The government wants our data, whether it鈥檚 sitting on our iPhones or in transit across the Internet.
Last week, we learned that the FBI is trying to force Apple to break its own security features in order to access data stored on an iPhone that belonged to one of the San Bernardino shooters. Many predict that this would set a dangerous precedent for future cases 鈥 and they鈥檙e right. But it鈥檚 important to keep in mind that the government鈥檚 appetite for data isn鈥檛 limited to iPhones. In fact, this is only the latest front in the government鈥檚 long-running efforts to access our data wherever it can be found.
While the country debates what kind of access the FBI should have to the devices we use every day to communicate, the NSA is already intercepting, copying, and searching through vast quantities of our communications as they travel across the Internet backbone from point A to point B. This warrantless spying, known as 鈥淯pstream鈥 surveillance, ensnares essentially everyone鈥檚 international Internet communications 鈥 including emails, chats, text messages, and even web-browsing information. It constitutes a mass intrusion into our privacy online.
With the compelled assistance of the country鈥檚 biggest telecommunications providers, such as and Verizon, the NSA conducts Upstream surveillance by tapping directly into the Internet backbone 鈥 the high-capacity cables, switches, and routers that carry Americans鈥 online communications. The NSA鈥檚 surveillance devices are installed at backbone "chokepoints,鈥 major junctions on the Internet through which the vast majority of international communications travel. After copying virtually all of the international text-based traffic, the NSA searches this traffic for key terms, called 鈥渟electors,鈥 that are associated with its thousands of targets. Critically, however, the NSA isn鈥檛 just plucking out the communications of suspected terrorists or spies. Instead, it鈥檚 drinking from a firehose: It鈥檚 copying and searching nearly everyone鈥檚 international communications, looking for information about its targets. And it does all of this without a warrant.
In other words, it鈥檚 as if the NSA dispatched agents to the U.S. Postal Service鈥檚 major processing centers and had them open, copy, and read the contents of everyone鈥檚 international mail. If a letter contained something of interest 鈥 for example, a reference to a phone number believed to be associated with a target 鈥 the NSA would add the letter to its files and retain that copy for later use. Of course, the Fourth Amendment protects us from precisely this kind of general, warrantless search. The government can鈥檛 simply open all of our letters to look for those that are potentially of interest to it. There鈥檚 no question that this would violate the Constitution, and there鈥檚 no reason to treat Americans鈥 private Internet communications differently.
Last year, the 老澳门开奖结果 filed a suit challenging Upstream surveillance on behalf of a coalition of educational, legal, media, and advocacy organizations, including the Wikimedia Foundation. All of the plaintiffs engage in sensitive international communications in the course of their work 鈥 with journalists, foreign government officials, victims of human rights abuses, clients, witnesses, and the hundreds of millions of people who read and edit Wikipedia. The dragnet surveillance of these communications by the government undermines the privacy and confidentiality on which the plaintiffs鈥 work depends.
The case, Wikimedia v. NSA, is now on appeal in the Fourth Circuit, after the district court improperly concluded that the plaintiffs did not have standing to sue because they hadn鈥檛 plausibly alleged that the NSA was monitoring their communications. The opening brief in the appeal was filed last week, and yesterday, a number of other groups, including technologists, media organizations, and law professors, filed amicus briefs in support of the plaintiffs.
The surveillance state runs deep. But there鈥檚 still plenty of room to fight back.
* * *
The amicus briefs submitted yesterday:
Amicus Brief of Civil Procedure and Federal Courts Law Professors
Amici argue that the district court鈥檚 dismissal of plaintiffs鈥 complaint at the motion-to-dismiss stage was based on a fundamental misapplication of federal pleading standards and should be reversed. At the pleading stage, the court must accept the complaint鈥檚 factual allegations as true, but the district court improperly refused to accept plaintiffs鈥 allegations regarding the NSA鈥檚 activities.
Amicus Brief of Computer Scientists and Technologists
Amici explain why, as a technological matter, plaintiffs have established to a virtual certainty that the government is copying and reviewing at least some of their communications.
Amicus Brief of Electronic Frontier Foundation
Amicus EFF argues that Clapper v. Amnesty International USA does not compel dismissal of this case, as plaintiffs have plausibly alleged Article III standing. EFF also explains why other avenues for obtaining judicial review of Upstream surveillance have proven insufficient.
Amicus Brief of First Amendment Legal Scholars
Amici explain why First Amendment standing doctrine is uniquely permissive, and they argue that the district court erred in failing to conduct its standing analysis under the First Amendment.
Amicus Brief of Reporters Committee for Freedom of the Press et al.
Amici argue that the district court erred in characterizing plaintiffs鈥 claims as speculative, pointing to the concrete ways in which Upstream surveillance has created well-documented chilling effects on the journalistic profession.
Amicus Brief of U.S. Justice Foundation et al.
Amici argue that official government disclosures make clear that plaintiffs鈥 communications are subject to Upstream surveillance. This surveillance violates plaintiffs鈥 rights to privacy and property, and the district court鈥檚 failure to reach the merits of the case puts everyone鈥檚 liberties at risk.