Agencies and Surveillance Authority SNFI 2015. Agencies and Surveillance Authority 1.Civics 101, Courts, and the Constitution 2.Executive Agencies 3.PATRIOT.

Slides:



Advertisements
Similar presentations
Key New Surveillance Provisions Professor Peter P. Swire Ohio State University Privacy 2001 Conference October 4, 2001.
Advertisements

Gag Rules and Information Flows: Or, How to Do Secret Surveillance in an Open Society Peter P. Swire Ohio State University Modest Proposals Conference.
1 The USA PATRIOT Act: Past, Present, Future EDUCAUSE Live! Webcast June 7, 2005 Jim Dempsey Center for Democracy & Technology
Homeland Security and the Future of Criminal Justice.
Spies, Drones, and Snowden: What’s the Future of US Intelligence? Dennis Bowden Adjunct Professor University of Central Florida.
Richard Warner USA Patriot Act: Money Laundering Provisions.
Sources of Law Chapter 1.2.
Criminal Procedure for the Criminal Justice Professional 11 th Edition John N. Ferdico Henry F. Fradella Christopher Totten Prepared by Tony Wolusky Searches.
Mike Anderson Todd Craig David Goldenberg
Passed by the Senate 98-1 Passed by the House October 26, 2001 – Signed into law by President Bush 130 pages in length Divided into 10 titles.
Is the Patriot Act Too Great a Threat to Our Civil Liberties? Michelle Schoonmaker Shane Fuhrman Rachel Almy Stacey Cremar.
U.S. Patriot Act Passed with minimal debate only 45 days after the September 11, 2001 attacks on the World Trade Center in New York City, New York, the.
NC State University - March David Drooz1 USA PATRIOT Federal anti- terrorism law Effective October 26, 2001 December 31, 2005, sunset for some of.
The PATRIOT Act, Technology and Records Privacy David L. Sobel General Counsel Electronic Privacy Information Center ECURE 2004 Arizona.
USA PATRIOT Act and Libraries Eric Johnson & Rodney Clare Jackman Sims Memorial Library.
Patriot Act October 26, United (and) Strengthening America (by) Providing appropriate tools required (to) intercept (and) obstruct Terrorism Act.
Chapter 17 Law and Terrorism.
PPA 573 – Emergency Management and Homeland Security Lecture 9a– Homeland Security and Civil Liberties: USA Patriot Act.
Effects of Counterterrorism Legislation post 09/11 James J. Clements Honors Colloquium May 3 rd, 2007.
Big Brother Might be Watching. Agenda: US Patriot Act Copyright Infringement Social Media Packets.
Lawrence Kerr December 5,  Overview  Background  Foreign Intelligence Surveillance Act (FISA)  USA PARTRIOT Act  Proposed changes  FISA Improvements.
Electronic Privacy Does it exist?. Issue: Privacy concerns with library and bookseller records continue due to the reauthorization of Section 215. The.
USA PATRIOT ACT USA PATRIOT ACT
Chapter 15 Counter-terrorism. Introduction  United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Chapter 10 Privacy and the Police State. Governmental Intrusion into Individual Privacy Affects written and oral communications Data-GPS coordinates Fourth.
USA Patriot Act FBI Public FISA Foreign policy ExecutiveCongressSupreme Court Government agencies International surveillance.
Allows FBI to request (from FISA court judges) access to certain business records, including Common carriers (airlines, bus companies, and others in the.
Federal Bureau of Investigation
Chapter 18 - The Fourth Amendment and National Security.
Other Laws (Primarily for E-Government) COEN 351.
1 Copyright © 2011 M. E. Kabay, J. Tower-Pierce & P. R. Stephenson. All rights reserved. The U.S.A.P.A.T.R.I.O.T. Act CJ341 – Cyberlaw & Cybercrime Lecture.
The Patriot Act Protecting the US or Violating People’s Freedoms.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Intelligence Counterintelligence. CSCE Farkas2 What is Intelligence? Information Activities Organization.
Monday, August 10, 2015  Assessment  Topic Discussion  Research Assignments.
WHO WATCHES THE WATCHERS? SHAE BUNAS UNIVERSITY OF CENTRAL OKLAHOMA Domestic Surveillance: Topic Analysis.
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
The Fourth Amendment vs. the USA PATRIOT Act David Parez.
“Technology Solutions” Full-Pipe Surveillance EDUCAUSE CSG - Blacksburg January 9, 2008 Lee Smith, Attorney.
Section 411 ‘Patriot Act’ violates 1st Amendment Permits guilt to be imposed solely on the basis of political associations protected by 1st Amendment.
Chapter 19 - Congressional Authority for National Security Surveillance Part II.
The USA PATRIOT Act An Overstatement of ALA Concerns?
Class Name, Instructor Name Date, Semester Comparative Criminal Justice Systems / 6 th edition Chapter 3: An American Perspective on Criminal Law.
Expository Essays. Introduction Paragraph and Thesis  Your introductory paragraph must always have a clear, efficient and firm thesis as the first sentence.
Chapter 18 - The Fourth Amendment and National Security.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Monica Sowell EDCI Jul 14. Content Vocabulary History Current Legislation USA PATRIOT Act Resources.
PATRIOT Act Timeline of Key Recent Federal Actions on the PATRIOT Act
Chapter 14 USA Patriot Act, Foreign Intelligence and Other Types of Electronic Surveillance Covered by Federal Law "Big Brother in the form of an increasingly.
Chapter 19 - Congressional Authority for National Security Surveillance Part I.
Section 2: The Fourth Amendment: Your Right to Be Secure Chapter 13: Supreme Court Cases.
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
ADMINISTRATIVE AGENCIES Crystal Wahlstrom-Kauffman April 1 st, 2008 MGT 335.
2015 Topic Lecture Overview of the High School Debate Topic.
IT’S RELEVANCE TODAY BILL OF RIGHTS (AND CONSTITUTION)
Unit 2: Chapter 17.  Attacks on September 11, 2001 shook America to its core  Largest on U.S. soil since World War II  Feeling of vulnerability  Congress.
Chapter 13 CIVIL LIBERTIES: Ordered Liberty in America
Bellwork Think about this…. Historical Event
U.S. and Texas Politics and Constitution Civil Liberties I February 3, 2015 J. Bryan Cole POLS 1336.
Legal Implications.
How Does Electronic Surveillance Work Legally?
DO NOW.
Laws Governing Police Surveillance
Electronic Surveillance, Post 9/11
Chapter 23 & 25 – Programmatic Surveillance and Bulk Collection
Role of US Security and Intelligence Agencies
The Right to Privacy vs. National Security
Presentation transcript:

Agencies and Surveillance Authority SNFI 2015

Agencies and Surveillance Authority 1.Civics 101, Courts, and the Constitution 2.Executive Agencies 3.PATRIOT Act

Checks and Balances

Executive agencies CIA – Central Intelligence Agency NSA – National Security Agency FBI – Federal Bureau of Investigation

Central Intelligence Agency Purpose: foreign intelligence through clandestine operations “active intelligence” Objectives: Counter-intelligence Counter terrorism Nonproliferation Cyber intelligence

Federal Bureau of Investigation Purpose: domestic intelligence and law enforcement Active-surveillance Objectives: Coordination law enforcement COINTELPRO

National Security Agency Purpose: signal intelligence (SIGNIT) “passive-intelligence” Objectives: Global monitoring Data collection and processing

Supreme Court Decisions and other Landmark Decisions Berger V. New York (1967) Katz v. United States (1967) Keith v DC of the Eastern District of Michigan and the United States (1972) Watergate (1972) Foreign Intelligence Surveillance Act (1978) Executive Order 12333

Patriot Act Cases Section 203 Section 206 Section 213 Section 215 Title III Section 505

Section 203 “Information Wall” Sections 203(b) and 203(d) Amended the Federal Rules of Criminal Procedures regarding grand jury proceedings Privacy Implications Sharing intercepted communications without a court order Mission Creep/Potential for Abuse Counterterrorism Lack of criteria Mass, indiscriminate information sharing

Section 206 Roving Surveillance “FISA Wiretaps” FISA Wiretaps vs. Criminal Wiretaps Privacy Intel agencies do not have to specify the target or location of surveillance “John Doe” wiretaps 2005 FBI incident Reforms Narrow search requirements “Ascertainment” provision

Section 213 “Sneak and Peek” Searches Delayed search warrant notifications Extensive form of domestic surveillance Counterterrorism vs. Criminal Investigations Privacy trade-off 4 th Amendment concerns Rate of Use Substantial increase since 2002

Section 213

Section 215 Metadata Collection Metadata vs. Content USA FREEDOM Act Reforms Scope of the program “Dragnet operation” Counterterrorism Counter-productive Privacy Metadata is very revealing Misuse/Abuse

Title III Anti-Terrorism Financing Restrictions Requires financial institutions to impose strict anti-money laundering measures Suspicious Activity Reports Financial Privacy Counterterrorism Effectiveness Hard to track Difficult to prevent Organized Crime Bulk cash smuggling Mexican DTOs (drug trafficking organizations)

Section 505 National Security Letters Allows the FBI to subpoena business records Gag order Privacy Scope of NSLs High use rate Misuse/Abuse Reforms Impact of the USA FREEDOM Act President’s Review Group on Intelligence and Communications Technologies

FISA, FISC and Section 702 Section 702 FAA of 2008 Domestic surveillance couched as foreign surveillance Poor government oversight Substantial NSA discretion Millions of Americans swept up by Sec. 702 searches Current Reforms/FISC Ineffective Fourth Amendment “Special Needs” doctrine “Incidental Collection”/Minimization Requirements

FISC and Section 702 Article III Lack of adversary process Cases and Controversies

Implications of Sec. 702 Privacy “Incidental collection” “Backdoor searches” Content Collection/Storage PRISM NSA program Privacy Internet/Cloud Computing

Leaked Information

NSA Reform “Rogue Agency” NSA Surveillance Programs Metadata (Section 215) PRISM/Electronic Content Collection (Section 702) Project Bullrun