Beruflich Dokumente
Kultur Dokumente
https://www.commondreams.org/view/2013/08/09-2?print
Return
1 of 4
8/10/2013 3:26 PM
https://www.commondreams.org/view/2013/08/09-2?print
broadly than the communications of the particular, identified target. Notably, the NSAs procedures state (emphasis added):
[I]n those cases where NSA seeks to acquire communications about the target that are not to or from the target, NSA will either employ an Internet Protocol filter to ensure that the person from whom it seeks to obtain foreign intelligence information is located overseas, or it will target Internet links that terminate in a foreign country.
In plain English: the NSA believes it not only can (1) intercept the communications of the target, but also (2) intercept communications about a target, even if the target isnt a party to the communication. The most likely way to assess if a communication is about a target is to conduct a content analysis of communications, probably based on specific search terms or selectors. And that, folks, is what we call a content dragnet. Importantly, under the NSAs rules, when the agency intercepts communications about a target, the author or speaker of those communications does not, thereby, become a target: the target remains the original, non-US person. But, because the target remains a non-US person, the most robust protection for Americans communications under the FISA Amendments Act (and, indeed, the primary reassurance the government has given about the surveillance) flies out the window. If you communicate about a target of NSA surveillance, your citizenship is irrelevant: the only thing standing between you and NSA surveillance is your IP address or the fiber optic path through which your communications flow. Privacy Protections Must Be Stronger than an IP Address or the Path our Communications Happen to Take The NSA only limits this type of broad content dragnet in two ways: a filter based on IP addresses or directing its surveillance at Internet links that terminate in a foreign country.1 Presumably, the IP filter is used in circumstances where the NSAs surveillance is being conducted on U.S. soil. The agency simply filters out known U.S. IP addresses and scans the content of the rest. But there are a host of reasons that an Americans IP address might not be representative of their location. First, there are a variety of privacy-enhancing technologies like Tor or VPNs that could easily make wholly domestic communications appear as though they were occurring overseas. Second, IP addresses, in general, are imperfect measures of a persons location: if a large ISP (like, for example, AT&T) is assigned a block of IP addresses, an IP address assigned to someone in Canada one day could be assigned to an American the next, and vice versa. And all this, of course, says nothing about nationality or legal status: a given IP address says nothing about the citizenship of the person using the device. The only other limitation on this type of content dragnet is targeting Internet links in foreign countries. Again, like IP filtering, this is not an effective way to ensure that Americans communications are not intercepted and analyzed. In particular, because third-party providers (like Google, Yahoo, or Microsoft) tend to have redundant and distributed operations around the world, theres a very real chance that your wholly domestic email, sent between two U.S. citizens might travel and be "stored" on data centers around the world. Targeting an Internet link that terminates abroad would inevitably carry large amounts of purely "domestic" communications. An Example: Targeting Vladimir Putin (and Everyone Else)
2 of 4
8/10/2013 3:26 PM
https://www.commondreams.org/view/2013/08/09-2?print
At this point, it might be useful to provide an example. Say the NSA wants to target Vladimir Putin, the President of Russia, under Section 702. Putin is (a) a non-US-person, (b) (usually) located outside the United States, and (c) would clearly be expected to communicate foreign intelligence information. He is thus eligible for targeting under Section 702. The NSA would then intercept Putins calls, emails, chats, and other communications (including those directed at the United States and involving United States citizens). Under the NSAs rules, though, the agency can also intercept all communications about Putin. To accomplish this, NSA presumably performs a content analysis -- probably occurring both within the United States and overseas -- of large swaths of communications, using deep packet inspection to root out electronic communications about Putin. In this example, under the NSAs procedures, a U.S. citizen sending an email about Putins frequent, shirtless poses to another U.S. citizen could have their communications intercepted and analyzed by NSA under a variety of conditions: if they're outside the U.S.; if they're inside the U.S., using Tor, and their IP address looks like it's outside the U.S.; if they're inside the U.S., using a VPN, and their IP address looks like it's outside the U.S.; if they're inside the U.S. and their IP address doesn't accurately reflect their location for any host of reasons; if they're inside the U.S. and their communications are backed up or stored abroad. In each of these examples, the NSA believes it has the authority to intercept your communications, even though in most examples the person doing the communicating is (1) a US person, (2) located within the United States, (3) communicating with someone within the United States, and (4) not communicating with the "target" of an investigation. While the NSA may not intercept every email about Putins shirtless poses, based on its procedures, it believes it has the authority. Such an interpretation of the governments authority under the FAA violates the spirit, if not the letter, of the law. Not to mention the Constitution. After a Full and Public Investigation, We Need to Rein in the NSA's Use of Section 702 Lately, the focus of the NSA debate has shifted to the NSAs domestic associational tracking program the collection and storage of millions of Americans call record information. And rightly so: the program is unconstitutional, and EFF has filed suit to stop it immediately. But Section 702 should not be forgotten: it needs attention and reform as well. As the debate continues, when Diane Feinstein tells you that the government cannot listen to an American's telephone calls or read their emails without a court warrant issued upon a showing of probable cause, shes not telling you the truth: the government can read your emails without ever even asking a judge and without even attempting to demonstrate that probable cause exists, just so long as your emails have a foreign IP address or your communications happen to leave the country. Our constitutional right to communicate without our government listening in has been fundamentally reinterpreted and diminished in secret: the NSA's procedures show that all that stands between government surveillance of our communication is an IP address. But the constitution demands more. Join us, and over 500,000 others, in calling on Congress to establish a special committee to investigate the NSAs domestic spying operation, to rein in the laws the government uses to conduct this type of spying,
3 of 4
8/10/2013 3:26 PM
https://www.commondreams.org/view/2013/08/09-2?print
and to hold elected officials accountable for misleading the American public. This work is licensed under a Creative Commons Attribution-Share Alike 3.0 License Mark Rumold is a staff attorney at the Electronic Frontier Foundation, working primarily on the FOIA Litigation for Accountable Government (FLAG) Project. more Mark Rumold
4 of 4
8/10/2013 3:26 PM