Thursday, January 29, 2015

Surveillance on Americans is Illegal

EFF’s Game Plan for Ending Global Mass Surveillance, Posted on January 28, 2015 Written by eff.org

We have a prob­lem when it comes to stop­ping mass surveillance.The entity that’s con­duct­ing the most extreme and far-reaching sur­veil­lance against most of the world’s communications—the National Secu­rity Agency—is bound by United States law.

That’s good news for Amer­i­cans. U.S. law and the Con­sti­tu­tion pro­tect Amer­i­can cit­i­zens and legal res­i­dents from war­rant­less sur­veil­lance. That means we have a very strong legal case to chal­lenge mass sur­veil­lance con­ducted domes­ti­cally or that sweeps in Amer­i­cans’ communications.

Sim­i­larly, the United States Con­gress is elected by Amer­i­can vot­ers. That means Con­gres­sional rep­re­sen­ta­tives are beholden to the Amer­i­can peo­ple for their jobs, so pub­lic pres­sure from con­stituents can help influ­ence future laws that might check some of the NSA’s most egre­gious practices.

But what about every­one else? What about the 96% of the world’s pop­u­la­tion who are cit­i­zens of other coun­tries, liv­ing out­side U.S. bor­ders. They don’t get a vote in Con­gress. And cur­rent Amer­i­can legal pro­tec­tions gen­er­ally only pro­tect cit­i­zens, legal res­i­dents, or those phys­i­cally located within the United States. So what can EFF do to pro­tect the bil­lions of peo­ple out­side the United States who are vic­tims of the NSA’s spying?

For years, we’ve been work­ing on a strat­egy to end mass sur­veil­lance of dig­i­tal com­mu­ni­ca­tions of inno­cent peo­ple world­wide. Today we’re lay­ing out the plan, so you can under­stand how all the pieces fit together—that is, how U.S. advo­cacy and pol­icy efforts con­nect to the inter­na­tional fight and vice versa. Decide for your­self where you can get involved to make the biggest difference.

This plan isn’t for the next two weeks or three months. It’s a multi-year bat­tle that may need to be revised many times as we bet­ter under­stand the tools and author­i­ties of enti­ties engaged in mass sur­veil­lance and as more dis­clo­sures by whistle­blow­ers help shine light on sur­veil­lance abuses.

If you’d like an overview of how U.S. sur­veil­lance law works, check out our adden­dum.

Intro: Mass Sur­veil­lance by NSA, GCHQ and Others

The National Secu­rity Agency is work­ing to col­lect as much as pos­si­ble about the dig­i­tal lives of peo­ple world­wide. As the Wash­ing­ton Post reported, a for­mer senior U.S. intel­li­gence offi­cial char­ac­ter­ized for­mer NSA Direc­tor Gen. Keith Alexander’s approach to sur­veil­lance as “Col­lect it all, tag it, store it… And what­ever it is you want, you go search­ing for it.”

The NSA can’t do this alone. It relies on a net­work of inter­na­tional part­ners who help col­lect infor­ma­tion world­wide, espe­cially the intel­li­gence agen­cies of Aus­tralia, Canada, New Zealand, and the United King­dom (col­lec­tively known, along with the United States, as the “Five Eyes.”) In addi­tion, the United States has rela­tion­ships (includ­ing var­i­ous lev­els of intel­li­gence data shar­ing and assis­tance) with Bel­gium, Den­mark, France, Ger­many, Israel, Italy, Japan, the Nether­lands, Nor­way, Sin­ga­pore, Spain, South Korea, Swe­den, and poten­tially a num­ber of other coun­tries world­wide. There are also other countries—like Rus­sia, China, and others—engaging in sur­veil­lance of dig­i­tal com­mu­ni­ca­tions with­out shar­ing that data with the NSA. Some of those gov­ern­ments, includ­ing the U.S. gov­ern­ment, are spend­ing bil­lions of dol­lars to develop spy­ing capa­bil­i­ties that they use aggres­sively against inno­cent peo­ple around the world. Some of them may do so with even less over­sight and even fewer legal restrictions.

