!! History Commons Alert, Exciting News
Profile: Center for Democracy and Technology
Center for Democracy and Technology was a participant or observer in the following events:
The Foreign Intelligence Surveillance Court of Review, in its first-ever ruling, overturns a ruling by the Foreign Intelligence Surveillance Court (see May 17, 2002) that stopped the Justice Department from being granted sweeping new powers to conduct domestic surveillance on US citizens. [American Civil Liberties Union, 11/18/2002; FindLaw, 11/18/2002 ]
'Rubber Stamp' - The ACLU’s Ann Beeson says of the ruling, “We are deeply disappointed with the decision, which suggests that this special court exists only to rubberstamp government applications for intrusive surveillance warrants. “As of today, the Attorney General can suspend the ordinary requirements of the Fourth Amendment in order to listen in on phone calls, read e-mails, and conduct secret searches of Americans’ homes and offices.” The ACLU and other civil liberties organizations filed a friend-of-the-court brief asking that the original ruling stand. The ACLU and its partners are considering appealing the decision to the Supreme Court, as well as asking Congress to legislate tighter restrictions on the Justice Department’s ability to conduct domestic surveillance. Beeson notes that appealing the FISA Review Court’s decision might be impossible: “This is a major Constitutional decision that will affect every American’s privacy rights, yet there is no way anyone but the government can automatically appeal this ruling to the Supreme Court. Hearing a one-sided argument and doing so in secret goes against the traditions of fairness and open government that have been the hallmark of our democracy.” The FISC Review Court is a special three-judge panel appointed by Chief Justice William Rehnquist in accordance with provisions of the Foreign Intelligence Surveillance Act. The judges include appellate court justices Laurence Silberman, Edward Leavy, and Ralph Guy, Jr. [American Civil Liberties Union, 11/18/2002]
Law Professor Slams Ruling - Law professor Raneta Lawson Mack is highly critical of the ruling. Mack writes that the court twisted its reasoning upon itself in order to give the Justice Department what it asked for. It misrepresented the facts and legal arguments of the case. It gratuitously insulted the ACLU and other “friends of the court” in its ruling. It wrote that the entire FISA law is constitutional even though its standards conflict with the Fourth Amendment. To justify its ruling from a legislative standpoint, the Review Court cherrypicked statements by legislators that supported the Justice Department’s stance while ignoring those from other viewpoints. It called the Bush administration’s efforts to challenge the “firewall” between law enforcement and foreign intelligence as “heroic,” even though the Justice Department, Congress, and FISA itself recognizes and accepts the dichotomy. It accepted without question or evidence the government’s contention that false, misleading, or inaccurate FBI affidavits in numerous FISA applications were a result of “confusion within the Justice Department over implementation” of the firewall procedures that the Justice Department itself drafted and implemented. Mack writes that the court failed entirely to grapple with one key question that, if considered, would, in her opinion, “easily have laid bare the Executive Branch’s thinly-veiled quest for unconstrained authority to invade the privacy of US citizens with minimal oversight.” The question is, “why would the government need to alter procedures for obtaining FISA warrants when the lower FISA court had never rejected an application? Indeed, according to the lower FISA court opinion the court had ‘reviewed and approved several thousand FISA applications, including many hundreds of surveillances and searches of US persons [and had] long accepted and approved minimization procedures authorizing in-depth information sharing and coordination with criminal prosecutors.’” The lower court ruling provided for coordination and sharing of information between law enforcement and government agencies, Mack notes, and writes that in light of that finding, “can the government seriously contend that the minimization procedures that it drafted in 1995, which the lower FISA court dutifully adopted, were too restrictive, warranting a still more lenient approach?” Mack considers the ruling to be “legally unsound.” She is appalled by the Review Court’s groundless implication that FISA hindered the ability of the FBI to anticipate and perhaps prevent the 9/11 attacks. “What the lower FISA court recognized and, indeed, what all Americans should legitimately fear is that the Executive branch is disingenuously using its September 11th failures in conjunction with the hastily drafted and poorly crafted Patriot Act to ‘give the government a powerful engine for the collection of foreign intelligence information targeting US persons.’ By adhering to the minimization procedures, the lower FISA court merely sought to assure that the balance between legitimate national security concerns and individual privacy was not disturbed by seemingly unconstrained executive power.… [T]here is… no question that a secret FISA appellate court structure, with judges hand selected by the Chief Justice of the US Supreme Court, that hears only the government’s evidence, and grants only the government a right to appeal is a singularly inappropriate forum to resolve issues that threaten the fundamental rights and values of all US citizens. The only question that remains is how much further our justice system will be derailed in pursuit of the war on terrorism.” [Jurist, 11/26/2002]
Entity Tags: Ralph Guy, Jr., Raneta Lawson Mack, William Rehnquist, US Department of Justice, Open Society Institute, US Supreme Court, Laurence Silberman, Foreign Intelligence Surveillance Court, Center for National Security Studies, American Civil Liberties Union, Center for Democracy and Technology, Foreign Intelligence Surveillance Court of Review, Ann Beeson, Electronic Frontier Foundation, Edward Leavy, Electronic Privacy Information Center
Timeline Tags: Civil Liberties
Congress expands the Patriot Act (see October 26, 2001) by approving an intelligence spending bill with a provision that gives the FBI the power to subpoena business documents and transactions from a broad range of businesses and entities—including libraries, travel agencies, and even eBay—without court warrants. This reduces oversight of the FBI and shifts power away from the judiciary. The Patriot Act already allows the FBI to acquire bank records and communications records by issuing a National Security Letter (NSL) affirming that the information it seeks is relevant to an open investigation; the targeted institution is legally “gagged,” unable to inform anyone, especially the subject of the investigation, of the subpoena. The new law expands the use of NSLs by redefining “financial institution” to include insurance companies, real estate agents, the US Postal Service, travel agencies, casinos, pawn shops, car dealers and any other business whose “cash transactions have a high degree of usefulness in criminal, tax or regulatory matters.” The provision is one of the most controversial parts of the so-called “Patriot II” act (see February 7, 2003) that was withdrawn after the public learned of its elements. Like most intelligence spending bills, this one was drafted in secret and passed with little debate or public comment. Law professor Chris Schroeder, a former Justice Department assistant attorney general, says the insertion of the provision shows that “people who want to expand the powers of the FBI didn’t want to stop after Patriot II was leaked. They are going to insert these provisions on a stealth basis. It’s insidious.” James Dempsey of the Center for Democracy and Technology agrees: “On its face, it’s a cryptic and seemingly innocuous amendment. It wasn’t until after it passed both houses that we saw it. The FBI and CIA like to try to graft things like this into intelligence bills.” CIA Director Porter Goss, when he was chairman of the House Intelligence Committee, defended the provision, saying it is necessary to keep pace with terrorists and the changing economy. “This provision brings the definition of ‘financial institution’ up to date with the reality of the financial industry,” Goss told House members. “This provision will allow those tracking terrorists and spies to ‘follow the money’ more effectively and thereby protect the people of the United States more effectively.” Timothy Edgar of the American Civil Liberties Union says the bill goes too far in expanding executive branch powers. “The more that checks and balances against government abuse are eroded, the greater that abuse,” Edgar says. “We’re going to regret these initiatives down the road.” [Wired News, 11/24/2003]
Entity Tags: Tim Edgar, US Department of Justice, USA Patriot Act, Porter J. Goss, House Intelligence Committee, Central Intelligence Agency, Center for Democracy and Technology, American Civil Liberties Union, James Dempsey, Chris Schroeder, Federal Bureau of Investigation, Domestic Security Enhancement Act of 2003
Timeline Tags: Civil Liberties
A new investigation modeled on the Church Committee, which investigated government spying (see April, 1976) and led to the passage of the Foreign Intelligence Surveillance Act (FISA - see 1978) in the 1970s, is proposed. The proposal follows an amendment to wiretapping laws that immunizes telecommunications companies from prosecution for illegally co-operating with the NSA. A detailed seven-page memo is drafted outlining the proposed inquiry by a former senior member of the original Church Committee.
Congressional Investigative Body Proposed - The idea is to have Congress appoint an investigative body to discover the full extent of what the Bush White House did in the war on terror that may have been illegal and then to implement reforms aimed at preventing future abuses—and perhaps to bring accountability for wrongdoing by Bush officials. Key issues to investigate include:
The NSA’s domestic surveillance activities;
The CIA’s use of rendition and torture against terrorist suspects;
The U.S. government’s use of military assets—including satellites, Pentagon intelligence agencies, and U2 surveillance planes—for a spying apparatus that could be used against people in the US; and
The NSA’s use of databases and how its databases, such as the Main Core list of enemies, mesh with other government lists, such as the no-fly list. A deeper investigation should focus on how these lists feed on each other, as well as the government’s “inexorable trend towards treating everyone as a suspect,” says Barry Steinhardt, the director of the Program on Technology and Liberty for the American Civil Liberties Union (ACLU).
Proposers - The proposal is a product of talks between civil liberties advocates and aides to Democratic leaders in Congress. People consulted about the committee include aides to House Speaker Nancy Pelosi (D-CA) and Judiciary Committee chairman John Conyers (D-MI). The civil liberties organizations include the ACLU, the Center for Democracy and Technology, and Common Cause. However, some Democrats, such as Pelosi, Senate Intelligence Committee chairman John D. Rockefeller (D-WV), and former House Intelligence chairwoman Jane Harman (D-CA), approved the Bush administration’s operations and would be made to look bad by such investigation.
Investigating Bush, Clinton Administrations - In order that the inquiry not be called partisan, it is to have a scope going back beyond the start of the Bush administration to include the administrations of Bill Clinton, George H. W. Bush, and Ronald Reagan. The memo states that “[t]he rise of the ‘surveillance state’ driven by new technologies and the demands of counter-terrorism did not begin with this administration.” However, the author later says in interviews that the scope of abuse under George W. Bush would likely be an order of magnitude greater than under preceding presidents.
'Imagine What We Don't Know' - Some of the people involved in the discussions comment on the rationale. “If we know this much about torture, rendition, secret prisons, and warrantless wiretapping despite the administration’s attempts to stonewall, then imagine what we don’t know,” says a senior Democratic congressional aide who is familiar with the proposal. Steinhardt says: “You have to go back to the McCarthy era to find this level of abuse. Because the Bush administration has been so opaque, we don’t know [the extent of] what laws have been violated.” “It’s not just the ‘Terrorist Surveillance Program,’” says Gregory Nojeim from the Center for Democracy and Technology. “We need a broad investigation on the way all the moving parts fit together. It seems like we’re always looking at little chunks and missing the big picture.”
Effect on Presidential Race Unknown - It is unknown how the 2008 presidential race may affect whether the investigation ever begins, although some think that Democratic candidate Barack Obama (D-IL), said to favor open government, might be more cooperative with Congress than his Republican opponent John McCain (R-AZ). However, a participant in the discussions casts doubt on this: “It may be the last thing a new president would want to do.” [Salon, 7/23/2008]
YouTube logo. [Source: YouTube.com]Senator Joseph Lieberman (D-CT), the chairman of the Senate Homeland Security and Governmental Affairs Committee, asks Google, the parent company of the online video-sharing site YouTube, to “immediately remove content produced by Islamist terrorist organizations” from YouTube and prevent similar content from reappearing. The company refuses Lieberman’s request. Lieberman writes a letter to Eric Schmidt, the CEO and chairman of Google, saying in part that YouTube “unwittingly, permits Islamist terrorist groups to maintain an active, pervasive and amplified voice despite military setbacks or successful operations by the law enforcement and intelligence communities.” Lieberman also asks that Google identify changes it plans to make in YouTube’s community guidelines and delineate exactly what it will do to enforce those guidelines. Lieberman says removing such content ought to be “a straightforward task since so many of the Islamist terrorist organizations brand their material with logos or icons identifying their provenance.” However, YouTube responds by saying that taking such actions is not as simple as Lieberman believes, and refuses to remove any videos from anyone without consideration as to whether the videos are legal, nonviolent, or non-hate speech videos. “While we respect and understand his views, YouTube encourages free speech and defends everyone’s right to express unpopular points of view,” the company says. YouTube has removed a few videos that Lieberman identified last week after determining that the individual videos violated the company’s community guidelines. However, “most of the videos, which did not contain violent or hate speech content, were not removed because they do not violate our Community Guidelines,” the company says. Lieberman’s committee recently released a report that indicated some Islamist terrorist groups used Internet chat rooms, message boards, and Web sites to help recruit and indoctrinate members, and to communicate with one another. Some critics have said that the committee’s report unfairly singles out Muslims as possible extremists. Additionally, civil libertarians and privacy activists speak out against what they see as Lieberman’s attempt to restrain freedom of speech. John Morris of the Center for Democracy and Technology says that Lieberman’s request is a practical impossibility; worse, to have sites such as YouTube pre-screen content would radically change how the Internet is used, he says. “The government can’t get involved in suppressing videos if the content is not illegal.” [Federal Computer Weekly, 5/19/2008; US Senate, 5/19/2008; YouTube, 5/19/2008]
Receive weekly email updates summarizing what contributors have added to the History Commons database
Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.