Notes from No Place to Hide

Total Page:16

File Type:pdf, Size:1020Kb

Notes from No Place to Hide NOTES FROM NO PLACE TO HIDE BUY THE BOOK: E-BOOK GLENNGREENWALD.NET NOTES INTRODUCTION 3 the British government’s surreptitious opening of mail David Vincent, Th e Culture of Secrecy in Britain, 1832– 1998 (Oxford: Oxford University Press, 1998), 1– 14. 3 the US Bureau of Investigation Peter Conolly-Smith, “ ‘Reading Between the Lines’: Th e Bureau of Investigation, the United States Post Offi ce, and Domestic Surveillance During World War I,” Social Justice 36, no. 1 (2009): 7– 24. 4 the British and French empires Daniel Brückenhaus, “Every Stranger Must Be Suspected: Trust Relationships and the Surveillance of Anti- Colonialists in Early Twentieth- Century Western Eu rope,” Geschichte und Gesellschaft 36 (2010): 523– 66. 4 Syria’s Assad regime fl ew in employees Ben Elgin and Vernon Silver, “Syria Crackdown Gets Italy Firm’s Aid with U.S.- Europe Spy Gear,” Bloom- berg News, November 3, 2011. 4 Mubarak’s secret police bought tools Steve Stecklow, Paul Sonne, and Matt Bradley, “Mideast Uses Western Tools to Battle the Skype Rebel- lion,” Wall Street Journal, June 1, 2011. 4 “a wall of black refrigerator-size devices” Margaret Coker and Paul 020-58305_ch02_3P.indd 261 6/6/14 11:50 AM 262 NOTES Sonne, “Life Under the Gaze of Gadhafi ’s Spies,” Wall Street Journal, December 14, 2011; Paul Sonne and Margaret Coker, “Firms Aided Libyan Spies,” Wall Street Journal, August 30, 2011. 5 “Th e Internet in China” United States House of Representatives, “Th e Internet in China: A Tool for Freedom or Suppression?” 109th Cong., 2nd sess., February 15, 2006. CHAPTER 1: CONTACT 11 interrogations to which Poitras had been subjected Glenn Greenwald, “U.S. Filmmaker Repeatedly Detained at Border,” Salon, April 8, 2012. 13 possibility of passing on fraudulent documents “U.S. Intelligence Planned to Destroy WikiLeaks,” WikiLeaks .org, March 15, 2010, http:// w w w . w i k i l e a k s . o r g / w i k i / U . S . _ I n t e l l i g e n c e _ p l a n n e d _ t o _ d e s t r o y _ WikiLeaks, _18 _Mar _2008 . CHAPTER 2: TEN DAYS IN HONG KONG 37 Prosecution of alleged New York mobsters United States of America v. John Tomero et al., Defendants, S2 06 Crim. 0008, United States District Court (S.D. New York, November 27, 2006). 44 In July 2013 the New York Times confi rmed Christopher Drew and Scott Shane, “Résumé Shows Snowden Honed Hacking Skills,” New York Times, July 4, 2013. 54 systematically amplifi ed pro- war voices Howard Kurtz, “Th e Post on WMDs: An Inside Story,” Washington Post, August 12, 2004. 55 caused the New York Times to conceal the existence James Risen and Eric Lichtblau, “Bush Lets U.S. Spy on Callers Without Courts,” New York Times, December 16, 2005. 55 Risen was about to publish the revelations in his book Eric Lichtblau, “Th e Education of a 9/11 Reporter: Th e Inside Drama Behind the Times’ Warrantless Wiretapping Story,” Slate, March 26, 2008. 60 rec ords of reporters and editors from the Associated Press Mark Sher- man, “Government Obtains Wide AP Phone Rec ords in Probe,” Associated Press, May 13, 2013. 020-58305_ch02_3P.indd 262 6/6/14 11:50 AM NOTES 263 60 accusing Fox News Washington bureau chief James Rosen Ann E. Mari- mow, “A Rare Peek into a Justice Department Leak Probe,” Washington Post, May 19, 2013. 71 a harsh denunciation of the administration “President Obama’s Drag- net,” New York Times, June 6, 2013. 71 Demo cratic senator Mark Udall issued a statement Dan Roberts and Spencer Ackerman, “Anger Swells Aft er NSA Phone Rec ords Court Order Revelations,” Guardian, June 6, 2013. 71 “the program could hardly be any more alarming” “ACLU Calls for End to Program, Disclosure of Program’s Scope, Congressional Investigation,” J u n e 5 , 2 0 1 3 , h t t p s : / / w w w . a c l u . o r g / n a t i o n a l - s e c u r i t y - t e c h n o l o g y - a n d - l i b e r t y / m a s s i v e - n s a - p h o n e - d a t a - m i n i n g - o p e r a t i o n - r e v e a l e d . 72 “is secret blanket surveillance obscenely outrageous?” Al Gore, Twitter posting, June 5, 2013, 6:39 p.m., https:// twitter .com /algore /sta- tus /342455655057211393 . CHAPTER 3: COLLECT IT ALL 95 “the most powerful intelligence chief” James Bamford, “Connecting the Dots on PRISM, Phone Surveillance, and the NSA’s Massive Spy Center,” Wired, June 12, 2013, http:// www .wired .com /2013 /06 /nsa -prism -verizon -surveillance /. 95 “I need to get all of the data” Shane Harris, “Th e Cowboy of the NSA,” Foreign Policy, September 9, 2013. 95 Alexander grew dissatisfi ed Ellen Nakashima and Joby Warrick, “For NSA Chief, Terrorist Th reat Drives Passion to ‘Collect It All,’ Observers Say,” Washington Post, July 14, 2013. 99 the Washington Post reported in 2010 Dana Priest and William M. Arkin, “A Hidden World, Growing Beyond Control,” Washington Post, July 19, 2010. 99 a 2012 interview with Democracy Now! William Binney, interview with Amy Goodman and Juan Gonzalez, Democracy Now!, April 20, 2012. 99 “the capacity to reach roughly 75% of all U.S. Internet traffi c” Siobhan Gorman and Jennifer Valentino-Devries, “New Details Show Broader NSA Surveillance Reach,” Wall Street Journal, August 20, 2013. 020-58305_ch02_3P.indd 263 6/6/14 11:50 AM 264 NOTES 101 “70 percent of our national intelligence bud get” Tim Shorrock, “Meet the Contractors Analyzing Your Private Data,” Salon, June 10, 2013. 103 BLARNEY relied on one relationship in par tic u lar Gorman and Valentino- Devries, “New Details Show Broader NSA Surveillance Reach.” 109 Bart Gellman, aft er receiving heavy criticism Robert O’Harrow Jr., Ellen Nakashima, and Barton Gellman, “U.S., Company Offi cials: Internet Sur- veillance Does Not Indiscriminately Mine Data,” Washington Post, June 9, 2013. 109 Chris Soghoian, the ACLU’s tech expert Elias Groll, “Th e PRISM Spin War Has Begun,” Foreign Policy, June 7, 2013. 112 described a slew of secret negotiations Claire Cain Miller, “Tech Com- panies Concede to Surveillance Program,” New York Times, June 7, 2013. 114 the revelations would surprise many Skype customers Glenn Green- wald, Ewen MacAskill, Laura Poitras, Spencer Ackerman, and Dominic Rushe, “Microsoft Handed the NSA Access to Encrypted Messages,” Guardian, July 11, 2013. 117 “nearly 100,000 computers around the world” David E. Sanger and Th om Shanker, “N.S.A. Devises Radio Pathway into Computers,” New York Times, January 14, 2014. 118 “Th e U.S. government has paid at least £100m” Nick Hopkins and Julian Borger, “NSA Pays £100m in Secret Funding for GCHQ,” Guardian, August 1, 2013. 119 Under the program name Tempora Ewen MacAskill, Julian Borger, Nick Hopkins, Nick Davies, and James Ball, “GCHQ Taps Fibre- Optic Cables for Secret Access to World’s Communications,” Guardian, June 21, 2013. 122 Th e Guardian reported on one 2007 memo James Ball, “US and UK Struck Secret Deal to Allow NSA to ‘Unmask’ Britons’ Personal Data,” Guardian, November 20, 2013. 126 President Obama told Charlie Rose President Barack Obama interview with Charlie Rose, Charlie Rose, Public Broadcasting Service, June 16, 2013. 