National Journal Presentation Credits Policy and the Private Sector: Addressing the NSA Leaks Published: November 15, 2013 Updated: December 19, 2013 Contributor:

Slides:



Advertisements
Similar presentations
FEDERAL GOVERNMENT.
Advertisements

Spies, Drones, and Snowden: What’s the Future of US Intelligence? Dennis Bowden Adjunct Professor University of Central Florida.
The Constitution: A More Perfect Union the part of government that interprets the laws judicial branch.
Silicon Valley Apps for Kids Meetup Laura D. Berger October 22, 2012 The views expressed herein are those of the speaker, and do not represent the views.
John Palatiello, MAPPS Executive Director Kevin Pomfret, Centre for Spatial Law and Policy presentation to NGAC December 7, Washington, DC.
THE LEGISLATIVE PROCESS
USA PATRIOT Act and Libraries Eric Johnson & Rodney Clare Jackman Sims Memorial Library.
Effects of Counterterrorism Legislation post 09/11 James J. Clements Honors Colloquium May 3 rd, 2007.
Lawrence Kerr December 5,  Overview  Background  Foreign Intelligence Surveillance Act (FISA)  USA PARTRIOT Act  Proposed changes  FISA Improvements.
Electronic Privacy Does it exist?. Issue: Privacy concerns with library and bookseller records continue due to the reauthorization of Section 215. The.
Chapter 15 Counter-terrorism. Introduction  United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
Chapter 10 Privacy and the Police State. Governmental Intrusion into Individual Privacy Affects written and oral communications Data-GPS coordinates Fourth.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
USA Patriot Act FBI Public FISA Foreign policy ExecutiveCongressSupreme Court Government agencies International surveillance.
Towards a Freedom of Information Law in Qatar Fahad bin Mohammed Al Attiya Executive Chairman, Qatar National Food Security Programme.
Why Privacy Now Goes Far Beyond Complying With Your Privacy Policy Peter Swire Facebook: June 3, 2015.
Chris Tan Chris Ye. provide for the sharing of certain cyber threat intelligence and cyber threat information between the intelligence community and cyber.
Allows FBI to request (from FISA court judges) access to certain business records, including Common carriers (airlines, bus companies, and others in the.
Social Media & the Law Video 4 Social Media Training for Business Teachers #socialmedialaw.
Rank these 4 people in order – most conservative to most liberal. McCain and Hillary sharing a moment Rand Paul and Obama – not really sharing a moment.
5 Basic principles of the u.s. constitution
Federal Bureau of Investigation
CAPPS II: A Case Study of Homeland Security Computer Applications Marcia Hofmann Staff Counsel Electronic Privacy Information Center Computer Freedom &
Chapter 14: The Presidency in Action Section 2. Copyright Pearson EducationSlide 2 Chapter 14, Section 2 Objectives 1.Identify the sources of the President’s.
Internet regulation National limits of Internet Content.
FEDERAL GOVERNMENT: Building Background Knowledge.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Monday, August 10, 2015  Assessment  Topic Discussion  Research Assignments.
UKRAINIAN INTERNET GOVERNANCE FORUM Kyiv 1 October 2014 State of play of the answers to Ed. Snowden revelations: TIME OF REPORTS USA National, EU, CoE.
Civil Liberties Challenges
The Fourth Amendment vs. the USA PATRIOT Act David Parez.
THE UNITED STATES CONSTITUTION AND FEDERALISM UNIT 3.
Agencies and Surveillance Authority SNFI Agencies and Surveillance Authority 1.Civics 101, Courts, and the Constitution 2.Executive Agencies 3.PATRIOT.
Everything you ever wanted to know about National Security Letters… But were afraid to ask.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
The USA PATRIOT Act An Overstatement of ALA Concerns?
Chapter 9: Interest Groups Section 3
Unclassified/FOUO Intelligence Community Directive (ICD) 119 Media Contacts Training.
PATRIOT Act Timeline of Key Recent Federal Actions on the PATRIOT Act
The NSAs Spying Agenda on Americans Fabian Barraza 11/22/14.
“Congress lets the NSA run Amok” Jeffrey Rosen. Congress, NSA and President: Congress, NSA and President: Let Courts Deal with It Two NSA programs: 1)
Chapter 19 - Congressional Authority for National Security Surveillance Part I.
Tuesday, December 8 Need: Your notes, pencil/pen Patience EQ: How did the works of the Enlightenment influence the creation of the U.S. Constitution?
International Trade 1 Source: Senate GovTrack.us, “H.R. 644 – Trade Facilitation and Trade Enforcement Act of 2015,” June 15, 2015; Burgess Everett, “Democrats.
The Patriot Act Is Spying on US citizens Ethical?
LESSON 1.3 Structure of American Government. government-belinda-stutzman
Warrantless Wiretapping Sara Rudman Julie Sugarman Louise Matthiesen.
June May 2015 PATRIOT Act Timeline of Key Recent Federal Actions on PATRIOT Act Potential Actions in 114 th Congress Following the passage of.
NSA AFF – Background Information. Plan The U.S. Supreme Court should hold in American Civil Liberties Union (ACLU) v. Clapper that the collection of metadata.
The Ethical Use of Data by Government Agencies By Sean Pugh.
 Constitution – body of fundamental laws which say how a government is to operate  It is the supreme law of the land  It explains how the government.
Chapter 9: Interest Groups Section 3. Copyright © Pearson Education, Inc.Slide 2 Chapter 9, Section 3 Key Terms lobbying: the process by which organized.
Edward Snowden An Introduction.
National Security Agency (NSA) Surveillance Christopher Boyd.
The United States Constitution. Popular Sovereignty- the power and authority of the government comes from the people. Limited Government- National government.
CONGRESSSIONAL POWERS Chapter 6. Constitutional provisions The Founders created a strong executive to carry out the legislation of Congress. Expressed.
The Development of the Government of the United States
Bellwork Think about this…. Historical Event
U.S. and Texas Politics and Constitution Civil Liberties I February 3, 2015 J. Bryan Cole POLS 1336.
Surveillance around the world
5 Basic principles of the u.s. constitution
Surveillance Topic Baxter July 26th, 2015
U. S. Department of Homeland Security. Office for Civil Rights
Separation of Powers.
The Constitution The Constitution is made up of 8 sections
Define the Problem Constant surveillance of citizens in our country
FEDERAL GOVERNMENT.
U.S. Intelligence Oversight Reforms & the Cloud Act
The Surveillance State
Congress Chapter 5.
Presentation transcript:

National Journal Presentation Credits Policy and the Private Sector: Addressing the NSA Leaks Published: November 15, 2013 Updated: December 19, 2013 Contributor: Dustin Volz, National Journal Staff Correspondent Producer: Catherine Treyz Director: Jessica Guzik

Before NSA Leaks, Tech Companies Acceded to Data Requests 2 Source: “Factbox: History of mass surveillance in the United States,” Reuters, June 7, Takeaway The National Security Agency can access volumes of data from tech and telecommunications companies by obtaining a surveillance warrant from the FISA Court, which reviews the NSA’s data requests to ensure they are justified in the interests of national security National Security Agency (NSA) Data Request Process NSA identifies data necessary to collect for national security purposes Foreign Intelligence Surveillance Act (FISA) Court reviews NSA data request and, if approved, grants surveillance warrant Tech or telecomm company accedes to surveillance warrant, shares data with NSA

Companies’ Main Concern: Transparency with Consumers Analysis by Dustin Volz Companies often comply with NSA surveillance warrants, but they seek to be transparent about those data requests with their customers in order to protect brand reputation 3 Source: “A Barrage of Data Requests,” The Washington Post, November 5, Estimated NSA Data Requests and Accounts Affected Among Key Companies January to July 2013

Leaks Reveal NSA Not Transparent With Companies Analysis by Dustin Volz Stream of NSA leaks that began in June 2013 revealed many classified surveillance programs, including programs that bypassed the FISA Court’s review and collected information from companies without their knowledge Companies could not be transparent with customers about surveillance that they did not know about Companies shifted positioning on data collection from increasing transparency to pushing for policy reform In Dec. 2013, a federal judge ruled the NSA’s bulk phone record collection program as unconstitutional pending appeal, the first major legal decision regarding the NSA’s surveillance 4 Source: Glenn Greenwald, “XKeyscore: NSA tool collects ‘nearly everything a user does on the Internet,’” The Guardian, July 31, 2013; TIME Staff, “A Glossary of Government Surveillance,” TIME, August 1, 2013; Barton Gellman and Ashkan Soltani, “NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say,” The Washington Post, October 30, 2013; “NSA slides explain the PRISM data-collection program,” The Washington Post, June 6, 2013; Josh Gerstein, “Judge: NSA phone program likely unconstitutional,” POLITICO, December 16, 2013; National Journal Research, NSA Data Collection via Classified Programs PRISM Collects data and metadata from nine servers; Apple, AOL, Facebook, Google, Microsoft, PalTalk, Skype, Yahoo, and YouTube MUSCULAR Collects user data and data links that connect Yahoo and Google data centers worldwide XKEYSCORE Collects real-time Internet activity, content, browsing history, and metadata into a comprehensive database

Under Pressure from Tech Companies and Constituents, Congress Proposes Changes 5 Source: Govtrack.us; Ellen Nakashima, “Senate bill would approve NSA program but try to curb it,” The Washington Post, October 31, 2013; Brendan Sasso, “Lawmakers propose USA Freedom Act to curb NSA”s powers,” The Hill, October 29, 2013; Stacy Kaper, “Can the Senate Crack Down on NSA Spying,” National Journal, November 7, 2013; David E. Sanger and Charlie Savage, “Obama is Urged to Sharply Curb NSA Data Mining,” December 18, 2013; National Journal Research, USA Freedom Act vs. FISA Improvement Act HeaderUSA FREEDOM ActFISA Improvement Act Introduced October 29, 2013October 31, 2013 Authors Sen. Patrick Leahy (D- Vt.) Rep. James Sensenbrenner (R-Wis.) Sen. Dianne Feinstein (D-Calif.) Goals To strengthen prohibitions regarding access to Americans’ personal information and interactions To strengthen national security by sustaining NSA’s metadata collection programs and to protect Americans’ privacy Key Provisions End the NSA’s bulk data collection authorized under Section 215 of the Patriot Act Require the government to delete all information about American citizens that was accidently collected Create a special advocate office to argue for stronger privacy protections before the FISA Court Require the Attorney General to disclose all relevant court decisions related to the interpretation of this law Enhance oversight of overseas intelligence collection Allow the government to keep phone records for up to five years Require FISA Court to review data collection to ensure “reasonable articulable suspicion” of terrorism Require Senate to approve NSA director and inspector general appointments (a provision the White House opposes) Revise intelligence gathering procedures every five years Prospects of Passing Positive: Most tech companies, civil liberties groups, and many lawmakers back the bill Positive: Bill has bicameral and bipartisan support Negative: Bill may be seen as encroaching on executive power Negative: Lacks House leadership backing Positive: Moderate approach to reform; more appetizing for conservatives Negative: Many see bill as codifying NSA surveillance powers Negative: House Intelligence Cmte. Chairman Mike Rogers (R- Mich.) may introduce a similar bill through the intelligence authorization bill with Speaker John Boehner’s (R-Ohio) support Takeaway Congressional leadership has not indicated that it is a top short-term priority; however, in Dec. 2013, a surveillance review board recommended 46 changes to the NSA’s counterterrorism and collection programs that restrict the NSA’s unilateral powers, increase the specificity of court approvals, and require more Congressional and presidential oversight