Intelligence Squared debates

Size: px
Start display at page:

Download "Intelligence Squared debates"

Transcription

1 HANDOUT astoundingideaselectronicsurveillance.blogspot.com/ Resolved: The United States federal government should substantially curtail its domestic surveillance. Intelligence Squared debates Intelligence Squared Debates The remedy for over-secrecy is to think in terms of coveillance, so that we make tracking and monitoring as symmetrical and transparent as possible. That way the monitoring can be regulated, mistakes appealed and corrected, specific boundaries set

2 Economics is about Incentives Economics is about incentives, information, markets, and coordination. Economics helps us understand companies producing, trading, competing, and earning profits (or having losses). But economic principles apply... Public Choice economics is the study of politics, government, and policy. Government incentives? What incentives does the federal government have to engage in pervasive surveillance? Bill of Rights: Fourth Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated,... and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. ftrials/conlaw/rightofprivacy.html The Bill of Rights, however, reflects the concern of James Madison and other framers for protecting specific aspects of privacy, such as... the privacy of beliefs (1st Amendment), privacy of the home against demands that it be used to house soldiers (3rd Amendment), privacy of the person and possessions as against unreasonable searches (4th Amendment), and, the 5th Amendment's privilege against self-incrimination, which provides protection for the privacy of personal information. In addition, the Ninth Amendment states that the "enumeration of certain rights" in the Bill of Rights "shall not be construed to deny or disparage other rights retained by the people." Ways to View Privacy... Fear of companies gathering more and more data on everyday people: Google, Target, insurance companies. Fear of terrorists, so surveillance to uncover terrorists plots before they happen. Government/IRS looking for income to tax. Party in power looking for donations to opponents. Fear of government, and tendency to use surveillance to weaken political opponents and to cover up government mistakes. The Alien and Sedition Acts The Alien and Sedition Acts were four bills passed in 1798 by thefederalists in the 5th United States Congress during an undeclared naval war with France... They were signed into law by President John Adams. Proponents claimed the acts were designed to protect the United States from alien citizens of enemy powers and to prevent seditious attacks from weakening the government. The Democratic-Republicans [called them] unconstitutional and designed to stifle criticism of the administration... Major political issue in the elections of 1798 and

3 large-scale spying on Americans got its real start in 1917, when the United States entered World War I. President Wilson claimed... Germany had filled our unsuspecting communities with vicious spies and the-dawn-of-the-surveillance-state conspirators and sought to corrupt the opinion of our people in their own behalf. The next day, Congress gave teeth to his warning with the Espionage Act, which criminalized opposition to the war. In 1918, the Sedition Act made prohibitions on dissent even broader. The Bureau of Investigation (later called the FBI)...creating the American Protective League (APL)... The APL... was nominally private,...1,200 branches put local public schools under surveillance, APL members detained over 40,000 people, opened mail, and raided factories, union halls, and private homes. Most of the surveillance apparatus was dismantled after the war was over, and communications returned to private hands. However, the Sedition Act, which made it all possible, still remains on the books, though in a more limited form. In 1971, it was used to indict Daniel Ellsberg for leaking the Pentagon Papers, [H]istorian Lon Strauss has written, we can see the foundation that influenced subsequent decisions. There s a direct connection with the type of surveillance state that produced the NSA; that foundation was created in the First World War. newspaper-article/2015/07/16/ domestic-government-spy-programjeopardizes-citizens-rights In the 1980s, the Supreme Court ruled people don t have an expectation of privacy from overhead visual aerial surveillance, but [it] reserved the right to consider situations in the future where airplanes were equipped with other sophisticated equipment, like cameras, that would enable mass surveillance, Fakhoury said. With this program, it appears that time has come, Fakhoury said. The fact these planes are equipped with powerful technologies like precise cameras or [international mobile subscriber identity] catchers requires a reexamination of those earlier cases. A History of Federal Surveillance First federal government surveillance policy? Federal surveillance and war. The modern era: World War I (transforms U.S. policies). New Deal Social Security and business cartels. World War II, Korean War, Vietnam, Cold War. Beirut, Oklahoma City, 9/11 and U.S. Middle East policy.

4 The FBI and Senator Church In the 1700s sensitive letters often written in secret code. Governments searched homes and papers for incriminating statements. How did America s Founders respond? Surveillance by the U.S. government has a long history. The federal government postal monopoly... Frank Church 1970s Senate hearing on FBI domestic spying. 500,000 U.S. citizens labeled as potential subversives, from John Lennon to the John Birch Society From Beirut, Lebanon to 9/11 Missed intelligence in Beirut... John Poindexter team gathers realtime intelligence on terrorist attacks After each, President Reagan, Bush and federal security agencies expanded U.S. surveillance in fear of extent of terrorist networks and operations Oklahoma City bombing Before 9/11 and after... Throwing Away Key Intelligence Data Kleinsmith at Army Intelligence developed data mining tools identified Al Qaeda network in But his information on Al Qaeda operatives in the United States ran up against electronic surveillance law mandating that such information not be held beyond ninety days. So, nearing the ninety day legal limit and under pressure from Army lawyers, Kleinsmith deleted from his computer all information about the Al Qaeda network. This information could have enabled the FBI or local police to detain Al Qaeda terrorists before 9/11, or at least stop them for questioning at airports. No Fishing... United States Sen. Rand Paul (R-KY) is suing the Internal Revenue Service and the Department of the Treasury over the constitutionality of the Foreign Account Tax Compliance Act (FATCA). Paul and six other plaintiffs argue the Department of the Treasuryais using FACTA to bypass the legislative branch of government s exclusive authority to approve treaties with foreign nations. Ways to View Privacy... Fear of companies gathering more and more data on everyday people: Google, Target, insurance companies. Fear of terrorists, so electronic surveillance to uncover terrorists plots before they happen. Fear of government, and tendency to use surveillance to weaken political opponents and to cover up government mistakes. National Security Concerns & Incentives To locate terrorists and potential terrorists. But who are potential terrorists? Islamic fundamentalists who see faith as higher value than the state... Tea Party Patriots? Right-wingers? Gun club members? Out-of-control homeschoolers? Think incentives. What are other incentives for federal government officials, in addition to security and national defense? Staying in office? Suppressing political opposition? Collecting taxes? Regulations?

5 Mistakes will happen... When you listen in on other people s conversations, sometimes you mishear or misunderstand. All of the high-profile domestic terrorism plots of the last decade, with four exceptions, were actually FBI sting operations plots conducted with the direct involvement of law enforcement informants or agents, including plots that were proposed or led by informants. According to multiple studies, nearly 50 percent of the more than 500 federal counterterrorism convictions resulted from informant-based cases; almost 30 percent of those cases were sting operations in which the informant played an active role in the underlying plot. (HRW, Columbia Law Sch.) videos/does-nsaviolate-yourconstitutional-rights/ videos/whats-next-in-thebattle-over-nsa-surveillance/

6 billofrightsinstitute.org /11/27/are-they-watching-youelesson/ NSA Tripwires IRS targeting commenced on Jan. 25, 2012 the beginning of the election year for President Obama s second campaign. On that date: the BOLO [ be on the lookout ] criteria were again updated. The revised criteria included political action type organizations involved in educating on the Constitution and Bill of Rights. For example, this IRS tripwire would not be triggered by arguing that the NSA should collect the phone records of every American citizen. But it would be triggered by teaching that the Fourth Amendment forbids unreasonable searches and seizures. NSA scandal's many dimensions... Mass domestic surveillance of telephone call information; Allegations that officials deceived Congress, the courts, and the public about the nature of the NSA's programs; Alleged access to the Internet's backbone and the traffic of major Internet companies; and Systematic efforts to undercut the use of the encryption that secures communications and financial information. Also: Intelligence Squared debates Let s say you re interested in 18 U.S. Code 2516, the part of the U.S. code that authorizes interception of wire, oral, or electronic communications... Those hyperlinks are democratic links, letting people know what Congress is doing, so people can look into it and have their say. Does liberty automatically break out thanks to those developments? No. But public demands of all types including for liberty and limited government are frustrated now by the utter obscurity in which Congress acts. We re lifting the curtain, providing the data that translates into a better informed public, a public better equipped to get what it wants.

7 ...the most basic right of "sousveillance" or looking-back at power, that The Transparent Society is all about. It is also fundamental to freedom, for in altercations with authority, what other recourse can a citizen turn to, than the Truth? Kevin Kelly's Why You Should Embrace Surveillance, not Fight it, in WIRED, prescribed transparent coveillance as the best practical solution in a world where information sloshes and duplicates and flows. Since June [2013], news reports based on documents leaked by former National Security Agency contractor Edward Snowden... Revealed the depth and breadth of NSA surveillance activities. The NSA scandal's many dimensions... Consider the IRS... Federal Income Tax regulations require that any and all income be recorded and taxes paid. By nature that infringes upon privacy and freedom of association. But it also creates incentives federal electronic surveillance. SEC, FEC, and the other federal agencies also want to know what folks are doing and saying.

8 Who s Watching you? Gregory F. Rehmke AstoundingIdeasElectronicSurveillance.blogspot.com/ The Systematic Federal Surveillance of Ordinary Americans Gregory Rehmke course_details/understandingnsa-surveillance/

9 [E]xtensive federal data collection creating ever greater incentives to behave as government wishes us to behave... [T]he computer s ability to digitize personal information as offering the state and society a powerful way to control the behavior of individuals [C]entral government data-collection programs... share one defining characteristic: they compel production, retention, and dissemination of personal information about every American citizen. Databases keyed to Social Security numbers...use of those numbers as a fulcrum for government data collection about individuals... Labor databases... federal database of all American workers and requiring employers to obtain the central government s approval before hiring employees; Medical databases... unique health identifier and implementation of the national electronic database of personal medical information mandated by the 1996 Health Insurance Portability and Accountability Act; continued... Education databases... federal databases mandated by the 1994 Goals 2000 Act, Improving America s Schools Act, and related legislation that establish detailed national records of children s educational experiences and socioeconomic status; Financial databases describing provisions of federal statutory law requiring banks and other financial institutions to create permanent, readily retrievable records of each individual s checks, deposits, and other financial activities. Two of the provisions slated for sunset roving wiretap authority and the so-called Section 215 orders for the production of records should be narrowed to mitigate the risk of overcollection of sensitive information about innocent Americans. A third authority to employ the broad investigative powers of the Foreign Intelligence Surveillance Act against lone wolf suspects who lack ties to any foreign terror group... Review and substantially modify the statutes authorizing the Federal Bureau of Investigation to secretly demand records, without any prior court approval, using National Security Letters.

10

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Electronic Surveillance and FISA Eric Rosenbach and Aki J. Peritz Electronic Surveillance and FISA Electronic surveillance is one

More information

The National Security Agency s Warrantless Wiretaps

The National Security Agency s Warrantless Wiretaps The National Security Agency s Warrantless Wiretaps In 2005, the press revealed that President George W. Bush had authorized government wiretaps without a court warrant of U.S. citizens suspected of terrorist

More information

Statement for the Record. House Judiciary Subcommittee on Crime, Terrorism and Homeland Security. Hearing on Reauthorizing the Patriot Act

Statement for the Record. House Judiciary Subcommittee on Crime, Terrorism and Homeland Security. Hearing on Reauthorizing the Patriot Act Statement for the Record House Judiciary Subcommittee on Crime, Terrorism and Homeland Security Hearing on Reauthorizing the Patriot Act Statement for the Record Robert S. Litt General Counsel Office of

More information

THE RUTHERFORD INSTITUTE

THE RUTHERFORD INSTITUTE THE RUTHERFORD INSTITUTE Post Office Box 7482 Charlottesville, Virginia 22906-7482 JOHN W. WHITEHEAD Founder and President TELEPHONE 434 / 978-3888 FACSIMILE 434/ 978 1789 www.rutherford.org Via Email,

More information

January 14, Dear Chairman Graham and Ranking Member Feinstein:

January 14, Dear Chairman Graham and Ranking Member Feinstein: January 14, 2019 The Honorable Lindsey Graham, Chairman The Honorable Dianne Feinstein, Ranking Member U.S. Senate Committee on the Judiciary Dirksen Senate Office Building 224 Washington, DC 20510 Dear

More information

The administration defended the surveillance program, saying that it is lawful and is a critical tool to protect national security.

The administration defended the surveillance program, saying that it is lawful and is a critical tool to protect national security. Government Surveillance of Citizens Raises Civil Liberty Concerns Two revelations about government programs designed to sift through the public s phone calls and social media interaction have raised questions

More information

Class #10: The Extraterritorial Fourth Amendment. Professor Emily Berman Thursday, September 25, 2014

Class #10: The Extraterritorial Fourth Amendment. Professor Emily Berman Thursday, September 25, 2014 Class #10: The Extraterritorial Fourth Amendment Professor Emily Berman Thursday, September 25, 2014 Thursday, September 25, 2014 Wrap Up Third Party Doctrine Discussion Smith v. Maryland Section 215 The

More information

6.805/6.806/STS.085, Ethics and Law on the Electronic Frontier Lecture 7: Profiling and Datamining

6.805/6.806/STS.085, Ethics and Law on the Electronic Frontier Lecture 7: Profiling and Datamining 6.805/6.806/STS.085, Ethics and Law on the Electronic Frontier Lecture 7: Profiling and Datamining Lecturer: Danny Weitzner Cars and Planes : Profiling and Data-mining, post 9/11 Discussion - Midterm Logistics

More information

Lesson 1: Role of the Judicial Branch in the US

Lesson 1: Role of the Judicial Branch in the US Judicial Branch Powerpoint Questions 1. What is the role of federal courts? Lesson 1: Role of the Judicial Branch in the US 2. What is the purpose of the Supreme Court? 3. Define District Courts. 4. What

More information

The Supreme Court, Civil Liberties, and Civil Rights

The Supreme Court, Civil Liberties, and Civil Rights MIT OpenCourseWare http://ocw.mit.edu 17.245 The Supreme Court, Civil Liberties, and Civil Rights Fall 2006 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.

More information

Chapter 3. U.S. Constitution. THE US CONSTITUTION Unit overview. I. Six Basic Principles. Popular Sovereignty. Limited Government

Chapter 3. U.S. Constitution. THE US CONSTITUTION Unit overview. I. Six Basic Principles. Popular Sovereignty. Limited Government Chapter 3 U.S. Constitution THE US CONSTITUTION Unit overview I. Basic Principles II. Preamble III. Articles IV. Amendments V. Amending the Constitution " Original divided into 7 articles " 1-3 = specific

More information

Fourth Amendment General Population Respondents. Conducted May 21-23, 2013 Margin of Error ±4%

Fourth Amendment General Population Respondents. Conducted May 21-23, 2013 Margin of Error ±4% Sample Conducted May 21-23, 2013 Margin of Error ±4% 1000 General Population Respondents 1. The following is a summary of the bill of rights in shuffled order. Please select the one which you believe corresponds

More information

The Bill of Rights. Part One: Read the Expert Information and highlight the main ideas and supporting details.

The Bill of Rights. Part One: Read the Expert Information and highlight the main ideas and supporting details. The Bill of Rights Part One: Read the Expert Information and highlight the main ideas and supporting details. Expert Information: The Anti-Federalists strongly argued against the ratification of the Constitution

More information

Fourth Amendment General Population Respondents. Conducted May 21-23, 2013 Margin of Error ±4%

Fourth Amendment General Population Respondents. Conducted May 21-23, 2013 Margin of Error ±4% Sample Conducted May 21-23, 2013 Margin of Error ±4% 1000 General Population Respondents 1. The following is a summary of the bill of rights in shuffled order. Please select the one which you believe corresponds

More information

Weekly Geopolitical Report

Weekly Geopolitical Report Weekly Geopolitical Report By Bill O Grady March 14, 2016 The Apple Problem On December 2, 2015, Syed Rizwan Farook and his wife, Tashfeen Malik, attacked a San Bernardino county facility, killing 14 people

More information

Deutscher Bundestag. 1st Committee of Inquiry. in the 18th electoral term. Hearing of Experts. Surveillance Reform After Snowden.

Deutscher Bundestag. 1st Committee of Inquiry. in the 18th electoral term. Hearing of Experts. Surveillance Reform After Snowden. Deutscher Bundestag 1st Committee of Inquiry in the 18th electoral term Hearing of Experts Surveillance Reform After Snowden September 8, 2016 Written Statement of Timothy H. Edgar Senior Fellow Watson

More information

Reauthorization of the FISA Amendments Act

Reauthorization of the FISA Amendments Act Edward C. Liu Legislative Attorney April 8, 2013 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research Service 7-5700 www.crs.gov R42725 Summary On December 30,

More information

Student Worksheet Manning Case Challenges Definition of Whistleblower

Student Worksheet Manning Case Challenges Definition of Whistleblower Page 1 http://www.pbs.org/newshour/extra Student Worksheet Manning Case Challenges Definition of Whistleblower http://www.pbs.org/newshour/extra/2013/06/manning-case-challenges-definition-of-whistleblower/

More information

A Guide to the Bill of Rights

A Guide to the Bill of Rights A Guide to the Bill of Rights First Amendment Rights James Madison combined five basic freedoms into the First Amendment. These are the freedoms of religion, speech, the press, and assembly and the right

More information

NSI Law and Policy Paper. Reauthorization of the FISA Amendments Act

NSI Law and Policy Paper. Reauthorization of the FISA Amendments Act NSI Law and Policy Paper Reauthorization of the FISA Amendments Act Preserving a Critical National Security Tool While Protecting the Privacy and Civil Liberties of Americans Darren M. Dick & Jamil N.

More information

First Session Tenth Parliament Republic of Trinidad and Tobago REPUBLIC OF TRINIDAD AND TOBAGO. Act No. 11 of 2010

First Session Tenth Parliament Republic of Trinidad and Tobago REPUBLIC OF TRINIDAD AND TOBAGO. Act No. 11 of 2010 First Session Tenth Parliament Republic of Trinidad and Tobago REPUBLIC OF TRINIDAD AND TOBAGO Act No. 11 of 2010 [L.S.] AN ACT to provide for and about the interception of communications, the acquisition

More information

Emerging Technology and the Fourth Amendment

Emerging Technology and the Fourth Amendment Saber and Scroll Volume 1 Issue 1 Spring 2012 (Edited and Revised April 2015) Article 10 March 2012 Emerging Technology and the Fourth Amendment Kathleen Mitchell Reitmayer American Public University System

More information

tinitrd~tat s~fnatf WASHINGTON, DC 20510

tinitrd~tat s~fnatf WASHINGTON, DC 20510 tinitrd~tat s~fnatf WASHINGTON, DC 20510 December 14, 2005 Dear Colleague, Prior to the Thanksgiving recess, several Senators expressed strong opposition to the draft Patriot Act reauthorization conference

More information

Bill of Rights THE FIRST TEN AMENDMENTS

Bill of Rights THE FIRST TEN AMENDMENTS Bill of Rights { THE FIRST TEN AMENDMENTS The Constitution of the United States: The Bill of Rights These amendments were ratified December 15, 1791, and form what is known as the "Bill of Rights." Amendment

More information

Chapter 18: The Federal Court System Section 1

Chapter 18: The Federal Court System Section 1 Chapter 18: The Federal Court System Section 1 Origins of the Judiciary The Constitution created the Supreme Court. Article III gives Congress the power to create the rest of the federal court system,

More information

How did foreign policy during the Federalist Era deepen partisan divisions?

How did foreign policy during the Federalist Era deepen partisan divisions? How did foreign policy during the Federalist Era deepen partisan divisions? First Party System- Who would you have supported? Federalist Platform Strong Centralized Govt Democratic-Republican Platform

More information

FISA AND WARRANTLESS WIRE-TAPPING: DOES FISA CONFORM TO FOURTH AMENDMENT STANDARDS? Aric Meyer, B.S. Thesis Prepared for the Degree of

FISA AND WARRANTLESS WIRE-TAPPING: DOES FISA CONFORM TO FOURTH AMENDMENT STANDARDS? Aric Meyer, B.S. Thesis Prepared for the Degree of FISA AND WARRANTLESS WIRE-TAPPING: DOES FISA CONFORM TO FOURTH AMENDMENT STANDARDS? Aric Meyer, B.S. Thesis Prepared for the Degree of MASTER OF SCIENCE UNIVERSITY OF NORTH TEXAS May 2009 APPROVED: Peggy

More information

In this article we are going to provide a brief look at the ten amendments that comprise the Bill of Rights.

In this article we are going to provide a brief look at the ten amendments that comprise the Bill of Rights. The Bill of Rights Introduction The Bill of Rights is the first ten amendments to the Constitution. It establishes the basic civil liberties that the federal government cannot violate. When the Constitution

More information

7 Principles of the Constitution. 1.Popular Sovereignty- the governments right to rule comes from the people

7 Principles of the Constitution. 1.Popular Sovereignty- the governments right to rule comes from the people 7 Principles of the Constitution 1.Popular Sovereignty- the governments right to rule comes from the people 2. Limited Government- the government has only the powers that the Constitution gives to it 3.

More information

PRO/CON: Is Snowden a whistle-blower or just irresponsible?

PRO/CON: Is Snowden a whistle-blower or just irresponsible? PRO/CON: Is Snowden a whistle-blower or just irresponsible? By McClatchy-Tribune News Service, adapted by Newsela staff on 02.04.14 Word Count 1,340 Demonstrators rally at the U.S. Capitol to protest spying

More information

THE FEDERAL COURTS LAW REVIEW. Symposium Introduction: Privacy in the Federal Courts

THE FEDERAL COURTS LAW REVIEW. Symposium Introduction: Privacy in the Federal Courts THE FEDERAL COURTS LAW REVIEW Volume 3, Issue 2 2009 Symposium Introduction: Privacy in the Federal Courts Allyson W. Haynes 1 The essays and articles in this symposium issue are based on the presentations

More information

CRS Report for Congress

CRS Report for Congress Order Code RL33669 CRS Report for Congress Received through the CRS Web Terrorist Surveillance Act of 2006: S. 3931 and Title II of S. 3929, the Terrorist Tracking, Identification, and Prosecution Act

More information

The story of John Ashcroft and James Comey s hospital-bed heroics has by now been

The story of John Ashcroft and James Comey s hospital-bed heroics has by now been Issue #35, Winter 2015 Infiltrate the NSA To re-establish the balance between security and civil liberties, we don t just need more laws. We need more civil libertarians in the security state. Margo Schlanger

More information

Chapter 20: Civil Liberties: Protecting Individual Rights Section 2

Chapter 20: Civil Liberties: Protecting Individual Rights Section 2 Chapter 20: Civil Liberties: Protecting Individual Rights Section 2 Objectives 1. Outline Supreme Court decisions regarding slavery and involuntary servitude. 2. Explain the intent and application of the

More information

Media-Prior Restraint

Media-Prior Restraint Media-Prior Restraint The Supreme Court case of Near v. Minnesota (1931) established that the government cannot stop material from being published in advance, even if the publication might be punishable

More information

Safeguarding Equality

Safeguarding Equality Safeguarding Equality For many Americans, the 9/11 attacks brought to mind memories of the U.S. response to Japan s attack on Pearl Harbor 60 years earlier. Following that assault, the government forced

More information

Hands on the Bill of Rights

Hands on the Bill of Rights Hands on the Bill of Rights Instructions Read the text of each Amendment to see which rights and freedoms it guarantees. To help you remember these rights, perform the finger tricks for each Amendment.