126 Mike Rogers similarly told CNN Mike Rogers interview with Candy Crowley, CNN State of the Union, June 16, 2013. 126 Even Facebook CEO Mark Zuckerberg Mark Zuckerberg interview at TechCrunch Disrupt conference in San Francisco, September 11, 2013. 020-58305_ch02_3P.indd 264 6/6/14 11:50 AM NOTES 265 127 Jameel Jaff er, the deputy legal director of the ACLU, explained Jameel Jaff er, e-mail message to Glenn Greenwald. 127 Yale Law School professor Jack Balkin concurred Jack Balkin, “Th e Inspector General’s Report and Th e Horse Th at Is Already Out of the Barn Door,” Balkinization (blog), July 11, 2009, http://balkin .blogspot . c o m / 2 0 0 9 / 0 7 / i n s p e c t o r - g e n e r a l s - r e p o r t - a n d - h o r s e . h t m l . 129 the FISA court’s reaction over the last six years Matthew Keys, Twitter posting, November 19, 2013, 4:23 a.m., https://twitter.com/MatthewKeys Live /status/402774028898672640. 130 “treats se nior intelligence offi cials like matinée idols” Ryan Lizza, “State of Deception,” New Yorker, December 16, 2013. 131 As Slate’s Davie Weigel reported in November Dave Weigel, “New NSA Reform Bill Authorizes All the NSA Activity Th at Was Making You Angry,” Slate, November 1, 2013. 133 In an affi davit fi led by the ACLU American Civil Liberties Union et al. v. James R. Clapper et al., 13- cv- 03994, United States District Court (S.D. New York, 2013), https:// www .aclu .org /fi les /pdfs /natsec /clapper /2013 .08 .26 %20ACLU %20PI %20Brief %20 - %20Declaration%20-%20Felten.pdf . 135 “does ***not*** engage in economic espionage” Barton Gellman and Ellen Nakashima, “U.S. Spy Agencies Mounted 231 Off ensive Cyber- Operations in 2011, Documents Show,” Washington Post, August 30, 2013. 138 surveillance targets oft en included fi nancial institutions James Glanz and Andrew W. Lehren, “N.S.A. Spied on Allies, Aid Groups and Busi- nesses,” New York Times, December 20, 2013.
Recommended publications
  • Jesus in China—Evan Osnos on an Upcoming Frontline Documentary
    University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln The hinC a Beat Blog Archive 2008-2012 China Beat Archive 6-22-2008 Jesus in China—Evan Osnos on an Upcoming Frontline Documentary Follow this and additional works at: http://digitalcommons.unl.edu/chinabeatarchive Part of the Asian History Commons, Asian Studies Commons, Chinese Studies Commons, and the International Relations Commons "Jesus in China—Evan Osnos on an Upcoming Frontline Documentary" (2008). The China Beat Blog Archive 2008-2012. 205. http://digitalcommons.unl.edu/chinabeatarchive/205 This Article is brought to you for free and open access by the China Beat Archive at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in The hinC a Beat Blog Archive 2008-2012 by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. Jesus in China—Evan Osnos on an Upcoming Frontline Documentary June 22, 2008 in Watching the China Watchers by The China Beat | No comments The Public Broadcasting Corporation’s Frontline series has a long tradition of airing documentaries on China. Carma Hinton and Richard Gordon’s prize-winning look at 1989, “The Gate of Heavenly Peace,” was shown as part of the series, for example, as was a later Tiananmen documentary, “The Tank Man.” And thanks to the online extras, from guides to further reading to lesson plans for teachers, the PBS Frontline site has become a valuable resource for those who offer classes or simply want to learn about the PRC. Still, it is rare (probably unprecedented) for two China shows to run back-to-back on Frontline.