Although whistle­blow­ers and jour­nal­ists have focused atten­tion on the stag­ger­ing pow­ers and ambi­tions of the likes of the NSA and GCHQ, we should never assume that other gov­ern­ments lack the desire to join them. Agen­cies every­where are hun­gry for our data and work­ing to expand their reach. Read about inter­na­tional sur­veil­lance law reform and fight­ing back through user-side encryp­tion.

We focus here on the NSA because we know the most about its activ­i­ties and we have the most legal and polit­i­cal tools for hold­ing it to account. Of course, we need to know much more about sur­veil­lance prac­tices of other agen­cies in the U.S. and abroad and expand our work together with our part­ners around the world to con­front sur­veil­lance as a world­wide epidemic.

Mass sur­veil­lance is facil­i­tated by tech­nol­ogy com­pa­nies, espe­cially large ones. These com­pa­nies often have insuf­fi­cient or even sloppy secu­rity prac­tices that make mass sur­veil­lance eas­ier, and in some cases may be actively assist­ing the NSA in sweep­ing up data on hun­dreds of mil­lions of peo­ple (for exam­ple, AT&T). In other cases, tech com­pa­nies may be legally com­pelled to pro­vide access to their servers to the NSA (or they may choose to fight that access). Read more about how tech com­pa­nies can harden their sys­tems against sur­veil­lance.

The NSA relies on sev­eral laws as well as a pres­i­den­tial order to jus­tify its con­tin­ued mass sur­veil­lance. Laws passed by Con­gress as well as orders from the U.S. Pres­i­dent can cur­tail sur­veil­lance by the NSA, and the Supreme Court of the United States also has author­ity to put the brakes on surveillance.

The Game Plan

Given that the Amer­i­can legal sys­tem doesn’t ade­quately pro­tect the rights of peo­ple over­seas, what can we do in the imme­di­ate future to pro­tect Inter­net users who may not be Americans?

Here’s the game plan for right now. Note that these are not con­sec­u­tive steps; we’re work­ing on them concurrently.

1.  Pres­sure tech­nol­ogy com­pa­nies to harden their sys­tems against NSA surveillance

To date, there are unan­swered ques­tions about the degree to which U.S. tech­nol­ogy com­pa­nies are actively assist­ing the NSA.

In some cases, we know that tech com­pa­nies are doing a lot to help the NSA get access to data. AT&T is a clear exam­ple of this. Thanks to whistle­blower evi­dence, we know AT&T has a secret room at its Fol­som Street facil­ity in San Fran­cisco where a fiber optic split­ter cre­ates a copy of the Inter­net traf­fic that passes through AT&T’s net­works. That split­ter routes data directly to the NSA.

Some com­pa­nies have taken things a step fur­ther and delib­er­ately weak­ened or sab­o­taged their own prod­ucts to “enable” NSA spy­ing. We don’t know who’s done this or what they’ve done, but the NSA doc­u­ments make clear that it’s hap­pen­ing. It’s the height of betrayal of the pub­lic, and it could con­ceiv­ably be tak­ing place with the help even of some com­pa­nies that are loudly com­plain­ing about gov­ern­ment spying.

So what do we know about major tech com­pa­nies, like Google, Face­book, Yahoo, and Microsoft? Here we have mixed reports. Doc­u­ments pro­vided by Edward Snow­den and pub­lished in the Guardian and the Wash­ing­ton Post name nine U.S. companies—Microsoft, Yahoo, Google, Face­book, PalTalk, AOL, Skype, YouTube, and Apple—as par­tic­i­pants in the NSA’s PRISM pro­gram. The doc­u­ments indi­cate that the NSA has access to servers at each of these com­pa­nies, and implies that these com­pa­nies are com­plicit in the sur­veil­lance of their users.

The com­pa­nies, in turn, have strongly denied these alle­ga­tions, and have even formed alobby group call­ing on gov­ern­ments to “limit sur­veil­lance to spe­cific, known users for law­ful pur­poses, and should not under­take bulk data col­lec­tion of Inter­net communications.”

While a start, that’s a far cry from the role com­pa­nies could be play­ing. Tech com­pa­nies also have the abil­ity to harden their sys­tems to make mass sur­veil­lance more dif­fi­cult, and to roll out fea­tures that allow users to eas­ily encrypt their com­mu­ni­ca­tions so that they are so com­pletely secure that even their ser­vice providers can’t read them. Per­haps most impor­tantly, tech­nol­ogy com­pa­nies must cat­e­gor­i­cally resist attempts to insert back­doors into their hard­ware or software.

There’s also an impor­tant legal issue that can’t be ignored. Tech com­pa­nies are in a unique posi­tion to know about sur­veil­lance requests that are kept secret from the press and the pub­lic. These com­pa­nies may have the best chance to fight back on behalf of their users in court (as Yahoo has done).

What’s more, tech com­pa­nies lit­er­ally spend mil­lions of dol­lars to lobby for laws in Wash­ing­ton and enjoy incred­i­ble access to and influ­ence over U.S. law­mak­ers. Often, com­pa­nies spend that money try­ing to derail poten­tial reg­u­la­tion. Instead, these com­pa­nies could be heav­ily pri­or­i­tiz­ing pos­i­tive sur­veil­lance reform bills.

So how do we get tech com­pa­nies to start fight­ing sur­veil­lance in court, hard­en­ing their sys­tems against sur­veil­lance, push­ing back against the admin­is­tra­tion, and lob­by­ing for real reform? We’re focused on transparency—uncovering every­thing we can about the degree to which big tech com­pa­nies are actively help­ing the government—and pub­lic pres­sure. That means high­light­ing ways that com­pa­nies are fight­ing sur­veil­lance and call­ing out com­pa­nies that fail to stand up for user privacy.

It’s why we’re proud to sup­port the Reset the Net cam­paign, designed to get com­pa­nies big and small to take steps to pro­tect user data. It’s also why we’re work­ing to make what com­pa­nies do and don’t do in this area more vis­i­ble. Cam­paigns like HTTPS Every­where and our work on email trans­port encryp­tion, as well as score­cards like Who Has Your Back are designed to poke and prod these com­pa­nies to do more to pro­tect all their users, and get them to pub­licly com­mit to steps that the pub­lic can objec­tively check.

We also need to cul­ti­vate a sense of respon­si­bil­ity on the part of all those who are build­ing prod­ucts to which the pub­lic entrusts its most sen­si­tive and pri­vate data. The peo­ple who cre­ate our com­put­ing devices, net­work equip­ment, soft­ware envi­ron­ments, and so on, need to be very clear about their respon­si­bil­ity to the users who have cho­sen to trust them. They need to refuse to cre­ate back­doors and they need to fix any exist­ing back­doors they become aware of. And they need to under­stand that they them­selves, unfor­tu­nately, are going to be tar­gets for gov­ern­ments that will try to pen­e­trate, sub­vert, and coerce the tech­nol­ogy world in order to expand their spy­ing capa­bil­i­ties. They have a grave respon­si­bil­ity to users world­wide and we must use pub­lic pres­sure to ensure they live up to that responsibility.

2. Cre­ate a global move­ment that encour­ages user-side encryption

Get­ting tech giants to safe­guard our dig­i­tal lives and chang­ing laws and poli­cies might be slow going, but any­body could start using encryp­tion in a mat­ter of min­utes. From encrypted chat to encrypted email, from secure web brows­ing to secure doc­u­ment trans­fers, encryp­tion is a pow­er­ful way to make mass sur­veil­lance sig­nif­i­cantly more difficult.

How­ever, encryp­tion can be tricky, espe­cially if you don’t have a team of engi­neers to walk you through it the way we do at EFF. With that in mind, we’ve cre­ated Sur­veil­lance Self Defense, an in-depth resource that explains encryp­tion to folks who may want to safe­guard their data but have lit­tle or no idea how to do it.

We’ve already trans­lated the mate­ri­als into Span­ish and Ara­bic, and we’re work­ing on even more translations

We’ll con­tinue to expand these mate­ri­als and trans­late them into as many lan­guages as pos­si­ble, while also doing a pub­lic cam­paign to make sure as many peo­ple as pos­si­ble read them.

Again, the more peo­ple world­wide under­stand the threat and the more they under­stand how to pro­tect themselves—and just as impor­tantly, what they should expect in the way of sup­port from com­pa­nies and governments—the more we can agi­tate for the changes we need online to fend off the drag­net col­lec­tion of data.

3. Encour­age the cre­ation of secure com­mu­ni­ca­tion tools that are eas­ier to use

Many of the tools that are using secu­rity best prac­tices are, frankly, hard to use for every­day peo­ple. The ones that are eas­i­est to use often don’t adopt the secu­rity prac­tices that make them resilient to surveillance.

We want to see this prob­lem fixed so that peo­ple don’t have to trade usabil­ity for secu­rity. We’re rolling out a multi-stage Cam­paign for Secure and Usable Crypto, and we kicked it off with a Secure Mes­sag­ing Score­card. The Secure Mes­sag­ing Score­card is only look­ing at a few cri­te­ria for secu­rity, and the next phases of the project will home in on more chal­leng­ing secu­rity and usabil­ity objectives.

The goal? Encour­ag­ing the devel­op­ment of new tech­nolo­gies that will be secure and easy for every­day peo­ple to use, while also push­ing big­ger com­pa­nies to adopt secu­rity best practices.

4. Reform Exec­u­tive Order 12333

Most peo­ple haven’t even heard of it, but Exec­u­tive Order 12333 is the pri­mary author­ity the NSA uses to engage in the sur­veil­lance of peo­ple out­side the U.S. While Con­gress is con­sid­er­ing much-needed reforms to the Patriot Act, there’s been almost no debate about Exec­u­tive Order 12333.

This exec­u­tive order was cre­ated by a stroke of the pen from Pres­i­dent Ronald Rea­gan in 1981. Pres­i­dent Obama could undo the worst parts of this exec­u­tive order just as eas­ily, by issu­ing a pres­i­den­tial order ban­ning mass sur­veil­lance of peo­ple regard­less of their nationality.

We’ve already launched the first phase of our cam­paign to reform Exec­u­tive Order 12333.

5. Develop guid­ing legal prin­ci­ples around sur­veil­lance and pri­vacy with the help of schol­ars and legal experts worldwide

The cam­paign got started well before the Snow­den leaks began. It began with a rig­or­ous pol­icy doc­u­ment called the Inter­na­tional Prin­ci­ples on the Appli­ca­tion of Human Rights to Com­mu­ni­ca­tions Sur­veil­lance, which fea­tures 13 guid­ing prin­ci­ples about lim­it­ing sur­veil­lance. Writ­ten by aca­d­e­mics and legal experts from across the globe, the prin­ci­ples have now been endorsed by over 417 NGOs and 350,000 indi­vid­u­als world­wide, and have been the basis for a pro-privacy res­o­lu­tion suc­cess­fully passed by the United Nations.

The 13 Prin­ci­ples, as they’re also known, are also meant to work both locally and glob­ally. By giv­ing politi­cians and activists the con­text for why mass sur­veil­lance is a vio­la­tion of estab­lished inter­na­tional human rights law, they make it clear that legal­iz­ing mass surveillance—a path pro­moted by the Five Eyes countries—is the wrong way for­ward. The 13 Prin­ci­ples are our way of mak­ing sure that the global norm for human rights in the con­text of com­mu­ni­ca­tion sur­veil­lance isn’t the warped view­point of NSA and its four clos­est allies, but that of 50 years of human rights stan­dards show­ing mass sur­veil­lance to be unnec­es­sary and disproportionate.

