Cambridge University Press 978-1-107-10323-8 — American Spies Jennifer Stisa Granick Index More Information

I N D E X

9/ 11. See September 11, 2001 attacks foreign surveillance of, 149 – 50 9/ 11 Commission. See National US foreign surveillance including, 3 , Commission on Terrorist Attacks 106 – 15 Upon the United States (9/ 11 American Civil Liberties Union Commission) (ACLU), 13 , 91 – 92 , 145 , 148 , 222 , 1971 (documentary), 45 229 amicus curiae , judicial oversight of Abdulmutallab, Umar Farouk, 80 surveillance and, 160 , 298 “about collection” phenomenon, Amnesty International, 110 , 135 , 222 121 – 23 , 305 anarchists, federal surveillance Abrahmson, Larry, 61 of, 178 ACLU (American Civil Liberties Android devices, global data collection Union). See American Civil from, 21 – 22 Liberties Union (ACLU) Apple, 234n. 19 ACLU v. Clapper, 959 F.Supp.2d 724 appliances, data generation by, 56 – 57 (SDNY 2013), ix apps data, 56 Adams, John, 218 Army surveillance programs, abuses Addington, David, 194 – 96 , 201 , 207 in, 132 – 33 advertising, targeted data collection for, Ashcrot , John, 153 – 54 , 194 – 96 , 57 – 60 , 90 199 – 203 a t er-the- fact justii cations, 192 Assange, Julian, 43 , 51 a t er-the- fact rules, 3 , 152 , 211 , 243 Associated Press, surveillance of agent of a foreign power test, FISA journalists from, 147 provisions, 184 – 86 , 210 asymmetrical warfare, as justii cation agent of a foreign power test, in FISA for surveillance, 24 – 26 provisions, 213 , 249 , 304 AT&T, 45 airport security, 93 STELLARWIND controversy and, Albertson, William, 135 – 36 65 , 200 , 208 Alert List, structure of, 14 surrender of call data by, 10 , 269 Alexander, Keith, 34 – 36 , 82 , 247 warrantless wiretapping and, 205 Alexander, Michelle, 130 “Athens Af air” wiretapping scandal Ali, Muhammad, 132 (Greece), 283 American citizens Australian Signals Directorate (ASD), 165 “about collection” phenomenon authoritarian regimes, 168 – 70 in foreign surveillance Authorization for the Use of Military and, 121 – 23 Force (AUMF), 207 domestic surveillance of, 100 – 06 automatic license plate readers, 55

318

© in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-1-107-10323-8 — American Spies Jennifer Stisa Granick Index More Information

Index 319

Awlaki, Anwar al-, 80 STELLARWIND abuses and, 200 – 01 Buchwald, Art, 132 back door searches bulk collection minimization procedures USA PATRIOT Act authorization, 204 and, 158 – 61 bulk data collection. See also m a s s reform of, 307 – 09 surveillance back doors, encryption Congressional limits imposed as security threat, 263 on, 103 – 04 economic impact of, 278 dei nitions of, 30 security risk of, 276 – 87 PPD- 28 restrictions on, 113 – 14 technology and, 265 regulation of, 31 – 32 Baez, Joan, 132 BULLRUN, 274 Baker, Howard, 132 Bush Administration Baker, Stewart, 65 , 85 – 90 9/ 11 Commission investigation Baltimore Sun, h e, 49 of, 70 – 74 Bamford, James, 72 domestic intelligence collection by, bank records, privacy protection for, xii 11 – 13 , 15 – 17 , 117 base rate fallacy, terrorism intelligence illegal surveillance by, 192 – 96 a n d , 9 5– 9 7 legal immunity for espionage Bates, John, 126 , 253 , 258 , 299 activities during, 213 – 16 B a y e s ’ h eorem, terrorism analysis post– September 11 intelligence a n d , 9 5– 9 7 policies of, 69 – 70 Bedoya, Alvaro, 151 STELLARWIND program and, Belgacom, 270 70 – 74 , 244 hacking of, 276 surveillance of journalists by, 148 B e l l s o u t h Terrorist Surveillance Program STELLARWIND controversy and, 200 a n d , 1 7 Bergen, Peter, 80 USA PATRIOT Act passage Berger v. New York, 388 U.S. 41 (1967), and, 196 – 99 ix , 180 – 81 warrantless wiretapping by, 205 – 13 Big Data, 60 – 62 , 90 , 95 – 97 , 151 , 229 , 302 , See also metadata camera surveillance, 55 bin Laden, Osama, 71 CAPTIVATEDAUDIENCE, 267 Binney, William, 46 – 49 , 46n. 5 , 268 , Card, Andrew H., 200 – 01 293 , 294 censorship, 140 , 168 – 70 , 285 black bag surveillance (FBI), 178 Census Bureau (US), data collection Black Lives Matter, 135 , 140 , 146 by, 136 Blaze, Matt, 3 , 40 Central Intelligence Agency (CIA) BND (German spy agency), 169 – 70 9/ 11 Commission investigation Bork, Robert, 203 of, 70 – 74 Boston Marathon bombing, 77 – 79 , 91 Boston Marathon bombing botnets, 272 a n d , 7 7– 7 9 bounded rationality, risk assessment minimization procedures, 37 – 38 and, 284 national foreign intelligence from, 6 tool (NSA), 20 surveillance abuses by, 133 Brandeis, Louis, 179 Chambliss, Saxby, 39 , 61 bright line rules Senate investigation into call data phone call data collection and, 225 collection and, 10 – 17

© in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-1-107-10323-8 — American Spies Jennifer Stisa Granick Index More Information

320 Index

Chaos surveillance operation, 133 NSA surveillance of, 110 – 11 charitable call data, private information overseas telecommunications from, 60 – 62 industries and, 166 Charlie Hebdo magazine, terrorist communication, intelligence dei nition attacks on, 79 , 168 – 70 of, 156 – 58 Cheney, Richard, 194 – 96 Communications Act of 1934, 176 – 78 , China, hacking of U.S. data by, 149 , 199 287 Communications Assistance to Church, Frank, 182 Law Enforcement Act CIA (Central Intelligence Agency). See (CALEA), 283 Central Intelligence Agency (CIA) communications security, 288 Cisco Systems Communications Security NSA hacking of, 271 Establishment Canada CitizenFour (documentary), 19 (CSEC), 163 – 65 City University of New York (CUNY) Communist Party in US, School of Law, 144 FBI surveillance of, civil liberties 135 – 36 , 178 domestic surveillance as threat C o n g r e s s to, 103 – 04 call data collection and role phone call data collection and, 13 – 14 of, 10 – 17 Section 215 violations of, 203 – 05 Executive Branch expansion of surveillance policies and, 5 , 74 – 76 surveillance and, 176 – 78 civil rights movement, FBI surveillance Fourth Amendment protections of, 133 – 35 and, 172 – 75 Clapper v. Amnesty Int’l USA, 133 S.Ct. future oversight of surveillance 1138 (2013), ix , 222 , 239 by, 296 Clapper, James, 33 – 36 , 247 legal immunity for spying Clarke, Richard, 230 from, 213 – 16 Cleaver, Eldridge, 132 metadata legislation and, 302 Clinton, Hillary, 42 oversight of surveillance by, 244 , 246 , Clinton, William, 142 296 “Clipper Chip” technology, 264 privacy protections and, 172 cloud backup data, surveillance of, 108 STELLARWIND controversy and, COINTELPRO domestic spy program, 192 – 96 , 199 – 203 45 , 183 contact chaining technique, phone call Cole, David, 24 data collection and, 14 – 15 , 47 , Coll, Steve, 148 101 – 02 , 254 collection, NSA dei nition of, 33 – 36 content/ non content distinction Collection, Processing and Fourth Amendment protections Dissemination of Allied and, 226 Communications (NSA), 163 – 65 NSA misrepresentation of, 256 Comey, James B., 130 , 153 – 54 , 199 – 203 , Cook, Tim, 280 225 , 246 , 250 Coolidge, Calvin, 175 commercial data “corporate store” database, back doors as threat to, 278 establishment of, 103 – 04 business records order, 203 – 05 CO- TRAVELER data collection foreign regulations program, 22 – 23 , 38 concerning, 168 – 70 legal issues with, 29 – 30

© in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-1-107-10323-8 — American Spies Jennifer Stisa Granick Index More Information

Index 321

Council on American-Islamic Relations NSA dei nition of, 34 – 36 (CAIR), targeted surveillance public- private partnerships for, of, 143 5 7– 6 0 “Countering Violent Extremism: data storage A Guide for Practitioners and absence of privacy and, 219 – 21 Analysts”, 150 local data storage regulations, counterterrorism 168 – 70 fusion center information sharing overseas email data storage, 108 – 09 and, 140 – 42 third party data collection guilt vs. innocence in analysis and, 189 – 91 by, 150 – 51 data surveillance limits of surveillance data for, 80 – 85 o l ine, 55 , 56 – 57 mass surveillance and, 78 – 79 De, Rajesh, 35 torture and kidnapping decryption systems, 274 justii ed as, 92 Defense Intelligence Agency, Court of Justice of the European Union “intelligence law handbook”, 27 (CJEU), 167 , 305 DeLoach, Cartha, 132 credit card data, surveillance using, 56 democracy Credit Suisse First Boston (CSFB) foreign surveillance as threat bank, 130 to, 169 – 70 Crime Control and Safe Streets Act political surveillance as threat (1968) (Wiretap Act), 205 to, 145 – 47 criminal investigations surveillance abuses and, 5 , 7 – 8 , intelligence investigations vs. , 24 – 26 , 131 – 33 , 138 – 40 73 – 74 , 103 – 04 , 150 – 51 , 184 – 86 , Department of Commerce (DOC), 196 – 99 jurisdiction over communications privacy issues and, 128 – 31 , 223 by, 264 terrorism vs. , 90 – 98 Department of Defense (DOD) wiretapping in, 180 – 81 , 233 data collection guidelines, 33 – 36 criminal mass surveillance Directive 5240.1- R, 112 targeted data collection vs., 90 – 98 fusion centers and, 140 – 42 CSEC (Communications Security national and military intelligence, 6 Establishment Canada), 163 – 65 Department of Homeland Security CUNY (City University of New (DHS), 98 , 140 – 42 York), 144 Department of Justice (DOJ) customer proprietary network domestic intelligence collection information (CPNI), 199 a n d , 1 5– 1 7 cyber sovereignty movement, 168 – 70 O i ce of Intelligence Policy and c y b e r s e c u r i t y . See also digital Review, 49 surveillance , See also Internet , O i ce of Justice Programs, 140 – 42 See also encryption section 702 warrantless wiretapping section 702 policies and, 119 – 20 and, 232 – 40 third party doctrine and policies data collection of, 219 – 21 Bayes’ theorem and, 95 – 97 whistleblower prosecutions foreign citizens’ data storage, 168 – 70 a n d , 4 4– 4 5 lack of information sharing Department of State (State a n d , 7 0– 7 4 Department), 265 , 285

© in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-1-107-10323-8 — American Spies Jennifer Stisa Granick Index More Information

322 Index

Department of the Interior, German STELLARWIND program surveillance of, 169 – 70 and, 192 – 96 deportation, surveillance and, 135 – 38 whistleblower revelations Devlin, Keith, 96 , 98 about, 46 – 50 DHS (Department of Homeland “Don’t Ask, Don’t Tell” policy, 142 Security), 98 , 140 – 42 “Don’t Be A Puppet” education tool, 94 DICE (DEA database), 104 – 06 Downey, Brandon, 64 digital records, privacy protection Drake, h omas, 47 – 50 , 293 f o r , x i drone surveillance, NSA data collection digital surveillance. See also with, 21 – 22 surveillance Dropbox, 165 , 168 – 70 Big Data tools and, 60 – 62 Drug Enforcement Agency (DEA), call Fourth Amendment protections and, data collection by, 54 , 104 – 06 174 , 219 – 21 , 242 Dual- EC- DRBG, 275 growth of, 53 – 57 Durbin, Richard J., 248 law and policy concerning, 1 political motivations for, 130 Eagan, Claire, 230 , 251 disadvantaged groups, surveillance economic impact of of, 142 – 45 surveillance, 167 – 68 DISHFIRE global data collection EFF (Electronic Frontier Foundation). system, 20 , 22 – 23 , 110 See Electronic Frontier DOC (Department of Commerce), Foundation (EFF) jurisdiction over communications Eichenwald, Kurt, 71 by, 264 electoral politics, oversight of DOD (Department of Defense). See surveillance and, 246 Department of Defense (DOD) Electronic Communications Privacy domestic surveillance Act of 1986 (ECPA), 189 – 91 , 220 , agent of a foreign power test and, 235 , 302 184 – 86 , 210 , 213 , 249 , 304 Electronic Frontier Foundation (EFF), Bush Administration expansion of, 7 , 45 , 60 , 125 , 206 11 – 13 , 199 – 203 Electronic Privacy Information c a l l d a t a c o l l e c t i o n a n d , 9 – 1 7, 8 5– 9 0 Center, 82 Congressional investigation electronic surveillance of, 10 – 17 AUMF and, 207 Congressional oversight of, 248 electronic surveillance (ELSUR), 5 FISA provisions on, 184n. 15 categories of, 28 – 30 foreigners’ privacy rights data collection techniques, 33 – 36 and, 162 – 71 ECPA provisions concerning, 189 – 91 Levi guidelines, 183 – 84 FISA provisions concerning, 184 – 86 limits of, 80 – 85 Ellsburg, Daniel, 44 – 45 political opposition to, 203 – 05 ELSUR (electronic surveillance). See political surveillance and, 51 – 52 , electronic surveillance (ELSUR) 131 – 33 , 142 – 47 email data post- September 11 focus on, 69 – 70 about collection phenomenon privacy violations and, 100 – 06 and, 121 – 23 regulation of, 31 – 32 encryption of, 62 – 65 section 702 (FISAAA) policies and, Fourth Amendment protections for, 106 – 15 , 116 , 119 – 20 , 213 – 16 219 – 21 , 225

© in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-1-107-10323-8 — American Spies Jennifer Stisa Granick Index More Information

Index 323

of journalists, surveillance of, 147 – 49 foreign surveillance and, 162 – 71 multi- communications minimization procedures transactions, 124 – 27 and, 156 – 58 overseas storage of, 108 – 09 oversight of surveillance by, 247 politically motivated investigation reform of, 309 of, 128 – 31 expectation of privacy, Fourth surveillance of, 18 – 19 , 22 – 23 , Amendment protection for, 190 106 – 15 external oversight of surveillance, third party collection of, 189 – 91 244 – 62 , 295 third party data collection and, 234n. 19 Facebook, 165 employee misconduct facial recognition technology, 55 , 129 minimization procedures facility, dei ned, 210 , 252 and, 153 – 54 false positives, in terrorism analysis, encryption 94 – 95 , 97 – 98 anti- encryption systems and, 274 FBI (Federal Bureau of Investigation). limits of, 62 – 65 See Federal Bureau of NSA abuse of, 266 Investigation (FBI) NSA vs. private sector use of, 264 fear, terrorism analysis and, 98 weakening of, 4 Federal Bureau of Investigation (FBI) EO 12333 (Executive Order 12333) back door searches and, 158 – 61 domestic intelligence collection black bag jobs by, 178 a n d . See Executive Order 12333 Boston Marathon bombing (EO 12333) a n d , 7 7– 7 9 Espionage Act (1917), 131 , 175 Charlie Hebdo magazine attacks Eurocopter, 170 a n d , 7 9 European Union (EU) COINTELPRO domestic spy cyber sovereignty movement program, 45 and, 168 – 70 COINTELPRO program and, 183 data protection laws of, 167 Congressional limits on powers hacking of institutions in, 271 of, 183 – 84 surveillance of companies and counterintelligence activities, 6 member states in, 169 – 70 domestic intelligence gathering Executive Branch by, 69 – 70 expansion of federal surveillance “Don’t Be A Puppet” education by, 183 – 84 t o o l o f , 9 4 expansion of federal surveillance encryption technology and, 265 power by, 176 – 78 , 183 – 84 , 194 – 96 FISC certii cation procedures oversight of surveillance by, 244 , and, 116 – 19 295 founding of, 178 public accountability for, 293 going dark campaign and, 277 USA PATRIOT Act expansion of history of surveillance abuses powers of, 196 – 99 , 201 – 02 by, 131 – 33 Executive Order 12333 (EO 12333), 25 ini ltration, internment, tax audits domestic intelligence collection and deportation tactics and, 136 and, 106 – 15 information sharing by, 83 – 85 foreign intelligence collection investigation of King under, 23 by, 133 – 35

© in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-1-107-10323-8 — American Spies Jennifer Stisa Granick Index More Information

324 Index

Federal Bureau of Investigation (FBI) Feinstein, Dianne, 39 , 61 , 81 , 247 (cont.) Senate investigation into call data investigations of whistleblowers collection and, 10 – 17 by, 46 – 50 surveillance of foreign law enforcement malware from, 277 countries, 169 – 70 minimization procedures, 37 – 38 Felten, Edward, 60 – 61 Moussaoui investigation and, 73 i ber optic technology secret dossiers of, 137 warrantless wiretapping and, 205 – 13 , Senate investigation into call data 256 collection by, 10 – 17 FireChat, 279 Verizon call data obtained by, 9 – 10 First Amendment Federal Communications Commission fusion center data collection (FCC), 165 and, 140 – 42 federal surveillance power. See also surveillance as violation of, 131 , USA PATRIOT Act, See also 138 – 40 Foreign Intelligence Surveillance FISA PR/TT program, 201 – 02 , 204 Act (FISA), See also Executive FISC (Foreign Intelligence Surveillance Order 12333 (EO 12333) Court). See Foreign Intelligence current abuses and, 138 – 40 Surveillance Court (FISC) debates concerning, 150 – 51 Five Eyes partnership, 118 domestic intelligence and, 103 – 04 FLAME sot ware, 273 Executive Branch expansion of, FOGGYBOTTOM, 267 176 – 78 , 183 – 84 FOIA (Freedom of Information Act). failure of external oversight See Freedom of Information over, 244 – 62 Act (FOIA) foreign surveillance and, 165 Fonda, Jane, 132 history of, 178 foreign governments lies and misrepresentations agent of a foreign power test and, concerning, 104 – 06 184 – 86 , 210 , 213 , 249 , 304 minimization procedures hacking by, 283 and, 156 – 58 Internet regulation by, 168 – 70 mission limits of agencies laws on foreign surveillance and, 112 – 15 of, 168 – 70 national security justii c a t i o n s f o r , 5 surveillance of Americans online data collection and, 57 by, 149 – 50 poor legal constraints on, 4 , 7 – 8 , Foreign Intelligence Surveillance Act 44 – 45 (FISA), 28 – 30 , 184n. 15 scope of, 9 – 10 , 24 – 26 9/ 11 Commission investigation of, 73 selectors system and, 32 – 33 authorization for surveillance of Senate investigation into, 10 – 17 Americans under, 106 – 15 Snowden’s revelations call data collection authorization concerning, 41 – 43 by, 85 – 90 support of FBI activities minimization procedures under, 156 and, 133 – 35 Patriot Act revisions to, 196 – 99 terrorism used as justii c a t i o n f o r , 9 2 pen register collection and, 83 , 103 USA PATRIOT Act expansion provisions of, 184 – 86 of, 192 – 99 STELLARWIND violations Federal Trade Commission, 265 , 285 of, 192 – 96

© in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-1-107-10323-8 — American Spies Jennifer Stisa Granick Index More Information

Index 325

warrantless wiretapping judicial oversight of, 248 – 55 under, 31 – 32 law enforcement interaction with, 73 Foreign Intelligence Surveillance minimization procedures and, Act Amendments Act of 2008 37 – 38 , 156 – 58 (FISAAA). See also Section 702 national foreign intelligence and, 5 (FISAAA) of online consumers, 165 domestic provisions, 185 – 86 politics of, 186 reform of, 304 – 13 privacy rights and, 3 section 702 of, 116 , 213 – 16 proximity of Americans to foreign upcoming expiration of, 291 targets and, 121 – 23 Foreign Intelligence Surveillance Court scope of US activity, 19 – 24 (FISC) section 702 (FISAAA) policies back door searches and, 158 – 61 and, 116 – 20 call data collection oversight warrantless wiretapping and, 236 , a n d , 1 0– 1 7 237 certii cation procedures and, 116 – 19 foreign telecommunications multi- communications companies, network security transactions, 124 – 27 agreements with, 165 oversight of surveillance by, 248 – 55 , Fourth Amendment 298 back door searches and, 158 public accountability for, 292 Congressional and court rulings rejection of expanded government and, 178 – 86 surveillance powers by, 196 – 99 criminal investigations and, 73 , special needs exception rulings, 235 180 – 81 warrantless wiretapping under, 237 dei nitions of surveillance and, 29 – 30 Yahoo! declassii cation challenge foreign surveillance exclusion a n d , 5 9 from, 185 – 86 Foreign Intelligence Surveillance Court of future of modern surveillance Review (FISC- R), 196 – 99 , 235 , 298 and, 240 – 43 foreign surveillance historical framework for, 172 – 75 “about collection” litigation involving, 1 phenomenon, 121 – 23 modern surveillance technology agent of a foreign power test and, and, 221 – 24 184 – 86 , 210 , 213 , 249 , 304 pen register (pen trap) collection American interests impacted by, 3 , protection, 187 – 91 106 – 15 , 303 phone call data collection and, Congressional oversight of, 247 13 – 14 , 187 – 91 , 200 – 01 , 224 – 32 contact chaining technique reasonable expectation of privacy and, 103 – 04 and, 178 – 86 DEA use of, 104 – 06 warrantless wiretapping protections Executive Order 12333 (EO 12333) and, 205 , 232 – 40 a n d , 2 3 Fox News, surveillance of journalists FISA provisions concerning, 184 – 86 from, 147 “foreignness” determination, 123 – 24 France, surveillance laws in, 168 – 70 Fourth Amendment protections Freedom of Information Act (FOIA), 2 and, 172 – 75 multi- communications transaction government policies based on, 9 data and, 124 – 27 information sharing and, 74 – 76 Freeh, Louis, 264

© in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-1-107-10323-8 — American Spies Jennifer Stisa Granick Index More Information

326 Index

fusion centers, 140 – 42 , 146 failure of external oversight over, 244 – 62 G+ social network, 64 foreign surveillance and, 165 gag orders, 311 Fourth Amendment GAO (Government Accountability protections, 172 – 75 Oi ce), 150 history of, 178 GCHQ (Global Communications lies and misrepresentations Headquarters). See G l o b a l concerning, 104 – 06 Communications Headquarters minimization procedures (GCHQ) (UK) and, 156 – 58 Gellman, Barton, 18 – 19 , 41 mission limits of agencies Gemalto company, 274 and, 112 – 15 George, Richard, 283 national security justii cations Gilmore, John, 7 f o r , 5 Glennon, Michael, 246 , 261 , 296 of authoritarian regimes, 168 – 70 global commerce, impact of foreign online data collection and, 57 – 60 surveillance on, 167 – 68 poor legal constraints on, 4 , 7 – 8 , Global Communications Headquarters 44 – 45 (GCHQ) (UK) scope of, 9 – 10 , 24 – 26 Belgacom hack, 270 selectors system and, 32 – 33 encryption of data and, 63 – 64 Senate investigation into, 10 – 17 Five Eyes partnership and, 163 – 65 Snowden’s revelations foreign surveillance by, 21 – 22 , 109 , concerning, 41 – 43 269 support of FBI activities and, 133 – 35 terrorism analysis and, 97 – 98 terrorism used as justii cation Global Crossing (Network Operations f o r , 9 2 Center), 165 Gowdy, Trey, 119 , 297 Gmail, 165 GPS data Going Dark campaign, 277 , 278 , 280 g l o b a l d a t a c o l l e c t i o n a n d , 2 1– 2 2 going dark strategy, 277 surveillance using, xii , 54 , 230 , 240 Goldsmith, Jack, 177 , 207 Green, Matthew, 276 Gonzales, Alberto, 16 , 200 – 01 , 252 Greenwald, Glenn, 9 , 16 , 41 , 206 , 229 Google PRISM story by, 18 – 19 encryption of data by, 62 – 64 GROK, 267 surveillance of data from, 109 , 234n. Guardian, h e, 9 19, 269 PRISM story in, 18 Gorman, Siobhan, 49 GUMFISH, 267 Government Accountability Oi ce (GAO), 150 hacking of data Government Communications Security Chinese hacking of US sites, 149 Bureau (GCSB), (NZ) 163 – 65 espionage involving, 2 – 3 government surveillance policies. by foreign governments, 62 – 64 , 283 See also Executive Order 12333 from commercial online (EO 12333) services, 57 – 60 current abuses and, 138 – 40 by law enforcement, 68 , 168 – 70 domestic intelligence and, 103 – 04 by NSA, 18 – 19 , 21 – 22 , 263 , 266 Executive Branch expansion politics of, 285 of, 176 – 78 security risks of, 276 – 87

© in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-1-107-10323-8 — American Spies Jennifer Stisa Granick Index More Information

Index 327

Harding, Warren G., 175 , 183 inadvertent collection Hasan, Nidal (Maj.), 80 digital technology and, 221 Haseltine, Eric, 68 growth of, 51 – 52 Hayden, Michael, 44 , 47 , 50 , 65 , NSA dei nition of, 36 , 46 74 , 281 incarceration rate in US, 130 Hazmi, Nawaf al-, 71 – 73 incidental collection, 36 , 108 Headley, David, 83 – 85 ini ltration, surveillance through, Healy, Kieran, 62 135 – 38 , 142 – 47 “Hemisphere” project, 104 information assurance services, NSA Hepting v. ATT aka In re Nat. Sec. weaknesses and, 263 Agency Telecommunications information sharing Records Litigation, 633 F.Supp.2d back door searches and, 158 – 61 , 949 (NDCal 2009), i x 307 – 09 Hersh, Seymour, 50 , 182 counterterrorism measures H i d a l g o , C e s a r , 6 1 a n d , 8 0– 8 5 Hogan, h omas F., 160 – 61 of criminal and intelligence Holder, Eric, 104n. 4, 147 , 148 data, 196 – 99 Holley, Robert J., 84 domestic intelligence data, 104 – 06 homeland information reports fusion centers, 140 – 42 (HIRs), 141 government infrastructure barriers homosexuals to, 74 – 76 surveillance of, 137 , 142 intelligence community barriers Homsany, Ramsey, 168 to, 70 – 74 Hoover, J. Edgar, 52 , 76 , 178 “Raw Take” sharing, 198 abuses of surveillance by, 131 – 33 , Inglis, John C., 102 136 – 38 intellectual property career of, 131 domestic surveillance as violation investigation of King of, 105 by, 133 hacking of, 287 “hot pursuit” principle, warrantless intelligence community wiretapping and, 234 9/ 11 Commission investigation hotline call data private information a n d , 7 0– 7 4 from, 60 – 62 absence of performance metrics House Intelligence Committee, 83 f o r , 8 0– 8 5 Howard, Malcolm, 204 , 210 , 230 , 250 , demonization of, 50 – 51 252 minimization procedures of agencies HTTPS protocol, 64 in, 112 – 15 Huawei company, 288 misdirection and misrepresentation human intelligence by, 27 – 28 , 39 – 40 (HUMINT), 5 , 9 oversight of, 245 Human Rights Watch, 110 , 148 perception of terrorism risk human rights workers a n d , 6 7– 7 4 surveillance of, 169 – 70 , 222 structure of, 5 HUMINT (human intelligence), 5 , 9 Intelligence Community Whistleblower Hunt, Ira “Gus”, 55 , 70 Protection Act, 42 intelligence data image recognition sot ware, 129 categories of, 5 Immersion program, 61 v o c a b u l a r y u s e f o r , 2 7– 2 8

© in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-1-107-10323-8 — American Spies Jennifer Stisa Granick Index More Information

328 Index

internal oversight of surveillance, Jinping, Xi 287 244 – 62 , 294 Joel, Alex, 244 Internal Revenue Service (IRS), Johnson, Jeh, 98 political surveillance by, 146 Johnson, Lyndon Baines, 133 International Telecommunications journalists, surveillance of, 147 – 49 , Union, 169 178 , 222 , 293 Internet. See also cybersecurity judicial oversight of surveillance, absence of privacy on, 219 – 21 13 – 14 , See also specii c courts by- catch of data on, 124 – 27 FISA provisions and, 184 – 86 crime involving, 1 future challenges for, 297 – 300 data localization proposals internal oversight and, 296 and, 168 – 70 limitations of, 248 – 55 economic impact of surveillance July 7 2005 London suicide on, 167 – 68 bombings, 79 foreign government regulation of, 168 – 70 Kane, John L., 238 , 241 foreign use of, 165 Katz v. United States, 389 U.S. 347 Fourth Amendment protections (1967), x , 178 – 86 , 187 , 218 , 220 , and, 225 224 limits of data collection from, 80 – 85 Keith c a s e . See United States v. United NSA data collection from, 21 – 23 , States District Court (Keith case), 103 – 04 , 121 – 23 , 253 407 U.S. 297 (1972) STELLARWIND surveillance Kennedy, John F., 134 of, 192 – 96 Kennedy, Robert Jr., 134 surveillance of trai c on, 53 – 57 key escrow systems, 264 third party data collection kidnapping, terrorism as justii cation on, 187 – 91 for, 92 , 156 – 58 , 223 Internet of h ings, 56 – 57 King, Martin Luther Jr., 5 Internet Service Providers (ISPs), FBI surveillance of, 133 – 35 , 178 53 – 54 , 62 – 65 Klayman, Larry, 228 internment, surveillance and, 135 – 38 Klein, Mark, 45 , 205 , 206 , 213 , 293 Investigatory Powers Bill (IPB) (UK) Kollar- Kotelly, Colleen, 201 – 02 , 204 , (Snooper’s Charter), 169 212 , 225 , 226 , 249 , 252 IP addresses, surveillance of, 53 – 54 Korematsu v. United States, 321 U.S. 760 iPhone devices, global data (1944), x collection from, 21 – 22 , See also Kris, David, 158 , 211 mobile phones Kyllo v. United States, 533 U.S. 27 IRS (Internal Revenue Service), (2001) x political surveillance by, 146 Israel, NSA information sharing labor activists, FBI surveillance with, 149 – 50 of, 175 Landau, Susan, 264 , 283 Jackson, Jesse, 133 language of intelligence, 27 – 28 J a f er, Jameel, 222 , 239 surveillance law and Japanese- Americans, internment technology, 39 – 40 of, 136 t e r r o r i s m a n d , 9 2 J e f ress, Amy, 160 – 61 Large- Content FISA, 210 , 212 Jewel v. NSA, x law enforcement

© in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-1-107-10323-8 — American Spies Jennifer Stisa Granick Index More Information

Index 329

c a l l d a t a c o l l e c t i o n a n d , 5 4– 5 5, local data storage regulations, 168 – 70 87 – 88 Lockheed- Martin, 287 digital surveillance by, 53 Loomis, Ed, 46 – 49 domestic data collection by, 104 – 06 LOVEINT investigation, 15 – 17 , 76 , 153 federal surveillance and, 68 , 175 – 76 , loyalty card data, 56 184 – 86 fusion center information sharing Mailer, Norman, 132 and, 140 – 42 MAINWAY intelligence tool, 22 – 23 , 38 hacking of data by, 68 , 168 – 70 Manget, Fred F., 68 intelligence community cooperation Man- in- the- Middle attacks, 270 with, 196 – 99 Manjoo, Farhad, 78 legal requests for data from, 62 – 65 marginalized groups, political parallel construction by, 105 , 239 surveillance of, 145 – 47 pen register data collection and, 189 – 91 mass surveillance. See also b u l k d a t a political surveillance and, 128 – 31 , collection 145 – 47 Boston Marathon bombing and, 78 – 79 targeted surveillance by, 142 – 45 limitations of, 80 – 85 third party data collection NSA misuse of, 268 and, 187 – 91 by NSA, 3 lawful purpose standard, minimization post- September 11th increase in, procedures and, 156 – 58 67 – 74 , 76 Leahy, Patrick, 82 , 208 , 251 as threat to democracy, 7 – 8 , 24 – 26 legal framework for surveillance McLaughlin, Mary, 231 a t er-the- fact justii cations, 192 MCTs (multi- communications a g e n c y l a n g u a g e a n d , 3 9– 4 0 transactions), 124 – 27 , 257 dei nitions of surveillance and, 28 – 30 McVeigh, Timothy, 67 – 68 , 104 domestic call data collection and, 15 – 17 media coverage of surveillance Fourth Amendment protections domestic call data collection and, 172 – 75 a n d , 1 6 global data collection and absence investigation into PRISM by, 18 – 19 of, 23 – 24 surveillance of journalists government regulatory policy, 4 and, 147 – 49 inef e c t i v e n e s s o f , 5 medical records, encryption of, 62 intelligence analysis and, 68 Médecins du Monde, NSA surveillance mass surveillance and, 9 of, 110 politics of, 178 – 86 Merkel, Angela, 169 – 70 power of metadata and, 302 metadata privacy rights and, 172 analysis of, 60 – 62 legal immunity call data as, 10 , 60 – 62 , 225 , 251 in FISAAA provisions, 213 – 16 Fourth Amendment protections secret laws granting, 17 and, 242 Leon, Richard J., 228 IP address surveillance, 53 – 54 Level 3 corporation, 269 NSA collection of, 20 , 34 – 36 Levy, Edward, 183 – 84 power of, 302 library lending logs, 203 – 05 , See also privacy violations of, 65 Section 215 (USA PATRIOT Act) terrorism intelligence using, 90 – 98 privacy protection for, 12 , 101 Microsot Windows, crash reporting Litt, Robert, 111 – 12 , 152 , 153 , 244 , 308 system of, 64

© in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-1-107-10323-8 — American Spies Jennifer Stisa Granick Index More Information

330 Index

Mihdhar, Khalid al-, 71 – 73 MUSCULAR program, 63 – 64 , 97 – 98 , minimization procedures, 111 109 back door searches and, 158 Muslim- Americans, targeted current status of, 152 – 54 surveillance of, 142 – 45 data collection and, 75 – 76 , 112 – 15 , My Lai massacre, 44 – 45 211 MYSTIC global data collection false promise of, 153 – 54 system, 20 FISC weakening of, 249 foreign online user exclusion National Commission on Terrorist from, 165 Attacks Upon the United States (9/ importance of, 199n. 16 11 Commission), 70 – 74 lack of oversight for, 156 National Institute of Standards and NSA dei nition of, 37 – 38 Technology (NIST), 274 policies guiding, 156 – 58 National Research Council proposed reforms for, 161 (NRC), 89 – 90 reasonable standard and, 243 national security reform of, 307 – 09 9/ 11 Commission review of, 70 – 74 secret rules for, 154 – 55 Executive Branch expansion of minority groups, targeted surveillance surveillance and, 176 – 78 of, 138 – 40 , 142 – 45 government agencies involved in, 5 , misdirection and 23 – 24 , 104 – 06 misrepresentation hacking and, 276 – 87 in intelligence community journalists’ reporting and, 147 – 49 language, 39 – 40 legal immunity and, 17 of Snowden’s activities, 41 – 43 misuse of data collected for, 24 – 26 mission creep, in surveillance, 51 – 52 , post- September 11 shit in, 69 – 70 180 – 81 privacy protection as enhancement Mitchell, Andrea, 34 of, 171 Moalin, Basaaly, 82 , 83 , 92 privacy violations in name of, 100 , mobile phones. See also telephone call 150 – 51 data collection regulation of national security data collection from, 9 – 10 , 57 , practices, 44 – 45 , 180 – 81 85 – 90 t e r r o r i s m t h r e a t a s s e s s m e n t a n d , 7 7, key escrow systems for, 264 92 , 98 NSA hacking of, 266 warrantless wiretapping and, 234 Monaco, Lisa, 150 National Security Act of 1947, 248 Mongols Motorcycle Club, 141 (NSA) Monteilh, Craig, 143 9/ 11 Commission investigation Morrell, Michael, 88 , 228 , 230 of, 70 – 74 Moussaoui, Zacarias, 73 , 197 Boston Marathon bombing Mueller, Robert S., 69 , 200 – 01 investigation of, 77 – 79 Mukasey, Michael, 183 call data collection by, 5 , 10 – 17 , 61 , multi- communications transactions 85 – 90 (MCTs), 124 – 27 , 257 contact chaining system of, 14 – 15 , Upstream collection of, 259 47 , 101 – 02 Mumbai, India 2008 attacks, 79 , data collection technology used by, 83 – 85 21 – 22 , 33 – 36 , 62 – 65 murder, terrorism vs. , 91 – 92 encryption policies of, 264

© in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-1-107-10323-8 — American Spies Jennifer Stisa Granick Index More Information

Index 331

foreign surveillance by, 6 , 9 , 19 – 24 , a s j u s t i i cation for 106 – 15 surveillance, 24 – 26 German surveillance by, 169 – 70 terrorism risks and, 67 – 74 information sharing by, 83 – 85 , Northrup- Grumman, 287 149 – 50 NSA (National Security Agency). insecurity in policies of, 263 – 89 See National Security Internet data collection violations by, Agency (NSA) 21 – 23 , 103 – 04 , 121 – 23 , 253 mass surveillance by, 3 Obama v. Klayman, 800 F.3d 559 minimization procedures of, 37 – 38 (DCCir. 2015), x , 228 PRISM program of, 18 – 19 Obama, Barack, 38 – 39 secret surveillance posts built by, 45 Chinese hacking and, 287 signals intelligence from, 6 domestic intelligence collection and, Snowden leak and, 2 – 3 5 , 17 , 106 , 202 Snowden’s career at, 41 on email data surveillance, 18 spying partnerships of, 163 – 65 German surveillance and, 169 – 70 warrantless wiretapping by, 205 – 13 key escrow technology and, 281 whistleblowers within, 46 on minimization procedures, National Security Letters, 186 113 – 14 Netanyahu, Benjamin, 149 NSA hacking activities and, 272 Network Operations Center (Global oversight of surveillance Crossing), 165 under, 244 networked data, 56 – 57 phone call data collection and, 89 – 90 , New America Foundation, 168 100 , 230 New York City Police Department PRISM program and, 165 (NYPD), targeted surveillance surveillance of journalists by, 143 under, 147 – 49 New York Times, h e, 16 , 36 Occupy Wall Street, 135 , 140 , 146 NSA surveillance reporting in, 254 O i ce of Intelligence Policy and Review on warrantless wiretapping, 203 (OIPR) (DOJ), 49 reporting on NSA surveillance by, O i ce of Legal Counsel (OLC) (US 44 – 45 , 48 – 50 , 116 Department of Justice), 17 STELLARWIND violations reported STELLARWIND investigation in, 206 , 250 and, 194 – 96 surveillance of browsing data on, 53 O i ce of Personnel and Management surveillance of journalists from, 148 (US), Chinese hacking of, 149 targeted advertising in, 58 O i ce of the Director of National New York Times, h e, Intelligence (ODNI), 13 STELLARWIND violations reported multi- communications transactions in, 200 – 01 and, 125 Nixon, Richard, 44 – 45 , 52 , 76 , 132 , 138 Oklahoma City bombing, 67 – 68 , 91 , No Place to Hide (Greenwald), 24 104 , 183 NOBUS ideology, 280 Oliver, John, 42 , 123 – 24 , 162 non- governmental organizations Olmstead v. United States, 277 U.S. 438 German surveillance of, 169 – 70 (1928), x , 156 , 175 – 76 , 179 , 231 NSA surveillance of, 110 – 11 Omnibus Crime Control and Safe surveillance of, 147 – 49 Streets Act of 1968 (Wiretap non- state threats Act), 205

© in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-1-107-10323-8 — American Spies Jennifer Stisa Granick Index More Information

332 Index

online chat rooms, data collection performance metrics for intelligence, from, 121 – 23 demand for, 80 – 85 online transactions limits of counterterrorism analysis data local proposals and, 168 – 70 and, 150 – 51 foreign commercial use of, 165 Perrow, Charles, 284 surveillance of, 53 , 199 – 203 PETA (People for the Ethical Treatment targeted advertising based of Animals), 146 on, 57 – 60 Petraeus, David, 52 oversight of surveillance Petrobras, 110 Congressional oversight, 247 , 296 phone dragnet. See telephone call data executive (interbranch) collection oversight, 291 physical subversion, NSA use of, 272 future challenges for, 294 – 300 Pike, Otis G., 182 internal oversight, 294 PIPA (Protect IP Act), 7 judicial oversight, 13 – 14 , 297 – 300 platform companies, gatekeeping role Owning the Net initiative, 268 , 272 of, 57 – 60 Poitras, Laura, 18 – 19 , 41 , 50 , 206 PAA (Protect America Act), 59 , 212 , political surveillance, 51 – 52 , 131 – 33 , 235 , 237 142 , 145 – 47 , 169 – 70 packet injection attacks, 282 power dynamics, surveillance Palmer Raids of 1919–20, 131 and, 131 – 33 parallel construction techniques, 105 , Power Wars (Savage), 201 – 02 178 , 239 PPD- 28 (presidential directive), 113 – 14 , Paris, France, November 2015 303 attacks in, 87 minimization procedures and, 156 – 58 pattern matching, terrorism intelligence pre- Revolutionary America a n d , 9 0– 9 8 surveillance in, 172 – 75 PCLOB (Privacy and Civil Liberties President’s Review Group on Oversight Board). See Privacy and Intelligence and Communications Civil Liberties Oversight Board Technologies, 230 , 288 , 303 (PCLOB) president- proof surveillance policies, peace movement, FBI surveillance of, 262 , 295 136 – 38 , 175 PRISM (NSA classii ed program), 18 – 19 pen register data collection, xi , 83 , assessment of, 83 – 85 103 , 184n. 15, 185 , 186 , See also certii cation procedures under, 117 metadata domestic surveillance under, 31 – 32 , absence of supervision in, 250 106 – 15 , 121 – 23 Fourth Amendment protections EU data protection laws and, 167 and, 224 foreigners’ privacy and, 163 – 65 STELLARWIND violations hearings on, 34 – 36 , 169 – 70 of, 192 – 96 impact on online commerce of, 165 third party doctrine and, 187 – 91 incidental collection by, 36 trap and trace statutes, 189 – 91 limits of, 82 Pentagon Papers, 44 – 45 reform of, 308 People for the Ethical Treatment of section 702 provisions, 214 Animals (PETA), 146 warrantless wiretapping under, 256 People’s Republic of China, hacking of Privacy and Civil Liberties Oversight US data by, 149 , 287 Board (PCLOB), 82 , 83

© in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-1-107-10323-8 — American Spies Jennifer Stisa Granick Index More Information

Index 333

“about collection” phenomenon encryption use in, 264 and, 121 – 23 privilege, surveillance and, 131 – 33 “foreignness” determination probability distribution, terrorism and, 123 – 24 analysis and, 95 – 97 limits of mass surveillance and, 113 probable cause standard m e t a d a t a c o l l e c t i o n a n d , 3 4– 3 6 in 9/11 Commission report, 74 – 76 minimization procedures back door searches and, 158 – 61 and, 154 – 55 criminal activity and, 73 – 74 misdirection/ misrepresentation of federal surveillance and, 182 surveillance and, 39 in FISA provisions, 184 – 86 on phone data collection, 230 in Fourth Amendment, 173 section 702 (FISAAA) provisions law enforcement surveillance and, 118 , 121 – 23 , 215 and, 236n. 23 privacy protections. See also section 702 and, 116 – 19 reasonable expectation of privacy STELLARWIND program and, 68 standard program code names, 38 back door searches and, 158 programmatic surveillance, 116 – 19 Census data and, 136 Prohibition cyber sovereignty movement federal surveillance and, 175 – 76 and, 168 – 70 “Project Crisscross”, 104 EU data protection laws and, 167 Protect America Act (PAA), 59 , 212 , for email data, 219 – 21 235 , 237 Five Eyes partnership and, 163 – 65 Protect IP Act (PIPA), 7 for foreign online users, 165 provider assistance principle foreign government data collection third party doctrine and, 189 – 91 and, 149 – 50 public accountability for foreign government Internet surveillance, 292 – 94 regulations and, 168 – 70 public opinion foreign surveillance and, 3 , 162 – 71 abuses of surveillance and, 138 – 40 in Fourth Amendment, 172 – 75 on foreign surveillance, 178 – 86 history in US of, 172 anti- Muslim sentiment in, 142 – 45 litigation involving, 1 perceptions of terrorism risks national security and, 171 a n d , 6 7– 7 4 political abuse of, 51 – 52 resistance to mass surveillance public opinion about, 128 – 31 a n d , 7 – 8 security and, 150 – 51 on surveillance, 128 – 31 technology innovation as threat public- private partnerships for to, 57 – 60 surveillance, 57 – 60 terrorism threat vs., 5 purged information, NSA procedures third party data collection f o r , 3 7– 3 8 and, 187 – 91 Privacy Shield proposal, 305 Q a e d a , a l - private sector 9/ 11 Commission investigation Boston Marathon bombing data of, 70 – 74 from, 78 – 79 telephone monitoring of, 17 data collection technology data World Trade Center 1993 distribution to government and a t t a c k b y , 6 7 NSA by, 62 – 65 Quakers, surveillance of, 132 , 137 , 146

© in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-1-107-10323-8 — American Spies Jennifer Stisa Granick Index More Information

334 Index

QUANTUM global data collection SANS organization, 273 system, 20 , 22 Savage, Charlie, 201 – 02 , 252 Quattrone, Frank, 130 SAVAGERABBIT, 267 query, NSA dei n i t i o n o f , 3 8 Schlanger, Margaret, 254 Schmidt, Eric, 64 , 128 , 287 radicalization theories, 94 Schneier, Bruce, 58 RAND Corporation, 44 – 45 Schrems v. Facebook, Case No. C-362/ 14 “Raw Take” sharing orders, 198 (2015), xi , 305 reasonable articulable suspicion Screening of Passengers by Observation (RAS). See also Section 215 (USA Techniques (SPOT) checklist, 93 PATRIOT Act) search warrants. See also warrantless call data collection and, 10 , 13 – 14 searches NSA contact chaining and, 14 – 15 Congressional legislation on, 180 – 81 reasonable expectation of privacy, 240 DEA use of, 104 – 06 reasonable expectation of privacy FISA provisions concerning, 184 – 86 standard Fourth Amendment protections electronic surveillance collection and, 172 – 75 a n d , 2 9– 3 0 lack of European regulations Supreme Court ruling on, 178 – 86 on, 168 – 70 third party data collection and, 187 – 91 9/ 11 Commission recommendations “reasonably designed” concerning, 74 – 76 requirement, 158 – 61 surveillance of journalists Regin system, 270 , 271 and, 147 – 49 relevance standard, domestic search, NSA dei nition of, 38 surveillance data collection and, secrecy 103 , 204 in legal constraints on religious groups, targeted surveillance surveillance, 44 – 45 of, 142 – 45 levels in surveillance of, 4 Reno, Janet, 73 , 183 reduction of, 291 Richards, Rebecca, 261 revelations on surveillance and end Richelieu, Armand Jean du Plessis to, 203 – 05 (Cardinal), 128 vocabulary of intelligence and, 27 – 28 Riley v. California, 134 S.Ct. 2473 secret law, in United States, 17 , (2014), xi , 242 292 – 94 Risen, James, 148 section 215 (USA PATRIOT Act). See Roark, Diane, 48 , 49 also library lending logs Roberts, John, 243 Alert List, 14 Rogers, Mike, 39 , 119 , 281 , 297 call data collection under, 12 , 15 – 17 , Roosevelt, Franklin Delano, 70 , 175 , 100 176 – 78 foreign surveillance powers Roosevelt, h eodore, 70 , 175 under, 185 – 86 Rosen, James, surveillance of, 147 inef ectiveness of, 251 Rotella, Sebastian, 84 judicial oversight of, 260 Rudmin, Floyd, 95 tangible things, 203 – 05 Rumsfeld, Donald, 74 section 702 (FISAAA). See also m u l t i - R u s s i a . See also Soviet Union communications transactions, warnings concerning Tsarnaevs See also Upstream surveillance from, 77 – 79 program , See also PRISM

© in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-1-107-10323-8 — American Spies Jennifer Stisa Granick Index More Information

Index 335

Americans’ proximity to foreign metadata in, 34 – 36 targets and, 121 – 23 NSA role in, 22 – 23 , 156 – 58 assessment of data collection regulations relating to, 38 – 39 , 112 – 15 under, 83 – 85 US Signals Intelligence Directive back door searches and, 158 – 61 SP0018, 75 , 111 by- catch phenomenon and, 124 – 27 Silberman, Laurence, 138 constitutionality of, 222 Silverglate, Harvey, 129 domestic surveillance and, 106 – 15 , S i m o n , D a v i d , 8 7 116 , 119 – 20 Smith v. Maryland, 442 U.S. 735 (1979), expiration of, 304 xi , 187 – 91 , 200 – 01 , 220 , 224 , 225 , “foreignness” determination 228 , 242 and, 123 – 24 S n o o p e r ’ s C h a r t e r . See Investigatory judicial oversight of, 260 Powers Bill (IPB) (UK) legal immunity in, 213 – 16 Snowden, Edward, 2 – 3 , 7 minimization procedures under, 156 on abuse of surveillance, 138 overview of, 116 – 19 on call data collection, 100 upcoming expiration of, 291 classii ed documents released by, 19 warrantless wiretapping under, 232 – 40 on data collection, 87 Securities and Exchange Commission debate over revelations by, 41 – 43 (SEC), politically motivated on global surveillance activities, 24 investigations by, 130 on encryption, 274 , 276 security risks legal protection for, 293 bounded rationality concerning, 284 on limits of mass surveillance, 77 , 82 hacking and, 266 on NSA surveillance practices, 24 , of hacking, 276 – 87 36 , 62 of surveillance, 291 minimization procedures disclosed security, tools for enhancing, 279 by, 113 , 154 – 55 Sedition Act (1918), 131 , 175 Oliver interview with, 162 selector- based data collection on section 702 (FISAAA) “about collection” phenomenon surveillance, 121 – 23 and, 121 – 23 targeted surveillance activities in dei nition of, 32 – 33 documents leaked by, 143 section 702 (FISAAA) as whistleblower, 50 – 51 , 106 – 15 provisions, 214 s o c i a l n e t w o r k i n g Sensenbrenner, James, 16 – 17 encryption of, 62 September 11, 2001 attacks surveillance and, 57 – 60 intelligence failures leading to, 70 – 74 SOD (Special Operations Division) surveillance policies as response (DEA), 105 to, 67 – 74 SOPA (Stop Online Piracy Act), 7 Sethi, Arjun S., 94 Sotomayor, Sonia, 56 , 231 , 239 , 240 Shabaab , al-, terrorist group, 83 , 92 Soviet Union. See also Russia Signal sot ware, 279 US surveillance of, 68 signals intelligence (SIGINT) special needs exception, warrantless classii c a t i o n o f , 5 wiretapping and, 234 dei nitions of, 28 – 30 Special Operations Division (SOD) encryption technology and, 265 (DEA), 105 foreign intelligence data and, 9 Specter, Arlen, 207 in Israel, 149 – 50 Spock, Benjamin, 132

© in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-1-107-10323-8 — American Spies Jennifer Stisa Granick Index More Information

336 Index

S p r i g m a n , C h r i s t o p h e r , 5 3 telephone call data collection and Sprint, surrender of call data by, 10 rulings of, 224 – 32 Stamos, Alex, 281 third party data collection and, 187 – 91 standing doctrine, Fourth Amendment warrantless wiretapping rulings protections and, 222 of, 181 State Department, 265 , 285 whistleblower protections and, 44 – 45 State of War (Risen), 148 surveillance. See also s p e c i i c forms, state privacy laws, 172 – 75 , 218n. 4 such as digital surveillance, See stateless terrorism, as justii cation for also digital surveillance surveillance, 24 – 26 abuses of, 5 , 7 – 8 , 24 – 26 , 131 – 33 , Station Table, call data evaluations, 14 138 – 40 statistical analysis, terrorism dei nitions of, 28 – 30 intelligence and, 95 – 97 foreign government regulations STELLARWIND surveillance program on, 168 – 70 absence of oversight for, 245 Fourth Amendment protections absence of surveillance over, 250 and, 172 – 75 American citizens included in, future of, 290 – 92 11 – 13 , 16 , 106 by Germany, 169 – 70 encryption technology and and, 65 history in US of, 172 FISA statute and, 235 information sharing role in, 74 – 76 FISC- R and, 196 – 99 lack of European regulations investigation of, 192 – 96 on, 168 – 70 legal status of, 153 – 54 legal regulation of, ix – xiii , 4 post- September 11 focus of, 68 limits on ef e c t i v e n e s s o f , 7 7 warrantless searches and wiretapping mission creep in, 51 – 52 , 180 – 81 in, 116 , 205 – 13 power and privilege and history whistleblower revelations of, 131 – 33 concerning, 48 – 50 in pre- Revolutionary America, Sterling, Jef rey, 148 172 – 75 , 217 Stern, Carl, 45 public opinion about, 128 – 31 Stevenson, Adlai, 133 public- private partnerships in, 57 – 60 Stevenson, Adlai Jr., 132 risk- reward tradeof in, 300 Stone, Harlan Fiske, 175 , 183 secret laws on, 17 Stop Online Piracy Act (SOPA), 7 Snowden’s revelations Stored Communications Act concerning, 41 – 43 (SCA), 189 – 91 technology and growth of, 3 “strong crypto”, 264 v o c a b u l a r y o f , 2 7– 2 8 Stuxnet malware, 282 subpoenas, for phone call data, 104 – 06 Tailored Access Organization superwarrants, 180 (TAO), 267 Supreme Court (US), 181 Tamm, h omas, 49 – 50 , 206 , 293 digital surveillance rulings, 242 targeted data collection Fourth Amendment protections and, advertisers’ use of, 57 – 60 179 , 221 – 24 call data as, 85 – 90 privacy rights and, 172 counterterrorism ef orts and, 79 – 80 search and seizure rulings by, dei nitions of, 31 175 – 76 mass surveillance vs. , 90 – 98 STELLARWIND abuses and, 200 – 01 political surveillance and, 145 – 47

© in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-1-107-10323-8 — American Spies Jennifer Stisa Granick Index More Information

Index 337

public accountability in, 292 Terrorists Identities Datamart regulation of, 31 – 32 Environment (TIDE), 78 warrantless wiretapping and, 31 – 32 , h e Wire (television series), 87 233 h inh read project, 46 – 49 , 295 tax audits, surveillance and, 135 – 38 third party doctrine Tea Party movement, 135 , 146 Fourth Amendment protections technology and, 225 civil liberties and, 1 phone data and email growth of mass surveillance and, 3 , privacy, 219 – 21 24 – 26 phone data collection and, 57 – 60 , terrorism and limits of, 94 – 95 189 – 91 telephone call data collection. See also phone data collection and, 242 Section 215 (USA PATRIOT Act) , STELLARWIND See also mobile phones investigation, 194 – 96 categories of, 28 – 30 h is American Life (radio program), 143 Congressional and court cooperation h ree Felonies a Day (Silverglate), 129 on, 178 – 86 TIDE (Terrorists Identities continued justii c a t i o n f o r , 8 5– 9 0 Datamart Environment). See Fourth Amendment protections and, Terrorists Identities Datamart 13 – 14 , 187 – 91 , 200 – 01 , 224 – 32 Environment (TIDE) government collection of, 9 – 10 , Title III (Wiretap Act), 180 – 81 , 187 – 91 , 54 – 55 205 history of surveillance using, torture, terrorism as justii c a t i o n f o r , 9 2, 175 – 76 158 , 223 key escrow technology and, 264 Total oil and gas company, 110 limits in counterterrorism of, 80 – 85 tower dumps, of mobile phone NSA global surveillance of, 19 – 24 data, 54 – 55 privacy protections and, 60 – 62 TrailBlazer surveillance tool, 47 , 50 , reasonable expectation of privacy 295 standard and, 29 – 30 , 178 – 86 transit authority, expansion of, 210 Senate investigation into collection transparency in surveillance, proposals of, 10 – 17 for, 310 STELLARWIND violations Transportation Security Administration of, 192 – 96 (TSA), 93 third party doctrine and, 187 – 91 Tsarnaev, Dzhokhar, 77 – 79 Terror Presidency, h e (Goldsmith), 177 Tsarnaev, Tamerlan, 77 – 79 terrorism TURBINE system, 268 criminal violence vs. , 90 – 98 Twitter, 87 , 169 – 70 dei nitions of, 5n. 1 Tye, John, 22 , 110 , 111 , 152 by Islamic non-state groups, 142 – 45 legal dei nition of, 91 – 92 US Constitution, surveillance regulation mass surveillance and detection a n d . See also Fourth Amendment, of, 90 – 98 See also First Amendment public perceptions of, 138 – 40 US National Counterterrorism surveillance policies as response Center, 78 to, 67 – 74 USS Cole, attack on, 72 Terrorist Surveillance Program (TSP), Udall, Mark, 83 , 254 17 , 207 , 252 UK- USA Agreement, 163 – 65

© in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-1-107-10323-8 — American Spies Jennifer Stisa Granick Index More Information

338 Index

UNICEF, NSA surveillance of, 110 multi- communication transactions Uniform Resource Locator (URL), data and, 124 – 27 surveillance of, 53 , 225 multi- communications data and, 259 U n i t e d K i n g d o m . See also warrantless wiretapping under, 257 Global Communications USA Freedom Act, 7 , See also Section Headquarters (GCHQ) 215 (USA PATRIOT Act) global data collection by, 21 – 22 back door searches and, 160 government data collection curbs on phone data collection in, 63 – 64 in, 231 Investigatory Powers Bill, 169 revisions to bulk data collection July 7th 2005 London suicide under, 103 – 04 bombings, 79 telephone data collection and, 31 – 32 , surveillance regulations in, 168 – 70 87 , 199n. 17 “United States persons,” NSA dei nition USA PATRIOT Act, 4 , See also Section of, 38 – 39 215 (USA Patriot Act) United States Signals Intelligence federal surveillance powers Directive SP0018 (USSID- 18), 75 , under, 185 – 86 111 , 112 , 156 – 58 post- September 11 passage United States v. Davis, 754 F.3d 1205 of, 73 – 74 (11th Cir. 2014), rev. en banc 785 section 215 on call data collection, F.3d 498 (11th Cir. 2015), 240 12 , 15 – 17 United States v. Ganias, 755 F.3d 125 surveillance abuses in, 196 – 99 (2d Cir. 2014), xi , 241 USA PATRIOT Act II, 192 – 96 United States v. Jacobsen, 466 U.S. 109 USA Today, 10 , 12 , 16 , 203 (1984), xii , 220 USSID- 18. See United States Signals United States v. Jones, 32 S.Ct. 945 Intelligence Directive SP0018 (2012), xii , 230 , 240 (USSID-18) United States v. Miller, 425 U.S. 435 (1976), xii , 187 – 91 , 220 , 225 Vatican, German surveillance United States v. Muhtorov, 2-cr- 00033- of, 169 – 70 JLK (D. Colo.), xii , 238 , 241 Verilli, Donald, 239 United States v. Truong, 629 F.2d 908 Verizon (4th Cir. 1980), xii , 236 STELLARWIND controversy United States v. United States District and, 200 Court (Keith case), 407 U.S. 297 surrender of call data by, 9 – 10 (1972), xiii , 181 – 84 , 235 Vieques Island protests, 91 United States v. Warshak, 631 Vietnam War, opposition to, 44 – 45 , F.3d 266 (6th Cir. 2010), xiii , 132 , 136 – 38 , 236 220 , 232 Vinson, Roger, 212 updates, security risks and, 273 violations by intelligence agencies, Upstream surveillance program, absence of remedies for, 112 – 15 18 , 214 , See also Section 702 violent extremism (FISAAA) rarity of, 96n. 43 about collection in, 305 terrorism vs. , 91 – 92 assessment of, 83 – 85 vocabulary of intelligence, 27 – 28 domestic data collection, 106 – 15 , 225 “wall” between criminal and intelli- inadvertent data collection by, 36 gence surveillance, 73 , 196 – 99

© in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-1-107-10323-8 — American Spies Jennifer Stisa Granick Index More Information

Index 339

Walton, Reggie, 14 , 253 , 258 investigations of, 46 – 50 war on terror, surveillance policies legal protection for, 42 and, 223 minimization procedures in warrantless searches and wiretapping, revelations of, 112 – 15 31 – 32 , 106 – 15 , See also protection for, 293 wiretapping Snowden as, 50 – 51 back door searches and, 158 – 61 value of, 44 – 45 congressional and court regulations Wikileaks, 43 of, 180 – 81 Wilson, Douglas, 158 , 211 executive branch expansion wire communications, dei n e d , 2 8– 3 0, of, 176 – 78 184n. 15, 187 – 91 federal surveillance and, 175 – 76 Wiretap Act (Title III), 180 – 81 , 187 – 91 , foreign surveillance and, 236 205 Fourth Amendment protections wiretapping, 106 – 15 and, 172 – 75 Congressional legislation intelligence data collection on, 180 – 81 a n d , 7 4– 7 6 dei n e d , 2 8– 3 0 limiting scope of, 305 encryption technology and, 264 section 702 (FISAAA) provisions Executive Branch expansion allowing, 232 – 40 of, 176 – 78 in STELLARWIND federal surveillance and, 175 – 76 program, 205 – 13 Fourth Amendment protections warrants. See also search warrants and, 172 – 75 Washington Post, h e history of federal surveillance using, on Global Crossing Network, 165 116 , 178 on inadvertent data collection, 36 section 702 (FISAAA) policies on MUSCULAR program, 63 and, 119 – 20 reporting of mistreatment of Muslim warrantless wiretapping, 31 – 32 Americans, 144 World Trade Center 1993 attack, 67 – 68 , section 702 (FISAAA) covered 91 in, 121 – 23 , 123 – 24 Wyden, Ronald, 33 , 75 , 83 , 158 – 61 , 254 , terrorist surveillance reporting in, 18 297 watchlists Boston Marathon bombing and, 78 XKEYSCORE global data collection false positives in, 94 – 95 system, 20 FBI’s use of, 72 , 131 Watergate investigation, 181 – 84 Yahoo!, 59 , 234n. 19, 235 web browsing trai c encryption of data by, 64 economic impact of surveillance surveillance of data from, 109 , 269 on, 167 – 68 Yoo, John, 194 – 96 , 200 surveillance of, 53 , 109 Weibe, Kirk, 48 Zazi, Najibullah, 85 Whisper Systems, 279 Zegart, Amy, 80 whistleblowers Zuckerberg, Mark, 165

© in this web service Cambridge University Press www.cambridge.org