Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Circumvention Core
Top Level
story, theres no January 2006 briefing of the full FISC, and the programs reliance on presidential rather
Without Snowden,
Congress wouldnt be reexamining the NSA or filing bills to keep the agency
in check. And we wouldnt be able to read the inspector generals report in the Guardian. Thats what
than court approval surely would have continued for more than a year.
I learned from reading this history of the surveillance program. For the most part, the government has
tried to do the right thing. Little by little, it has
And Snowden, for all his flaws, is part of the cleansing.
An undisclosed
In
each of the incidents, an NSA analyst made one of two errors: either
conducting a query that the NSA had previously determined was a U.S.
person identifier, or forgetting to filter out Section 702-acquired data while
conducting a federated query (a query using the same term or terms in multiple NSA databases)
using a known U.S. person identifier. The Joint Assessment notes that none of the analysts involved
be approved according to internal NSA procedures, and must be designed to yield foreign intelligence information.
in the incidents were unaware that only approved U.S. person identifiers may be used to query Section 702-acquired
Collection equipment and other systems are tested before deployment, monitoring programs are employed to detect
anomalies, joint oversight team members participate in technical briefings to better understand the impact of technical
system development on information collection and processing. Some undisclosed number of the compliance incidents
during the reporting period caused the NSA systems to overcollect data in violation of what had been authorized under
the Section 702 certifications. Further details on particular incidents involving overcollection have been redacted.
resulted in unauthorized targeting of users in the U.S. for up to three days. The Joint Assessment begins its subsection
were among those used by a target discovered to be in or traveling to the U.S. Subsections on the causes of CIA and FBI
individual located in the U.S., an FBI supervisory agent intended to reject an acquisition instead accidentally approved
it, and the system fail-safe malfunctioned. Information on incidents involving FBI noncompliance with targeting
total collection efforts, the joint oversight team emphasizes the importance of and its own role in continued
noncompliance investigation and monitoring of collection activity.
Some examples of the new marching orders for minimization and oversight: at
least twice during the September 3 Orders authorizing period, NSA must perform a
spot check of a sample of call detail records, so as to ensure that the
agency isnt scooping up any content. The Justice Department also figures
prominently here . DOJ attorneys must review, again on no less than two times
during the authorization period, NSA metadata query activities, including
the justifications given for queries. NSA also must provide copies of all briefing
and training materials to the Justice Department. Moreover, prior to reporting
back the FISC on compliance activities, NSA and Justice personnel must
meet, a week before the FISC authorizations expiry, and discuss NSAs conformity with FISC
orders. The outcome of that meeting must be reduced to writing and submitted to
the court, when the NSA seeks to renew the metadata authorization. Justice
Department personnel likewise must, a week prior to any authorizations lapse, meet with
the NSA Inspector General and review oversight and compliance matters.
Finally, any proposed automated metadata query processes must be
vetted and approved by NSA, the Justice Department, and the FISC .
The outlines of a theme can be made out: DOJ oversight is on the rise . So
query subject to strict rules? Yes. But ask the FISC each time whether it is okay to query? No. Perhaps this marked a
modest thaw, in that the FISC restored to the NSA some unilateralif quite controlled, more heavily DOJ-supervised
authority to consult its vast caches of telephony metadata.
the Obama administrations determination to bring accused foreign terrorists back to face U.S. civilian
courts. We can debate the merits of the action, but theres no doubt it was a substantive change. None of
this negates Mr. Glennons thesis or mutes the warning bell he sounds in these pages. Bureaucrats can
Baker, speaking before the Senate voted, predicted: I dont think anyone at
NSA is going to invest in looking for ways to defy congressional intent if USA
Freedom is adopted.
January 2006, the new NSA director, Keith Alexander, finally briefed all members of the FISC, not just the
chief judge. In May 2006, the court agreed to authorize NSA collection of business records (phone
metadata) but limit[ed] the number of people that could access the data and required more stringent
NSA Documents, Part VII: The Compliance Report, Lawfare, http://www.lawfareblog.com/nsa-documents-part-viicompliance-report, August 24, 2013, Quay)
the
compliance incident rate is 0.49%, described as a "low" rate that nonetheless
represents an increase from compliance incident rate in the prior reporting period. Many of these
incidents are trivial, involving only the NSA's failure to notify the NSD and
ODNI of certain facts within the timeframe stipulated in the NSA targeting proceduresa
median delay of about one business day. Eliminating these particular compliance
incidents yields what the reports describes as a "better measure of substantive
compliance with the applicable targeting and minimization procedures."
Thus adjusted, the compliance incident rate for this reporting period drops from
0.49% to 0.20%.
and/or minimization procedures of any particular agency remains classified. But the report reveals that
Tasking issues involve "incidents where noncompliance with the targeting procedures
resulted in an error in the initial tasking of the selector."Detasking issues
involves" errors in the detasking of the selector." Notification delays occur
when "a notification requirement contained in the targeting procedures was not satisfied."
Documentation issues involve "incidents where the determination to target a selector was not
properly documented." Overcollection occurs when the NSA's collection
systems acquire data regarding untasked selectors while in the process of acquiring
communications of properly tasked selectors. Minimization issues simply refer to problems
with NSA's compliance with its own minimization procedures. The vast majority of
compliance incidents during the reporting period212 out of 338were notification delays.
There were also 48 tasking incidents, 51 detasking incidents, 2 incidents of
overcollection, 15 minimization incidents and 10 documentation incidents . The
report redacts a chart that depicts the compliance incident rates of previous reporting periods. Most
noncompliance incidents in the reporting period did not involve U.S. persons but
involved, for example, typographical errors in tasking that resulted in no
collection, detasking delays with respect to facilities used by non-U.S. persons
who had entered the country, or notification errors regarding similar
detaskings that were not delayed. However, several incidents involved U.S. persons. These involved
(1) tasking errors that led to the tasking of facilities used by U.S. persons, (2) delays in tasking facilities after the NSA
determined the user of the selector was a U.S. person, and (3) unintentional querying of Section 702 repositories using a
U.S. person identifier.
The National
Security Agency is increasingly leveraging technology throughout its
that maxim lies an even greater truth: Changes in technology often carry the most risk.
this requires us to explain the relevant technology as well as its anticipated interaction with the global technology
environment. We must also discuss how the proposed activities would advance national security without sacrificing
Congressional
rejection of mass spying vindicates several principles at once, including
transparency, oversight, checks and balances, the separation of powers and
constitutional rights enshrined in the First and Fourth Amendments . Each of
all enemies, foreign and domestic." Several winners also emerged from this drama.
those values is cherished across the political continuum, making them especially powerful during a
presidential election year. Senator Paul is another clear winner. He demonstrated leadership, surged
among the crowded GOP field of 2016 presidential hopefuls and effectively seized control of the Senate
from the majority leader. With its senators leading both the surveillance/secrecy/corruption caucus, as
well as the competing constitutional/privacy/accountability caucus, Kentucky could also claim victory. The
US Constitution may be the most important winner. By proxy, "We the People of the United States"
actually scored two victories at once. Narrowly, the expiration of Patriot Act Section 215 advances Fourth
Amendment privacy interests. Even though mass surveillance will continue for now under other legal
authorities, one program through which our government monitors phone calls and tracks everyone's
this vote begins a longoverdue process of limiting executive powers , expanded during a period of
seeming emergency, which grew entrenched despite proving ineffective as well as constitutionally
congressional assertiveness supports democracy in a longrunning battle to avoid the erosion from within foreseen by both Alexis de Tocqueville
offensive. In this sense,
and President and Supreme Allied Commander Dwight Eisenhower. What Comes Next? With reformers
having triumphed in Congress, the debate over surveillance reform must expand. Further reforms are
necessary to enable an adversarial process and greater transparency at the secret Foreign Intelligence
Surveillance Court, and also to limit other legal authorities - like Executive Order 12333 and FISA
Section 702 - used to justify unconstitutional domestic surveillance. It's a good thing that a bipartisan
measure, the Surveillance State Repeal Act (HR 1466), is poised to do exactly that. Rep. Mark Pocan (DWisconsin) and Rep. Thomas Massie (R-Kentucky) introduced the SSRA to force the agencies to justify
the expansion of any powers from a constitutional baseline, rather than one contrived by a decade of
Two big forces constrain the use of Big Data material once collected. The first is law.
Unless you believe that the intelligence community is a lawless enterprise that
will not follow the rules, this puts a premium on the substantive content of the law Congress writes to govern this area.
enormous amount about is the compliance procedures that NSA uses. They
are remarkable. They are detailed. They produce data streams that are extremely tellingand, to my
mind, deeply reassuring.
inspector general and I are right down the hall from each other
very much peers." DeLong also works closely with the agency's chief counsel
and the newly-created Civil Liberties and Privacy Office. Its really a team
approach to keeping NSA accountable and building quality [into the system] and making sure we
can prove that were acting in accordance with the rules, authorities and permissions," DeLong said. A graduate of
agency's 62 year history. But it was one particular day in 2014 Jan. 17, to be exact when the rules changed suddenly.
