Computers, Privacy & the Constitution

View   r4  >  r3  >  r2  >  r1
DavidHammondFirstPaper 4 - 05 May 2017 - Main.DavidHammond
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"
Line: 10 to 10
 What if I had a magic ball that sucked up every spoken conversation, written correspondence or activity anyone ever engaged in? What if my magic ball had unlimited storage capacity and an ability to quickly sift through the information to tell me anything I wanted to know? What if the magic ball were in the hands of the government?
Changed:
<
<
Existing normative frameworks and jurisprudence for the law of war, criminal law, and international law are generally applicable to every dimension of the cyber domain.

What have the law of war and international law got to do with it?

The challenge for policymakers is the application of existing frameworks to cyber and articulating principles that government agents can use to determine their scope of authority while protecting US networks and critical infrastructure. The same is true for the intentional or incidental collection of information regarding a US person. Indeed there is a distinction between citizen and non citizen in relation to the rights afforded to them. Generally, the Constitutional protections apply to citizens and places under US control. Difficulty arises when there is conflation between citizen and non-citizen or uncertainty about whether US control exists.

Why is this restricted definition of the problem correct? I thought difficulties arose because the rules were being changed.
>
>
Existing normative frameworks and Constitutional jurisprudence are generally applicable to every dimension of the cyber domain.
 
Added:
>
>
The challenge for policymakers is the application of existing frameworks to cyber and articulating principles that government agents can use to determine their scope of authority while protecting US networks and critical infrastructure. The same is true for the intentional or incidental collection of information regarding a US person. Indeed there is a distinction between citizen and non-citizen in relation to the rights afforded to them. Generally, the Constitutional protections apply to citizens and places under US control. Difficulty arises when there is conflation between citizen and non-citizen or uncertainty about whether US control exists.
 

US Metadata Policy

Line: 33 to 22
 2. acts of war (attacks, typically attributed to a nation-state) 3. or espionage (criminal, but generally accepted international activity that does not modify electronic data but does look at it)
Changed:
<
<
For the most part, intelligence agencies were involved in defending US networks and infrastructure from the attacks.
>
>
The Federal Bureau of Investigations focusses on the first framework, while the national security apparatus is authorized to focus on the latter two frameworks, balancing “need for security and preserving those freedoms that make us who we are." (President Obama, May 23, 2013; https://www.nsa.gov/news-features/press-room/statements/2013-08-09-the-nsa-story.shtml).
 
Changed:
<
<
Who says so, on what evidence?

However, according to Snowden, active espionage targeting foreign citizens was being conducted by the US. In the collection of foreign records, incidental collection of US citizens occurred. This information is called metadata.

No. It's also called content of communications. The attempt to reduce the problem to traffic analysis is disingenuous, and you've fallen for it.
>
>
However, according to Snowden, active espionage targeting foreign citizens was being conducted by the National Security Agency (NSA). In the collection of foreign records, incidental collection of US citizens occurred. Snowden also revealed that the content of the communication was able to be accessed by NSA. This information collectively is referred to as metadata.
 

Snowden Aftermath

Changed:
<
<
In the aftermath of the Snowden leaks, the US government put additional controls on the maintenance of metadata. For example, telecommunication companies would be required to maintain the data and only turn it over to the government if there was a warrant. This directly took some of the metadata out of governmental hands and underscored the importance of particularity in search warrants. In the digital age, protection of individual autonomy hinges on how metadata is used. As described above, this question is partly answered by policymakers, putting regulatory safeguards within the intelligence system to ensure personal information is not being improperly used. The other part should be answered by the Supreme Court.
>
>
In the aftermath of the Snowden leaks, the US government put additional controls on the maintenance of metadata, specifically as it related to US citizens. For example, US telecommunication companies would be required to maintain the data and only turn it over to the government if there was a warrant. This directly took some of the metadata out of governmental hands and underscored the importance of particularity in search warrants. In the digital age, protection of individual autonomy hinges on how metadata is used. As described above, this question is partly answered by policymakers, putting regulatory safeguards within the intelligence system to ensure personal information is not being improperly used. The other part should be answered by the Supreme Court.
 

