Domestic Surveillance: the Effect of Education on Public Opinion

Total Page:16

File Type:pdf, Size:1020Kb

Domestic Surveillance: the Effect of Education on Public Opinion DOMESTIC SURVEILLANCE: EDUCATION AND PUBLIC OPINION Item Type text; Electronic Thesis Authors Urity, Mounica Publisher The University of Arizona. Rights Copyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author. Download date 01/10/2021 18:02:02 Item License http://rightsstatements.org/vocab/InC/1.0/ Link to Item http://hdl.handle.net/10150/613754 DOMESTIC SURVEILLANCE: EDUCATION AND PUBLIC OPINION By: Mounica Urity ____________________ A Thesis Submitted to The Honors College In Partial Fulfillment of the Bachelor’s degree With Honors in Management Information Systems The University of Arizona MAY 2016 Approved by: ____________________ Suzanne Weisband Department of Management Information Systems Table of Contents Abstract ........................................................................................................................................... 4 Introduction ..................................................................................................................................... 4 Background Information ................................................................................................................. 5 Surveillance Programs .................................................................................................................... 6 Stellar Wind ................................................................................................................................ 6 PRISM ........................................................................................................................................ 7 Blarney ........................................................................................................................................ 8 XKEYSCORE ............................................................................................................................. 9 Surveillance Concerns .................................................................................................................. 10 Invasion of Privacy ................................................................................................................... 10 Metadata ................................................................................................................................ 11 Surveillance Abuse ................................................................................................................... 12 Ineffective National Security ................................................................................................... 13 Public Reaction ............................................................................................................................. 13 Methodology ................................................................................................................................. 15 Research Questions .................................................................................................................. 15 Sample ....................................................................................................................................... 16 Results ....................................................................................................................................... 16 Preliminary Analysis ............................................................................................................. 16 Further Analysis .................................................................................................................... 18 Discussion ................................................................................................................................. 21 References ..................................................................................................................................... 23 Figure 1. FISA Orders and FISC Court Orders ............................................................................ 26 Figure 2. Details about PRISM ..................................................................................................... 27 2 Figure 3. PRISM Programs Timeline ........................................................................................... 28 Figure 4. Degrees of Separation.................................................................................................... 29 Figure 5. Upstream Collection ...................................................................................................... 30 Figure 6. Changes in Search-Term Volume after PRISM Leak ................................................... 31 Figure 7. Changes in Web Search Volume after PRISM Leak ..................................................... 32 Figure 8. Survey Responses about Current Events ....................................................................... 33 Figure 9. Survey Responses about Password Behavior ................................................................ 34 Abstract In 2013, Edward Snowden revealed thousands of classified documents that revealed a mass surveillance program run by the United States’ National Security Agency. The most shocking detail in the leak is that the United States government spies on its own citizens and collects terabytes of data every day. In the three years since the Snowden revelations, the media has covered these programs constantly. In addition, many civil rights groups have protested the surveillance programs saying they are unconstitutional and are flagrant privacy violations. However, much of the general public does not understand the programs or how they are affected by surveillance. This paper will investigate how much people know about surveillance programs, if they are concerned about their online privacy, and see if there is a relationship between the two. Introduction The history of intelligence1 and surveillance in the United States began well before it became a nation (Andrew). George Washington even wrote that “gaining intelligence…was one of his most immediate and pressing duties” (Andrew). However, the early Republic had a large distrust of standing armies that dates back to its colonial days. Due to this, intelligence was seen as “a necessary evil” that was only utilized in wartime (Tidd). This was the prevalent view until the attack on Pearl Harbor in 1941; it changed America’s perception of intelligence being a “necessary evil.” The next major milestone in US intelligence is the Cold War that led to the creation of the National Security Agency (Tidd). The NSA continued to grow at a steady rate until 9/11. After which, the NSA’s workforce grew by a third and its budget doubled (Priest). 