description: US government administrative subpoena
24 results
by Philip N. Howard · 27 Apr 2015 · 322pp · 84,752 words
, http://www.cnet.com/news/how-the-u-s-forces-net-firms-to-cooperate-on-surveillance/. 22. Kim Zetter, “Google Takes on Rare Fight Against National Security Letters,” Wired, April 4, 2013, accessed September 30, 2014, http://www.wired.com/2013/04/google-fights-nsl/. 23. “Lavabit,” accessed June 16, 2014, http://lavabit
by Bruce Schneier · 3 Sep 2018 · 448pp · 117,325 words
surveillance through a variety of mechanisms. Governments regularly demand access to that data in ways that don’t require a warrant, such as subpoenas and national security letters. I worry that some of the catastrophic risks I wrote about in Chapter 5 will lead policy makers to go beyond backdoors and weakened cryptography
by Pieter Hintjens · 11 Mar 2013 · 349pp · 114,038 words
thriving corporations denying their level of cooperation with the NSA, you need to question their freedom to tell the truth. When a firm receives a National Security Letter, it is obliged by law to deny that fact. The tragic irony is that it's the nicer business executives, the 96% or so who
by Robert W. McChesney · 5 Mar 2013 · 476pp · 125,219 words
continues to exist.238 Since September 11, 2001, when it comes to spying on Americans, the Federal Bureau of Investigation has increasingly turned to the National Security Letter (NSL), an administrative demand letter or subpoena requiring neither probable cause nor judicial oversight. As David Rosen puts it: In effect, an NSL overrides 4th
…
Science Foundation, 101 National Science Foundation Network (NSFNet), 102, 104 national security, 51–52, 53, 100, 159–71, 196 National Security Agency, 161, 163, 164 National Security Letter (NSL), 166, 167 Naughton, John, 12, 72, 108, 135, 136, 161, 190 NBC Universal, 124, 137 NCTA v. Brand X, 111 “negative externalities,” 50–51
by Marc Goodman · 24 Feb 2015 · 677pp · 206,548 words
daily life of petitioners and beneficiaries suspected of fraud.” Federal agents can readily access your social data through a variety of means, by serving subpoenas, national security letters, and other administrative orders on your service providers, who under the third-party doctrine exception to the Fourth Amendment needn’t even notify you of
by Fred Kaplan · 1 Mar 2016 · 383pp · 105,021 words
group’s staff had requested detailed briefings on the bureau’s relationship with the NSA and on its own version of metadata collection, known as National Security Letters, which, under Section 505 of the Patriot Act, allowed access to Americans’ phone records and other transactions that were deemed “relevant” to investigations into terrorism
…
allotted. Ten minutes into this dog-and-pony show, Clarke asked about the briefings that they’d requested. Specifically, he wanted to know how many National Security Letters the FBI issued each year and how the bureau measured their effectiveness. One of the officials responded that only the regional bureaus had those numbers
…
’s centerpiece: if the president rejected it, he felt, the whole exercise will have been pointless. Another proposal was to bar the FBI from issuing National Security Letters without a FISA Court order and, in any case, letting recipients disclose that they’d received such a letter after 180 days, unless a judge
…
“potential for abuse.” And so, he accepted many of its other recommendations. He rejected the proposal to require FISA Court orders for the FBI’s National Security Letters, but he did limit how long the letters could remain secret. (He eventually settled on a limit of 180 days, with a court order required
…
FANEX, 18, 66 Faurer, Lincoln, 26, 28 Federal Bureau of Investigation (FBI), 63, 74, 77–78, 98, 269, 288n National Infrastructure Protection Center of, 166 National Security Letters of, 254–55, 256, 260 Review Group briefings by, 254–55 Review Group recommendations for, 256 Federal Intrusion Detection Network (FIDNET), 100–102 Federal Trade
…
and, 156, 185 Tailored Access Operations of, see TAO National Security Council (NSC), 40, 97, 140, 150, 187, 188, 227 National Security Directive 42, 66 National Security Letters, 254–55, 260 Review Group recommendations for, 256 National Strategy to Secure Cyberspace, The, 141–42, 174, 199 Naval Postgraduate School, 148 Navy, U.S
by Brad Smith and Carol Ann Browne · 9 Sep 2019 · 482pp · 121,173 words
to the cloud. And we’d go to court to make it stick. We faced our first test when the FBI served us with a national security letter seeking data that belonged to an enterprise customer. The letter barred us from telling the customer that the FBI wanted its data. We studied the
by Rebecca MacKinnon · 31 Jan 2012 · 390pp · 96,624 words
its wiretapping of phone lines, as of mid-2011 it was not required to do so with Internet communications. Furthermore, until 2009, companies complying with National Security Letters (NSL)—a kind of administrative demand letter requiring no probable cause or judicial oversight—were barred by a provision of the Patriot Act from informing
…
intelligence investigations was found to be “ineffectual.” Furthermore, the EFF found that in nearly half of cases in which the FBI abused the use of National Security Letters requesting information, phone companies, Internet service providers, financial institutions, and credit agencies “contributed in some way to the FBI’s unauthorized receipt of personal information
…
Mozilla MSN Spaces Mubarak, Hosni Mubarak, Suzanne Mueller, Milton Mullenweg, Matt Munk Center, University of Toronto NARAL Pro-Choice America Narus Nashi National Religious Broadcasters National Security Letters (NSL), unconstitutionality of Navalny, Alexey Nawaat The Net Delusion (Morozov) Net neutrality abuse of arguments against Federal Communications Commission rules on laws promoting mobile access
…
in disclosure laws, necessity for Electronics Communications Privacy Act of 1986 (ECPA) Foreign Intelligence Surveillance Act (FISA) Amendments Act (2008) government requests for subscriber information National Security Letters (NSL), unconstitutionality of Patriot Act (2001) public accountability whistle-blowers wiretapping of Internet communications Universal Declaration of Human Rights US National Security Agency (NSA) US
by Luke Harding · 7 Feb 2014 · 266pp · 80,018 words
law professor. Barack Obama, in a 2007 stump speech for his nascent presidential campaign, had pledged, ‘No more illegal wiretapping of American citizens. No more National Security Letters to spy on American citizens who are not suspected of a crime. No more tracking citizens who do no more than protest a misguided war
by Cody Wilson · 10 Oct 2016 · 246pp · 70,404 words
-printing closet to fool the corporate repairman. “Are you not worried now?” John asked. “I mean, this is the part where they send us the national security letter. Or where you get disappeared.” “This ex–Special Forces guy started emailing me a couple months ago,” I said. “We talk now, and the other
by Barton Gellman · 20 May 2020 · 562pp · 153,825 words
by Daniel J. Solove · 28 Jun 2011 · 257pp · 72,251 words
by Glenn Greenwald · 14 Apr 2008 · 286pp · 79,601 words
by Bruce Schneier · 2 Mar 2015 · 598pp · 134,339 words
by Jonathan Zittrain · 27 May 2009 · 629pp · 142,393 words
by Bandy X. Lee · 2 Oct 2017 · 369pp · 105,819 words
by Jacob Silverman · 17 Mar 2015 · 527pp · 147,690 words
by Sarah Wynn-Williams · 11 Mar 2025 · 370pp · 115,318 words
by Harvey Silverglate · 6 Jun 2011 · 389pp · 136,320 words
by David K. Shipler · 18 Apr 2011 · 495pp · 154,046 words
by Cyrus Farivar · 7 May 2018 · 397pp · 110,222 words
by Lisa Gitelman · 26 Mar 2014
by Timothy Garton Ash · 23 May 2016 · 743pp · 201,651 words
by John Kiriakou · 11 May 2017 · 299pp · 96,608 words