That was the day President Barack Obama responded to the national outcry over the bulk data collection authorities
granted to NSA by Congress with an executive order that placed new restrictions on NSA. DeLong remembers the day
as an example of NSA's commitment to privacy and accountability. "The next hour, folks were in the conference room
next to my office and we implemented those changes that day," DeLong said. "That, I would call an accountable
organization. The minute [the rules] change, were responsive to that change. Many more changes have occurred since
agency. If an action is not permitted, or if were not permitted to collect something, the technology should just not allow
that," DeLong said. "Weve kind of, I think, hit the sweet spot in many of those areas, figuring out how to make sure the
laws and the policies get encoded directly into the machines and the computer systems we have, such that theyre as
much a part of the compliance team as the people we talk to when they walk in the doors." But that
sweet spot
Were going to still train people on their obligations," DeLong said. "Were
going to do both. He calls it the belt and suspenders approach to having overlapping safeguards. As for NSA's ability
to stop another Edward Snowden from stealing and exposing tens of thousands of classified documents to the public and
he is willing to
say NSA employees have options for reporting abuses or privacy violations
without having to betray the nation. And those options reporting it to the compliance office,
to America's enemies, DeLong isn't willing to say every security gap has been eliminated. But
inspector general and general counsel, among others were in place when Snowden chose to go to the media, DeLong
NSA has internal and external oversight mechanisms that evaluate its
compliance with the specific procedures in the context of the initial descriptions that led to them. This
oversight some of which is constant, some periodic includes everything from in-person
reviews to written reports. For NSA, being compliant means threading the
needle through all four stages. At any of these points, changes in technology certainly may compound
risk. Its no secret that technology can rapidly transform or shift, and NSA constantly interacts with
all three branches of the federal government at various stages of the process
described above. Our initial descriptions must be accurate . The prescribed
specific procedures must incorporate those descriptions, whether explicitly
or implicitly. Our implementation must be consistent . And when we are
evaluated, we must verify that it all worked according to plan through any
changes and over time. The authorities, laws and policies we operate under are a
sacred trust between the nation and NSA. We treat compliance with
the same respect . Were charged with delivering national security, but not
at any price. A compliance program that is well designed and implemented can adapt to todays technology. To be
sure, there are numerous best practices and tools in the compliance toolkit that make it possible. In the national
security context, with the four-stage process described above, there is an
even greater responsibility to operate with rigor, accuracy and precision : Its
Finally,
not just technology itself but the interplay between the process and constantly changing technology that keeps
compliance personnel and everyone else at NSA ever vigilant.
foreign targets continued even when those targets were in the U.S., although such non-compliant
data were later purged, according to the reports released today. Some analysts sent intelligence
information to other analysts who werent authorized to receive it, according to the documents. That
First is a six-page memorandum, dated April 10, 2009 and addressed to the majority
staff director of the Senate Select Committee on Intelligence. In it, the NSA
updates the Committee on some already-identified compliance issues and informs
congressional overseers of one new matter. Of the already-identified batch, the first item is NSAs
problematic implementation of a FISC-authorized business records (BR) order,
wherein 2,476 telephone numbers determined to be associated with
terrorism were prematurely added to a special list for retention and query
before undergoing formal NSA review designed to ensure that they met the reasonable articulable
suspicion (RAS) standard. Second, the memo notes NSAs attempts to mitigate its
inadvertent "overcollection" of data ; third, it mentions a joint pilot
program between NSA and the DIA's Joint Intelligence Task ForceCombating Terrorism (JITF-CT), under which JITF-CT had been allowed to access counterterrorism-related
SIGINT information. That database was then shut down, amid compliance
concerns . Which brings us to new stuff. For the first time, the memo discloses to the Committee NSA's decision
to suspend an entitys access to an NSA system called X-KEYSCORE (XKS); the entitys name is redacted from the
memo. Ditto details about the system and the problems that led to its suspension.
There are really two distinct issues at play here. The first is whether the
intelligence community kept the House and Senate intelligence committees
apprised of the program, as the law requires. The second is whether other members
of the legislature, who are not members of the intelligence committees but nonetheless had to vote on the
reauthorization, were given relevant information. As to the first issue, there really is no
question: Both committees were kept fully apprised, as they have both made
clear. At the time the matter first leaked, Senators Dianne Feinstein and Saxby Chambliss, chair and
vice-chair of the Senate Intelligence Committee, for example, issued a statement saying that [t]he
executive branchs use of this authority has been briefed extensively to the
Senate and House Intelligence and Judiciary Committees, and detailed information has
been made available to all members of Congress prior to each congressional reauthorization of this law.
Representatives Mike Rogers and Dutch Ruppersberger of the House Intelligence Committee, likewise released a
So
the question is really limited to whether non-committee members were kept
informed in advance of their votes. This is, notably, not a requirement of law. So the
question is whether the administration went above and beyond the
requirements of the law out of respect for the gravity of what it was
asking the legislature to do. At least in advance of the 2010 reauthorization vote, the answer to this
question is also unambiguous. In December 2009, the executive branch sent a detailed
briefing paper to the House and Senate Intelligence Committees. And Senators
statement expressing support for the program and saying that the Committee routinely reviews all FISA activities.
Feinstein and Kit Bond wrote a Dear Colleague letter inviting all of their colleaguesnot just those on the committee
to review the document: Members of the Select Committee on Intelligence have previously requested that the Executive
Branch permit each Member of Congress access to information on the nature and significance of intelligence authority
General and DNI have offered to make Department of Justice and Intelligence Community personnel available to meet
with any Member who has questions. We will be pleased to make members of our staff available for the same purpose.
