Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Intellectual Freedom
Carrie Lybecker
Liza Rognas
Carlos Diaz
1
Patriot History
September 11, 2001
September 12 Ashcroft instructed staff to
draft broad authorities
Civil libertarians gathered the wagons
September 13 Senate precursor bill adopted
September 19 Congressional, White House
and Justice leaders exchanged proposals
Patriot enacted October 26, 2001
2
Immediate Opposition
ACLU, Electronic Privacy Information
Center, Center for Democracy and
Technology, American Association of Law
Libraries, the American Library
Association, Association of Research
Libraries, Amnesty International, Human
Rights Watch, Physicians for Human
Rights, Women's International League for
Peace and Freedom
3
USA Patriot Act
Uniting and Strengthening America by
Providing Appropriate Tools Required to
Intercept and Obstruct Terrorism Act of
2001
Public Law 107-56
H.R. 3162
4
Patriot Summary
Circumvents 4th Amendment probable cause
requirement and protections of privacy
Vastly increases surveillance and search and
seizure powers
Allows extensive information sharing among
agencies
Minimizes or eliminates judicial and
congressional oversight and accountability
Increases government secrecy
5
Intellectual Freedom: A
Library Value
Intellectual freedom is the right of every
individual to both seek and receive
information from all points of view without
restriction. It provides for free access to all
expressions of ideas through which any and
all sides of a question, cause or movement
may be explored.—American Library Association,
Office for Intellectual Freedom
6
Intellectual Freedom: A
Library Value
Intellectual freedom is the basis for our
democratic system. We expect our people to
be self-governors. But to do so responsibly,
our citizenry must be well-informed.
Libraries provide the ideas and information,
in a variety of formats, to allow people to
inform themselves.—American Library Association,
Office for Intellectual Freedom
7
Privacy: A Library Value
The right to privacy is the right to open
inquiry without having the subject of one’s
interest examined or scrutinized by others
Privacy is essential to the exercise of free
speech, free thought, and free association,
and
8
Privacy: A Library Value
Protecting user privacy and confidentiality
has long been an integral part of the mission
of libraries.—Privacy: An Interpretation of the
Library Bill of Rights, American Library
Association
9
Historical Precedents:
Libraries
1939 Library Bill of Rights
1947 HUAC accused LOC of harboring
aliens
1948 ALA opposed loyalty oaths
1953 McCarthy attacked overseas library
collections, books burned
1953 ALA Freedom to Read
10
Library Awareness
Program 1960s-1980s
FBI infiltrated libraries across nation and
attempted to enlist librarians in the
surveillance and reporting of the library
activities of foreigners, including divulging
their names, reading habits, materials
checked out, and their questions to
reference librarians.
11
Library Awareness
Program 1960s-1980s
“The agents told librarians that they should
report to the FBI anyone with a ‘foreign
sounding name or foreign sounding
accent.’”—Librarian Herbert Foerstel (University of
Maryland, author of Surveillance in the Stacks: The FBI's
Library Awareness Program)
12
Library Awareness
Program 1960s-1980s
“Jaia Barrett of the Association of Research
Libraries wondered: ‘What’s the next step?
Classifying road maps because they show
where bridges are for terrorists to blow
up?’”—Natalie Robbins, “The FBI’s Invasion of
Libraries,” The Nation April 09, 1988
13
History 1970s
Treasury visited libraries demanding patron
records
ALA published “Policy on Confidentiality
of Library Records” and “Policy on
Government Intimidation”
14
History 1970s
ALA denounced government use of
informers, electronic surveillance, grand
juries, indictments, and spying in libraries,
asserting “no librarian would lend himself
to a role as informant, whether of
voluntarily revealing circulation records or
identifying patrons and their reading habits”
15
Intellectual Freedom: A
Basic Human Right
Everyone has the right to freedom of
opinion and expression; this right includes
freedom to hold opinions without
interference and to seek, receive and impart
information and ideas through any media
and regardless of frontiers.—Article 19, Universal
Declaration of Human Rights
16
Intellectual Freedom: A
Civil Right
First Amendment: religion, speech, press,
petition, assembly
Fourth Amendment: privacy, probable
cause
Fifth Amendment: due process of law
17
Fourth Amendment
The right of the people to be secure in
their persons, houses, papers, and effects,
against unreasonable searches and
seizures, shall not be violated, and no
Warrants shall issue, but upon probable
cause, supported by Oath or affirmation,
and particularly describing the place to be
searched, and the persons or things to be
seized
18
Probable Cause
A reasonable ground to suspect that a
person has committed or is committing a
crime or that a place contains specific items
connected with a crime; the facts must be
such as would warrant a belief by a
reasonable man
Major distinction between criminal and
intelligence investigations
19
Criminal vs. Intelligence
Investigations
Criminal investigations must adhere to
constitutional requirements regarding
privacy, probable cause, and due process
Intelligence gathering relied on lesser
standards, i.e. did not require probable
cause, as information sought was for
intelligence purposes only, not for use in
criminal investigations
20
Criminal & Intelligence
Investigations
Patriot blurs or eliminates the distinction
between the two, allows gathering of
evidence for criminal investigations through
the secretive intelligence process which
does not require probable cause as it was
intended to gather data about foreign agents
21
History: 1950s-1970s
FBI maintained campaign of surveillance,
disinformation, and disruption targeting Dr.
Martin Luther King, Jr., Amnesty
International, ACLU, antiwar and women’s
rights groups; and at the
University of California, the Free Speech
Movement, students, professors, and
administrators at UC Berkeley.
22
History: 1950s-1970s
CIA, by law restricted to intelligence
activities outside US and excluding US
persons, illegally spied on 7,000
Americans, sharing information with FBI
FBI initiated files on over 1 million
Americans, without a single resulting
conviction
23
History: 1970s
Senate Church Committee, 1975-1976,
documented FBI and CIA abuses in 13
published volumes
Enacted FISA, the Foreign Intelligence
Surveillance Act of 1978 to safeguard
constitutional rights
24
FISA Purpose
Define FBI domestic surveillance activities
relative to collection of foreign intelligence
information
Provide judicial and congressional
oversight
Prevent political spying and infringement
on constitutional rights
25
FISA Prior to Patriot
Seven member secret court appointed by Supreme
Court to approve applications for intelligence-
gathering
Operates in secret, proceedings are secret,
surveillance is secret, results are secret
FBI was required to attest (without probable
cause) that the “primary purpose” of the
investigation was collection of foreign intelligence
information
26
FISA Prior to Patriot
Court’s role was largely to verify that
required documents had been submitted and
were in order
In 20+ year history, court denied one out of
more than 10,000 requests
27
FISA Prior to Patriot
FBI required to identify location, devices,
information sought, means of acquisition,
duration
FBI prohibited from sharing acquired
information with other law enforcement
agencies unless approved by Attorney
General (the “wall”)
Surveilled person not notified
28
FISA After Patriot
Patriot vastly broadens who may be
surveilled, in what manner, and what
information may be collected
Allows or mandates information sharing
among agencies
Decreases congressional and judicial
oversight
29
Patriot & Libraries
Section 203 Information Sharing
Section 206 Roving Wiretaps
Section 213 Sneak & Peek
Section 214 Pen/Trap-FISA
Section 215 Records
Section 216 Pen/Trap-Criminal
Section 218 Foreign Intelligence Info
30
Section 214: Pen/Trap
(FISA)
Section 214 pertains to electronic
surveillance, Pen/Trap acquisition of
electronic information in intelligence
investigations
31
Section 214: Pen/Trap
A pen register is a device that captures
phone numbers dialed, Internet addressing
information such as email addresses, URLs
accessed, search strings initiated
A trap and trace device identifies the origin
of incoming phone calls or email (electronic
signaling)
32
Section 214: Pen/Trap
(FISA)
Previously, government required to certify
that it had reason to believe that the
surveillance was being conducted on a line
or device used by someone or a foreign
power or agent involved with international
terrorism or intelligence activities that
violate US criminal laws
33
Section 214: Pen/Trap
(FISA)
Now, need only assert that the information
likely to be obtained is either foreign
intelligence information about a non US
person, or relevant to an ongoing
investigation to collect foreign intelligence
information or to “protect against
international terrorism or clandestine
intelligence activities,”
34
Section 214: Pen/Trap
(FISA)
“provided that such investigation of a
United States person is not conducted solely
upon the basis of activities protected by the
first amendment to the Constitution”
35
Section 203a: Foreign
Intelligence Information
Information concerning a US person, that
relates to the ability of the United States to
protect against attack, grave hostile acts,
sabotage, international terrorism, or
clandestine intelligence activities by a
foreign power or its agent; or
36
Section 203a: Foreign
Intelligence Information
information, whether or not concerning a
United States person, with respect to a
foreign power or territory that relates to the
national defense or the security of the
United States, or the conduct of the
foreign affairs of the United States."
37
Foreign Power:
“Foreign power” includes:
Foreign governments
Entity controlled by foreign government
A foreign-based political organization,
not substantially composed of United
States persons (50USC1801)
Examples: Amnesty International,
International Red Cross, CISPES
38
Section 214: Pen/Trap
(FISA)
International terrorism includes activities
that “appear to be intended …to intimidate
or coerce a civilian population” or “to
influence the policy of a government by
intimidation or coercion”
39
Section 203
Information Sharing
Any investigative or law enforcement officer, or
attorney for the Government who has obtained
knowledge of the contents of any wire, oral, or
electronic communication, or evidence derived
therefrom, may disclose such contents to any other
Federal law enforcement, intelligence, protective,
immigration, national defense, or national security
official to the extent that such contents include
foreign intelligence or counterintelligence
information
40
Section 214: Pen/Trap
(FISA)
The person/entity surveilled need not be
suspected of terrorism or any crime
The specific person or communications
device or network need not be specified
The order includes a gag clause: the person
served may not disclose its existence
41
Section 218: Foreign
Intelligence
Previously required to assert that “the
purpose” of the surveillance is to obtain
foreign intelligence information
Revised to: “a significant purpose” of the
surveillance is to obtain foreign intelligence
information
42
FISC Opinion
In August 2002, FISC took the
unprecedented step of releasing, for the first
time in its history, an opinion regarding the
conduct of the Justice Department
43
FISC Opinion
Attorney General asserted that FISA may
“be used primarily for a law enforcement
purpose,” and
Proposed rules that would allow criminal
prosecutors to direct and control
intelligence investigations, that is, to use the
secret FISA process to collect evidence for
criminal cases
44
FISC Opinion
“This may be because the government is
unable to meet the substantive
requirements” of law applicable to criminal
investigation, and
45
FISC Opinion
“Means that criminal prosecutors will tell
the FBI when to use FISA (perhaps when
they lack probable cause), what techniques
to use, what information to look for, what
information to keep as evidence and when
use of FISA can cease because there is
enough evidence to arrest and prosecute”
46
FISC Opinion
Court revealed its 2000 discovery that FBI
had lied in 75 FISA surveillance
applications and was illegally mixing
intelligence and criminal investigations
In March 2001, government reported
similar misstatements in another series of
FISA applications
47
FISC Opinion
The Court found that most of the FBI’s
illegal activities violating court orders
involved information sharing and
unauthorized disseminations to criminal
investigators and prosecutors. How
misrepresentations on surveillance
applications occurred remained unexplained
to the Court, almost two years after they
were first discovered.
48
FISC Opinion
The court ruled against Ashcroft and
ordered the DOJ to retain separation
between criminal and intelligence
investigations
The DOJ appealed to the FISA Court of
Review (FISCR)
49
FISCR Opinion
The FISCR convened for the first time and
issued an opinion reversing FISC decision,
citing Patriot’s Sec. 218 language change
from “the purpose” to “a significant
purpose,” and also citing the explicit
support for that language by several
Senators during Patriot deliberations
[Democrats Leahy, Edwards, and Feinstein]
50
Result
The FISA process for approving electronic
surveillance as well as search and seizure
may be used, without probable cause, to
obtain evidence for criminal prosecution
For FISCR decisions, there apparently is no
recourse to the US Supreme Court
51
Electronic Surveillance:
Carnivore
Carnivore is a system of software and
hardware that captures electronic
communications over a network
52
Carnivore
Its existence was discovered in April 2000
when ISP Earthlink testified before the
House Judiciary Committee that the FBI
was requiring it to install Carnivore on its
network
Congress held hearings and exchanged a
series of letters with the FBI
53
Carnivore
DOJ commissioned a study by IIT Research
Institute and the Illinois Institute of
Technology Chicago-Kent College of Law
54
Carnivore
May be used in either “pen” mode, which
records To and From email address and IP
addresses, or “full” mode which captures
the full content of communications, i.e. e-
mail messages, HTTP pages (web browsing
contents) , FTP sessions, commands and
data, for instance, search strings initiated
55
Carnivore
Switching between modes requires one
mouse click to select a radio button
Operator not identified and actions are not
traceable
Program does not maintain a record of its
own activities
“It is impossible to trace the actions to
specific individuals”
56
Carnivore
Carnivore can perform fine-tuned
(“surgical”) searches
It is also capable of broad sweeps.
“Incorrectly configured, Carnivore can
record any traffic it monitors”
This is a recently declassified FBI
schematic depiction of Carnivore:
57
Carnivore
FBI
58
Carnivore
61
Section 216 & Carnivore
Gag clause: the person owning or leasing
the line to which the pen/trap device is
attached, or who has been ordered by the
court to provide assistance to the applicant,
[shall] not disclose the existence of the
pen/trap or the existence of the
investigation to the listed subscriber, or to
any other person, unless or until otherwise
ordered by the court
62
Section 206: Roving
Wiretaps
Previously, court order had to identify the specific
service, e.g. an ISP or phone company, through
which surveillance would occur
Sec 206 allows the interception of any
communications made to or by an intelligence
target without specifying the particular telephone
line, computer or other facility to be monitored
63
Section 206: Roving
Wiretaps
Includes gag clause—recipient of order
prohibited from disclosure
64
Section 206: Roving
Wiretaps
EPIC analysis: “Could have a significant impact
on the privacy rights of large numbers of innocent
users, particularly those who access the Internet
through public facilities such as libraries,
university computer labs and cybercafes. Upon the
suspicion that an intelligence target might use
such a facility, the FBI can now monitor all
communications transmitted at the facility.”
65
Section 213: Sneak & Peek
“Authority for Delaying Notice of the
Execution of a Warrant”
Eliminates prior requirement to provide a
person subject to a search warrant or order
with notice of the search
With warrant or court order, may search for
and seize any tangible property or
communication, without prior notice
66
Section 215: Records
Under FISA, an FBI official (as low in rank
as Assistant Special Agent in Charge) may
apply for an “order requiring the production
of any tangible things (including books,
records, papers, documents, and other
items) for an investigation to protect against
international terrorism or clandestine
intelligence activities” …
67
Section 215: Records
provided that such investigation of a United
States person is not conducted solely upon
the basis of activities protected by the
first amendment to the Constitution
68
Section 215: Records
Judge is required to authorize the order if
he finds that the “application meets the
requirements of this section”
The order may not disclose that it is issued
for purposes of an intelligence or terrorism
investigation
69
Section 215: Records
Gag clause: “No person shall disclose to
any other person (other than those persons
necessary to produce the tangible things
under this section) that the Federal Bureau
of Investigation has sought or obtained
tangible things under this section”
70
Section 215: Records
On a semiannual basis, the Attorney
General must provide a report to the
Permanent Select Committee on
Intelligence of the House of Representatives
and the Select Committee on Intelligence of
the Senate specifying total number of
applications, and number granted, modified,
or denied during the preceding 6 months
71
Libraries Post 9/11
Sept 2001: UCLA library employee
suspended for posting email critical of US
foreign policy
Sept 2001: Florida librarian reported
suspicious names to FBI, computer records
seized
Sept 2001: Broward County, Florida library
director subpoenaed for patron information
72
Libraries Post 9/11
October 2001: Fort Lauderdale and Coral
Springs libraries in Florida visited by FBI
Feb 2002: U. of Illinois Library Research
Center surveyed 1,020 public libraries—85
had received requests for patron
information
73
Libraries Post 9/11
July 2002: A St. Petersburg Times editorial
reported that library staff of Edison
Community College reported “three Middle
Eastern-looking men who were whispering
while using library computers to look up
Islamic newspapers.” Computer hard drives
were confiscated
74
Libraries Post 9/11
June 2002: FBI sought information about a
library patron from the Bridgeview Public
Library in Chicago
June 2002: Paterson, New Jersey Library
Director Cindy Czesak revealed to the
press, despite a gag order, that the FBI had
visited there seeking patron information
75
Patriot in the Library:
Congress
In a June 2002 letter to AG John Ashcroft, the
House Judiciary Committee asked 50 questions
about the implementation of Patriot, including in
libraries and bookstores
In its July 2002 reply, the Justice Department
declined to answer questions impacting
libraries/records, asserting that the information
was “classified”
76
Patriot in the Library:
Congress
October 2002: House Judiciary Chair
Sensenbrenner issued a press release after
reviewing classified data: “The
Committee’s review of classified
information related to FISA orders for
tangible records, such as library records,
has not given rise to any concern that the
authority is being misused or abused.”
77
Patriot in the Library:
Congress
But as the ACLU noted in a subsequent
lawsuit, “He did not undertake to disclose
those answers to the public.”
78
Patriot in Libraries: To the
Courts
The ACLU, Electronic Privacy Information
Center, American Booksellers Foundation,
and Freedom to Read Foundation filed suit
against the Justice Department for records
concerning implementation of Patriot in
libraries and bookstores, after the
Department of Justice failed to respond to
Freedom of Information Act requests
79
Concluding Thoughts
We don’t know how Patriot has been used
in libraries, and librarians cannot tell us
without risking prosecution
Librarians and the public have a right to
know what information is being collected
about Constitutionally-protected activities,
and to expect government accountability
80
Concluding Thoughts
Librarians have a rich professional history
of promoting and protecting intellectual
freedom
We agree with the ALA: The Patriot Act is
a clear and present danger to intellectual
freedom
81
Concluding Thoughts
The ALA therefore urges all libraries to:
Educate their users, staff, and
communities
Defend and support privacy and open
access to knowledge and information,
and
82
Concluding Thoughts
Adopt and implement patron privacy and
record retention policies that affirm that
‘the collection of personally identifiable
information should only be a matter of
routine or policy when necessary for the
fulfillment of the mission of the library’”
83