1 Intelligence: information gathered and prepared with the express intent of helping officials make and carry out decisions (Warner) This growth continued unchecked until Edward Snowden, a NSA whistleblower, revealed classified documents about their global surveillance programs (Harding). While he was not the first whistleblower, he made the biggest impact. Even though mass surveillance programs affect everyone, many people still do not know the full extent of these programs or understand why being educated about them are important. This paper will investigate three main questions: how much people know about surveillance programs, if they are concerned about their online privacy, and see if there is a relationship between the two. Background Information In June 2013, Edward Snowden, a NSA contractor, started revealing more than a million classified documents about the domestic and global surveillance programs conducted by the National Security Agency (Strohm and Wilber). It all started in 2012 when Snowden anonymously contacted journalist Glenn Greenwald and filmmaker Laura Poitras about many secret government programs that were a part of the US global surveillance system. When he contacted these two journalists, he knew that he might never again be able to set foot in the United States and that he could be tried as a traitor. But he felt that the public needed to know that the government was abusing and violating the law. Moreover, he felt it was up to the public to decide if the government should continue to participate in those programs (Goetz and Heilbuth). I want to note that this paper is not going to investigate the legality or morality of Edward Snowden’s actions, nor is it a political statement about the government’s actions. The focus of this paper is to investigate people’s knowledge about these programs and their opinions about domestic surveillance. Surveillance Programs The following sections are not an exhaustive list of the surveillance programs conducted by the NSA. I will discuss programs that were released in the Snowden Leak that have the largest impact. In addition, as this paper is about domestic surveillance, the discussion will be centered on how these programs affect people on American soil and American citizens. Stellar Wind As mentioned before, after 9/11 the National Security Agency gained a lot of power and money. This is in part due to Stellar Wind, a secret system that allowed intelligence agencies to collect the information of anyone, including monitoring the phone calls and emails of millions of Americans, without a warrant under the pretext of fighting terrorism (The Guardian). Prior to the Presidential
Recommended publications
  • Cyber Violence Against Women and Girls
    CYBER VIOLENCE AGAINST WOMEN AND GIRLS A WORLD-WIDE WAKE-UP CALL 2015 Photo credits:Shutterstock A REPORT BY THE UN BROADBAND COMMISSION FOR DIGITAL DEVELOPMENT WORKING GROUP ON BROADBAND AND GENDER CYBER VIOLENCE AGAINST WOMEN AND GIRLS: A WORLD-WIDE WAKE-UP CALL Acknowledgements This Report has been written collaboratively, drawing on insights and rich contributions from a range of Commissioners and Expert Members of the Working Group on Broadband and Gender. It has been researched and compiled by lead author Nidhi Tandon, assisted by Shannon Pritchard, with editorial inputs by teams from UN Women, UNDP and ITU. Design concepts were developed by Céline Desthomas of ITU. We wish to thank the following people for their contributions and kind review and comments (listed in alphabetical order of institution, followed by alphabetical order of surname): Dafne Sabanes Plou, Jac sm Kee and Chat Garcia Ramilo (APC); Dr Nancy Hafkin; Minerva Novero- Belec (UNDP); Corat Suniye Gulser (UNESCO); Jennifer Breslin and team (UN Women); Samia Melhem and team (World Bank). About the Commission The Broadband Commission for Digital Development was launched by the International Telecommunication Union (ITU) and the United Nations Educational, Scientific and Cultural Organization (UNESCO) in response to UN Secretary-General Ban Ki-moon’s call to step up efforts to meet the Millennium Development Goals. Established in May 2010, the Commission unites top industry executives with government leaders, thought leaders and policy pioneers and international agencies and organizations concerned with development. The Broadband Commission embraces a range of different perspectives in a multi-stakeholder approach to promoting the roll-out of broadband, as well as providing a fresh approach to UN and business engagement.
    [Show full text]
  • Understanding Schrems II and Its Impact on the EU-US Privacy Shield
    EU Data Transfer Requirements and U.S. Intelligence Laws: Understanding Schrems II and Its Impact on the EU-U.S. Privacy Shield March 17, 2021 Congressional Research Service https://crsreports.congress.gov R46724 SUMMARY R46724 EU Data Transfer Requirements and U.S. March 17, 2021 Intelligence Laws: Understanding Schrems II Chris D. Linebaugh and Its Impact on the EU-U.S. Privacy Shield Legislative Attorney On July 16, 2020, in a decision referred to as Schrems II, the Court of Justice of the European Edward C. Liu Union (CJEU) invalidated the EU-U.S. Privacy Shield (Privacy Shield). Privacy Shield is a Legislative Attorney framework developed by the European Union (EU) and the United States to facilitate cross- border transfers of personal data for commercial purposes. Privacy Shield requires companies and organizations that participate in the program to abide by various data protection requirements and, in return, assures the participants that the transfer is compliant with EU law. The CJEU, however, found Privacy Shield inadequate in part because it does not restrain U.S. intelligence authorities’ data collection activities. According to the CJEU, U.S. law allows intelligence agencies to collect and use the personal data transferred under the Privacy Shield framework in a manner that is inconsistent with rights guaranteed under EU law. The CJEU focused on Section 702 of the Foreign Intelligence Surveillance Act, Executive Order 12333, and Presidential Policy Directive 28, which govern how the U.S. government may conduct surveillance of non-U.S. persons located outside of the United States. The CJEU’s Schrems II ruling has significant implications for personal data transfers between the EU and the United States.
    [Show full text]
  • Through a PRISM, Darkly(PDF)
    NANOG 59 – October 7, 2013 Through a PRISM, Darkly Mark Rumold Staff Attorney, EFF NANOG 59 – October 7, 2013 Electronic Frontier Foundation NANOG 59 – October 7, 2013 NANOG 59 – October 7, 2013 NANOG 59 – October 7, 2013 What we’ll cover today: • Background; what we know; what the problems are; and what we’re doing • Codenames. From Stellar Wind to the President’s Surveillance Program, PRISM to Boundless Informant • Spying Law. A healthy dose of acronyms and numbers. ECPA, FISA and FAA; 215 and 702. NANOG 59 – October 7, 2013 the background NANOG 59 – October 7, 2013 changes technologytimelaws …yet much has stayed the same NANOG 59 – October 7, 2013 The (Way) Background • Established in 1952 • Twin mission: – “Information Assurance” – “Signals Intelligence” • Secrecy: – “No Such Agency” & “Never Say Anything” NANOG 59 – October 7, 2013 The (Mid) Background • 1960s and 70s • Cold War and Vietnam • COINTELPRO and Watergate NANOG 59 – October 7, 2013 The Church Committee “[The NSA’s] capability at any time could be turned around on the American people and no American would have any privacy left, such is the capability to monitor everything. Telephone conversations, telegrams, it doesn't matter. There would be no place to hide.” Senator Frank Church, 1975 NANOG 59 – October 7, 2013 Reform • Permanent Congressional oversight committees (SSCI and HPSCI) • Foreign Intelligence Surveillance Act (FISA) – Established requirements for conducting domestic electronic surveillance of US persons – Still given free reign for international communications conducted outside U.S. NANOG 59 – October 7, 2013 Changing Technology • 1980s - 2000s: build-out of domestic surveillance infrastructure • NSA shifted surveillance focus from satellites to fiber optic cables • BUT: FISA gives greater protection for communications on the wire + surveillance conducted inside the U.S.
    [Show full text]
  • What Is Xkeyscore, and Can It 'Eavesdrop on Everyone, Everywhere'? (+Video) - Csmonitor.Com
    8/3/13 What is XKeyscore, and can it 'eavesdrop on everyone, everywhere'? (+video) - CSMonitor.com The Christian Science Monitor ­ CSMonitor.com What is XKeyscore, and can it 'eavesdrop on everyone, everywhere'? (+video) XKeyscore is apparently a tool the NSA uses to sift through massive amounts of data. Critics say it allows the NSA to dip into people's 'most private thoughts' – a claim key lawmakers reject. This photo shows an aerial view of the NSA's Utah Data Center in Bluffdale, Utah. The long, squat buildings span 1.5 million square feet, and are filled with super­ powered computers designed to store massive amounts of information gathered secretly from phone calls and e­mails. (Rick Bowmer/AP/File) By Mark Clayton, Staff writer / August 1, 2013 at 9:38 pm EDT Top­secret documents leaked to The Guardian newspaper have set off a new round of debate over National Security Agency surveillance of electronic communications, with some cyber experts saying the trove reveals new and more dangerous means of digital snooping, while some members of Congress suggested that interpretation was incorrect. The NSA's collection of "metadata" – basic call logs of phone numbers, time of the call, and duration of calls – is now well­known, with the Senate holding a hearing on the subject this week. But the tools discussed in the new Guardian documents apparently go beyond mere collection, allowing the agency to sift through the www.csmonitor.com/layout/set/print/USA/2013/0801/What-is-XKeyscore-and-can-it-eavesdrop-on-everyone-everywhere-video 1/4 8/3/13 What is XKeyscore, and can it 'eavesdrop on everyone, everywhere'? (+video) - CSMonitor.com haystack of digital global communications to find the needle of terrorist activity.