    [Show full text]
  • How Laura Poitras Helped Snowden Spill His Secrets
    How Laura Poitras Helped Snowden Spill His Secrets Documentary filmmaker Laura Poitras in Berlin. By PETER MAASS Published: August 13, 2013 This past January, Laura Poitras received a curious e-mail from an anonymous stranger requesting her public encryption key. For almost two years, Poitras had been working on a documentary about surveillance, and she occasionally received queries from strangers. She replied to this one and sent her public key — allowing him or her to send an encrypted e-mail that only Poitras could open, with her private key — but she didn’t think much would come of it. The stranger responded with instructions for creating an even more secure system to protect their exchanges. Promising sensitive information, the stranger told Poitras to select long pass phrases that could withstand a brute-force attack by networked computers. “Assume that your adversary is capable of a trillion guesses per second,” the stranger wrote. Before long, Poitras received an encrypted message that outlined a number of secret surveillance programs run by the government. She had heard of one of them but not the others. After describing each program, the stranger wrote some version of the phrase, “This I can prove.” 1 From www.nytimes.com/2013/08/18/magazine/laura-poitras-snowden.html?hpw 20 August 2013 Seconds after she decrypted and read the e-mail, Poitras disconnected from the Internet and removed the message from her computer. “I thought, O.K., if this is true, my life just changed,” she told me last month. “It was staggering, what he claimed to know and be able to provide.
    [Show full text]
  • Geopolitics, Oil Law Reform, and Commodity Market Expectations
    OKLAHOMA LAW REVIEW VOLUME 63 WINTER 2011 NUMBER 2 GEOPOLITICS, OIL LAW REFORM, AND COMMODITY MARKET EXPECTATIONS ROBERT BEJESKY * Table of Contents I. Introduction .................................... ........... 193 II. Geopolitics and Market Equilibrium . .............. 197 III. Historical U.S. Foreign Policy in the Middle East ................ 202 IV. Enter OPEC ..................................... ......... 210 V. Oil Industry Reform Planning for Iraq . ............... 215 VI. Occupation Announcements and Economics . ........... 228 VII. Iraq’s 2007 Oil and Gas Bill . .............. 237 VIII. Oil Price Surges . ............ 249 IX. Strategic Interests in Afghanistan . ................ 265 X. Conclusion ...................................... ......... 273 I. Introduction The 1973 oil supply shock elevated OPEC to world attention and ensconced it in the general consciousness as a confederacy that is potentially * M.A. Political Science (Michigan), M.A. Applied Economics (Michigan), LL.M. International Law (Georgetown). The author has taught international law courses for Cooley Law School and the Department of Political Science at the University of Michigan, American Government and Constitutional Law courses for Alma College, and business law courses at Central Michigan University and the University of Miami. 193 194 OKLAHOMA LAW REVIEW [Vol. 63:193 antithetical to global energy needs. From 1986 until mid-1999, prices generally fluctuated within a $10 to $20 per barrel band, but alarms sounded when market prices started hovering above $30. 1 In July 2001, Senator Arlen Specter addressed the Senate regarding the need to confront OPEC and urged President Bush to file an International Court of Justice case against the organization, on the basis that perceived antitrust violations were a breach of “general principles of law.” 2 Prices dipped initially, but began a precipitous rise in mid-March 2002.
    [Show full text]
  • The American Experience with Diplomacy and Military Restraint I
    PART I: THE AmERICAN EXPERIENCE WITH DIPLOMACY AND MILITARY RESTRAINT i. Orphaned Diplomats: The American Struggle to Match Diplomacy with Power Jeremi Suri E. Gordon Fox Professor of History and Director, European Union Center of Excellence, University of Wisconsin, Madison Benjamin Franklin spent the American Revolution in Paris. He had helped to draft the Declaration of Independence in the summer of 1776, one of the most radical documents of the eighteenth century—sparking rebellion on both sides of the Atlantic Ocean. Serving as a representative for the Continental Congress in France during the next decade, Franklin became a celebrity. He was the enlightened idealist from the frontier, the man of principled action who enthralled onlookers in the rigid European class societies of the 1770s and ’80s. Franklin embodied the American critique of Old World society, economy, and diplomacy. He was one of many American revolutionaries to take aim at the degenerate world of powdered wigs, fancy uniforms, and silver-service dinners where the great men of Europe decided the fate of distant societies. Franklin was a representative of the enduring American urge to replace the diplomacy of aristocrats with the openness and freedom of democrats.1 Despite his radical criticisms of aristocracy, Franklin was also a prominent participant in Parisian salons. To the consternation of John Adams and John Jay, he dined most evenings with the most conservative elements of French high society. Unlike Adams, he did not refuse to dress the part. For all his frontiers- man claims, Franklin relished high-society silver-service meals, especially if generous portions of wine were available for the guests.
    [Show full text]
  • Self-Censorship and the First Amendment Robert A
    Notre Dame Journal of Law, Ethics & Public Policy Volume 25 Article 2 Issue 1 Symposium on Censorship & the Media 1-1-2012 Self-Censorship and the First Amendment Robert A. Sedler Follow this and additional works at: http://scholarship.law.nd.edu/ndjlepp Recommended Citation Robert A. Sedler, Self-Censorship and the First Amendment, 25 Notre Dame J.L. Ethics & Pub. Pol'y 13 (2012). Available at: http://scholarship.law.nd.edu/ndjlepp/vol25/iss1/2 This Article is brought to you for free and open access by the Notre Dame Journal of Law, Ethics & Public Policy at NDLScholarship. It has been accepted for inclusion in Notre Dame Journal of Law, Ethics & Public Policy by an authorized administrator of NDLScholarship. For more information, please contact [email protected]. ARTICLES SELF-CENSORSHIP AND THE FIRST AMENDMENT ROBERT A. SEDLER* I. INTRODUCTION Self-censorship refers to the decision by an individual or group to refrain from speaking and to the decision by a media organization to refrain from publishing information. Whenever an individual or group or the media engages in self-censorship, the values of the First Amendment are compromised, because the public is denied information or ideas.' It should not be sur- prising, therefore, that the principles, doctrines, and precedents of what I refer to as "the law of the First Amendment"' are designed to prevent self-censorship premised on fear of govern- mental sanctions against expression. This fear-induced self-cen- sorship will here be called "self-censorship bad." At the same time, the First Amendment also values and pro- tects a right to silence.
    [Show full text]
  • American Government (POL SC 1100) Spring 2019 Mondays, Wednesdays, and Fridays, 2-2:50Pm 102 Naka Hall
    POL SC 1100-1-1-1-1 American Government (POL SC 1100) Spring 2019 Mondays, Wednesdays, and Fridays, 2-2:50pm 102 Naka Hall Jake Haselswerdt, PhD Assistant Professor Department of Political Science & Truman School of Public Affairs Office: 301 Professional Building Office hours: Tuesday, 2-4pm, and by appointment Email (preferred): [email protected] Phone: 573-882-7873 Syllabus updated February 15, 2019 Teaching Assistants Hyojong Ahn Dongjin Kwak Email: [email protected] Email: [email protected] Office: 315 Professional Building Office: 207 Professional Building Office hours: Monday, 10:30am-1:30pm; Office hours: Monday & Wednesday, Tuesday, 12:30pm-3:30pm 10am-1pm Course Overview & Goals This course offers an introduction to American politics and government from a political science perspective. While the course should increase your factual civic knowledge of American institutions, it is about more than that. Political science seeks to move beyond civic knowledge, to question and analyze the people, groups, events, institutions, policies, ideas, etc that we observe. Sometimes, our questions are empirical, meaning they deal with what is: Do Members of Congress support the policies their constituents want? Do political campaigns affect voters’ decisions? Sometimes, they are normative, meaning they deal with what should be: Is the U.S. Senate harmful to democracy because Wyoming has the same number of senators as California? Should the Constitution be amended so Supreme Court Justices no longer serve for life? In this course, we will consider both types of questions. 1 POL SC 1100-1-1-1-1 The success of democratic governments depends in part on the capacity of their citizens to hold them accountable.
    [Show full text]
  • Land Reform from Post-Apartheid South Africa Catherine M
    Boston College Environmental Affairs Law Review Volume 20 | Issue 4 Article 4 8-1-1993 Land Reform from Post-Apartheid South Africa Catherine M. Coles Follow this and additional works at: http://lawdigitalcommons.bc.edu/ealr Part of the Land Use Law Commons Recommended Citation Catherine M. Coles, Land Reform from Post-Apartheid South Africa, 20 B.C. Envtl. Aff. L. Rev. 699 (1993), http://lawdigitalcommons.bc.edu/ealr/vol20/iss4/4 This Comments is brought to you for free and open access by the Law Journals at Digital Commons @ Boston College Law School. It has been accepted for inclusion in Boston College Environmental Affairs Law Review by an authorized editor of Digital Commons @ Boston College Law School. For more information, please contact [email protected]. LAND REFORM FOR POST-APARTHEID SOUTH AFRICA Catherine M. Coles* I. INTRODUCTION...................................................... 700 II. LAND SYSTEMS IN COLLISION: PRECOLONIAL AND COLONIAL LAND SYSTEMS IN SOUTH AFRICA. 703 A. An Overview of Precolonial Land Systems. 703 B. Changing Rights to Landfor Indigenous South African Peoples Under European Rule. 706 III. THE INSTITUTIONALIZATION OF RACIAL INEQUALITY AND APART- HEID THROUGH A LAND PROGRAM. 711 A. Legislative Development of the Apartheid Land Program. 712 B. The Apartheid System of Racial Zoning in Practice: Limiting the Land Rights of Black South Africans. 716 1. Homelands and National States: Limiting Black Access to Land by Restricting Citizenship. 716 2. Restricting Black Land Rights in Rural Areas Outside the Homelands through State Control. 720 3. Restricting Black Access to Urban Land..................... 721 IV. DISMANTLING APARTHEID: THE NATIONAL PARTY'S PLAN FOR LAND REFORM............................................................
