Topic Lecture from JDI 2015

44
Domestic Surveillance Overview of the 2015-2016 High School Debate Topic

description

Topic Lecture from the JDI 2015 Camp

Transcript of Topic Lecture from JDI 2015

Domestic Surveillance

Domestic SurveillanceOverview of the 2015-2016 High School Debate TopicThe Forensics Quarterly, Vol 89, No 31Resolved: The United States federal government should substantially curtail its domestic surveillance.(Topic Paragraph) https://www.nfhs.org/articles/five-debate-topics-suggested-for-2015-16/Privacy Topic Paper - https://www.nfhs.org/media/885758/privacy2014.pdf2Resolved: The United States federal government should substantially curtail its domestic surveillance.CurtailNarrow Reduce/Decreaseto cut short; cut off a part of; abridge; reduce; diminish (Dictionary.com)BroadRestrictReduce in extent or quantity; impose a restriction on (Oxford Dictionary)Domestic SurveillanceDomesticof, relating to, or made in your own country (Merriam-Webster)

Surveillancethe act of carefully watching someone or something especially in order to prevent or detect a crime (Merriam-Webster)

Domestic SurveillanceDomestic surveillance is a subset of intelligence gathering. Intelligence, as it is to be understood in this context, is information that meets the stated or understood needs of policy makers and has been collected, processed and narrowed to meet those needs. In essence, domestic surveillance is a means to an end; the end being intelligence. The intelligence community best understands domestic surveillance as the acquisition of nonpublic information concerning United States persons (Small, 2008).- Small, Matthew. (2008). His Eyes are Watching You: Domestic Surveillance, Civil Liberties and Executive Power during Times of National Crisis. Center for the Study of the Presidency & Congress. Retrieved March 24, 2015 from http://cspc.nonprofitsoapbox.com/storage/documents/Fellows2008/Small.pdf

6Timeline1919The State Department establishes the Cipher Bureau, a precursor to the modern-day National Security Agency. It was the first peacetime federal intelligence agency.1952President Harry Truman secretly issues a directive to create the National Security Agency, which allows the Defense Department to consolidate surveillance activities after World War II.

http://www.reuters.com/article/2013/06/07/us-usa-security-records-factbox-idUSBRE95617O201306077Timeline1972The United States v. U.S. District Court. The Supreme Court ruled that Fourth Amendment protections applies to domestic surveillance. 1976Church Committee investigations. Resulted in the creation of the Senate Select Committee on Intelligence.

Timeline1978Foreign Intelligence Surveillance Act (FISA)Foreign Intelligence Surveillance Court (FISC)2001United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (USA PATRIOT Act)2008FISA Amendments Act of 2008

Timeline2013Edward SnowdenNSA Revelations2015Uniting and Strengthening America by Fulfilling Rights and Ending Eavesdropping, Dragnet-collection and Online Monitoring Act (USA FREEDOM Act)

https://www.youtube.com/watch?v=XEVlyP4_11M (4:04-7:22 & 17:26-19:36)

http://www.lawfareblog.com/so-what-does-usa-freedom-act-do-anyway

http://cointelegraph.com/news/114564/nsa-celebrates-passage-of-usa-freedom-act10Why Privacy MattersPrivacyCore advantageFundamental societal valueNational Security State

http://www.pewinternet.org/2015/05/20/americans-attitudes-about-privacy-security-and-surveillance/11Right to Privacy4th AmendmentThe right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.Supreme Court DecisionsGriswold v. Connecticut (1965)

Golden Age of SurveillanceWe are living in an age of surveillance (Neil Richards, Washington University of Law)Incremental loss of privacyBut Ive got nothing to hide!Chilling EffectFreedom/Democracy Impacts

Richards, Neil M. (2013, March 25). The Dangers of Surveillance. Harvard Law Review. Vol. 126. pp. 1934-1965.

