Department of Justice: National Security Division FOIA Request Log

Total Page:16

File Type:pdf, Size:1020Kb

Department of Justice: National Security Division FOIA Request Log Department of Justice: National Security Division FOIA request log, June 2013 - July 2015 Brought to you by AltGov2 www.altgov2.org/FOIALand NSD FOIA LOG From 06/17/2013 to 07/22/2015 Consul- Date Initially Date Request # Last Name First Name Subject of Request tation Date of Request Rec'd by NSD Completed Disposition Reason(s) 2009-161 Grafeld Margaret Daniel Pearl N 6/10/2009 12/23/2013 6 Schechter Ronald A any and all records relating to or N 5/6/2014 reflecting the U S Government's decisions or actions regarding the transfer, release, repatriation, or 2012-019 9/30/2011 10/13/2011 prosecution (by either military commissions or in a United States District Court) of Fayiz Al Kandari and/or of Fawzi Al Odah Schechter Ronald A any and all records reflecting the U S N Government's communications relating to, and decisions concerning the preferral 2012-024 and/or referral of, criminal charges by the 9/30/2011 10/13/2011 Office of Military Commissions against Fayiz Mohammed Ahmed Al Kandari Kraemer Alexander seeks records that will illuminate if and N how agencies responsible for implementing FISA/FAA authorities are interpreting these invasive anti terrorist 2012-056 surveillance powers; how the FISA/FAA 10/10/2011 11/17/2011 spying powers is being used; and if safeguards are in place to prevent abuse of Americans' rights (see FOIA request- 5 & 6, 1-13) Bogardus Kevin Request for any and all records N concerning audits of firms and individuals under the Foreign Agents Registration 2012-082 1/5/2012 1/6/2012 Act since fiscal year 2001 to the present day (see FOIA request page 2) (b) (b) any criminal investigation against (b) N 12/4/2013 2 (b) pertaining to illegal weapons trafficking including but not limited all to correspondence, memoranda, documents, 2012-092 reports, records, statements, applications, 1/5/2012 1/20/2012 diskettes, letters, facsimile logs, electronic mail, tape recordings, video/movie recordings, and any notes Soghoian Christopher requesting all documents created between N 3/2/2015 2 November 1, 2010 and January 31, 2012 related to memos, email messages, notes from meetings and any other documents related to retaliation efforts by 2012-095 1/31/2012 2/1/2012 "Anonymous" supporters of Wikileaks or other Internet activists against Department of Justice and FBI employees; including items 1-3 of this request Jaffer Jameel the fbi's inssuance of national security N 3/9/2015 6 letters (NSLs) including items 1-4 on 2012-112 page 4 This request pertains to the FBI's 3/15/2011 3/5/2012 issuance of national security letters ("NSL") under 18 U S C Ravnitzky requesting copies of each report in the N 12/5/2013 4 National Security Division concerning the 2012-131 operation and effectiveness of the 4/7/2012 4/17/2012 Classified Information Procedure Act (for all years) Smith Grant F Copy of all DOJ FARA letters not N previously released under FOIA/PA# 12- 122 on April 18, 2012 under the precedent set by the Matthew J 2012-171 6/1/2012 6/7/2012 Herrington case 1:11-cv-01330 that FARA determination letters are neither privileged nor exempt from public disclosure and review Schmidt Michael S Documents about articles/stories written N 3/16/2015 3 by the Associated Press in 2011 and 2012 about the New York City Police 2012-191 6/20/2012 6/21/2012 Department's (NYPD) surveillance of minorities and Muslims since the 9/11/2001 terror attacks Levinson-Waldman Rachel any records reflecting, containing, N setting forth, describing, or establishing the statutes, regulations, policies, practices, and/or procedures regarding maintenance, retention, disposal, and/or destruction of records obtained by federal law enforcement officers from wireless carriers, including records obtained as a result of emergency or exigent requests; 2 and/or any limitations on such access; 3 permissible use or uses of, including any limitations on the permissible use or uses of the records; 4 sharing and/or 2012-215 dissemination of the records; 5 types of 7/17/2012 7/23/2012 information federal law enforcement officers may request or have requested from wireless carriers (e g geolocation information, content of text messages, call records, customer information, content of oral communications, etc ); 6 individuals who are subjects of assessment, this includes any records reflecting how long such records are kept, how they are stored, who has access to them, with whom they are shared and under what circumstances, how and when they are Rumold Mark 1 Any written opinion or order, as N described in the statement quoted above (see attachment), in which "the Foreign Intelligence Surveillance Court held that some collection carried out pursuant to the Section 702 minimization procedures used by the government was unreasonable under the Fourth Amendment; 2 Any written opinion or order, as described in the statement quoted above (see 2012-219 attachment), reflecting or concerning a 7/26/2012 7/31/2012 FISC determination that "the government's implementation of Section 702 of FISA has sometimes circumvented the spirit of the law; and 3 Any briefing provided to the Senate Select Committee on Intelligence or the House Permanent Select Committee on Intelligence concerning the FISC opinions or orders, described in items (1) and (2) above Ravnitzky Michael 1) readily retrieved communications (i e N within 1-2 hours of search time) between the National Security Division and the FISA Court concerning the matter of declassification and/or declassification review of FISA Court opinions and/or FISA Court of Review opinions; 2) memoranda at the National Security Division concerning the matter of 2012-222 7/25/2012 8/6/2012 declassification and/or declassification review of FISA Court opinions and/orFISA Court of Review opinions; 3) reports at the NationalSecurity Division concerning the status of the declassification and/or declassification review of FISA Court opinions and/or FISA Court of Review opinions records from May 1, 2011 to the present Deluccia James Request for all information pertaining to N 5/8/2014 10 training slides, files, work papers, and tools developed and leveraged for the design and delivery of this training (The Justice Department has begun training hundreds of prosecutors to combat and prosecute cyber espionage and related crimes, according to senior department officials: Justice has begun training more 2012-228 8/10/2012 8/10/2012 than 300 lawyers in Washington and nearly 100 more across the county in the legal and technical skills needed to confront the increase in cyber threats to national security); Details on what "legal and technical" skills are being trained, and any legal / industry references being utilized - including legal references, court cases, and relevant laws Abdo Alexander seeking "the following records from the N Department of Justice and all component agencies: 1 Records created since November 1, 2008 including final memoranda, policies, procedures, directives, guidance, reports, legal analysis, inter-and intra-agency correspondence including emails, opinions from the Office of Legal Counsel, and training materials pertaining to the Director of National Intelligence's determination to amend the National Counterterrorism Center guidelines, 2012-232 including, but not limited to: Records 7/31/2012 8/22/2012 pertaining to the 2008 NCTC guidelines requirements regarding the collection, retention and use of U S person information; Records documenting perceived problems caused by limitations imposed in the 2008 NCTC guidelines and/or justifications for amending the guidelines, including training materials; Evaluations and/or audits of NCTC performance under the 2008 guidelines and/or problems and concerns associated with implementation of the 2008 Pertiz Aki requesting information pertaining to N 7/2/2014 2 "OPERATION OVERT" or "OP OVERT" (the British designation for the 2012-235 conspiracy); b "liquid bomb" plot; c 7/26/2012 8/12/2012 Rashid Rauf; d Abdulla Ahmed Ali AKA Abdallah AHMAD ALI; e Abu Faraj al- Libi; f Abu Ubaydah al-Masri Gillum Jack Request access to and copies of N 10/29/2013 4 correspondence to or from Wisconsin Rep Paul Ryan or his staff from Jan 3, 2012-236 8/13/2012 8/12/2012 1999 to present including but not limited to requests in which Rep Ryan or his office wrote on behalf of a constituent Powell Jennifer seeking any and all information that this N 3/13/2014 4 DOJ component has pertaining to you; any information that pertains to the Swiss 2012-247 NGO International Services Trade 9/5/2012 9/6/2012 Information Agency "ISTIA" dating back to 2001 or 2002; information about the PAA or IEEPA 2012-248 Aalto John (b) (6) N 9/20/2011 9/6/2012 9/10/2012 1 Long Susan case-by-case information for all court N 12/15/2013 1 prosecutions pending as of October 1, 2010 or filed on or after that date for each court prosecution counted as an international terrorism or terrorism- related prosecution with any and all of the following specific items of information 1 the federal judicial district; 2 the court docket number; 3 the filing date for each 2012-255 9/20/2012 9/20/2012 case; 4 the name of each defendant prosecuted in the case; 5 for each defendant the charges filed; 6 the date each charge was disposed of; 7 the disposition of each charge, including which charge(s) resulted in conviction; 8 the sentence each defendant who was convicted received; 9 the sentencing date Vance Donald seeking a copy of any email N 9/30/2014 2 correspondence concerning the book, "No Easy Day", pertaining to the operation 2013-009 10/5/2012 10/9/2012
Recommended publications
  • People's Tech Movement to Kick Big Tech out of Africa Could Form a Critical Part of the Global Protests Against the Enduring Legacy of Racism and Colonialism
    CONTENTS Acronyms ................................................................................................................................................ 1 1 Introduction: The Rise of Digital Colonialism and Surveillance Capitalism ..................... 2 2 Threat Modeling .......................................................................................................................... 8 3 The Basics of Information Security and Software ............................................................... 10 4 Mobile Phones: Talking and Texting ...................................................................................... 14 5 Web Browsing ............................................................................................................................ 18 6 Searching the Web .................................................................................................................... 23 7 Sharing Data Safely ................................................................................................................... 25 8 Email Encryption ....................................................................................................................... 28 9 Video Chat ................................................................................................................................... 31 10 Online Document Collaboration ............................................................................................ 34 11 Protecting Your Data ................................................................................................................
    [Show full text]
  • The CIA's Destruction of the Abu Zubaydah Tapes and the Law Of
    04_COX V17 FINAL (6-14-11).DOC (DO NOT DELETE) 6/15/2011 12:10 PM Burn After Viewing: The CIA’s Destruction of the Abu Zubaydah Tapes and the Law of Federal Records Douglas Cox INTRODUCTION On December 6, 2007, the Central Intelligence Agency publicly disclosed that in 2005 it had destroyed videotapes of CIA interrogations of alleged terrorist Abu Zubaydah conducted in 2002. It asserted that the destruction was “in line with the law.”1 The disclosure resulted in calls for congressional investigations;2 a motion for contempt in a Freedom of Information Act (FOIA) suit by the American Civil Liberties Union (ACLU);3 emergency motions in Guantánamo detainee cases;4 questions about the case of Zacharias Moussaoui;5 and an angry op-ed from the chairmen of the 9/11 Commission.6 The crux of these public reactions – as with the criminal investigation that resulted – was primarily the narrow Associate Law Library Professor, City University of New York School of Law. The author has represented individuals detained in Guantánamo and previously worked in military intelligence in the U.S. Army. The views expressed are only those of the author and all of the information contained in this article is derived solely from unclassified sources. The author thanks Jay Olin and the FOIA staff at the National Archives, Sarah Havens, Julie Lim, K. Babe Howell, Angela Burton, Alizabeth Newman, Liliana Yanez, Nicole Smith Futrell, and Paul Cox for their assistance and thoughts. 1. See Press Release, Central Intelligence Agency, Director’s Statement on the Taping of Early Detainee Interrogations (Dec.
    [Show full text]
  • Download Other
    ACLU AMERICAN CIVIL LIBERTIES UNION I November 19, 2014 Freedom of Information Operations Unit (SARO) Drug Enforcement. Administration Department of Justice 700 Army Navy Drive Arlington, VA 22202 Fax: (202) 307-7596 Record/Information Dissemination Section Federal Bureau oflnvestigation Department of.Tustice 170 Marcel Drive AMERICAN CIVIL LIBERTIES Winchester, VA 22602-4843 UNION FOUNDATION Fax: (540) 868-4995 NATIONAL OFFICE 125 BROAD STREET, 18TH FL NEW YORK, NY 10004-21,00 Office of General Cotmsel T/212_549_2500 WWW.ACLU.ORG United States Marshals Service Department of Justice Washington, D.C. 20530-1000 Fax: (202) 307-8544 FOINPA Mail Refenal Unit Department of Justice Room 115 LOC Building Washington, DC 20530-0001 Fax: (301) 341-0772 U.S. Immigration and Customs Enforcement Freedom ofinfonnation Act Office 500 12th Street., S.W., Stop 5009 Washington, D.C. 20536-5009 Fax: (202) 732-4265 Re: Freedom of Information Act Request I Cell Site Simulators Deployed on Aircraft 1 To Whom It May Concem: This letter is a request tmder the Freedom oflnfotmation Act by the American Civil Liberties Union ("ACLU"). This request seeks records regarding the acquisition, possession, and use of cell site simulators deployed on aircraft. Cell site simulators, also called IMSI catchers (in reference to the tmique identifier-or intemational mobile subscriber identity-of wireless devices), impersonate a wireless service provider's cell tower, prompting cell phones and other wireless devices to commtmicate with them. One model of this technology, which the U.S. Marshals Service and likely other agencies deploy on aircraft, is sometimes called a "dirtbox" or "DRT box," after its manufacturer Digital Receiver Technology, Inc.
    [Show full text]
  • PO Box 1151, Lake Worth, FL 33460 (561)
    DEDICATED TO PROTECTING HUMAN RIGHTS OCTOBER 17, 2018 Dear HRDC Supporter, Every year we conduct an annual fundraiser in the fall because our income from magazine subscriptions and book sales does not cover the expenses for all the advocacy work we do on behalf of prisoners, their families and the victims of police state violence and exploitation. We receive very little in the way of foundation funding and rely on individual donors—people Still shot from American Jail, a 2018 CNN film by Academy like you—who can and do make a difference by donating to the Award-winning director Roger Ross Williams exploring the forces that fuel America's sprawling prison system. Human Rights Defense Center. We have had a very busy year. Last December we launched a new magazine, Criminal Legal News, to expand our news coverage of the criminal justice system from beginning to end; less than a year later, CLN already has close to 1,500 subscribers! Our social media presence on Twitter, Facebook and our daily e-newsletter continues to grow as we expand our advocacy reach. We also launched a new public records and government transparency project. But publishing is not enough. We want to make sure that all our readers, especially those in prisons and jails, can receive and read the magazines we publish and the books we distribute. Since the very first issue of PLN was published in May 1990, we have faced censorship by government officials who are not pleased with our coverage of the criminal justice system. To date, none have been as fanatical in their censorship as the Florida Department of Corrections (FDOC).
    [Show full text]
  • Download the Full Report
    H U M A N R I G H T S NO MORE EXCUSES WATCH A Roadmap to Justice for CIA Torture No More Excuses A Roadmap to Justice for CIA Torture Copyright © 2015 Human Rights Watch All rights reserved. Printed in the United States of America ISBN: 978-1-62313-2996 Cover design by Rafael Jimenez Human Rights Watch is dedicated to protecting the human rights of people around the world. We stand with victims and activists to prevent discrimination, to uphold political freedom, to protect people from inhumane conduct in wartime, and to bring offenders to justice. We investigate and expose human rights violations and hold abusers accountable. We challenge governments and those who hold power to end abusive practices and respect international human rights law. We enlist the public and the international community to support the cause of human rights for all. Human Rights Watch is an international organization with staff in more than 40 countries, and offices in Amsterdam, Beirut, Berlin, Brussels, Chicago, Geneva, Goma, Johannesburg, London, Los Angeles, Moscow, Nairobi, New York, Paris, San Francisco, Tokyo, Toronto, Tunis, Washington DC, and Zurich. For more information, please visit our website: http://www.hrw.org DECEMBER 2015 ISBN: 978-1-62313-2996 No More Excuses A Roadmap to Justice for CIA Torture Summary ........................................................................................................................................ 1 Methodology .................................................................................................................................
    [Show full text]
  • Rise of the IMSI Catcher
    Rise of the IMSI Catcher Lisa Parks In the wake of the Patriot Acts and the Snowden revelations, new details about surveillance technologies rarely seem surprising. Many have grown accustomed to Constitution-violating “sneak and peek” search warrant practices, biometric scanning, and sensors that make anything and everything monitor-able, no matter how large or small. As billions of people around the world are becoming digitally connected, the Kool-Aid is beginning to wear off. Networked office workers are revolting against the constant scrutiny of their online activities. Internet users are upset that Twitter and Facebook are in cahoots with the National Security Agency (NSA). And GPS- equipped smartphones seem more and more like electronic ankle bracelets. The utopian allure of connectivity is cracking and totalitarian tendencies are alive and kicking, especially in the world’s democracies. Such conditions have kept surveillance scholars busy. Since 9/11, scholars have analyzed the monumental shifts in surveillance that have unfolded in the context of the War on Terror.1 They have demonstrated that digital networks and social media have become havens for state and corporate monitoring of citizens’ expressions and transactions.2 They have explored how techniques of racial profiling, biometrics, and physical searching continue to disenfranchise people who are already vulnerable or immersed in struggles for social equality and justice, including the poor, people of color, and refugees.3 And they have charted the labyrinthine expansion of closed- circuit and airport security systems and the complex dynamics of their use.4 Despite the plethora of vital topics that have been tackled, surveillance Media Fields Journal no.
    [Show full text]
  • United Nations Environmental Program Archive of E-Articles 2009
    United Nations Environmental Program Archive of E-Articles 2009 January 5, 2009 Green Bible Stirs Evangelical Concerns By Ginger D. Richardson Gannett News Service In this day and age, you can buy a Bible aimed at almost any demographic imaginable: toddlers, teenage girls, and recovering addicts. But it's the recently published Green Bible that is causing a stir in the religious community. Supporters of the book, which highlights verses related to what believers call "God's creation" and God's desire for humans to protect it, say they hope it will encourage more Christians to embrace environmentalism. "In every book of the Bible, there are references to the world and how we should take care of it," said Rusty Pritchard, editor of Creation Care Magazine, an eco-friendly publication for evangelicals. "When you look at it through that lens, it really jumps out at you ... that God is calling us to care for the world around us." But others fear the new Bible, which has been endorsed by secular groups such as the Sierra Club and the Humane Society, will mislead Christians. "I am concerned that many who call themselves Christians, or intend to speak for Christianity, don't interpret the Bible literally," said James Taylor, a founding elder and Sunday school teacher at Living Water Christian Fellowship in Palmetto, Fla. "These groups don't have a religious focus; they have a desire to spread their environmental message." Taylor, who is also a senior fellow of environmental policy at the Heartland Institute, a conservative Chicago-based think tank, said there is a healthy amount of skepticism among mainstream evangelicals toward the new Bible.
    [Show full text]
  • NSA-Appeallogs-2014-2015.Pdf
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND 20755-6000 FOIA Case: 84040A 4 April 2017 JOHN GREENEWALD Dear Mr. Greenewald: This responds to your Freedom of Information Act (FOIA) request dated 24 March 2016 which was received by this office on 24 March 2016, for "a copy of the FOIA Appeal Logs for calendar years 2014, and 20 15." For purposes of this request and based on the information you provided in your letter, you are considered an "all other" requester. As such, you are allowed 2 hours of search and the duplication of 100 pages at no cost. Since processing fees were minimal, no fees were assessed. Your request has been processed under the FOIA, and the FOIA appeals logs for calendar year 2014, and 2015 are enclosed, along with a FOIA Case Dispositions reference sheet that explains the final case dispositions. Please be advised that the logs do not contain the number of pages released. They contain a final disposition if the case was closed at the time the logs were created. If there is no final disposition, the case was still pending at the time the logs were created.
    [Show full text]
  • United States District Court for the District of Columbia
    Case 1:14-cv-00019-CRC Document 79 Filed 03/31/17 Page 1 of 29 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA RYAN NOAH SHAPIRO, Plaintiff, v. Case No. 1:14-CV-00019 (CRC) CENTRAL INTELLIGENCE AGENCY, et. al., Defendants. MEMORANDUM OPINION Doctoral student Ryan Shapiro wants to know if the United States government was complicit in Nelson Mandela’s arrest and imprisonment by South Africa’s apartheid-era regime. To that end, Shapiro filed Freedom of Information Act requests with the Central Intelligence Agency, the National Security Agency, the Department of Defense’s Defense Intelligence Agency, and the Federal Bureau of Investigation seeking virtually every document in their sprawling files that mentions or references Mandela. After refusing to narrow his request in any meaningful way, Shapiro has filed suit challenging each agency’s response. The Court has previously ruled on motions filed by the CIA and NSA, and they, along with the DIA, continue to review and release responsive records. Now before the Court is a motion to dismiss or, alternatively, for summary judgment filed by the FBI, and a cross-motion for summary judgment filed by Shapiro. Shapiro raises a laundry list of objections to the FBI’s search and non-disclosure of responsive material under a variety of FOIA exemptions. For the reasons explained below, the Court will uphold the large majority of the challenged withholdings, but will reserve judgment in part and deny judgment in part to each side with respect to several withholdings whose appropriateness remains in dispute. Case 1:14-cv-00019-CRC Document 79 Filed 03/31/17 Page 2 of 29 I.
    [Show full text]
  • Cellphone Surveillance Gear Floods U.S.Pdf
    2/9/2017 Cellphone Surveillance Gear Floods U.S. Cities ­ CityLab From The Atlantic Cellphone Spy Tools Have Flooded Local Police Departments Major cities throughout the U.S. have spent millions on mobile surveillance tools—but there are still few rules about what happens to the information they capture. GEORGE JOSEPH | @georgejoseph94 | Feb 8, 2017 | 100 Comments A protester uses her phone during a night of demonstrations over the police shooting of Keith Scott in Charlotte, North Carolina. (Mike Blake/Reuters) Love CityLab? Make sure you're signed up for our free e-mail newsletter. Email Sign up A little after midnight on November 28, 2014, hundreds of Black Lives Matter protesters filled the streets of downtown Chicago. The demonstration was one of many that erupted in cities nationwide soon after a Missouri grand jury failed to indict a Ferguson, Missouri, police officer for the shooting death of Michael Brown that August. As the protesters marched, a police vehicle crept behind them. The black SUV emblazoned with “City of Chicago Emergency Management” appeared to have two 360-degree cameras sprouting from its roof and a command center in the back. Whenever the vehicle drove by, protesters reported that their phones stopped working. A week later, audio of a police radio dispatch from the protest was released online. In the recording, an officer alerts a department intelligence analyst about of one of the protest organizers. “One of the girls here… she's been on http://www.citylab.com/crime/2017/02/cellphone­spy­tools­have­flooded­local­police­departments/512543/?ncid=newsltushpmgnews 1/12 2/9/2017 Cellphone Surveillance Gear Floods U.S.
    [Show full text]
  • 9781108722100 Index.Pdf
    Cambridge University Press 978-1-108-72210-0 — The Cambridge Handbook of Surveillance Law Edited by David Gray , Stephen E. Henderson Index More Information 757 Index Abika.com, 720 , 725 Amsterdam, Anthony, 609 Abortion, 317 Anderson, Joel, 635 Accountability, 72 , 160 , 172 , 193 , 277 , 463 , 503 , 606 , Andrejevic, Mark, 134 610 , 617 , 694 , 701 Angry Birds, 204 , 422 Accusearch, 720 Angwin, Julie, 426 ACLU v. Clapper , 33 , 262 , 587 Anonymity, 291 , 306 , 372 , 479 , 480 . See also Acxiom, 423 , 433 Constitutional Regulation of Surveillance, First Adams, John, 534 Amendment Adams, Samuel, 404 AOL, 440 Adblock Plus, 211 Apex Air Entry and Exit Re- Engineering Project, 146 Addington, David, 252 Apple, 222 , 239 , 240 , 243 , 334 , 355 , 424 , 432 , Administrative Procedure Act, 616 , 733 579 , 721 Rule making, 733 Encryption Controversy, 222 , 240 , 242 , 243 , 245 , Notice and Comment, 617 , 733 336 , 337 , 355 , 424 , 579 , 721 Notice of Inquiry, 734 Arab Spring, 146 Administrative Regulation of Surveillance, 178 , Area of Freedom, Security, and Justice, 645 , 654 276 , 433 , 511 , 542 , 574 , 599 , 615 , 677 , 681 , Article 29 Working Party, 649 708 – 26 , 727 Ashcroft, John, 13 , 252 , 549 Consent Decree, 735 Ashcroft v. Iqbal , 554 , 583 Enforcement Actions, 734 Assembly, Freedom of. See Constitutional Regulation Inspectors General, 557 of Surveillance, First Amendment Intraagency Review, 18 , 22 , 500 Associated Press, 475 Administrative Surveillance, 395 – 419 Association, Freedom of, 438 , 470 , 471 . See also Adversarial
    [Show full text]
  • The Fourth Amendment in the Digital Age NACDL Symposium
    The Fourth Amendment in the Digital Age NACDL Symposium Andrew Guthrie Ferguson Professor of Law UDC David A. Clarke School of Law REPORTER 0110 0100 0011 1001 1010 1100 1000 0111 Supported by a grant from the Foundation for Criminal Justice. 0011 Copyright © 2016 National Association of Criminal Defense Lawyers This work is licensed under the Creative Commons Attribution-NonCommercial- NoDerivatives 4.0 International License. To view a copy of this license, visit 0101 http://creativecommons.org/licenses/by-nc-nd/4.0/. It may be reproduced, provided that no charge is imposed, and the National Association of Criminal Defense Lawyers is acknowledged 1001 as the original publisher and the copyright holder. For any other form of reproduction, please contact NACDL for permission. Cover Images: 0000 © VoodooDot | shutterstock — surveillance © Alex Stokes | Dollarphotoclub — hand 1110 0110 1011 0010 For more information contact: NATIONAL ASSOCIATION OF CRIMINAL DEFENSE LAWYERS 0001 1660 L Street NW, 12th Floor Washington, DC 20036 Phone: 202-872-8600 1100 www .nacdl .org 1101 This publication is available online at www.nacdl.org/FourthAmendmentInTheDigitalAge 0110 0100 0011 1001 1010 The Fourth Amendment in the Digital Age NACDL Symposium 1100 1000 0111 E.G. “Gerry” Morris Gerald B. Lefcourt President, NACDL President, FCJ Austin, TX New York, NY 0011 0101 1001 Theodore Simon Immediate Past-President, NACDL Philadelphia, PA 0000 Norman L. Reimer Executive Director, NACDL 1110 Washington, DC Kyle O’Dowd 0110 Associate Executive Director for Policy, NACDL Washington, DC 1011 Jumana Musa Sr. Privacy and National 0010 Security Counsel, NACDL Washington, DC 0001 Andrew Guthrie Ferguson Professor of Law UDC David A.
    [Show full text]