Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Patriot Act

Appeals Court Limits Military Surveillance of Civilian Internet Use

“The U.S. Court of Appeals for the Ninth Circuit ruled in United States v. Dreyer that an agent for the Naval Criminal Investigative Service violated Defense Department regulations and the Posse Comitatus Act when he conducted a surveillance operation in Washington state to identify civilians who might be sharing illegal files. The 1878 Act prevents the U.S. military from enforcing laws against civilians. The appeals court ruled that the NCIS intrusion into civilian networks showed “a profound lack of regard for the important limitations on the role of the military in our civilian society.” The court also ruled that the evidence obtained by NCIS should be suppressed to “deter future violations.” In a petition to the Supreme Court, EPIC challenged the NSA’s surveillance of domestic communications. The NSA is a component of the Department of Defense. For more information, see In re EPIC and EPIC v. DOJ: Warrantless Wiretapping Program.”

 

The Evolution of US Government Restrictions on Using and Exporting Encryption Technologies

CIA approved for release 9/12/2014 – redacted: The Evolution of US Government Restrictions on Using and Exporting Encryption Technologies, Michael Schwartzbeck. “In the last year, several academic, commercial, and free speech advocates have seriously jeopardized the US government’s legal right to control encryption.”

FBI Says Biometric Database has Reached “Full Operational Capability”

“The FBI announced that the Next Generation Identification system, one of the largest biometric databases in the world, has reached “full operational capability.” In 2013, EPIC filed a Freedom of Information Act lawsuit about the NGI program. EPIC obtained documents that revealed an acceptance of a 20% error rate in facial recognition searches. Earlier this year, EPIC joined a coalition ofContinue Reading

Treasure Map: The NSA Breach of Telekom and Other German Firms

Spiegel Online - Andy Müller-Maguhn, Laura Poitras, Marcel Rosenbach and Michael Sontheimer:  [Treaure Map] “is the mandate for a massive raid on the digital world. It aims to map the Internet, and not just the large traffic channels, such as telecommunications cables. It also seeks to identify the devices across which our data flows, so-called routers. Furthermore, every single endContinue Reading

EPIC (Finally) Obtains Memos on Warrantless Wiretapping Program

“More than eight years after filing a Freedom of Information Act request for the legal justification behind the “Warrantless Wiretapping” program of President Bush, EPIC has now obtained a mostly unredacted version of two key memos (OLC54)and (OLC85) by former Justice Department official Jack Goldsmith. EPIC requested these memos just four hours after the New York Times broke the story about theContinue Reading

Newly Revealed NSA Program ICREACH Extends the NSA’s Reach Even Further

EFF:  Turns out, the DEA and FBI may know what medical conditions you have, whether you are having an affair, where you were last night, and more—all without any knowing that you have ever broken a law. That’s because the DEA and FBI, as part of over 1000 analysts at 23 U.S. intelligence agencies, have the abilityContinue Reading

The executive order that led to mass spying, as told by NSA alumni

Cyrus Farivar - Ars Technica: [Executive Order] 12333 is used to target foreigners abroad, and collection happens outside the US,” whistleblower John Tye, a former State Department official, told Ars recently. “My complaint is not that they’re using it to target Americans, my complaint is that the volume of incidental collection on US persons is unconstitutional.” The document, known inContinue Reading

Investigative Report – NSA created ‘google-like search’ engine – shared access with other agencies

“Data available through ICREACH appears to be primarily derived from surveillance of foreigners’ communications, and planning documents show that it draws on a variety of different sources of data maintained by the NSA. Though one 2010 internal paper clearly calls it “the ICREACH database,” a U.S. official familiar with the system disputed that, telling The Intercept that while “itContinue Reading

Newly Declassified Documents Regarding Now-Discontinued NSA Bulk Electronic Communications Metadata

ODNI: “Following a declassification review by the Executive Branch, the Department of Justice released on August 6, 2014, in redacted form, 38 documents relating to the now-discontinued NSA program [scroll down the page to locate the links] to collect bulk electronic communications metadata pursuant to Section 402 of the FISA (“PRTT provision”).  These documents are also responsiveContinue Reading

Extensive interview of Edward Snowden – Wired

James Bamford, via Wired: “..Snowden will continue to haunt the US, the unpredictable impact of his actions resonating at home and around the world. The documents themselves, however, are out of his control. Snowden no longer has access to them; he says he didn’t bring them with him to Russia. Copies are now in the handsContinue Reading

NSA’s Internet Metadata Program Was Sharply Criticized By FISA Judges – EPIC

“Documents Obtained by EPIC Lawsuit Show NSA’s Internet Metadata Program Was Sharply Criticized By FISA Judges While Congressional Oversight Lagged for Year: In a FOIA lawsuit against the Department of Justice, EPIC has obtained many documents about the NSA’s Internet Metadata program. These include the Government’s original FISA application seeking authorization to collect data from millions of e-mails, as wellContinue Reading

Barack Obama’s Secret Terrorist-Tracking System, by the Numbers

Jeremy Scahill and Ryan Devereaux - The Intercept “Nearly half of the people on the U.S. government’s widely shared database of terrorist suspects are not connected to any known terrorist group, according to classified government documents obtained by The Intercept. Of the 680,000 people caught up in the government’s Terrorist Screening Database—a watchlist of “known or suspected terrorists” that is shared withContinue Reading