Solove, Daniel J. (2011, May 15). Why Privacy Mattes Even if You Have Nothing to Hide. The Chronicle of Higher Education. Retrieved on April 8th, 2015 from http://chronicle.com/article/Why-Privacy-Matters-Even-if/127461/

Nau, Johannes. (2014, August). Why protest? Ive got nothing to hide: Collective Action against and Chilling Effects of Internet Mass Surveillance. Retrieved on April 8, 2015 from https://netzpolitik.org/wp-upload/Collective-Action-against-and-Chilling-Effects-of-Internet-Mass-Surveillance-Dissertation-JoNau.pdf

Lerner, Mark. (2014, August 5). The Chilling Effect of Domestic Spying. American Policy Center. Retrieved on April 8, 2015 from http://americanpolicy.org/2014/08/05/the-chilling-effect-of-domestic-spying/

Stallman, Richard. (2013, October 14). How Much Surveillance Can Democracy Withstand? Wired. Retrieved on April 8, 2015 from http://www.wired.com/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-survive-surveillance/

13Patriot Act CasesSection 203Section 206Section 213Section 215Title IIISection 505

Section 203Information WallSections 203(b) and 203(d)Amended the Federal Rules of Criminal Procedures regarding grand jury proceedingsPrivacy ImplicationsSharing intercepted communications without a court orderMission Creep/Potential for AbuseUndermines the Criminal Justice System

Abramson, Larry and Godoy, Maria. (2006, February 14). The Patriot Act: Key Controversies. NPR. Retrieved on April 9, 2015 from http://www.npr.org/news/specials/patriotact/patriotactprovisions.html#issue1

Levy, Sara. (2005). The Patriot Act Grand Jury Disclosure Exception: A Proposal for Reconciling Civil Liberty and Law Enforcement Concerns. Chicago-Kent Journal of International and Comparative Law. Vol. 5. pp. 2-7.

Evans, Jennifer C. (2002). Hijacking Civil Liberties: The USA PATRIOT Act of 2001. Loyola University Chicago Law Journal. Vol. 33, Iss. 4. pp. 933-990.

Schulhofer, Stephen F. (2005). Rethinking the Patriot Act: Keeping America Safe and Free. The Century Foundation. Retrieved on April 9, 2015 from http://tcf.org/assets/downloads/20050615-rethinking-the-patriot-act.pdf

Beale, Sara S. and Felman, James E. (2002). The Consequences of Enlisting Federal Grand Juries in the War on Terrorism: Assessing the USA PATRIOT Acts Changes to Grand Jury Secrecy. Harvard Journal of Law & Public Policy. Vol. 25, No. 2. pp. 1-26.

15Section 203CounterterrorismLack of criteriaMass, indiscriminate information sharingReform IdeasRequire court orders for information acquisitionNarrow terminologyLimit who is involved in information sharingIncrease safeguards

Martin, Kate. (2005). Why Sections 203 and 905 Should be Modified. American Bar Association. Retrieved on April 10, 2015 from http://apps.americanbar.org/natsecurity/patriotdebates/203-2#opening

16Section 206Roving SurveillanceFISA WiretapsFISA Wiretaps vs. Criminal WiretapsPrivacyIntel agencies do not have to specify the target or location of surveillanceJohn Doe wiretaps2005 FBI incidentReformsNarrow search requirementsAscertainment provision

Dempsey, James. (2005). Why Section 206 Should be Modified. American Bar Association. Retrieved on April 11, 2015 from http://apps.americanbar.org/natsecurity/patriotdebates/206-2#opening

Stanker, Michael. (2003). The USA PATRIOT Act: An Egregious Violation of Our Rights or National Necessity? Moebius. Vol. 1, Iss. 2. pp. 33-40.

Center for Effective Government. (20013, September 10). The USA Patriot Act and its Impact on Nonprofit Organizations. Retrieved on April 11, 2015 from http://www.foreffectivegov.org/node/1592

Associated Press. (2005, September 30). FBI admits to wiretapping wrong numbers. Retrieved on April 11, 2015 from http://www.nbcnews.com/id/9546933/ns/us_news-security/t/fbi-admits-wiretapping-wrong-numbers/#.VSiPP5TF9sA

Sanchez, Julian. (2009, October 15). PATRIOT Powers: Roving Wiretaps. CATO Institute. Retrieved on April 11, 2015 from http://www.cato.org/blog/patriot-powers-roving-wiretaps

The Constitution Projects Liberty and Security Committee. (2009, September 22). Statement on Reforming the Patriot Act. The Constitution Project. Retrieved on April 11, 2015 from http://www.constitutionproject.org/pdf/340.pdf

17Section 213Sneak and Peek SearchesDelayed search warrant notificationsExtensive form of domestic surveillanceCounterterrorism vs. Criminal InvestigationsPrivacy trade-off4th Amendment concernsRate of UseSubstantial increase since 2002

DeRosa, Mary. (2005). Section 213 Sneak and Peek Search Warrants: A Summary. American Bar Association. Retrieved on April 10, 2015 fromhttp://apps.americanbar.org/natsecurity/patriotdebates/section-213

Witmer-Rich, Jonathan. (2014, March 15). The Rapid Rise of Delayed Notice Searches, and the Fourth Amendment Rule Requiring Notice. Pepperdine Law Review. Vol. 41, Iss. 3. pp. 509-586.

Brinkerhoff, Noel. (2014, October 28). Less than 1% of Patriot Acts Sneak and Peek Delayed Notice Warrants are Used against Terrorism. All Gov News. Retrieved on April 10, 2015 fromhttp://www.allgov.com/news/top-stories/less-than-1-of-patriot-acts-sneak-and-peek-delayed-notice-warrants-are-used-against-terrorism-141028?news=854657

Jaycox, Mark. (2014, October 26). Peekaboo, I See You: Government Authority Intended for Terrorism is Used for Other Purposes. Electronic Frontier Foundation. Retrieved on April 10, 2015 from https://www.eff.org/deeplinks/2014/10/peekaboo-i-see-you-government-uses-authority-meant-terrorism-other-uses

American Civil Liberties Union. (2002, March 7). How the USA-Patriot Act Expands Law Enforcement Sneak and Peek Warrants. Retrieved on April 10, 2015 from http://rt.com/usa/200979-patriot-act-sneak-peek/

18Section 213

Section 213ReformsRepealRequire probable causeNarrow search requirements/circumstances for Section 213 searchesShorten window for judicial authorizationFrequent reporting requirements

Section 215Metadata CollectionMetadata vs. ContentUSA FREEDOM Act ReformsScope of the programDragnet operationCounterterrorismCounter-productivePrivacyMetadata is very revealingMisuse/Abuse

http://www.lawfareblog.com/so-what-does-usa-freedom-act-do-anyway

http://rt.com/usa/268441-surveillance-court-nsa-spying/

Greenwald, Glenn. (2014). No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. New York, NY: Metropolitan Books.

Friedersdorf, Conor. (2015, April 2). When Will the NSA Stop Spying on Innocent Americans. The Atlantic. Retrieved on April 20, 2015 from http://www.theatlantic.com/politics/archive/2015/04/when-will-the-nsa-stop-spying-on-the-communications-of-innocent-americans/389375/

Schwartz, Mattathias. (2015, January 26). The Whole Haystack. The New Yorker. Retrieved on April 20, 2015 from http://www.newyorker.com/magazine/2015/01/26/whole-haystackGorman, Siobhan. (2013, August 23). NSA Officers Spy on Love Interests. The Wall Street Journal. Retrieved on April 20, 2015 from http://blogs.wsj.com/washwire/2013/08/23/nsa-officers-sometimes-spy-on-love-interests/

Lee, Timothy B. (2013, June 6). Everything you need to know about the NSAs phone records scandal. The Washington Post. Retrieved on April 20, 2015 from http://www.washingtonpost.com/blogs/wonkblog/wp/2013/06/06/everything-you-need-to-know-about-the-nsa-scandal/

21Title IIIAnti-Terrorism Financing RestrictionsRequires financial institutions to impose strict anti-money laundering measuresSuspicious Activity ReportsFinancial PrivacyCounterterrorism EffectivenessHard to trackDifficult to prevent

Morgan, Matthew J. and Heckman, James J. (2009). The Impact of 9/11 on Business and Economics: The Business of Terror. Palgrave Macmillan. New York: NY.

American Civil Liberties Union. (2009). Reclaiming Patriotism: A Call to Reconsider the Patriot Act. Retrieved on April 13, 2015 from https://www.aclu.org/files/pdfs/safefree/patriot_report_20090310.pdf

Smith, Paul J. (2008). The Terrorism Ahead: Confronting Transnational Violence in the Twenty-first Century. Routledge. New York: NY.

Donohue, Laura K. (2012). Global Anti-Terrorism Law and Policy. Cambridge University Press. New York: NY.

Baldwin, Fletcher N. and Koslosky, Daniel R. (2011, December 6). Mission Creep in National Security Law. West Virginia Law Review. Vol. 114, No. 2. pp. 669-724.