Supreme Court Jurisprudence

Line: 60 to 40
 3. where a reasonable expectation of privacy exists

Is collection of Metadata a search?

Changed:
<
<
Under that very specific definition, the unfiltered capture of information would not constitute a search. Even if justices believe that Supreme Court 4th Amendment jurisprudence is flawed, the Supreme Court is unlikely to make sweeping moves toward redefining searches to include metadata. A more realistic possibility is that the Supreme Court could limit the government’s use of the metadata. Something akin to the exclusionary rule could be used to put systemic safeguards in place.
>
>
Under that very specific definition, the unfiltered capture of information would not constitute a search. Even if justices believe that Supreme Court 4th Amendment jurisprudence is flawed, the Supreme Court is unlikely to make sweeping moves toward redefining searches to include metadata. A more realistic possibility is that the Supreme Court could limit the government's use of the metadata. Something akin to the exclusionary rule could be used to put systemic safeguards in place. Another possibility is to invoke the Freedom of Speech guaranteed in the 1st Amendment. The argument is that by subjecting American citizens' private conversations to government review, albeit through a warrant, speech is chilled.
 

If Deemed Constitutional, Is it Good Policy?

Changed:
<
<
Collecting and storing massive amounts of information is not good policy. To date, the program has not thwarted a terrorist plot. Further, the information being stored could be used for nefarious purposes. An unscrupulous presidential administration could use the program to locate and silence political dissidents. For example, during the Obama administration, the IRS was accused of targeting conservative organizations for audits and regulatory enforcement. If US cyber capability were pointed internally and used for nefarious ends, a truly despotic state could be established. Although unlikely, procedural safeguards voluntarily imposed by policy makers and mandated by the judiciary will prevent the infringement on individual liberty.
>
>
Collecting and storing massive amounts of information is not good policy. To date, the program has not thwarted a terrorist plot. Further, the information being stored could be used for nefarious purposes. An unscrupulous presidential administration could use the program to locate and silence political dissidents. For example, during the Obama administration, the IRS was accused of targeting conservative organizations for audits and regulatory enforcement. If US cyber capability were pointed internally and used for nefarious ends, a truly despotic state could emerge. Procedural safeguards voluntarily imposed by policy makers and mandated by the judiciary will prevent the infringement on individual liberty. Putting limits on the ability to deploy technology may allow nefarious actors to act badly but it will ensure the citizens of this country remain free.
 

Conclusion

Changed:
<
<
The Magic Ball exists. For lawyers and policymakers, the question is how to maintain a free society with the existence of this Magic Ball. One answer is for individuals to cease using electronic means of communication. That seems backward thinking. Another option is to put safeguards in place that prevent the unauthorized use or dissemination of information. Like nuclear weapons, the mere existence does not precipitate use. I am optimistic that we can put adequate controls that limit dissemination and maintain individual liberty. As President Eisenhower eloquently stated: “Only a sturdy and vigilant citizenry, deeply dedicated to liberty and alert to any external or internal encroachment, can sustain freedom. Where sturdiness and vigilance, where clarity of vision are weakened… freedom come[s] face to face with its deadliest internal enemy, the misled and complacent citizen.”

If this essay is about traffic analysis, it could be much shorter. If the "magic ball" analogy is relevant, or facts have been actually consulted, the piece is not about traffic analysis. "Metadata collection" is about anonymity. You might have inquired whether the Fourth Amendment is the only relevant source of constitutional limitation.

The route to improvement is the resolution of this basic tension in the essay's design.