More information

Dear Members of the Judiciary Committee:

Dear Members of the Judiciary Committee: WASHINGTON LEGISLATIVE OFFICE April 29, 2015 Dear Members of the Judiciary Committee: AMERICAN CIVIL LIBERTIES UNION WASHINGTON LEGISLATIVE OFFICE 915 15th STREET, NW, 6 TH FL WASHINGTON, DC 20005 T/202.544.1681

More information

CRIMINAL INVESTIGATIONS AND TECHNOLOGY: PROTECTING DATA AND RIGHTS

CRIMINAL INVESTIGATIONS AND TECHNOLOGY: PROTECTING DATA AND RIGHTS CRIMINAL INVESTIGATIONS AND TECHNOLOGY: PROTECTING DATA AND RIGHTS JUNE 8, 2017 Bracewell LLP makes this information available for educational purposes. This information does not offer specific legal advice

More information

Statement of James X. Dempsey Executive Director Center for Democracy & Technology 1. before the House Permanent Select Committee on Intelligence

Statement of James X. Dempsey Executive Director Center for Democracy & Technology 1. before the House Permanent Select Committee on Intelligence Statement of James X. Dempsey Executive Director Center for Democracy & Technology 1 before the House Permanent Select Committee on Intelligence May 11, 2005 Mr. Chairman, Rep. Harman, Members of the Committee,

More information

CASE COMMENT ELECTRONIC SURVEILLANCE: NATIONAL SECURITY AND THE PRESERVATION OF THE RIGHTS GUARANTEED BY THE FOURTH AMENDMENT

CASE COMMENT ELECTRONIC SURVEILLANCE: NATIONAL SECURITY AND THE PRESERVATION OF THE RIGHTS GUARANTEED BY THE FOURTH AMENDMENT CASE COMMENT ELECTRONIC SURVEILLANCE: NATIONAL SECURITY AND THE PRESERVATION OF THE RIGHTS GUARANTEED BY THE FOURTH AMENDMENT Jewel v. Nat l Sec. Agency, 2015 WL 545925 (N.D. Cal. 2015) Valentín I. Arenas

More information

War, Civil Liberties, and Security Opinion Poll

War, Civil Liberties, and Security Opinion Poll War, Civil Liberties, and Security Opinion Poll Ten years after the attacks of September 11, 2001, an organization of journalists and academics conducted a public opinion survey about civil liberties and

More information

Objectives : Objectives (cont d): Sources of US Law. The Nature of the Law

Objectives : Objectives (cont d): Sources of US Law. The Nature of the Law The Nature of the Law Martha Dye-Whealan RPh, JD Pharm 543 Objectives : Identify and distinguish the sources of law in the United States. Understand the hierarchy of laws, and how federal and state law

More information

Reauthorization of the FISA Amendments Act

Reauthorization of the FISA Amendments Act Edward C. Liu Legislative Attorney September 12, 2012 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research Service 7-5700 www.crs.gov R42725 Summary Reauthorizations

More information

The Bill of Rights. QuickTime and a TIFF (Uncompressed) decompressor are needed to see this picture.

The Bill of Rights. QuickTime and a TIFF (Uncompressed) decompressor are needed to see this picture. The Bill of Rights Introduction The Bill of Rights was ratified in 1791 It includes the first 10 Amendments to the Constitution It protects American s basic freedoms against the power of the Federal Government

More information

Bill of Rights! First 10!!! What were the basic rights promised in the Bill of Rights?

Bill of Rights! First 10!!! What were the basic rights promised in the Bill of Rights? Bill of Rights! First 10!!! What were the basic rights promised in the Bill of Rights? The Bill of Rights The First 10 Amendments to the Constitution Take notes on the slides as they appear. Draw pictures

More information

A Legal Analysis of the NSA Warrantless Surveillance Program. Morton H. Halperin and Jerry Berman 1. January 31, 2006

A Legal Analysis of the NSA Warrantless Surveillance Program. Morton H. Halperin and Jerry Berman 1. January 31, 2006 A Legal Analysis of the NSA Warrantless Surveillance Program Morton H. Halperin and Jerry Berman 1 January 31, 2006 The warrantless NSA surveillance program is an illegal and unnecessary intrusion into

More information

Report on the Findings by the EU Co-chairs of the. ad hoc EU-US Working Group on Data Protection. 27 November 2013

Report on the Findings by the EU Co-chairs of the. ad hoc EU-US Working Group on Data Protection. 27 November 2013 Report on the Findings by the EU Co-chairs of the ad hoc EU-US Working Group on Data Protection 27 November 2013 Report on the Findings of the EU Co-Chairs of the Ad Hoc EU-US Working Group on Data Protection

More information

Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety. Benjamin Franklin (1755)

Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety. Benjamin Franklin (1755) Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety. Benjamin Franklin (1755) THE SNOW DEN EFFEC T: THE CO N FLICT IN A FREE SOCIETY, WHAT

More information

BILLS PENDING AS OF 9/11/13 THAT RELATE TO NSA SURVEILLANCE

BILLS PENDING AS OF 9/11/13 THAT RELATE TO NSA SURVEILLANCE BILLS PENDING AS OF 9/11/13 THAT RELATE TO NSA SURVEILLANCE September 12, 2013 Members of Congress have introduced a series of bills to amend the Foreign Intelligence Surveillance Act in response to disclosure

More information

Second Interim Report of the National Commission on Terrorist Attacks Upon the United States. Thomas H. Kean, Chair, and Lee H. Hamilton, Vice Chair

Second Interim Report of the National Commission on Terrorist Attacks Upon the United States. Thomas H. Kean, Chair, and Lee H. Hamilton, Vice Chair Second Interim Report of the National Commission on Terrorist Attacks Upon the United States Thomas H. Kean, Chair, and Lee H. Hamilton, Vice Chair September 23, 2003 The National Commission on Terrorist

More information

Presidents Bush, Obama and the Surveillance of Americans

Presidents Bush, Obama and the Surveillance of Americans Published in In The Quest for Leadership: Essays in Honor of Thomas E. Cronin. Michael Genovese, ed. (Amherst, NY: Cambria Press, 2015), pp. 131-148. Presidents Bush, Obama and the Surveillance of Americans

More information

CRS Report for Congress

CRS Report for Congress Order Code RS21441 Updated July 6, 2005 CRS Report for Congress Received through the CRS Web Summary Libraries and the USA PATRIOT Act Charles Doyle Senior Specialist American Law Division The USA PATRIOT

More information

Topic 7 The Judicial Branch. Section One The National Judiciary

Topic 7 The Judicial Branch. Section One The National Judiciary Topic 7 The Judicial Branch Section One The National Judiciary Under the Articles of Confederation Under the Articles of Confederation, there was no national judiciary. All courts were State courts Under

More information

FINAL WORKING DOCUMENT

FINAL WORKING DOCUMENT EUROPEAN PARLIAMT 2009-2014 Committee on Foreign Affairs 20.11.2013 FINAL WORKING DOCUMT on Foreign Policy Aspects of the Inquiry on Electronic Mass Surveillance of EU Citizens Committee on Foreign Affairs

More information

FILED SEP NANCY MAYER WHITTINGTON, CLERK. Case 1:07-cv RBW Document 1 Filed 09/27/07 Page 1 of 8

FILED SEP NANCY MAYER WHITTINGTON, CLERK. Case 1:07-cv RBW Document 1 Filed 09/27/07 Page 1 of 8 Case 1:07-cv-01732-RBW Document 1 Filed 09/27/07 Page 1 of 8 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA FILED SEP 2 7 2007 NANCY MAYER WHITTINGTON, CLERK U.S. DISTRICT COURT ELECTRONIC

More information

DIPLOMSKI RAD. State of emergency: privacy, security and surveillance in modern-day U.S.A.

DIPLOMSKI RAD. State of emergency: privacy, security and surveillance in modern-day U.S.A. Odsjek za anglistiku Filozofski fakultet Sveučilište u Zagrebu DIPLOMSKI RAD State of emergency: privacy, security and surveillance in modern-day U.S.A. Kandidat: Arsen Brizić Mentor: Izv. prof. dr. sc.

More information

A Comparative Analysis of the USA PATRIOT Act of 2001 to the USA FREEDOM ACT of 2015: Balancing Security with Liberty

A Comparative Analysis of the USA PATRIOT Act of 2001 to the USA FREEDOM ACT of 2015: Balancing Security with Liberty University of Central Florida HIM 1990-2015 Open Access A Comparative Analysis of the USA PATRIOT Act of 2001 to the USA FREEDOM ACT of 2015: Balancing Security with Liberty 2015 Richard L. Russo University

More information

February 8, The Honorable Jerrold Nadler Chairman U.S. House Committee on the Judiciary 2141 Rayburn House Office Building Washington, DC 20515

February 8, The Honorable Jerrold Nadler Chairman U.S. House Committee on the Judiciary 2141 Rayburn House Office Building Washington, DC 20515 February 8, 2019 The Honorable Jerrold Nadler Chairman U.S. House Committee on the Judiciary 2141 Rayburn House Office Building Washington, DC 20515 The Honorable Doug Collins Ranking Member U.S. House

More information

Nixon vs. Ellsberg. By: Tucker Frederickson. Junior Division

Nixon vs. Ellsberg. By: Tucker Frederickson. Junior Division Nixon vs. Ellsberg By: Tucker Frederickson Junior Division 1774 1 In the middle of the Vietnam War, in 1971, Daniel Ellsberg shared classified papers from the Pentagon with the media. Why would a government

More information

THE USA PATRIOT ACT AND CANADA S ANTI-TERRORISM ACT: KEY DIFFERENCES IN LEGISLATIVE APPROACH

THE USA PATRIOT ACT AND CANADA S ANTI-TERRORISM ACT: KEY DIFFERENCES IN LEGISLATIVE APPROACH PRB 05-83E THE USA PATRIOT ACT AND CANADA S ANTI-TERRORISM ACT: KEY DIFFERENCES IN LEGISLATIVE APPROACH Jennifer Wispinski Law and Government Division 31 March 2006 PARLIAMENTARY INFORMATION AND RESEARCH

More information

Indicate the answer choice that best completes the statement or answers the question.

Indicate the answer choice that best completes the statement or answers the question. Indicate the answer choice that best completes the statement or answers the question. 1. a. branches of powers. b. government triangle. c. separation of powers. d. social contract. 2. The English Bill

More information

CRS Report for Congress

CRS Report for Congress Order Code RS21704 Updated June 29, 2005 CRS Report for Congress Received through the CRS Web Summary USA PATRIOT Act Sunset: A Sketch Charles Doyle Senior Specialist American Law Division Several sections

More information

The Bill of Rights determines how you must be treated by the government. It outlines your rights as an American.

The Bill of Rights determines how you must be treated by the government. It outlines your rights as an American. Learning Target I can explain the basic rights promised in the Bill of Rights. Why You Should Care The Bill of Rights determines how you must be treated by the government. It outlines your rights as an

More information

Pre-AP Agenda (9/1-5)

Pre-AP Agenda (9/1-5) Pre-AP Agenda (9/1-5) Monday No school Tuesday - copy agenda - Hand le on the Preamble - Principles of the Constitution foldable Wednesday - Voting in America picture analysis Thursday - Where is the Control?

More information

Issue Area Current Law S as reported by Senate Judiciary Comm. H.R as reported by House Judiciary Comm.

Issue Area Current Law S as reported by Senate Judiciary Comm. H.R as reported by House Judiciary Comm. Chart comparing current law, S. 1692 (PATRIOT Act Sunset Extension Act) as reported by Senate Judiciary Committee, and H.R. 3845 (USA Patriot Amendments Act of 2009) as reported by the House Judiciary

More information

YALE UNIVERSITY SURVEY OF HIGH SCHOOL STUDENTS SURVEY C

YALE UNIVERSITY SURVEY OF HIGH SCHOOL STUDENTS SURVEY C YALE UNIVERSITY SURVEY OF HIGH SCHOOL STUDENTS SURVEY C 2007-08 We are interested in high school students interest in politics and government. This is not a quiz and we do not expect you to know all of

More information

Sneak and Peak Search Warrants

Sneak and Peak Search Warrants Digital Commons @ Georgia Law Popular Media Faculty Scholarship 9-11-2002 Sneak and Peak Search Warrants Donald E. Wilkes Jr. University of Georgia School of Law, wilkes@uga.edu Repository Citation Wilkes,

More information

Privacy And? Surveillance

Privacy And? Surveillance University of Leeds From the SelectedWorks of Subhajit Basu Fall November 28, 2015 Privacy And? Surveillance Subhajit Basu Available at: https://works.bepress.com/subhajitbasu/88/ School of something FACULTY

More information

The Five Freedoms: 1. Religion 2. Assembly 3. Press 4. Petition 5. Speech RAPPS

The Five Freedoms: 1. Religion 2. Assembly 3. Press 4. Petition 5. Speech RAPPS The Five Freedoms: 1. Religion 2. Assembly 3. Press 4. Petition 5. Speech RAPPS A well regulated Militia, being necessary to the security of a free State, the right of the people to keep and bear Arms,

More information

Electronic Privacy Information Center September 24, 2001

Electronic Privacy Information Center September 24, 2001 Electronic Privacy Information Center September 24, 2001 Analysis of Provisions of the Proposed Anti-Terrorism Act of 2001 Affecting the Privacy of Communications and Personal Information In response to

More information

Surveillance and Privacy in Indonesia

Surveillance and Privacy in Indonesia Surveillance and Privacy in Indonesia Table of Contents Preface I. Introduction... 1 II. Enabling Statutes and Authorization... 6 III. Cases in Indonesia... 12 A. Constitutional Court Judgment No. 006/PUU-I/2003,

More information

Report on the findings by the EU Co-chairs of the ad hoc EU-US Working Group on Data Protection

Report on the findings by the EU Co-chairs of the ad hoc EU-US Working Group on Data Protection COUNCIL OF THE EUROPEAN UNION Brussels, 27 November 2013 16987/13 JAI 1078 USA 61 DATAPROTECT 184 COTER 151 ENFOPOL 394 NOTE from: to: Subject: Presidency and Commission Services COREPER Report on the

More information

Surveillance of Foreigners Outside the United States Under Section 702 of the Foreign Intelligence Surveillance Act (FISA)

Surveillance of Foreigners Outside the United States Under Section 702 of the Foreign Intelligence Surveillance Act (FISA) Surveillance of Foreigners Outside the United States Under Section 702 of the Foreign Intelligence Surveillance Act (FISA) Edward C. Liu Legislative Attorney April 13, 2016 Congressional Research Service

More information

Suppose you disagreed with a new law.

Suppose you disagreed with a new law. Suppose you disagreed with a new law. You could write letters to newspapers voicing your opinion. You could demonstrate. You could contact your mayor or governor. You could even write a letter to the President.

More information

Testimony of Peter P. Swire

Testimony of Peter P. Swire Testimony of Peter P. Swire Review Group on Intelligence and Communications Technology Before the HOUSE COMMITTEE ON THE JUDICIARY Hearing on: Examining Recommendations to Reform FISA Authorities February

More information

TOP SECRET!/COMOO'//NO.i'ORN

TOP SECRET!/COMOO'//NO.i'ORN TOPSECRRTh~O~~~OFORN. """ Office of the Assistant Attorney General U.S. Department of Justice Office of Legislative Affairs Wa:hingtcm. D.C. 205JO February 2, 2011 The Honorable Dianne Feinstein Chairman

More information

Privacy The Fourth Amendment and Government Systems CSC 301 Spring 2018 Howard Rosenthal

Privacy The Fourth Amendment and Government Systems CSC 301 Spring 2018 Howard Rosenthal Privacy The Fourth Amendment and Government Systems CSC 301 Spring 2018 Howard Rosenthal Course Notes: Much of the material in the slides comes from the books and their associated support materials, below

More information

DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA

DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA Lawful Access: Legal Review Follow-up Consultations: Criminal Code Draft Proposals February-March 2005 For discussion purposes Not for further

More information

BACKGROUNDER. New National Counterterrorism Center Guidelines Require Strong Oversight

BACKGROUNDER. New National Counterterrorism Center Guidelines Require Strong Oversight BACKGROUNDER New National Counterterrorism Center Guidelines Require Strong Oversight John G. Malcolm, Jessica Zuckerman, and Andrew Kloster No. 2769 Abstract The new guidelines on data sharing and retention

More information

is not a given, it s not present in many countries around the world and it is not something any

is not a given, it s not present in many countries around the world and it is not something any Speaking Notes of Clayton Ruby I am a lawyer who has spent many years fighting the government so you might not be surprised that the independence of the bar is a principle I hold close to my heart. That

More information

My Thoughts on the Limits of Privacy Post 9/11. As Americans, we have the right to own our own private property, as stated in the Fourth

My Thoughts on the Limits of Privacy Post 9/11. As Americans, we have the right to own our own private property, as stated in the Fourth My Thoughts on the Limits of Privacy Post 9/11 Tiffanie Ly As Americans, we have the right to own our own private property, as stated in the Fourth Amendment of the Constitution. It is one of America s

More information

1. Network Individualism

1. Network Individualism 1. Network Individualism Network individualism as a theory embraces the responsibility of the individual to maintain his or her own personal networks. This sub group of active network is co-dependent on

More information

A US Spy Tool Could Spell

A US Spy Tool Could Spell When Friends Spy on Friends: A US Spy Tool Could Spell Trouble for the Middle East July 5, 2017 A US Spy Tool Could Spell Trouble for the Middle East Under Trump Since June of this year, the debate about

More information

Federalist Society for Law and Public Policy Studies Criminal Law and Procedure Practice Group

Federalist Society for Law and Public Policy Studies Criminal Law and Procedure Practice Group Federalist Society for Law and Public Policy Studies Criminal Law and Procedure Practice Group White Paper on Anti-Terrorism Legislation: Surveillance &Wiretap Laws Developing Necessary and Constitutional

More information

AP Gov Chapter 15 Outline

AP Gov Chapter 15 Outline Law in the United States is based primarily on the English legal system because of our colonial heritage. Once the colonies became independent from England, they did not establish a new legal system. With

More information

RATIFICATION OF THE CONSTITUTION, FEDERALISTS VERSUS ANTI- FEDERALISTS AND THE BILL OF RIGHTS ELISEO LUGO III

RATIFICATION OF THE CONSTITUTION, FEDERALISTS VERSUS ANTI- FEDERALISTS AND THE BILL OF RIGHTS ELISEO LUGO III RATIFICATION OF THE CONSTITUTION, FEDERALISTS VERSUS ANTI- FEDERALISTS AND THE BILL OF RIGHTS ELISEO LUGO III BACKGROUND INFORMATION ON RATIFICATION At the Constitutional Convention, representatives from

More information

The Constitution. Structure and Principles

The Constitution. Structure and Principles The Constitution Structure and Principles Structure Preamble We the People of the United States in Order to form a more perfect Union establish Justice insure domestic Tranquility provide for the common

More information

Encryption: Balancing the Needs of Law Enforcement and the Fourth Amendment

Encryption: Balancing the Needs of Law Enforcement and the Fourth Amendment 1050 17 th Street, N.W. Suite 1150 Washington, DC 20036 Free Markets. Real Solutions. 202.525.5717 www.rstreet.org Statement for the Record Before: Reps. Ted Poe, Pete Olson and Blake Farenthold April

More information

Spies for hire and information peddlers: A new threat to security in Africa?

Spies for hire and information peddlers: A new threat to security in Africa? African Security Review 17.4 Institute for Security Studies Spies for hire and information peddlers: A new threat to security in Africa? Lauren Hutton* In July 2007, the Ministry of Intelligence Services

More information

AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY CONSTITUTIONALITY AND LEGALITY OF NSA SURVEILLANCE PROGRAM. Bradley L. Brandt, Major, USAF

AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY CONSTITUTIONALITY AND LEGALITY OF NSA SURVEILLANCE PROGRAM. Bradley L. Brandt, Major, USAF AU/ACSC/BRANDT/AY14 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY CONSTITUTIONALITY AND LEGALITY OF NSA SURVEILLANCE PROGRAM by Bradley L. Brandt, Major, USAF A Research Report Submitted to the Faculty

More information

LESSON PLAN: You Be The Judge!

LESSON PLAN: You Be The Judge! LESSON PLAN: You Be The Judge! Photo by Mark Thayer Purpose: Students connect their ideas and lives to the larger community and world. Students develop critical thinking skills and think independently.

More information

THE NATIONAL GOVERNMENT OF THE UNITED STATES OF AMERICA

THE NATIONAL GOVERNMENT OF THE UNITED STATES OF AMERICA THE NATIONAL GOVERNMENT OF THE UNITED STATES OF AMERICA 1492 1789 2010 The national government is located in Washington, District of Columbia, a site chosen by President George Washington in 1790. THE

More information

Recording of Officers Increases Has Your Agency Set The Standards for Liability Protection? Let s face it; police officers do not like to be recorded, especially when performing their official duties in

More information

Ch. 5 (pt 2): Civil Liberties: The Rest of the Bill of Rights

Ch. 5 (pt 2): Civil Liberties: The Rest of the Bill of Rights Name: Date: Period: Ch 5 (pt 2): Civil Liberties: The Rest of the Bill of Rights Notes Ch 5 (pt 2): Civil Liberties: The Rest of the Bill of Rights 1 Objectives about Civil Liberties GOVT11 The student

More information

National Security Letters in Foreign Intelligence Investigations: A Glimpse at the Legal Background

National Security Letters in Foreign Intelligence Investigations: A Glimpse at the Legal Background National Security Letters in Foreign Intelligence Investigations: A Glimpse at the Legal Background Charles Doyle Senior Specialist in American Public Law July 31, 2015 Congressional Research Service 7-5700

More information

People can have weapons within limits, and be apart of the state protectors. Group 2

People can have weapons within limits, and be apart of the state protectors. Group 2 Amendment I - Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people

More information

TRANSPARENCY REPORTING FOR BEGINNERS: MEMO #1 *DRAFT* 2/26/14 A SURVEY OF

TRANSPARENCY REPORTING FOR BEGINNERS: MEMO #1 *DRAFT* 2/26/14 A SURVEY OF TRANSPARENCY REPORTING FOR BEGINNERS: MEMO #1 *DRAFT* 2/26/14 A SURVEY OF HOW COMPANIES ENGAGED IN TRANSPARENCY REPORTING CATEGORIZE & DEFINE U.S. GOVERNMENT LEGAL PROCESSES DEMANDING USER DATA, AND IDENTIFICATION

More information

H.R.3162 SEC EXPANSION OF THE BIOLOGICAL WEAPONS STATUTE. Chapter 10 of title 18, United States Code, is amended-- (1) in section 175--

H.R.3162 SEC EXPANSION OF THE BIOLOGICAL WEAPONS STATUTE. Chapter 10 of title 18, United States Code, is amended-- (1) in section 175-- H.R.3162 Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT ACT) Act of 2001 (Enrolled Bill (Sent to President)) SEC. 817. EXPANSION

More information

Case 9:16-cr RLR Document 92 Entered on FLSD Docket 03/03/2017 Page 1 of 6

Case 9:16-cr RLR Document 92 Entered on FLSD Docket 03/03/2017 Page 1 of 6 Case 9:16-cr-80107-RLR Document 92 Entered on FLSD Docket 03/03/2017 Page 1 of 6 UNITED STATES OF AMERICA vs. GREGORY HUBBARD / UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA WEST PALM BEACH

More information