Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

Catherina

(35,568 posts)
Fri Jun 21, 2013, 06:58 PM Jun 2013

EFF In Depth Review: New NSA Documents Expose How Americans Can Be Spied on Without A Warrant



June 21, 2013 | By Kurt Opsahl and Trevor Timm
In Depth Review: New NSA Documents Expose How Americans Can Be Spied on Without A Warrant

The Guardian published a new batch of secret leaked FISA court and NSA documents yesterday, which detail the particulars of how government has been accessing Americans’ emails without a warrant, in violation of the Constitution. The documents lay bare fundamental problems with the ineffectual attempts to place meaningful limitations on the NSA’s massive surveillance program.

Essentially, the new documents, dated July 2009 and approved in August 2010, detail how the NSA deals with the huge streams of information it receives during the collection program that gathers the content of email and telephone calls, allowing it to keep vast quantities of content it could never get with a warrant. They may not be the current procedures - more on that in another blog post shortly.

The Guardian published two documents: one showing the procedures for determining if their target is foreign for purposes of surveillance under the FISA Amendments Act (FAA) and the other describing the NSA’s “minimization” procedures when they come across United States persons, which also sets out the myriad ways they can keep Americans’ communications instead of minimizing them.

Weak Standards for Avoiding Intentionally Targeting Americans

The FAA was enacted in 2008, intending to put a veneer of legal restrictions on aspects of the unconstitutional NSA spying program that has been in place since 2001. The heavily criticized law purports to protect Americans by prohibiting the NSA from “intentionally targeting” United States persons. The procedures describe a process more intent on making sure it was not “intentional” than ensuring Americans were not actually spied upon.

The Washington Post previously reported that the NSA only needs to have 51% confidence in a person’s “foreignness.” These new documents reveal that if the NSA cannot determine its target's 'foreignness,' they can keep on spying. Instead, you “will be presumed to be a non-United States person unless [you] can be positively identified as a United States person."

The targeting document also references a key fact that the NSA has previously shrouded in secrecy and word games: the existence of an NSA database of the content of communications. When checking for “foreignness,” the document instructs the NSA to “Review NSA content repositories and Internet communications data repositories.” In the Jewel litigation, we have contended for years that the NSA has a database of content, and now have an explicit reference.

The targeting document also exposes the government’s deceptive strategy to down-play their gigantic database of all the phone call records of Americans, obtained by misusing Section 215 of the PATRIOT Act. They collect all information on who you call and how long the call lasts, but as President Obama emphatically stated "There are no names." Maybe not in that database, but the documents here shows that NSA also maintains a separate database of names, telephone numbers and other identifiers.

Minimizing Domestic Communications Rules Littered With Exceptions

The second document published yesterday explains the NSA’s “minimization” procedures. Minimization refers to the process that is supposed to limit the exposure of Americans. The NSA, however, has decided to minimize the minimization.

Critically, this document reveals various loopholes that allow the NSA to access your data and read your emails without a warrant. According to the NSA document, they can retain and use information from Americans if:

= They were retained due to limitation on the NSA’s ability to filter communications.

- They contain information on criminal activity or a threat of harm to people or property. This is not very comforting – the Fourth Amendment wouldn’t mean anything if the government could search your house everyday, but would only act if they found evidence of a crime inside.

- They are encrypted or could be used for traffic analysis.

- They contain "foreign intelligence information," including if it is contained within attorney-client communications.

Your protection is summed up best by the NSA’s own description: “Personnel will use reasonable discretion in determining whether information acquired must be minimized.” While the government claims that a court order is required before they listen to an American’s call, this is only if an analyst, in his reasonable discretion, decided that the parties were American. Otherwise, no court order and no Constitutional protections are applied.

Moreover, the minimization document has tremendous loopholes. The NSA may provide un-minimized data to the CIA and FBI, if they identify the target, and to foreign governments for “technical or linguistic assistance.” While the data would then be subject to rules for those agencies, there is little assurance there would be no abuse.

Using Email Encryption or Tor Is Grounds for Surveillance

At EFF, we have long recommended anyone who cares about privacy should use tools such as PGP (“Pretty Good Privacy”) email encryption and Tor, which anonymizes your location. We still do, but are disturbed by the way the NSA treats such communications.

In the United States, it has long been held that there is a Constitutional right to anonymous speech (http://ilt.eff.org/index.php/Speech:_Anonymity), and exercising this right cannot be grounds for the government to invade your privacy. The NSA blows by all that by determining that, if the person is anonymous, then necessarily the NSA is not intentionally targeting a US person, with a rare exception when they have "positively identified" the user as an American. Thus, in the NSA’s view, if you use Tor, the protections for a US person simply do not apply.

More appallingly, the NSA is allowed to hold onto communications solely because you use encryption. Whether the communication is domestic or foreign, the NSA will hang on to the encrypted message forever, or at least until it is decrypted. And then at least five more years. (1)

Traffic Analysis

NSA also says they can keep domestic communications that are "reasonably believed to contain technical data base information." The phrase “technical data base” is a specifically defined term that means “information maintained for cryptographic, traffic analytic or signal exploitation purposes.”

This suggests that the NSA believe it can keep domestic communication to the extent that they can be used for traffic analysis. This is a limitation without a meaning: all communications can be used for traffic analysis. In other words, with an aggressive read of this, they can keep all communications and don’t have to discard any.

Attorney-Client Privilege Means Nothing

The attorney client privilege is a long-standing feature of American law, one of the oldest and most cherished privileges through out the ages. As one court explained, it is the cornerstone of the privilege is “that one who seeks advice or aid from a lawyer should be completely free of any fear that his secrets will be uncovered.”

The NSA document shows they cut through this privilege like a hot knife through butter. The NSA only has to stop looking at the communication if the person is known to be under criminal indictment in the United States and communicating with her attorney for that particular matter.

This remarkably myopic view of the privilege means communications between attorneys and clients in many cases will be unduly spied on. This is exactly what the ACLU was worried about when they challenged the constitutionality of the FISA Amendments Act. They alleged that attorneys working with clients overseas had an ethical obligation not to electronically communicate with them because the NSA was likely able to read their emails. While the Supreme Court dismissed their suit for lack of standing, these documents at least in part, confirm their fears.

This also means any attorney-client communications with someone like Julian Assange of WikiLeaks, who has never been indicted in the U.S., would be fair game.

Even where the privilege applies, the NSA does not destroy the information. The privileged nature is noted in the log, to “protect it” from use in criminal prosecutions, but the NSA is free to retain and use the information for other purposes. No limits on other uses, so long as the NSA General Counsel approves. This is a complete perversion of the attorney-client privilege. The privilege is designed to allow free communication of attorneys and those who they represent, so the client can get good counsel without hiding the truth from his attorney. It is not simply about preventing that communication from being used as evidence in a criminal case.

What It All Means: All Your Communications are Belong to U.S.

In sum, if you use encryption they’ll keep your data forever. If you use Tor, they’ll keep your data for at least five years. If an American talks with someone outside the US, they’ll keep your data for five years. If you’re talking to your attorney, you don’t have any sense of privacy. And the NSA can hand over you information to the FBI for evidence of any crime, not just terrorism. All without a warrant or even a specific FISA order.

It’s time the government is held accountable for these gross constitutional violations. Email your representative to demand a full-scale independent investigation into the NSA now.

(1.) Dear future NSA analyst: 09c841a6940f59d3f405c603db03366171617984ea45ecb59213fd00a6b822c7.

EFF's Copyright Policy: Any and all original material on the EFF website may be freely distributed at will under the Creative Commons Attribution License, unless otherwise noted.

https://www.eff.org/deeplinks/2013/06/depth-review-new-nsa-documents-expose-how-americans-can-be-spied-without-warrant
13 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
EFF In Depth Review: New NSA Documents Expose How Americans Can Be Spied on Without A Warrant (Original Post) Catherina Jun 2013 OP
Because you encrypt your email, they may do with your communication what they will. Sick. dkf Jun 2013 #1
Me too Catherina Jun 2013 #4
Excellent piece jsr Jun 2013 #2
We can hear you now (and a whole lot more!) blkmusclmachine Jun 2013 #3
Keep on keepin' on, Catherina! Th1onein Jun 2013 #5
Lol, Thank you. Pass me blkmusclmachine's headphones next lol. It's just gettin louder... n/t Catherina Jun 2013 #6
5 New Revelations About NSA Surveillance ProSense Jun 2013 #7
K&R forestpath Jun 2013 #8
kr HiPointDem Jun 2013 #9
Well, that just can't be!!! bvar22 Jun 2013 #10
But it's leeeeegal! Catherina Jun 2013 #11
Also, never forget that every single truedelphi Jun 2013 #13
the EFF vs the talking points Monkie Jun 2013 #12
 

dkf

(37,305 posts)
1. Because you encrypt your email, they may do with your communication what they will. Sick.
Fri Jun 21, 2013, 07:05 PM
Jun 2013

This has got to be a joke. Glad the EFF is there to make sure we understand.

I am a proud supporter of the EFF!

ProSense

(116,464 posts)
7. 5 New Revelations About NSA Surveillance
Fri Jun 21, 2013, 08:17 PM
Jun 2013

This is from Tuesday (http://www.democraticunderground.com/10023041631)

5 New Revelations About NSA Surveillance

—By Dana Liebelson

1) Surveillance Has Contributed to Thwarting More Than 50 Terror Plots Since 9/11

<...>

2) The NSA Doesn't Need Court Approval Each Time it Searches Americans' Phone Records

NSA Deputy Director John Inglis said that 22 NSA officials are authorized to approve requests to query an agency database that contains the cellphone metadata of American citizens. (Metadata includes the numbers of incoming and outgoing calls, the date and time the calls took place, and their duration.) Deputy AG Cole also said that all queries of this database must be documented and can be subject to audits. Cole also said that the the NSA does not have to get separate Foreign Intelligence Surveillance Court (FISC) approval for each query; instead, the agency merely has to file a monthly report with the court on how many times the database was queried, and how many of those searches targeted the phone records of Americans.

3) 10 NSA Officials Have Permission to Give Information About US Citizens to the FBI

There are 10 NSA officials—including Inglis and Alexander—involved in determining whether information collected about US citizens can be provided to the FBI. It can only be shared if there's independent evidence that the target has connections to a terrorist organization. Inglis said that if the information is found to be irrelevant, it must be destroyed. If the NSA mistakenly targets an American citizen, it must report this to the Foreign Intelligence Surveillance Court.

4) Other Countries are Less Transparent Than the US, Officials Say

Cole said that the FISA Amendments Act provides more due process than is afforded to citizens of European countries, including Germany, the U.K., and France. Alexander added that "virtually all" countries have laws that compel telecommunications firms to turn over information on suspects.

5) Fewer Than 300 Phone Numbers Were Targeted in 2012

NSA officials say that even though the agency has access to Americans' phone records, it investigated fewer than 300 phone numbers connected to US citizens in 2012. The officials did not provide any detail on the number of email addresses targeted.

http://www.motherjones.com/mojo/2013/06/5-new-revelations-nsa-top-secret-surveillance-programs

Here's How the NSA Decides Who It Can Spy On
http://www.democraticunderground.com/10023060180

bvar22

(39,909 posts)
10. Well, that just can't be!!!
Fri Jun 21, 2013, 08:28 PM
Jun 2013

I read a bunch of [font color=Blue]Little Blue Links[/font] yesterday that PROVE you are wrong,
and if you doubt that, you are a RACIST or a HATER!!!!

...because What else could it be?

You can't attack THAT logic.



Catherina

(35,568 posts)
11. But it's leeeeegal!
Fri Jun 21, 2013, 08:33 PM
Jun 2013

It's legal, transparent, and has sufficient oversight: Three arguments the antebellum Democratic Party could have made for slavery.

truedelphi

(32,324 posts)
13. Also, never forget that every single
Fri Jun 21, 2013, 09:46 PM
Jun 2013

Jewish person arrested by the Third Reich was labeled a terrorist by that government. Anne Frank's family was guilty of possessing an unauthorized radio - a "terrorist" offense and the offense listed on the arresting policemen's papers..

Who will the Fourth Reich's terrorists be? Undoubtedly it will be those of us who don't want fracking and PROTEST IT. And who don't want The Keystone XL Pipeline, and PROTEST IT.

And who don't want Monsanto, etc.

 

Monkie

(1,301 posts)
12. the EFF vs the talking points
Fri Jun 21, 2013, 08:38 PM
Jun 2013

i know the EFF stands for freedom, while the talking points bow down
great post.

Latest Discussions»General Discussion»EFF In Depth Review: New ...