    [Show full text]
  • The Right to Privacy and the Future of Mass Surveillance’
    ‘The Right to Privacy and the Future of Mass Surveillance’ ABSTRACT This article considers the feasibility of the adoption by the Council of Europe Member States of a multilateral binding treaty, called the Intelligence Codex (the Codex), aimed at regulating the working methods of state intelligence agencies. The Codex is the result of deep concerns about mass surveillance practices conducted by the United States’ National Security Agency (NSA) and the United Kingdom Government Communications Headquarters (GCHQ). The article explores the reasons for such a treaty. To that end, it identifies the discriminatory nature of the United States’ and the United Kingdom’s domestic legislation, pursuant to which foreign cyber surveillance programmes are operated, which reinforces the need to broaden the scope of extraterritorial application of the human rights treaties. Furthermore, it demonstrates that the US and UK foreign mass surveillance se practices interferes with the right to privacy of communications and cannot be justified under Article 17 ICCPR and Article 8 ECHR. As mass surveillance seems set to continue unabated, the article supports the calls from the Council of Europe to ban cyber espionage and mass untargeted cyber surveillance. The response to the proposal of a legally binding Intelligence Codexhard law solution to mass surveillance problem from the 47 Council of Europe governments has been so far muted, however a soft law option may be a viable way forward. Key Words: privacy, cyber surveillance, non-discrimination, Intelligence Codex, soft law. Introduction Peacetime espionage is by no means a new phenomenon in international relations.1 It has always been a prevalent method of gathering intelligence from afar, including through electronic means.2 However, foreign cyber surveillance on the scale revealed by Edward Snowden performed by the United States National Security Agency (NSA), the United Kingdom Government Communications Headquarters (GCHQ) and their Five Eyes partners3 1 Geoffrey B.
    [Show full text]
  • Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities
    University of Central Florida STARS HIM 1990-2015 2013 Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities Mark Berrios-Ayala University of Central Florida Part of the Legal Studies Commons Find similar works at: https://stars.library.ucf.edu/honorstheses1990-2015 University of Central Florida Libraries http://library.ucf.edu This Open Access is brought to you for free and open access by STARS. It has been accepted for inclusion in HIM 1990-2015 by an authorized administrator of STARS. For more information, please contact [email protected]. Recommended Citation Berrios-Ayala, Mark, "Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities" (2013). HIM 1990-2015. 1519. https://stars.library.ucf.edu/honorstheses1990-2015/1519 BRAVE NEW WORLD RELOADED: ADVOCATING FOR BASIC CONSTITUTIONAL SEARCH PROTECTIONS TO APPLY TO CELL PHONES FROM EAVESDROPPING AND TRACKING BY THE GOVERNMENT AND CORPORATE ENTITIES by MARK KENNETH BERRIOS-AYALA A thesis submitted in partial fulfillment of the requirements for the Honors in the Major Program in Legal Studies in the College of Health and Public Affairs and in The Burnett Honors College at the University of Central Florida Orlando, Florida Fall Term 2013 Thesis Chair: Dr. Abby Milon ABSTRACT Imagine a world where someone’s personal information is constantly compromised, where federal government entities AKA Big Brother always knows what anyone is Googling, who an individual is texting, and their emoticons on Twitter.
    [Show full text]
  • A Failure of Intelligence: the Echelon Interception System & the Fundamental Right to Privacy in Europe
    Pace International Law Review Volume 14 Issue 2 Fall 2002 Article 7 September 2002 Post-Sept. 11th International Surveillance Activity - A Failure of Intelligence: The Echelon Interception System & the Fundamental Right to Privacy in Europe Kevin J. Lawner Follow this and additional works at: https://digitalcommons.pace.edu/pilr Recommended Citation Kevin J. Lawner, Post-Sept. 11th International Surveillance Activity - A Failure of Intelligence: The Echelon Interception System & the Fundamental Right to Privacy in Europe, 14 Pace Int'l L. Rev. 435 (2002) Available at: https://digitalcommons.pace.edu/pilr/vol14/iss2/7 This Article is brought to you for free and open access by the School of Law at DigitalCommons@Pace. It has been accepted for inclusion in Pace International Law Review by an authorized administrator of DigitalCommons@Pace. For more information, please contact [email protected]. POST-SEPT. 11TH INTERNATIONAL SURVEILLANCE ACTIVITY - A FAILURE OF INTELLIGENCE: THE ECHELON INTERCEPTION SYSTEM & THE FUNDAMENTAL RIGHT TO PRIVACY IN EUROPE Kevin J. Lawner* I. Introduction ....................................... 436 II. Communications Intelligence & the United Kingdom - United States Security Agreement ..... 443 A. September 11th - A Failure of Intelligence .... 446 B. The Three Warning Flags ..................... 449 III. The Echelon Interception System .................. 452 A. The Menwith Hill and Bad Aibling Interception Stations .......................... 452 B. Echelon: The Abuse of Power .................. 454 IV. Anti-Terror Measures in the Wake of September 11th ............................................... 456 V. Surveillance Activity and the Fundamental Right to Privacy in Europe .............................. 460 A. The United Nations International Covenant on Civil and Political Rights and the Charter of Fundamental Rights of the European Union... 464 B.
    [Show full text]
  • The Nsa's Prism Program and the New Eu Privacy Regulation: Why U.S
    American University Business Law Review Volume 3 | Issue 2 Article 5 2013 The SN A'S Prism Program And The ewN EU Privacy Regulation: Why U.S. Companies With A Presence In The EU ouldC Be In Trouble Juhi Tariq American University Washington College of Law Follow this and additional works at: http://digitalcommons.wcl.american.edu/aublr Part of the International Law Commons, and the Internet Law Commons Recommended Citation Tariq, Juhi "The SAN 'S Prism Program And The eN w EU Privacy Regulation: Why U.S. Companies With A Presence In The EU ouldC Be In Trouble," American University Business Law Review, Vol. 3, No. 2 (2018) . Available at: http://digitalcommons.wcl.american.edu/aublr/vol3/iss2/5 This Note is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in American University Business Law Review by an authorized editor of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. NOTE THE NSA'S PRISM PROGRAM AND THE NEW EU PRIVACY REGULATION: WHY U.S. COMPANIES WITH A PRESENCE IN THE EU COULD BE IN TROUBLE JUHI TARIQ* Recent revelations about a clandestine data surveillance program operated by the NSA, Planning Tool for Resource Integration, Synchronization, and Management ("PRISM'), and a stringent proposed European Union ("EU") data protection regulation, will place U.S. companies with a businesspresence in EU member states in a problematic juxtaposition. The EU Proposed General Data Protection Regulation stipulates that a company can be fined up to two percent of its global revenue for misuse of users' data and requires the consent of data subjects prior to access.
    [Show full text]
  • Summary of U.S. Foreign Intelligence Surveillance Law, Practice, Remedies, and Oversight
    ___________________________ SUMMARY OF U.S. FOREIGN INTELLIGENCE SURVEILLANCE LAW, PRACTICE, REMEDIES, AND OVERSIGHT ASHLEY GORSKI AMERICAN CIVIL LIBERTIES UNION FOUNDATION AUGUST 30, 2018 _________________________________ TABLE OF CONTENTS QUALIFICATIONS AS AN EXPERT ............................................................................................. iii INTRODUCTION ......................................................................................................................... 1 I. U.S. Surveillance Law and Practice ................................................................................... 2 A. Legal Framework ......................................................................................................... 3 1. Presidential Power to Conduct Foreign Intelligence Surveillance ....................... 3 2. The Expansion of U.S. Government Surveillance .................................................. 4 B. The Foreign Intelligence Surveillance Act of 1978 ..................................................... 5 1. Traditional FISA: Individual Orders ..................................................................... 6 2. Bulk Searches Under Traditional FISA ................................................................. 7 C. Section 702 of the Foreign Intelligence Surveillance Act ........................................... 8 D. How The U.S. Government Uses Section 702 in Practice ......................................... 12 1. Data Collection: PRISM and Upstream Surveillance ........................................
    [Show full text]
  • Ashley Deeks*
    ARTICLE An International Legal Framework for Surveillance ASHLEY DEEKS* Edward Snowden’s leaks laid bare the scope and breadth of the electronic surveillance that the U.S. National Security Agency and its foreign counterparts conduct. Suddenly, foreign surveillance is understood as personal and pervasive, capturing the communications not only of foreign leaders but also of private citizens. Yet to the chagrin of many state leaders, academics, and foreign citizens, international law has had little to say about foreign surveillance. Until recently, no court, treaty body, or government had suggested that international law, including basic privacy protections in human rights treaties, applied to purely foreign intelligence collection. This is now changing: Several UN bodies, judicial tribunals, U.S. corporations, and individuals subject to foreign surveillance are pressuring states to bring that surveillance under tighter legal control. This Article tackles three key, interrelated puzzles associated with this sudden transformation. First, it explores why international law has had so little to say about how, when, and where governments may spy on other states’ nationals. Second, it draws on international relations theory to argue that the development of new international norms regarding surveillance is both likely and essential. Third, it identifies six process-driven norms that states can and should adopt to ensure meaningful privacy restrictions on international surveillance without unduly harming their legitimate national security interests. These norms, which include limits on the use of collected data, periodic reviews of surveillance authorizations, and active oversight by neutral bodies, will increase the transparency, accountability, and legitimacy of foreign surveillance. This procedural approach challenges the limited emerging scholarship on surveillance, which urges states to apply existing — but vague and contested — substantive human rights norms to complicated, clandestine practices.
