翻訳と辞書
Words near each other
・ Global strategic petroleum reserves
・ Global Strategic Trends Programme
・ Global strategy
・ Global Strategy for Plant Conservation
・ Global Strategy for Women's and Children's Health
・ Global Strategy Forum
・ Global Strategy Group
・ Global Strategy Lab
・ Global Student Entrepreneur Awards
・ Global studies
・ Global Sunday
・ Global Supply Systems
・ Global supply-chain finance
・ Global surveillance
・ Global surveillance and journalism
Global surveillance by category
・ Global surveillance disclosures (1970–2013)
・ Global surveillance disclosures (2013–present)
・ Global surveillance whistleblowers
・ Global Sustainability Assessment System
・ Global Sweeteners
・ Global symmetry
・ Global Synergy
・ Global System of Trade Preferences among Developing Countries
・ Global tactical asset allocation
・ Global Tag League
・ Global Talk Show
・ Global Tamil Forum
・ Global Tamil Vision
・ Global Task Force on Expanded Access to Cancer Care and Control in Developing Countries


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Global surveillance by category : ウィキペディア英語版
Global surveillance by category
This is a category of disclosures related to global surveillance.
== Court orders, memos and policy documents ==

*Memorandum of understanding between the NSA and the Israel SIGINT National Unit (ISNU)
*April 2013 FISC Order demanding that Verizon hand over all telephony metadata to NSA. The order had been initially granted in May 2006. In 2009 the FISC discovered that the government had made repeated and substantial misrepresentations to the court about its use, and had routinely been "running queries of the metadata using querying terms that did not meet the required standard for querying." It further concluded that the violations had been routine and systematic.
*Legal Justification of the bulk telephony metadata collection (officially released)
*2009 NSA Procedures for Targeting Foreigners for Surveillance
*2009 NSA Procedures for Minimizing collection on US Persons
*2011 NSA Procedures for Minimizing collection on US Persons (officially released)〔(【引用サイトリンク】title =Minimization Procedures Used by the National Security Agency in Connection with Acquisitions of Foreign Intelligence Information Pursuant to Section 702, as amended )
*
*Reference to a 2011 Change in the court-approved Minimization Procedures allowing analysts to run search queries using US persons' identifiers if there is "effective" oversight by NSA (it is not publicly known if such oversight has been established, or if any such searches have been conducted). The court order mentioned was later officially released.
*October 2011 Court decision finding NSA's upstream collection program, which collected tens of thousands of non-target communications, to have violated the law. It held, citing multiple Supreme Court precedents, that the Fourth Amendment applies to the contents of all communications, whatever the means (they are "papers"). It also finds that the NSA's minimization and targeting policies to be legally and/or constitutionally deficient, and recommends changes. (officially released).〔 Additional findings:
*
*The collection of Upstream data had begun before a court order approving it, in violation of 50 USC § 1809(a), which makes it a crime to engage in, use or disseminate surveillance knowing, or having reason to know such surveillance was not authorized.
*March 2009 FISC ruling showing a consistent pattern of misrepresentations of the bulk telephone metadata collection program by the government to the Court. It also held that the data was being routinely queried in ways that did not meet "reasonable articulatable suspicion", demonstrating inadequate safeguards in the software and training of analysts. Showing that "thousands of violations resulted from the use of identifiers that were not "RAS-approved by analysts who were not even aware that they were accessing BR metadata," and that in 2006 "there was no single person (the NSA ) who had a complete understanding of the BR FISA system architecture," a situation which persisted until February 2009 or later. RAS is shorthand for Reasonable Articulatable Suspicion. The Court nonetheless reapproved the collection of bulk phone metadata, while mandating additional safeguards and training, and "end-to-end system engineering reviews," and reports from the review. (Officially released by court order)
*October 2012 Presidential Policy Directive 20 (PPD20), outlining cyberwarfare.
*2007 Michael Mukasey memo proposing broader powers.
*April 2013 list of US Spying targets and topics by priority. The top priority countries are: Iran, Russia, China, Pakistan, North Korea and Afghanistan. Germany, France, the European Union, and Japan are mid-level priorities; Italy and Spain rank lower.
* FY 2013 Intelligence "Black Budget" Summary.
* A memorandum of understanding concerning US sharing of raw SIGINT with Israel. The data has not been scrubbed to eliminate US persons, it asks Israel not to deliberately target US persons, however the agreement allows Israel to retain US person data for one full year. The memorandum is not legally binding. A separate document states "And there are other kinds of CI threats that are right on our midst. For example, one of NSA's biggest threats is actually from friendly intelligence services, like Israel.", it continues "Balancing the SIGINT exchange between US and Israeli needs has been a constant challenge. In the last decade, it arguably tilted heavily in favor of Israeli security concerns. 9/11 came and went, and with NSA's only true Third Party CT relationship being driven almost entirely driven by the needs of the partner."
* September 13, 2013 FISC Court order declassifing all the legal opinions relating to Section 215 of the Patriot Act written after May 2011 that aren't already the subject of Freedom of Information Act litigation. The FISA Court ruled that the White House must identify the opinions in question by October 4, 2013.
* 1,000 pages of documents were released by James R. Clapper Jr. on November 19, 2013 in response to lawsuits filed by the American Civil Liberties Union and the Electronic Frontier Foundation and a directive by U.S. President Barack Obama. Among the documents are what appeared to be the original court document authorizing the National Security Agency to conduct sweeping collections of Americans’ electronic communications records for counterterrorism purposes, the NSA’s failure to abide by court-imposed rules to protect Americans’ privacy, reports to Congress, training slides and regulations issued under President Obama.
* December 16, 2013 ruling by US district court judge for the District of Columbia Richard Leon declaring that the mass collection of metadata of Americans’ telephone records by the National Security Agency probably violates the fourth amendment prohibition unreasonable searches and seizures.〔 Leon granted the request for an preliminary injunction that blocks the collection of phone data for two private plaintiffs (Larry Klayman, a conservative lawyer, and Charles Strange, father of a cryptologist killed in Afghanistan when his helicopter was shot down in 2011) and ordered the government to destroy any of their records that have been gathered. But the judge stayed action on his ruling pending a government appeal, recognizing in his 68-page opinion the “significant national security interests at stake in this case and the novelty of the constitutional issues.”
* 2013-12-27 ruling by U.S. District Judge William H. Pauley III in New York City holding the U.S. government’s global telephone data-gathering system is needed to thwart potential terrorist attacks, and that it can only work if everyone’s calls are swept in. In his opinion, he wrote, "a bulk telephony metadata collection program () a wide net that could find and isolate gossamer contacts among suspected terrorists in an ocean of seemingly disconnected data" and noted that a similar collection of data prior to 9/11 might have prevented the attack. U.S. District Judge William H. Pauley III also ruled that Congress legally set up the program and that it does not violate anyone’s constitutional rights. The judge also concluded that the telephone data being swept up by NSA did not belong to telephone users, but to the telephone companies. And further he ruled that, when NSA obtains such data from the telephone companies, and then probes into it to find links between callers and potential terrorists, this further use of the data was not even a search under the Fourth Amendment. He also concluded that the controlling precedent is Smith v. Maryland: “Smith’s bedrock holding is that an individual has no legitimate expectation of privacy in information provided to third parties,” Judge Pauley wrote.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Global surveillance by category」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.