    [Show full text]
  • United States Court of Appeals for the SECOND CIRCUIT
    Case 14-2985, Document 88, 12/15/2014, 1393895, Page1 of 64 14-2985-cv IN THE United States Court of Appeals FOR THE SECOND CIRCUIT In the Matter ofd a Warrant to Search a Certain E-mail Account Controlled and Maintained by Microsoft Corporation, MICROSOFT CORPORATION, Appellant, —v.— UNITED STATES OF AMERICA, Appellee. ON APPEAL FROM THE UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF NEW YORK BRIEF OF AMICI CURIAE MEDIA ORGANIZATIONS IN SUPPORT OF APPELLANT LAURA R. HANDMAN ALISON SCHARY DAVIS WRIGHT TREMAINE LLP 1919 Pennsylvania Avenue NW, Suite 800 Washington, DC 20006 (202) 973-4200 Attorneys for Amici Curiae Media Organizations Case 14-2985, Document 88, 12/15/2014, 1393895, Page2 of 64 OF COUNSEL Indira Satyendra David Vigilante John W. Zucker CABLE NEWS NETWORK , INC . ABC, INC . One CNN Center 77 West 66th Street, 15th Floor Atlanta, GA 30303 New York, NY 10036 Counsel for Cable News Network, Counsel for ABC, Inc. Inc. Richard A. Bernstein Andrew Goldberg SABIN , BERMANT & GOULD LLP THE DAILY BEAST One World Trade Center 555 West 18th Street 44th Floor New York, New York 10011 New York, NY 10007 Counsel for The Daily Beast Counsel for Advance Publications, Company LLC Inc. Matthew Leish Kevin M. Goldberg Cyna Alderman FLETCHER HEALD & HILDRETH NEW YORK DAILY NEWS 1300 North 17th Street, 11th Floor 4 New York Plaza Arlington, VA 22209 New York, NY 10004 Counsel for the American Counsel for Daily News, L.P. Society of News Editors and the Association of Alternative David M. Giles Newsmedia THE E.W. SCRIPPS COMPANY 312 Walnut St., Suite 2800 Scott Searl Cincinnati, OH 45202 BH MEDIA GROUP Counsel for The E.W.
    [Show full text]
  • Bulk Powers in the Investigatory Powers Bill: the Question of Trust Remains Unanswered
    Bulk Powers In The Investigatory Powers Bill: The Question Of Trust Remains Unanswered BULK POWERS IN THE INVESTIGATORY POWERS BILL: The Question Of Trust Remains Unanswered September 2016 1/10 Bulk Powers In The Investigatory Powers Bill: The Question Of Trust Remains Unanswered Introduction We are on the brink of introducing the most pervasive and intrusive surveillance legislation of any democratic country in the world. The Investigatory Powers Bill sought to answer important questions about the place that modern and highly intrusive surveillance capabilities have in a democratic society, questions that were raised by the Edward Snowden disclosures in 2013 and subsequent reports produced by David Anderson QC, the Royal United Services Institute (RUSI) and the Intelligence and Security Committee (ISC) in 2015. But just a matter of weeks before the new law is enacted, significant questions of trust remain unanswered. This paper highlights some of the key flaws Privacy International sees in the current incarnation of the Investigatory Powers Bill, and urges the House of Lords to put the brakes on the bulk powers, about which many important questions remain unanswered. In this paper we set out how: • the Bill fails to provide sufficient clarity, which was promised at the outset of the legislative process, to alleviate confusion around the UK’s surveillance laws; • the Bill has not advanced transparency to the degree needed, still leaving most of the public in the dark about the extent of the surveillance powers; • significant questions remain about the Bill’s safeguards and oversight regime; and • major questions also remain regarding the bulk powers, even in light of David Anderson QC’s recent report.
    [Show full text]
  • How US and UK Spy Agencies Defeat Internet Privacy and Security James Ball , Julian Borger and Glenn Greenwald Theguardian.Com
    Revealed: how US and UK spy agencies defeat internet privacy and security James Ball , Julian Borger and Glenn Greenwald theguardian.com US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails, according to top-secret documents revealed by former contractor Edward Snowden. This story has been reported in partnership between the New Through covert partnerships with tech companies, the spy agencies have inserted secret vulnerabilities into encryption software. Photograph: Kacper York Times, the Guardian and Pempel/Reuters ProPublica based on documents obtained by the Guardian. For the Guardian: James Ball, Julian Borger, Glenn Greenwald 1. For the New York Times: Nicole Perlroth, Scott Shane For ProPublica: Jeff Larson Read the New York Times story here The files show that the National Security Agency and its UK counterpart GCHQ have broadly compromised the guarantees that internet companies have given consumers to reassure them that their communications, online banking and medical records would be indecipherable to criminals or governments. The agencies, the documents reveal, have adopted a battery of methods in their systematic and ongoing assault on what they see as one of the biggest threats to their ability to access huge swathes of internet traffic – "the use of ubiquitous encryption across the internet". Those methods include covert measures to ensure NSA control over setting of international encryption standards, the use of supercomputers to break encryption with "brute force", and – the most closely guarded secret of all – collaboration with technology companies and internet service providers themselves.
    [Show full text]
  • The Nsa's Prism Program and the New Eu Privacy Regulation: Why U.S
    American University Business Law Review Volume 3 | Issue 2 Article 5 2013 The SN A'S Prism Program And The ewN EU Privacy Regulation: Why U.S. Companies With A Presence In The EU ouldC Be In Trouble Juhi Tariq American University Washington College of Law Follow this and additional works at: http://digitalcommons.wcl.american.edu/aublr Part of the International Law Commons, and the Internet Law Commons Recommended Citation Tariq, Juhi "The SAN 'S Prism Program And The eN w EU Privacy Regulation: Why U.S. Companies With A Presence In The EU ouldC Be In Trouble," American University Business Law Review, Vol. 3, No. 2 (2018) . Available at: http://digitalcommons.wcl.american.edu/aublr/vol3/iss2/5 This Note is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in American University Business Law Review by an authorized editor of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. NOTE THE NSA'S PRISM PROGRAM AND THE NEW EU PRIVACY REGULATION: WHY U.S. COMPANIES WITH A PRESENCE IN THE EU COULD BE IN TROUBLE JUHI TARIQ* Recent revelations about a clandestine data surveillance program operated by the NSA, Planning Tool for Resource Integration, Synchronization, and Management ("PRISM'), and a stringent proposed European Union ("EU") data protection regulation, will place U.S. companies with a businesspresence in EU member states in a problematic juxtaposition. The EU Proposed General Data Protection Regulation stipulates that a company can be fined up to two percent of its global revenue for misuse of users' data and requires the consent of data subjects prior to access.
    [Show full text]
  • RCFP Comment on Rule 41
    February 17, 2015 1156 15th St. NW, Suite 1250 Washington, D.C. 20005 Members of the Advisory Committee on Criminal Rules (202) 795-9300 www.rcfp.org Bruce D. Brown Re: Comment of the Reporters Committee for Freedom of the Press on Executive Director [email protected] (202) 795-9301 the Proposed Amendment to Federal Rule of Criminal Procedure 41 STEERING COMMITTEE Concerning “Remote Access” Searches of Electronic Storage Media and STEPHEN J. ADLER Electronic Information Reuters SCOTT APPLEWHITE The Associated Press The Reporters Committee for Freedom of the Press (“Reporters WOLF BLITZER CNN Committee”) appreciates this opportunity to comment on the proposed DAVID BOARDMAN Temple University amendment to Rule 41 of the Federal Rules of Criminal Procedure CHIP BOK concerning “remote access” searches of computers and other electronic Creators Syndicate JAN CRAWFORD devices. The amendment was proposed by the Department of Justice and CBS News 1 MICHAEL DUFFY modified by the Committee in April 2014. Time RICHARD S. DUNHAM Tsinghua University, Beijing The Reporters Committee is a voluntary, unincorporated association ASHLEA EBELING Forbes Magazine of reporters and editors dedicated to safeguarding the First Amendment rights SUSAN GOLDBERG and freedom of information interests of the news media and the public. The National Geographic FRED GRAHAM Reporters Committee has provided assistance, guidance, and research in First Founding Member JOHN C. HENRY Amendment and freedom of information litigation since 1970. The Reporters Freelance Committee frequently represents the interests of the press and the public NAT HENTOFF United Media Newspaper Syndicate before Article III courts. The Reporters Committee is concerned that the JEFF LEEN The Washington Post proposed amendment to Rule 41 would intrude on vital constitutional and DAHLIA LITHWICK statutory rights protecting the news media and the free press.
    [Show full text]