Surveillance, Secrecy, and Democracy
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Conversation Number 39-1 Portion of a Telephone Conversation Between
Conversation Number 39-1 Portion of a telephone conversation between the President and Henry A. Kissinger. This portion was recorded on May 24, 1973 at an unknown time between 1:27 and 1:29 p.m. [This conversation is cross-referenced with conversation 440-35.] The National Archives and Records Administration prepared the following log of this conversation. Watergate -White House response -White Paper -National security Conversation Number 39-4 Portion of a telephone conversation between the President and Hugh Scott. This portion was recorded on May 24, 1973 between 1:36 and 1:38 p.m. [This conversation is cross-referenced with conversation 440-38.] The National Archives and Records Administration prepared the following log of this conversation. Watergate -Scott's actions, May 23 -Ronald L. Ziegler Scott's schedule Watergate -White House response -National security -Effect on United States foreign policy -Scott's possible statement -Scott's statement, May 23 Conversation Number 39-5 Portion of a telephone conversation between the President and Leslie C. Arends. This portion was recorded on May 24, 1973 between 1:39 and 1:40 p.m. [This conversation is cross- referenced with conversation 440-39.] The National Archives and Records Administration prepared the following log of this conversation. Watergate -Republican congressmen's morale -White House response -White Paper -National security -Effect on United States foreign policy Conversation Number 39-16 Portions of a telephone conversation between the President and Alexander M. Haig, Jr. These portions were recorded on May 25, 1973 at an unknown time between 12:58 and 1:25 a.m. -
Intelligence Legalism and the National Security Agency's Civil Liberties
112 Harvard National Security Journal / Vol. 6 ARTICLE Intelligence Legalism and the National Security Agency’s Civil Liberties Gap __________________________ Margo Schlanger* * Henry M. Butzel Professor of Law, University of Michigan. I have greatly benefited from conversations with John DeLong, Mort Halperin, Alex Joel, David Kris, Marty Lederman, Nancy Libin, Rick Perlstein, Becky Richards, and several officials who prefer not to be named, all of whom generously spent time with me, discussing the issues in this article, and many of whom also helped again after reading the piece in draft. I would also like to extend thanks to Sam Bagenstos, Rick Lempert, Daphna Renan, Alex Rossmiller, Adrian Vermeule, Steve Vladeck, Marcy Wheeler, Shirin Sinnar and other participants in the 7th Annual National Security Law Workshop, participants at the University of Iowa law faculty workshop, and my colleagues at the University of Michigan Legal Theory Workshop and governance group lunch, who offered me extremely helpful feedback. Jennifer Gitter and Lauren Dayton provided able research assistance. All errors are, of course, my responsibility. Copyright © 2015 by the Presidents and Fellows of Harvard College and Margo Schlanger. 2015 / Intelligence Legalism and the NSA’s Civil Liberties Gaps 113 Abstract Since June 2013, we have seen unprecedented security breaches and disclosures relating to American electronic surveillance. The nearly daily drip, and occasional gush, of once-secret policy and operational information makes it possible to analyze and understand National Security Agency activities, including the organizations and processes inside and outside the NSA that are supposed to safeguard American’s civil liberties as the agency goes about its intelligence gathering business. -
A Public Accountability Defense for National Security Leakers and Whistleblowers
A Public Accountability Defense For National Security Leakers and Whistleblowers The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Yochai Benkler, A Public Accountability Defense For National Security Leakers and Whistleblowers, 8 Harv. L. & Pol'y Rev. 281 (2014). Published Version http://www3.law.harvard.edu/journals/hlpr/files/2014/08/ HLP203.pdf Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:12786017 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Open Access Policy Articles, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#OAP A Public Accountability Defense for National Security Leakers and Whistleblowers Yochai Benkler* In June 2013 Glenn Greenwald, Laura Poitras, and Barton Gellman be- gan to publish stories in The Guardian and The Washington Post based on arguably the most significant national security leak in American history.1 By leaking a large cache of classified documents to these reporters, Edward Snowden launched the most extensive public reassessment of surveillance practices by the American security establishment since the mid-1970s.2 Within six months, nineteen bills had been introduced in Congress to sub- stantially reform the National Security Agency’s (“NSA”) bulk collection program and its oversight process;3 a federal judge had held that one of the major disclosed programs violated the -
Daniel Ellsberg
This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND 20755-6000 FOIA Case: 101038A 10 July 2017 JOHN GREENEWALD Dear Mr. Greenewald: This is our final response to your Freedom of Information Act (FOIA) request of 6 March 2017 for Intellipedia entries on "PENTAGON PAPERS" and/ or "Daniel Ells berg" and/ or "Daniel Sheehan" as well as any search results pages. A copy of your request is enclosed. As stated in our initial response to you, dated 7 March 20 17, your request was assigned Case Number 101038. For purposes of this request and based on the information you provided in your letter, you are considered an "all other" requester. As such, you are allowed 2 hours of search and the duplication of 100 pages at no cost. There are no assessable fees for this request. Your request has been processed under the provisions of the FOIA. For your information, NSA provides a service of common concern for the Intelligence Community (IC) by serving as the executive agent for Intelink. As such, NSA provides technical services that enable users to access and share information with peers and stakeholders across the IC and DoD. -
Nuclear Notes
a report of the csis project on nuclear issues Nuclear Notes Volume 2, Issue 1 1800 K Street, NW | Washington, DC 20006 Editors Tel: (202) 887-0200 | Fax: (202) 775-3199 Stephanie Spies E-mail: [email protected] | Web: www.csis.org Mark Jansson Authors Jonah Friedman Eli Jacobs Yogesh Joshi Henry Philippens Alankrita Sinha Stephanie Spies Heather Williams June 2012 CHARTING our future Blank a report of the csis project on nuclear issues Nuclear Notes Volume 2, Issue 1 Editors Stephanie Spies Mark Jansson Authors Jonah Friedman Eli Jacobs Yogesh Joshi Henry Philippens Alankrita Sinha Stephanie Spies Heather Williams June 2012 CHARTING our future About CSIS—50th Anniversary Year For 50 years, the Center for Strategic and International Studies (CSIS) has developed practical solutions to the world’s greatest challenges. As we celebrate this milestone, CSIS scholars continue to provide strategic insights and bipartisan policy solutions to help decisionmakers chart a course toward a better world. CSIS is a bipartisan, nonprofit organization headquartered in Washington, D.C. The Center’s 220 full- time staff and large network of affiliated scholars conduct research and analysis and develop policy initia- tives that look into the future and anticipate change. Since 1962, CSIS has been dedicated to finding ways to sustain American prominence and prosperity as a force for good in the world. After 50 years, CSIS has become one of the world’s preeminent international policy institutions focused on defense and security; regional stability; and transnational challenges ranging from energy and climate to global development and economic integration. Former U.S. -
Open Government: Lessons from America
OPEN GOVERNMENT Lessons from America STEWART DRESNER May 1980 £3.00 OPEN GOVERNMENT: LESSONS FROM AMERICA CONTENTS Page Foreword Preface I Introduction 1 II The Open Government Concept and the British Government response 3 III Hew Open Government Legislation works in the United States 8 (1) Hie Freedom of Information Act 8 (2) The Privacy Act 25 (3) The Government in the Sunshine Act 31 IV What needs to be kept secret? 42 V Who uses the American Open Government Laws? 60 (1) Public Interest Groups 61 (2) The Media 69 (3) Individuals and Scholars 74 (4) Companies 76 (5) Civil Servants 80 VI Balancing Public Access to Government Information with the Protection of Individual Privacy 88 (1) The Issues 88 (2) The Protection of Personal Information by the U.S. Privacy Act 1974 91 (3) The Personal Privacy Exenption to the 101A 96 (4) The Relationship between the IOIA and the PA 98 (5) Public Access and Privacy Protection in an Administrative Programme 99 ii Page VII Ensuring Government Compliance with Public Access legislation 105 (1) Actaiinistrative Procedures 105 (2) Appeal Procedures 107 (3) Monitoring the Effectiveness of Public Access Legislation 117 VIII Ihe Costs and Benefits of Open Government 126 (1) National Security 127 (2) Constitutional Relationships 127 (3) Administrative and other Costs 132 IX Conclusion: Information, Democracy and Power 141 Bibliography i-xi FOREWORD Last year the related subjects of official secrets and freedom of information had a thorough but abortive airing. Mr. Clement Freud's Official Information Bill after a long and interesting committee stage became a victim of the general election. -
NSA) Surveillance Programmes (PRISM) and Foreign Intelligence Surveillance Act (FISA) Activities and Their Impact on EU Citizens' Fundamental Rights
DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT C: CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS The US National Security Agency (NSA) surveillance programmes (PRISM) and Foreign Intelligence Surveillance Act (FISA) activities and their impact on EU citizens' fundamental rights NOTE Abstract In light of the recent PRISM-related revelations, this briefing note analyzes the impact of US surveillance programmes on European citizens’ rights. The note explores the scope of surveillance that can be carried out under the US FISA Amendment Act 2008, and related practices of the US authorities which have very strong implications for EU data sovereignty and the protection of European citizens’ rights. PE xxx.xxx EN AUTHOR(S) Mr Caspar BOWDEN (Independent Privacy Researcher) Introduction by Prof. Didier BIGO (King’s College London / Director of the Centre d’Etudes sur les Conflits, Liberté et Sécurité – CCLS, Paris, France). Copy-Editing: Dr. Amandine SCHERRER (Centre d’Etudes sur les Conflits, Liberté et Sécurité – CCLS, Paris, France) Bibliographical assistance : Wendy Grossman RESPONSIBLE ADMINISTRATOR Mr Alessandro DAVOLI Policy Department Citizens' Rights and Constitutional Affairs European Parliament B-1047 Brussels E-mail: [email protected] LINGUISTIC VERSIONS Original: EN ABOUT THE EDITOR To contact the Policy Department or to subscribe to its monthly newsletter please write to: [email protected] Manuscript completed in MMMMM 200X. Brussels, © European Parliament, 200X. This document is available on the Internet at: http://www.europarl.europa.eu/studies DISCLAIMER The opinions expressed in this document are the sole responsibility of the author and do not necessarily represent the official position of the European Parliament. -
Foreign Intelligence Surveillance Act of 1978
FOREIGN INTELLIGENCE SURVEILLANCE ACT OF 1978 HEARINGS BEFORE THE SUBCOMMITTEE ON INTELLIGENCE AND THE RIGHTS OF AMERICANS OF THE SELECT COMMITTEE ON INTELLIGENCE OF THE UNITED STATES SENATE NINETY-FIFTH CONGRESS SECOND SESSION ON S. 1566 FOREIGN INTELLIGENCE SURVEILLANCE ACT O1 1978 JTLY 19, 21, 1977 AND FEBRUARY 8, 24, 27, 1978 Printed for the use of the Select Committee on Intelligence U.S. GOVERNMENT PRINTING OFFICE 94-628 WASHINGTON: 1978 For sale by the Superintendent of Documents, U.S. Government Printing Office Washington, D.C. 20402 Stock Number 052-070-04477-2 SENATE SELECT COMMITTEE ON INTELLIGENCE (Established by S. Res. 400, 94th Cong., 2d sess.) DANIEL K. INOUYE, Hawaii, Chairman BARRY GOLDWATER, Arizona, Vice Chairman BIRCH BAYE, Indiana CLIFFORD P. CASE, New Jersey ADLAI E. STEVENSON, Illinois JA GMEN, Utah WILLIAM D. HATHAWAY, Maine CHARLES McC. MATHIAS, Sn., Maryland WALTER D. HUDDLESTON, Kentucky JAMES B. PEARSON, Kansas JOSEPH R. BIDEN, J., Delaware JOHN H. CHAFES, Rhode Island ROBERT MORGAN, North Carolina RICHARD G. LUGAR, Indiana GARY HART, Colorado MALCOLM WALLOP, Wyoming DANIEL PATRICK MOYNIHAN, New York ROBERT C. BYRD, West Virginia, Ew Officio Member