On the House side, Rep. Alcee Hastings, a Member of the intelligence committee, made the following statement on the
House floor in February 2010: Mr. Speaker, I rise to inform Members that the Intelligence Committee has received a
classified document from the Department of Justice that is related to the PATRIOT Act authorities currently set to expire
at the end of the month. The House may consider a 1-year extension of the PATRIOT Act today so the Intelligence
Committee will be making this document available for Member review in the committee offices located in HVC-304. Staff
from the Intelligence and Judiciary Committees, as well as personnel from the Justice Department and with the Office of
the Director of National Intelligence, will be available to answer any questions that Members may have. Members who
want to review the document should call the Intelligence Committee to schedule an appointment. (156 Cong. Rec. H838,
Committee, the Attorney General and DNI have now provided an updated classified report for review by Members in
connection with this year's February 28, 2011 sunset. As was requested last year, they have asked that any interested
not sharing the specific document is not the same thing as not
sharing information. And theres every reason to think that, notwithstanding Chairman
Rogerss apparent failure to send the 2011 briefing papers to all members of
the House, the House Intelligence Committee shared information about the
program with members in the run-up to the vote . The committee has said in a statement that
Prior to voting on the PATRIOT Act reauthorization and the FAA reauthorization, Chairman Rogers hosted
classified briefings to which all Members were invited to have their
questions about these authorities answered." Indeed, the Obama administration
provided members of Congress or their staff 13 briefings on telephony
metadata surveillance from 2009 onnine of which took place in 2011. As Politico lists: Feb. 14,
2011: Senate All Senators were offered the opportunity discuss Sec.215 of the
Patriot Act in the VPOTUS office off of Senate Floor, Director of National Intelligence
But heres the thing:
James Clapper, FBI Director Robert Mueller, Alexander Feb. 28, 2011: SJC/SSCI Briefing Patriot Act reauthorization
(Classified). Feb. 28, 2011: HJC Briefing Patriot Act reauthorization (Classified). March 9, 2011: HJC Hearing Patriot Act
reauthorization (Unclassified), Hinnen. March 15, 2011: Meeting Durbin Patriot Act amendment (Classified). March 17,
2011: HPSCI Hearing Patriot Act reauthorization, Hinnen, FBI's Sean Joyce, Alexander. March 30, 2011: HJC Hearing
Patriot Act Reauthorization (Unclassified), Hinnen. May 13, 2011: House Rep Conf Patriot Act Reauthorization, Mueller.
May 24, 2011: House Dem Caucus Patriot Act Reauthorization, Mueller. We dont know the full range of what was
discussed in those briefings. One disadvantage to oral briefings, as opposed to briefing papers, is that theres always
room for dispute over how fulsome the briefings were. But
not receive the 2011 briefing paperand were not around for the version that was shared the
previous yearwere offered alternative means for learning about the programs
detailed in those papers. Members of the House claim to have been
blindsided by revelations of bulk metadata collection and have complained about
these briefings. But all signs suggest that their ignorance was largely of their
own making . For example, self-proclaimed PATRIOT Act architect Rep. Jim
Sensenbrenner (R-Wis.), among the most prominent critics of NSA surveillance in the wake of the disclosures,
did not attend any of the classified briefings on the governments use of
Section 215, MSNBC recently reported. And there are reasons to suspect that the briefings may
have been more fulsome than members well skilled in butt-covering
may choose to remember . For one thing, the administration was pretty candid
in public settings about Section 215. On September 22, 2009, in a House Judiciary Subcommittee
hearing on the reauthorization of key provisions of the PATRIOT Act, Todd Hinnen, then Deputy
Assistant Attorney General for law and policy in DOJs National Security
Division, confirmed that a sensitive collection program was being
conducted under the provision. The business records provision [Section 215] allows the government to obtain any
tangible thing it demonstrates to the FISA court is relevant to a counterterrorism or counterintelligence
investigation . . . It also supports an important, sensitive collection program about which many members of the
The
administration wrote the briefing paper and transmitted it four times
over two years to two different houses of Congress intending that it
be shown widely to members. So we know beyond any shadow of a doubt
that the administration wanted members to have certain detailed
information about the program . We also know that there were a lot of briefings
by that administration concerning this program to those same members in
the same time frame as the administration wanted those members to read
that briefing paper. Hmmmm. Wonder what they could have been talking about in those briefings. Ms.
