WIRETAPPING, SURVEILLANCE AND

Similar documents
A US Spy Tool Could Spell

OFFICE OF BOB BARR Member of Congress,

The National Security Agency s Warrantless Wiretaps

6.805/6.806/STS.085, Ethics and Law on the Electronic Frontier Lecture 7: Profiling and Datamining

The administration defended the surveillance program, saying that it is lawful and is a critical tool to protect national security.

HIIBEL V. SIXTH JUDICIAL DISTICT COURT OF NEVADA: IDENTIFICATION AND ANONYMITY POST-9/11

Privacy The Fourth Amendment and Government Systems CSC 301 Spring 2018 Howard Rosenthal

Vocabulary Match-Up. Name Date Period Workbook Activity

THE RUTHERFORD INSTITUTE

Debating privacy and ICT

Encryption: Balancing the Needs of Law Enforcement and the Fourth Amendment

Safeguarding Equality

Welcome and key note address

Electronic Privacy Information Center September 24, 2001

Voting Alternate Lesson Plan

Privacy, personal information, law enforcement and lawful access

Student Worksheet Manning Case Challenges Definition of Whistleblower

PRIVACY, TECHNOLOGY AND NATIONAL SECURITY: An Overview of Intelligence Collection by Robert S. Litt, ODNI General Counsel

Appendix II: Legal Provisions

NOMINATION AND ENDORSEMENT PROCEDURE FOR THE 25TH LEGISLATIVE DISTRICT DEMOCRATS

PATRIOT Propaganda: Justice Department s PATRIOT Act Website Creates New Myths About Controversial Law. ACLU Analysis

Unit 7 Our Current Government

Voting Lesson Plan. Student Objectives. Question for Deliberation. Materials

TITLE III WIRETAPS. WHO S LISTENING?

L9. Electronic Voting

BEFORE THE U.S. SENATE JUDICIARY COMMITTEE SUBCOMMITTEE ON THE CONSTITUTION

The story of John Ashcroft and James Comey s hospital-bed heroics has by now been

Chapter 2 Content Statement

VISION IAS

Life in the. Fast Lane PREPARED BY ELECTION SYSTEMS & SOFTWARE ELECTION SYSTEMS & SOFTWARE

Case3:13-cv JSW Document86-2 Filed03/10/14 Page1 of 56. Exhibit A. Exhibit A

January 14, Dear Chairman Graham and Ranking Member Feinstein:

FINAL EXAMINATION DIRECTIONS: Write your answers on the ANSWER SHEET provided.

Ratifying the Constitution

STATE HEARING QUESTIONS

THE FEDERAL COURTS LAW REVIEW. Symposium Introduction: Privacy in the Federal Courts

I. Does International Law Prohibit the U.S. Government from Monitoring Foreign Citizens in Foreign Countries?

Investigatory Powers Bill

Fear of Online Crime: Americans support FBI interception of criminal suspects and new laws to protect online privacy

Statement for the Record. House Judiciary Subcommittee on Crime, Terrorism and Homeland Security. Hearing on Reauthorizing the Patriot Act

The Five Problems With CAPPS II: Why the Airline Passenger Profiling Proposal Should Be Abandoned

Syllabus Law 641: Surveillance Law Seminar. George Mason University Law School Spring Jamil N. Jaffer

Identity and Economics: Terrorism and Privacy. Adam Shostack

DRAFT COURT OFFICER RESPONSE TO WITNESS INTIMIDATION

NATIONAL SHERIFFS ASSOCIATION

The Supreme Court, Civil Liberties, and Civil Rights

Presidency of John Adams ( )

Chapter 20: Civil Liberties: Protecting Individual Rights Section 2

Attorney General Jackson on The Federal Prosecutor (April 1, 1940)

PRO/CON: Is Snowden a whistle-blower or just irresponsible?

Submission to the Joint Committee on the draft Investigatory Powers Bill

Is Government a Necessary Evil? Throughout our nation s history, there have been massive debates concerning which type

TELUS Transparency Report

Course Security Services. Unit IV U.S. Constitution and Constitutional Issues

Syllabus Law : Surveillance Law Seminar. George Mason University Law School Fall 2015 Arlington Hall, Hazel Hall. Professor Jake Phillips

1 June Introduction

The Bill of Rights. Sloane Veronico & Cameryn Sebastian 4th period

Should you elect non publication?

Confrontation or Collaboration?

DATA PROTECTION EXECUTIVE SUMMARY

Why a Bill of Rights? What Impact Does it Have? Objectives

NSA s surveillance leak by Edward Snowden a utilitarian analysis. Jose Camero. 30 September 2015

4/3/2018. Someone s Knocking at the Door: Are you ready for increased immigration compliance? I-9 Audit. Lori Chesser

Preparedness Kit. Deportation. What to Do, Who to Call, How to Safeguard your Family

Constitution Test Study Guide

Prosecuting the Press for Publishing Classified Information

Union Elections. Online Voting. for Credit. Helping increase voter turnout & provide accessible, efficient and secure election processes.

Divided Supreme Court Requires Warrants for Cell Phone Location Data

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER. to the DEPARTMENT OF HOMELAND SECURITY U.S. CUSTOMS AND BORDER PROTECTION

Topic 7 The Judicial Branch. Section One The National Judiciary

Results report Missing Persons Act What was this engagement about? The Yukon Government was looking to develop legislation as a mechanism to assist

Surveillance and Privacy in Indonesia

AM GOV Chapter 2 The Constitution: The Foundation of Citizens' Rights

Police Process. Definition of Police Corruption. Definition of Police Corruption. Cost of Police Corruption (cont.) Cost of Police Corruption

The Alien and Sedition Acts: Defining American Freedom

Making it Easier to Vote vs. Guarding Against Election Fraud

Know and Exercise Your Rights! Steps to Prepare for the Potential Impact of the Trump Administration on Immigrant and Refugee Communities

Jim Slaughter, JD, CPP-T, PRP P.O. Box Greensboro, NC (336)

The Federalist, A Collection Of Essays Written In Favor Of The New Constitution, As Agreed Upon By The Federal Convention, Sept. 17, 1787, Reprinted

Voices of Immigrant and Muslim Young People

1. White House plumbers 2. CREEP. 3. smoking gun. 5. Deep Throat. 6. follow the money. 7. I am not a crook

tinitrd~tat s~fnatf WASHINGTON, DC 20510

Reflections: - Should we Worry About Cryptocurrencies Being Outlawed? - Isn t Bitcoin a Bubble? Outlawing Cryptocurrencies

Plea for referral to police for investigation of alleged s.1 RIPA violations by GCHQ

Name: Adv: Period: Cycle 5 Week 1 Day 1 Notes: Relations between the US and Russia from 1991 Today

Politics as Usual. Part 1: Unity vs. Opposition

Protecting Human Rights and National Security in the New Era of Data Nationalism

Ratification of the Constitution. Issues

Report on the findings by the EU Co-chairs of the ad hoc EU-US Working Group on Data Protection

Occasional Paper No 34 - August 1998

Leading the Way Positive-Sum Solutions to Protecting Privacy, Civil Liberties and Security

The Identity Project

Grade 8. NC Civic Education Consortium 1 Visit our Database of K-12 Resources at

The United Nations study on fraud and the criminal misuse and falsification of identity

Why 100% of the Polls Were Wrong

Countering Adversary Attacks on Democracy. It's Not Just About Elections. Thought Leader Summary

AFRICAN DECLARATION. on Internet Rights and Freedoms. africaninternetrights.org

United States District Court

Doreen Weisenhaus Associate Professor and Director, Media Law Project 19 October 2016

Agreement on counter-terrorism measures

Transcription:

THE JAMES A. BAKER III INSTITUTE FOR PUBLIC POLICY RICE UNIVERSITY WIRETAPPING, SURVEILLANCE AND THE INTERNET By CHRISTOPHER BRONK, PH.D. FELLOW IN TECHNOLOGY, SOCIETY AND PUBLIC POLICY JAMES A. BAKER III INSTITUTE FOR PUBLIC POLICY RICE UNIVERSITY JANUARY 18, 2008

THE FOLLOWING OPINION PIECE WAS WRITTEN BY A RESEARCHER, FELLOW OR SCHOLAR. THE RESEARCH AND VIEWS EXPRESSED IN THIS OPINION PIECE ARE THOSE OF THE INDIVIDUAL(S), AND DO NOT NECESSARILY REPRESENT THE VIEWS OF THE JAMES A. BAKER III INSTITUTE FOR PUBLIC POLICY. 2008 BY THE JAMES A. BAKER III INSTITUTE FOR PUBLIC POLICY OF RICE UNIVERSITY THIS MATERIAL MAY BE QUOTED OR REPRODUCED WITHOUT PRIOR PERMISSION, PROVIDED APPROPRIATE CREDIT IS GIVEN TO THE AUTHOR AND THE JAMES A. BAKER III INSTITUTE FOR PUBLIC POLICY. 2

Ways may someday be developed by which the government, without removing papers from secret drawers, can reproduce them in court, and by which it will be enabled to expose to a jury the most intimate occurrences of the home. Louis Brandeis, dissenting opinion, Olmstead v. United States (1928) After a recent lecture covering the issues of online privacy and electronic monitoring, I asked the students of my information technology seminar to consider the balance between the need for national security versus the desire for individual privacy. The essays I received held a wealth of opinion on one of the most controversial issues for the current administration: the mass monitoring of telephone and electronic communications by government outside the conditions of a judicial warrant. Educated by 1960s vintage Ph.D.s willing to pass along their views of government activities and abuse chronicled in the reports of the Church Committee, I expected a stream of outrage regarding the possibility that many or most of our telephone calls, e-mails and Internet habits might be viewed by the United States Intelligence Community. Instead, I received many replies in this vein: For my part, I have nothing to hide from the government; my daily activities, e- mails, and travels show no evidence of suspicious activity. If the government chooses to watch me closely, I do not feel threatened. Such a sentiment not only disregards the hard-won freedoms Americans consider sacred, but also reinforces an attitude within government that such freedoms have necessarily become obsolete. Under our system of government, anonymity and privacy are inextricably linked, because anonymity protects us from intimidation and coercion, no matter how subtle. We are a nation that casts our ballots anonymously, and for good reason. If unchecked, government-sanctioned eradication of anonymity will produce a chilling effect on political speech in this country. In his remarks at a geospatial intelligence conference in San Antonio last October, Donald Kerr, the principal deputy director of national intelligence, gave insight into the government s perspective on the balance between security and privacy. Kerr asserted that we could have both, but retaining them would require jettisoning anonymity. In our interconnected and wireless world, anonymity or the appearance of anonymity is quickly becoming a thing of the past, 3

Kerr said, advocating the need to move beyond the construct that equates anonymity with privacy. Protecting anonymity isn t a fight that can be won. he quipped. As far as safeguarding this new definition of privacy, Kerr basically said, Trust me. But why is anonymity a lost cause? In part, it is due to our digital personae. We can blame the death of anonymity on credit cards, digital telecommunications, Google, the global positioning system, the National Security Agency (NSA) and a plethora of other phenomena. In becoming digital, our society has mapped more and more of its interactions to a format that is easily monitored, read and processed. Sure, we have gotten convenience in the deal, but Visa, MasterCard and American Express know what we buy. Over time, private companies and government agencies have compiled massive quantities of data produced by our ever-growing digital footprints. It should come as no surprise that the NSA is trying, according to CNN, to create a database of every [telephone] call ever made. The chief concern was expressed by another student: My only worry is what the government constitutes as an attack on America. With terrorism and national security being used completely out of context these days, the government may unlawfully arrest someone as a terrorist who is putting national security at risk when the individual may be doing nothing more than protecting America s citizens by revealing certain truths. While this fear may not yet be grounded, there is a valid concern regarding misuse of data collected by either government or commercial entities. ChoicePoint, an Atlanta-based data aggregation company, may be considered a private intelligence agency of sorts. Disturbingly, the company sold mountains of personal data to unscrupulous entities, which later used it to conduct thousands of cases of identity theft. While data theft/loss and monitoring are obviously not the same, the concern is that monitored data will be inappropriately shared, mishandled or misused. Tremendous temptation exists to employ intelligence products for political or financial gain. By broadening our electronic dragnet to all communications, we open our system to unfathomable potential for abuse. For intelligence officials, who are, above else, charged with monitoring the activities of foreign persons, to declare anonymity dead, is frightening. It is worth remembering that the drafters of The 4

Federalist Papers, Alexander Hamilton, James Madison and John Jay, shared their ideas on our system of government via an anonymously published pamphlet. When he wanted to communicate the potential threat of the Soviet Union, George Kennan submitted an article to Foreign Affairs that was attributed to X. By accepting unfettered digital monitoring by government, we open the door to a dim future marked by suspicion, distrust and paranoia. We do not want Thoughtcrime. Trust me. 5