Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire May 27 2011

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire May 27 2011

Author: Edward C. Liu

Publisher: DIANE Publishing

Published: 2011-05

Total Pages: 19

ISBN-13: 1437983189

DOWNLOAD EBOOK

Three amendments to the Foreign Intelligence Surveillance Act (FISA) are set to expire (sunset) on May 27, 2011. The three sun-setting amendments expanded the scope of federal intelligence gathering authority following the 9/11 terrorist attacks. Contents of this report: (1) Overview; (2) Background: Distinction Between FISA Court Orders and Warrants in Criminal Investigations; Distinction Between FISA Court Orders and National Security Letters; Expiring FISA Amendments; "Lone Wolf" Terrorists; Roving Wiretaps; Access to Business Records Under FISA; (3) Effect of Sunset Provisions; (4) Legislative Proposals in the 112th Congress. This is a print on demand edition of an important, hard-to-find publication.


Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Author:

Publisher:

Published: 2009

Total Pages: 19

ISBN-13:

DOWNLOAD EBOOK

Three amendments to the Foreign Intelligence Surveillance Act (FISA) are set to expire (sunset) on February 28, 2010. S. 1692, a bill reported favorably by the Senate Judiciary Committee with an amendment in the nature of a substitute, would extend the sunset date by four years and make various modifications to existing authorities. H.R. 3845 would likewise establish a new sunset of December 31, 2013, but it would reauthorize only two of the three expiring provisions. The three sunsetting amendments expanded the scope of federal intelligence-gathering authority following the 9/11 terrorist attacks. Two were enacted as part of the USA PATRIOT Act. Section 206 of the USA PATRIOT Act amended FISA to permit multipoint, or "roving," wiretaps by adding flexibility to the degree of specificity with which the location or facility subject to electronic surveillance under FISA must be identified. Section 215 enlarged the scope of materials that could be sought under FISA to include "any tangible thing." It also lowered the standard required before a court order may be issued to compel their production. The third amendment was enacted in 2004, as part of the Intelligence Reform and Terrorism Protection Act (IRTPA). Section 6001(a) of the IRTPA changed the rules regarding the types of individuals who may be targets of FISA-authorized searches. Also known as the "lone wolf" provision, it permits surveillance of non-U.S. persons engaged in international terrorism without requiring evidence linking those persons to an identifiable foreign power or terrorist organization. Although these provisions are set to sunset, grandfather clauses permit them to remain effective with respect to investigations that began, or potential offenses that took place, before the sunset date.


Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2010

Author:

Publisher:

Published: 2009

Total Pages: 19

ISBN-13:

DOWNLOAD EBOOK

Three amendments to the Foreign Intelligence Surveillance Act (FISA) are set to expire (sunset) on February 28, 2010. S. 1692, a bill reported favorably by the Senate Judiciary Committee with an amendment in the nature of a substitute, would extend the sunset date by four years and make various modifications to existing authorities. H.R. 3845 would likewise establish a new sunset of December 31, 2013, but it would reauthorize only two of the three expiring provisions. The three sunsetting amendments expanded the scope of federal intelligence-gathering authority following the 9/11 terrorist attacks. Two were enacted as part of the USA PATRIOT Act. Section 206 of the USA PATRIOT Act amended FISA to permit multipoint, or "roving," wiretaps by adding flexibility to the degree of specificity with which the location or facility subject to electronic surveillance under FISA must be identified. Section 215 enlarged the scope of materials that could be sought under FISA to include "any tangible thing." It also lowered the standard required before a court order may be issued to compel their production. The third amendment was enacted in 2004, as part of the Intelligence Reform and Terrorism Protection Act (IRTPA). Section 6001(a) of the IRTPA changed the rules regarding the types of individuals who may be targets of FISA-authorized searches. Also known as the "lone wolf" provision, it permits surveillance of non-U.S. persons engaged in international terrorism without requiring evidence linking those persons to an identifiable foreign power or terrorist organization. Although these provisions are set to sunset, grandfather clauses permit them to remain effective with respect to investigations that began, or potential offenses that took place, before the sunset date.


The Foreign Intelligence Surveillance Act

The Foreign Intelligence Surveillance Act

Author: Elizabeth B. Bazan

Publisher:

Published: 2008

Total Pages: 0

ISBN-13:

DOWNLOAD EBOOK

The current legislative and oversight activity with respect to electronic surveillance under the Foreign Intelligence Surveillance Act (FISA) has drawn national attention to several overarching issues. This report briefly outlines three such issues and touches upon some of the perspectives reflected in the ongoing debate. These issues include the inherent and often dynamic tension between national security and civil liberties, particularly rights of privacy and free speech; the need for the intelligence community to be able to efficiently and effectively collect foreign intelligence information from the communications of foreign persons located outside the United States in a changing, fast-paced, and technologically sophisticated international environment or from United States persons abroad, and the differing approaches suggested to meet this need; and limitations of liability for those electronic communication service providers who furnish aid to the federal government in its foreign intelligence collection. Two constitutional provisions, in particular, are implicated in this debate-the Fourth and First Amendments. This report briefly examines these issues and sets them in context. The 110th Congress has been very active in developing and considering measures to amend FISA to address these issues. On August 5, 2007, the Protect America Act, P.L. 110-55, was enacted into law. It expired on February 16, 2008, after passage of a 15-day extension to its original sunset date, P.L. 110-182. On November 15, 2007, the House of Representatives passed H.R. 3773, the RESTORE Act of 2007. On February 12, 2008, the Senate passed S. 2248, as amended, then struck all but the enacting clause of H.R. 3773, and inserted the text of S. 2248, as amended, in its stead. On March 14, 2008, the House passed an amendment to the Senate amendment to H.R. 3773. After months of intensive negotiations, on June 19, 2008, a compromise bill, H.R. 6304, was introduced in the House. It was passed by the House the following day. On June 26, 2008, a cloture motion on the measure was presented in the Senate. Further activity on H.R. 6304 is anticipated after the Senate returns from the July 4th recess. Each of these bills differs somewhat in content and approach from one another. This report also briefly explores legislative responses to the issues addressed. It will be updated as needed.


The NSA Report

The NSA Report

Author: President's Review Group on Intelligence and Communications Technologies, The

Publisher: Princeton University Press

Published: 2014-03-31

Total Pages: 287

ISBN-13: 1400851270

DOWNLOAD EBOOK

The official report that has shaped the international debate about NSA surveillance "We cannot discount the risk, in light of the lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of wholly 'trusting' our public officials."—The NSA Report This is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security Agency. Commissioned by President Obama following disclosures by former NSA contractor Edward J. Snowden, and written by a preeminent group of intelligence and legal experts, the report examines the extent of NSA programs and calls for dozens of urgent and practical reforms. The result is a blueprint showing how the government can reaffirm its commitment to privacy and civil liberties—without compromising national security.


Federal Bureau of Investigation (FBI) and Terrorism Investigations

Federal Bureau of Investigation (FBI) and Terrorism Investigations

Author: Jerome P. Bjelopera

Publisher: DIANE Publishing

Published: 2011-08

Total Pages: 31

ISBN-13: 1437985238

DOWNLOAD EBOOK

The FBI is the lead federal law enforce. agency (LEA) charged with counterterrorism invest. Since the 9/11 attacks, the FBI has implemented a series of reforms intended to transform itself from a largely reactive LEA focused on invest. of criminal activity into a more proactive, agile, flexible, and intelligence-driven agency that can prevent acts of terrorism. This report provides background info. on key elements of the FBI terrorism invest. process. Contents: Intro.; Enhanced Invest. Authorities, Tools, and Capabilities: USA PATRIOT Act: Revised Attorney General Guidelines; Joint Terrorism Task Forces; Intelligence Reform; Terrorism Prevention and Proactive Invest.; Balancing Civil Liberties against Terrorism Prevention. A print on demand report.


The Right to Privacy

The Right to Privacy

Author: Samuel D. Brandeis, Louis D. Warren

Publisher: BoD – Books on Demand

Published: 2018-04-05

Total Pages: 42

ISBN-13: 3732645487

DOWNLOAD EBOOK

Reproduction of the original: The Right to Privacy by Samuel D. Warren, Louis D. Brandeis


The Future of Foreign Intelligence

The Future of Foreign Intelligence

Author: Laura K. Donohue

Publisher: Oxford University Press

Published: 2016-02-23

Total Pages: 209

ISBN-13: 019023539X

DOWNLOAD EBOOK

Since the Revolutionary War, America's military and political leaders have recognized that U.S. national security depends upon the collection of intelligence. Absent information about foreign threats, the thinking went, the country and its citizens stood in great peril. To address this, the Courts and Congress have historically given the President broad leeway to obtain foreign intelligence. But in order to find information about an individual in the United States, the executive branch had to demonstrate that the person was an agent of a foreign power. Today, that barrier no longer exists. The intelligence community now collects massive amounts of data and then looks for potential threats to the United States. As renowned national security law scholar Laura K. Donohue explains in The Future of Foreign Intelligence, global communications systems and digital technologies have changed our lives in countless ways. But they have also contributed to a worrying transformation. Together with statutory alterations instituted in the wake of 9/11, and secret legal interpretations that have only recently become public, new and emerging technologies have radically expanded the amount and type of information that the government collects about U.S. citizens. Traditionally, for national security, the Courts have allowed weaker Fourth Amendment standards for search and seizure than those that mark criminal law. Information that is being collected for foreign intelligence purposes, though, is now being used for criminal prosecution. The expansion in the government's acquisition of private information, and the convergence between national security and criminal law threaten individual liberty. Donohue traces the evolution of U.S. foreign intelligence law and pairs it with the progress of Fourth Amendment jurisprudence. She argues that the bulk collection programs instituted by the National Security Agency amount to a general warrant, the prevention of which was the reason the Founders introduced the Fourth Amendment. The expansion of foreign intelligence surveillanceleant momentum by advances in technology, the Global War on Terror, and the emphasis on securing the homelandnow threatens to consume protections essential to privacy, which is a necessary component of a healthy democracy. Donohue offers a road map for reining in the national security state's expansive reach, arguing for a judicial re-evaluation of third party doctrine and statutory reform that will force the executive branch to take privacy seriously, even as Congress provides for the collection of intelligence central to U.S. national security. Alarming and penetrating, this is essential reading for anyone interested in the future of foreign intelligence and privacy in the United States.


Intelligence and Information Policy for National Security

Intelligence and Information Policy for National Security

Author: Jan Goldman

Publisher: Rowman & Littlefield

Published: 2016-08-08

Total Pages: 655

ISBN-13: 1442260173

DOWNLOAD EBOOK

Building on Goldman’s Words of Intelligence and Maret’s On Their Own Terms this is a one-stop reference tool for anyone studying and working in intelligence, security, and information policy. This comprehensive resource defines key terms of the theoretical, conceptual, and organizational aspects of intelligence and national security information policy. It explains security classifications, surveillance, risk, technology, as well as intelligence operations, strategies, boards and organizations, and methodologies. It also defines terms created by the U.S. legislative, regulatory, and policy process, and routinized by various branches of the U.S. government. These terms pertain to federal procedures, policies, and practices involving the information life cycle, national security controls over information, and collection and analysis of intelligence information. This work is intended for intelligence students and professionals at all levels, as well as information science students dealing with such issues as the Freedom of Information Act.