THE WRIT TO REFUSE. The Writ to Refuse 429

Size: px
Start display at page:

Download "THE WRIT TO REFUSE. The Writ to Refuse 429"

Transcription

1 THE WRIT TO REFUSE The Apple, Inc. iphone Controversy (2016) Introduction In December of 2015, FBI agents were investigating a domestic terrorist attack in which a married couple attacked a government center in San Bernardino, California, and discovered an Apple iphone belonging to one of the suspects. The FBI then contacted Apple to ask the company to help access the phone s contents without triggering a security feature that would erase all data on the phone if an incorrect password was attempted too many times within a short period of time. Apple told the FBI that they would be happy to help, but that they did not have a system in place that would allow the company to bypass the security on the phone. The FBI then asked Apple to build a program that would provide a back door to the phone s security, a process discussed in Chapter 21. Apple refused on the basis that building such a program would essentially mean providing the FBI with the ability to unlock any iphone and because the existence of a master key program like the one the FBI wanted was too dangerous to Apple customers, who might be compromised if the master key program fell into the wrong hands. A federal judge then ordered Apple to comply with the FBI order, citing precedent in the 1789 All Writs Act, which gives the government the power to compel citizens to obey rules in ways not explicitly described in existing laws. The source for this chapter is an article written by journalist Danny Lewis in a February 2016 issue of Smithsonian Magazine, entitled, What the All Writs Act of 1789 Has to Do with the iphone. Lewis focuses less on the contemporary controversy and more on the history of the 1789 All Writs Act, other historic attempts to use the law by the federal government, and the legal implications of using the more than 200-year-old law to compel a modern company to essentially work for the state.

2 Topics covered in this chapter include: Encryption Corporate rights Digital privacy Domestic terrorism This Chapter Discusses the Following Source Document: Lewis, Danny. What the All Writs Act of 1789 Has to Do with the Senator Frank Church leads a series of hearings iphone. about Smithsonian. the secret NSA SHAMROCK Smithsonian Institution. Feb. 24, Congress passes the operation in place since 1945 that involved 1978 FISA Act intercepting communications from American citizens

3 431 The Apple Inc. iphone Controversy (2016) In December of 2015, 28-year-old U.S. born Syed Rizwan Farook and his wife, 29-year-old Pakistan-born Tashfeen Malik, attacked the Inland Regional Center of San Bernardino County, during an employee holiday party. Armed with semi-automatic rifles, pistols, and pipe bombs, Farook and Malik killed 16 people and injured 24 before both were killed by police after a chase and shootout. In the wake of the tragedy, police struggled to figure out whether Farook and Malik were members of a radical cell, or were lone-wolf radicals inspired by, but not belonging to, a larger group. The international radical group known as the Islamic State (also known as ISIS or ISIL or the Daesh) issued a statement through the organization s Amaq News Agency claiming responsibility for the attack, and U.S. President Barack Obama is seen on television in the home of Helen Medina, during his nationally-televised address from the White House about terrorism follow ing the attack on the Inland Regional Center on December 6, 2015 in San Bernardino, California. Medina hid in her home as the police engaged in a gun battle with terror suspects on her street; police killed the terror suspects that attacked the Center in San Bernardino that left 14 people dead and 21 injured on December 2. (Photo: Joe Raedle/Getty Images) The Intelligence Oversight Act (IOA) updates legal standards regarding federal President Reagan s E.O. authorized The Electronic Communication Privacy Act is

4 432 National Security vs. Civil & Privacy Rights investigators were concerned that Farook and Malik might have been part of a larger terrorist cell. As part of the investigation, the FBI obtained an iphone 5 belonging to one of the two assailants and hoped to gain access to the phone to learn more about the assailants. The iphone discovered among the assailants possessions had a security feature, generally called a self-destruct mechanism, that automatically erased all data from the phone if an incorrect password was entered 10 times. In an effort to avoid possibly erasing the data stored on the device, the FBI contacted Apple, Inc., asking the company to help bypass the phone s security. Apple explained to investigators that the company did not have a tool that could be used to bypass the self-destruct mechanism and so the FBI asked Apple to create a new, specialized software program that would run off of the phone s RAM and would allow investigators to enter possible passcodes without activating the self-destruct mechanism built into the iphone s operating system. Apple refused the request on the principle that building such a program would be akin to building a master key that could potentially be used to unlock any iphone. The FBI then took their case to the courts. In February of 2016, Justice Sheri Pym of the US District Court of Central California, issued a court order requiring Apple, Inc. to comply with the FBI request. This ruling, based on an obscure legal precedent known as the All Writs Act of 1789, demonstrated considerable creativity on the part of the courts and raised interesting legal questions about ownership of digital data and the rights and responsibilities of corporations. 142 In this article, from Smithsonian Magazine on February 24, 2016, New York technology journalist Danny Lewis describes the current and historic use of the All Writs Act, and discusses the possible consequences of the federal ruling on the San Bernardino case. Netscape creates the cookie allowing computers to monitor The September 11 terrorist attacks result in Congress authorizing the Bush Administration to utilize military methods to combat terrorism

5 433 WHAT THE ALL WRITS ACT OF 1789 HAS TO DO WITH THE IPHONE: HOW A LAW SIGNED BY GEORGE WASHINGTON IS BEING APPLIED BY GOOGLE by Danny Lewis Smithsonian Magazine, February 24, 2016 Source Document The ongoing battle between the United States government and Silicon Valley tech companies over encryption exploded last week when a federal judge ordered Apple to unlock an iphone. In doing so, the government invoked a 227-year-old law signed by President George Washington, himself. But what does one of the United States earliest laws have to do with the latest in communications technology? To make a long story short, Apple has so far refused to comply with government agents, who have demanded that the company helps break the encryption on the iphone that belonged to one of the San Bernardino shooters responsible for killing 14 people in California, last year. Since the attacks, the F.B.I. has received a warrant for the information on the iphone, but they have been stymied by its encryption, which is why they re looking for Apple s help. In an attempt to make Apple create a backdoor into the phone s operating system, the U.S. government has invoked the All Writs Act of The legal issues around the All Writs Act are complex, but at its core, it gives federal judges the power to issue orders to compel people to do things within the limits of the law, Eric Limer writes for Popular Mechanics. In its original form, the All Writs Act was part of the Judiciary Act of 1789, which established the federal justice system from the Supreme Court down to the lower federal courts. The All Writs Act allows federal judges the power to issue court orders, which makes sense considering that writs is an old-fashioned term for formal order. At one point in history, writs were fairly common, but over the centuries, courts have tended to use them only in extraordinary circumstances where there are no other laws that apply to the situation at hand, such as this case, where the government wants access to information in a password-protected cell phone. The vagueness built into the All Writs Act has leant itself to new readings throughout American history, Laura Sydell reports for NPR. The law actually seems to be keeping up with technology by being

6 434 National Security vs. Civil & Privacy Rights What the All Writs Act of 1789 Has to do With the iphone: How a Law Signed by George Washington is Being Applied by Google continued so broad that we re just reinterpreting it all the time, Irina Raicu, director of the Internet Ethics Program at Santa Clara University s Markkula Center for Applied Ethics, tells Sydell. The government has cited the All Writs Act in the past, from a 1977 ruling forcing phone companies to help set up devices that record all numbers called from a specific phone line to the Wireless Communications and Public Safety Act of 1999 which required all cellphone providers to be able to geolocate their customers phones. The writ does have its limits: a federal judge ruled in 2005 that the All Writs Act could not be used to force a phone company to allow real-time tracking of a phone without a warrant, Eric Lichtblau and Katie Benner report for the New York Times. Whatever the result of this current case, the dispute will have major legal implications for the fight over encryption in the future. While the F.B.I. says the court-ordered bypass, which would have Apple create software to disable the feature that wipes the data on the phone after 10 incorrect password attempts, would only be used in this particular case, Apple s chief, Timothy D. Cook recently fired off an open letter arguing that allowing this would set a dangerous legal precedent for user privacy in the future In the open letter issued by Apple CEO Tim Cook, Cook explains the company s perspective on the issue, the potential security issues involved and claims that the company s primary interest is in ensuring the future security of Apple s products, while also taking a stand against what Cook calls governmental overreach. Critics doubted that Apple was as concerned with customer privacy as with protecting the technological innovations built into the company s devices. In his open letter to Apple s customers, Cook asserts that encryption is an essential consumer technology: The best measure available to consumers to prevent cybercrime and the exposure of potentially damaging

7 435 personal data. While acknowledging the legitimacy of the FBI s goals, and the company s desire to help to prevent terrorism, Cook explains that the FBI s request is not simply for Apple Inc. to bypass security on a single device, but rather, to create a key that could be used to unlock any device. This backdoor key, Cook argues, is too dangerous to customer safety to create and Cook expresses doubt that the government, Apple, or any other entity would be capable of keeping such a program safe and out of the hands of cybercriminals. Furthermore, he argues that there exists no clear legal precedent that would allow the government to compel a company to create a product dangerous to their own customers. Cook's argument, that the FBI was asking for something we simply do not have, and something we consider too dangerous to create, gets to the heart of the long-standing debate over the legality of encryption and whether corporations had a responsibility to help or facilitate access for government and law enforcement. Cook essentially argues that there should be no master key available to anyone, whether a company or a government agency, because the very existence of such a mechanism poses too great a risk to personal privacy. Consider, for instance, that a data breach at Apple, Inc, or one from the federal government (of which there have been many) could result in the master key program falling into the hands of hackers or cybercriminals. Further, privacy advocates have long warned about the dangers of enabling the state to develop powers or technologies that might be used to curtail basic liberties, unless proper safeguards to prevent misuse had already been developed and established. This effort, despite sometimes generating controversy, is in keeping with the fundamental founding principles of the United States. Therefore, while Apple's CEO says, we believe the FBI's intentions are good, placing limits on governmental abilities is not only about whether the people trust their current government, but are meant to address the future as well, when unforeseen cir- The Bush Administration plans to make data taken from spy satellites available to law enforcement and thus to enable spy satellite equipment to be used to Congress passes Section 702, or the FISA Amendment Act, which is used to permit a massive NSA and CIA domestic surveillance program gathering telephone and Internet data from millions of

8 436 National Security vs. Civil & Privacy Rights cumstances might lead to an administration willing and able to use such tools for oppression. A third issue also arises from the government's use of the All Writs Act, which simply states that the federal government is empowered to issue all writs necessary or appropriate in aid of their respective jurisdiction and agreeable to the usages and principles of law. Writing about the issue in The Guardian, journalists Neil Richards and Woodrow Hartzog argue that the All Writs Act is a piece of Swiss Army knife legislation that the FBI is trying to turn into a giant sword. Hartzog and Richards explain that the act was part of a series of clauses meant to establish the legal right for the government to exceed the powers given within the constitution, but only to the point at which the government utilized powers necessary and appropriate to the situation. The power to compel a company to create new software isn t included in the FBI s legal mandate and Judge Sheri Pym therefore utilized a catchall rule to argue that the FBI could legally exceed the powers given to the agency by existing U.S. law. Hartzog and Richard thus argue: If the FBI wants new powers to break the security of our digital technologies, let it demand a law from Congress. And then we can submit that law to the courts to make sure it is constitutional. 144 The government s attempts to force Apple to create new software also raises another important issue involving civil liberties; whether the state has the right to compel a company, or a person, to work in service of the state? In other words, can the government simply order a car manufacturer, or a baker, or an oil painter, or a watchmaker, to create something for the government? What if the person has moral or ethical objections to the request? What if the person simply doesn t want to work for the government? Does a person or company have the right to refuse? In the case The Obama Administration proposes a Consumer Privacy Bill of Rights guaranteeing individuals the right to greater control over the use of their digital data, forming the basis of a The Guardian and the Washington Post publish the first series of articles derived from leaked NSA and CIA documents

9 437 of the Apple Inc. controversy, the courts ruled that the FBI had the right to compel Apple Inc. to work for the state. The justification or reasons for the FBI s request may have played a role in this specific case, but such considerations are immaterial to the broader question, which has far reaching civil liberties implications. 145 In the end, after Apple s refusal, the FBI announced that it had found another way to bypass the phone s security system and the issue of whether Apple would be forced to comply became moot. The case, however, raised a host of important questions regarding privacy and security that were never resolved. Apple was widely praised by some for standing up to the government s perceived overreach, while also criticized by those who believed the company was refusing to help a government agency combat a legitimate, imminent threat to national security. Others believed that Apple s decision was based purely on the desire to protect company secrets and so criticized Apple for placing the company s well-being ahead of security and public concerns. Whether Cook and Apple, Inc. were motivated by selfish concerns, or were legitimately interested in the broader privacy and civil liberties issues is also unimportant in exploring the significance of the case. Whatever the reasons, the civil liberties questions raised by the case are important in determining when and to what degree national security concerns can be used to compel behavior. Public opinion on the Apple issue was mixed and complex. In a 2016 article in The Atlantic, journalist Krishnadev Calamur explored opinion polls on the issue. In a Pew Research poll, 51 percent believed that Apple should comply with the government s orders, though Calamur raised an interesting point in noting that the way in which the question was raised influenced the way people responded to the issue. The original question asked: The Senate Judiciary committee holds hearings to determine if the executive surveillance operations carried out under the PATRIOT Act were a Snowden leaks reveal that the NSA and CIA had been attempting to force corporations to provide a backdoor to encryption systems that would allow

10 438 National Security vs. Civil & Privacy Rights As you may know, the FBI has said that accessing the iphone is an important part of their ongoing investigation into the San Bernardino attacks, while Apple has said that unlocking the iphone could compromise the security of other user s information, do you think Apple: Should unlock the iphone Should NOT unlock the iphone Don t know/refused. In answer to the question phrased in this way, 51 percent said Apple should unlock the phone. However, in a Reuters/Ipsos poll, the question was phrased: Apple is opposing a court order to unlock a smart phone that was used by one of the shooters in the San Bernardino attack. Apple is concerned that if it helps the FBI this time, it will be forced to help the government in future cases that may not be linked to national security, opening the door for hackers and potential future data breaches for smartphone users. Do you agree or disagree with Apple s decision to oppose the court order? When phrased in this way, 46 percent supported Apple, and 35 percent supported the government, with 20 percent uncertain about the issue. 146 The difference in phrasing of the two questions could be seen as constituting a shift in focus as well. When emphasis is placed on the FBI s justification in the specific case, more Americans supported the FBI s argument, whereas, when emphasis was placed on Apple s objections, Terrorist attacks in France reignite fears The PATRIOT Act is replaced Federal Courts order Apple, Inc. to create a new operation system that would enable federal investigators to bypass security on an iphone. Apple refuses on the

11 The FCC publishes official rules of The EU establishes the General Data Protection Regulation (GDPR), described as the strongest digital data privacy law in the world 439 more respondents were willing to accept Apple s position on the issue. In March, a Wall Street Journal poll demonstrated a nearly even split on the issue, with Republicans favoring the government by a margin of 57 to 37 percent, while Democrats favored Apple by a margin of 50 to 40 percent. Independent voters, however, strongly sided with Apple, by a margin of 58 to 28 percent. 147 While the Bernardino iphone case was proceeding, the Department of Justice (DOJ) also called on Apple to help bypass security on an iphone belonging to a drug dealer involved in a conspiracy case in New York City. In the case, the DOJ again attempted to argue that the All Writs Act gave them the power to compel Apple to comply with their request and Apple attorneys again refused to help unlock the device. Federal Judge James Orenstein rejected the DOJ s request, holding that the All Writs Act could not legitimately be used to order a company to manipulate its products. The implications of the government s position are so far-reaching both in terms of what it would allow today and what it implies about Congressional intent in 1789 as to produce absurd results. 148 Be Careful What You Say Be On Your Guard, WWII Careless Talk poster. (Photo by The National Archives/ SSPL/Getty Images)

12 440 National Security vs. Civil & Privacy Rights CONCLUSION The Apple iphone controversy of 2016 intensified the existing debate over encryption and the right to hide from governmental intrusion. Apple Inc. refused to comply with the government s order, despite the court ruling that used the All Writ s Act as precedent, arguing that the existence of a master key like the one that federal government wanted was too dangerous to consumers and violated privacy rights protections. The suit never came to trial, as the FBI claimed later that they had discovered another way to bypass the phone s security mechanisms. Studies of public opinion about the incident found that the public was broadly supportive of the FBI s desire to conduct a thorough investigation, especially because the case involved domestic terrorism, but that, in general, the public remained skeptical of the federal government s overall commitment to privacy and/or ability to properly secure sensitive information.

13 441 DISCUSSION QUESTIONS Should American citizens have the right to use encryption products that the government cannot bypass? Why or why not? Was the All Writs Act an appropriate legal justification for the request made by the FBI? Explain your answer. Do you trust the federal government to have a master key that would allow federal agents to bypass security on any phone? Why or why not? Was Apple Inc. justified in refusing the FBI s request? Why or why not? Works Used Ackerman, Spencer, Thielman, Sam, and Danny Yadron. Apple case: judge rejects FBI request for access to drug dealer s iphone. The Guardian. Guardian News and Media. Feb. 29, Web. 4 Nov A Message to Our Customers. Apple. Apple, Inc. Feb. 16, Web. 31 Oct Calamur, Krishnadev. Public Opinion Supports Apple Over the FBI or Does it? The Atlantic. Atlantic Monthly Group. Feb. 24, Web. 4 Nov Musil, Steven. Apple has support of independent voters in FBI iphone battle. CNET. Mar. 8, Web. 4 Nov Richards, Neil, and Woodrow Hartzog. Apple v. the FBI: why the 1789 All Writs Act is the wrong tool. The Guardian. Guardian News and Media. Feb. 24, Web. 30 Oct Sorkin, Amy Davidson. The Dangerous All Writs Act Precedent in the Apple Encryption Case. The New Yorker. Conde Nast. Feb. 19, Web. 31 Oct Zetter, Kim. Magistrate Orders Apple to Help FBI Hack San Bernardino Shooter s Phone. Wired. Conde Nast. Feb. 16, Web. 31 Oct

Weekly Geopolitical Report

Weekly Geopolitical Report Weekly Geopolitical Report By Bill O Grady March 14, 2016 The Apple Problem On December 2, 2015, Syed Rizwan Farook and his wife, Tashfeen Malik, attacked a San Bernardino county facility, killing 14 people

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Electronic Surveillance and FISA Eric Rosenbach and Aki J. Peritz Electronic Surveillance and FISA Electronic surveillance is one

More information

Case 5:16-cm SP Document Filed 03/15/16 Page 1 of 5 Page ID #:2806. Exhibit HH

Case 5:16-cm SP Document Filed 03/15/16 Page 1 of 5 Page ID #:2806. Exhibit HH Case 5:16-cm-00010-SP Document 177-5 Filed 03/15/16 Page 1 of 5 Page ID #:2806 Exhibit HH Case 5:16-cm-00010-SP Document 177-5 Filed 03/15/16 Page 2 of 5 Page ID #:2807 PRO WATCHLIST CYBERSECURITY TECHNOLOGY

More information

Encryption: Balancing the Needs of Law Enforcement and the Fourth Amendment

Encryption: Balancing the Needs of Law Enforcement and the Fourth Amendment 1050 17 th Street, N.W. Suite 1150 Washington, DC 20036 Free Markets. Real Solutions. 202.525.5717 www.rstreet.org Statement for the Record Before: Reps. Ted Poe, Pete Olson and Blake Farenthold April

More information

Apple Inc. vs FBI A Jurisprudential Approach to the case of San Bernardino

Apple Inc. vs FBI A Jurisprudential Approach to the case of San Bernardino 210 Apple Inc. vs FBI A Jurisprudential Approach to the case of San Bernardino Aishwarya Anand & Rahul Kumar 1 Abstract In the recent technology dispute between FBI and Apple Inc. over the investigation

More information

The administration defended the surveillance program, saying that it is lawful and is a critical tool to protect national security.

The administration defended the surveillance program, saying that it is lawful and is a critical tool to protect national security. Government Surveillance of Citizens Raises Civil Liberty Concerns Two revelations about government programs designed to sift through the public s phone calls and social media interaction have raised questions

More information

CRIMINAL INVESTIGATIONS AND TECHNOLOGY: PROTECTING DATA AND RIGHTS

CRIMINAL INVESTIGATIONS AND TECHNOLOGY: PROTECTING DATA AND RIGHTS CRIMINAL INVESTIGATIONS AND TECHNOLOGY: PROTECTING DATA AND RIGHTS JUNE 8, 2017 Bracewell LLP makes this information available for educational purposes. This information does not offer specific legal advice

More information

January 14, Dear Chairman Graham and Ranking Member Feinstein:

January 14, Dear Chairman Graham and Ranking Member Feinstein: January 14, 2019 The Honorable Lindsey Graham, Chairman The Honorable Dianne Feinstein, Ranking Member U.S. Senate Committee on the Judiciary Dirksen Senate Office Building 224 Washington, DC 20510 Dear

More information

GOVERNMENT HACKING BIBLIOGRAPHY

GOVERNMENT HACKING BIBLIOGRAPHY GOVERNMENT HACKING BIBLIOGRAPHY Major Announcements, Statements, General News Coverage Rule 41 has Silicon Valley, FBI Arguing Again Over Hacking Powers Sean Sposito, San Francisco Chronicle, June 27,

More information

2016 NCSU N=879

2016 NCSU N=879 Spring, 2016 NCSU Pack Poll: Big Poll Toplines Report March 13-15 N=879 Completed Response Rate= 20% Margin of sampling error for completed response rate and questions asked of the full sample +/- 3.3%

More information

The story of John Ashcroft and James Comey s hospital-bed heroics has by now been

The story of John Ashcroft and James Comey s hospital-bed heroics has by now been Issue #35, Winter 2015 Infiltrate the NSA To re-establish the balance between security and civil liberties, we don t just need more laws. We need more civil libertarians in the security state. Margo Schlanger

More information

STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON THE JUDICIARY U.S. HOUSE OF REPRESENTATIVES

STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON THE JUDICIARY U.S. HOUSE OF REPRESENTATIVES STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON THE JUDICIARY U.S. HOUSE OF REPRESENTATIVES AT A HEARING ENTITLED ENCRYPTION TIGHTROPE: BALANCING AMERICANS

More information

Fear of Online Crime: Americans support FBI interception of criminal suspects and new laws to protect online privacy

Fear of Online Crime: Americans support FBI interception of criminal suspects  and new laws to protect online privacy EMBARGOED FOR RELEASE AT 6:30 PM EASTERN MONDAY, APRIL 2, 2001 Fear of Online Crime: Americans support FBI interception of criminal suspects email and new laws to protect online privacy By Susannah Fox,

More information

Electronic Privacy Information Center September 24, 2001

Electronic Privacy Information Center September 24, 2001 Electronic Privacy Information Center September 24, 2001 Analysis of Provisions of the Proposed Anti-Terrorism Act of 2001 Affecting the Privacy of Communications and Personal Information In response to

More information

A US Spy Tool Could Spell

A US Spy Tool Could Spell When Friends Spy on Friends: A US Spy Tool Could Spell Trouble for the Middle East July 5, 2017 A US Spy Tool Could Spell Trouble for the Middle East Under Trump Since June of this year, the debate about

More information

THE GOVERNMENT S POST-HEARING BRIEF

THE GOVERNMENT S POST-HEARING BRIEF Case 1:15-mc-01902-JO Document 21 Filed 10/28/15 Page 1 of 12 PageID #: 551 EMN:LHE/SK F.#2014R00236 UNITED STATES DISTRICT COURT EASTERN DISTRICT OF NEW YORK X IN RE ORDER REQUIRING APPLE INC. TO ASSIST

More information

The National Security Agency s Warrantless Wiretaps

The National Security Agency s Warrantless Wiretaps The National Security Agency s Warrantless Wiretaps In 2005, the press revealed that President George W. Bush had authorized government wiretaps without a court warrant of U.S. citizens suspected of terrorist

More information

Case 3:16-cv Document 1 Filed 04/19/16 Page 1 of 8

Case 3:16-cv Document 1 Filed 04/19/16 Page 1 of 8 Case :-cv-00 Document Filed 0// Page of 0 0 MARK RUMOLD (SBN 00 mark@eff.org NATHAN D. CARDOZO (SBN 0 nate@eff.org AARON MACKEY (SBN amackey@eff.org ELECTRONIC FRONTIER FOUNDATION Eddy Street San Francisco,

More information

Investigatory Powers Bill

Investigatory Powers Bill Investigatory Powers Bill How to make it fit-for-purpose A briefing for the House of Lords by the Don t Spy on Us coalition Contents Introduction 1 About Don t Spy on Us 1 The Bill fails to introduce independent

More information

Global View Assessments Fall 2016

Global View Assessments Fall 2016 Accepting Syrian Refugees: Wise or Detrimental? Key Judgement: As ISIS strengthens their spread and reach, and with the United States accepting 10,000 refugees a Paris level attack could be imminent for

More information

Fourth Amendment General Population Respondents. Conducted May 21-23, 2013 Margin of Error ±4%

Fourth Amendment General Population Respondents. Conducted May 21-23, 2013 Margin of Error ±4% Sample Conducted May 21-23, 2013 Margin of Error ±4% 1000 General Population Respondents 1. The following is a summary of the bill of rights in shuffled order. Please select the one which you believe corresponds

More information

Encryption & FBI vs Apple. Sophie Park & Shanelle Roman

Encryption & FBI vs Apple. Sophie Park & Shanelle Roman Encryption & FBI vs Apple Sophie Park & Shanelle Roman Legal Issues in FBI vs. Apple Main Topics Technical Debates in Encryption and Security Social Interpretation and Responses Framing Question Consumer

More information

BILLS PENDING AS OF 9/11/13 THAT RELATE TO NSA SURVEILLANCE

BILLS PENDING AS OF 9/11/13 THAT RELATE TO NSA SURVEILLANCE BILLS PENDING AS OF 9/11/13 THAT RELATE TO NSA SURVEILLANCE September 12, 2013 Members of Congress have introduced a series of bills to amend the Foreign Intelligence Surveillance Act in response to disclosure

More information

Fourth Amendment General Population Respondents. Conducted May 21-23, 2013 Margin of Error ±4%

Fourth Amendment General Population Respondents. Conducted May 21-23, 2013 Margin of Error ±4% Sample Conducted May 21-23, 2013 Margin of Error ±4% 1000 General Population Respondents 1. The following is a summary of the bill of rights in shuffled order. Please select the one which you believe corresponds

More information

Spying on humanitarians: implications for organisations and beneficiaries

Spying on humanitarians: implications for organisations and beneficiaries Spying on humanitarians: implications for organisations and beneficiaries Executive Summary The global communications surveillance mandates of American, British and other Western intelligence agencies

More information

PEW RESEARCH CENTER FOR THE PEOPLE & THE PRESS/WASHINGTON POST MAY OSAMA BIN LADEN SURVEY FINAL TOPLINE May 2, 2011 N=654

PEW RESEARCH CENTER FOR THE PEOPLE & THE PRESS/WASHINGTON POST MAY OSAMA BIN LADEN SURVEY FINAL TOPLINE May 2, 2011 N=654 1 PEW RESEARCH CENTER FOR THE PEOPLE & THE PRESS/WASHINGTON POST MAY OSAMA BIN LADEN SURVEY FINAL TOPLINE May 2, 2011 N=654 Q.1a All in all, are you satisfied or dissatisfied with the way things are going

More information

FINAL WORKING DOCUMENT

FINAL WORKING DOCUMENT EUROPEAN PARLIAMT 2009-2014 Committee on Foreign Affairs 20.11.2013 FINAL WORKING DOCUMT on Foreign Policy Aspects of the Inquiry on Electronic Mass Surveillance of EU Citizens Committee on Foreign Affairs

More information

PEW RESEARCH CENTER June 27-30, 2013 OMNIBUS FINAL TOPLINE N=1,003

PEW RESEARCH CENTER June 27-30, 2013 OMNIBUS FINAL TOPLINE N=1,003 8 PEW RESEARCH CENTER June 27-30, OMNIBUS FINAL TOPLINE N=1,003 PEW.1 As I read a list of some stories covered by news organizations this past week, please tell me if you happened to follow each news story

More information

2. Do you approve or disapprove of the job Congress is doing? Sep 08 17% 73 9 Democrats 28% Sep 08 23% 68 8 Republicans 10% 87 3

2. Do you approve or disapprove of the job Congress is doing? Sep 08 17% 73 9 Democrats 28% Sep 08 23% 68 8 Republicans 10% 87 3 18 March 2010 Polling was conducted by telephone March 16-17, 2010, in the evenings. The total sample is 900 registered voters nationwide with a margin of error of 3 percentage points. Results are of registered

More information

Syllabus Law : Surveillance Law Seminar. George Mason University Law School Fall 2015 Arlington Hall, Hazel Hall. Professor Jake Phillips

