The USA PATRIOT Act and the Library donna Bair-Mundy Discussion question: What is privacy? Why do we need it?

Download Report

Transcript The USA PATRIOT Act and the Library donna Bair-Mundy Discussion question: What is privacy? Why do we need it?

The USA PATRIOT Act
and the Library
donna Bair-Mundy
Discussion question:
What is privacy?
Why do we need it?
Informational privacy - Westin's
definition - part 1
Privacy is the claim of individuals,
groups, or institutions
to determine for themselves
when, how, and to what extent
information about them
is communicated to others.
Westin, Alan F. 1970. Privacy and freedom. London: Bodley Head.
Informational privacy - Westin's
definition - part 2
Viewed in terms of the relation of
the individual to social participation,
privacy is the voluntary and temporary
withdrawal of a person from the
general society through physical
or psychological means, either
in a state of solitude or, when among
larger groups, in a condition of
anonymity or reserve.
Informational privacy - Westin's
definition - part 3
The individual's desire for privacy
is never absolute, since participation
in society is an equally powerful desire.
Informational privacy - Westin's
definition - part 4
Thus each individual is continually
engaged in a personal adjustment
process in which he balances
the desire for privacy with the desire
for disclosure and communication
of himself to others, in light of
the environmental conditions and
social norms set by the society
in which he lives.
Informational privacy - Westin's
definition - part 5
The individual does so in the face
of pressures from the curiosity of others
and from the processes of surveillance
that every society sets in order
to enforce its social norms.
Desire to avoid
being
manipulated or
dominated wholly
by others
Release from tensions
of life in society
requires release from
pressure of playing
social roles
Westin's privacy theory: 4
functions of privacy
Personal
autonomy
Emotional
release
Self-evaluation
Limited &
protected
communication
Need to integrate
experiences into
Share confidences and
meaningful
Westin,
Alanpattern;
F. 1970. Privacy
and freedom.
London:
intimacies
only with
those one
essential
for creativity
trusts
Bodley
Head.
Individual privacy versus
individual secrecy
Privacy
Allowed and in some
cases required for
socially-sanctioned acts.
Stress reducing.
Secrecy
Involves
socially proscribed acts.
Stress inducing.
Margulis, Stephen T. 1977. Conceptions of privacy: current status and next steps. Journal
of social issues 33(3):5-21, p. 10.
Margulis, Stephen T. 2003. Privacy as a social issue and behavioral concept. Journal of
social issues 59(2):243-261.
Election day
Us
Us
Us
Us
Them
Us
On the network news:
Ayman al-Zawahiri
So you do a search . . .
A few days later . . .
Fourth Amendment
The right of the people to be secure in
their persons, houses, papers, and
effects, against unreasonable searches
and seizures, shall not be violated, and
no Warrants shall issue, but upon
probable cause, supported by Oath or
affirmation, and particularly describing
the place to be searched, and the
persons or things to be seized.
General warrants (1)
•
•
•
•
No specific individual
No specific crime
No specific place to be searched
No specific items to be sought
• Illegal according to Sir Edward Coke’s
Institutes of the Lawes of England (first
published 1642 and 1644)
• Illegality confirmed by Sir Matthew Hale
• Illegality confirmed by Sir William
Blackstone
General warrants (2)
• Suspicion of crime related to
government revenue
• Used against anyone who dared to
challenge or limit the authority of
Parliament or the crown
• John Wilkes (member of Parliament)
• Anonymously wrote critical essay
published in North Briton
• General warrant leads to massive
arrests, Wilkes ► Tower of London
Writs of assistance
• Any customs official could enter “any
House, shop, Cellar, Warehouse or
Room or other Place...”
• Seize unaccustomed goods
• Lasted for the life of the sovereign
under which it was issued plus six
months
• According to John Adams, major
factor in seeking American
Independence
Amendment IX
(the compromise)
The enumeration in the Constitution,
of certain rights, shall not be
construed to deny or disparage others
retained by the people.
Discussion question:
Why do we need
surveillance?
Need for surveillance (1)
Need for surveillance (2)
Need for surveillance (2)
Need for surveillance (2)
Train
Depart
Arrive
1
2
2:30 p.m. 6:30 p.m.
3:30 p.m. 8:00 p.m.
Beniger, James R. 1986. The control revolution: technological and
economic origins of the Information Society. Cambridge, Mass.: Harvard
University Press.
Surveillance in a transforming
society
Zuboff, Shoshana. 1988. In the age of the smart machine: the future
of work and power. New York: Basic Books.
Roles of Surveillance (1)
Used to catch the criminals
Necessitated by technology
Facilitated by technology
Used as means to control
workers
Roles of surveillance (2)
Provision of services (Social Security)
Allows participation (Voter registration)
Protection against threat
Means of social control
• Discover and rout out deviance
• Threat of surveillance used to
promote compliance with the law
Routing out “deviants”
Round-up of Pennsylvania Quakers
(1777)
Sedition Act of 1798
Espionage Act of 1917 – 1918 amend.
Internment of persons of Japanese
ancestry—WW II
Surveillance - Plague model
Highly visible
Isolation and
observation
Social control
Foucault, Michel. 1995. Discipline and punish: the birth of the
prison. New York: Vintage Books.
Surveillance—Panopticon model
Jeremy Bentham
•
•
•
•
Legal theorist
Rationalism
Utilitarianism
Eccentric
Jeremy Bentham’s Panopticon
cells
entry
walkway
inspector’s
lodge
Panopticon society
Communication Interception
1830s
Telegraph
invented
1860s
Wiretapping
during
Civil War
1870s
Telephone
invented
1880s
First reports
of
wiretaps
in press
1960s
Packet
switching
Packet
sniffers
Re-thinking constitutional
privacy
Hearings on
1964surveillance activities
U.S. Senate
by federal agencies;
Long Subcommittee first looked at IRS
1965
Griswold v. Connecticut
381 U.S. 479
Not on wire-tapping.
"Zone of privacy"
created by 1st, 3rd,
4th, 5th, and 9th
amendments
No warrantless wiretapping in
criminal cases
1967
Katz v. United States
389 U.S. 347
Congress Acts
1968
The Omnibus Crime Control
and Safe Streets Act of 1968
(“Federal Wiretapping Act“),
U.S. Code
18 USC Section 2510 et seq.
Wiretapping illegal but when crime has been or
is being committed law enforcement can, with a
warrant, engage in wiretapping for limited
periods. Provides judicial oversight for law
enforcement wiretapping.
National security wiretapping
1972
U.S. v. U.S. District Court
for the Eastern District of Michigan
“Keith”
“the customary Fourth Amendment
requirement of judicial approval before
initiation of a search applies in
domestic security cases”
19
50
19
52
19
54
19
56
19
58
19
60
19
62
19
64
19
66
19
68
19
70
19
72
19
74
19
76
19
78
19
80
19
82
19
84
19
86
19
88
19
90
19
92
19
94
19
96
19
98
20
00
20
02
20
04
20
06
Articles in the New York Times
with the word “Orwellian”
90
80
70
60
1974
(major Watergate revelations)
50
40
30
20
10
0
Information Privacy
Privacy Act of 1974
Privacy Act of 1974
• Government should be more open
about data it keeps on individuals.
• Individuals have a right to see
information the government collects
and to correct data that is incorrect.
• Limits on information that can be
collected and uses of that
information
• Limits on external disclosures of
information collected
FISA
1978
Foreign Intelligence
Surveillance Act
U.S. Code
50 USC Sections 1801-1863
Electronic mail
1993
ECPA
Electronic
Communications
Privacy Act
Addressed the need to protect e-mail.
ECPA
§ 2511. Interception and disclosure of wire, oral,
or electronic communications prohibited
§ 2701. Unlawful access to stored
communications
ECPA
(c) Exceptions.— Subsection (a) of this section
does not apply with respect to conduct
authorized— (1) by the person or entity providing
a wire or electronic communications service;
(2) by a user of that service with respect to a
communication of or intended for that user; or
(3) in section 2703, 2704 or 2518 of this title.
September 11, 2001
Congress Acts
USA PATRIOT Act
Uniting and Strengthening America
by Providing Appropriate Tools
Required to Intercept and
Obstruct Terrorism
Public law 107-56; 155 Stat. 272.
Path to the USA PATRIOT Act
MATA/ATA
(DOJ Bill)
Rep. James
Sensenbrenner
H.Res.
264
Asst. Atty. Gen.
Viet Dinh
House
Senate
H.R. 2975
USA Act
S. 1510
USA Act
Sen. Patrick
Leahy
Judiciary Comm.
H.R. 3108
H.R. 3162
USA PATRIOT Act
Signed into law by
President George W.
Bush October 26,
2001
The USA PATRIOT Act
H.R. 3162
The Purpose
To deter and punish terrorist
acts in the United States and
around the world, to enhance
law enforcement investigatory
tools, and for other purposes.
The USA PATRIOT Act
The Language
SEC. 218. FOREIGN INTELLIGENCE
INFORMATION.
Sections 104(a)(7)(B) and section
303(a)(7)(B) (50 U.S.C. 1804(a)(7)(B) and
1823(a)(7)(B)) of the Foreign Intelligence
Surveillance Act of 1978 are each
amended by striking `the purpose' and
inserting `a significant purpose'.
The U.S. Code
Sections 104(a)(7)(B) and section 303(a)(7)(B) (50
U.S.C. 1804(a)(7)(B) and 1823(a)(7)(B)) of the Foreign
Intelligence Surveillance Act of 1978 are each
amended by striking `the purpose' and inserting `a
significant purpose'.
TITLE 50 > CHAPTER 36 > SUBCHAPTER I > § 1804.
Applications for court orders
(7) a certification …
(B) that a
the
significant
purpose of
purpose
the surveillance
of the
is to
obtain foreign
surveillance
is intelligence
to obtain foreign
information;
intelligence
information;
Investigative powers in US
Code – After USA PATRIOT Act
1968
1978
Federal
Wiretapping
Act
Foreign
Intelligence
Surveillance
Act
Provisions in the PATRIOT Act
Computer communications
takeover
Hacker’s
Computer
Intermediary
Computer
Victim
Computer
Before PATRIOT Act:
Operator of intermediary computer could not allow law
enforcement access to hacker’s communication on intermediary
Provisions in the PATRIOT Act
Roving wiretaps in FISA cases
Wiretaps can move from
telephone to telephone and
jurisdiction to jurisdiction
without getting additional
warrants
Problem: Law enforcement can
wiretap any telephone used by
a suspect even when not being
used by the suspect
The USA PATRIOT Act
The Complaints— Records vulnerable
Section 215—Amending FISA 501(a)
The Director of the [FBI] or a designee of the
Director ... may make an application for an order
requiring the production of any tangible things
(including books, records, papers, documents, and
other items) for an investigation to protect against
international terrorism or clandestine intelligence
activities, provided that such investigation of a
United States person is not conducted solely upon
the basis of activities protected by the first
amendment to the Constitution.
The USA PATRIOT Act
The Complaints—Freedom of Speech
Section 215—Amending FISA 501(d)
No person shall disclose to any other
person (other than those persons
necessary to produce the tangible things
under this section) that the Federal
Bureau of Investigation has sought or
obtained tangible things under this
section.
ALA on government intrusion
“The First Amendment’s guarantee
of freedom of speech and of the
press requires that the
corresponding rights to hear what
is spoken and read what is written
be preserved, free from fear of
government intrusion, intimidation,
or reprisal.”
ALA on the PATRIOT Act
“The American Library Association
(ALA) opposes any use of
governmental power to suppress the
free and open exchange of knowledge
and information or to intimidate
individuals exercising free
inquiry…ALA considers that sections
of the USA PATRIOT ACT are a
present danger to the constitutional
rights and privacy rights of library
users.”
Department of Justice
Department of Justice
USA PATRIOT Act & Libraries
• 2005– FBI presents National Security
letter and demands “any and all
subscriber information, billing
information, and access logs of any
person or entity” associated with a
specified IP address during a specified
period
• Librarians fought gag order in court
• Librarians speak out
Library Awareness Program
• Begun during Cold War*
• Desire to restrict access to unclassified
scientific information by foreign nationals
• Desire to recruit librarians to report on
“foreigners”
• Agent told librarians to report name and
reading habits of anyone with a foreign
sounding name or foreign sounding accent
• Librarians who criticized program were
investigated
*Curt Gentry gives onset year as 1962: Gentry, Curt. 1991. J. Edgar
Hoover: the man and the secrets. New York: Norton., pp. 759-760.