    [Show full text]
  • Mass Surveillance
    Mass Surveillance Mass Surveillance What are the risks for the citizens and the opportunities for the European Information Society? What are the possible mitigation strategies? Part 1 - Risks and opportunities raised by the current generation of network services and applications Study IP/G/STOA/FWC-2013-1/LOT 9/C5/SC1 January 2015 PE 527.409 STOA - Science and Technology Options Assessment The STOA project “Mass Surveillance Part 1 – Risks, Opportunities and Mitigation Strategies” was carried out by TECNALIA Research and Investigation in Spain. AUTHORS Arkaitz Gamino Garcia Concepción Cortes Velasco Eider Iturbe Zamalloa Erkuden Rios Velasco Iñaki Eguía Elejabarrieta Javier Herrera Lotero Jason Mansell (Linguistic Review) José Javier Larrañeta Ibañez Stefan Schuster (Editor) The authors acknowledge and would like to thank the following experts for their contributions to this report: Prof. Nigel Smart, University of Bristol; Matteo E. Bonfanti PhD, Research Fellow in International Law and Security, Scuola Superiore Sant’Anna Pisa; Prof. Fred Piper, University of London; Caspar Bowden, independent privacy researcher; Maria Pilar Torres Bruna, Head of Cybersecurity, Everis Aerospace, Defense and Security; Prof. Kenny Paterson, University of London; Agustín Martin and Luis Hernández Encinas, Tenured Scientists, Department of Information Processing and Cryptography (Cryptology and Information Security Group), CSIC; Alessandro Zanasi, Zanasi & Partners; Fernando Acero, Expert on Open Source Software; Luigi Coppolino,Università degli Studi di Napoli; Marcello Antonucci, EZNESS srl; Rachel Oldroyd, Managing Editor of The Bureau of Investigative Journalism; Peter Kruse, Founder of CSIS Security Group A/S; Ryan Gallagher, investigative Reporter of The Intercept; Capitán Alberto Redondo, Guardia Civil; Prof. Bart Preneel, KU Leuven; Raoul Chiesa, Security Brokers SCpA, CyberDefcon Ltd.; Prof.
    [Show full text]
  • April 11, 2014 Privacy and Civil Liberties Oversight Board 2100 K St
    April 11, 2014 Privacy and Civil Liberties Oversight Board 2100 K St. NW, Suite 500 Washington, D.C. 20427 Re: March 19, 2014 Public Hearing Dear Chairman Medine and Board Members: The Constitution Project (TCP) welcomes this opportunity to comment on the March 19, 2014 public hearing and to offer our views on whether the federal government’s surveillance programs operated under the authority of Section 702 of the Foreign Intelligence Surveillance Act (FISA), 50 U.S.C. § 1881a, properly balance efforts to protect the Nation with the need to protect privacy and civil liberties. TCP is a non-profit think tank and advocacy organization that brings together unlikely allies—experts and practitioners from across the political spectrum—to develop consensus-based solutions to some of the most difficult constitutional challenges of our time. TCP’s bipartisan Liberty and Security Committee, comprised of former elected officials, former members of the law enforcement and intelligence communities, as well as legal academics, practitioners and advocates, previously made recommendations for statutory amendments to add warrant requirements and increase judicial and congressional oversight of Section 702 programs. See TCP’s September 2012 Report on the FISA Amendments Act. Liberty and Security Committee members convened following the PCLOB’s March 19, 2014 hearing, discussed the witness testimony and other newly available information, and agreed to reaffirm their previous policy on Section 702, with the following additional comments and recommendations.1 I. The Operation of Section 702 Our comments are supported by information about the operation of Section 702 recently revealed through declassified Foreign Intelligence Surveillance Court (FISC) opinions and leaks by National Security Agency (NSA) contractor Edward Snowden.
    [Show full text]