Syllabus Law : Surveillance Law Seminar. George Mason University Law School Fall 2015 Arlington Hall, Hazel Hall. Professor Jake Phillips Brief Course Description: Syllabus Law 641-001: Surveillance Law Seminar George Mason University Law School Fall 2015 Arlington Hall, Hazel Hall Professor Jake Phillips This seminar course will expose

More information

CRS Report for Congress

CRS Report for Congress Order Code RS21441 Updated July 6, 2005 CRS Report for Congress Received through the CRS Web Summary Libraries and the USA PATRIOT Act Charles Doyle Senior Specialist American Law Division The USA PATRIOT

More information

Privacy The Fourth Amendment and Government Systems CSC 301 Spring 2018 Howard Rosenthal

Privacy The Fourth Amendment and Government Systems CSC 301 Spring 2018 Howard Rosenthal Privacy The Fourth Amendment and Government Systems CSC 301 Spring 2018 Howard Rosenthal Course Notes: Much of the material in the slides comes from the books and their associated support materials, below

More information

Deutscher Bundestag. 1st Committee of Inquiry. in the 18th electoral term. Hearing of Experts. Surveillance Reform After Snowden.

Deutscher Bundestag. 1st Committee of Inquiry. in the 18th electoral term. Hearing of Experts. Surveillance Reform After Snowden. Deutscher Bundestag 1st Committee of Inquiry in the 18th electoral term Hearing of Experts Surveillance Reform After Snowden September 8, 2016 Written Statement of Timothy H. Edgar Senior Fellow Watson

More information

PATRIOT Propaganda: Justice Department s PATRIOT Act Website Creates New Myths About Controversial Law. ACLU Analysis

PATRIOT Propaganda: Justice Department s PATRIOT Act Website Creates New Myths About Controversial Law. ACLU Analysis PATRIOT Propaganda: Justice Department s PATRIOT Act Website Creates New Myths About Controversial Law ACLU Analysis A new Justice Department website purporting to dispel the myths about the controversial

More information

CASE NO. 1D The petition in this matter seeks to quash a discovery order in a wrongful

CASE NO. 1D The petition in this matter seeks to quash a discovery order in a wrongful IN THE DISTRICT COURT OF APPEAL FIRST DISTRICT, STATE OF FLORIDA TAMMY LEE ANTICO, PERSONAL REPRESENTATIVE OF THE ESTATE OF TABITHA FRANCES GUYTON ANTICO, DECEASED, NOT FINAL UNTIL TIME EXPIRES TO FILE

More information

A Legal Analysis of the NSA Warrantless Surveillance Program. Morton H. Halperin and Jerry Berman 1. January 31, 2006

A Legal Analysis of the NSA Warrantless Surveillance Program. Morton H. Halperin and Jerry Berman 1. January 31, 2006 A Legal Analysis of the NSA Warrantless Surveillance Program Morton H. Halperin and Jerry Berman 1 January 31, 2006 The warrantless NSA surveillance program is an illegal and unnecessary intrusion into

More information

Investigatory Powers Bill. How to make it fit-for-purpose

Investigatory Powers Bill. How to make it fit-for-purpose Investigatory Powers Bill How to make it fit-for-purpose Contents Introduction 1 The draft Bill fails in its mission to be clear and comprehensive 2 The operational case has not been made for all powers

More information

FILED SEP NANCY MAYER WHITTINGTON, CLERK. Case 1:07-cv RBW Document 1 Filed 09/27/07 Page 1 of 8

FILED SEP NANCY MAYER WHITTINGTON, CLERK. Case 1:07-cv RBW Document 1 Filed 09/27/07 Page 1 of 8 Case 1:07-cv-01732-RBW Document 1 Filed 09/27/07 Page 1 of 8 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA FILED SEP 2 7 2007 NANCY MAYER WHITTINGTON, CLERK U.S. DISTRICT COURT ELECTRONIC

More information

Data, Social Media, and Users: Can We All Get Along?

Data, Social Media, and Users: Can We All Get Along? INSIGHTi Data, Social Media, and Users: Can We All Get Along? nae redacted Analyst in Cybersecurity Policy April 4, 2018 Introduction In March 2018, media reported that voter-profiling company Cambridge

More information

Policy Poll of Registered Voters January 3-10, phone: web: northstaropinion.com

Policy Poll of Registered Voters January 3-10, phone: web: northstaropinion.com Policy Poll of Registered Voters January 3-10, 2015 phone: 703.836.7666 web: northstaropinion.com Methodology Survey conducted January 3-10, 2015. 1328 registered voters interviewed by telephone with live

More information

Statement for the Record. House Judiciary Subcommittee on Crime, Terrorism and Homeland Security. Hearing on Reauthorizing the Patriot Act

Statement for the Record. House Judiciary Subcommittee on Crime, Terrorism and Homeland Security. Hearing on Reauthorizing the Patriot Act Statement for the Record House Judiciary Subcommittee on Crime, Terrorism and Homeland Security Hearing on Reauthorizing the Patriot Act Statement for the Record Robert S. Litt General Counsel Office of

More information

A Cult of Rules: The Origins of Legalism in the Surveillance State

A Cult of Rules: The Origins of Legalism in the Surveillance State Page 1 of 5 A Cult of Rules: The Origins of Legalism in the Surveillance State By Margo Schlanger Wednesday, November 5, 2014 at 11:13 AM Editor s note: this post is a preview of ideas raised in an upcoming

More information

THE RUTHERFORD INSTITUTE

THE RUTHERFORD INSTITUTE THE RUTHERFORD INSTITUTE Post Office Box 7482 Charlottesville, Virginia 22906-7482 JOHN W. WHITEHEAD Founder and President TELEPHONE 434 / 978-3888 FACSIMILE 434/ 978 1789 www.rutherford.org Via Email,

More information

tinitrd~tat s~fnatf WASHINGTON, DC 20510

tinitrd~tat s~fnatf WASHINGTON, DC 20510 tinitrd~tat s~fnatf WASHINGTON, DC 20510 December 14, 2005 Dear Colleague, Prior to the Thanksgiving recess, several Senators expressed strong opposition to the draft Patriot Act reauthorization conference

More information

Partisan Interest, Reactions to IRS and AP Controversies

Partisan Interest, Reactions to IRS and AP Controversies MAY 20, 2013 Attentive Public Critical of DOJ Use of AP Records Partisan Interest, Reactions to IRS and AP Controversies FOR FURTHER INFORMATION CONTACT THE PEW RESEARCH CENTER FOR THE PEOPLE & THE PRESS

More information

Most Still Say Reform Issues Hard to Understand PUBLIC CLOSELY TRACKING HEALTH CARE DEBATE

Most Still Say Reform Issues Hard to Understand PUBLIC CLOSELY TRACKING HEALTH CARE DEBATE NEWS Release. 1615 L Street, N.W., Suite 700 Washington, D.C. 20036 Tel (202) 419-4350 Fax (202) 419-4399 FOR IMMEDIATE RELEASE: Wednesday, December 16, 2009 FOR FURTHER INFORMATION: Andrew Kohut, Director

More information

The Politics of Privacy and Technology: Fighting an Uphill Battle. Eric Fulton, CEO SubSector Solutions Daniel Zolnikov, MT House Representative

The Politics of Privacy and Technology: Fighting an Uphill Battle. Eric Fulton, CEO SubSector Solutions Daniel Zolnikov, MT House Representative The Politics of Privacy and Technology: Fighting an Uphill Battle Eric Fulton, CEO SubSector Solutions Daniel Zolnikov, MT House Representative Note, a prettier and updated version of this presentation

More information

STATEMENTS OF SUPPORT. R Street Op-Ed:

STATEMENTS OF SUPPORT. R Street Op-Ed: STATEMENTS OF SUPPORT Recent Op-Eds and Letters of Support: President Obama Statement of Administration Policy: http://www.whitehouse.gov/sites/default/files/omb/legislative/sap/113/saps2685s20141117.pdf

More information

Countering Adversary Attacks on Democracy. It's Not Just About Elections. Thought Leader Summary

Countering Adversary Attacks on Democracy. It's Not Just About Elections. Thought Leader Summary Countering Adversary Attacks on Democracy Thought Leader Summary In 2016, Russia, in an unprecedented way, massively interfered with our elections in a way that was better organized, better coordinated

More information

Class #10: The Extraterritorial Fourth Amendment. Professor Emily Berman Thursday, September 25, 2014

Class #10: The Extraterritorial Fourth Amendment. Professor Emily Berman Thursday, September 25, 2014 Class #10: The Extraterritorial Fourth Amendment Professor Emily Berman Thursday, September 25, 2014 Thursday, September 25, 2014 Wrap Up Third Party Doctrine Discussion Smith v. Maryland Section 215 The

More information

RECOMMENDED CITATION: Pew Research Center, March 2014, Nearly Half of Public Says Right Amount of Malaysian Jet Coverage

RECOMMENDED CITATION: Pew Research Center, March 2014, Nearly Half of Public Says Right Amount of Malaysian Jet Coverage NUMBERS, FACTS AND TRENDS SHAPING THE WORLD FOR RELEASE MARCH 24, 2014 FOR FURTHER INFORMATION ON THIS REPORT: Carroll Doherty, Director of Political Research Seth Motel, Research Assistant 202.419.4372

More information

RECOMMENDED CITATION: Pew Research Center, January 2015, Terrorism Worries Little Changed; Most Give Government Good Marks for Reducing Threat

RECOMMENDED CITATION: Pew Research Center, January 2015, Terrorism Worries Little Changed; Most Give Government Good Marks for Reducing Threat NUMBERS, FACTS AND TRENDS SHAPING THE WORLD FOR RELEASE JANUARY 12, 2015 FOR FURTHER INFORMATION ON THIS REPORT: Carroll Doherty, Director of Political Research Rachel Weisel, Communications Associate

More information

Emily Miskel, KoonsFuller PC emilymiskel.com

Emily Miskel, KoonsFuller PC emilymiskel.com Emily Miskel, KoonsFuller PC emilymiskel.com emilymiskel.com/wiretapping.html scholar.google.com In 2012, 56% of Americans had a profile on a social media site. Up from 52% in 2011 and 48% in 2010. Significantly

More information

INVESTIGATION OF ELECTRONIC DATA PROTECTED BY ENCRYPTION ETC DRAFT CODE OF PRACTICE

INVESTIGATION OF ELECTRONIC DATA PROTECTED BY ENCRYPTION ETC DRAFT CODE OF PRACTICE INVESTIGATION OF ELECTRONIC DATA PROTECTED BY ENCRYPTION ETC CODE OF PRACTICE Preliminary draft code: This document is circulated by the Home Office in advance of enactment of the RIP Bill as an indication

More information

Any Court Health Care Decision Unlikely to Please

Any Court Health Care Decision Unlikely to Please MONDAY, JUNE 18, 2012 Immigration: Public Backs AZ Law, But Also Path to Citizenship Any Court Health Care Decision Unlikely to Please FOR FURTHER INFORMATION CONTACT: Andrew Kohut President, Pew Research

More information

The Budget Battle and AIG

The Budget Battle and AIG The Budget Battle and AIG Democracy Corps The surveys This presentation is based primarily on a national Democracy Corps survey of 1,000 2008 voters (834 landline, 166 cell phone weighted; 880 landline,

More information

Syllabus Law 641: Surveillance Law Seminar. George Mason University Law School Spring Jamil N. Jaffer

Syllabus Law 641: Surveillance Law Seminar. George Mason University Law School Spring Jamil N. Jaffer Brief Course Description: Syllabus Law 641: Surveillance Law Seminar George Mason University Law School Spring 2014 Jamil N. Jaffer This seminar course will expose students to laws and policies relating

More information

TOP SECRET!/COMOO'//NO.i'ORN

TOP SECRET!/COMOO'//NO.i'ORN TOPSECRRTh~O~~~OFORN. """ Office of the Assistant Attorney General U.S. Department of Justice Office of Legislative Affairs Wa:hingtcm. D.C. 205JO February 2, 2011 The Honorable Dianne Feinstein Chairman

More information

6.805/6.806/STS.085, Ethics and Law on the Electronic Frontier Lecture 7: Profiling and Datamining

6.805/6.806/STS.085, Ethics and Law on the Electronic Frontier Lecture 7: Profiling and Datamining 6.805/6.806/STS.085, Ethics and Law on the Electronic Frontier Lecture 7: Profiling and Datamining Lecturer: Danny Weitzner Cars and Planes : Profiling and Data-mining, post 9/11 Discussion - Midterm Logistics

More information

I. Introduction. fact that most people carry a cell phone, there has been relatively little litigation deciding

I. Introduction. fact that most people carry a cell phone, there has been relatively little litigation deciding CELL PHONE SEARCHES IN SCHOOLS: THE NEW FRONTIER ANDREA KLIKA I. Introduction In the age of smart phones, what once was a simple device to make phone calls has become a personal computer that stores a

More information

Bush Plan 'Digital Distortion'

Bush Plan 'Digital Distortion' Search: Bush Plan 'Digital Distortion' Page 1 of 1 By Jeffrey Benner Also by this reporter 02:00 AM Feb. 07, 2002 PT The Bush administration has responded to progress in bridging the digital divide by

More information

Federalist Society for Law and Public Policy Studies Criminal Law and Procedure Practice Group

Federalist Society for Law and Public Policy Studies Criminal Law and Procedure Practice Group Federalist Society for Law and Public Policy Studies Criminal Law and Procedure Practice Group White Paper on Anti-Terrorism Legislation: Surveillance &Wiretap Laws Developing Necessary and Constitutional

More information

FOX News/Opinion Dynamics Poll 10 November 05

FOX News/Opinion Dynamics Poll 10 November 05 FOX News/Opinion Dynamics Poll 10 November 05 Polling was conducted by telephone November 8-9, 2005 in the evenings. The total sample is 900 registered voters nationwide with a margin of error of ±3 percentage

More information

Obama Maintains Approval Advantage, But GOP Runs Even on Key Issues

Obama Maintains Approval Advantage, But GOP Runs Even on Key Issues MAY 8, 2013 Two-Thirds Say Obama Fights Hard for His Policies Obama Maintains Approval Advantage, But GOP Runs Even on Key Issues FOR FURTHER INFORMATION CONTACT THE PEW RESEARCH CENTER FOR THE PEOPLE

More information

The Cook Political Report / LSU Manship School Midterm Election Poll

The Cook Political Report / LSU Manship School Midterm Election Poll The Cook Political Report / LSU Manship School Midterm Election Poll The Cook Political Report-LSU Manship School poll, a national survey with an oversample of voters in the most competitive U.S. House

More information

Phone-Records Surveillance Is Broadly Acceptable to Public

Phone-Records Surveillance Is Broadly Acceptable to Public ABC NEWS/WASHINGTON POST POLL: PHONE RECORDS 5/11/06 EMBARGOED FOR RELEASE AFTER 7 a.m. Friday, May 12, 2006 Phone-Records Surveillance Is Broadly Acceptable to Public Americans by nearly a 2-1 margin

More information

(READ AND RANDOMIZE LIST)

(READ AND RANDOMIZE LIST) 10 December 2009 Polling was conducted by telephone December 8-9, 2009, in the evenings. The total sample is 900 registered voters nationwide with a margin of error of ±3 percentage points. Results are

More information

CRS Report for Congress

CRS Report for Congress Order Code RS21704 Updated June 29, 2005 CRS Report for Congress Received through the CRS Web Summary USA PATRIOT Act Sunset: A Sketch Charles Doyle Senior Specialist American Law Division Several sections

More information

NAPO WASHINGTON REPORT

NAPO WASHINGTON REPORT The Washington Report October 14, 2014 The Newsletter of the National Association of Police Organizations Representing America s Finest NAPO WASHINGTON REPORT NAPO Meetings on Capitol Hill Over the past

More information

RECOMMENDED CITATION: Pew Research Center, July, 2014, Most Think the U.S. Has No Responsibility to Act in Iraq

RECOMMENDED CITATION: Pew Research Center, July, 2014, Most Think the U.S. Has No Responsibility to Act in Iraq NUMBERS, FACTS AND TRENDS SHAPING THE WORLD FOR RELEASE JULY 18, 2014 FOR FURTHER INFORMATION ON THIS REPORT: Carroll Doherty, Director of Political Research Danielle Gewurz, Research Analyst Seth Motel,

More information

Topic #2 Obama s early Legacy, Midterms & ISIS

Topic #2 Obama s early Legacy, Midterms & ISIS Topic #2 Obama s early, Midterms & ISIS (TOO) HIGH EXPECTATIONS WHICH COULDN T BE MET? - - - - The first African American U.S. President in history, Obama raised great hopes when first elected back in

More information

Written Testimony of Marc J. Zwillinger. Founder. ZwillGen PLLC. United States Senate Committee on the Judiciary. Hearing on

Written Testimony of Marc J. Zwillinger. Founder. ZwillGen PLLC. United States Senate Committee on the Judiciary. Hearing on Written Testimony of Marc J. Zwillinger Founder ZwillGen PLLC United States Senate Committee on the Judiciary Hearing on Strengthening Privacy Rights and National Security: Oversight of FISA Surveillance

More information

If A Tree Falls Discussion Guide

If A Tree Falls Discussion Guide Director: Marshall Curry Co-Director: Sam Cullman Year: 2011 Time: 85 min You might know these directors from: Street Fight (2005) Racing Dreams (2009) King Corn (2007) The House I Live In (2012) FILM

More information

In George Orwell s 1984, the entire book is about a time in Oceania when a group has

In George Orwell s 1984, the entire book is about a time in Oceania when a group has Section 1. In, the entire book is about a time in Oceania when a group has taken complete control over the city (society, really). Big Brother and the party are the control. He is who everyone is expected

More information

THE AUTHORITY REPORT. How Audiences Find Articles, by Topic. How does the audience referral network change according to article topic?

THE AUTHORITY REPORT. How Audiences Find Articles, by Topic. How does the audience referral network change according to article topic? THE AUTHORITY REPORT REPORT PERIOD JAN. 2016 DEC. 2016 How Audiences Find Articles, by Topic For almost four years, we ve analyzed how readers find their way to the millions of articles and content we

More information

Anti-Cyber Crime Law (8 Rabi / 26 March 2007)

Anti-Cyber Crime Law (8 Rabi / 26 March 2007) Anti-Cyber Crime Law (8 Rabi 11428 / 26 March 2007) August 1, 2010 Kingdom of Saudi Arabia Bureau of Experts at the Council of Ministers Official Translation Department Translation of Saudi Laws Anti-Cyber

More information

Intelligence Squared debates

Intelligence Squared debates HANDOUT http:// astoundingideaselectronicsurveillance.blogspot.com/ Resolved: The United States federal government should substantially curtail its domestic surveillance. Intelligence Squared debates Intelligence

More information

1900 M Street, NW, Ste. 250, Washington, D.C

1900 M Street, NW, Ste. 250, Washington, D.C Case 1:14-cr-00387-MKB Document 148 Filed 03/4/16 Page 1 of 9 PageID #: 686 1900 M Street, NW, Ste. 50, Washington, D.C. 0036 marc@zwillgen.com Marc J. Zwillinger (0) 706-50 (phone) (0) 706-598 (fax) VIA

More information

Perceptions of Obama Press Coverage Hold Steady Koran Burning Plans Grab Media, Public Attention

Perceptions of Obama Press Coverage Hold Steady Koran Burning Plans Grab Media, Public Attention NEWS Release. 1615 L Street, N.W., Suite 700 Washington, D.C. 20036 Tel (202) 419-4350 Fax (202) 419-4399 FOR IMMEDIATE RELEASE: Wednesday, September 15, 2010 FOR FURTHER INFORMATION: Andrew Kohut, Director

More information

PEW RESEARCH CENTER FOR THE PEOPLE & THE PRESS JULY 2003 MEDIA UPDATE FINAL TOPLINE June 19 - July 2, 2003 N=1201

PEW RESEARCH CENTER FOR THE PEOPLE & THE PRESS JULY 2003 MEDIA UPDATE FINAL TOPLINE June 19 - July 2, 2003 N=1201 PEW RESEARCH CENTER FOR THE PEOPLE & THE PRESS JULY 2003 MEDIA UPDATE FINAL TOPLINE June 19 - July 2, 2003 N=1201 Q.1 Do you approve or disapprove of the way George W. Bush is handling his job as president?

More information

Issue Area Current Law S as reported by Senate Judiciary Comm. H.R as reported by House Judiciary Comm.

Issue Area Current Law S as reported by Senate Judiciary Comm. H.R as reported by House Judiciary Comm. Chart comparing current law, S. 1692 (PATRIOT Act Sunset Extension Act) as reported by Senate Judiciary Committee, and H.R. 3845 (USA Patriot Amendments Act of 2009) as reported by the House Judiciary

More information

PRO/CON: Is Snowden a whistle-blower or just irresponsible?

PRO/CON: Is Snowden a whistle-blower or just irresponsible? PRO/CON: Is Snowden a whistle-blower or just irresponsible? By McClatchy-Tribune News Service, adapted by Newsela staff on 02.04.14 Word Count 1,340 Demonstrators rally at the U.S. Capitol to protest spying

More information

No Change in Views of Torture, Warrantless Wiretaps OBAMA FACES FAMILIAR DIVISIONS OVER ANTI-TERROR POLICIES

No Change in Views of Torture, Warrantless Wiretaps OBAMA FACES FAMILIAR DIVISIONS OVER ANTI-TERROR POLICIES NEWS Release 1615 L Street, N.W., Suite 700 Washington, D.C. 20036 Tel (202) 419-4350 Fax (202) 419-4399 FOR IMMEDIATE RELEASE: WEDNESDAY, February 18, 2009 No Change in Views of Torture, Warrantless Wiretaps

More information

NUMBERS, FACTS AND TRENDS SHAPING THE WORLD. FOR RELEASE September 12, 2014 FOR FURTHER INFORMATION ON THIS REPORT:

NUMBERS, FACTS AND TRENDS SHAPING THE WORLD. FOR RELEASE September 12, 2014 FOR FURTHER INFORMATION ON THIS REPORT: NUMBERS, FACTS AND TRENDS SHAPING THE WORLD FOR RELEASE September 12, 2014 FOR FURTHER INFORMATION ON THIS REPORT: Carroll Doherty, Director of Political Research Jocelyn Kiley, Associate Director Rachel

More information

ASK FORM 1 NATIONAL [N=500] AND CITIES ONLY: Q.2 All in all, are you satisfied or dissatisfied with the way things are going in this country today?

ASK FORM 1 NATIONAL [N=500] AND CITIES ONLY: Q.2 All in all, are you satisfied or dissatisfied with the way things are going in this country today? PEW RESEARCH CENTER FOR THE PEOPLE & THE PRESS LATE AUGUST 2002 YEAR-AFTER 9/11 POLL FINAL TOPLINE August 14-25, 2002 National Sample: N=1001 / New York City Sample: N=401 / Washington, DC Sample: N=400

More information

RECOMMENDED CITATION: Pew Research Center, September 2014, Growing Public Concern about Rise of Islamic Extremism At Home and Abroad

RECOMMENDED CITATION: Pew Research Center, September 2014, Growing Public Concern about Rise of Islamic Extremism At Home and Abroad NUMBERS, FACTS AND TRENDS SHAPING THE WORLD FOR RELEASE September 10, 2014 FOR FURTHER INFORMATION ON THIS REPORT: Carroll Doherty, Director of Political Research Seth Motel, Research Analyst Rachel Weisel,

More information

Statement of James X. Dempsey Executive Director Center for Democracy & Technology 1. before the House Permanent Select Committee on Intelligence

Statement of James X. Dempsey Executive Director Center for Democracy & Technology 1. before the House Permanent Select Committee on Intelligence Statement of James X. Dempsey Executive Director Center for Democracy & Technology 1 before the House Permanent Select Committee on Intelligence May 11, 2005 Mr. Chairman, Rep. Harman, Members of the Committee,

More information

Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute

Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute On Proposed Amendments to Rule 41 of the Federal Rules of Criminal Procedure Before The Judicial Conference Advisory

More information

February 8, The Honorable Jerrold Nadler Chairman U.S. House Committee on the Judiciary 2141 Rayburn House Office Building Washington, DC 20515

February 8, The Honorable Jerrold Nadler Chairman U.S. House Committee on the Judiciary 2141 Rayburn House Office Building Washington, DC 20515 February 8, 2019 The Honorable Jerrold Nadler Chairman U.S. House Committee on the Judiciary 2141 Rayburn House Office Building Washington, DC 20515 The Honorable Doug Collins Ranking Member U.S. House

More information

Reauthorization of the FISA Amendments Act

Reauthorization of the FISA Amendments Act Edward C. Liu Legislative Attorney April 8, 2013 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research Service 7-5700 www.crs.gov R42725 Summary On December 30,

More information

EMBARGOED. Approval of Bush, GOP Leaders Slips DISENGAGED PUBLIC LEANS AGAINST CHANGING FILIBUSTER RULES

EMBARGOED. Approval of Bush, GOP Leaders Slips DISENGAGED PUBLIC LEANS AGAINST CHANGING FILIBUSTER RULES NEWS Release 1615 L Street, N.W., Suite 700 Washington, D.C. 20036 Tel (202) 419-4350 Fax (202) 419-4399 EMBARGOED FOR RELEASE: MONDAY, MAY 16, 2005, 4:00 P.M. Approval of Bush, GOP Leaders Slips DISENGAGED

More information

Calif. Privacy Act Will Increase Data Breach Liability

Calif. Privacy Act Will Increase Data Breach Liability Portfolio Media. Inc. 111 West 19 th Street, 5th Floor New York, NY 10011 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Calif. Privacy Act Will Increase Data Breach

More information

RECOMMENDED CITATION: Pew Research Center, February, 2015, Growing Support for Campaign Against ISIS - and Possible Use of U.S.

RECOMMENDED CITATION: Pew Research Center, February, 2015, Growing Support for Campaign Against ISIS - and Possible Use of U.S. NUMBERS, FACTS AND TRENDS SHAPING THE WORLD FOR RELEASE FEBRUARY 24, 2015 FOR FURTHER INFORMATION ON THIS REPORT: Carroll Doherty, Director of Political Research Rachel Weisel, Communications Associate

More information

Trends and Predictions in Foreign Intelligence Surveillance

Trends and Predictions in Foreign Intelligence Surveillance A HOOVER INSTITUTION ESSAY Trends and Predictions in Foreign Intelligence Surveillance THE FAA AND BEYOND DAVID S. KRIS Aegis Paper Series No. 1601 It is a strange time for national security. Beginning

More information

GOP leads on economy, Democrats on health care, immigration

GOP leads on economy, Democrats on health care, immigration FOR RELEASE JUNE 20, 2018 Voters More Focused on Control of Congress and the President Than in Past Midterms GOP leads on economy, Democrats on health care, immigration FOR MEDIA OR OTHER INQUIRIES: Carroll

More information

Sneak and Peak Search Warrants

Sneak and Peak Search Warrants Digital Commons @ Georgia Law Popular Media Faculty Scholarship 9-11-2002 Sneak and Peak Search Warrants Donald E. Wilkes Jr. University of Georgia School of Law, wilkes@uga.edu Repository Citation Wilkes,

More information

Impeaching Barack Hussein Obama, President of the United States, for high crimes and misdemeanors.

Impeaching Barack Hussein Obama, President of the United States, for high crimes and misdemeanors. Impeaching Barack Hussein Obama, President of the United States, for high crimes and misdemeanors. Resolved, That Barack Hussein Obama, President of the United States, is impeached for high crimes and

More information

Case 3:07-cv SI Document 7-5 Filed 10/29/2007 Page 1 of 39 EXHIBIT J

Case 3:07-cv SI Document 7-5 Filed 10/29/2007 Page 1 of 39 EXHIBIT J Case 3:07-cv-05278-SI Document 7-5 Filed 10/29/2007 Page 1 of 39 EXHIBIT J CQ Today - Senate Panel Case OKs 3:07-cv-05278-SI Surveillance Bill Document 7-5 Filed http://public.cq.com/docs/cqt/news110-000002608382.html

More information

GUIDELINES FOR THE USE OF ELECTORAL PRODUCTS

GUIDELINES FOR THE USE OF ELECTORAL PRODUCTS GUIDELINES FOR THE USE OF ELECTORAL PRODUCTS June 2017 Status: Approved Print Date: 6/29/2017 Page 1 of 18 Section 1: Introduction GUIDELINES FOR THE USE OF ELECTORAL PRODUCTS The Election Act requires

More information

Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety. Benjamin Franklin (1755)

Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety. Benjamin Franklin (1755) Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety. Benjamin Franklin (1755) THE SNOW DEN EFFEC T: THE CO N FLICT IN A FREE SOCIETY, WHAT

More information