Skip to main content Accessibility help
×
Hostname: page-component-77f85d65b8-hzqq2 Total loading time: 0 Render date: 2026-04-17T14:32:05.962Z Has data issue: false hasContentIssue false

Index

Published online by Cambridge University Press:  24 March 2017

Jennifer Stisa Granick
Affiliation:
Stanford Law School

Information

Index

Abdulmutallab, Umar Farouk, 80
“about collection” phenomenon, 121123, 305
Abrahmson, Larry, 61
ACLU (American Civil Liberties Union). see American Civil Liberties Union (ACLU)
ACLU v. Clapper, 959 F.Supp.2d 724 (SDNY 2013), ix
Adams, John, 218
Addington, David, 194196, 201, 207
advertising, targeted data collection for, 5760, 90
after-the-fact justifications, 192
after-the-fact rules, 3, 152, 211, 243
agent of a foreign power test, FISA provisions, 184186, 210
agent of a foreign power test, in FISA provisions, 213, 249, 304
airport security, 93
Albertson, William, 135136
Alert List, structure of, 14
Alexander, Keith, 3436, 82, 247
Alexander, Michelle, 130
Ali, Muhammad, 132
American citizens
“about collection” phenomenon in foreign surveillance and, 121123
domestic surveillance of, 100106
foreign surveillance of, 149150
US foreign surveillance including, 3, 106115
American Civil Liberties Union (ACLU), 13, 9192, 145, 148, 222, 229
amicus curiae, judicial oversight of surveillance and, 160, 298
Amnesty International, 110, 135, 222
anarchists, federal surveillance of, 178
Android devices, global data collection from, 2122
Apple, 234n. 19
appliances, data generation by, 5657
apps data, 56
Army surveillance programs, abuses in, 132133
Ashcroft, John, 153154, 194196, 199203
Assange, Julian, 43, 51
Associated Press, surveillance of journalists from, 147
asymmetrical warfare, as justification for surveillance, 2426
AT&T, 45
STELLARWIND controversy and, 65, 200, 208
surrender of call data by, 10, 269
warrantless wiretapping and, 205
“Athens Affair” wiretapping scandal (Greece), 283
Australian Signals Directorate (ASD), 165
authoritarian regimes, 168170
Authorization for the Use of Military Force (AUMF), 207
automatic license plate readers, 55
Awlaki, Anwar al-, 80
back door searches
minimization procedures and, 158161
reform of, 307309
back doors, encryption
as security threat, 263
economic impact of, 278
security risk of, 276287
technology and, 265
Baez, Joan, 132
Baker, Howard, 132
Baker, Stewart, 65, 8590
Baltimore Sun, The, 49
Bamford, James, 72
bank records, privacy protection for, xii
base rate fallacy, terrorism intelligence and, 9597
Bates, John, 126, 253, 258, 299
Bayes’ Theorem, terrorism analysis and, 9597
Bedoya, Alvaro, 151
Belgacom, 270
hacking of, 276
Bellsouth
STELLARWIND controversy and, 200
Bergen, Peter, 80
Berger v. New York, 388 U.S. 41 (1967), ix, 180181
Big Data, 6062, 90, 9597, 151, 229, 302, see also metadata
bin Laden, Osama, 71
Binney, William, 4649, 46n. 5, 268, 293, 294
black bag surveillance (FBI), 178
Black Lives Matter, 135, 140, 146
Blaze, Matt, 3, 40
BND (German spy agency), 169170
Bork, Robert, 203
Boston Marathon bombing, 7779, 91
botnets, 272
bounded rationality, risk assessment and, 284
Boundless Informant tool (NSA), 20
Brandeis, Louis, 179
bright line rules
phone call data collection and, 225
STELLARWIND abuses and, 200201
Buchwald, Art, 132
bulk collection
USA PATRIOT Act authorization, 204
bulk data collection. See also mass surveillance
Congressional limits imposed on, 103104
definitions of, 30
PPD-28 restrictions on, 113114
regulation of, 3132
BULLRUN, 274
Bush Administration
9/11 Commission investigation of, 7074
domestic intelligence collection by, 1113, 1517, 117
illegal surveillance by, 192196
legal immunity for espionage activities during, 213216
post–September 11 intelligence policies of, 6970
STELLARWIND program and, 7074, 244
surveillance of journalists by, 148
Terrorist Surveillance Program and, 17
USA PATRIOT Act passage and, 196199
warrantless wiretapping by, 205213
camera surveillance, 55
CAPTIVATEDAUDIENCE, 267
Card, Andrew H., 200201
censorship, 140, 168170, 285
Census Bureau (US), data collection by, 136
Central Intelligence Agency (CIA)
9/11 Commission investigation of, 7074
Boston Marathon bombing and, 7779
minimization procedures, 3738
national foreign intelligence from, 6
surveillance abuses by, 133
Chambliss, Saxby, 39, 61
Senate investigation into call data collection and, 1017
Chaos surveillance operation, 133
charitable call data, private information from, 6062
Charlie Hebdo magazine, terrorist attacks on, 79, 168170
Cheney, Richard, 194196
China, hacking of U.S. data by, 149, 287
Church, Frank, 182
CIA (Central Intelligence Agency). see Central Intelligence Agency (CIA)
Cisco Systems
NSA hacking of, 271
CitizenFour (documentary), 19
City University of New York (CUNY) School of Law, 144
civil liberties
domestic surveillance as threat to, 103104
phone call data collection and, 1314
Section 215 violations of, 203205
surveillance policies and, 5, 7476
civil rights movement, FBI surveillance of, 133135
Clapper v. Amnesty Int’l USA, 133 S.Ct. 1138 (2013), ix, 222, 239
Clapper, James, 3336, 247
Clarke, Richard, 230
Cleaver, Eldridge, 132
Clinton, Hillary, 42
Clinton, William, 142
“Clipper Chip” technology, 264
cloud backup data, surveillance of, 108
COINTELPRO domestic spy program, 45, 183
Cole, David, 24
Coll, Steve, 148
collection, NSA definition of, 3336
Collection, Processing and Dissemination of Allied Communications (NSA), 163165
Comey, James B., 130, 153154, 199203, 225, 246, 250
commercial data
back doors as threat to, 278
business records order, 203205
foreign regulations concerning, 168170
NSA surveillance of, 110111
overseas telecommunications industries and, 166
communication, intelligence definition of, 156158
Communications Act of 1934, 176178, 199
Communications Assistance to Law Enforcement Act (CALEA), 283
communications security, 288
Communications Security Establishment Canada (CSEC), 163165
Communist Party in US, FBI surveillance of, 135136, 178
Congress
call data collection and role of, 1017
Executive Branch expansion of surveillance and, 176178
Fourth Amendment protections and, 172175
future oversight of surveillance by, 296
legal immunity for spying from, 213216
metadata legislation and, 302
oversight of surveillance by, 244, 246, 296
privacy protections and, 172
STELLARWIND controversy and, 192196, 199203
contact chaining technique, phone call data collection and, 1415, 47, 101102, 254
content/noncontent distinction
Fourth Amendment protections and, 226
