.8 Clean JA V5
    FP7 – SEC- 2011-284725 SURVEILLE Surveillance: Ethical issues, legal limitations, and efficiency Collaborative Project This project has received funding from the European Union’s Seventh Framework Programme for research, technological development and demonstration under grant agreement no. 284725 SURVEILLE Paper on Mass Surveillance by the National Security Agency (NSA) of the United States of America Extract from SURVEILLE Deliverable D2.8: Update of D2.7 on the basis of input of other partners. Assessment of surveillance technologies and techniques applied in a terrorism prevention scenario. Due date of deliverable: 31.07.2014 Actual submission date: 29.05.2014 Start date of project: 1.2.2012 Duration: 39 months SURVEILLE WorK PacKage number and lead: WP02 Prof. Tom Sorell Author: Michelle Cayford (TU Delft) SURVEILLE: Project co-funded by the European Commission within the Seventh Framework Programme Dissemination Level PU Public X PP Restricted to other programme participants (including the Commission Services) RE Restricted to a group specified by the consortium (including the Commission Services) CO Confidential, only for members of the consortium (including the Commission Services) Commission Services) Executive summary • SURVEILLE deliverable D2.8 continues the approach pioneered in SURVEILLE deliverable D2.6 for combining technical, legal and ethical assessments for the use of surveillance technology in realistic serious crime scenarios. The new scenario considered is terrorism prevention by means of Internet monitoring, emulating what is known about signals intelligence agencies’ methods of electronic mass surveillance. The technologies featured and assessed are: the use of a cable splitter off a fiber optic backbone; the use of ‘Phantom Viewer’ software; the use of social networking analysis and the use of ‘Finspy’ equipment installed on targeted computers.
    [Show full text]
  • Two Years After Snowden
    TWO YEARS AFTER SNOWDEN PROTECTING HUMAN RIGHTS IN AN AGE OF MASS SURVEILLANCE (COVER IMAGE) A student works on a computer that is projecting former U.S. National Security Agency contractor Edward Snowden as he appears live via video during a world affairs conference in Toronto © REUTERS/Mark Blinch 2 TWO YEARS AFTER SNOWDEN JUNE 2015 © REUTERS/Zoran Milich © REUTERS/Zoran “The hard truth is that the use of mass surveillance technology effectively does away with the right to privacy of communications on the Internet altogether.” Ben Emmerson QC, UN Special Rapporteur on counter-terrorism and human rights EXECUTIVE SUMMARY On 5 June 2013, a British newspaper, The exposed by the media based on files leaked by Guardian, published the first in a series Edward Snowden have included evidence that: of revelations about indiscriminate mass surveillance by the USA’s National Security Companies – including Facebook, Google Agency (NSA) and the UK’s Government and Microsoft – were forced to handover Communications Headquarters (GCHQ). their customers’ data under secret orders Edward Snowden, a whistleblower who had through the NSA’s Prism programme; worked with the NSA, provided concrete evidence of global communications the NSA recorded, stored and analysed surveillance programmes that monitor the metadata related to every single telephone internet and phone activity of hundreds call and text message transmitted in of millions of people across the world. Mexico, Kenya, and the Philippines; Governments can have legitimate reasons GCHQ and the NSA have co- for using communications surveillance, for opted some of the world’s largest example to combat crime or protect national telecommunications companies to tap security.
    [Show full text]
  • Citizenfour Discussion Guide
    www.influencefilmclub.com Citizenfour Discussion Guide Director: Laura Poitras Year: 2015 Time: 114 min You might know this director from: The Oath (2010) My Country, My Country (2006) Flag Wars (2003) FILM SUMMARY Director Laura Poitras was in the middle of her third documentary on post-9/11 America when she received an email from “Citizenfour,” an individual claiming to possess insider information on the wide-scale surveillance schemes of the U.S. government. Rather than brushing the message off as bogus, she pursued this mysterious mailer, embroiling herself in one of the greatest global shockwaves of this millennium thus far. Teaming up with journalist Glenn Greenwald of “The Guardian,” Poitras began her journey. The two travel to Hong Kong, where they meet “Citizenfour,” an infrastructure analyst named Edward Snowden working inside the National Security Agency. Joined by fellow Guardian colleague Ewen MacAskill, the four set up camp in Snowden’s hotel room, where over the course of the following eight days he reveals a shocking protocol in effect that will uproot the way citizens across the world view their leaders in the days to come. Snowden does not wish to remain anonymous, and yet he insists “I’m not the story.” In his mind the issues of liberty, justice, freedom, and democracy are at stake, and who he is has very little bearing on the intense implications of the mass surveillance in effect worldwide. Snowden reminds us, “It’s not science fiction. This is happening right now,” and at times the extent of information is just too massive to grasp, especially for the journalists involved.
    [Show full text]
  • Twitter V. Sessions
    Case4:14-cv-04480-YGR Document52-1 Filed02/17/15 Page1 of 27 1 Brett Max Kaufman (Of Counsel) [email protected] 2 TECHNOLOGY LAW & POLICY CLINIC NEW YORK UNIVERSITY SCHOOL OF LAW 3 245 Sullivan Street New York, New York 10012 4 Telephone: 212-998-6430 Facsimile: 212-995-4031 5 Joseph C. Gratz (SBN 240676) 6 [email protected] DURIE TANGRI LLP 7 217 Leidesdorff Street San Francisco, CA 94111 8 Telephone: 415-362-6666 Facsimile: 415-236-6300 9 Attorneys for Amicus Curiae 10 Freedom of the Press Foundation 11 12 IN THE UNITED STATES DISTRICT COURT 13 FOR THE NORTHERN DISTRICT OF CALIFORNIA 14 OAKLAND DIVISION 15 TWITTER, INC., Case No. 4:14-cv-04480-YGR 16 Plaintiff, BRIEF OF AMICUS CURIAE FREEDOM OF THE PRESS FOUNDATION IN SUPPORT OF 17 v. PLAINTIFF’S OPPOSITION TO DEFENDANTS’ PARTIAL MOTION TO 18 ERIC HOLDER, DISMISS Attorney General of the United States, 19 Ctrm: 1 – 4th Floor UNITED STATES DEPARTMENT OF JUSTICE, Judge: Honorable Yvonne Gonzalez Rogers 20 JAMES COMEY, 21 Director of the Federal Bureau of Investigation, and 22 FEDERAL BUREAU OF INVESTIGATION, 23 Defendants. 24 25 26 27 28 BRIEF OF AMICUS CURIAE FREEDOM OF THE PRESS FOUNDATION ISO PLAINTIFF’S OPPOSITION TO DEFENDANTS’ PARTIAL MOTION TO DISMISS / CASE NO. 4:14-CV-04480-YGR Case4:14-cv-04480-YGR Document52-1 Filed02/17/15 Page2 of 27 1 TABLE OF CONTENTS 2 Page 3 STATEMENT OF INTEREST OF AMICUS CURIAE .............................................................................1 4 INTRODUCTION .......................................................................................................................................1 5 ARGUMENT ...............................................................................................................................................2 6 I. TRANSPARENCY REPORTING BY TECHNOLOGY COMPANIES ABOUT GOVERNMENT SURVEILLANCE ON U.S.
    [Show full text]
  • National Security Whistleblowing Vs. Dodd-Frank Whistleblowing: Finding a Balance and a Mechanism to Encourage National Security Whistleblowers Stephen Coleman Tily
    Brooklyn Law Review Volume 80 | Issue 3 Article 14 2015 National Security Whistleblowing vs. Dodd-Frank Whistleblowing: Finding a Balance and a Mechanism to Encourage National Security Whistleblowers Stephen Coleman Tily Follow this and additional works at: https://brooklynworks.brooklaw.edu/blr Recommended Citation Stephen C. Tily, National Security Whistleblowing vs. Dodd-Frank Whistleblowing: Finding a Balance and a Mechanism to Encourage National Security Whistleblowers, 80 Brook. L. Rev. (2015). Available at: https://brooklynworks.brooklaw.edu/blr/vol80/iss3/14 This Note is brought to you for free and open access by the Law Journals at BrooklynWorks. It has been accepted for inclusion in Brooklyn Law Review by an authorized editor of BrooklynWorks. National Security Whistleblowing vs. Dodd-Frank Whistleblowing FINDING A BALANCE AND A MECHANISM TO ENCOURAGE NATIONAL SECURITY WHISTLEBLOWERS iNTRODUCTION On June 14, 2013, five days after Edward Snowden revealed himself as the person who leaked classified documents to Glenn Greenwald, the United States filed a criminal complaint in the Eastern District of Virginia, charging Snowden with “theft, ‘unauthorized communication of national defense information,’ and ‘willful communication of classified communications intelligence information to an unauthorized person.’”1 The recent release of scores of information regarding the surveillance programs of the National Security Agency (NSA) was first reported by Greenwald, a reporter at the British national newspaper, The Guardian.2 Charging Snowden is reflective of an aggressive policy of the U.S. government to discourage whistleblowing about national security issues. Snowden began his whistleblowing in January 2013, when he reached out to a documentary filmmaker to discuss the extent of the NSA’s surveillance program.3 In February 2013, Snowden contacted Greenwald to reveal what he knew.4 Snowden then began sending secured documents that he had obtained through his work with Booz Allen Hamilton, a defense 1 Peter Finn & Sari Horwitz, U.S.
    [Show full text]
  • NSA Surveillance Leaks: Background and Issues for Congress
    NSA Surveillance Leaks: Background and Issues for Congress John W. Rollins Specialist in Terrorism and National Security Edward C. Liu Legislative Attorney September 4, 2013 Congressional Research Service 7-5700 www.crs.gov R43134 CRS Report for Congress Prepared for Members and Committees of Congress NSA Surveillance Leaks: Background and Issues for Congress Summary Recent attention concerning National Security Agency (NSA) surveillance pertains to unauthorized disclosures of two different intelligence collection programs. Since these programs were publicly disclosed over the course of two days in June, there has been confusion about what information is being collected and under which authorities the NSA is acting. This report clarifies the differences between the two programs and identifies potential issues that may help Members of Congress assess legislative proposals pertaining to NSA surveillance authorities. The first program collects in bulk the phone records—including the number that was dialed from, the number that was dialed to, and the date and duration of the call—of customers of Verizon and possibly other U.S. telephone service providers. It does not collect the content of the calls or the identity of callers. The data are collected pursuant to Section 215 of the USA PATRIOT ACT, which amended the Foreign Intelligence Surveillance Act (FISA) of 1978. Section 215 allows the FBI, in this case on behalf of the NSA, to apply to the Foreign Intelligence Surveillance Court (FISC) for an order compelling a person to produce “any tangible thing,” such as records held by a telecommunications provider, if the tangible things sought are “relevant to an authorized investigation.” Some commentators have expressed skepticism regarding how such a broad amount of data could be said to be “relevant to an authorized investigation,” as required by the statute.
    [Show full text]
  • Briefing – UK-US Intelligence Sharing Arrangements
    62 Britton Street London, EC1M 5UY, Great Britain https://www.privacyinternational.org +44(0) 20 3422 4321 Briefing – UK-US Intelligence Sharing Arrangements Urgent transparency is needed regarding the UK’s intelligence sharing arrangements with the United States, which allows UK and US agencies to share, by default, any raw intelligence and methods and techniques related to the acquisition of such intelligence. In a recent YouGov poll, three quarters of Britons said that they want the UK Government to tell the public what safeguards govern these arrangements. Privacy International urges the Government to improve public understanding about the scope of intelligence sharing with the US and the safeguards and oversight currently in place. JULY 2017 Background While the 2015 National Security Strategy and Strategic Defence and Security Review has referenced an “intelligence sharing partnership” with the US, details about the scope of these arrangements as well as the relevant safeguards and oversight mechanisms are currently not publicly available. The original UK-US Communication Intelligence Agreement (“UKUSA Agreement”) - drafted shortly after World War II - allows UK and US agencies to share, by default, any raw intelligence and methods and techniques related to the acquisition of such intelligence.i A 1955 revision of the UKUSA Agreement is the most recent version of the agreement to have been made public. Both communications methods as well as the nature of signals intelligence have changed dramatically since 1955. Over the last few years, information about the nature and scope of the surveillance conducted pursuant to the Five Eyes alliance has been disclosed to the public.
    [Show full text]
  • Navigating Uncharted Waters Burton W
    Brooklyn Journal of International Law Volume 40 | Issue 3 Article 7 2015 Castaway: Navigating Uncharted Waters Burton W. King Follow this and additional works at: https://brooklynworks.brooklaw.edu/bjil Recommended Citation Burton W. King, Castaway: Navigating Uncharted Waters, 40 Brook. J. Int'l L. (2015). Available at: https://brooklynworks.brooklaw.edu/bjil/vol40/iss3/7 This Note is brought to you for free and open access by the Law Journals at BrooklynWorks. It has been accepted for inclusion in Brooklyn Journal of International Law by an authorized editor of BrooklynWorks. CASTAWAY: NAVIGATING UNCHARTED WATERS “[W]histle-blowing is a generous, positive act—someone put- ting his or her career on the line in order to stop a serious problem froM causing preventable harm to others. Whistle- blowers are not traitors, but people with courage who prefer to take action against abuses they come across rather than tak- ing the easy route and remaining silent.”1 INTRODUCTION n May 20, 2013, former National Security Agency O(“NSA”) contractor Edward Snowden boarded a flight from Hawaii to Hong Kong with a massive trove of classified documents.2 During 2012 and 2013, Snowden secretly compiled and purloined the cache of documents from the NSA over the course of a fifteen-month stint as an NSA contractor in Ha- 1. Report of the Comm. on Legal Affairs and Human Rights on The Pro- tection of “Whistleblowers,” U.N. Doc. 12006, at 6 (2009) [hereinafter Whis- tleblower Protection Report], https://whistlenetwork.files.wordpress.com/2014/12/omtizgt-report-wb- doc12006-14sept2009.pdf. 2. Glenn Greenwald, Ewen MacAskill & Laura Poitras, Edward Snow- den: The Whistleblower Behind the NSA Surveillance Revelations,GUARDIAN, June 9, 2013, http://www.theguardian.com/world/2013/jun/09/edward- snowden-nsa-whistleblower-surveillance.
    [Show full text]