Section 702 and the Collection of International Telephone and Internet Content
@article{Donohue2015Section7A, title={Section 702 and the Collection of International Telephone and Internet Content}, author={Laura K. Donohue}, journal={Harvard Journal of Law and Public Policy}, year={2015}, volume={38}, pages={117} }
Section 702 of the Foreign Intelligence Surveillance Act (FISA) authorizes the NSA to collect the electronic communications of non-U.S. targets located overseas. Recent media reports and declassified documents reveal a more extensive program than publicly understood. The article begins by considering the origins of the current programs and the relevant authorities, particularly the transfer of part of the post-9/11 President’s Surveillance Program to FISA. It outlines the contours of the 2007…
13 Citations
The Discriminatory Executive & the Rule of Law
- Political Science, LawSSRN Electronic Journal
- 2020
Today, the executive enjoys unprecedented power, particularly in the area of national security. By and large, this authority is not meaningfully restrained by Congress or the courts. However, some…
The US Legal System on Data Protection in the Field of Law Enforcement. Safeguards, Rights and Remedies for EU Citizens.
- Law
- 2015
At the request of the LIBE Committee of the European Parliament, this study surveys the U.S. system of data protection in the field of federal law enforcement. Since the legal category of “data…
Intelligence Legalism and the National Security Agency's Civil Liberties Gap
- Law
- 2014
This paper examines the National Security Agency, its compliance with legal constraints and its respect for civil liberties. But even if perfect compliance could be achieved, it is too paltry a goal.…
Fighting Global Surveillance: Lessons from the American Muslim Community
- Political ScienceUniversity of Michigan Journal of Law Reform
- 2022
The United States government has been spying on its citizens through a massive surveillance infrastructure that is unrestricted to a particular target or suspicion of wrongdoing. The statutory and…
The Essence of the Fundamental Rights to Privacy and Data Protection: Finding the Way Through the Maze of the CJEU’s Constitutional Reasoning
- LawGerman Law Journal
- 2019
Abstract In the constitutional shaping of the concept of essence of fundamental rights, the case law of the Court of Justice of the EU (“CJEU” or “the Court”) in the field of privacy and data…
They See you and yet you Don't See them: Privacy in the Multilayered National Surveillance State Realm: A Dystopian Digital Society?
- Computer Science
- 2018
This paper avowedly asserts that in such cases consumers (pursuant a data breach) have a natural right to seek redress and compensation from courts based on the damage of loss of chance of exclusive control of one´s personal data.
Terrorism and Democratic Recession
- Political Science, Sociology
- 2018
This short essay examples the potential causal mechanisms that might link terrorism to democratic decline. That causal pathway is often asserted in political rhetoric about terrorism — but such…
U.S. Individuals' Perceptions of Government Electronic Surveillance After Passage of the USA Patriot Act
- Art
- 2018
U.S. Individuals’ Perceptions of Government Electronic Surveillance After Passage of the USA Patriot Act
Legal Implications of Data Mining: Assessing the European Union's Data Protection Principles in Light of the United States Government's National Intelligence Data Mining Practices
- Computer Science
- 2016
This dissertation addresses some of the data protection challenges that have arisen from globalization, technological progress, terrorism and seamless cross-border flows of personal data. The focu…
Trolling new media: violent extremist groups recruiting through social media
- Psychology, Political Science
- 2015
Technology/Information technology; Technology/Telecommunication technology; Terrorism and threats; Terrorism and society/Psychology of terrorism; Terrorism and threats/Counterterrorism
References
SHOWING 1-10 OF 10 REFERENCES
The Fourth Amendment and the Global Internet
- Law
- 2014
This Article considers how Fourth Amendment law should adapt to the global nature of Internet surveillance. It focuses on two types of problems not yet addressed by courts. First, the Supreme Court’s…
Warrantless Physical Searches for Foreign Intelligence Purposes: Executive Order 12,333 and the Fourth Amendment
- Political Science
- 1985
Aristotle/politics.1.one.html [http://perma.cc/ERW5-T3AC]; available in the Original Greek at http
- Aristotle/politics.1.one.html [http://perma.cc/ERW5-T3AC]; available in the Original Greek at http
- 1990
United States v. Stokes, 710 F.Supp. 2d 689 United States v. Esparza-Mendoza, 265 F
- aff'd 726 F.3d 880 (7th Cir Utah 2003), aff'd 386 F.3d 953 (10th Cir. 2004); United States v. Guitterez, 983 F.Supp. 905, 912 (N.D. Cal. 1998), rev'd on other grounds, 203 F.3d 833 (9th Cir. 1999) (unpublished). 436. See Kerr, supra note 434. 437. 459 F.3d 618
- 2003
Director of National Intelligence); see also 154 Director of National Intelligence , to Hon
- National Security Investigations and Prosecutions 116. Open/Closed Hearing: FISA Before the S. Select Comm. on Intelligence, 110th Cong
- 2007
Reply Brief for the Petitioners at 15, Clapper v. Amnesty Int'l USA
- Reply Brief for the Petitioners at 15, Clapper v. Amnesty Int'l USA
concurring). 511. 414 U.S. at 232 (quoting People v. Chiagles, 237 N.Y. 193, 197, 142 N.E. 583, 584 (1923)). 512. Id.; see, e.g., Chandler v. Miller, 520 U
- 516. Harold J. Krent, Of Diaries and Data Banks: Use Restrictions Under the Fourth Amendment, 74 TEX. L. REV. 49
- 1995
available at http://www.nctc.gov/docs/ NCTCWhitePaperOverviewofNCTC2012AGGBaselineSafeguards050114.pdf [http://perma
- VAJ7-Q4Y2]. 608. NAT'L COUNTERTERRORISM CTR., ATTORNEY GENERAL GUIDELINES, supra note 607 re Sealed Case
- 2011
Warrantless electronic surveillance has been used by the Executive to collect intelligence information since at least the mid-1800s. " ). 458. See, e.g., United States v
- Warrantless electronic surveillance has been used by the Executive to collect intelligence information since at least the mid-1800s. " ). 458. See, e.g., United States v
- 1985
307. See supra Part II.A.6. 308. See, e.g., 154 CONG. REC. H5757 Dir. Of Nat'l Intelligence, to Nancy Pelosi, Speaker, House of Representatives); 154 CONG. REC. H5740 (daily ed
- 307. See supra Part II.A.6. 308. See, e.g., 154 CONG. REC. H5757 Dir. Of Nat'l Intelligence, to Nancy Pelosi, Speaker, House of Representatives); 154 CONG. REC. H5740 (daily ed
- 2008