Rahn, Richard. (2002, April 18). Do You Need Financial Privacy? Washington Times. Retrieved on April 13, 2015 from http://www.discovery.org/a/1151

Gouvin, Eric J. (2003). Bringing Out the Big Guns: The USA PATRIOT Act, Money Laundering, and the War on Terrorism. Baylor Law Review. Vol. 55, No. 3. pp. 955-990.

Rockett, James and Ely, Bert. (2003, December 1). A Different Perspective of the USA PATRIOT Act Title III. The Federalist Society. Retrieved on April 13, 2015 from http://www.fed-soc.org/publications/detail/a-different-perspective-of-the-usa-patriot-act-title-iii

22Title IIIOrganized CrimeBulk cash smugglingMexican DTOs

ReformsIncrease judicial scrutiny

Smith, Paul J. (2008). The Terrorism Ahead: Confronting Transnational Violence in the Twenty-first Century. Routledge. New York: NY.

Michaels, C. William. (2007). No Greater Threat: America After September 11 and the Rise of a National Security State. Algora Publishing. New York: NY.

23Section 505National Security LettersAllows the FBI to subpoena business recordsGag orderPrivacyScope of NSLsHigh use rateMisuse/AbuseReformsImpact of the USA FREEDOM ActPresidents Review Group on Intelligence and Communications Technologies

The Constitution Projects Liberty and Security Committee. (2009, September 22). Statement on Reforming the Patriot Act. The Constitution Project. Retrieved on April 11, 2015 from http://www.constitutionproject.org/pdf/340.pdf

Willing, Richard. (2006, July 6). With only a letter, FBI can gather private data. USA Today. Retrieved on April 13, 2015 from http://usatoday30.usatoday.com/news/washington/2006-07-05-fbi-letters_x.htm

Parsons, Christi. (2014, January 3). Obama plans intelligence surveillance reforms, aides say. Los Angeles Times. Retrieved on April 14, 2015 from http://www.latimes.com/nation/la-na-obama-intelligence-20140104-story.html#axzz2pdFAe9JL&page=1

Froomkin, Dan. (2015, February 19). FBI Flouts Obama Directive to Limit Gag Orders on National Security Letters. The Intercept. Retrieved on April 13, 2015 from https://firstlook.org/theintercept/2015/02/19/fbi-flouts-obama-directive-limit-gag-orders-national-security-letters/

Harper, Lauren. (2014, January 10). Powerful National Security Letters Continue to Go Largely Unchecked. National Security Archive. Retrieved on April 14, 2015 from https://nsarchive.wordpress.com/2014/01/10/powerful-national-security-letters-continue-to-go-largely-unchecked/

http://www.lawfareblog.com/so-what-does-usa-freedom-act-do-anyway

Clarke, Richard A. et al. (2013, December 12). Liberty and Security in a Changing World. The Presidents Review Group on Intelligence and Communications Technologies. Retrieved on April 14, 2015 from http://www.lawfareblog.com/wp-content/uploads/2013/12/Final-Report-RG.pdf

Sanchez, Julian. (2014, January 9). Can We Do Without National Security Letters? Just Security. Retrieved on April 14, 2015 from http://justsecurity.org/5351/national-security-letters/

24FISASection 702FAA of 2008Domestic surveillance couched as foreign surveillancePoor government oversightSubstantial NSA discretionMillions of Americans swept up by Sec. 702 searchesCurrent Reforms/FISC Ineffective

Eddington, Zachary. (2012, October 31). Update on the FISA Amendments Act Reauthorization. Lawfare. Retrieved on April 14, 2015 from http://www.lawfareblog.com/2012/10/update-on-the-fisa-amendments-act-reauthorization/

Halpern, Sue. (2014, July 15). NSA Surveillance: What the Government Cant See. The New York Review of Books. Retrieved on April 14, 2015 from http://www.nybooks.com/blogs/nyrblog/2014/jul/15/nsa-surveillance-what-government-cant-see/

Gellman, Barton et al. (2014, July 5). In NSA-intercepted data, those not targeted far outnumber the foreigners who are. The Washington Post. Retrieved on April 14, 2015 from http://www.washingtonpost.com/world/national-security/in-nsa-intercepted-data-those-not-targeted-far-outnumber-the-foreigners-who-are/2014/07/05/8139adf8-045a-11e4-8572-4b1b969b6322_story.html

Wilhelm, Alex. (2014, July 6). Why Section 702 Reform Matters. Tech Crunch. Retrieved on April 14, 2015 from http://techcrunch.com/2014/07/06/why-section-702-reform-matters/

25FISC and Section 702Article IIILack of adversary processCases and Controversies

Fourth AmendmentSpecial Needs doctrineIncidental Collection/Minimization Requirements

http://www.brennancenter.org/sites/default/files/analysis/What_Went_%20Wrong_With_The_FISA_Court.pdf 26Implications of Sec. 702PrivacyIncidental collectionBackdoor searchesContent Collection/StoragePRISMNSA programPrivacyInternet/Cloud Computing

Goitein, Elizabeth. (2013, November 14). The NSAs Backdoor Search Loophole. Boston Review. Retrieved on April 14, 2015 from http://bostonreview.net/blog/elizabeth-goitein-nsa-backdoor-search-loophole-freedom-act

Ball, James and Ackerman, Spencer. (2013, August 9). NSA loophole allows warrantless search for US citizens emails and phone calls. The Guardian. Retrieved on April 14, 2015 from http://www.theguardian.com/world/2013/aug/09/nsa-loophole-warrantless-searches-email-calls

Kayyali, Nadia. (2014, May 7). The Way the NSA Uses Section 702 is Deeply Troubling. Heres Why. Electronic Frontier Foundation. Retrieved on April 14, 2015 from https://www.eff.org/deeplinks/2014/05/way-nsa-uses-section-702-deeply-troubling-heres-why

Freeman, Larry. (2014). An Insiders View into the Worlds Largest Data Warehouse. Tech Target. Retrieved on April 14, 2015 from http://searchstorage.techtarget.com/NetAppSponsoredNews/An-Insiders-View-into-the-Worlds-Largest-Data-Warehouse

Bamford, James. (2012, March 15). The NSA is Building the Countrys Biggest Spy Center (Watch What You Say). Wired. Retrieved on April 14, 2015 from http://www.wired.com/2012/03/ff_nsadatacenter/all/

Dotcom, Kim. (2013, June 13). Prism: concerns over government tyranny are legitimate. The Guardian. Retrieved on April 20, 2015 from http://www.theguardian.com/commentisfree/2013/jun/13/prism-utah-data-center-surveillance

Evans, Johnny. (2013, June 10). Why PRISM kills the cloud. Computerworld. Retrieved on April 20, 2015 from http://www.computerworld.com/article/2473687/cloud-computing/why-prism-kills-the-cloud.html

Hardy, Quentin. (2014, June 11). The Era of Cloud Computing. The New York Times. Retrieved on April 20, 2015 from http://bits.blogs.nytimes.com/2014/06/11/the-era-of-cloud-computing/

Kayyali, Nadia. (2014, May 7). The Way the NSA Uses Section 702 is Deeply Troubling. Heres Why. Electronic Frontier Foundation. Retrieved on April 14, 2015 from https://www.eff.org/deeplinks/2014/05/way-nsa-uses-section-702-deeply-troubling-heres-why

Clarke, Richard A. et al. (2013, December 12). Liberty and Security in a Changing World. The Presidents Review Group on Intelligence and Communications Technologies. Retrieved on April 14, 2015 from http://www.lawfareblog.com/wp-content/uploads/2013/12/Final-Report-RG.pdf

McDowell, Robert M. (2012, May 31). International Proposals to Regulate the Internet. Statement of Commissioner Robert M. McDowell before the United States House of Representatives Committee on Energy and Commerce. Retrieved on April 16, 2015 from http://www.fcc.gov/document/commr-mcdowells-congressional-testimony-5-31-2012

27Leaked Information

FISA ReformCounterterrorismQuestionable effectivenessSection 702 ReformClose the backdoor loopholeFISC ReformExtends beyond Section 702Privacy Advocate

Granick, Jennifer. (2014, January 30). Reforming the Section 702 Dragnet (Part 1). Just Security. Retrieved on April 14, 2015 from http://justsecurity.org/6574/reforming-section-702-dragnet-1/

Stone, Geoffrey R. (2014, July 3). Its Time to Shut the NSAs Backdoor Used to Spy on Americans. The Daily Beast. Retrieved on April 14, 2015 from http://www.thedailybeast.com/articles/2014/07/03/it-s-time-to-shut-the-nsa-s-backdoor-used-to-spy-on-americans.html

Sommer, Jacob. (2014). FISA Authority and Blanket Surveillance: A Gatekeeper Without Opposition. American Bar Association. Retrieved on April 20, 2015 from http://www.americanbar.org/publications/litigation_journal/2013-14/spring/fisa_authority_and_blanket_surveillance_gatekeeper_without_opposition.html

Kayyali, Nadia. (2014, August 15). What You Need to Know About the FISA Court - and How it Needs to Change. Electronic Frontier Foundation. Retrieved on April 20, 2015 from https://www.eff.org/deeplinks/2014/08/what-you-need-know-about-fisa-court-and-how-it-needs-change

Nolan, Andrew et al. (2014, March 21). Reform of the Foreign Intelligence Surveillance Courts: Introducing a Public Advocate. Congressional Research Service. Retrieved on April 20, 2015 from http://www.fas.org:8080/sgp/crs/intel/R43260.pdf

29NSA ReformRogue Agency

NSA Surveillance ProgramsMetadata (Section 215)PRISM/Electronic Content Collection (Section 702)Project BullrunGlenn Greenwald, 2014, No Place to Hide: Edward Snowden, the NSA, and the US Surveillance State. p. 130-131 30Project BullrunData Decryption ProgramNSA considers this its most important programPrivate Sector Collaboration/Coercion PrivacyWar on encryptionCybersecurityWeakens cybersecurityIncreases cybercrime Malware

Perlroth, Nicole et al. (2013, September 5). N.S.A. Able to Foil Basic Safeguards of Privacy on Web. The New York Times. Retrieved on April 20, 2015 from http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html?_r=3&&gwh=8DF47287590ACE92D91089CE03D364A8&gwt=pay

Timberg, Craig and Soltani, Ashkan. (2013, December 13). By cracking cellphone code, NSA has ability to decode private conversations. The Washington Post. Retrieved on April 20, 2015 from http://www.washingtonpost.com/business/technology/by-cracking-cellphone-code-nsa-has-capacity-for-decoding-private-conversations/2013/12/13/e119b598-612f-11e3-bf45-61f69f54fc5f_story.html

Larson, Jeff et al. (2013, September 5). Revealed: The NSAs Secret Campaign to Crack, Undermine Internet Security. ProPublica. Retrieved on April 20, 2015 from http://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption

Ball, James et al. (2013, September 6). Revealed: how US and UK spy agencies defeat internet privacy and security. The Guardian. Retrieved on April 20, 2015 from http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security

Pell, Stephanie K. (2013, Spring). Jonesing for a Privacy Mandate, Getting a Technology Fix - Doctrine to Follow. North Carolina Journal of Law & Technology. Vol. 14, Iss. 2. pp. 489-556.

Schneier, Bruce. (2014, January 6). How the NSA Threatens National Security. The Atlantic. Retrieved on April 20, 2015 from http://www.theatlantic.com/technology/archive/2014/01/how-the-nsa-threatens-national-security/282822/

31DEA License Plate DatabaseNational License Plate Recognition InitiativeStarted in 2008Program is expandingPrivacy2/3 of the population lives in border zone as defined by the DEACatalogues a substantial amount of informationLacks judicial oversightCivil Asset ForfeitureReformsEnd the programProhibit cooperation between the DEA and local/state agenciesReduce storage time

Stanley, Jay and Stein, Bennett. (2015, January 26). FOIA Documents Reveal Massive DEA Program to Record Americans Whereabouts With License Plate Readers. American Civil Liberties Union. Retrieved on April 21, 2015 from https://www.aclu.org/blog/free-future/foia-documents-reveal-massive-dea-program-record-americans-whereabouts-license?redirect=blog/technology-and-liberty-criminal-law-reform/foia-documents-reveal-massive-dea-program-record-ame

Stanley, Jay. (2012, May 18). DEA Recording Americans Movements on Highways, Creating Central Repository of Plate Data. American Civil Liberties Union. Retrieved on April 21, 2015 from https://www.aclu.org/blog/free-future/dea-recording-americans-movements-highways-creating-central-repository-plate-data?redirect=blog/technology-and-liberty-criminal-law-reform/dea-recording-americans-movements-highways-creating

Devlin, Barrett. (2015, January 27). U.S. Spies on Millions of Cars - DEA Uses License-Plate Readers to Build Database for Federal, Local Authorities. The Wall Street Journal. Retrieved on April 21, 2015 from Lexis Nexis.

Carey, Pete. (2015, January 28). Privacy fears raised over massive DEA license plate tracking program. San Jose Mercury News. Retrieved on April 21, 2015 from http://www.mercurynews.com/business/ci_27406637/privacy-fears-raised-over-massive-dea-license-plate?source=infinite

Rath, Arun and Barrett, Devlin. (2015, January 31). DEA Using License Plate Readers to Spy on Drivers. NPR. Retrieved on April 21, 2015 from http://www.npr.org/2015/01/31/382936124/dea-using-license-plate-readers-to-spy-on-drivers

Leef, George. (2014, September 12). Time For Civil Asset Forfeiture Laws to Meet the Same Fate as Jim Crow. Forbes. Retrieved on April 21, 2015 from http://www.forbes.com/sites/georgeleef/2014/09/12/time-for-civil-asset-forfeiture-laws-to-meet-the-same-fate-as-jim-crow/

Boldin, Michael. (2015, February 17). Virginia House Votes 95-4 to Restrict ALPRS, Block License Plate Tracking Program. Off Now. Retrieved on April 21, 2015 from http://www.offnow.org/virginia_house_votes_95_4_to_restrict_alprs_block_license_plate_tracking_program

32Postal Service Metadata CollectionMetadata CollectionMail Isolation Control and Tracking ProgramMail CoversFrequent UseMisuse/AbuseReformsJudicial Oversight

Nixon, Ron. (2013, July 3). U.S. Postal Service Logging All Mail for Law Enforcement. The New York Times. Retrieved on April 21, 2015 from http://www.nytimes.com/2013/07/04/us/monitoring-of-snail-mail.htmlNixon, Ron. (2014, October 27). Report Reveals Wider Tracking of Mail in U.S. The New York Times. Retrieved on April 21, 2015 from http://www.nytimes.com/2014/10/28/us/us-secretly-monitoring-mail-of-thousands.html?gwh=C143EF070981DA0A796199BC87739FD9&gwt=pay&assetType=nyt_now&_r=0

Gerstein, Josh. (2014, June 19). Snail mail snooping safeguards not followed. Politico. Retrieved on April 21, 2015 from http://www.politico.com/story/2014/06/snail-mail-snooping-safeguards-not-followed-108056.html

33DronesDrone SurveillanceFAA Modernization and Reform Act of 2012Advanced surveillance technologyLack of privacy safeguardsPublic SafetyReformsFAA GuidelinesCongressional regulations

Thompson II, Richard M. (2013, April 3). Drones in Domestic Surveillance Operations: Fourth Amendment Implications and Legislative Responses. Congressional Research Service. Retrieved on April 22, 2015 from http://fas.org/sgp/crs/natsec/R42701.pdfMcBride, Paul. (2009, Summer). Beyond Orwell: The Application of Unmanned Aircraft Systems in Domestic Surveillance Operations. The Journal of Air Law and Commerce. Retrieved on April 22, 2015 from Lexis Nexis

Oyegunle, Ajoke. (2013). Drones in the Homeland: A Potential Privacy Obstruction Under the Fourth Amendment and the Common Law Trespass Doctrine. CommLaw Conspectus: The Journal of Communications Law and Policy. Vol. 21. pp. 365-393.

Thompson II, Richard M. (2013, April 3). Drones in Domestic Surveillance Operations: Fourth Amendment Implications and Legislative Responses. Congressional Research Service. Retrieved on April 22, 2015 from http://fas.org/sgp/crs/natsec/R42701.pdf

Greenwald, Glenn. (2011, December 12). The growing menace of domestic drones. Salon. Retrieved on April 22, 2015 from http://www.salon.com/2011/12/12/the_growing_menace_of_domestic_drones/

Nakashima, Ellen and Whitlock, Craig. (2011, January 2). With Air Forces Gorgon Drone "we can see everything. The Washington Post. Retrieved on April 22, 2015 from http://www.washingtonpost.com/wp-dyn/content/article/2011/01/01/AR2011010102690.html

Villasenor, John. (2012, April 4). The Coming Proliferation of Domestic Drones: What Will be the Impact on Privacy, Safety and National Security? The Brookings Institution. Retrieved on April 22, 2015 from http://www.brookings.edu/~/media/events/2012/4/04-domestic-drones/20120404_domestic_drones.pdf

Schlag, Chris. (2013, Spring). The New Privacy Battle: How the Expanding Use of Drones Continues to Erode Our Concept of Privacy and Privacy Rights. Journal of Technology Law & Policy. Vol. 13. pp. 1-22.

34Border SurveillanceSurveillance operationsDronesBorder Patrol Border ZonePrivacy/Rights ConcernsCheckpoints/roving patrols/warrantless searchesMisuse/AbuseBorder MilitarizationLow intensity war zoneReformsReduce the 100 mile rule

http://www.truth-out.org/news/item/17513-surveillance-surge-on-the-border-how-to-turn-the-us-mexican-border-into-a-war-zonehttp://www.cato.org/publications/commentary/border-surveillance-follies http://www.washingtonpost.com/world/more-predator-drones-fly-us-mexico-border/2011/12/01/gIQANSZz8O_story.html https://www.fas.org/sgp/crs/homesec/RS21698.pdf http://www.csmonitor.com/USA/2014/0205/Drones-on-the-US-border-Are-they-worth-the-price http://www.nbcnews.com/storyline/immigration-border-crisis/eyes-sky-are-pricey-border-patrol-drones-worth-money-n153696 http://bigstory.ap.org/article/cb969df390b645998787be2cfdf79240/aclu-sues-records-border-patrols-roving-agents http://motherboard.vice.com/blog/its-official-america-is-militarizing-the-mexican-border http://www.nytimes.com/2013/07/04/business/us-border-agency-is-a-frequent-lender-of-its-drones.html?pagewanted=all

35Surveillance of Muslim CommunitiesInformant NetworksIneffective systemNewburgh fourRacistHurts intelligence gatheringDiscourages cooperationPrivacyReformsRestrict use of informants

http://www.motherjones.com/politics/2011/08/fbi-terrorist-informants.

Kundnani, Arun. (2014). The muslims are coming! Islamophobia, extremism, and the domestic war on terror. London: Verso.

http://www.hrw.org/news/2014/07/21/us-terrorism-prosecutions-often-illusion.

http://www.newamerica.org/international-security/islamophobia-extremism-and-the-domestic-war-on-terror/36Critical AffsFoucaultSecurityAnti-blacknessGenealogy

37Michel FoucaultFrench philosopherInfluential theories on power and knowledgeSurveillanceDisciplinary PowerBiopowerPanopticism

Michel Foucault, Discipline and Punish: The Birth of the Prison38Panopticon Design

Foucault & Domestic SurveillanceRelationship to the topicAbundance of ways to deploy Foucault on this topicMetadata/Content CollectionDronesResourcesMichel Foucault, Discipline & Punish: The Birth of the PrisonWilliam Staples, Everyday Surveillance: Vigilance and Visibility in Postmodern Life

McBride, Paul. (2009, Summer). Beyond Orwell: The Application of Unmanned Aircraft Systems in Domestic Surveillance Operations. The Journal of Air Law and Commerce. Retrieved on April 22, 2015 from Lexis Nexis

40SecurityYou have no civil liberties if you are dead Sen. Pat Roberts

Risk Exaggeration

Threat Construction/Self-Fulfilling Prophecies

Anti-blacknessHistory of surveilling communities of colorFBICOINTELPROCivil Rights MovementBaltimore surveillanceFleet of FBI surveillance planesDisproportionate SurveillanceGovernment AidTraffic Surveillance

http://rt.com/usa/256577-fbi-surveillance-baltimore-protests/

https://www.eff.org/deeplinks/2014/02/history-surveillance-and-black-community

https://www.brennancenter.org/blog/why-surveillance-state-everybodys-problem42GenealogyGenealogical InvestigationOrigin of the American Surveillance StateColonial practices in the Philippines Shaped our surveillance policies throughout the 20th Century and beyond

Alfred McCow, Policing Americas Empire: The United States, the Philippines, and the Rise of the Surveillance State43HomeworkLast Week Tonight with John Oliver (Surveillance)https://www.youtube.com/watch?v=XEVlyP4_11MCitizenfour (Documentary)PodcastsThe End of Privacy (NPR TED Radio Hour)How the NSA Works (Stuff You Should Know)No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State (Book by Glenn Greenwald)The End of Privacy (http://www.npr.org/programs/ted-radio-hour/265352348/the-end-of-privacy)How the NSA Works (http://www.stuffyoushouldknow.com/podcasts/how-the-nsa-works/)44