6. Cul­ti­vate part­ners world­wide who can cham­pion sur­veil­lance reform on the local level, and offer them sup­port and promotion

Katitza Rodriguez, EFF’s Inter­na­tional Rights Direc­tor, is rarely in our San Fran­cisco office. That’s because the major­ity of her time is spent trav­el­ing from coun­try to coun­try, meet­ing with advo­cacy groups on the ground through­out Latin Amer­ica and parts of Europe to fight for sur­veil­lance law reform. Katitza and the rest of EFF’s inter­na­tional team assist these groups in work­ing to build country-specific plans to end mass sur­veil­lance at home and abroad.

The goal is to engage activists and lawyers world­wide who can use the 13 Prin­ci­ples and the legal analy­ses we’ve pre­pared to sup­port them at the national level to fight against the on-going trend of increased sur­veil­lance pow­ers. For exam­ple, we teamed up with activists in Aus­tralia, Mex­ico, and Paraguay to help fight data reten­tion man­dates in those coun­tries, includ­ing speak­ing in the Paraguayan National Congress.

EFF is espe­cially focused on coun­tries that are known to share intel­li­gence data with the United States and on try­ing to under­stand the pol­i­tics of sur­veil­lance behind those data shar­ing agree­ments and sur­veil­lance law proposals.

We’ve been shar­ing with and learn­ing from groups across the world a range of dif­fer­ent tac­tics, strate­gies, and legal meth­ods that can be help­ful in uncov­er­ing and com­bat­ing unchecked sur­veil­lance. Our part­ners are start­ing to develop their own national sur­veil­lance law strate­gies, work­ing out a local­ized ver­sion of the Who Has Your Back cam­paign, eval­u­at­ing strate­gic lit­i­ga­tion, and edu­cat­ing the gen­eral pub­lic of the dan­ger of mass surveillance.

In cer­tain locales, these bat­tles are polit­i­cally and socially dif­fi­cult, in par­tic­u­lar in places where a cul­ture of fear has per­me­ated the soci­ety. We’ve seen anti-surveillance advo­cates wrongly painted as allies of pedophiles or ter­ror­ists. In at least one of the coun­tries we’re work­ing in, anonymity is for­bid­den in its con­sti­tu­tion. For some of our part­ners, pro­mot­ing a ratio­nal debate about check­ing gov­ern­ment power abuses can risk their very free­dom, with activists fac­ing jail time or even more seri­ous con­se­quences for speak­ing out.

Estab­lish­ing a bottom-up counter-surveillance law movement—even if it’s one based on com­mon sense and the entire his­tory of mod­ern democracies—isn’t easy. It’s a titanic task that needs the involve­ment of advo­cates around the world with dif­fer­ent tac­tics and strate­gies that are com­ple­men­tary. This is why we’ve also been work­ing to make con­nec­tions between activists in dif­fer­ent coun­tries, with case stud­ies like the Counter-Surveillance Suc­cess Sto­ries, and high­light­ing indi­vid­u­als who are proud to stand up and say “I Fight Sur­veil­lance.” We’re also team­ing up with part­ners, such as Panop­tykon Foun­da­tion, to share the strate­gies and tac­tics they used in Europe with local groups in Latin Amer­ica and vice-versa. We’re work­ing closely with groups in the Mid­dle East and North Africa, such as 7iber and SMEX, to track, report on, and coor­di­nate responses to state sur­veil­lance in these regions.

All of this has helped inform the work we’ve done in venues like the United Nations, theOffice of the High Com­mis­sioner on Human Rights, and the Inter-American Com­mis­sion on Human Rights, where EFF and our allies are helping—with great success—the legal minds there wrap their heads around this new age of state vio­la­tions of the right to pri­vacy and free expression.

Mean­while, back in Washington…

7. Stop NSA over­reach through impact lit­i­ga­tion and new U.S. laws

Exec­u­tive Order 12333 may be the pres­i­den­tial com­mand that sets the agenda for mass sur­veil­lance, but U.S. law also plays a huge role. The NSA claims (often wrongly) that cer­tain U.S. laws allow sur­veil­lance of all Inter­net users, with almost zero over­sight of its spy­ing on non-U.S. per­sons. There’s the FISA Amend­ments Act, which the NSA believes allows it to spy on groups of peo­ple instead of with directed war­rants and scoop up all of the Inter­net traf­fic it can, and grants it carte blanche to tar­get any­one over­seas on the grounds that they are poten­tially rel­e­vant to America’s “for­eign inter­ests.” And then there’s the Patriot Act, which has been loosely inter­preted by the NSA to per­mit the drag­net sur­veil­lance of phone records.

Fight­ing these laws is the bread and but­ter of our domes­tic legal team. Our law­suits, likeJewel v. NSA, aim to demon­strate that war­rant­less sur­veil­lance is ille­gal and uncon­sti­tu­tional. Our grass­roots advo­cacy is ded­i­cated to show­ing Amer­i­can law­mak­ers exactly how U.S. law is bro­ken, what must be done to fix it, and the pow­er­ful move­ment of peo­ple work­ing for change.

You can read more details about Amer­i­can law in our adden­dum below, but here’s the upshot: we have to fix the law if we’re to stop these secret agen­cies spy­ing on the world. And we have to make sure that no new tricks are being planned.

That means chip­ping away at the cul­ture of secrecy that lies at the heart of this mess.

8. Bring trans­parency to sur­veil­lance laws and practices

One of the great­est chal­lenges we face in attempt­ing to end mass sur­veil­lance is that we don’t know what we don’t know. Thanks to whistle­blower evi­dence, state­ments by cer­tain pub­lic offi­cials, and years of aggres­sive lit­i­ga­tion under the Free­dom of Infor­ma­tion Act, we’ve con­firmed that the NSA is engaged in mass sur­veil­lance of our com­mu­ni­ca­tions and that it is pri­mar­ily rely­ing on three legal author­i­ties to jus­tify this surveillance.

But what if the NSA is rely­ing on seven other legal author­i­ties? What if there are other forms of sur­veil­lance we have not yet heard about? What if the NSA is part­ner­ing with other enti­ties (dif­fer­ent coun­tries or dif­fer­ent branches of the U.S. gov­ern­ment) to col­lect data in ways we can’t imagine?

It’s extremely dif­fi­cult to reform the world of sur­veil­lance when we don’t have a full pic­ture of what the gov­ern­ment is doing and how it’s legally jus­ti­fy­ing those actions.

With that in mind, we are work­ing to fight for more trans­parency by:

