Snowden Leaks Spill Over Into The Courts

image: hannaharendtcenter.org

Nearly three years after former NSA contractor Edward Snowden first leaked details about massive domestic spying, his revelations have prompted a broader discourse, especially among legal scholars, over the potentially invasive nature of big data cyber-surveillance tools.

Even as intelligence officials, the FBI and Congress worry about the rise of terrorists using encryption to communicate, legal experts are concerned that the enormous volume of data still being collected and stored by the National Security Agency and other intelligence agencies will pose legal concerns based on the Fourth Amendment of the US Constitution. The Fourth Amendment prohibits unreasonable searches and seizures without a judge's warrant supported by probable cause.

Since Snowden's first leaks in June 2013, hundreds of formerly covert programs have been revealed, all of which have contributed to an enormous storage trove of data. At least one ongoing lawsuit seeks to delete much of that data. Recently Snowden's revelations, was compiled by Margaret Hu, an assistant professor at Washington and Lee University School of Law.

Hu is also author of an academic article, Big Data Blacklisting that describes a process of finding individuals "guilty until proven innocent" based on suspicious digital data and database screening results.

"This is absolutely a critical time to really examine these programs before they are normalized and integrated into the system of governance and the way we live our lives," Hu said last week in a Madison Vision Series lecture at James Madison University in Harrisonburg, Va. Madison is widely hailed as the father of the US Constitution.

Decisions expected by the US Supreme Court in the next two years could expand the rights protected under the Fourth Amendment, she said.

"The Supreme Court could say we're going to reach farther and read more protections in order to safeguard the Fourth Amendment. Or, the second choice is [for the Supreme Court] to say to government to make technology smaller," Hu said. "The democratic experiment will fail unless we find a way to make the Constitution bigger or technology smaller."

Hu has joined a growing number of legal scholars concerned with the rise of what they term the "National Surveillance State." In 2008, well before Snowden's revelations, Yale University law professor Jack Balkin outlined that concern in an academic paper, The Constitution in the National Surveillance State. Back in 2006, University of Texas law professor Sanford Levinson had joined Balkin to write, The Process of Constitutional Change: From Partisan Entrenchment to the National Surveillance State.

Hu titled her JMU lecture The Rise of the Cyber-surveillance State. Using the term "cyber-surveillance," she said, emphasizes the use of big data and its connections to the Internet and data mining in surveillance.

"Under this theory, nothing the government is doing is necessarily oppressive," Hu asserted. But she also described how US passports embedded with RFID chips and driver's licenses with digital photos that can be recognizable in a police department database transform the way that government surveillance functions.

Essentially, she said, the government is now targeting suspicious data and not suspicious people. "As we create a more digital footprint, there's a way to look for the hologram of a person, but not the actual person," she said.

As an example, she said, in the vast majority of drone strikes, the attacks are not on individuals, but on the phones that are used — tracked by surveillance of the phone's metadata after multiple times of use.

A potential problem with a digital footprint can arise when a name appears on the increasingly expanding no-fly list, Hu said. "Many on the no-fly list have very limited due process and some are told they will never be able to be removed," she said. "Even if they might be allowed to fly, they won't be told the evidence that led to the nomination of being on there."

In her recent blacklisting article, Hu noted that before people are allowed to fly, work, drive or vote, they might be subjected to mass data collection and automated database screening by intelligence officials.

"Are we using more identity management to infer risk?" Hu asked the JMU audience. "Are we creating more pre-crime systems to keep us safe? Right now, when cases are litigated in court, those unable to exercise their rights are basically told they are collateral damage to keep us safe in this war on terror. What is the reliability of this and the efficacy of this? Going back to Snowden: Do these systems work and are they constitutional?"
Computerworld: http://bit.ly/1RwcnzP

« The White House Has A $19 Billion Cybersecurity Plan
We Need Social Media With A Heart »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

SRI International

SRI International

SRI International is a research institute performing client-sponsored R&D in a broad range of study areas including computing and cybersecurity.

Navarino

Navarino

Navarino is the maritime industry’s most advanced communications and connectivity company. We develop advanced technologies and innovative IT solutions including cyber security.

Elitecyber Group

Elitecyber Group

Elitecyber group is a team of Cyber Security recruitment experts who work for Cyber Security and Cyber Defence clients and candidates throughout Europe.

BrandProtections.Online

BrandProtections.Online

BrandProtections.online offer end-to-end customer support solutions to help protect against threats which may affect your brand online.

PQShield

PQShield

PQShield are specialists in Post-Quantum Cryptography. We provide quantum-secure cryptographic solutions for software, software/hardware co-design and data in transit.

BigPanda

BigPanda

BigPanda is the first provider of Autonomous Operations solutions that empower IT Operations at large, complex enterprises.

Hold Security

Hold Security

Hold Security works with companies of all sizes to provide unparalleled Threat Intelligence services that actually make a difference.

WhiteHawk

WhiteHawk

WhiteHawk is the first online Cyber Security Exchange. We help you understand your cyber risk and match you to tailored and affordable solutions.

LTIMindtree

LTIMindtree

LTIMindtree is a new kind of technology consulting firm. We help businesses transform – from core to experience – to thrive in the marketplace of the future.

Dynamic Quest

Dynamic Quest

Dynamic Quest is a managed IT, cloud and security services companies, providing a comprehensive range of technology services including cybersecurity, backup and disaster recovery.

Securolytics

Securolytics

Securolytics offers the simplest, most complete and affordable IoT security for all organizations. Securolytics quickly identifies unmanaged devices to reduce security and compliance risks.

Robo Shadow

Robo Shadow

Robo Shadow are trying to bridge the gap between the top tier organisations that can afford everything and everyone else who has to “Make it up as they go along” when it comes to Cyber.

Liminal

Liminal

Liminal is a boutique strategy advisory firm serving digital identity, fintech, and cybersecurity clients, and the private equity / venture capital community.

InterSec Inc.

InterSec Inc.

InterSec Inc. is a cybersecurity company that offers a variety of services to small and medium-sized businesses including CMMC Compliance, Program Management, Governance, & Cybersecurity.

Francisco Partners

Francisco Partners

Francisco Partners provide capital, expertise, and support for growth-aspiring technology companies.

Manifest

Manifest

Manifest is a cybersecurity company dedicated to helping enterprises secure their software supply chains.