The One and Only BrownDuck wrote:
Instead of Gbaji rhetoric, let's look at the bill in question, shall we?
Lol. I've read the full text of the law, and of FISA. That's the difference I suspect, and based on how badly you've misinterpreted the meaning of the law, I think my suspicions are confirmed.
Quote:
Quote:
Nothing in the definition of electronic surveillance under section 101(f) shall be construed to encompass surveillance directed at a person reasonably believed to be located outside of the United States.
OK, so when dealing with what we believe to be foreign persons, our existing definition of electronic surveillance is out the window. No surveillance to be conducted on those persons believed to be foreign can be classified as electronic surveillance under the code enacted by FISA.
No no no! You haven't read FISA have you? FISA uses four criteria to define something as "electronic surveillance". That definition is used in this context specifically to mean "surveillance requiring FISA court approval. In otherwords, if you meet those conditions you must have a FISA court warrant. If you don't meet those conditions you don't.
What you also have to know is that the four conditions are all aimed at preventing "domestic" use of federal surveillance (without a warrant). Basically, the goal is to allow the government to spy on people that are not on US soil without any restrictions. The conditions are defined in such a way as to ensure that domestic spying requires a FISA court warrant.
What this is saying is that if the person who is the target of the proposed surveillance is clearly not on US soil, then even if the surveillance meets one of the other criteria, it still does not require a warrant. If you'd read FISA you'd understand this, because some of the criteria will say things like: "Both ends of the communication are on US soil", or "if the tapping equipment is on US soil". Which, in the days of analog phones was pretty easy to define. In todays world where it's hard to say "where" a website is legally, or where the "endpoint" of an email is (does that mean the computer, or the server that's hosting it?), it's much more complex.
The attempt here is to clarify that if we know that the guy we're tapping is not himself on US soil, we don't have to worry about the other restrictions.
If you'd read FISA, you'd know this since it's specifically modifying that law.
Quote:
Well... the next ammendment is:
Quote:
Sec. 105B. (a) Notwithstanding any other law, the Director of National Intelligence and the Attorney General, may for periods of up to one year authorize the acquisition of foreign intelligence information concerning persons reasonably believed to be outside the United States if the Director of National Intelligence and the Attorney General determine, based on the information provided to them, that--
...
(2) the acquisition does not constitute electronic surveillance;
...
Mind you, the "for periods of up to one year" is the clause that would be permanently extended by the currently proposed revision. So basically, the Director of National Intelligence and the AG can directly authorize the surveillance of persons believed to be foreign, so long as this surveillance is not considered "electronic surveillance". But as we just read, by virtue of the suspect being foreign, the definition of electronic surveillance is not applicable. Note: There is no redefinition of electronic surveillance in the PAA of 2007, which leaves us with the conclusion that any the director of national intelligence and the AG can directly authorize any foreign intelligence gathering, period.
First off. No. The "for periods of up to one year" isn't extended. The law itself is. This period isn't affected at all.
And you're totally misreading the meaning here. First off, the waiver for meeting the criteria of "electronic surveillance" in the first part is contingent on the target not being on US soil. Just being a foreigner does not change anything here. Secondly, had you read what was meant by "electronic surveillance", they're referencing a list of criteria that currently require FISA court approval (but per the earlier paragraph will not if the person is known to be on foreign soil).
What this is saying, is that as long as the conditions of the surveillance do not meet those under the existing FISA (which require warrants if met), then they can conduct this surveillance for up to 1 year. So, as long as the tapped conversations have at least one endpoint outside the US, or the tapping equipment itself is *not* on US soil, and the intent of the tap is not to listen to a US persons phone conversations by tapping foreign numbers (option number three), and one more incredibly esoteric requirement involving ham radio conversations across national boundaries that even I don't fully understand, then the surveillance can be maintained for up to 1 year.
That doesn't reduce your freedom one bit. In fact, that's already present in the existing FISA, although I think this does allow for a longer time period. That's it. There's no reduction of criteria for this, just a lengthening of the time frame.
Quote:
The bill goes on to say:
Quote:
A certification under subsection (a) is not required to identify the specific facilities, places, premises, or property at which the acquisition of foreign intelligence information will be directed.
So, any authorization made in the previously quoted ammendment is not required to identify pretty much anything about where the intelligence is directed. For example, they could claim to be conducting surveillance on foreign nationals, and tap all communications at the hotel they are staying at, or, taken literally, anywhere else, without defining these targets.
Yup. But the surveillance can't meet those criteria mentioned earlier.
See. If you read FISA, this all makes sense. Basically, this is saying that as long as at least one end of any tapped communication is outside the US, and the tapping equipment is outside the US (and the other two more esoteric requirements), they don't have to specify every single facility or whatever that's going to be tapped.
There are a lot of reasons for this, btw. I don't really feel like giving you a long explanation. Suffice it to say that in the case where the NSA doesn't need FISA court approval for a wiretap, it shouldn't have to get separate approval from the AG for every tap it does. The AG should be able to say "Tap that group of bad guys", and as long as all their taps meet the criteria defined in FISA, they don't have to fill out paperwork on each and every single one. In a day and age of disposable cell phones, this is kinda important...
Quote:
To be fair, it does say:
Quote:
(c) The Attorney General shall transmit as soon as practicable under seal to the court established under section 103(a) a copy of a certification made under subsection (a). Such certification shall be maintained under security measures established by the Chief Justice of the United States and the Attorney General, in consultation with the Director of National Intelligence, and shall remain sealed unless the certification is necessary to determine the legality of the acquisition under section 105B.
Yup. Checks and balances. The objective is to give our intelligence guys the tools they need to be able to track down "bad guys" who are using modern communication equipment, without hampering them with regulations written back in the days when people couldn't change their methods of communication faster then you could get the paperwork signed.
Quote:
So the agency involved in this surveillance can walk into an AT&T tier 1 data center and demand access to their communications systems, all while prohibiting the AT&T parties involved from saying anything. Note: AT&T can be any company you like that might potentially be an enabler for such surveillance.
Let's be clear here. This section is specific to "records". Not tapping. Also, this section is something that is already "legal". Part of the license you sign when you legally become a telecomm provider is that you must keep records of all data transfers you manage and provide that data to any law enforcement agency that requests them.
This is a power that the government already has. Has had for 20 years or so. Ever since phone companies started using computer controlled digital switches (and therefore *could* store records of connections made), this has been required of them. Internet providers have always fallen under these restrictions as well (since the internet came along *after* that time).
It's not a new and alarming power, no matter how much this is implied. They can and have been doing this all along. The only real difference is the requirement in this case for secrecy. Normally, if the police subpoena some records, the company can tell anyone it wants that this has happened. Obviously, that's not doable if this is a legitimate national security search, right? The other key component in this law is the protection of said companies from lawsuits for complying with the government.
Um... Which is a response to a tactic being used by the privacy folks to attack companies that comply with the law. Go figure! Has nothing to do with privacy at all. Heck. The records aren't private. No matter what some idiots will try to say, while your "papers" are private (ie: content of messages you send), the fact that you sent them and where they went isn't. The government can't open your mail, but it's always been able to read the address(es) if it wants. This is no different. You do not have any expectation of privacy with regard to where you send email to, or what websites you log into. No more then you have an expectation of privacy with regard to what stores you visit in the mall. Sure. I can't look inside you bag without a warrant, but I can record the fact that you entered a given store if I want.
Records of communications are not protected property. You don't own them. They aren't private. This does not give the government any power it didn't have before with regard to obtaining this information. All it does is prevent companies from potentially warning the subject that his records have been requested, and protect said companies from silly lawsuits by privacy advocates playing off the severe lack of knowledge in this area.
Quote:
So if AT&T refuses, the agencies have the right to get obtain a compliance order from the previously established court.
Yup. Just as a police investigator can do the same. This isn't a new power. It's basically a duplicate of existing domestic police investigation laws re-written in the context of intelligence agency use.
Quote:
In the end, Gbaji, yes, this act gives the government, (more specifically, the attorney general and the director of national intelligence) too much power, especially under the context of being considered for a permanent extension.
You think that because you don't know what the existing FISA law says, and seem unfamiliar with normal police powers with regard to subpoenaing of records.
If you knew more about those two things, you'd realize that there are virtually zero additional powers granted here. All it does is codify things that FISA already allows while clarifying how they fit in with newer technology.
Seriously. Read FISA. I think you're progressing from an amazingly incorrect assumption about what that law does.