HOWARD H. BAKER, JR., Tennessee, Ex Officio Member WILLIAM 0. MILLER, Staff Director EARL D.EIsHNHOWER, Minority Staff Director AUDREY H. HATCR, Chief Clerk SUBCOsMITTE ON INTELLIGENCE AND THE ]RIGHTS OF AMERICANS BIRCH BAYH, Indiana, Chiran SAKE GARN, Utah, Vice Chairman ROBERT MORGAN, North Carolina CLIFFORD P. CASE, New Jersey DANIEL PATRICK MOYNIHAN, New York JOHN H. CHAFEE, Rhode Island CONTENTS HEARING DAYS Page Tuesday, July 19, 1977 1----. Thursday, July 21, 1977---------------------------------------------- 45 Wednesday, February 8, 1978 ----------------------------------------- 87 Friday, February 24, 1978 ------------------------------------------- 185 Monday, February 27, 1978 ------------------------------------------- 11 LIST OF WITNESSES TUESDAY, JULY 19, 1977 Testimony of Griffin B. -
Big Data and Sexual Surveillance
APC ISSUE PAPERS BIG DATA AND SEXUAL SURVEILLANCE By Nicole Shephard KEYWORDS: surveillance, gender, sexuality, race, big data, LGBTIQ, women human rights defenders, privacy, anonymity, consent of surveillance. In addition to exposing and addressing SUMMARY algorithmic discriminations, feminist data practices oppose the non-consensual collection of data, amplify participatory urveillance has historically functioned as an op- data projects that empower women and sexual minorities, pressive tool to control women’s bodies and is and protect the data, privacy and anonymity of activists and closely related to colonial modes of managing the communities they work with. populations. Big data, metadata and the tech- nologies used to collect, store and analyse them are by no means neutral, but come with their own exclusions and biases. This paper highlights the gendered and racialised effects of data practices; outlines the overlap- MAIN CONCEPTS ping nature of state, commercial and peer surveillance; and maps the challenges and opportunities women and queers Big data: Vast datasets containing social media data, encounter on the nexus between data, surveillance, gen- machine data or transactional data that can be analysed der and sexuality. Vulnerable communities as well as sexual computationally to reveal patterns, trends and predic- rights activists are at heightened risk of data-driven modes tions about human behaviour and social life. Dr Nicole Shephard is an independent researcher and writer working on the intersections between gender, sexuality and technology. She holds a PhD in Gender (LSE) and an MSc in International Development (University of Bristol). 2 / ISSUE PAPERS Metadata: Information describing other data; in the context surveillance practices in the private as well as in the of email, telephone calls or instant messaging, metadata public sphere.6 includes the sender, receiver, devices, locations, service provid- • Big data is generated in many places – social media, global ers, IP addresses, time, length or size of a message. -
Intelligence Ethics: an Uncompleted Project
1 Intelligence Ethics: An Uncompleted Project Michael Andregg, University of St. Thomas in St. Paul, MN, USA, [email protected] for the 2018 ISA Conference in San Francisco, TB-57, April 5, 2018, 10:30 am – 12:15 pm [submitted to INASIS in Brazil but no news back] abstract d-7 The International Studies Association (ISA) helped to develop a very slowly emerging sub-field called intelligence ethics. ISA’s Intelligence Studies Section has been a venue for many efforts to develop literature on ethics for spies. For one example, we hosted three panels with 18 papers on that topic in 2007, contributing to a reader on intelligence ethics that was used by the CIA and DIA for a while. 1 Dr. Jan Goldman of the NIU, FBI and other positions, also presented papers at ISA, and edited the “Scarecrow Professional Intelligence Education Series” that published 13 books, three focused on ethics for intelligence professionals. He started an international ethics association, and a peer-reviewed journal. 2 However, this worthy effort to professionalize intelligence education with an ethical dimension was and remains greatly slowed by something Dr. Goldman labeled “ethics phobia” among the bureaucracies. The association is now dormant and the journal’s last print edition was in 2013. Senior executive Brian Snow also tried at NSA, where a team of colleagues created a model code of ethics for collectors that did not gain traction for similar reasons. Individual and institutional concerns result in a “fear” of ethics among many three-letter US-IC agencies. 3 What agencies fear, practitioners avoid because children need feeding and pensions have meaning. -
Information Awareness Office
Article Talk Read Edit View history Search Wikipedia Wiki Loves Monuments: Photograph a monument, help Wikipedia and win! Learn more Main page Contents Featured content Information Awareness Office Current events From Wikipedia, the free encyclopedia Random article Donate to Wikipedia The Information Awareness Wikipedia store Office (IAO) was established by the Interaction United States Defense Advanced Help Research Projects Agency About Wikipedia (DARPA) in January 2002 to bring Community portal together several DARPA projects Recent changes focused on applying surveillance Contact page and information technology to track Tools and monitor terrorists and other What links here asymmetric threats to U.S. national Related changes security by achieving "Total Upload file Information Awareness" Special pages (TIA).[4][5][6] Permanent link [1][2] Page information This was achieved by creating Information Awareness Office seal (motto: lat. scientia est potentia – knowledge is Wikidata item enormous computer databases to power[3]) Cite this page gather and store the personal information of everyone in the Print/export Part of a series on United States, including personal e- Create a book Global surveillance Download as PDF mails, social networks, credit card Printable version records, phone calls, medical records, and numerous other sources, without Languages any requirement for a search Català warrant.[7] This information was then Disclosures Deutsch Origins · Pre-2013 · 2013–present · Reactions analyzed to look for suspicious Français Systems activities, connections between Italiano XKeyscore · PRISM · ECHELON · Carnivore · [8] Suomi individuals, and "threats". Dishfire · Stone Ghost · Tempora · Frenchelon Svenska Additionally, the program included · Fairview · MYSTIC · DCSN · Edit links funding for biometric surveillance Boundless Informant · Bullrun · Pinwale · Stingray · SORM · RAMPART-A technologies that could identify and Agencies track individuals using surveillance NSA · BND · CNI · ASIO · DGSE · Five Eyes · [8] cameras, and other methods. -
Hearings to Examine Threats, Responses, and Regional Considerations Surrounding Iraq
S. HRG. 107–658 HEARINGS TO EXAMINE THREATS, RESPONSES, AND REGIONAL CONSIDERATIONS SURROUNDING IRAQ HEARINGS BEFORE THE COMMITTEE ON FOREIGN RELATIONS UNITED STATES SENATE ONE HUNDRED SEVENTH CONGRESS SECOND SESSION JULY 31 AND AUGUST 1, 2002 Printed for the use of the Committee on Foreign Relations ( Available via the World Wide Web: http://www.access.gpo.gov/congress/senate U.S. GOVERNMENT PRINTING OFFICE 81–697 PDF WASHINGTON : 2002 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2250 Mail: Stop SSOP, Washington, DC 20402–0001 VerDate 11-MAY-2000 18:09 Sep 20, 2002 Jkt 000000 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 81697 SFRELA1 PsN: SFRELA1 COMMITTEE ON FOREIGN RELATIONS JOSEPH R. BIDEN, JR., Delaware, Chairman PAUL S. SARBANES, Maryland JESSE HELMS, North Carolina CHRISTOPHER J. DODD, Connecticut RICHARD G. LUGAR, Indiana JOHN F. KERRY, Massachusetts CHUCK HAGEL, Nebraska RUSSELL D. FEINGOLD, Wisconsin GORDON H. SMITH, Oregon PAUL D. WELLSTONE, Minnesota BILL FRIST, Tennessee BARBARA BOXER, California LINCOLN D. CHAFEE, Rhode Island ROBERT G. TORRICELLI, New Jersey GEORGE ALLEN, Virginia BILL NELSON, Florida SAM BROWNBACK, Kansas JOHN D. ROCKEFELLER IV, West Virginia MICHAEL B. ENZI, Wyoming ANTONY J. BLINKEN, Staff Director PATRICIA A. MCNERNEY, Republican Staff Director (II) VerDate 11-MAY-2000 18:09 Sep 20, 2002 Jkt 000000 PO 00000 Frm 00002 Fmt 5904 Sfmt 5904 81697 SFRELA1 PsN: SFRELA1 CONTENTS WEDNESDAY, JULY 31, 2002 Page Ajami, Prof. Fouad, Majid Khadduri professor and director of Middle East Studies, School of Advanced International Studies, Johns Hopkins Univer- sity, Washington, DC ..........................................................................................