NSA misrepresentation of, 256
Cook, Tim, 280
Coolidge, Calvin, 175
“corporate store” database, establishment of, 103104
CO-TRAVELER data collection program, 2223, 38
legal issues with, 2930
Council on American-Islamic Relations (CAIR), targeted surveillance of, 143
“Countering Violent Extremism: A Guide for Practitioners and Analysts”, 150
counterterrorism
fusion center information sharing and, 140142
guilt vs. innocence in analysis by, 150151
limits of surveillance data for, 8085
mass surveillance and, 7879
torture and kidnapping justified as, 92
Court of Justice of the European Union (CJEU), 167, 305
credit card data, surveillance using, 56
Credit Suisse First Boston (CSFB) bank, 130
Crime Control and Safe Streets Act (1968) (Wiretap Act), 205
criminal investigations
intelligence investigations vs., 7374, 103104, 150151, 184186, 196199
privacy issues and, 128131, 223
terrorism vs., 9098
wiretapping in, 180181, 233
criminal mass surveillance
targeted data collection vs., 9098
CSEC (Communications Security Establishment Canada), 163165
CUNY (City University of New York), 144
customer proprietary network information (CPNI), 199
cyber sovereignty movement, 168170
cybersecurity. see also digital surveillance, see also Internet, see also encryption
section 702 policies and, 119120
data collection
Bayes’ theorem and, 9597
foreign citizens’ data storage, 168170
lack of information sharing and, 7074
NSA definition of, 3436
public-private partnerships for, 5760
data storage
absence of privacy and, 219221
local data storage regulations, 168170
overseas email data storage, 108109
third party data collection and, 189191
data surveillance
offline, 55, 5657
De, Rajesh, 35
decryption systems, 274
Defense Intelligence Agency, “intelligence law handbook”, 27
DeLoach, Cartha, 132
democracy
foreign surveillance as threat to, 169170
political surveillance as threat to, 145147
surveillance abuses and, 5, 78, 2426, 131133, 138140
Department of Commerce (DOC), jurisdiction over communications by, 264
Department of Defense (DOD)
data collection guidelines, 3336
Directive 5240.1-R, 112
fusion centers and, 140142
national and military intelligence, 6
Department of Homeland Security (DHS), 98, 140142
Department of Justice (DOJ)
domestic intelligence collection and, 1517
Office of Intelligence Policy and Review, 49
Office of Justice Programs, 140142
section 702 warrantless wiretapping and, 232240
third party doctrine and policies of, 219221
whistleblower prosecutions and, 4445
Department of State (State Department), 265, 285
Department of the Interior, German surveillance of, 169170
deportation, surveillance and, 135138
Devlin, Keith, 96, 98
DHS (Department of Homeland Security), 98, 140142
DICE (DEA database), 104106
digital records, privacy protection for, xi
digital surveillance. see also surveillance
Big Data tools and, 6062
Fourth Amendment protections and, 174, 219221, 242
growth of, 5357
law and policy concerning, 1
political motivations for, 130
disadvantaged groups, surveillance of, 142145
DISHFIRE global data collection system, 20, 2223, 110
DOC (Department of Commerce), jurisdiction over communications by, 264
DOD (Department of Defense). see Department of Defense (DOD)
domestic surveillance
agent of a foreign power test and, 184186, 210, 213, 249, 304
Bush Administration expansion of, 1113, 199203
call data collection and, 917, 8590
Congressional investigation of, 1017
Congressional oversight of, 248
FISA provisions on, 184n. 15
foreigners’ privacy rights and, 162171
Levi guidelines, 183184
limits of, 8085
political opposition to, 203205
political surveillance and, 5152, 131133, 142147
post-September 11 focus on, 6970
privacy violations and, 100106
regulation of, 3132
section 702 (FISAAA) policies and, 106115, 116, 119120, 213216
STELLARWIND program and, 192196
whistleblower revelations about, 4650
“Don’t Ask, Don’t Tell” policy, 142
“Don’t Be A Puppet” education tool, 94
Downey, Brandon, 64
Drake, Thomas, 4750, 293
drone surveillance, NSA data collection with, 2122
Dropbox, 165, 168170
Drug Enforcement Agency (DEA), call data collection by, 54, 104106
Dual-EC-DRBG, 275
Durbin, Richard J., 248
Eagan, Claire, 230, 251
economic impact of surveillance, 167168
EFF (Electronic Frontier Foundation). see Electronic Frontier Foundation (EFF)
Eichenwald, Kurt, 71
electoral politics, oversight of surveillance and, 246
Electronic Communications Privacy Act of 1986 (ECPA), 189191, 220, 235, 302
Electronic Frontier Foundation (EFF), 7, 45, 60, 125, 206
Electronic Privacy Information Center, 82
electronic surveillance
AUMF and, 207
electronic surveillance (ELSUR), 5
categories of, 2830
data collection techniques, 3336
ECPA provisions concerning, 189191
FISA provisions concerning, 184186
Ellsburg, Daniel, 4445
ELSUR (electronic surveillance). see electronic surveillance (ELSUR)
email data
about collection phenomenon and, 121123
encryption of, 6265
Fourth Amendment protections for, 219221, 225
of journalists, surveillance of, 147149
multi-communications transactions, 124127
overseas storage of, 108109
politically motivated investigation of, 128131
surveillance of, 1819, 2223, 106115
third party collection of, 189191
third party data collection and, 234n. 19
employee misconduct
minimization procedures and, 153154
encryption
anti-encryption systems and, 274
limits of, 6265
NSA abuse of, 266
NSA vs. private sector use of, 264
weakening of, 4
EO 12333 (Executive Order 12333)
domestic intelligence collection and. see Executive Order 12333 (EO 12333)
Espionage Act (1917), 131, 175
Eurocopter, 170
European Union (EU)
cyber sovereignty movement and, 168170
data protection laws of, 167
hacking of institutions in, 271
surveillance of companies and member states in, 169170
Executive Branch
expansion of federal surveillance by, 183184
expansion of federal surveillance power by, 176178, 183184, 194196
oversight of surveillance by, 244, 295
public accountability for, 293
USA PATRIOT Act expansion of powers of, 196199, 201202
Executive Order 12333 (EO 12333), 25
domestic intelligence collection and, 106115
foreign intelligence collection under, 23
foreign surveillance and, 162171
minimization procedures and, 156158
oversight of surveillance by, 247
reform of, 309
expectation of privacy, Fourth Amendment protection for, 190
external oversight of surveillance, 244262, 295
Facebook, 165
facial recognition technology, 55, 129
facility, defined, 210, 252
false positives, in terrorism analysis, 9495, 9798
FBI (Federal Bureau of Investigation). see Federal Bureau of Investigation (FBI)
fear, terrorism analysis and, 98
Federal Bureau of Investigation (FBI)
back door searches and, 158161
black bag jobs by, 178
Boston Marathon bombing and, 7779
Charlie Hebdo magazine attacks and, 79
COINTELPRO domestic spy program, 45
COINTELPRO program and, 183
Congressional limits on powers of, 183184
counterintelligence activities, 6
domestic intelligence gathering by, 6970
“Don’t Be A Puppet” education tool of, 94
encryption technology and, 265
FISC certification procedures and, 116119
founding of, 178
going dark campaign and, 277
history of surveillance abuses by, 131133
infiltration, internment, tax audits and deportation tactics and, 136
information sharing by, 8385
investigation of King by, 133135
investigations of whistleblowers by, 4650
law enforcement malware from, 277
minimization procedures, 3738
Moussaoui investigation and, 73
secret dossiers of, 137
Senate investigation into call data collection by, 1017
Verizon call data obtained by, 910
Federal Communications Commission (FCC), 165
federal surveillance power. see also USA PATRIOT Act, see also Foreign Intelligence Surveillance Act (FISA), see also Executive Order 12333 (EO 12333)
current abuses and, 138140
debates concerning, 150151
domestic intelligence and, 103104
Executive Branch expansion of, 176178, 183184
failure of external oversight over, 244262
foreign surveillance and, 165
history of, 178
lies and misrepresentations concerning, 104106
minimization procedures and, 156158
mission limits of agencies and, 112115
national security justifications for, 5
online data collection and, 57
poor legal constraints on, 4, 78, 4445
scope of, 910, 2426
selectors system and, 3233
Senate investigation into, 1017
Snowden’s revelations concerning, 4143
support of FBI activities and, 133135
terrorism used as justification for, 92
USA PATRIOT Act expansion of, 192199
Federal Trade Commission, 265, 285
Feinstein, Dianne, 39, 61, 81, 247
Senate investigation into call data collection and, 1017
surveillance of foreign countries, 169170
Felten, Edward, 6061
fiber optic technology
warrantless wiretapping and, 205213, 256
FireChat, 279
First Amendment
fusion center data collection and, 140142
surveillance as violation of, 131, 138140
FISA PR/TT program, 201202, 204
FISC (Foreign Intelligence Surveillance Court). see Foreign Intelligence Surveillance Court (FISC)
Five Eyes partnership, 118
FLAME software, 273
FOGGYBOTTOM, 267
FOIA (Freedom of Information Act). See Freedom of Information Act (FOIA)
Fonda, Jane, 132
foreign governments
agent of a foreign power test and, 184186, 210, 213, 249, 304
hacking by, 283
Internet regulation by, 168170
laws on foreign surveillance of, 168170
surveillance of Americans by, 149150
Foreign Intelligence Surveillance Act (FISA), 2830, 184n. 15
9/11 Commission investigation of, 73
authorization for surveillance of Americans under, 106115
call data collection authorization by, 8590
minimization procedures under, 156
Patriot Act revisions to, 196199
pen register collection and, 83, 103
provisions of, 184186
STELLARWIND violations of, 192196
warrantless wiretapping under, 3132
Foreign Intelligence Surveillance Act Amendments Act of 2008 (FISAAA). see also Section 702 (FISAAA)
domestic provisions, 185186
reform of, 304313
section 702 of, 116, 213216
upcoming expiration of, 291
Foreign Intelligence Surveillance Court (FISC)
back door searches and, 158161
call data collection oversight and, 1017
certification procedures and, 116119
multi-communications transactions, 124127
oversight of surveillance by, 248255, 298
public accountability for, 292
rejection of expanded government surveillance powers by, 196199
special needs exception rulings, 235
warrantless wiretapping under, 237
Yahoo! declassification challenge and, 59
Foreign Intelligence Surveillance Court of Review (FISC-R), 196199, 235, 298
foreign surveillance
“about collection” phenomenon, 121123
agent of a foreign power test and, 184186, 210, 213, 249, 304
American interests impacted by, 3, 106115, 303
Congressional oversight of, 247
contact chaining technique and, 103104
DEA use of, 104106
Executive Order 12333 (EO 12333) and, 23
FISA provisions concerning, 184186
“foreignness” determination, 123124
Fourth Amendment protections and, 172175
government policies based on, 9
information sharing and, 7476
judicial oversight of, 248255
law enforcement interaction with, 73
minimization procedures and, 3738, 156158
national foreign intelligence and, 5
of online consumers, 165
politics of, 186
privacy rights and, 3
proximity of Americans to foreign targets and, 121123
scope of US activity, 1924
section 702 (FISAAA) policies and, 116120
warrantless wiretapping and, 236, 237
foreign telecommunications companies, network security agreements with, 165
Fourth Amendment
back door searches and, 158
Congressional and court rulings and, 178186
criminal investigations and, 73, 180181
definitions of surveillance and, 2930
foreign surveillance exclusion from, 185186
future of modern surveillance and, 240243
historical framework for, 172175
litigation involving, 1
modern surveillance technology and, 221224
pen register (pen trap) collection protection, 187191
phone call data collection and, 1314, 187191, 200201, 224232
reasonable expectation of privacy and, 178186
warrantless wiretapping protections and, 205, 232240
Fox News, surveillance of journalists from, 147
France, surveillance laws in, 168170
Freedom of Information Act (FOIA), 2
multi-communications transaction data and, 124127
Freeh, Louis, 264
fusion centers, 140142, 146
G+ social network, 64
gag orders, 311
GAO (Government Accountability Office), 150
GCHQ (Global Communications Headquarters). see Global Communications Headquarters (GCHQ) (UK)
Gellman, Barton, 1819, 41
Gemalto company, 274
George, Richard, 283
Gilmore, John, 7
Glennon, Michael, 246, 261, 296
global commerce, impact of foreign surveillance on, 167168
Global Communications Headquarters (GCHQ) (UK)
Belgacom hack, 270
encryption of data and, 6364
Five Eyes partnership and, 163165
foreign surveillance by, 2122, 109, 269
terrorism analysis and, 9798
Global Crossing (Network Operations Center), 165
Gmail, 165
Going Dark campaign, 277, 278, 280
going dark strategy, 277
Goldsmith, Jack, 177, 207
Gonzales, Alberto, 16, 200201, 252
Google
encryption of data by, 6264
surveillance of data from, 109, 234n. 19, 269
Gorman, Siobhan, 49
Government Accountability Office (GAO), 150
Government Communications Security Bureau (GCSB), (NZ) 163165
government surveillance policies. see also Executive Order 12333 (EO 12333)
current abuses and, 138140
domestic intelligence and, 103104
Executive Branch expansion of, 176178
failure of external oversight over, 244262
foreign surveillance and, 165
Fourth Amendment protections, 172175
history of, 178
lies and misrepresentations concerning, 104106
minimization procedures and, 156158
mission limits of agencies and, 112115
national security justifications for, 5
of authoritarian regimes, 168170
online data collection and, 5760
poor legal constraints on, 4, 78, 4445
scope of, 910, 2426
selectors system and, 3233
Senate investigation into, 1017
Snowden’s revelations concerning, 4143
support of FBI activities and, 133135
terrorism used as justification for, 92
Gowdy, Trey, 119, 297
GPS data
global data collection and, 2122
surveillance using, xii, 54, 230, 240
Green, Matthew, 276
Greenwald, Glenn, 9, 16, 41, 206, 229
PRISM story by, 1819
GROK, 267
Guardian, The, 9
PRISM story in, 18
GUMFISH, 267
hacking of data
Chinese hacking of US sites, 149
espionage involving, 23
by foreign governments, 6264, 283
from commercial online services, 5760
by law enforcement, 68, 168170
by NSA, 1819, 2122, 263, 266
politics of, 285
security risks of, 276287
Harding, Warren G., 175, 183
Hasan, Nidal (Maj.), 80
Haseltine, Eric, 68
Hayden, Michael, 44, 47, 50, 65, 74, 281
Hazmi, Nawaf al-, 7173
Headley, David, 8385
Healy, Kieran, 62
“Hemisphere” project, 104
Hepting v. ATT aka In re Nat. Sec. Agency Telecommunications Records Litigation, 633 F.Supp.2d 949 (NDCal 2009), ix
Hersh, Seymour, 50, 182
Hidalgo, Cesar, 61
Hogan, Thomas F., 160161
Holder, Eric, 104n. 4, 147, 148
Holley, Robert J., 84
homeland information reports (HIRs), 141
homosexuals
surveillance of, 137, 142
Homsany, Ramsey, 168
Hoover, J. Edgar, 52, 76, 178
abuses of surveillance by, 131133, 136138
career of, 131
investigation of King by, 133
“hot pursuit” principle, warrantless wiretapping and, 234
hotline call data private information from, 6062
House Intelligence Committee, 83
Howard, Malcolm, 204, 210, 230, 250, 252
HTTPS protocol, 64
Huawei company, 288
human intelligence (HUMINT), 5, 9
Human Rights Watch, 110, 148
human rights workers
surveillance of, 169170, 222
HUMINT (human intelligence), 5, 9
Hunt, Ira “Gus”, 55, 70
image recognition software, 129
Immersion program, 61
inadvertent collection
digital technology and, 221
growth of, 5152
NSA definition of, 36, 46
incarceration rate in US, 130
incidental collection, 36, 108
infiltration, surveillance through, 135138, 142147
information assurance services, NSA weaknesses and, 263
information sharing
back door searches and, 158161, 307309
counterterrorism measures and, 8085
of criminal and intelligence data, 196199
domestic intelligence data, 104106
fusion centers, 140142
government infrastructure barriers to, 7476
intelligence community barriers to, 7074
“Raw Take” sharing, 198
Inglis, John C., 102
intellectual property
domestic surveillance as violation of, 105
hacking of, 287
intelligence community
9/11 Commission investigation and, 7074
absence of performance metrics for, 8085
demonization of, 5051
minimization procedures of agencies in, 112115
misdirection and misrepresentation by, 2728, 3940
oversight of, 245
perception of terrorism risk and, 6774
structure of, 5
Intelligence Community Whistleblower Protection Act, 42
intelligence data
categories of, 5
vocabulary use for, 2728
internal oversight of surveillance, 244262, 294
Internal Revenue Service (IRS), political surveillance by, 146
International Telecommunications Union, 169
Internet. see also cybersecurity
absence of privacy on, 219221
by-catch of data on, 124127
crime involving, 1
data localization proposals and, 168170
economic impact of surveillance on, 167168
foreign government regulation of, 168170
foreign use of, 165
Fourth Amendment protections and, 225
limits of data collection from, 8085
NSA data collection from, 2123, 103104, 121123, 253
STELLARWIND surveillance of, 192196
surveillance of traffic on, 5357
third party data collection on, 187191
Internet of Things, 5657
Internet Service Providers (ISPs), 5354, 6265
internment, surveillance and, 135138
Investigatory Powers Bill (IPB) (UK) (Snooper’s Charter), 169
IP addresses, surveillance of, 5354
iPhone devices, global data collection from, 2122, see also mobile phones
IRS (Internal Revenue Service), political surveillance by, 146
Israel, NSA information sharing with, 149150
Jackson, Jesse, 133
Jaffer, Jameel, 222, 239
Japanese-Americans, internment of, 136
Jeffress, Amy, 160161
Jewel v. NSA, x
Jinping, Xi, 287
Joel, Alex, 244
Johnson, Jeh, 98
Johnson, Lyndon Baines, 133
journalists, surveillance of, 147149, 178, 222, 293
judicial oversight of surveillance, 1314, see also specific courts
FISA provisions and, 184186
future challenges for, 297300
internal oversight and, 296
limitations of, 248255
July 7 2005 London suicide bombings, 79
Kane, John L., 238, 241
Katz v. United States, 389 U.S. 347 (1967), x, 178186, 187, 218, 220, 224
Keith case. see United States v. United States District Court (Keith case), 407 U.S. 297 (1972)
Kennedy, John F., 134
Kennedy, Robert Jr., 134
key escrow systems, 264
kidnapping, terrorism as justification for, 92, 156158, 223
King, Martin Luther Jr., 5
FBI surveillance of, 133135, 178
Klayman, Larry, 228
Klein, Mark, 45, 205, 206, 213, 293
Kollar-Kotelly, Colleen, 201202, 204, 212, 225, 226, 249, 252
Korematsu v. United States, 321 U.S. 760 (1944), x
Kris, David, 158, 211
Kyllo v. United States, 533 U.S. 27 (2001), x
labor activists, FBI surveillance of, 175
Landau, Susan, 264, 283
language of intelligence, 2728
surveillance law and technology, 3940
terrorism and, 92
Large-Content FISA, 210, 212
law enforcement
call data collection and, 5455, 8788
digital surveillance by, 53
domestic data collection by, 104106
federal surveillance and, 68, 175176, 184186
fusion center information sharing and, 140142
hacking of data by, 68, 168170
intelligence community cooperation with, 196199
legal requests for data from, 6265
parallel construction by, 105, 239
pen register data collection and, 189191
political surveillance and, 128131, 145147
targeted surveillance by, 142145
third party data collection and, 187191
lawful purpose standard, minimization procedures and, 156158
Leahy, Patrick, 82, 208, 251
