Everything you ever wanted to know about National Security Letters… But were afraid to ask.

Slides:



Advertisements
Similar presentations
PRIVACY ACT OF 1974 OVERVIEW. FAIR INFORMATION PRACTICES The Privacy Act is primarily concerned with fair information practices. The Privacy Act is primarily.
Advertisements

WHAT IS HIPAA? The Health Insurance Portability and Accountability Act of 1996 (HIPAA) provides certain protections for any of your health information.
PRIVACY BREACHES A “breach of the security of the system”: –Is the “unauthorized acquisition of computerized data that compromises the security, confidentiality,
1 Office of the General Counsel FERPA  Family Educational Rights and Privacy Act (20 U.S.C § 1232g)
THE LEGISLATIVE PROCESS
Passed by the Senate 98-1 Passed by the House October 26, 2001 – Signed into law by President Bush 130 pages in length Divided into 10 titles.
The USA PATRIOT Act By Alex Braeuer, KyoungEun Jeong, Judith Martin, Gisela Torrenti.
The PATRIOT Act, Technology and Records Privacy David L. Sobel General Counsel Electronic Privacy Information Center ECURE 2004 Arizona.
1 The Patriot Act After 9/11 Attorney General John Ashcroft recommended a series of laws to fight terrorism. George Bush signed this Act into law in Oct.
USA PATRIOT Act and Libraries Eric Johnson & Rodney Clare Jackman Sims Memorial Library.
Law Librarians & Government Advocacy: The USA PATRIOT Act and Beyond Leah Sandwell-Weiss Rogers College of Law The University of Arizona.
Patriot Act October 26, United (and) Strengthening America (by) Providing appropriate tools required (to) intercept (and) obstruct Terrorism Act.
Chapter 17 Law and Terrorism.
The PATRIOT Act and Libraries Abby A. Goodrum April 15th, 2005.
Effects of Counterterrorism Legislation post 09/11 James J. Clements Honors Colloquium May 3 rd, 2007.
Lawrence Kerr December 5,  Overview  Background  Foreign Intelligence Surveillance Act (FISA)  USA PARTRIOT Act  Proposed changes  FISA Improvements.
Electronic Privacy Does it exist?. Issue: Privacy concerns with library and bookseller records continue due to the reauthorization of Section 215. The.
Right to Privacy: The Unwritten Right
USA PATRIOT ACT USA PATRIOT ACT
Chapter 15 Counter-terrorism. Introduction  United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Data Retention LIS 550 Winter 2010 Unsworth Tuesday, March 02, 2010.
Chapter 7: The Judicial Branch
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
Allows FBI to request (from FISA court judges) access to certain business records, including Common carriers (airlines, bus companies, and others in the.
Law and Terrorism “The laws will thus not be silent in time of war, but they will speak with a somewhat different voice.” Chief Justice Rehnquist.
Newsgathering: Access to Meetings & Records. Access and the First Amendment How has the U.S. Supreme Court responded to claims that the First Amendment.
P A R T P A R T Regulation of Business Administrative Agencies The Federal Trade Commission Act and Consumer Protection Laws Antitrust: The Sherman Act.
An Educational Computer Based Training Program CBTCBT.
The Patriot Act Protecting the US or Violating People’s Freedoms.
Forum IIIB Group 7 Open Access to Personal Information Introduction- Steve Ayers Pros- Michelle Peterson Cons- Christie Christman Conclusion- Audrey Clausen.
Last Topic - Constitutions of United States and its silent Features Silent Features 1.Preamble 2. Introduction and Evolution 3. Sources 4. Significance.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Public Records Overview and Case Update: September 11, 2015 presentation Patricia Gleason Special Counsel for Open Government.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
Public Review Committee Linda Sullivan-Colglazier Assistant Attorney General July 28, 2011.
FERPA & Record Keeping Bob Lichtenstein, Education Consultant Connecticut State Department of Education October, 2005.
The USA PATRIOT Act An Overstatement of ALA Concerns?
Class Name, Instructor Name Date, Semester Comparative Criminal Justice Systems / 6 th edition Chapter 3: An American Perspective on Criminal Law.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 ADMINISTRATIVE LAW AND REGULATORY AGENCIES © 2010 Pearson Education, Inc., publishing as.
Expository Essays. Introduction Paragraph and Thesis  Your introductory paragraph must always have a clear, efficient and firm thesis as the first sentence.
Random Fact of the Day  Original Bubble Gum is pink because Walter Deimer, a Fleer employee, had only pink coloring left when he mixed up his first successful.
HIPAA Vs. Family Educational Rights and Privacy Act (FERPA) How do these laws impact Educational Settings?
The USA PATRIOT Act “Those that can give up liberty to obtain a little temporary safety deserve neither liberty nor safety” – Benjamin Franklin.
Healthcare Privacy and Security After September 11 The HIPAA Colloquium At Harvard University August 20, 2002 Presented by: Lauren Steinfeld Privacy Consultant,
Aim: To what extent does the Patriot Act violate civil liberties? Do Now: Using your cell phone, take the following poll. “Of the 10 civil liberties guaranteed.
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
HIPAA Overview Why do we need a federal rule on privacy? Privacy is a fundamental right Privacy can be defined as the ability of the individual to determine.
FERPA for the Financial Aid Office NCASFAA Fall Conference November 2012.
Warrantless Wiretapping Sara Rudman Julie Sugarman Louise Matthiesen.
PRESIDENT OBAMA’S IMMIGRATION ANNOUNCEMENT UPDATED MARCH 12, 2015.
STUDENT RIGHTS MINI-WRITE On a half sheet of paper write at least two paragraphs on the following questions: What rights do you have when you come to school?
HIPAA Privacy What Every Staff Member Needs to Know.
Constitution Day 9/17/2012 We the People of the United States, in Order to form a more perfect Union…
Ruqayya Y Khan, Trinity University
Bellwork Think about this…. Historical Event
Chapter 7 Section 1 (pgs ) Equal Justice under the Law
Tomball Independent School District Annual Confidentiality Training
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
GUKEYEH GUK’EH GU’SANI Kaska Dena Good Governance Act
The Constitution is Signed
United States Constitution
United States Constitution
Freedom of Information Act
Government Data Practices & Open Meeting Law Overview
Government Data Practices & Open Meeting Law Overview
Bill of Rights Chapter 10.
Patron Privacy in the Library
Constitutional Framework
Presentation transcript:

Everything you ever wanted to know about National Security Letters… But were afraid to ask.

A Historical Background

What is a National Security Letter? From FBI website: “A letter request for information from a third party that is issued by the FBI or by other government agencies with authority to conduct national security investigations.”

And…  There is a nondisclosure, or “gag” order attached  An NSL requires no judicial oversight

The Birth of National Security Letters 1986 Amendment to the Right to Financial Privacy Act (RFPA) Allows the FBI to obtain financial records and personal information without advance notice as a part of terrorism or espionage investigations

Increased Legal Authority for NSLs Electronic Communications Privacy Act (ECPA) Telephone, , billing records, and subscriber information Amendment to the Fair Credit Reporting Act (FCRA) Consumer Credit History Information

USA Patriot Act Passed October 2001 Meant to expand resources in identifying threats to national security Entities considered “relevant” can be investigated Approval authority of NSLs decentralized

Constitutionality of NSLs Challenged in Court  Doe v. Ashcroft  Doe v. Gonzales Violates 1 st and 4 th Amendment Rights

In the meantime…  Patriot Act up for renewal  USA Patriot Act Improvement and Reauthorization Act of 2005  Clarifies: 1. NSL recipient may disclose receipt when seeking legal counsel 2. Non-disclosure order does not automatically attach to NSL 3. Judicial review of non-disclosure requirement accompanying NSL

Does go to a Higher Court May 2006  Judge Cardamone writes concurring opinion: “a ban on speech does not fit comfortably with the fundamental rights guaranteed American citizens.” The U.S. 2nd Court of Appeals hears Doe v. Ashcroft and Doe v. Gonzales Returned to lower courts due to revisions made to the Patriot Act earlier in the year

The Department of Justice Gets Involved As a part of the Patriot Act Reauthorization the Office of the Inspector General is required to investigate the use of NSLs March 2007 report states that the FBI violated regulations in use of National Security Letter authority

ALA on NSLs  NSLs violate 1st Amendment Rights ALA is against government suppression of the right to intellectual freedom Urges Congress to enact greater oversight of NSL usage and eliminate “gag” order provision

Library Action!  Educate community  Destroy internet access logs daily  Post privacy-loss warning signs What will you do to protect your freedom?

National Security Letters in Foreign Intelligence Investigations: Comparison of National Security Attributes  Addressees and Certifying Officials  Purpose, Standards, and Information Covered  Confidentiality  Judicial Review  Dissemination  Liability, Fees, and Oversight

Department of Justice Inspector General’s Report  Review NSL issuance , and  100 FBI employees from headquarters and 50 FBI employees from national field offices interviewed  Examined FBI’s NSL tracking database

Department of Justice Inspector General’s Report  NSLs reported by FBI (by year):  2000: 8,500 NSLs  2003: 39,000 NSLs  2004: 56,000 NSLs  2005: 47,000 NSLs The Inspector General found these numbers to be flawed:  Inaccurate information in database  Information not entered consistently into database  Some information from the database was missing

Department of Justice Inspector General’s Report Errors were made because:  FBI gathered incorrect information  Gathered some information without a NSL  Mistakes in letters, causing confusion Violations:  Improper authorization of NSLs  Improper requests of information  Unauthorized collections of information

Department of Justice Inspector General’s Report Recommendations  Create control files for signed copies of letters  Improve NSL database  Better guidance over issuance of NSLs from FBI field offices  Tagging of information from NSL requests-learn how and when the information is used in criminal proceedings

FBI’s Response to Inspector General’s Report  NSLs valuable after 9/11 as an investigative tool  Director Robert S. Mueller has ordered corrective measures to be taken  Stronger internal controls  Improve oversight of NSL approvals  Expedited inspection

“Library Group Tells of A Gag Order by the FBI”  Library Connection-central computer system in Hartford, Connecticut  American Civil Liberties Union (ACLU) v. Gonzales  Originally filed as Doe v. Gonzales  Peter Chase (Library Connection Vice President of Board of Directors): “John Doe”  Other Library Connection members: George M. Christian, Barbara Bailey, Janet Nocek

ALA’s Resolution on the Use and Abuse of National Security Letters  ALA’s stance  Want to protect privacy rights of patrons and employees  Believe free thought should be protected  Resolutions  Condemns use of NSLs for obtaining library records  Wants Congress to propose protective reforms

National Security Letters Reform Act of 2007  Introduced to the House of Representatives by Rep. Jerrold Nadler (NY) on July 26, 2007  Proposes several procedural protections for NSLs  The act was referred to the Subcommittee on the Constitution, Civil Rights, and Civil Liberties on September 10, 2007

Your privacy is at risk.  You don’t have to be connected to a terrorist investigation to have an FBI file.  Your records can be retained indefinitely.  Your information can be shared within the government and with private businesses.

There are no checks and balances.

If you’re issued one, you can’t talk about it.  Recipients cannot disclose the fact that they have received an NSL or discuss it with anyone other than a lawyer.  Library Connection members were not even allowed to attend their own court case anonymously because of the gag order.

They’re easy to misuse.  Justice Department audit found numerous misuses of NSLs.  FBI internal audit found more than 1,000 instances of misuse.  Businesses are not allowed to challenge NSLs for at least 1 year.  The FBI has been compensating phone companies for access to records.

And the data is easy to misinterpret.

How are libraries affected?  Library Connection court case  ALA’s Resolution on the Use and Abuse of National Security Letters

But don’t worry, it’s not all bad news.  In September 2007, a federal judge ruled that NSLs were unconstitutional.  National Security Letters Reform Act of 2007 has been proposed.

“They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.” -Benjamin Franklin