Theres one other reason to believe the administration briefed members in a reasonable fashion:
Wheel insists that the 65 freshman members of the House who were not provided the 2011 briefing might have swung
revelations of Section 215 bulk metadata collection hit the press and the butt-covering had begun,
implying that members all had access to the 2011 briefing paper, but shes not wrong in her larger insistence that
Congress---and its members---knew what 215 was when it reauthorized it.
the program until August 2002, because, as the agencys counsel explained, the President would not
with Dick Cheneys authoritarian protector complex and his obsessive secrecy.
by Bush on Oct. 4, 2001, specified that the surveillance would be permitted during a limited period. At
According to then-NSA
director Michael Hayden, thats one reason why, for nearly a year, the NSAs
inspector general wasnt told about the program: It wasnt really perceived
as a program. Over time, the surveillance expanded in some ways . It was used
that time, nobody expected it to be continuously reauthorized.
against the Iraq Intelligence Service in 2003 and was later extended, through contact chaining, to some
Americans. But the larger trend was restraint. First came internal worries. Hayden accepted the
programs legality but didnt like its hyper-secrecy. He pressed the White House to inform Congress and
the FISC. According to the report, By August 2002, General Hayden and the NSA General Counsel
wanted to institutionalize oversight of the Program by bringing in the IG. Surveillance of Iraqi
The
first big blow came in March 2004, when DOJs Office of Legal Counsel
concluded that one of the programs collection methods, involving bulk
Internet metadata, was illegal. When the White House tried to
circumvent that finding, several DOJ officials, including then-Deputy
Attorney General James Comey, threatened to quit. At that point, Bush
backed down . According to the report, the President rescinded the authority to
collect bulk Internet metadata and gave NSA one week to stop collection and
block access to previously collected bulk Internet metadata. The Guardian cautions that
ultimately, the DOJ rebellion did not end the IP metadata collection It simply
intelligence officials, initiated in 2003, was halted after the collapse of Saddam Husseins regime.
brought it under a newly created legal framework. Thats true. But the
new framework made a difference . By forcing NSA to involve the FISC,
DOJ brought a judicial overseer to the table. NSA had to answer questions from the
courts advisers. When the court wasnt satisfied, it could veto or restrict the surveillance. The courts
initial order, issued in July 2004, for the first time specified the datalinks from which NSA could collect,
and it limited the number of people that could access the data. Thereafter ,
Executive Checks
Executive checks bad practices
Soufan 14 (Ali Soufan, reporter and book reviewer for Wall Street
Journal, The Shadow Lawmakers- review of Michael Glennons book
National Security and Double Government, Wall Street Journal, 12/30/14,
http://www.wsj.com/articles/book-review-national-security-and-doublegovernment-by-michael-j-glennon-1419983619)
Ultimately, though, the flaw with the book is that Mr. Glennon is too enamored of his thesis of an
unchanging government. Few who follow world events can doubt that the Obama administrations
approach to multiple national security issues has been essentially the same as that of the Bush
administration, he writes. Yes,
Courts Check
Federal Agencies will comply with the Supreme Court
Spriggs 97 (James F. Spriggs, II, Associate Professor of Political Science
at the University of California-Davis, Explaining Federal Bureaucratic
Compliance with Supreme Court Opinions, Political Research Quarterly,
Volume 50, September 1997, Jstor Accessed]
Federal government agencies complied with 93.2 percent of the Supreme
Court's opinions and narrowly complied with 6.8 percent of opinions . Also,
bureaucracies never defied nor evaded any of the Court's decisions, meaning
that agencies never failed to incorporate at least some aspect of the Court's
legal rules into their implementations. The agency responses that manifested narrow
compliance did not flout the Court's authority but they interpreted its opinions in self-interested ways.
may have eventually initiated reform without Court action, it is highly unlikely that this change would
have occurred as quickly as it did without intervention from the Court in issue areas such as
reapportionment, public aid to religious schools, and minority set-aside programs. In some situations,
the Court is able to achieve what even broad national majorities could not
accomplish through other political institutions. Of course, the Court is not always
successful at initiating change, nor would any reasonable student of the American political system expect
it to be. Any statement about the Courts power is relative to the expectations of the reader; those who
previously understood Court rulings to be universally implemented may be struck by the relative
highlights an important distinction between those Court rulings that can be directly implemented by
lower courts and those that cannot. This distinction, though simple and intuitive, explains vastly different
power may have tended to place too much emphasis on unpopular lateral issues. Although some scholars
have hinted at particular elements of the distinction between vertical and lateral issues, none have fully
explored the concept or suggested the significance of its many repercussions.5 Accordingly, I must
respectfully disagree with Rosenbergs assertion that courts act as fly-paper for social reformers who
advan- tages and disadvantages of a litigation strategy, compared to a legislative or electoral strategy for
reform. My findings suggest that reformers should con- sider whether the institutional situation and
public opinion surrounding their cause would make it likely for any favorable court ruling to be
implemented. If the reform sought could be directly implemented by lower courts or if the reformers face
no strong opposition from the public, the courts may offer a highly effective route to social change. If,
however, reformers hope for a change that cannot be implemented by lower courts and that faces strong
opposition, a litigation strategy may indeed be unwise. Finally, it should be emphasized that the Court is
rulings advance one ideology over another: Whereas the reappor- tionment and public aid to religious
schools rulings probably helped liberal causes, the affirmative action and minimum wage rulings likely
promoted a conservative agenda.
Congress Checks
Congressional action on Section 215 demonstrates that
Congress has stepped up to the plate to enforce antisurveillance measures prefer the most recent evidence.
This is a sea change in behavior that will lead to
aggressive enforcement on other Executive surveillance
issues.
Buttar 15 Shahid Buttar, constitutional lawyer and executive director
of the Bill of Rights Defense Committee, 2015 (Senate Moves to Check
Executive Spying Power, The Progressive, May 27th, Available Online at
http://progressive.org/news/2015/05/188151/senate-moves-check-executivespying-power, Accessed 06-07-2015)
A revolution came to Washington in the wee hours of Saturday morning, just
after the stroke of midnight. After 15 years of congressional deference to
mass surveillance, Congress finally took action ironically, by failing to
take actionand did its job to check and balance executive power .
On May 23, after a hard-fought congressional debate, the Senate effectively
allowed portions of the notorious Patriot Act to expire as previously
scheduled, appropriately rejecting a compromise branded as the Freedom
Act.
It is the first time Congress has meaningfully checked and balanced the
national security agencies since 2001. It will not be the last .
Where Did This Come From?
Congress approved the Patriot Act in 2001 with neither debate nor an
understanding of what it entailed. Since then, it has acceptedfrom both
the Bush and the Obama administrationssecret legal interpretations
contorting statutes into mass surveillance programs recently held illegal by
a federal appellate court, as well as lies under oath by senior officials aiming
to hide domestic spying programs from congressional and public oversight.
The American people have never gone along quietly.
During the Bush administration, years before the Edward Snowden
revelations amplified mass outrage in 2013, nearly 500 cities and eight
states issued official declarations decrying mass surveillance. Cities from
Lexington, Massachusetts to Bisbee, Arizona (including others in between
like New York City, Los Angeles and Dallas), and states as politically diverse
as California and Idaho raised their voices.
Since the Snowden revelations, Americans from coast to coast have taken
action to challenge domestic spying. We have taken action online, from
online petitions shaming the absent chair of a crucial congressional
oversight committee, to campaigns promoting mass encryption to force
constitutional compliance on the agencies technologically, despite their
disdain for legal limits. We have taken action in the streets, outside NSA
headquarters, outside the White House, at rallies on Capitol Hill and in our
state legislatures. We have fought back with music, sculpture, DJ mixes,
poetry and comedy.
While the domestic phone metadata program's days may be numbered, this
drama is just beginning. Hawks may force another Senate vote on Section
215 on the eve of the phone dragnet's expiration. Beyond their desperate
effort to save the program, the Freedom Act's rejection paves the way for
further surveillance reform to address other legal authorities under which
unconstitutional and ineffective domestic spying will continue even after this
authority finally expires.
FISA/FISC Checks
FISA Court solves the USA Freedom Act removes the
secrecy.
AP 15 Associated Press, Byline Ken Dilanian, 2015 (Questions and
answers about newly approved USA Freedom Act, Yahoo News, June 3 rd,
Available Online at http://news.yahoo.com/questions-answers-newlyapproved-usa-freedom-act-072501403.html, Accessed 06-08-2015)
Q: What else will change under the USA Freedom Act?
A: The new law gives private companies more leeway to publicly report
information about the number of national security surveillance demands
they receive. And it requires declassification of FISA Court opinions
containing significant legal decisions, or a summary if declassification is not
possible. That is designed to prevent secret interpretations such as the one
that allowed bulk collection of U.S. phone records.
pressure
from Congress and the public, prompted the Bush administration to submit
that program to the court's oversight.
the warrantless program to obtain FISA court orders. Criticism from the court, along with
four typos in his written testimony. DeLong, without missing a beat, jokingly but quite
aptly responded: You know, if that were us, we would have to notify the
FISA Court about each of them and the committee about each of them . It was
an amusing quip, but also an informative and telling one, which captures something deep and
important about two key aspects of the current debate. The first involves the
integrity of the oversight structures . The second involves the extent to
which our comfort level with data acquisition and exploitation in the era of Big Data needs
to depend pervasively on the compliance regime that undergirds it. Compliance is not
a sexy subject . But in this context, it is a big part of the whole ball game .
the USA Freedom Act. The Act's full real name is the
" Uniting and Strengthening America by Fulfilling Rights and Ending
Eavesdropping, Dragnet-Collection, and Online Monitoring Act."
It doesn't appear to be easy to support
Knowing the full name of the act helps explain why privacy supporters aren't shouting from the rafters over the
legislation, even if they are supporting it. As is the case with many other bills with elaborate names, the USA Freedom
James Sensenbrenner (R-Wis.), who introduced the PATRIOT Act in 2001. He said it was never his intent to authorize
Section 215, but that's not the only avenue by which the federal government claims authority to collect huge amounts of
private information. Furthermore, right now we're seeing the third attempt to get the act passed, and
the
strength of
the reforms has been watered down along the way. Indeed, some of the reforms
called for in the act (storing the telecommunications data with the companies rather than the government and requiring
the government to request it) came from former NSA Director Keith Alexander. The support of the Obama
Administration has itself given some pause, due to its role in fighting lawsuits against the program and the blatant
deception of current Director of Intelligence James Clapper before the Senate about the existence of mass phone record
"legal arguments that advance the protection of individual privacy and civil liberties," making the FISA court a slightly
more adversarial place rather than the apparent rubber stamp factory it had been. It will also mandate a declassification
perceptions of its
Making the situation more complicated is a federal court ruling that is actually friendly to privacy reformers.
On May 7, the Second Circuit Court of Appeals ruled that Section 215 never actually authorized the NSA to engage in
mass phone metadata collection in the first place. The court ruled that the NSA had stretched the definition of
"relevance" and "investigation" too far by scooping up pretty much everything and storing it just in case it might be
useful later. But the court also did not demand any immediate changes, partly because it knew Congress was already
working on legislation to deal with the pending sunsetting of Section 215, which expires June 1. This ruling prompted
some rethinking of the USA Freedom Act by the Electronic Frontier Foundation (EFF). The group had previously
endorsed each iteration of the act, increasingly reluctantly as it was watered down with each session. In response to the
court ruling, though, EFF withdrew its support and went neutral, calling for legislators to now strengthen the act. Mark
Jaycox, a legislative analyst for EFF who has been writing about the USA Freedom Act, still has positive things to say
about it, but doesn't want Congress to settle for less than it has to. It's the first reform of NSA surveillance since the
1970s. There should be more to it. " The
"specific selection term" is? The same people who determined that every single phone record of every American was
"relevant" to investigating potential terrorist attacks on Americans? Jaycox is aware that this abuse concern helps feed
the USA Freedom Act doesn't go nearly far enough. "We've seen the
intelligence community and the administration stretch definitions," Jaycox says.
the belief
"We've seen them come up to the line and cross it completely. Section 215 is an example. I think that's where the
hesitancy comes from." It's the FISA court that was supposed to stand in the way of the NSA abusing the language, but
that clearly didn't happen. Congress can legislate words to be as narrow as they like, Jaycox notes, "But at the end of the
day it's going to be a judge that's reviewing these orders." And thus, there's the push for more transparency and
declassification of FISA court decisions, in the hopes of making it more clear how the judges themselves are interpreting
the law. The modest reforms weren't enough for some privacy-minded House members like Rep. Justin Amash (R-Mich.),
Rep. Thomas Massie (R-Ky.), and Rep. Jared Polis (D-Colo.). They all voted no. Amash later explained on Facebook that
he feared passing the USA Freedom Act in the wake of the court ruling would have the impact of authorizing bulk data
collection rather than restricting it: "H.R. 2048 falls woefully short of reining in the mass collection of Americans' data,
and it takes us a step in the wrong direction by specifically authorizing such collection in violation of the Fourth
letter signed by him and 58 others in the House who voted no, explaining that their opposition to the USA Freedom Act
was tha the surveillance reforms did not go far enough.
Jennifer Granick is the Director of Civil Liberties at the Stanford Center for Internet and
Society. Jennifer was the Civil Liberties Director at the Electronic Frontier Foundation.
Jennifer practices, speaks and writes about computer crime and security, electronic
surveillance, consumer privacy, data protection, copyright, trademark and the Digital
Millennium Copyright Act. From 2001 to 2007, Jennifer was Executive Director of CIS and
taught Cyberlaw, Computer Crime Law, Internet intermediary liability, and Internet law and
policy. Before teaching at Stanford, Jennifer earned her law degree from University of
California, Hastings College of the Law and her undergraduate degree from the New College
of the University of South Florida. USA Freedom Act: Oh, Well. Whatever. Nevermind. Just
Security - May 21, 2014 http://justsecurity.org/10675/usa-freedom-act-oh-well-whatevernevermind/
The initially promising USA Freedom Act could have ended the previously
collecting Americans calling records, internet transactional
information and who knows what else in bulk. Todays version would allow broad
collection to continue under the guise of reform. The initial version of the
bill would have reinforced existing statutory language requiring a showing
of relevance to an authorized investigation before agents can get an order
requiring production of business records, dialing and routing information, and other
data, and would have added other limits to ensure massive collection would stop . It
also would have implemented mild reforms to content surveillance under section
702 of the F ISA A mendments A ct, stopping back door searches for Americans
communications. Last week, a Managers Amendment watered those provisions
down, substituting new language that would allow agents to use a specific
selection term as the basis for production. The bill defined specific selection term
as something that uniquely describe[s] a person, entity, or account. Given the
secret government practices of
intelligence communitys success at getting FISA judges to reinterpret obvious languagee.g. relevancein counterintuitive ways, people wondered what this new language might mean. Theres deep public mistrust for the intelligence
community and for the FISA court, which conspired to allow bulk collection under spurious legal justifications for years.
Worse, theres deep public mistrust for the law itself, since the intelligence communitys nuanced definitions of normal
words have made the public realize that they do not understand the meaning of words like relevance, collection,
bulk, or target.
Islamophobia Specific
2AC Islamophobia
A fourth amendment ruling would create legal recourse
for targets of racially biased surveillance. Necessary to
rebuild trust in local police. Even if it doesnt prevent
circumvention, it sets a precedent to sue that effectively
ends targeted surveillance.
Kendrick 2004 (Lindsay N. Kendrick, J.D. Candidate at Howard
University School of Law, Alienable Rights and Unalienable Wrongs:
Fighting the "War on Terror" through the Fourth Amendment, Howard Law
Journal (47 How. L.J. 989), Spring 2004, Available Online via Lexis-Nexis)
The judiciary, the legal system, and the United States and its "War on Terror"
could benefit from rejecting the proposition in Whren that racial profiling must
be brought under the Fourteenth Amendment and creating a Fourth
Amendment challenge that adopts the void for vagueness analysis of
Morales. Adopting the line of thinking in Morales would give persons
accused of crimes under the USA PATRIOT Act recourse under which to
contest their arrest or prosecution, a means of redress for Fourth
Amendment violations, other than just the exclusion of evidence, as well as
provide guidance for the judiciary in determining the validity of the
argument. It is important to note that Morales declared the statute unconstitutional without declaring
whether loitering was constitutionally protected behavior. Allowing a challenge under the
Fourth Amendment is not declaring a per se rule that activities like
providing financial support to terrorists is constitutionally protected legal
behavior, it is simply a means of protecting the constitutional rights of the
accused not to be targeted arbitrarily or discriminatorily. A Fourth
Amendment mode of recourse will be particularly important because there
are several provisions in the USA PATRIOT Act that alter Fourth Amendment
protections and serve to allow law enforcement to circumvent the traditional
protections of probable cause and notice. Section 201 of the USA PATRIOT Act amended
the Wiretap Act to allow any law enforcement officer or government attorney to obtain foreign
intelligence information that pertains to the "War On Terror." 2'44
Section 206 of the USA PATRIOT Act amends the Foreign Intelligence Surveillance Act (FISA) by allowing
wiretap warrants to be imposed against not just specific communications provides, but against
unspecified persons as well, without any geographical limitations. 247 Section 207 extends the length of
time for FISA surveillance from 90 to 120 days for a wiretap, and from forty-five to ninety days for a
also amends FISA. 5 FISA allows wiretapping of citizens and resident aliens in the United States
provided law enforcement can show probable cause that the intended target is either a "foreign power"
or an "agent of a foreign power.2z5 1 Section 218 amends this by allowing wiretapping not just where
foreign intelligence was the purpose of the investigation, as was required under FISA, but allows
wiretapping also where foreign intelligence is a significant purpose.252 Section 218 applies to electronic
more than forty percent of Blacks said that when they were pulled over they believed it was because of
their race." 6 When potential jurors were asked in a study by the National Law Journal and DecisionQuest
whether they agreed with the statement, "Police usually tell the truth when they testify at trial," seventy
These
statistics show clearly that racial profiling has had a negative impact on the
credibility of police as perceived by different minority communities . The
percent of Whites agreed with the statement while only thirty-six percent of Blacks did. 7
statistics alone do not begin to tell the whole story. There are numerous stories of police bias and
excessive force that remain vivid in the minds of minorities and that influence and taint the view that
these minorities have of the police. The brutal executions of Amadou Diallo,258 Nathaniel Jones,2 59
Malice Greene,260 Prince Jones,2 6 1 Frederick Finley,2 62 the beatings of Rodney King, 63 and the rape
of Abner Louima2 64 are only a handful of the recent stories, that when combined with the stories of the
past brutality by the police, the National Guard, and even state officials,265 leads many to distrust the
police. The disparate reaction between Whites and Blacks following the acquittal of O.J. Simpson is partly
explained by the disparate views held by Whites and Blacks about the criminal justice system and law
enforcement officials. 266 It is important to note that distrust of the police-causes concrete harms to
Protecting the
constitutional rights of the accused is central to fighting the "War on Terror.
'' 267
society, not just theoretical harms to those who do not trust the police.
1AR Islamophobia
A fourth amendment ruling would restore trust in the
government and provide recourse.
Kendrick 2004 (Lindsay N. Kendrick, J.D. Candidate at Howard
University School of Law, Alienable Rights and Unalienable Wrongs:
Fighting the "War on Terror" through the Fourth Amendment, Howard Law
Journal (47 How. L.J. 989), Spring 2004, Available Online via Lexis-Nexis)
Now, more than ever, trust in law enforcement and the government is crucial. In
order to maintain and facilitate that trust, law enforcement cannot resort to
arbitrary and discriminatory law enforcement techniques. Unfortunately, as long
as the USA PATRIOT Act remains broad and vague, it gives law enforcement
the power to engage in discriminatory practices. It allows targeting of
certain persons based on classifications of race, religion, ethnicity, or
general association. The current causes of action for those who allege they have been targeted are
so limited and bear such difficult burdens that law enforcement officials are virtually shielded from