legal framework for surveillance
after-the-fact justifications, 192
agency language and, 3940
definitions of surveillance and, 2830
domestic call data collection and, 1517
Fourth Amendment protections and, 172175
global data collection and absence of, 2324
government regulatory policy, 4
ineffectiveness of, 5
intelligence analysis and, 68
mass surveillance and, 9
politics of, 178186
power of metadata and, 302
privacy rights and, 172
legal immunity
in FISAAA provisions, 213216
secret laws granting, 17
Leon, Richard J., 228
Level 3 corporation, 269
Levy, Edward, 183184
library lending logs, 203205, see also Section 215 (USA PATRIOT Act)
privacy protection for, 12, 101
Litt, Robert, 111112, 152, 153, 244, 308
local data storage regulations, 168170
Lockheed-Martin, 287
Loomis, Ed, 4649
LOVEINT investigation, 1517, 76, 153
loyalty card data, 56
Mailer, Norman, 132
MAINWAY intelligence tool, 2223, 38
Manget, Fred F., 68
Man-in-the-Middle attacks, 270
Manjoo, Farhad, 78
marginalized groups, political surveillance of, 145147
mass surveillance. see also bulk data collection
Boston Marathon bombing and, 7879
limitations of, 8085
NSA misuse of, 268
by NSA, 3
post-September 11th increase in, 6774, 76
as threat to democracy, 78, 2426
McLaughlin, Mary, 231
MCTs (multi-communications transactions), 124127, 257
McVeigh, Timothy, 6768, 104
media coverage of surveillance
domestic call data collection and, 16
investigation into PRISM by, 1819
surveillance of journalists and, 147149
medical records, encryption of, 62
Médecins du Monde, NSA surveillance of, 110
Merkel, Angela, 169170
metadata
analysis of, 6062
call data as, 10, 6062, 225, 251
Fourth Amendment protections and, 242
IP address surveillance, 5354
NSA collection of, 20, 3436
power of, 302
privacy violations of, 65
terrorism intelligence using, 9098
Microsoft Windows, crash reporting system of, 64
Mihdhar, Khalid al-, 7173
minimization procedures, 111
back door searches and, 158
current status of, 152154
data collection and, 7576, 112115, 211
false promise of, 153154
FISC weakening of, 249
foreign online user exclusion from, 165
importance of, 199n. 16
lack of oversight for, 156
NSA definition of, 3738
policies guiding, 156158
proposed reforms for, 161
reasonable standard and, 243
reform of, 307309
secret rules for, 154155
minority groups, targeted surveillance of, 138140, 142145
misdirection and misrepresentation
in intelligence community language, 3940
of Snowden’s activities, 4143
mission creep, in surveillance, 5152, 180181
Mitchell, Andrea, 34
Moalin, Basaaly, 82, 83, 92
mobile phones. see also telephone call data collection
data collection from, 910, 57, 8590
key escrow systems for, 264
NSA hacking of, 266
Monaco, Lisa, 150
Mongols Motorcycle Club, 141
Monteilh, Craig, 143
Morrell, Michael, 88, 228, 230
Moussaoui, Zacarias, 73, 197
Mueller, Robert S., 69, 200201
Mukasey, Michael, 183
multi-communications transactions (MCTs), 124127, 257
Upstream collection of, 259
Mumbai, India 2008 attacks, 79, 8385
murder, terrorism vs., 9192
MUSCULAR program, 6364, 9798, 109
Muslim-Americans, targeted surveillance of, 142145
My Lai massacre, 4445
MYSTIC global data collection system, 20
National Commission on Terrorist Attacks Upon the United States (9/11 Commission), 7074
National Institute of Standards and Technology (NIST), 274
National Research Council (NRC), 8990
national security
9/11 Commission review of, 7074
Executive Branch expansion of surveillance and, 176178
government agencies involved in, 5, 2324, 104106
hacking and, 276287
journalists’ reporting and, 147149
legal immunity and, 17
misuse of data collected for, 2426
post-September 11 shift in, 6970
privacy protection as enhancement of, 171
privacy violations in name of, 100, 150151
regulation of national security practices, 4445, 180181
terrorism threat assessment and, 77, 92, 98
warrantless wiretapping and, 234
National Security Act of 1947, 248
National Security Agency (NSA)
9/11 Commission investigation of, 7074
Boston Marathon bombing investigation of, 7779
call data collection by, 5, 1017, 61, 8590
contact chaining system of, 1415, 47, 101102
data collection technology used by, 2122, 3336, 6265
encryption policies of, 264
foreign surveillance by, 6, 9, 1924, 106115
German surveillance by, 169170
information sharing by, 8385, 149150
insecurity in policies of, 263289
Internet data collection violations by, 2123, 103104, 121123, 253
mass surveillance by, 3
minimization procedures of, 3738
PRISM program of, 1819
secret surveillance posts built by, 45
signals intelligence from, 6
Snowden leak and, 23
Snowden’s career at, 41
spying partnerships of, 163165
warrantless wiretapping by, 205213
whistleblowers within, 46
National Security Letters, 186
Netanyahu, Benjamin, 149
Network Operations Center (Global Crossing), 165
networked data, 5657
New America Foundation, 168
New York City Police Department (NYPD), targeted surveillance by, 143
New York Times, The, 16, 36
NSA surveillance reporting in, 254
on warrantless wiretapping, 203
reporting on NSA surveillance by, 4445, 4850, 116
STELLARWIND violations reported in, 206, 250
surveillance of browsing data on, 53
surveillance of journalists from, 148
targeted advertising in, 58
New York Times, The,
STELLARWIND violations reported in, 200201
Nixon, Richard, 4445, 52, 76, 132, 138
No Place to Hide (Greenwald), 24
NOBUS ideology, 280
non-governmental organizations
German surveillance of, 169170
NSA surveillance of, 110111
surveillance of, 147149
non-state threats
as justification for surveillance, 2426
terrorism risks and, 6774
Northrup-Grumman, 287
NSA (National Security Agency). see National Security Agency (NSA)
Obama v. Klayman, 800 F.3d 559 (DCCir. 2015), x, 228
Obama, Barack, 3839
Chinese hacking and, 287
domestic intelligence collection and, 5, 17, 106, 202
on email data surveillance, 18
German surveillance and, 169170
key escrow technology and, 281
on minimization procedures, 113114
NSA hacking activities and, 272
oversight of surveillance under, 244
phone call data collection and, 8990, 100, 230
PRISM program and, 165
surveillance of journalists under, 147149
Occupy Wall Street, 135, 140, 146
Office of Intelligence Policy and Review (OIPR) (DOJ), 49
Office of Legal Counsel (OLC) (US Department of Justice), 17
STELLARWIND investigation and, 194196
Office of Personnel and Management (US), Chinese hacking of, 149
Office of the Director of National Intelligence (ODNI), 13
multi-communications transactions and, 125
Oklahoma City bombing, 6768, 91, 104, 183
Oliver, John, 42, 123124, 162
Olmstead v. United States, 277 U.S. 438 (1928), x, 156, 175176, 179, 231
Omnibus Crime Control and Safe Streets Act of 1968 (Wiretap Act), 205
online chat rooms, data collection from, 121123
online transactions
data local proposals and, 168170
foreign commercial use of, 165
surveillance of, 53, 199203
targeted advertising based on, 5760
oversight of surveillance
Congressional oversight, 247, 296
executive (interbranch) oversight, 291
future challenges for, 294300
internal oversight, 294
judicial oversight, 1314, 297300
Owning the Net initiative, 268, 272
PAA (Protect America Act), 59, 212, 235, 237
packet injection attacks, 282
Palmer Raids of 1919–20, 131
parallel construction techniques, 105, 178, 239
Paris, France, November 2015 attacks in, 87
pattern matching, terrorism intelligence and, 9098
PCLOB (Privacy and Civil Liberties Oversight Board). see Privacy and Civil Liberties Oversight Board (PCLOB)
peace movement, FBI surveillance of, 136138, 175
pen register data collection, xi, 83, 103, 184n. 15, 185, 186, see also metadata
absence of supervision in, 250
Fourth Amendment protections and, 224
STELLARWIND violations of, 192196
third party doctrine and, 187191
trap and trace statutes, 189191
Pentagon Papers, 4445
People for the Ethical Treatment of Animals (PETA), 146
People’s Republic of China, hacking of US data by, 149, 287
performance metrics for intelligence,
demand for, 8085
limits of counterterrorism analysis and, 150151
Perrow, Charles, 284
PETA (People for the Ethical Treatment of Animals), 146
Petraeus, David, 52
Petrobras, 110
phone dragnet. see telephone call data collection
physical subversion, NSA use of, 272
Pike, Otis G., 182
PIPA (Protect IP Act), 7
platform companies, gatekeeping role of, 5760
Poitras, Laura, 1819, 41, 50, 206
political surveillance, 5152, 131133, 142, 145147, 169170
power dynamics, surveillance and, 131133
Power Wars (Savage), 201202
PPD-28 (presidential directive), 113114, 303
minimization procedures and, 156158
pre-Revolutionary America
surveillance in, 172175
President’s Review Group on Intelligence and Communications Technologies, 230, 288, 303
president-proof surveillance policies, 262, 295
PRISM (NSA classified program), 1819
assessment of, 8385
certification procedures under, 117
domestic surveillance under, 3132, 106115, 121123
EU data protection laws and, 167
foreigners’ privacy and, 163165
hearings on, 3436, 169170
impact on online commerce of, 165
incidental collection by, 36
limits of, 82
reform of, 308
section 702 provisions, 214
warrantless wiretapping under, 256
Privacy and Civil Liberties Oversight Board (PCLOB), 82, 83
“about collection” phenomenon and, 121123
“foreignness” determination and, 123124
limits of mass surveillance and, 113
metadata collection and, 3436
minimization procedures and, 154155
misdirection/misrepresentation of surveillance and, 39
on phone data collection, 230
section 702 (FISAAA) provisions and, 118, 121123, 215
privacy protections. see also reasonable expectation of privacy standard
back door searches and, 158
Census data and, 136
cyber sovereignty movement and, 168170
EU data protection laws and, 167
for email data, 219221
Five Eyes partnership and, 163165
for foreign online users, 165
foreign government data collection and, 149150
foreign government Internet regulations and, 168170
foreign surveillance and, 3, 162171
in Fourth Amendment, 172175
history in US of, 172
litigation involving, 1
national security and, 171
political abuse of, 5152
public opinion about, 128131
security and, 150151
technology innovation as threat to, 5760
terrorism threat vs., 5
third party data collection and, 187191
Privacy Shield proposal, 305
private sector
Boston Marathon bombing data from, 7879
data collection technology data distribution to government and NSA by, 6265
encryption use in, 264
privilege, surveillance and, 131133
probability distribution, terrorism analysis and, 9597
probable cause standard
in 9/11 Commission report, 7476
back door searches and, 158161
criminal activity and, 7374
federal surveillance and, 182
in FISA provisions, 184186
in Fourth Amendment, 173
law enforcement surveillance and, 236n. 23
section 702 and, 116119
STELLARWIND program and, 68
program code names, 38
programmatic surveillance, 116119
Prohibition
federal surveillance and, 175176
“Project Crisscross”, 104
Protect America Act (PAA), 59, 212, 235, 237
Protect IP Act (PIPA), 7
provider assistance principle
third party doctrine and, 189191
public accountability for surveillance, 292294
public opinion
abuses of surveillance and, 138140
on foreign surveillance, 178186
anti-Muslim sentiment in, 142145
perceptions of terrorism risks and, 6774
resistance to mass surveillance and, 78
on surveillance, 128131
public-private partnerships for surveillance, 5760
purged information, NSA procedures for, 3738
Qaeda, al-
9/11 Commission investigation of, 7074
telephone monitoring of, 17
World Trade Center 1993 attack by, 67
Quakers, surveillance of, 132, 137, 146
QUANTUM global data collection system, 20, 22
Quattrone, Frank, 130
query, NSA definition of, 38
radicalization theories, 94
RAND Corporation, 4445
“Raw Take” sharing orders, 198
reasonable articulable suspicion (RAS). see also Section 215 (USA PATRIOT Act)
call data collection and, 10, 1314
NSA contact chaining and, 1415
reasonable expectation of privacy, 240
reasonable expectation of privacy standard
electronic surveillance collection and, 2930
Supreme Court ruling on, 178186
third party data collection and, 187191
“reasonably designed” requirement, 158161
Regin system, 270, 271
relevance standard, domestic surveillance data collection and, 103, 204
religious groups, targeted surveillance of, 142145
Reno, Janet, 73, 183
Richards, Rebecca, 261
Richelieu, Armand Jean du Plessis (Cardinal), 128
Riley v. California, 134 S.Ct. 2473 (2014), xi, 242
Risen, James, 148
Roark, Diane, 48, 49
Roberts, John, 243
Rogers, Mike, 39, 119, 281, 297
Roosevelt, Franklin Delano, 70, 175, 176178
Roosevelt, Theodore, 70, 175
Rosen, James, surveillance of, 147
Rotella, Sebastian, 84
Rudmin, Floyd, 95
Rumsfeld, Donald, 74
Russia. see also Soviet Union
warnings concerning Tsarnaevs from, 7779
SANS organization, 273
Savage, Charlie, 201202, 252
SAVAGERABBIT, 267
Schlanger, Margaret, 254
Schmidt, Eric, 64, 128, 287
Schneier, Bruce, 58
Schrems v. Facebook, Case No. C-362/14 (2015), xi, 305
Screening of Passengers by Observation Techniques (SPOT) checklist, 93
search warrants. see also warrantless searches
Congressional legislation on, 180181
DEA use of, 104106
FISA provisions concerning, 184186
Fourth Amendment protections and, 172175
lack of European regulations on, 168170
9/11 Commission recommendations concerning, 7476
surveillance of journalists and, 147149
search, NSA definition of, 38
secrecy
in legal constraints on surveillance, 4445
levels in surveillance of, 4
reduction of, 291
revelations on surveillance and end to, 203205
vocabulary of intelligence and, 2728
secret law, in United States, 17, 292294
section 215 (USA PATRIOT Act). See also library lending logs
Alert List, 14
call data collection under, 12, 1517, 100
foreign surveillance powers under, 185186
ineffectiveness of, 251
judicial oversight of, 260
tangible things, 203205
section 702 (FISAAA). see also multi-communications transactions, see also Upstream surveillance program, see also PRISM
Americans’ proximity to foreign targets and, 121123
assessment of data collection under, 8385
back door searches and, 158161
by-catch phenomenon and, 124127
constitutionality of, 222
domestic surveillance and, 106115, 116, 119120
expiration of, 304
“foreignness” determination and, 123124
judicial oversight of, 260
legal immunity in, 213216
minimization procedures under, 156
overview of, 116119
upcoming expiration of, 291
warrantless wiretapping under, 232240
Securities and Exchange Commission (SEC), politically motivated investigations by, 130
security risks
bounded rationality concerning, 284
hacking and, 266
of hacking, 276287
of surveillance, 291
security, tools for enhancing, 279
Sedition Act (1918), 131, 175
selector-based data collection
“about collection” phenomenon and, 121123
definition of, 3233
section 702 (FISAAA) provisions, 214
Sensenbrenner, James, 1617
September 11, 2001 attacks
intelligence failures leading to, 7074
surveillance policies as response to, 6774
Sethi, Arjun S., 94
Shabaab, al-, terrorist group, 83, 92
Signal software, 279
signals intelligence (SIGINT)
classification of, 5
definitions of, 2830
encryption technology and, 265
foreign intelligence data and, 9
in Israel, 149150
metadata in, 3436
NSA role in, 2223, 156158
regulations relating to, 3839, 112115
US Signals Intelligence Directive SP0018, 75, 111
Silberman, Laurence, 138
Silverglate, Harvey, 129
Simon, David, 87
Smith v. Maryland, 442 U.S. 735 (1979), xi, 187191, 200201, 220, 224, 225, 228, 242
Snooper’s Charter. see Investigatory Powers Bill (IPB) (UK)
Snowden, Edward, 23, 7
on abuse of surveillance, 138
on call data collection, 100
classified documents released by, 19
on data collection, 87
debate over revelations by, 4143
on global surveillance activities, 24
on encryption, 274, 276
legal protection for, 293
on limits of mass surveillance, 77, 82
on NSA surveillance practices, 24, 36, 62
minimization procedures disclosed by, 113, 154155
Oliver interview with, 162
on section 702 (FISAAA) surveillance, 121123
targeted surveillance activities in documents leaked by, 143
as whistleblower, 5051, 106115
social networking
encryption of, 62
surveillance and, 5760
SOD (Special Operations Division) (DEA), 105
SOPA (Stop Online Piracy Act), 7
Sotomayor, Sonia, 56, 231, 239, 240
Soviet Union. see also Russia
US surveillance of, 68
special needs exception, warrantless wiretapping and, 234
Special Operations Division (SOD) (DEA), 105
Specter, Arlen, 207
Spock, Benjamin, 132
Sprigman, Christopher, 53
Sprint, surrender of call data by, 10
Stamos, Alex, 281
standing doctrine, Fourth Amendment protections and, 222
State Department, 265, 285
State of War (Risen), 148
state privacy laws, 172175, 218n. 4
stateless terrorism, as justification for surveillance, 2426
Station Table, call data evaluations, 14
statistical analysis, terrorism intelligence and, 9597
STELLARWIND surveillance program
absence of oversight for, 245
absence of surveillance over, 250
American citizens included in, 1113, 16, 106
encryption technology and and, 65
FISA statute and, 235
FISC-R and, 196199
investigation of, 192196
legal status of, 153154
post-September 11 focus of, 68
warrantless searches and wiretapping in, 116, 205213
whistleblower revelations concerning, 4850
Sterling, Jeffrey, 148
Stern, Carl, 45
Stevenson, Adlai, 133
Stevenson, Adlai Jr., 132
Stone, Harlan Fiske, 175, 183
Stop Online Piracy Act (SOPA), 7
Stored Communications Act (SCA), 189191
“strong crypto”, 264
Stuxnet malware, 282
subpoenas, for phone call data, 104106
superwarrants, 180
Supreme Court (US), 181
digital surveillance rulings, 242
Fourth Amendment protections and, 179, 221224
privacy rights and, 172
search and seizure rulings by, 175176
STELLARWIND abuses and, 200201
telephone call data collection and rulings of, 224232
third party data collection and, 187191
warrantless wiretapping rulings of, 181
whistleblower protections and, 4445
surveillance. see also specific forms, such as digital surveillance, See also digital surveillance
abuses of, 5, 78, 2426, 131133, 138140
definitions of, 2830
foreign government regulations on, 168170
Fourth Amendment protections and, 172175
future of, 290292
by Germany, 169170
history in US of, 172
information sharing role in, 7476
lack of European regulations on, 168170
legal regulation of, ixxiii, 4
limits on effectiveness of, 77
mission creep in, 5152, 180181
power and privilege and history of, 131133
in pre-Revolutionary America, 172175, 217
public opinion about, 128131
public-private partnerships in, 5760
risk-reward tradeoff in, 300
secret laws on, 17
Snowden’s revelations concerning, 4143
technology and growth of, 3
vocabulary of, 2728
Tailored Access Organization (TAO), 267
Tamm, Thomas, 4950, 206, 293
targeted data collection
advertisers’ use of, 5760
call data as, 8590
counterterrorism efforts and, 7980
definitions of, 31
mass surveillance vs., 9098
political surveillance and, 145147
public accountability in, 292
regulation of, 3132
warrantless wiretapping and, 3132, 233
tax audits, surveillance and, 135138
Tea Party movement, 135, 146
technology
civil liberties and, 1
growth of mass surveillance and, 3, 2426
terrorism and limits of, 9495
telephone call data collection. see also Section 215 (USA PATRIOT Act), See also mobile phones
categories of, 2830
Congressional and court cooperation on, 178186
continued justification for, 8590
Fourth Amendment protections and, 1314, 187191, 200201, 224232
government collection of, 910, 5455
history of surveillance using, 175176
key escrow technology and, 264
limits in counterterrorism of, 8085
NSA global surveillance of, 1924
privacy protections and, 6062
reasonable expectation of privacy standard and, 2930, 178186
Senate investigation into collection of, 1017
STELLARWIND violations of, 192196
third party doctrine and, 187191
Terror Presidency, The (Goldsmith), 177
terrorism
criminal violence vs., 9098
definitions of, 5n. 1
by Islamic non-state groups, 142145
legal definition of, 9192
mass surveillance and detection of, 9098
public perceptions of, 138140
surveillance policies as response to, 6774
Terrorist Surveillance Program (TSP), 17, 207, 252
Terrorists Identities Datamart Environment (TIDE), 78
The Wire (television series), 87
ThinThread project, 4649, 295
third party doctrine
Fourth Amendment protections and, 225
phone data and email privacy, 219221
phone data collection and, 5760, 189191
phone data collection and, 242
STELLARWIND investigation, 194196
This American Life (radio program), 143
Three Felonies a Day (Silverglate), 129
TIDE (Terrorists Identities Datamart Environment). see Terrorists Identities Datamart Environment (TIDE)
Title III (Wiretap Act), 180181, 187191, 205
torture, terrorism as justification for, 92, 158, 223
Total oil and gas company, 110
tower dumps, of mobile phone data, 5455
TrailBlazer surveillance tool, 47, 50, 295
transit authority, expansion of, 210
transparency in surveillance, proposals for, 310
Transportation Security Administration (TSA), 93
Tsarnaev, Dzhokhar, 7779
Tsarnaev, Tamerlan, 7779
TURBINE system, 268
Twitter, 87, 169170
Tye, John, 22, 110, 111, 152
US Constitution, surveillance regulation and. See also Fourth Amendment, see also First Amendment
US National Counterterrorism Center, 78
USS Cole, attack on, 72
Udall, Mark, 83, 254
UK-USA Agreement, 163165
UNICEF, NSA surveillance of, 110
Uniform Resource Locator (URL), surveillance of, 53, 225
United Kingdom. see also Global Communications Headquarters (GCHQ)
global data collection by, 2122
government data collection in, 6364
Investigatory Powers Bill, 169
July 7th 2005 London suicide bombings, 79
surveillance regulations in, 168170
“United States persons,” NSA definition of, 3839
United States Signals Intelligence Directive SP0018 (USSID-18), 75, 111, 112, 156158
United States v. Davis, 754 F.3d 1205 (11th Cir. 2014), rev. en banc 785 F.3d 498 (11th Cir. 2015), 240
United States v. Ganias, 755 F.3d 125 (2d Cir. 2014), xi, 241
United States v. Jacobsen, 466 U.S. 109 (1984), xii, 220
United States v. Jones, 32 S.Ct. 945 (2012), xii, 230, 240
United States v. Miller, 425 U.S. 435 (1976), xii, 187191, 220, 225
United States v. Muhtorov, 2-cr-00033-JLK (D. Colo.), xii, 238, 241
United States v. Truong, 629 F.2d 908 (4th Cir. 1980), xii, 236
United States v. United States District Court (Keith case), 407 U.S. 297 (1972), xiii, 181184, 235
United States v. Warshak, 631 F.3d 266 (6th Cir. 2010), xiii, 220, 232
updates, security risks and, 273
Upstream surveillance program, 18, 214, see also Section 702 (FISAAA)
about collection in, 305
assessment of, 8385
domestic data collection, 106115, 225
inadvertent data collection by, 36
multi-communication transactions data and, 124127
multi-communications data and, 259
warrantless wiretapping under, 257
USA Freedom Act, 7, see also Section 215 (USA PATRIOT Act)
back door searches and, 160
curbs on phone data collection in, 231
revisions to bulk data collection under, 103104
telephone data collection and, 3132, 87, 199n. 17
USA PATRIOT Act, 4, see also Section 215 (USA Patriot Act)
federal surveillance powers under, 185186
post-September 11 passage of, 7374
section 215 on call data collection, 12, 1517
surveillance abuses in, 196199
USA Patriot Act II, 192196
USA Today, 10, 12, 16, 203
USSID-18. see United States Signals Intelligence Directive SP0018 (USSID-18)
Vatican, German surveillance of, 169170
Verilli, Donald, 239
Verizon
STELLARWIND controversy and, 200
surrender of call data by, 910
Vieques Island protests, 91
Vietnam War, opposition to, 4445, 132, 136138, 236
Vinson, Roger, 212
violations by intelligence agencies, absence of remedies for, 112115
violent extremism
rarity of, 96n. 43
terrorism vs., 9192
vocabulary of intelligence, 2728
“wall” between criminal and intelligence surveillance, 73, 196199
Walton, Reggie, 14, 253, 258
war on terror, surveillance policies and, 223
warrantless searches and wiretapping, 3132, 106115, see also wiretapping
back door searches and, 158161
congressional and court regulations of, 180181
executive branch expansion of, 176178
federal surveillance and, 175176
foreign surveillance and, 236
Fourth Amendment protections and, 172175
intelligence data collection and, 7476
limiting scope of, 305
section 702 (FISAAA) provisions allowing, 232240
in STELLARWIND program, 205213
warrants. see also search warrants
Washington Post, The
on Global Crossing Network, 165
on inadvertent data collection, 36
on MUSCULAR program, 63
reporting of mistreatment of Muslim Americans, 144
section 702 (FISAAA) covered in, 121123, 123124
terrorist surveillance reporting in, 18
watchlists
Boston Marathon bombing and, 78
false positives in, 9495
FBI’s use of, 72, 131
Watergate investigation, 181184
web browsing traffic
economic impact of surveillance on, 167168
surveillance of, 53, 109
Weibe, Kirk, 48
Whisper Systems, 279
whistleblowers
investigations of, 4650
legal protection for, 42
minimization procedures in revelations of, 112115
protection for, 293
Snowden as, 5051
value of, 4445
Wikileaks, 43
Wilson, Douglas, 158, 211
wire communications, defined, 2830, 184n. 15, 187191
Wiretap Act (Title III), 180181, 187191, 205
wiretapping, 106115
Congressional legislation on, 180181
defined, 2830
encryption technology and, 264
Executive Branch expansion of, 176178
federal surveillance and, 175176
Fourth Amendment protections and, 172175
history of federal surveillance using, 116, 178
section 702 (FISAAA) policies and, 119120
warrantless wiretapping, 3132
World Trade Center 1993 attack, 6768, 91
Wyden, Ronald, 33, 75, 83, 158161, 254, 297
XKEYSCORE global data collection system, 20
Yahoo!, 59, 234n. 19, 235
encryption of data by, 64
surveillance of data from, 109, 269
Yoo, John, 194196, 200
Zazi, Najibullah, 85
Zegart, Amy, 80
Zuckerberg, Mark, 165

Save book to Kindle

To save this book to your Kindle, first ensure no-reply@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×