Spying on the Internet is Orders of Magnitude More Invasive Than Phone Metadata

When you pick up the phone, who you’re calling is none of the government’s business. The NSA’s domestic surveillance of phone metadata was the first program to be disclosed based on documents from whistleblower Edward Snowden, and Americans have been furious about it ever since. The courts ruled it illegal, and Congress let the section of the Patriot Act that justified it expire (though the program lives on in a different form as part of the USA Freedom Act).

Yet XKEYSCORE, the secret program that converts all the data it can see into searchable events like web pages loaded, files downloaded, forms submitted, emails and attachments sent, porn videos watched, TV shows streamed, and advertisements loaded, demonstrates how Internet traffic can be even more sensitive than phone calls. And unlike the Patriot Act’s phone metadata program, Congress has failed to limit the scope of programs like XKEYSCORE, which is presumably still operating at full speed. Maybe Verizon stopped giving phone metadata to the NSA, but if a Verizon engineer uploads a spreadsheet full of this metadata without proper encryption, the NSA may well get it anyway by spying directly on the cables that the spreadsheet travels over.

The outrage over bulk collection of our phone metadata makes sense:Metadata is private. Americans call suicide prevention hotlines, HIV testing services, phone sex services, advocacy groups for gun rights and for abortion rights, and the people they’re having affairs with. We use the phone to schedule job interviews without letting our current employer know, and to manage long-distance relationships. Most of us, at one point or another, have spent long hours on the phone discussing the most intimate details about our lives. There isn’t an American alive today who didn’t grow up with at least some access to a telephone, so Americans understand this well.

But Americans don’t understand the Internet yet. Bulk collection of phone metadata is, without a doubt, a violation of your privacy, but bulk surveillance of Internet traffic is orders of magnitude more invasive. People also use the Internet in all the ways they use phones — often inadvertently sharing even more intimate details through online searches. In fact, the phone network itself is starting to go over the Internet, without customers even noticing.

XKEYSCORE, as well as NSA’s programs that tap the Internet directly and feed data into it, have some legal problems: They violate First Amendment rights to freedom of association; they violate the Wiretap Act. But the biggest and most obvious concerns are with the Fourth Amendment.

The Fourth Amendment to the U.S. Constitution is short and concise:

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

It means that Americans have a right to privacy. If government agents want to search you or seize your data, they must have a warrant. The warrant can only be issued if they have probable cause, and the warrant must be specific. It can’t say, “We want to seize everyone’s Internet traffic to see what’s in it.” Instead, it must say something like, “We want to seize a specific incriminating document from a specific suspect.”

But this is exactly what’s happening:

The government is indiscriminately seizing Internet traffic to see what’s in it, without probable cause. The ostensible justification is that, while tens of millions of Americans may be swept up in this dragnet, the real targets are foreigners. In a legal document called USSID 18, the NSA sets out policies and procedures that purportedly prevent unreasonable searches of data from U.S. persons.

But it doesn’t prevent, or even claim to prevent, unreasonable seizures.

Kurt Opsahl, general counsel of the Electronic Frontier Foundation, explains: “We have a fundamental disagreement with the government about whether [data] acquisition is a problem. Acquisition is a seizure and has to be compliant with the Fourth Amendment.”

If you read USSID 18 carefully, you’ll see that it appears to limit, with many exceptions, the government’s ability to intentionally collect data concerning U.S. persons. But the Department of Defense, under which the NSA operates, defines “collection” differently than most of us do. It doesn’t consider seized data as “collected” until it’s been queried by a human.

If you email your mom, there’s a good chance the NSA will intercept the message as it travels through a fiberoptic cable, such as the ones that make up the backbone of the Internet, eventually making its way to an XKEYSCORE field site. You can thwart this with encryption: either by encrypting your email (hopefully someday all parents will know how to use encrypted email), or by using email servers that automatically encrypt with each other. In the absence of such encryption, XKEYSCORE will process the email, fingerprint it and tag it, and then it will sit in a database waiting to be queried. According to the Department of Defense, this email hasn’t been “collected” until an analyst runs a query and the email appears on the screen in front of them.

When NSA seizes, in bulk, data belonging to U.S. citizens or residents, data that inevitably includes information from innocent people that the government does not have probable cause to investigate, the agency has already committed an unconstitutional “unreasonable seizure,” even if analysts never query the data about innocent U.S. persons.

The NSA has legal justifications for all their surveillance:

more

https://firstlook.org/theintercept/2015/07/09/spying-internet-order...

Views: 275

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Doc Vega posted blog posts
8 hours ago
tjdavis posted a video

Australia's Sex v Gender Case Could Change Women's Rights GLOBALLY

Australian media are ignoring a landmark fight to reclaim sex based rights and protectionsfor all women and girls. This constitutional law case is not only r...
12 hours ago
tjdavis posted a photo
yesterday
Less Prone commented on tjdavis's video
Thumbnail

"The Chinese thought it was an elaborate joke" | Helen Joyce

"It is so ridiculous and sad how we are being manipulated to accept all this nonsense. "
yesterday
Doc Vega posted blog posts
yesterday
Less Prone favorited tjdavis's video
yesterday
tjdavis posted a video

Afroman - Hunter Got High (Official Video)

Support Afroman and what this video is about by buying HUNTER GOT HIGH merch! LET PEOPLE KNOW HOW YOU FEEL! https://basterecords.com/pages/artists/afroman-me...
yesterday
Burbia commented on tjdavis's video
yesterday
Burbia commented on KLC's group MUSICWARS
yesterday
Burbia posted videos
Sunday
Burbia commented on Burbia's video
Sunday
Burbia commented on Sandy's video
Thumbnail

'Then CBS Fired You?': Jim Jordan Questions Catherine Herridge About Reporting On Biden, Hunter

"How many compartments of the government are blatantly corrupt? The 1st Amendment is constantly…"
Sunday
Sandy posted photos
Sunday
tjdavis commented on tjdavis's video
Thumbnail

Judge Joe Brown Just LEAKED JAW DROPPING Info About Diddy's Case

"Best Legal Explanation Of The Trump Trials about a minute in."
Sunday
tjdavis posted videos
Sunday
tjdavis posted photos
Sunday
tjdavis favorited Doc Vega's blog post Welcome Back to the Hive
Saturday
Doc Vega posted blog posts
Saturday
Less Prone commented on tjdavis's photo
Thumbnail

iconism

"Germany remains a country under military occupation by its conqueror. US has 21 military bases and…"
Saturday
Larry Harmen's 2 blog posts were featured
Saturday

© 2024   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted