11. See September 11, 2001 Attacks 9

Total Page:16

File Type:pdf, Size:1020Kb

11. See September 11, 2001 Attacks 9 Cambridge University Press 978-1-107-10323-8 — American Spies Jennifer Stisa Granick Index More Information I N D E X 9/ 11. See September 11, 2001 attacks foreign surveillance of, 149 – 50 9/ 11 Commission. See National US foreign surveillance including, 3 , Commission on Terrorist Attacks 106 – 15 Upon the United States (9/ 11 American Civil Liberties Union Commission) (ACLU), 13 , 91 – 92 , 145 , 148 , 222 , 1971 (documentary), 45 229 amicus curiae , judicial oversight of Abdulmutallab, Umar Farouk, 80 surveillance and, 160 , 298 “about collection” phenomenon, Amnesty International, 110 , 135 , 222 121 – 23 , 305 anarchists, federal surveillance Abrahmson, Larry, 61 of, 178 ACLU (American Civil Liberties Android devices, global data collection Union). See American Civil from, 21 – 22 Liberties Union (ACLU) Apple, 234n. 19 ACLU v. Clapper, 959 F.Supp.2d 724 appliances, data generation by, 56 – 57 (SDNY 2013) , ix apps data, 56 Adams, John, 218 Army surveillance programs, abuses Addington, David, 194 – 96 , 201 , 207 in, 132 – 33 advertising, targeted data collection for, Ashcrot , John, 153 – 54 , 194 – 96 , 57 – 60 , 90 199 – 203 a t er- the- fact justii cations, 192 Assange, Julian, 43 , 51 a t er- the- fact rules, 3 , 152 , 211 , 243 Associated Press, surveillance of agent of a foreign power test, FISA journalists from, 147 provisions, 184 – 86 , 210 asymmetrical warfare, as justii cation agent of a foreign power test, in FISA for surveillance, 24 – 26 provisions, 213 , 249 , 304 AT&T, 45 airport security, 93 STELLARWIND controversy and, Albertson, William, 135 – 36 65 , 200 , 208 Alert List, structure of, 14 surrender of call data by, 10 , 269 Alexander, Keith, 34 – 36 , 82 , 247 warrantless wiretapping and, 205 Alexander, Michelle, 130 “Athens Af air” wiretapping scandal Ali, Muhammad, 132 (Greece), 283 American citizens Australian Signals Directorate (ASD), 165 “about collection” phenomenon authoritarian regimes, 168 – 70 in foreign surveillance Authorization for the Use of Military and, 121 – 23 Force (AUMF), 207 domestic surveillance of, 100 – 06 automatic license plate readers, 55 318 © in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-1-107-10323-8 — American Spies Jennifer Stisa Granick Index More Information Index 319 Awlaki, Anwar al- , 80 STELLARWIND abuses and, 200 – 01 Buchwald, Art, 132 back door searches bulk collection minimization procedures USA PATRIOT Act authorization, 204 and, 158 – 61 bulk data collection. See also m a s s reform of, 307 – 09 surveillance back doors, encryption Congressional limits imposed as security threat, 263 on, 103 – 04 economic impact of, 278 dei nitions of, 30 security risk of, 276 – 87 PPD- 28 restrictions on, 113 – 14 technology and, 265 regulation of, 31 – 32 Baez, Joan, 132 BULLRUN, 274 Baker, Howard, 132 Bush Administration Baker, Stewart, 65 , 85 – 90 9/ 11 Commission investigation Baltimore Sun, h e , 49 of, 70 – 74 Bamford, James, 72 domestic intelligence collection by, bank records, privacy protection for, xii 11 – 13 , 15 – 17 , 117 base rate fallacy, terrorism intelligence illegal surveillance by, 192 – 96 a n d , 9 5 – 9 7 legal immunity for espionage Bates, John, 126 , 253 , 258 , 299 activities during, 213 – 16 B a y e s ’ h eorem, terrorism analysis post– September 11 intelligence a n d , 9 5 – 9 7 policies of, 69 – 70 Bedoya, Alvaro, 151 STELLARWIND program and, Belgacom, 270 70 – 74 , 244 hacking of, 276 surveillance of journalists by, 148 B e l l s o u t h Terrorist Surveillance Program STELLARWIND controversy and, 200 a n d , 1 7 Bergen, Peter, 80 USA PATRIOT Act passage Berger v. New York , 388 U.S. 41 (1967) , and, 196 – 99 ix , 180 – 81 warrantless wiretapping by, 205 – 13 Big Data, 60 – 62 , 90 , 95 – 97 , 151 , 229 , 302 , See also metadata camera surveillance, 55 bin Laden, Osama, 71 CAPTIVATEDAUDIENCE, 267 Binney, William, 46 – 49 , 46n. 5 , 268 , Card, Andrew H., 200 – 01 293 , 294 censorship, 140 , 168 – 70 , 285 black bag surveillance (FBI), 178 Census Bureau (US), data collection Black Lives Matter, 135 , 140 , 146 by, 136 Blaze, Matt, 3 , 40 Central Intelligence Agency (CIA) BND (German spy agency), 169 – 70 9/ 11 Commission investigation Bork, Robert, 203 of, 70 – 74 Boston Marathon bombing, 77 – 79 , 91 Boston Marathon bombing botnets, 272 a n d , 7 7 – 7 9 bounded rationality, risk assessment minimization procedures, 37 – 38 and, 284 national foreign intelligence from, 6 Boundless Informant tool (NSA), 20 surveillance abuses by, 133 Brandeis, Louis, 179 Chambliss, Saxby, 39 , 61 bright line rules Senate investigation into call data phone call data collection and, 225 collection and, 10 – 17 © in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-1-107-10323-8 — American Spies Jennifer Stisa Granick Index More Information 320 Index Chaos surveillance operation, 133 NSA surveillance of, 110 – 11 charitable call data, private information overseas telecommunications from, 60 – 62 industries and, 166 Charlie Hebdo magazine, terrorist communication, intelligence dei nition attacks on, 79 , 168 – 70 of, 156 – 58 Cheney, Richard, 194 – 96 Communications Act of 1934, 176 – 78 , China, hacking of U.S. data by, 149 , 199 287 Communications Assistance to Church, Frank, 182 Law Enforcement Act CIA (Central Intelligence Agency). See (CALEA), 283 Central Intelligence Agency (CIA) communications security, 288 Cisco Systems Communications Security NSA hacking of, 271 Establishment Canada CitizenFour (documentary), 19 (CSEC), 163 – 65 City University of New York (CUNY) Communist Party in US, School of Law, 144 FBI surveillance of, civil liberties 135 – 36 , 178 domestic surveillance as threat C o n g r e s s to, 103 – 04 call data collection and role phone call data collection and, 13 – 14 of, 10 – 17 Section 215 violations of, 203 – 05 Executive Branch expansion of surveillance policies and, 5 , 74 – 76 surveillance and, 176 – 78 civil rights movement, FBI surveillance Fourth Amendment protections of, 133 – 35 and, 172 – 75 Clapper v. Amnesty Int’l USA, 133 S.Ct. future oversight of surveillance 1138 (2013) , ix , 222 , 239 by, 296 Clapper, James, 33 – 36 , 247 legal immunity for spying Clarke, Richard, 230 from, 213 – 16 Cleaver, Eldridge, 132 metadata legislation and, 302 Clinton, Hillary, 42 oversight of surveillance by, 244 , 246 , Clinton, William, 142 296 “Clipper Chip” technology, 264 privacy protections and, 172 cloud backup data, surveillance of, 108 STELLARWIND controversy and, COINTELPRO domestic spy program, 192 – 96 , 199 – 203 45 , 183 contact chaining technique, phone call Cole, David, 24 data collection and, 14 – 15 , 47 , Coll, Steve, 148 101 – 02 , 254 collection, NSA dei nition of, 33 – 36 content/ non content distinction Collection, Processing and Fourth Amendment protections Dissemination of Allied and, 226 Communications (NSA) , 163 – 65 NSA misrepresentation of, 256 Comey, James B., 130 , 153 – 54 , 199 – 203 , Cook, Tim, 280 225 , 246 , 250 Coolidge, Calvin, 175 commercial data “corporate store” database, back doors as threat to, 278 establishment of, 103 – 04 business records order, 203 – 05 CO- TRAVELER data collection foreign regulations program, 22 – 23 , 38 concerning, 168 – 70 legal issues with, 29 – 30 © in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-1-107-10323-8 — American Spies Jennifer Stisa Granick Index More Information Index 321 Council on American- Islamic Relations NSA dei nition of, 34 – 36 (CAIR), targeted surveillance public- private partnerships for, of, 143 5 7– 6 0 “Countering Violent Extremism: data storage A Guide for Practitioners and absence of privacy and, 219 – 21 Analysts”, 150 local data storage regulations, counterterrorism 168 – 70 fusion center information sharing overseas email data storage, 108 – 09 and, 140 – 42 third party data collection guilt vs. innocence in analysis and, 189 – 91 by, 150 – 51 data surveillance limits of surveillance data for, 80 – 85 o l ine, 55 , 56 – 57 mass surveillance and, 78 – 79 De, Rajesh, 35 torture and kidnapping decryption systems, 274 justii ed as, 92 Defense Intelligence Agency, Court of Justice of the European Union “intelligence law handbook”, 27 (CJEU), 167 , 305 DeLoach, Cartha, 132 credit card data, surveillance using, 56 democracy Credit Suisse First Boston (CSFB) foreign surveillance as threat bank, 130 to, 169 – 70 Crime Control and Safe Streets Act political surveillance as threat (1968) (Wiretap Act), 205 to, 145 – 47 criminal investigations surveillance abuses and, 5 , 7 – 8 , intelligence investigations vs. , 24 – 26 , 131 – 33 , 138 – 40 73 – 74 , 103 – 04 , 150 – 51 , 184 – 86 , Department of Commerce (DOC), 196 – 99 jurisdiction over communications privacy issues and, 128 – 31 , 223 by, 264 terrorism vs. , 90 – 98 Department of Defense (DOD) wiretapping in, 180 – 81 , 233 data collection guidelines, 33 – 36 criminal mass surveillance Directive 5240.1- R, 112 targeted data collection vs. , 90 – 98 fusion centers and, 140 – 42 CSEC (Communications Security national and military intelligence, 6 Establishment Canada), 163 – 65 Department of Homeland Security CUNY (City University of New (DHS), 98 , 140 – 42 York), 144 Department of Justice (DOJ) customer proprietary network domestic intelligence collection information (CPNI), 199 a n d , 1 5 – 1 7 cyber sovereignty movement, 168 – 70 O i ce of Intelligence Policy and c y b e r s e c u r i t y . See also digital Review, 49 surveillance , See also Internet , O i ce
Recommended publications
  • Intelligence Legalism and the National Security Agency's Civil Liberties
    112 Harvard National Security Journal / Vol. 6 ARTICLE Intelligence Legalism and the National Security Agency’s Civil Liberties Gap __________________________ Margo Schlanger* * Henry M. Butzel Professor of Law, University of Michigan. I have greatly benefited from conversations with John DeLong, Mort Halperin, Alex Joel, David Kris, Marty Lederman, Nancy Libin, Rick Perlstein, Becky Richards, and several officials who prefer not to be named, all of whom generously spent time with me, discussing the issues in this article, and many of whom also helped again after reading the piece in draft. I would also like to extend thanks to Sam Bagenstos, Rick Lempert, Daphna Renan, Alex Rossmiller, Adrian Vermeule, Steve Vladeck, Marcy Wheeler, Shirin Sinnar and other participants in the 7th Annual National Security Law Workshop, participants at the University of Iowa law faculty workshop, and my colleagues at the University of Michigan Legal Theory Workshop and governance group lunch, who offered me extremely helpful feedback. Jennifer Gitter and Lauren Dayton provided able research assistance. All errors are, of course, my responsibility. Copyright © 2015 by the Presidents and Fellows of Harvard College and Margo Schlanger. 2015 / Intelligence Legalism and the NSA’s Civil Liberties Gaps 113 Abstract Since June 2013, we have seen unprecedented security breaches and disclosures relating to American electronic surveillance. The nearly daily drip, and occasional gush, of once-secret policy and operational information makes it possible to analyze and understand National Security Agency activities, including the organizations and processes inside and outside the NSA that are supposed to safeguard American’s civil liberties as the agency goes about its intelligence gathering business.
    [Show full text]
  • IN the UNITED STATES COURT of APPEALS for the DISTRICT of COLUMBIA CIRCUIT Larry Klayman, Et. Al. Appellees-Cross-Appellants, V
    USCA Case #14-5004 Document #1521426 Filed: 11/07/2014 Page 1 of 3 IN THE UNITED STATES COURT OF APPEALS FOR THE DISTRICT OF COLUMBIA CIRCUIT Larry Klayman, et. al. Appellees-Cross-Appellants, v. Barack Hussein Obama, et al., Appellants-Cross-Appellees. Nos. 14-5004, 14-5016 14-5005, 14-5017 MOTION FOR LEAVE TO FILE SUPPLEMENTAL BRIEF IN RESPONSE TO QUESTIONS ASKED AT ORAL ARGUMENT Appellees/Cross-Appellants Larry Klayman, Charles Strange, Mary Ann Strange, Matt Garrison, and Michael Ferrari hereby respectfully move this Court for leave to file a Supplemental Brief in response to the questions asked at the oral argument of November 4, 2014. On November 4, 2014 oral argument was held with regard to the above captioned appeal involving the government’s illegal surveillance of Appellees/Cross-Appellants and millions of other similarly situated Americans. During this oral argument, this Court asked Appellees/Cross-Appellants’ counsel questions during oral argument which, due to the limited amount of allotted time, did not allow for a full response. USCA Case #14-5004 Document #1521426 Filed: 11/07/2014 Page 2 of 3 For this reason, Appellees/Cross-Appellants seek to submit the concurrently filed Supplemental Brief which highlights portions of the record and case law which will be helpful to the Court in the determination of this appeal. Appellees/Cross-Appellants are refiling this supplemental brief as items were unintentionally excluded from the supplemental brief that were originally included in the initial appellate brief. Appellees/Cross-Appellants have sought consent for this motion from Appellants/Cross-Appellees.
    [Show full text]
  • Reining in Warrantless Wiretapping of Americans
    REPORT SURVEILLANCE & PRIVACY Reining In Warrantless Wiretapping of Americans MARCH 16, 2017 — JENNIFER GRANICK PAGE 1 The United States is collecting vast amounts of data about regular people around the world for foreign intelligence purposes. Government agency computers are vacuuming up sensitive, detailed, and intimate personal information, tracking web browsing,1 copying address books,2 and scanning emails of hundreds of millions of people.3 When done overseas, and conducted in the name of foreign intelligence gathering, the collection can be massive, opportunistic, and targeted without any factual basis. While international human rights law recognizes the political and privacy rights of all human beings, under U.S. law, foreigners in other countries do not enjoy free expression or privacy rights, so there are few rules and little oversight for how our government uses foreigners’ information. And while foreign governments are certainly legitimate targets for intelligence gathering, reported spying on international social welfare organizations like UNICEF and Doctors Without Borders raises the specter of political abuse without a clear, corresponding national security benefit.4 In my book, American Spies: Modern Surveillance, Why You Should Care, and What To Do About It,5 I explain the dangers that massive collection of information about Americans poses to our democracy. Soon, there will be an opportunity to rein in some of this surveillance. In December 2017, one of the laws enabling the National Security Agency (NSA) to warrantlessly wiretap Americans’ international communications and to gather foreigners’ private messages from top Internet companies will expire. The expiration forces Congress to decide whether to renew the law, reform it, or kill it.
    [Show full text]
  • Intelligence Legalism and the National Security Agency's Civil Liberties Gap." Harv
    University of Michigan Law School University of Michigan Law School Scholarship Repository Articles Faculty Scholarship 2015 Intelligence Legalism and the National Security Agency’s Civil Liberties Gap Margo Schlanger University of Michigan Law School, [email protected] Available at: https://repository.law.umich.edu/articles/1410 Follow this and additional works at: https://repository.law.umich.edu/articles Part of the Constitutional Law Commons, National Security Law Commons, President/ Executive Department Commons, and the Privacy Law Commons Recommended Citation Schlanger, Margo. "Intelligence Legalism and the National Security Agency's Civil Liberties Gap." Harv. Nat'l Sec. J. 6 (2015): 112-205. This Article is brought to you for free and open access by the Faculty Scholarship at University of Michigan Law School Scholarship Repository. It has been accepted for inclusion in Articles by an authorized administrator of University of Michigan Law School Scholarship Repository. For more information, please contact [email protected]. 112 Harvard National Security Journal / Vol. 6 ARTICLE Intelligence Legalism and the National Security Agency’s Civil Liberties Gap __________________________ Margo Schlanger* * Henry M. Butzel Professor of Law, University of Michigan. I have greatly benefited from conversations with John DeLong, Mort Halperin, Alex Joel, David Kris, Marty Lederman, Nancy Libin, Rick Perlstein, Becky Richards, and several officials who prefer not to be named, all of whom generously spent time with me, discussing the issues in this article, and many of whom also helped again after reading the piece in draft. I would also like to extend thanks to Sam Bagenstos, Rick Lempert, Daphna Renan, Alex Rossmiller, Adrian Vermeule, Steve Vladeck, Marcy Wheeler, Shirin Sinnar and other participants in the 7th Annual National Security Law Workshop, participants at the University of Iowa law faculty workshop, and my colleagues at the University of Michigan Legal Theory Workshop and governance group lunch, who offered me extremely helpful feedback.
    [Show full text]
  • Nsa Surveillance Since 9/11 and the Human Right to Privacy
    NSA SURVEILLANCE SINCE 9/11 AND THE HUMAN RIGHT TO PRIVACY G. Alex Sinha* ABSTRACT Since shortly after 9/11, if not earlier,the National Security Agency (NSA) has been collecting massive amounts of data about American citizens and permanent residents, ostensibly with the aim of preempting future terrorist attacks. While the NSA's program has invited substantial scholarly attention, specifically concerning its compliance with the United States Constitution and various domestic statutes, the academic debate about its merits entirely omits one crucial fact: the United States is also legally obliged to protect a human right to privacy, as codified in Article 17 of the International Covenant on Civil and Political Rights (ICCPR). This Article seeks to eliminate the blind spot caused by that omission, illustrating the relevance of human rights for assessing the legality and propriety of NSA surveillance. It argues that even under conservative assumptions about the scope of the NSA program and the coverage of the ICCPR, there is good reason to think that the program violates the covenant. At the very least, as this detailed case study of the NSA program demonstrates, more clarity from the Human Rights Committee on the right to privacy is essential in a world characterized by increasing government surveillance. Section I of this Article provides a brief history of domestic * Aryeh Neier Fellow, Human Rights Watch and the American Civil Liberties Union. The research for and writing of this Article took place prior to my affiliation with HRW or the ACLU, and the views expressed here do not necessarily reflect the positions of either organization.
    [Show full text]
  • Vigilancia-Permanente-Edward-Snowden.Pdf
    ÍNDICE Portada Gracias Portadilla Dedicatoria PREFACIO PRIMERA PARTE 1. Mirar por la ventana 2. El muro invisible 3. Un chaval de la Beltway 4. Yanqui online 5. Hackeo 6. No completado 7. 11-S 8. 12-S 9. Rayos X 10. Habilitado y enamorado SEGUNDA PARTE 11. El sistema 12. Homo contractus 13. Adoc 14. El Conde del Monte 15. Ginebra 16. Tokio 17. Un Hogar en la nube 18. En el sofá TERCERA PARTE 19. El Túnel 20. Latido 21. Soplos 22. El cuarto PODER 23. Leer, escribir, ejecutar 24. Encriptado 25. El niño 26. Hong Kong 27. Moscú 28. De los diarios de Lindsay Mills 29. Amor y exilio Agradecimientos CREDITOS Notas Gracias por adquirir este eBook Visita Planetadelibros.com y descubre una nueva forma de disfrutar de la lectura ¡Regístrate y accede a contenidos exclusivos! Primeros capítulos Fragmentos de próximas publicaciones Clubs de lectura con los autores Concursos, sorteos y promociones Participa en presentaciones de libros Comparte tu opinión en la ficha del libro y en nuestras redes sociales: Explora Descubre Comparte Edward Snowden Vigilancia permanente Traducción de Esther Cruz Santaella Para L PREFACIO Me llamo Edward Joseph Snowden. Antes trabajaba para el Gobierno, pero ahora trabajo para el pueblo. Tardé casi treinta años en reconocer que había una diferencia, y cuando lo hice, me metí en algún que otro problemilla en la oficina. Como resultado, ahora dedico mi tiempo a intentar proteger a la ciudadanía de la persona que yo era antes: un espía de la CIA (Central Intelligence Agency o Agencia Central de Inteligencia) y la NSA (National Security Agency o Agencia de Seguridad Nacional) de Estados Unidos, otro joven tecnólogo más dedicado a construir lo que estaba seguro de que sería un mundo mejor.
    [Show full text]
  • Edward Snowden - Wikipedia, the Free Encyclopedia
    Edward Snowden - Wikipedia, the free encyclopedia http://en.wikipedia.org/wiki/Edward_Snowden Edward Snowden From Wikipedia, the free encyclopedia Further information: Global surveillance disclosures (2013–present) Edward Snowden Edward Joseph Snowden (born June 21, 1983) is an American computer specialist, a former Central Intelligence Agency (CIA) employee, and former National Security Agency (NSA) contractor who disclosed top secret NSA documents to several media outlets, initiating the NSA leaks, which reveal operational details of a global surveillance apparatus run by the NSA and other members of the Five Eyes alliance, along with numerous commercial and international partners.[3] The release of classified material was called the most significant leak in US history by Pentagon Papers leaker Daniel Ellsberg. A series of exposés beginning Screen capture from the interview with Glenn June 5, 2013 revealed Internet surveillance programs Greenwald and Laura Poitras on June 6, 2013 such as PRISM, XKeyscore and Tempora, as well as the interception of US and European telephone Born Edward Joseph Snowden metadata. The reports were based on documents June 21, 1983 Snowden leaked to The Guardian and The Elizabeth City, North Carolina, Washington Post while employed by NSA contractor United States Booz Allen Hamilton. By November 2013, The Residence Russia (temporary asylum) Guardian had published one percent of the documents, with "the worst yet to come". Nationality American Occupation System administrator Snowden flew to Hong Kong from his home in Employer Booz Allen Hamilton[1] Hawaii on May 20, 2013, where he later met with journalists Glenn Greenwald and Laura Poitras and Kunia, Hawaii, US (until June 10, 2013) released his copies of the NSA documents.[4][5] After disclosing his identity, he fled Hong Kong and landed Known for Revealing details of classified United at Moscow's Sheremetyevo International Airport on States government surveillance June 23, reportedly for a one-night layover en route to programs Ecuador.
    [Show full text]
  • Mass Surveillance
    Provisional version Committee on Legal Affairs and Human Rights Mass surveillance ∗ Report Rapporteur: Mr Pieter Omtzigt, Netherlands, Group of the European People's Party “Our freedom is built on what others do not know of our existences” Alexandr Solzhenitsyn A. Draft resolution 1. The Parliamentary Assembly is deeply concerned about mass surveillance practices disclosed since June 2013 by journalists to whom a former US national security insider, Mr. Edward Snowden, had entrusted a large amount of top secret data establishing the existence of mass surveillance and large-scale intrusion practices hitherto unknown to the general public and even to most political decision-makers. 2. The information disclosed so far in the Snowden files has triggered a massive, world-wide debate about mass surveillance by the US and other countries’ intelligence services and the lack of adequate legal regulation and technical protection at the national and international level, and/or its effective enforcement. 3. The disclosures have provided compelling evidence of the existence of far-reaching, technologically advanced systems put in place by US intelligence services and their partners in certain Council of Europe member states to collect, store and analyse communication data, including content, location and other metadata, on a massive scale, as well as targeted surveillance measures encompassing numerous persons against whom there is no ground for suspicion of any wrongdoing. 4. The surveillance practices disclosed so far endanger fundamental human rights, including the rights to privacy (Article 8 European Convention on Human Rights (ECHR)), freedom of information and expression (Article 10, ECHR), and the rights to a fair trial (Article 6, ECHR) and freedom of religion (Article 9) - especially when privileged communications of lawyers and religious ministers are intercepted and when digital evidence is manipulated).
    [Show full text]
  • 2013 Mass Surveillance Disclosures - Wikipedia, the Fr
    2013 mass surveillance disclosures - Wikipedia, the fr... http://en.wikipedia.org/wiki/2013_mass_surveillan... 2013 mass surveillance disclosures From Wikipedia, the free encyclopedia Further information: Edward Snowden The 2013 mass surveillance disclosures refer to numerous media reports beginning in June 2013 which revealed operational details of the US National Security Agency (NSA) and its international partners' mass surveillance of foreign nationals as well as US citizens. The series of reports emanated from a cache of top secret documents leaked by ex-NSA contractor Edward Snowden. On 6 June 2013, the first set of documents were published simultaneously by The Washington Post and The Guardian, attracting considerable public attention. [1] The practice of mass surveillance in the United States took off during the 1940s and was greatly expanded in the 1970s. It soon grew into a global surveillance program code-named "ECHELON",[2] but did not attract much public attention until other global surveillance programs such as PRISM, XKeyscore, and Tempora were exposed in the 2013 release of thousands of documents.[3] Many countries around the world, including Western Allies and member states of NATO, have been targeted by the "Five Eyes" strategic alliance of Australia, Canada, New Zealand, the UK and the USA—five English-speaking Western democracies aiming to achieve Total Information Awareness by mastering the Internet with analytical tools such as the Boundless Informant.[4] As confirmed by the NSA's director Keith B. Alexander on 26 September 2013, the NSA collects and stores all phone records of all American citizens.[5] Much of the data is kept in large storage facilities such as the Utah Data Center, a US$1.5 billion megaproject referred to by The Wall Street Journal as a "symbol of the spy agency's surveillance prowess."[6] As a result of the disclosures, social movements such as Restore the Fourth have sprung up to protest against mass surveillance.
    [Show full text]
  • Foreign Surveillance Under the NSA and the GCHQ and Its Compatibility with Art
    UTRECHT JOURNAL OF Ilina Georgieva, ‘The Right to Privacy under Fire – Foreign Surveillance INTERNATIONAL AND EUROPEAN LAW under the NSA and the GCHQ and Its Compatibility with Art. 17 ICCPR and Art. 8 ECHR’ (2015) 31(80) Utrecht Journal of International and European Law 104, DOI: http://dx.doi.org/10.5334/ujiel.cr RESEARCH ARTICLE The Right to Privacy under Fire – Foreign Surveillance under the NSA and the GCHQ and Its Compatibility with Art. 17 ICCPR and Art. 8 ECHR Ilina Georgieva1 1 Senior Research Associate at the Public International Law & Policy Group (PILPG), the Netherlands [email protected] The recent exposure of the NSA documents has raised a great deal of concerns with regards to the effective control of companies that cooperate with intelligence agencies. It also exposed a network of secret government spying partnerships used to go around existing domestic guarantees and to spy on one’s own citizens through the back door. The dread that both legal and technological means designed with legitimate purposes such as counter-terrorism and crime prevention are also employed for total social control is now out there. In many aspects it looks like we are experiencing the end of privacy and opting for a ‘surveillance society’ instead. In the clutter of pressing issues, most of the recent scholarly attention has focused on the assessment and reform proposals of the existing, but as it turns out inadequate with respect to actual rights protection, domestic legal frameworks. This has left the obligations of the intruders under international human rights law unconsidered. Therefore, the present paper aims at evalu- ating the legality of such surveillance programs under the International Covenant on Civil and Political Rights and the European Convention on Human Rights.
    [Show full text]
  • Exposed: Desire and Disobedience in the Digital
    Free ebooks ==> www.Ebook777.com www.Ebook777.com Free ebooks ==> www.Ebook777.com EXPOSED www.Ebook777.com EXPOSED desire and disobedience in the digital age Bernard E. Harcourt harvard university press cambridge, massachusetts london, en gland 2015 Free ebooks ==> www.Ebook777.com Copyright © 2015 by the President and Fellows of Harvard College All rights reserved Printed in the United States of America First printing Library of Congress Cataloging- in- Publication Data Harcourt, Bernard E., 1963– Exposed : desire and disobedience in the digital age / Bernard E. Harcourt. pages cm ISBN 978-0-674-50457-8 (cloth) 1. Information technology? Social aspects. 2. Privacy, right of. I. Title. HM851.H3664 2015 303.48'33? d c 23 2015012788 www.Ebook777.com To Isadora To Léonard To Mia contents T e Expository Society 1 part one Clearing the Ground 29 1. George Orwell’s Big Brother 31 2. T e Surveillance State 54 3. Jeremy Bentham’s Panopticon 80 part two T e Birth of the Expository Society 105 4. Our Mirrored Glass Pavilion 107 5. A Genealogy of the New Doppelgänger Logic 141 6. T e Eclipse of Humanism 166 part three T e Perils of Digital Exposure 185 7. T e Collapse of State, Economy, and Society 187 8. T e Mortif cation of the Self 217 9. T e Steel Mesh 234 viii Contents part four Digital Disobedience 251 10. Virtual Democracy 253 11. Digital Re sis tance 262 12. Po liti cal Disobedience 280 notes 285 acknow ledg ments 347 index 349 Free ebooks ==> www.Ebook777.com EXPOSED www.Ebook777.com the expository society Every keystroke, each mouse click, every touch of the screen, card swipe, Google search, Amazon purchase, Instagram, “like,” tweet, scan?in short, everything we do in our new digital age can be recorded, stored, and monitored.
    [Show full text]
  • Les Opérations Massives De Surveillance
    Version provisoire Commission des questions juridiques et des droits de l’homme Les opérations massives de surveillance ∗ Rapport Rapporteur : M. Pieter Omtzigt, Pays-Bas, Groupe du Parti populaire européen « Notre liberté repose sur ce que les autres ignorent de notre existence » Alexandre Soljenitsyne A. Projet de résolution 1. L’Assemblée parlementaire est profondément préoccupée par les pratiques massives de surveillance révélées depuis juin 2013 par les journalistes auxquels un ancien membre de la sécurité nationale des États-Unis, M. Edward Snowden, avait confié une grande quantité de données hautement secrètes, qui démontrent l’existence de pratiques de surveillance massive et d’intrusions à large échelle jusqu’ici inconnues du grand public et même de la plupart des décideurs politiques. 2. Les informations divulguées à ce jour dans les fichiers Snowden ont déclenché un gigantesque débat planétaire sur les opérations massives de surveillance menées par les États-Unis et les services de renseignement d’autres pays et sur l’absence de dispositions légales et de protections techniques adéquates à l’échelon national et international et/ou de leur application effective. 3. Ces révélations ont fourni la preuve manifeste de l’existence de systèmes de grande envergure à la pointe des progrès technologiques, mis en place par les services de renseignement américains et leurs partenaires dans certains États membres du Conseil de l’Europe, en vue de collecter, de conserver et d’analyser à une gigantesque échelle les données des communications, y compris leur contenu, les données de géolocalisation et les autres métadonnées ainsi que des mesures de surveillance ciblées, qui englobent de nombreuses personnes que rien ne justifie de soupçonner d’avoir commis un acte répréhensible.
    [Show full text]