Fourth Amendment Protection Act

From Wikipedia - Reading time: 11 min

The Fourth Amendment Protection Acts, are a collection of state legislation aimed at withdrawing state support for bulk data (metadata) collection and ban the use of warrant-less data in state courts. They are proposed nullification laws that, if enacted as law, would prohibit the state governments from co-operating with the National Security Agency, whose mass surveillance efforts are seen as unconstitutional by the proposals' proponents.[1] Specific examples include the Kansas Fourth Amendment Preservation and Protection Act and the Arizona Fourth Amendment Protection Act. The original proposals were made in 2013 and 2014 by legislators in the American states of Utah, Washington, Arizona, Kansas, Missouri, Oklahoma and California. Some of the bills would require a warrant before information could be released, whereas others would forbid state universities from doing NSA research or hosting NSA recruiters, or prevent the provision of services such as water to NSA facilities.[2]

History

[edit]

The events of the 9/11 terrorist attacks led to some sweeping changes in national security policies. Through the enactment of Title II: Enhanced Surveillance Procedures of the USA PATRIOT Act of 2001, many government agencies were granted increased power of surveillance.[3] Controversy arose from the increased surveillance that was granted. Proponents[who?] of the act argued that the increased surveillance measures were necessary for the protection and safety of the country, while detractors argued that the increased power of surveillance infringed upon Fourth Amendment protections.[citation needed][4]

Among the controversial programs that were put into place was the President's Surveillance Program, which embodied the Terrorist Surveillance Program.[5] Through this surveillance program, President George W. Bush authorized the NSA to wiretap international calls where one party was suspected of having affiliations with Al Qaeda. It also reportedly allowed for data mining of emails, internet activity, text messaging and telephone call records,[6] stored in a NSA call database.[7]

The Terrorist Surveillance Program became publicly known after several NSA whistleblowers, William E. Binney, Ed Loomis, Thomas A. Drake and J. Kirk Wiebe, came forward with information about the agency's database collection program, Trailblazer, which eliminated the privacy protections for U.S. citizens that its predecessor, the ThinThread Project, promised.[8][9][10] The information presented by Binney, Loomis, Drake and Wiebe brought the controversial practices of the NSA to the public eye, further inciting the controversy around the increased power that government agencies were granted. Information continued to come forward through many national news sources over the next several years about continuation of data collection programs carried out by government agencies.[11][12][13][14]

In 2013, former NSA whistle-blower, Edward Snowden, came forward with information about continued surveillance on US Citizens through the PRISM surveillance project, that allowed the NSA to collect communications from providers like Google Inc., Yahoo and Verizon among others.[15][16][17][18] Collected data was stored in the NSA database Boundless Informant and collected through the NSA Analytical tool XKeyscore, which allowed for the collection of most any form of data, from emails, to social media, and web browsing history.[19] Snowden's revelations and released documents detailed that the NSA's data collection programs were much broader, deeper, and insidious than previously released information had shown, and included collection of data even from users of Xbox Live, World of Warcraft and Second Life, as well as NSA agents spying on their own love interests.[20][21]

In 2014, former U.S. State Department whistle-blower, John Tye, wrote an opinion piece in the Washington Post, outlining his concerns over data collection under Executive Order 12333.[22] Part 2.3 (i) allows that "incidentally obtained information that may indicate involvement in activities that may violate federal, state, local or foreign laws" may be collected, retained and disseminated.[23]

In light of all of the information that came out over the previous 12–13 years, many states began invoking their Tenth Amendment rights to propose and enact Fourth Amendment Protection Acts in order to stop NSA collection within those states, or to disallow any unconstitutionally collected data to be utilized in state courts. Some states proposed actions to stop NSA Centers from accessing state controlled utilities, such as water and electricity, in an effort to block NSA data collections from within the state.

Fourth Amendment Protection Act by state

[edit]

California

[edit]

On January 6, 2014, the state of California proposed Senate Bill 828 (2013–14). It was introduced by senators Ted Lieu and Joel Anderson, with the intention of adding Chapter 32.5 (commencing with Section 7599) to the state government's code. Its intention aimed to prohibit providing any resources, participation, or aid of any sort to requests made by federal agencies that attempt to collect metadata by means in which the state finds illegal. Furthermore, it would prohibit agencies such as the NSA from using public universities as recruitment centers, as well as prohibiting such agencies from performing research on campus grounds.[24] On November 30, 2014, it was approved by the governor and was accepted into California State law.[25][26]

Washington

[edit]

In the state of Washington, multiple bills have been proposed in order to offer protections from certain NSA data collection operations. Specifically, those conducted without warrants. In 2017, House Bill 1193 (2017-18) was introduced, and given its first reading on January 13.[27] Its primary intention was to prevent the use of data and online information obtained without a proper warrant from being used as evidence against individuals being prosecuted in a court of law. It would also prohibit the utilization of state resources and services for data collection operations that the state deems unconstitutional. In addition, any persons or corporations found to have been providing services to federal agencies for unconstitutional purposes would be guilty of misdemeanors.[28] As of 2018, the bill remains in committee. An earlier version of the bill was proposed in 2013 as House Bill 2272.[29]

Arizona

[edit]

Similar to California's Fourth Amendment Protection Act, Arizona State had also proposed their own protections under Senate Bill 1156 (2014). It was supported by many members of the Senate, including its president at the time, Andy Biggs. In Arizona, it would have prevented digital information obtained without a warrant from being used in court, prohibited federal agencies from using state funding to carry out data collection without proper warrants, and eliminated numerous gray areas not mentioned in the Fourth Amendment. It was intended to go into effect on January 1, 2015.[30] However, this bill did not pass.

Federal Level

[edit]

On June 2, 2015, President Barack Obama signed a revised version of the USA Freedom Act. Under Section 215 the mass collection of phone data was no longer allowed. Phone records could now only be obtained through the Federal Courts.[31] Companies also now had the ability to publicly report the number of records requests they had received, making it even harder for massive amounts of information to be requested.[32] This was the first time such protections were added for citizens since the attacks on September 11, 2001. Many Americans had concerns after Snowden's information leaks, causing data privacy and security concerns to become much larger and widely discussed issues. Still, others in government, such as Senate Leader Mitch McConnell, were pushing for more terrorism protections and would realize that this bill, while losing some ground on their end, was still their best chance, as protections granted from the previous bill had already expired.[33]

Even as the Government was adding privacy protections, the advancements in technology were making surveillance practices easier. Devices such as satellites, cell phones, smart cars, smart-grid power reading, smart televisions, drones and automatic license place readers, to name a few, were becoming more and more prevalent in the surveillance world and the ways that information is gathered. New technology such as stingray surveillance technology is now used to create a more prominent signal for devices to gain connectivity to the internet, or cell phone towers, which, in turn, grants access to the information stored on connected devices. These types of devices have been used by many law enforcement agencies, growing the public's concern, and need for more privacy protection laws.[34]

Two large technology companies, Microsoft and Apple, were involved in litigation with the US Government in 2016 on the basis of protecting the privacy of their consumers. In February 2016 Bill Gates, co-founder of Microsoft, filed a lawsuit against the US Government for breaking the US Constitution by not allowing Microsoft to "inform their customers when federal agencies sought their information."[35] Apple was involved in court proceedings in relations to a cell phone connected to a mass shooting in December 2015. The FBI was requesting that they unlock an encrypted cell phone so that they could gain access to the phone. This would have required Apple to write new software to bypass the password encryption on the phone. Apple felt that by doing this for this case, they would be opening this up for future cases, and removing the security of the password on the cell phones.[36]

The Supreme Court was involved in another case involving a string of robberies throughout Michigan and Ohio. A self-confessed robber in the case, gave the name and cell phone number of Timothy Carpenter to FBI agents, stating that he was involved. The FBI was able to use the location records of Timothy's cell phone to place him near the crimes, of which he was later convicted of aiding and abetting. His attorneys had argued that the cell phone records were not legally able to be used as evidence, due to lack of search warrant. However, the court had ruled that the cell phone data was not protected. After appeals, the final ruling was that "the records in this case fall on the unprotected side of the Fourth Amendment." Chief Justice John Roberts was later quoted as saying, "[...]some of the courts most challenging cases involve applying long held rules created by the courts to quickly developing technology."[37]

S. 139 was introduced on January 12, 2017, sponsored by Senator Orrin G. Hatch.[38] The bill will continue Section 702 of the Foreign Intelligence Surveillance Act that allows the NSA and FBI to further continue warrantless access to personal social media and conversation activities of foreigners to America, that also involves U.S citizens' private communications, for an additional six years.[39] The S. 139 bill has made minor key changes to potentially enhance more effective ways to protect privacy in the United States while still tracking possible terrorist attacks. A few changes will now require the Foreign Intelligence Surveillance Court to approve specified query procedures every year, as well as have the Inspector General of the Department of Justice overlook the query procedures and practices of the FBI, and have limited use of Section 702 to not allow information found to be used against U.S citizens for criminal cases. Section 702 originally expired on December 31, 2017 but was then continued until January 19, 2018 where the vote ruled in favor of the extension by 256–164. President Donald Trump signed to enact S. 139 which became Public Law No: 115-118 that same day.[40][41] On November 29, 2017 H.R. 4478 FISA Reauthorization Act of 2017, was introduced, sponsored by Republican Devin Nunes to extend Section 702.[42] Representatives Justin Amish and Zoe Lofgren offered the USA Rights Act, pertaining a more balanced scale between security and liberty as this bill protects the 4th amendment along with eliminating the warrantless backdoor searches, that would then require government officials to obtain warrants in order to seize and view American citizens' data when the NSA and FBI tack into foreigner activities seeking any relations to terrorism.[43][44][45] The bill resulted as a loss by a vote of 183–233.[46]

See also

[edit]

References

[edit]
  1. ^ "Four models of fourth amendment protection". Stan. L. Rev.
  2. ^ Vijayan, Jaikumar (2014-01-07), California lawmakers move to bar state help to NSA, Computer World, The Utah bill aims to prohibit state and local agencies from providing water to a giant new NSA data center near Salt Lake City.
  3. ^ "USA PATRIOT Act 2001". www.govinfo.gov. Archived from the original on 2018-02-05. Retrieved 2018-02-03.{{cite web}}: CS1 maint: bot: original URL status unknown (link)
  4. ^ Rubel, Alan (2007). "Privacy and the U.S.A. Patriot Act: Rights, the Value of Rights, and Autonomy". Law and Philosophy. 26 (2): 119–159. doi:10.1007/s10982-005-5970-x. S2CID 143521752. ProQuest 43185160 – via ProQuest.
  5. ^ Sanger, David E.; O'Neil, John (2006). "White House Begins New Effort to Defend Surveillance Program". The New York Times. ISSN 0362-4331. Retrieved 2018-02-03.
  6. ^ Lichtblau, Eric; Risen, James (2009-07-10). "U.S. Wiretapping of Limited Value, Officials Report". The New York Times. ISSN 0362-4331. Retrieved 2018-02-03.
  7. ^ "USATODAY.com - NSA has massive database of Americans' phone calls". usatoday30.usatoday.com. Retrieved 2018-02-03.
  8. ^ "NSA datamining pushes tech envelope". Retrieved 2018-02-03.
  9. ^ Mayer, Jane (2011-05-16). "Thomas Drake vs. the N.S.A." The New Yorker. ISSN 0028-792X. Retrieved 2018-02-03.
  10. ^ Shorrock, Tim (2013-03-26). "Obama's Crackdown on Whistleblowers". The Nation. ISSN 0027-8378. Retrieved 2018-02-03.
  11. ^ Risen, James; Lichtblau, Eric (2005-12-16). "Bush Lets U.S. Spy on Callers Without Courts". The New York Times. ISSN 0362-4331. Retrieved 2018-02-03.
  12. ^ Risen, James; Lichtblau, Eric (2005-12-21). "Spying Program Snared U.S. Calls". The New York Times. ISSN 0362-4331. Retrieved 2018-02-03.
  13. ^ Lichtblau, Eric; Risen, James (2009-04-15). "Officials Say U.S. Wiretaps Exceeded Law". The New York Times. ISSN 0362-4331. Retrieved 2018-02-03.
  14. ^ Greenwald, Glenn; Ackerman, Spencer (2013-06-27). "NSA collected Americans' email records in bulk for two years under Obama". the Guardian. Retrieved 2018-02-03.
  15. ^ Gellman, Barton; Soltani, Ashkan (2013-10-30). "NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say". Washington Post. ISSN 0190-8286. Retrieved 2018-02-03.
  16. ^ Greenwald, Glenn; MacAskill, Ewen (2013-06-07). "NSA Prism program taps in to user data of Apple, Google and others". the Guardian. Retrieved 2018-02-03.
  17. ^ "NSA slides explain the PRISM data-collection programwebsite=The Washington Post". The Washington Post. 10 July 2013. Retrieved 2018-02-03.
  18. ^ Greenwald, Glenn (2013-06-06). "NSA collecting phone records of millions of Verizon customers daily". the Guardian. Retrieved 2018-02-03.
  19. ^ Greenwald, Glenn (2013-07-31). "XKeyscore: NSA tool collects 'nearly everything a user does on the internet'". the Guardian. Retrieved 2018-02-03.
  20. ^ "World of Spycraft: NSA and CIA Spied in Online Games — ProPublica". ProPublica. Justin Elliott. 2013-12-09. Retrieved 2018-02-03.{{cite web}}: CS1 maint: others (link)
  21. ^ "NSA spied on World of Warcraft, Xbox Live, and Second Life gamers". PCWorld. Retrieved 2018-02-03.
  22. ^ Tye, John (2014-07-08). "How a Reagan order set the NSA loose". The Washington Post. Retrieved 2018-02-03.
  23. ^ "Executive Orders". National Archives. 2016-08-15. Retrieved 2018-02-03.
  24. ^ Vijayan, Jaikumar (2014-01-07). "California lawmakers move to bar state help to NSA". CSO. Retrieved 2018-02-05.
  25. ^ "Bill Text - SB-828 Assistance to federal agencies". leginfo.legislature.ca.gov. Retrieved 2018-02-05.
  26. ^ "SB-828 Assistance to federal agencies.(2013-2014)". leginfo.legislature.ca.gov. Retrieved 2018-02-05.
  27. ^ "HB 1193 - 2017-18". Washington State Legislature. Retrieved 2018-02-04.
  28. ^ Maharrey, Michael (2017-01-14). "Washington State Bill Would End Support of Warrantless Federal Spying Programs". OffNow. Retrieved 2018-02-04.
  29. ^ "Washington State Legislature". app.leg.wa.gov. Retrieved 2018-02-04.
  30. ^ title 41, chapter 9 by adding article 10; see bill text and other data on SB1156 Archived 2016-03-04 at the Wayback Machine at the Arizona legislature website.
  31. ^ "Senate approves USA Freedom Act". USA TODAY. Retrieved 2018-02-03.
  32. ^ "6 things to know about the newly approved USA Freedom Act". PBS NewsHour. 3 June 2015. Retrieved 2018-02-03.
  33. ^ Diamond, Jeremy. "Senate passes NSA reform measure". CNN Politics. Retrieved 2018-02-03.
  34. ^ Claypoole, Ted (Nov 2016). "Smarter Devices = More Vulnerability to Government and Criminals". Computer and Internet Lawyer. 33: 1–5 – via EBSCO.
  35. ^ "Bill Gates Calls For Tougher Limits On Government Snooping". Huffington Post. Reuters. 2016-04-19. Retrieved 2018-02-04.
  36. ^ "Breaking Down Apple's iPhone Fight With the U.S. Government". The New York Times. 2016-03-03. ISSN 0362-4331. Retrieved 2018-02-04.
  37. ^ Reporter, Ariane de Vogue, CNN Supreme Court. "Supreme Court takes on major Fourth Amendment case". CNN. Retrieved 2018-02-04. {{cite news}}: |first= has generic name (help)CS1 maint: multiple names: authors list (link)
  38. ^ Orrin, Hatch (2018-01-19). "Text - S.139 - 115th Congress (2017-2018): An Act to amend the Foreign Intelligence Surveillance Act of 1978 to improve foreign intelligence collection and the safeguards, accountability, and oversight of acquisitions of foreign intelligence, to extend title VII of such Act, and for other purposes". www.congress.gov. Retrieved 2018-02-07.
  39. ^ "FISA Section 702 | U.S. House of Representatives". intelligence.house.gov. Retrieved 2018-02-06.
  40. ^ 115th Congress (2017) (January 12, 2017). "S. 139 (115th)". Legislation. GovTrack.us. Retrieved February 6, 2018. An Act to amend the Foreign Intelligence Surveillance Act of 1978 to improve foreign intelligence ...{{cite web}}: CS1 maint: numeric names: authors list (link)
  41. ^ "Statement by the President on FISA Amendments Reauthorization Act of 2017". whitehouse.gov. Retrieved 2018-02-07 – via National Archives.
  42. ^ Devin, Nunes (2017-12-19). "H.R.4478 - 115th Congress (2017-2018): FISA Amendments Reauthorization Act of 2017". www.congress.gov. Retrieved 2018-02-07.
  43. ^ Zoe, Lofgren (2017-11-14). "Actions - H.R.4124 - 115th Congress (2017-2018): USA RIGHTS Act". www.congress.gov. Retrieved 2018-02-07.
  44. ^ "Bipartisan Coalition Introduces USA RIGHTS Act to Reform Secretive Warrantless Spy Program". U.S. Congresswoman Zoe Lofgren. 2017-10-24. Retrieved 2018-02-06.
  45. ^ Ackerman, Spencer; Ball, James (2013-08-09). "NSA loophole allows warrantless search for US citizens' emails and phone calls". the Guardian. Retrieved 2018-02-07.
  46. ^ Kelly, Erin (2018-01-11). "House votes to renew surveillance law that may collect Americans' emails without warrants". USA TODAY. Retrieved 2018-02-06.

Licensed under CC BY-SA 3.0 | Source: https://en.wikipedia.org/wiki/Fourth_Amendment_Protection_Act
14 views |
Download as ZWI file
Encyclosphere.org EncycloReader is supported by the EncyclosphereKSF