>
>
The Magic Ball exists. For US citizens, lawyers, and policymakers, the question is how to maintain a free society with the existence of these omniscient powers. One answer is for individuals to cease using electronic means of communication or to only use them autonomously. That seems backward thinking. Sailors do not surrender their freedom of navigation by identifying themselves on the high seas. Another option is to put safeguards in place that prevent the unauthorized use or dissemination of information. Like nuclear weapons, the mere existence does not precipitate use. We can put adequate controls that limit collection and dissemination in order to maintain individual liberty. As President Eisenhower eloquently stated: "Only a sturdy and vigilant citizenry, deeply dedicated to liberty and alert to any external or internal encroachment, can sustain freedom. Where sturdiness and vigilance, where clarity of vision are weakened... freedom come[s] face to face with its deadliest internal enemy, the misled and complacent citizen." -- DavidHammond - 05 May 2017
 
Deleted:
<
<
  \ No newline at end of file

DavidHammondFirstPaper 3 - 30 Apr 2017 - Main.EbenMoglen
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"
Deleted:
<
<
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.
 

Is the Storing of Metadata by the United States Government a Search in Violation of the 4th Amendment?

-- By DavidHammond - 02 Mar 2017

Changed:
<
<
Introduction
>
>

Introduction

 What if I had a magic ball that sucked up every spoken conversation, written correspondence or activity anyone ever engaged in? What if my magic ball had unlimited storage capacity and an ability to quickly sift through the information to tell me anything I wanted to know? What if the magic ball were in the hands of the government?
Changed:
<
<
Existing normative frameworks and jurisprudence for the law of war, criminal law, and international law are generally applicable to every dimension of the cyber domain. The challenge for policymakers is the application of existing frameworks to cyber and articulating principles that government agents can use to determine their scope of authority while protecting US networks and critical infrastructure. The same is true for the intentional or incidental collection of information regarding a US person. Indeed there is a distinction between citizen and non citizen in relation to the rights afforded to them. Generally, the Constitutional protections apply to citizens and places under US control. Difficulty arises when there is conflation between citizen and non-citizen or uncertainty about whether US control exists.
>
>
Existing normative frameworks and jurisprudence for the law of war, criminal law, and international law are generally applicable to every dimension of the cyber domain.

What have the law of war and international law got to do with it?

The challenge for policymakers is the application of existing frameworks to cyber and articulating principles that government agents can use to determine their scope of authority while protecting US networks and critical infrastructure. The same is true for the intentional or incidental collection of information regarding a US person. Indeed there is a distinction between citizen and non citizen in relation to the rights afforded to them. Generally, the Constitutional protections apply to citizens and places under US control. Difficulty arises when there is conflation between citizen and non-citizen or uncertainty about whether US control exists.

Why is this restricted definition of the problem correct? I thought difficulties arose because the rules were being changed.

US Metadata Policy

Edward Snowden showed that the United States systematically maintained information concerning US persons. US intelligence analysts defended the collection by saying it was incidental to their duties. To better understand the paradigm government cyber operators work in it is necessary to divide cyber activity into three frameworks:

1. criminal (lawlessness, typically attributed to individuals) 2. acts of war (attacks, typically attributed to a nation-state) 3. or espionage (criminal, but generally accepted international activity that does not modify electronic data but does look at it)

For the most part, intelligence agencies were involved in defending US networks and infrastructure from the attacks.

Who says so, on what evidence?
 
Changed:
<
<

I. US Metadata Policy

Subsection A. Edward Snowden showed that the United States systematically maintained information concerning US persons. US intelligence analysts defended the collection by saying it was incidental to their duties. To better understand the paradigm government cyber operators work in it is necessary to divide cyber activity into three frameworks:

Subsub 1. criminal (lawlessness, typically attributed to individuals)

Subsub 2. acts of war (attacks, typically attributed to a nation-state)

Subsub 3. or espionage (criminal, but generally accepted international activity that does not modify electronic data but does look at it)

Subsection B. For the most part, intelligence agencies were involved in defending US networks and infrastructure from the attacks. However, according to Snowden, active espionage targeting foreign citizens was being conducted by the US. In the collection of foreign records, incidental collection of US citizens occurred. This information is called metadata.

II. Snowden Aftermath

Subsection A. In the aftermath of the Snowden leaks, the US government put additional controls on the maintenance of metadata. For example, telecommunication companies would be required to maintain the data and only turn it over to the government if there was a warrant. This directly took some of the metadata out of governmental hands and underscored the importance of particularity in search warrants. In the digital age, protection of individual autonomy hinges on how metadata is used. As described above, this question is partly answered by policymakers, putting regulatory safeguards within the intelligence system to ensure personal information is not being improperly used. The other part should be answered by the Supreme Court.

III. Supreme Court Jurisprudence

Subsection A. Supreme Court jurisprudence from US v. Weeks until present has attempted to put searches in a tidy box with neatly defined parameters:

Subsub 1. a quest for evidence

Subsub 2. by a government agent,

Subsub 3. where a reasonable expectation of privacy exists

Subsection B. Is collection of Metadata a search?

>
>
However, according to Snowden, active espionage targeting foreign citizens was being conducted by the US. In the collection of foreign records, incidental collection of US citizens occurred. This information is called metadata.

No. It's also called content of communications. The attempt to reduce the problem to traffic analysis is disingenuous, and you've fallen for it.

Snowden Aftermath

In the aftermath of the Snowden leaks, the US government put additional controls on the maintenance of metadata. For example, telecommunication companies would be required to maintain the data and only turn it over to the government if there was a warrant. This directly took some of the metadata out of governmental hands and underscored the importance of particularity in search warrants. In the digital age, protection of individual autonomy hinges on how metadata is used. As described above, this question is partly answered by policymakers, putting regulatory safeguards within the intelligence system to ensure personal information is not being improperly used. The other part should be answered by the Supreme Court.

Supreme Court Jurisprudence

Supreme Court jurisprudence from US v. Weeks until present has attempted to put searches in a tidy box with neatly defined parameters:

1. a quest for evidence 2. by a government agent, 3. where a reasonable expectation of privacy exists

Is collection of Metadata a search?

 Under that very specific definition, the unfiltered capture of information would not constitute a search. Even if justices believe that Supreme Court 4th Amendment jurisprudence is flawed, the Supreme Court is unlikely to make sweeping moves toward redefining searches to include metadata. A more realistic possibility is that the Supreme Court could limit the government’s use of the metadata. Something akin to the exclusionary rule could be used to put systemic safeguards in place.
Changed:
<
<

IV. If Deemed Constitutional, Is it Good Policy?

>
>

If Deemed Constitutional, Is it Good Policy?

 Collecting and storing massive amounts of information is not good policy. To date, the program has not thwarted a terrorist plot. Further, the information being stored could be used for nefarious purposes. An unscrupulous presidential administration could use the program to locate and silence political dissidents. For example, during the Obama administration, the IRS was accused of targeting conservative organizations for audits and regulatory enforcement. If US cyber capability were pointed internally and used for nefarious ends, a truly despotic state could be established. Although unlikely, procedural safeguards voluntarily imposed by policy makers and mandated by the judiciary will prevent the infringement on individual liberty.
Changed:
<
<
Conclusion
>
>

Conclusion

 The Magic Ball exists. For lawyers and policymakers, the question is how to maintain a free society with the existence of this Magic Ball. One answer is for individuals to cease using electronic means of communication. That seems backward thinking. Another option is to put safeguards in place that prevent the unauthorized use or dissemination of information. Like nuclear weapons, the mere existence does not precipitate use. I am optimistic that we can put adequate controls that limit dissemination and maintain individual liberty. As President Eisenhower eloquently stated: “Only a sturdy and vigilant citizenry, deeply dedicated to liberty and alert to any external or internal encroachment, can sustain freedom. Where sturdiness and vigilance, where clarity of vision are weakened… freedom come[s] face to face with its deadliest internal enemy, the misled and complacent citizen.”
Deleted:
<
<

You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable. To restrict access to your paper simply delete the "#" character on the next two lines:
 
Changed:
<
<
>
>

If this essay is about traffic analysis, it could be much shorter. If the "magic ball" analogy is relevant, or facts have been actually consulted, the piece is not about traffic analysis. "Metadata collection" is about anonymity. You might have inquired whether the Fourth Amendment is the only relevant source of constitutional limitation.

The route to improvement is the resolution of this basic tension in the essay's design.

 
Deleted:
<
<
Note: TWiki has strict formatting rules for preference declarations. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of these lines. If you wish to give access to any other users simply add them to the comma separated ALLOWTOPICVIEW list.
 \ No newline at end of file

DavidHammondFirstPaper 2 - 03 Mar 2017 - Main.DavidHammond
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"
Deleted:
<
<
 It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.
Line: 11 to 10
 Introduction What if I had a magic ball that sucked up every spoken conversation, written correspondence or activity anyone ever engaged in? What if my magic ball had unlimited storage capacity and an ability to quickly sift through the information to tell me anything I wanted to know? What if the magic ball were in the hands of the government?
Changed:
<
<
In the digital age, protection of individual autonomy hinges on how the Supreme Court defines search. Metadata presents a layer of complexity not yet directly reviewed by our nation’s highest court. If US policy is to capture all electronic data but not review it, has there been a search? Supreme Court jurisprudence from US v. Weeks until present has attempted to put searches in a tidy box with neatly defined parameters: a quest for evidence by a government agent, where a reasonable expectation of privacy exists. This essay will attempt to lay out a framework for a Constitutional review of metadata.
>
>
Existing normative frameworks and jurisprudence for the law of war, criminal law, and international law are generally applicable to every dimension of the cyber domain. The challenge for policymakers is the application of existing frameworks to cyber and articulating principles that government agents can use to determine their scope of authority while protecting US networks and critical infrastructure. The same is true for the intentional or incidental collection of information regarding a US person. Indeed there is a distinction between citizen and non citizen in relation to the rights afforded to them. Generally, the Constitutional protections apply to citizens and places under US control. Difficulty arises when there is conflation between citizen and non-citizen or uncertainty about whether US control exists.
 

I. US Metadata Policy

Changed:
<
<

Subsection A

Subsub 1

Subsection B

Subsub 1

Subsub 2

Section II. SC Search and Seizure Jurisprudence

Subsection A

Subsection B

Section III. If Deemed Constitutional, Is it Good Policy?

Subsection A

Subsection B

>
>

Subsection A. Edward Snowden showed that the United States systematically maintained information concerning US persons. US intelligence analysts defended the collection by saying it was incidental to their duties. To better understand the paradigm government cyber operators work in it is necessary to divide cyber activity into three frameworks:

Subsub 1. criminal (lawlessness, typically attributed to individuals)

Subsub 2. acts of war (attacks, typically attributed to a nation-state)

Subsub 3. or espionage (criminal, but generally accepted international activity that does not modify electronic data but does look at it)

Subsection B. For the most part, intelligence agencies were involved in defending US networks and infrastructure from the attacks. However, according to Snowden, active espionage targeting foreign citizens was being conducted by the US. In the collection of foreign records, incidental collection of US citizens occurred. This information is called metadata.

II. Snowden Aftermath

Subsection A. In the aftermath of the Snowden leaks, the US government put additional controls on the maintenance of metadata. For example, telecommunication companies would be required to maintain the data and only turn it over to the government if there was a warrant. This directly took some of the metadata out of governmental hands and underscored the importance of particularity in search warrants. In the digital age, protection of individual autonomy hinges on how metadata is used. As described above, this question is partly answered by policymakers, putting regulatory safeguards within the intelligence system to ensure personal information is not being improperly used. The other part should be answered by the Supreme Court.

III. Supreme Court Jurisprudence

Subsection A. Supreme Court jurisprudence from US v. Weeks until present has attempted to put searches in a tidy box with neatly defined parameters:

Subsub 1. a quest for evidence

Subsub 2. by a government agent,

Subsub 3. where a reasonable expectation of privacy exists

Subsection B. Is collection of Metadata a search?