  • Work­ing to reform the bro­ken clas­si­fi­ca­tion sys­tem, which keeps the government’s actions hid­den from pub­lic oversight.
  • Using Free­dom of Infor­ma­tion Act requests and law­suits to gain access to gov­ern­ment doc­u­ments that detail sur­veil­lance prac­tices (and their legal justifications).
  • Help­ing allies, like Ger­many and Brazil, to put pres­sure on the United States to jus­tify its sur­veil­lance practices.
  • Edu­cat­ing peo­ple about the value of whistle­blow­ers and the impor­tant role they play in com­bat­ing secrecy. This includes advo­cacy for orga­ni­za­tions and plat­forms like Wik­ileaks that defend and pro­mote the work of whistle­blow­ers. It also includes high­light­ing the impor­tant con­tri­bu­tions pro­vided by whistle­blow­ers like Mark Klein, Bill Bin­ney, Thomas Drake, Edward Snow­den, and others.
    Global Solu­tions for a Global Problem
    Mass sur­veil­lance affects peo­ple world­wide, reach­ing every­where that the Inter­net reaches (and many places that it doesn’t!). But laws and court sys­tems are divvied up by juris­dic­tional lines that don’t make sense for the Inter­net today. This means we need a range of tac­tics that include impact lit­i­ga­tion, tech­no­log­i­cal solu­tions, and pol­icy changes both in the United States and across the globe.
    This game plan is designed to give you insight into how U.S. laws and poli­cies affect peo­ple world­wide, and how we can work to pro­tect peo­ple out­side of America’s borders.
    We’re up against more than just a few ele­ments in the Amer­i­can admin­is­tra­tion here. We’re up against a grow­ing despon­dency about dig­i­tal pri­vacy, and we’re up against the desire of spooks, auto­crats, and cor­po­ra­tions jock­ey­ing for intel­li­gence con­tracts in every nation, all of whom want to shore up these sur­veil­lance pow­ers for them­selves. But we work side-by-side with hun­dreds of other orga­ni­za­tions around the world and thou­sands of sup­port­ers in nearly every coun­try. We have the amaz­ing power of tech­nol­ogy to pro­tect pri­vacy, orga­nize oppo­si­tion, and speak up against such damn­ing vio­la­tions of human rights.
    We’re con­tin­u­ing to refine our plan, but we wanted to help our friends under­stand our think­ing so you can under­stand how each of our smaller cam­paigns fit into the ulti­mate objec­tive: secure, pri­vate com­mu­ni­ca­tions for peo­ple worldwide.
    It’s what we’re doing to fight sur­veil­lance. But what can you do?
    You can join your local dig­i­tal rights orga­ni­za­tion, of which there are now hun­dreds, in almost every nation (and if there isn’t one in yours, ask us for advice on start­ing one). You can pres­sure com­pa­nies to increase your pro­tec­tion against gov­ern­ment espi­onage and sup­port com­pa­nies that make a stand. You can sign our peti­tion about Exec­u­tive Order 12333 and help spread the word to oth­ers. You can use encryp­tion to pro­tect your­self and raise the cost of mass sur­veil­lance, and you can teach your friends and col­leagues to use it too. You can per­son­ally refuse to coop­er­ate with sur­veil­lance and pro­mote pri­vacy pro­tec­tions inside insti­tu­tions you’re a part of. You can tell your friends and col­leagues the real risks we are run­ning and how we can turn this mess around.
    And whether you’re in the United States or not, you can sup­port our plan by becom­ing a mem­ber of EFF.

Adden­dum: Laws & Pres­i­den­tial Orders We Need to Change


One of the best ways to end mass sur­veil­lance by the NSA is to change the United States law to make clear that war­rant­less sur­veil­lance is ille­gal. How­ever, that’s a lit­tle chal­leng­ing. The NSA is rely­ing on a patch­work of dif­fer­ent laws and exec­u­tive orders to jus­tify its sur­veil­lance powers.

Here are a few we know we need to change. Note that there are other parts of U.S. law that may need revi­sion (includ­ing pro­vi­sions such as the Pen Reg­is­ter Trap and Trace andNational Secu­rity Let­ters), but this is where we’re focus­ing our ener­gies cur­rently as the pri­mary known author­i­ties used to jus­tify mass surveillance:

Sec­tion 215 of the Patriot Act, Known as the “Busi­ness Records” Section


What it does: The sec­tion of the law basi­cally says that the gov­ern­ment can com­pel the pro­duc­tion of any “tan­gi­ble things” that are “rel­e­vant” to an investigation.

Why you should care: The NSA relies on this author­ity to col­lect, in bulk, the phone records of mil­lions of Amer­i­cans. There are sug­ges­tions it’s also being used to col­lect other types of records, like finan­cial records or credit card records, in bulk as well.

How we can stop it: There are a few ways to fix Sec­tion 215. One way is to pass a reform bill, such as the USA FREEDOM Act, which would make clear that using Sec­tion 215 to con­duct bulk col­lec­tion is ille­gal. The USA FREEDOM Act failed to pass in the Sen­ate in 2014, which means it would need to be rein­tro­duced in 2015.

How­ever, there’s an even eas­ier way to defeat this pro­vi­sion of the law. This con­tro­ver­sial sec­tion of the Patriot Act expires every few years and must be reau­tho­rized by Con­gress. It’s up for renewal in June 2015, which means Con­gress must suc­cess­fully reau­tho­rize the sec­tion or it will cease to be a law. We’re going to be mount­ing a huge cam­paign to call on Con­gress not to reau­tho­rize the bill.

We also have three legal cases chal­leng­ing sur­veil­lance con­ducted under Sec­tion 215: Jewel v NSA, Smith v Obama, and First Uni­tar­ian Church of Los Ange­les v. NSA.

Sec­tion 702 of the FISA Amend­ments Act


What it does: This sec­tion of law is designed to allow the NSA to con­duct war­rant­less sur­veil­lance within the U.S. when the intended tar­get is overseas.

Why you should care: The NSA relies on this law to sup­port PRISM, which com­pels Inter­net ser­vice providers like Google, Apple, and Face­book to pro­duce its users com­mu­ni­ca­tions. The NSA’s upstream surveillance—which includes tap­ping into fiber optic cables of AT&T and other telecom­mu­ni­ca­tions providers—also relies on this pro­vi­sion. Through these two sur­veil­lance options, the NSA “tar­gets” sub­jects for sur­veil­lance. But even when the NSA is “tar­get­ing” spe­cific for­eign intel­li­gence sub­jects over­seas, they’re “inci­den­tally” col­lect­ing com­mu­ni­ca­tions on mil­lions of peo­ple, includ­ing both Amer­i­cans and inno­cent peo­ple abroad.

How we can stop it: Cur­rently, there aren’t any reform bills that show promise. We’re work­ing on edu­cat­ing the pub­lic and Con­gress about the Sec­tion 702 and the FISA Amend­ments Act. In 2017, this author­ity will be up for reau­tho­riza­tion. We’ll be plan­ning a big cam­paign to demol­ish this inva­sive and oft-abused sur­veil­lance authority.

Exec­u­tive Order 12333


What it does: Exec­u­tive orders are legally bind­ing orders given by the Pres­i­dent of the United States which direct how gov­ern­ment agen­cies should oper­ate. Exec­u­tive Order 12333 cov­ers“most of what the NSA does” and is “the pri­mary author­ity under which the country’s intel­li­gence agen­cies con­duct the major­ity of their operations.”

Why you should care: Exec­u­tive Order 12333 is the pri­mary author­ity the NSA uses to con­duct its sur­veil­lance operations—including mass sur­veil­lance programs—overseas. Reform­ing mass sur­veil­lance requires reform­ing the NSA’s author­ity under EO 12333.

How we can stop it: Exec­u­tive Order 12333 was cre­ated by a pres­i­den­tial order, and so a pres­i­den­tial order could undo all of this dam­age. That’s why we’re pres­sur­ing Pres­i­dent Obama to issue a new exec­u­tive order affirm­ing the pri­vacy rights of peo­ple world­wide and end­ing mass surveillance.

The Fund­ing Hack

While pass­ing a bill through Con­gress is extremely chal­leng­ing, another (some­what more con­tro­ver­sial) method of end­ing this sur­veil­lance is through the bud­get sys­tem. Every year, Con­gress must approve the defense bud­get. This fre­quently becomes a con­tentious bat­tle with numer­ous amend­ments intro­duced and debated. We may see an amend­ment that tack­les some form of surveillance.




Related Cases





Related Posts


No comments: