RUNNING HEAD: NSA Policies and Privacy
NSA Policies and Privacy Bradley Wallace Strayer University Professor Nelson Stewart CIS-324 June 16, 2013
1952 (―Pre-1952 Historical Timeline‖. Prior to the NSA there was the Armed Forces Security Agency (AFSA). I will evaluate how the collection of phone records lines up with the policies of the NSA and how those policies affect the average American citizens." looked into the history of U. Origins of the NSA The National Security Agency was established on November 4. The NSA’s formation came after a report known as the "Brownell Committee Report. Lastly I will look into the privacy implications of the policies of the NSA. 2000). 2009). After the NSA was formed the realization that complete control over all intelligence activities would be impossible due to the dependence on the military structures to man field stations. This is largely due to Congressional hearings and investigative research (―The National Security Agency‖. communications intelligence activities and discovered there was a need for greater coordination and direction at the national level in regards to intelligence activities (―The National Security Agency‖.NSA Policies and Privacy
In 2006 USA TODAY reported that the National Security Agency (NSA) had been secretly collecting phone call records of American citizens. 1990). 1949 and was established to direct the communications intelligence and electronic intelligence activities of the military (―The National Security Agency‖. 2000).S. 2000). The purpose of this collection of phone records is to look for terrorist activity. The NSA is a highly secretive organization that only in recent times has had any amount of information about them released. The ASFA was established on May 20. I will also look into the legality of these collection methods. The most recent exposure surrounding the NSA is the release of information that the NSA is collecting phone records of American citizens in an effort to look for terrorist activities.
. To help mitigate this flaw operational and technical control over all intelligence activities was granted to the NSA (Burns.
and disseminate signals intelligence information and data for foreign intelligence and counterintelligence purposes to support national and departmental missions. Prescribe security regulations covering operating practices. Collect (including through clandestine means). Align EO12333 with the Intelligence Reform and Terrorism Prevention Act of 2004. Vision.NSA Policies and Privacy
NSA Role and Responsibilities The NSA is tasked with leading the U. Vision. Information Assurance. Values. This was later amended in 2008 to include: (―NSA/CSS Mission. National Intelligence. Some of the roles and responsibilities of the NSA according to the NSA website include: (―NSA/CSS Mission. and exercise the necessary supervisory control to ensure compliance with the regulations. which was originally issues in December of 1981 and later amended in July of 2008.S. handling. Implement additional recommendations of the 9/11 and WMD Commissions. Values. Vision. and in this capacity be responsible to the Secretary of Defense and to the Director. Act as the National Manager for National Security Systems as established in law and policy. and Computer Network Operations so that a decision advantage is gained for our nation and its allies in all circumstances (―NSA/CSS Mission. This process come about due to Executive Order 12333. Values. 2012). including the transmission. 2012). produce. analyze. 2012). Government in cryptology that includes Signal Intelligence. and distribution of signals intelligence and communications security material within and among the elements under control of the Director of the National Security Agency.
a Congressional hearing revealed that for a minimum of 20 years the NSA had
been collecting international communications without a warrant which lead Congress to pass the Foreign Intelligence Surveillance Act (FISA) of 1978 (Cauley. 2006). or meaning of that communication. FISA established rules concerning the acquisition of information. Section 1801. if the contents are acquired by intentionally targeting that United States person. Legal Surveillance In 1975. or other surveillance device of the contents of any wire or radio communication sent by or intended to be received by a particular. 2012) Section 1801. subsection N of FISA further defined content as ―when used with respect to a communication. FISA outlined the procedures that the U. mechanical. subsection F of FISA defined electronic surveillance as ―the acquisition by an electronic.‖ (―50 USC 1801 – Definitions‖.‖ (―50 USC 1801 – Definitions‖. 2012) Based off the definition of electronic surveillance defined in FISA it can be reasoned that the NSA is only able to obtain information if it is happening in real time and not based off of historical records.S. government must follow when engaging in electronic surveillance with our without a warrant.NSA Policies and Privacy
Further integrate the Intelligence Community and clarify and strengthen the role of the DNI as the head of the Community.
Maintain or strengthen privacy and civil liberties protections. substance. Being as how phone records collected in real time does not contain personally identifiable information the NSA would not be considered to be in violation of FISA. includes any information concerning the identity of the parties to such communication or the existence. either with a warrant or without a
. purport. known United States person who is in the United States. under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes.
2012). 2012). and trap and trace devices.NSA Policies and Privacy
warrant. 2012) The purpose of a wiretap is to obtain information without the knowledge of the person or persons who are using that communications circuit. 2012). citizen is involved. although a wiretap order is needed to intercept your email and other electronic communications. and the surveillance must meet the ―minimization procedures‖ defined in Section 1801. allowing outgoing numbers from a telephone to be identified.S. 2012). There are strict rules attributed to a wiretap starting with the federal wiretap statute passed in 1968. but the statute won't prevent the introduction of illegally intercepted emails and text messages‖ (―Wiretapping Law Protections‖. subsection H (―50 USC 1801 – Definitions‖. So. Pen registers are defined as ―A device that decodes or records electronic impulses. pen registers. if your phone calls are illegally intercepted.‖ (―The Free dictionary‖. voice communications — are covered by the statute's exclusionary rule. Wiretaps are defined as ―A concealed listening or recording device connected to a communications circuit. for example. Trap and trace devices are defined as ―A device used to record and trace all communication signals from a telecommunication system. only your oral and wire communications — that is. Typically pen
.‖ (―The Free Dictionary‖. This statute requires that a wiretap order be obtained prior to the start of monitoring or recording of communications (―Wiretapping Law Protections‖. In addition FISA authorizes the President to conduct electronic surveillance without a warrant for a period of one year provided the content of the information collected is between foreign powers. It should also be noted that ―Under the Wiretap Act. that evidence can't be introduced against you in a criminal trial. 2012). no information collected can be acquired when a U.‖ (―The Free Dictionary‖. Methods of Collecting Phone Records The common methods associated with collecting phone records are wiretaps.
and effects. Ethics of Collecting Citizen Phone Records Collecting phone records from private citizens without probable cause is ultimately protected by the 4th Amendment which states ―The right of the people to be secure in their persons. shall not be violated. 2012). The contents of your telephone conversation are protected. the Fourth Amendment doesn't protect the privacy of those numbers against pen/trap surveillance by the government. 2011). In 2001 the Patriot Act was passed with the express purpose of being used to combat terrorism. and no Warrants shall issue.‖ (―The United States Constitution‖.‖ (―‖Pen Registers‖ and ―Trap and Trace Devices‖‖. in the case of Smith v. Under the Patriot Act the prerequisite that government prove that the suspect is an agent of foreign power is eliminated (―The Free Dictionary‖. but upon probable cause. and the persons or things to be seized. against unreasonable searches and seizures.S. ―The Supreme Court decided in 1979.NSA Policies and Privacy
registers and trap and trace devices are used in conjunction with one another. Pen registers will shows outgoing phone numbers where a trap and trace device will show incoming phone numbers.S. papers. that because you knowingly expose phone numbers to the phone company when you dial them (you are voluntarily handing over the number so the phone company will connect you. Maryland. And due to this protection when USA TODAY reported that the NSA was collecting phone records concerning American citizens and claiming to use that information to fight terrorism the American Civil Liberties Union (ACLU) filed a
. houses. government to use pen registers and trap and trace devices without having to obtain permission prior to use regardless of who the devices are to be used one be it a foreign national or a U. The result of this allows the U. and particularly describing the place to be searched. citizen. 2012). but not the dialing information. and you know that the numbers you call may be monitored for billing purposes). supported by Oath or affirmation.
when using e-mail or surfing the internet the same considerations should be taken as well. In 2008 the FISA Amendment Act was passed by Congress which effectively killed all litigation against the federal government in regards to the NSA collecting phone records about private citizens. 2012).S. The issue at play with the federal government using the NSA to secretly collect phone records of its private citizens is it violated the constitutional rights of U. NSA: The Challenge to Illegal Spying‖. The ACLU lawsuit was but one of numerous that was filed against the federal government. Privacy Implications Since in recent time the federal government has passed laws that allow its agencies to essentially spy on it citizen’s privacy can no longer be taken for granted. citizens has been given greater latitude it is not something that should be carried out without probable cause as dictated in the 4th Amendment. While the monitoring of communications of U. The ACLU lawsuit originally succeeded when a district court declared the NSA’s collection of phone records was deemed unconstitutional. In response to the lawsuits that prevailed against the federal government for violating the constitutional rights of it citizens the FISA Amendment Act was passed. citizens covered by the 4th Amendment. When using the telephone or cell phone ensure to be mindful of your surroundings and take care in what is said via conversations or messages when using those devices. As a security conscience citizen efforts should be made to ensure privacy is maintained in all facets of everyday life.S.NSA Policies and Privacy
lawsuit against the federal government. however in 2007 the original decision was overturned ("ACLU v. With the increase of not only unscrupulous people trying to obtain information about a
. The FISA Amendment Act granted immunity to organizations that aided the NSA in the collection of phone records for the database that was created to fight terrorism. Since the act effectively killed all litigation the actions of the NSA became legal.
but the federal government becoming involved in monitoring average U.
. Conclusion In conclusion the NSA technically violated the 4th Amendment rights of U.S. citizens by collecting phone records in an effort to fight terrorism. There is a need to ensure the safety of citizens and one could argue that the actions of the NSA are achieving just that. citizens it is up to everyone to be security conscious and ensure that personal information remains personal. The question is just how much must be sacrificed to ensure the safety of society. citizens are free from unreasonable search and seizure against themselves and the current actions of the federal government violates this amendment. With the advent of lawsuits being filed against the federal government the FISA Amendment Act was passed to make the actions of the NSA legal and be able to avoid litigation at the same time. With that being said in an effort to protect the greater good some liberties must be given up. The 4th Amendment ensures that U. This is sure to be a question that will be answered over the coming years.NSA Policies and Privacy
person’s life.S.S. The biggest problem is at what cost.
Retrieved June 9.gov/about/values/index.edu/uscode/text/50/1801 ACLU v.d. Surveillance Self-Defense. (n. NAtional Security Agency. Retrieved June 9.nsa. March 6).d.gov/about/cryptologic_heritage/center_crypt_history/pre_1952_timeline/index. Values. (2009. George Washington University. from http://www.htm NSA/CSS Mission.gov/public_info/_files/cryptologic_histories/origins_of_nsa. ACLU. NSA has massive database of Americans' phone calls . 2012. Cornell University Law School. Vision.usatoday. from http://www.nsa. 2012.com/wiretaps The National Security Agency. May 11). from http://www.nsa. 2012.d. (n. Retrieved June 8.aclu.com/news/washington/2006-05-10-nsa_x.org/wire/govt/pen-registers
Pre-1952 Historical Timeline. (n.).). NSA: The Challenge to Illegal Spying . from https://ssd. (2000.).law.shtml "Pen Registers" and "Trap and Trace Devices". Retrieved June 9.edu/~nsarchiv/NSAEBB/NSAEBB23/ The United States Constitution. 2012.d. 2012.d. from http://thefreedictionary. Retrieved June 9.d. Retrieved June 8.Definitions. Retrieved June 9. from http://www. (n. 2012. (n. (2006. National Security Agency. from http://www. Retrieved June 8. 2012. (2011. L.). Retrieved June 9.html Wiretapping Law Protections.usconstitution.eff. Retrieved June 8. Surveillance Self. from https://ssd. National Security Agency.eff. The Origins of the National Security Agency 1940 .net/const.NSA Policies and Privacy References 50 USC 1801 .).org/national-security/aclu-v-nsa-challenge-illegal-spying Burns. (n. 2012.1952. USA TODAY.Defense. January 15).shtml The Free Dictionary. 2012. from http://www.gwu.pdf Cauley.d. January 13). 2012.cornell. from http://www. from http://www.org/wire/govt/wiretapping-protections
. 2012. US Constiution Online.). L. T. Retrieved June 8. (n.).