Under that very specific definition, the unfiltered capture of information would not constitute a search. Even if justices believe that Supreme Court 4th Amendment jurisprudence is flawed, the Supreme Court is unlikely to make sweeping moves toward redefining searches to include metadata. A more realistic possibility is that the Supreme Court could limit the government’s use of the metadata. Something akin to the exclusionary rule could be used to put systemic safeguards in place.

IV. If Deemed Constitutional, Is it Good Policy?

Collecting and storing massive amounts of information is not good policy. To date, the program has not thwarted a terrorist plot. Further, the information being stored could be used for nefarious purposes. An unscrupulous presidential administration could use the program to locate and silence political dissidents. For example, during the Obama administration, the IRS was accused of targeting conservative organizations for audits and regulatory enforcement. If US cyber capability were pointed internally and used for nefarious ends, a truly despotic state could be established. Although unlikely, procedural safeguards voluntarily imposed by policy makers and mandated by the judiciary will prevent the infringement on individual liberty.
 Conclusion
Added:
>
>
The Magic Ball exists. For lawyers and policymakers, the question is how to maintain a free society with the existence of this Magic Ball. One answer is for individuals to cease using electronic means of communication. That seems backward thinking. Another option is to put safeguards in place that prevent the unauthorized use or dissemination of information. Like nuclear weapons, the mere existence does not precipitate use. I am optimistic that we can put adequate controls that limit dissemination and maintain individual liberty. As President Eisenhower eloquently stated: “Only a sturdy and vigilant citizenry, deeply dedicated to liberty and alert to any external or internal encroachment, can sustain freedom. Where sturdiness and vigilance, where clarity of vision are weakened… freedom come[s] face to face with its deadliest internal enemy, the misled and complacent citizen.”
 
You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable. To restrict access to your paper simply delete the "#" character on the next two lines:

DavidHammondFirstPaper 1 - 02 Mar 2017 - Main.DavidHammond
Line: 1 to 1
Added:
>
>
META TOPICPARENT name="FirstPaper"

It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.

Is the Storing of Metadata by the United States Government a Search in Violation of the 4th Amendment?

-- By DavidHammond - 02 Mar 2017

Introduction What if I had a magic ball that sucked up every spoken conversation, written correspondence or activity anyone ever engaged in? What if my magic ball had unlimited storage capacity and an ability to quickly sift through the information to tell me anything I wanted to know? What if the magic ball were in the hands of the government?

In the digital age, protection of individual autonomy hinges on how the Supreme Court defines search. Metadata presents a layer of complexity not yet directly reviewed by our nation’s highest court. If US policy is to capture all electronic data but not review it, has there been a search? Supreme Court jurisprudence from US v. Weeks until present has attempted to put searches in a tidy box with neatly defined parameters: a quest for evidence by a government agent, where a reasonable expectation of privacy exists. This essay will attempt to lay out a framework for a Constitutional review of metadata.

I. US Metadata Policy

Subsection A

Subsub 1

Subsection B

Subsub 1

Subsub 2

Section II. SC Search and Seizure Jurisprudence

Subsection A

Subsection B

Section III. If Deemed Constitutional, Is it Good Policy?

Subsection A

Subsection B

Conclusion


You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable. To restrict access to your paper simply delete the "#" character on the next two lines:

Note: TWiki has strict formatting rules for preference declarations. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of these lines. If you wish to give access to any other users simply add them to the comma separated ALLOWTOPICVIEW list.


Revision 4r4 - 05 May 2017 - 18:14:42 - DavidHammond
Revision 3r3 - 30 Apr 2017 - 12:35:14 - EbenMoglen
Revision 2r2 - 03 Mar 2017 - 00:14:12 - DavidHammond
Revision 1r1 - 02 Mar 2017 - 22:20:55 - DavidHammond
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM