{"id":183800,"date":"2017-03-19T16:05:42","date_gmt":"2017-03-19T20:05:42","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/the-nsas-foreign-surveillance-5-things-to-know-pcworld\/"},"modified":"2017-03-19T16:05:42","modified_gmt":"2017-03-19T20:05:42","slug":"the-nsas-foreign-surveillance-5-things-to-know-pcworld","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/the-nsas-foreign-surveillance-5-things-to-know-pcworld\/","title":{"rendered":"The NSA&#8217;s foreign surveillance: 5 things to know &#8211; PCWorld"},"content":{"rendered":"<p><p>    A contentious piece of U.S. law giving the National Security    Agency broad authority to spy on people overseas expires at the    end of the year. Expect heated debate about the scope of U.S.    surveillance law leading up to Dec. 31.  <\/p>\n<p>    One major issue to watch involves the way the surveillance    treats communications from U.S. residents. Critics say U.S.    emails, texts, and chat logs -- potentially millions of them --    are caught up in surveillance authorized bySection    702of the Foreign Intelligence Surveillance Act    (FISA).  <\/p>\n<p>    U.S. residents who communicate with foreign targets of the NSA    surveillance have their data swept up in what the NSA calls    \"incidental\" collection. The FBI can then search those    communications, but it's unclear how often that happens.  <\/p>\n<p>    A primer on Section 702:  <\/p>\n<p>    Section 702 of FISA is the authorization the NSA needs to run    programs like Prism and Upstream, revealed in 2013 by former    agency contractor Edward Snowden. The U.S. intelligence    community has called Section 702 surveillance its \"most    important tool\" in its fight against terrorism, noted    Representative Bob Goodlatte, a Virginia Republican, during a    March 1 congressional hearing.  <\/p>\n<p>    Section 702 surveillance is \"critical\" in the U.S. governments    fight against terrorism,     added April Doss, a lawyer at the NSA for 13 years.  <\/p>\n<p>    At the agency, \"I had the opportunity to witness firsthand the    critical importance of robust intelligence information in    supporting U.S. troops and in detecting terrorist plans and    intentions that threatened the safety of the U.S. and its    allies,\" she said in testimony March 1.  <\/p>\n<p>    In the     Prism program, the NSA and FBI allegedly gained access to    the servers of Google, Facebook, Microsoft, Yahoo, and other    internet companies as a way to collect audio, video, emails,    and other content.  <\/p>\n<p>        Upstream collectionallegedly involved the NSA    intercepting telephone and internet traffic by tapping internet    cables and switches.  <\/p>\n<p>    Under 702, FISA    allows the U.S. attorney general and the director of    national intelligence to authorize \"the targeting of persons    reasonably believed to be located outside the United States to    acquire foreign intelligence information.\" The U.S.Foreign    Intelligence Surveillance Court reviews the targeting and    minimization procedures adopted by the government and    determines whether they comport with the statutory restrictions    and the Fourth Amendment to the U.S. Constitution.  <\/p>\n<p>    The Office of the Director of National Intelligence (ODNI) says    it conducts    its surveillance with the \"knowledge of the service    provider,\" although several internet companies have denied    cooperating with the NSA.  <\/p>\n<p>    Doss and other defenders of Section 702 surveillance say that    it's targeted, not so-called \"bulk\" surveillance. But the    descriptions of both Prism and Upstream from the Snowden leaks    and subsequent government descriptions suggest the surveillance    is widespread. The intelligence community has     long arguedthe legal definition of \"bulk\"    surveillance is very specific.  <\/p>\n<p>    The NSA also collected U.S. telephone records for several years    under a separate program. The NSA and the FBI pointed to    a different provision of FISA, Section 501, as authorization    for the controversial metadata collection program. Congress    curtailed the phone metadata collection program in the     USA Freedom Act, passed in mid-2015.  <\/p>\n<p>    Congress is certain to extend the surveillance authority in    some form, even though many     tech companies and privacy groups are pushing lawmakers to    rein in the NSAs surveillance programs, both in the U.S. and    abroad.  <\/p>\n<p>    Most lawmakers see value in extending Section 702, although    many Democrats and some Republicans have talked about ending or    limiting the ability of the FBI and other intelligence agencies    to search for U.S. communications swept up in the surveillance.  <\/p>\n<p>    Given that Section 702 is one of the main authorizations for    the NSA to conduct foreign surveillance, not even the most    ardent privacy advocates believe Congress will let the    provision expire.  <\/p>\n<p>    Section 702 prohibits the NSA from targeting people    inside the U.S., but the agency, in \"incidental\" collection,    gathers information from U.S. residents who are communicating    with the agencys overseas targets.  <\/p>\n<p>    The law then allows the FBI and other intelligence agencies to    search those U.S. communications for evidence of crimes,    including crimes not connected to terrorism. Many digital    rights groups, along with some lawmakers, want to end this    so-called backdoor search of Section 702 records.  <\/p>\n<p>    This collection of U.S. communications without a warrant is,    \"in a word, wrong,\" Representative John Conyers Jr., a Michigan    Democrat, said during the March 1 hearing.  <\/p>\n<p>    Details about the incidental collection are fuzzy. Going    back to 2011, lawmakers have repeatedly asked for numbers of    U.S. residents affected but have received no details from the    ODNI.  <\/p>\n<p>    In addition to the incidental collection of U.S. residents'    communications, privacy advocates complain about an expansive    surveillance of foreigners allowed under Section 702.  <\/p>\n<p>    The provision allows the NSA to collect foreign intelligence    information from \"anyone\" outside the U.S. not just suspected    agents of foreign powers, said Greg Nojeim, senior counsel at    the Center for Democracy and Technology. \"Intelligence    information\" is also defined broadly, he said.  <\/p>\n<p>    \"Once you remove that, it's open season on many foreigners who    pose no threat to U.S. national security,\" he added.  <\/p>\n<p>    House members, in their March 1 hearing,     talked little about the impact on people outside the U.S.    At this point, it seems unlikely that U.S. lawmakers will limit    the provisions foreign data collection.  <\/p>\n<p>    Privacy advocates have an ace up their sleeves, however.    Several privacy groups have     encouraged the European Union to get involved in the debate    and threaten to revoke     Privacy Shield, the cross-Atlantic agreement that allows    U.S. companies to handle EU residents'data, unless    significant changes are made to 702.  <\/p>\n<p>    The European Commission \"has made it clear that it takes    seriously its obligations to review the Privacy Shield    Agreement,\" said Nathan White, senior legislative manager at    Access Now, a digital rights group.  <\/p>\n<p>    EU nations understand surveillance is can be necessary, but    \"surveillance must respect human rights,\" White added.    \"Surveillance doesnt trump human rights responsibilities.\"  <\/p>\n<p>    The U.S. intelligence communitys surveillance programs    have stirred up new controversies in recent weeks. In early    March, President Donald Trump, in a series of tweets, accused    former President Barack Obama of     wiretapping Trump Tower in New York City during the last    presidential campaign.  <\/p>\n<p>    While Trump has provided no evidence of the bombshell charge,    it appears that the     NSA intercepted some of his campaign staffers'    communications when they talked to foreign surveillance    targets. That type of surveillance would likely be authorized    by Section 702.  <\/p>\n<p>    A few days later,     WikiLeaks published more than 8,700 documents that it says    came from the CIA. The documents describe the spy agency's    efforts to compromise iPhone, Android devices, smart TVs,    automobile software, and major operating systems.  <\/p>\n<p>    The CIA, however, runs separate surveillance programs from the    NSA. CIA surveillance is supposed to    be focused on specific foreign targets, as opposed to the    widespread surveillance that the NSA does under the authority    of Section 702. The CIA says it is \"legally prohibited from    conducting electronic surveillance targeting individuals here    at home, including our fellow Americans.\"  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.pcworld.com\/article\/3180766\/security\/the-nsas-foreign-surveillance-5-things-to-know.html\" title=\"The NSA's foreign surveillance: 5 things to know - PCWorld\">The NSA's foreign surveillance: 5 things to know - PCWorld<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> A contentious piece of U.S. law giving the National Security Agency broad authority to spy on people overseas expires at the end of the year. Expect heated debate about the scope of U.S <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/the-nsas-foreign-surveillance-5-things-to-know-pcworld\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-183800","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/183800"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=183800"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/183800\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=183800"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=183800"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=183800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}