11. See September 11, 2001 Attacks 9
Total Page:16
File Type:pdf, Size:1020Kb
Cambridge University Press 978-1-107-10323-8 — American Spies Jennifer Stisa Granick Index More Information I N D E X 9/ 11. See September 11, 2001 attacks foreign surveillance of, 149 – 50 9/ 11 Commission. See National US foreign surveillance including, 3 , Commission on Terrorist Attacks 106 – 15 Upon the United States (9/ 11 American Civil Liberties Union Commission) (ACLU), 13 , 91 – 92 , 145 , 148 , 222 , 1971 (documentary), 45 229 amicus curiae , judicial oversight of Abdulmutallab, Umar Farouk, 80 surveillance and, 160 , 298 “about collection” phenomenon, Amnesty International, 110 , 135 , 222 121 – 23 , 305 anarchists, federal surveillance Abrahmson, Larry, 61 of, 178 ACLU (American Civil Liberties Android devices, global data collection Union). See American Civil from, 21 – 22 Liberties Union (ACLU) Apple, 234n. 19 ACLU v. Clapper, 959 F.Supp.2d 724 appliances, data generation by, 56 – 57 (SDNY 2013) , ix apps data, 56 Adams, John, 218 Army surveillance programs, abuses Addington, David, 194 – 96 , 201 , 207 in, 132 – 33 advertising, targeted data collection for, Ashcrot , John, 153 – 54 , 194 – 96 , 57 – 60 , 90 199 – 203 a t er- the- fact justii cations, 192 Assange, Julian, 43 , 51 a t er- the- fact rules, 3 , 152 , 211 , 243 Associated Press, surveillance of agent of a foreign power test, FISA journalists from, 147 provisions, 184 – 86 , 210 asymmetrical warfare, as justii cation agent of a foreign power test, in FISA for surveillance, 24 – 26 provisions, 213 , 249 , 304 AT&T, 45 airport security, 93 STELLARWIND controversy and, Albertson, William, 135 – 36 65 , 200 , 208 Alert List, structure of, 14 surrender of call data by, 10 , 269 Alexander, Keith, 34 – 36 , 82 , 247 warrantless wiretapping and, 205 Alexander, Michelle, 130 “Athens Af air” wiretapping scandal Ali, Muhammad, 132 (Greece), 283 American citizens Australian Signals Directorate (ASD), 165 “about collection” phenomenon authoritarian regimes, 168 – 70 in foreign surveillance Authorization for the Use of Military and, 121 – 23 Force (AUMF), 207 domestic surveillance of, 100 – 06 automatic license plate readers, 55 318 © in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-1-107-10323-8 — American Spies Jennifer Stisa Granick Index More Information Index 319 Awlaki, Anwar al- , 80 STELLARWIND abuses and, 200 – 01 Buchwald, Art, 132 back door searches bulk collection minimization procedures USA PATRIOT Act authorization, 204 and, 158 – 61 bulk data collection. See also m a s s reform of, 307 – 09 surveillance back doors, encryption Congressional limits imposed as security threat, 263 on, 103 – 04 economic impact of, 278 dei nitions of, 30 security risk of, 276 – 87 PPD- 28 restrictions on, 113 – 14 technology and, 265 regulation of, 31 – 32 Baez, Joan, 132 BULLRUN, 274 Baker, Howard, 132 Bush Administration Baker, Stewart, 65 , 85 – 90 9/ 11 Commission investigation Baltimore Sun, h e , 49 of, 70 – 74 Bamford, James, 72 domestic intelligence collection by, bank records, privacy protection for, xii 11 – 13 , 15 – 17 , 117 base rate fallacy, terrorism intelligence illegal surveillance by, 192 – 96 a n d , 9 5 – 9 7 legal immunity for espionage Bates, John, 126 , 253 , 258 , 299 activities during, 213 – 16 B a y e s ’ h eorem, terrorism analysis post– September 11 intelligence a n d , 9 5 – 9 7 policies of, 69 – 70 Bedoya, Alvaro, 151 STELLARWIND program and, Belgacom, 270 70 – 74 , 244 hacking of, 276 surveillance of journalists by, 148 B e l l s o u t h Terrorist Surveillance Program STELLARWIND controversy and, 200 a n d , 1 7 Bergen, Peter, 80 USA PATRIOT Act passage Berger v. New York , 388 U.S. 41 (1967) , and, 196 – 99 ix , 180 – 81 warrantless wiretapping by, 205 – 13 Big Data, 60 – 62 , 90 , 95 – 97 , 151 , 229 , 302 , See also metadata camera surveillance, 55 bin Laden, Osama, 71 CAPTIVATEDAUDIENCE, 267 Binney, William, 46 – 49 , 46n. 5 , 268 , Card, Andrew H., 200 – 01 293 , 294 censorship, 140 , 168 – 70 , 285 black bag surveillance (FBI), 178 Census Bureau (US), data collection Black Lives Matter, 135 , 140 , 146 by, 136 Blaze, Matt, 3 , 40 Central Intelligence Agency (CIA) BND (German spy agency), 169 – 70 9/ 11 Commission investigation Bork, Robert, 203 of, 70 – 74 Boston Marathon bombing, 77 – 79 , 91 Boston Marathon bombing botnets, 272 a n d , 7 7 – 7 9 bounded rationality, risk assessment minimization procedures, 37 – 38 and, 284 national foreign intelligence from, 6 Boundless Informant tool (NSA), 20 surveillance abuses by, 133 Brandeis, Louis, 179 Chambliss, Saxby, 39 , 61 bright line rules Senate investigation into call data phone call data collection and, 225 collection and, 10 – 17 © in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-1-107-10323-8 — American Spies Jennifer Stisa Granick Index More Information 320 Index Chaos surveillance operation, 133 NSA surveillance of, 110 – 11 charitable call data, private information overseas telecommunications from, 60 – 62 industries and, 166 Charlie Hebdo magazine, terrorist communication, intelligence dei nition attacks on, 79 , 168 – 70 of, 156 – 58 Cheney, Richard, 194 – 96 Communications Act of 1934, 176 – 78 , China, hacking of U.S. data by, 149 , 199 287 Communications Assistance to Church, Frank, 182 Law Enforcement Act CIA (Central Intelligence Agency). See (CALEA), 283 Central Intelligence Agency (CIA) communications security, 288 Cisco Systems Communications Security NSA hacking of, 271 Establishment Canada CitizenFour (documentary), 19 (CSEC), 163 – 65 City University of New York (CUNY) Communist Party in US, School of Law, 144 FBI surveillance of, civil liberties 135 – 36 , 178 domestic surveillance as threat C o n g r e s s to, 103 – 04 call data collection and role phone call data collection and, 13 – 14 of, 10 – 17 Section 215 violations of, 203 – 05 Executive Branch expansion of surveillance policies and, 5 , 74 – 76 surveillance and, 176 – 78 civil rights movement, FBI surveillance Fourth Amendment protections of, 133 – 35 and, 172 – 75 Clapper v. Amnesty Int’l USA, 133 S.Ct. future oversight of surveillance 1138 (2013) , ix , 222 , 239 by, 296 Clapper, James, 33 – 36 , 247 legal immunity for spying Clarke, Richard, 230 from, 213 – 16 Cleaver, Eldridge, 132 metadata legislation and, 302 Clinton, Hillary, 42 oversight of surveillance by, 244 , 246 , Clinton, William, 142 296 “Clipper Chip” technology, 264 privacy protections and, 172 cloud backup data, surveillance of, 108 STELLARWIND controversy and, COINTELPRO domestic spy program, 192 – 96 , 199 – 203 45 , 183 contact chaining technique, phone call Cole, David, 24 data collection and, 14 – 15 , 47 , Coll, Steve, 148 101 – 02 , 254 collection, NSA dei nition of, 33 – 36 content/ non content distinction Collection, Processing and Fourth Amendment protections Dissemination of Allied and, 226 Communications (NSA) , 163 – 65 NSA misrepresentation of, 256 Comey, James B., 130 , 153 – 54 , 199 – 203 , Cook, Tim, 280 225 , 246 , 250 Coolidge, Calvin, 175 commercial data “corporate store” database, back doors as threat to, 278 establishment of, 103 – 04 business records order, 203 – 05 CO- TRAVELER data collection foreign regulations program, 22 – 23 , 38 concerning, 168 – 70 legal issues with, 29 – 30 © in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-1-107-10323-8 — American Spies Jennifer Stisa Granick Index More Information Index 321 Council on American- Islamic Relations NSA dei nition of, 34 – 36 (CAIR), targeted surveillance public- private partnerships for, of, 143 5 7– 6 0 “Countering Violent Extremism: data storage A Guide for Practitioners and absence of privacy and, 219 – 21 Analysts”, 150 local data storage regulations, counterterrorism 168 – 70 fusion center information sharing overseas email data storage, 108 – 09 and, 140 – 42 third party data collection guilt vs. innocence in analysis and, 189 – 91 by, 150 – 51 data surveillance limits of surveillance data for, 80 – 85 o l ine, 55 , 56 – 57 mass surveillance and, 78 – 79 De, Rajesh, 35 torture and kidnapping decryption systems, 274 justii ed as, 92 Defense Intelligence Agency, Court of Justice of the European Union “intelligence law handbook”, 27 (CJEU), 167 , 305 DeLoach, Cartha, 132 credit card data, surveillance using, 56 democracy Credit Suisse First Boston (CSFB) foreign surveillance as threat bank, 130 to, 169 – 70 Crime Control and Safe Streets Act political surveillance as threat (1968) (Wiretap Act), 205 to, 145 – 47 criminal investigations surveillance abuses and, 5 , 7 – 8 , intelligence investigations vs. , 24 – 26 , 131 – 33 , 138 – 40 73 – 74 , 103 – 04 , 150 – 51 , 184 – 86 , Department of Commerce (DOC), 196 – 99 jurisdiction over communications privacy issues and, 128 – 31 , 223 by, 264 terrorism vs. , 90 – 98 Department of Defense (DOD) wiretapping in, 180 – 81 , 233 data collection guidelines, 33 – 36 criminal mass surveillance Directive 5240.1- R, 112 targeted data collection vs. , 90 – 98 fusion centers and, 140 – 42 CSEC (Communications Security national and military intelligence, 6 Establishment Canada), 163 – 65 Department of Homeland Security CUNY (City University of New (DHS), 98 , 140 – 42 York), 144 Department of Justice (DOJ) customer proprietary network domestic intelligence collection information (CPNI), 199 a n d , 1 5 – 1 7 cyber sovereignty movement, 168 – 70 O i ce of Intelligence Policy and c y b e r s e c u r i t y . See also digital Review, 49 surveillance , See also Internet , O i ce