Month: February 2014

  • February 27 Panel 08

    Fanny Pelpel

    http://threatpost.com/justice-dept-eases-gag-order-on-fisa-national-security-letter-reporting/103903

    This article deals with National Security Letters (NSL) and the gag order that is applied with regards to them in particular. This issue has generated a lot of tensions over the years, especially from a First Amendment perspective, leading some service providers such as Google, Facebook, Yahoo and Microsoft to file lawsuits before the Foreign Intelligence Surveillance Court. That is why in January, a Justice Department ruling was released, aiming to ease this gag order and improve transparency.

    The author of the article explains the two options technology and telecommunications companies have: they will be able to report the number of FISA orders for content, non-content, as well as the number of customer accounts affected for each in bands of 1,000 requests and or to report all national security requests, NSLs or FISA orders, and the number of customer accounts affected with exact numbers up to 250 requests, and thereafter in bands of 250.

    These new measures are interesting and debatable for different reasons. Firstly, as the article mentions it, reporting on national security orders issued against data collected by new company products and services must be delayed two years. This alleged improvement is thus limited to established companies and does little to help start-ups and recently created ones in a transparency promotion campaign.

    The disclosure mechanism is not exempt of criticisms either. Reporting these orders in increments of 1,000 could backfire, in the sense that while the purpose of it was to accurately reveal to what extent companies had to cooperate with intelligence agencies, the restriction from reporting the exact number of requests could mislead users.  However the second option limits this drawback. But the underlying issue is that the number of requests and NSLs doesn’t necessary reveal the importance of information disclosed by these companies, and the impact this collection of data could have on consumers’ right to privacy.

    I found this article insightful because it gives a broad view of the stakes of regulating NSLs, the tensions between ensuring the protection of national security, and the companies’ need to maintain trust with their customers for their business’ sakes, through the use of their First Amendment right to free speech.

     

     

    Lisa Lansio

    http://articles.latimes.com/2013/aug/09/news/la-pn-obama-patriot-act-oversight-20130809

    This article discusses President Obama’s news conference on national security and privacy concerns that followed Edward Snowden’s revelations of national surveillance programs. President Obama urged Congress to make changes to the Patriot Act, which would entail greater oversight and the implementation of safeguards for the protection of privacy of individuals. President Obama also recommended that Congress consider the possibility of allowing individuals to appear in court to contest the surveillance measures as applied to them.

    One of the programs that Snowden revealed to the media was an NSA program that allowed the NSA to collect virtually all American telephone calling records. President Obama mentioned this program in his speech and said that he was considering measures to restrict the NSA’s ability to collect this information. A proposal being considered by President Obama would require telecommunications companies to archive calling records themselves, which would then be available to the NSA if it obtained a warrant.

    Among the other proposals being considered by President Obama is a proposal to create a permanent staff of attorneys to advocate for private citizens in cases before the Foreign Intelligence Surveillance Court (FISC). Alternatively, the President is considering allowing outside parties to file amicus briefs to the FISC. This would allow FISC to hear arguments concerning privacy and civil liberties, which may influence the court’s decision-making process.

    While the President is considering supporting changes to the Patriot Act, he has also expressed his view that the Snowden revelations did not reveal abuses of the law and that the dedication to national security should remain a priority. The changes to existing surveillance laws must reflect a balance between national security and the civil liberties and rights of Americans.

     

     

    Courtney Chen

    http://www.nytimes.com/2013/09/14/business/global/china-hems-in-private-sleuths-seeking-fraud.html

    In August of 2013, Peter Humprhey, stood before Chinese national television, handcuffed, donning an orange prison smock and apologized to the masses for his indiscretions.  British national, Mr. Humphrey and his wife, Yu Yingzeng confessed to illegally trafficking personal information via their Hong Kong-based company ChinaWhys, a business marketed towards foreign companies seeking to operate in China. The company claimed that it specialized in advising outside investors on fraud and cheating when dealing with the potentially risky Chinese market. However, investigators contest that firm violated the law on more than ten occasions, buying and selling information that included details about the hukou personal registrations, automobile and home ownership records, family member names, and cross-border travel. The Humphreys profited from these infringements of the privacy of Chinese citizens.

    While the Humphrey incident is not unique in China, the arrest of Peter Humphrey illustrates the newfound interest that the Chinese government has purportedly taken with regards to data privacy. The country currently boasts a national population exceeding 1.3 billion people, over 40% of which are internet users; in 2012, online sales nearly reached a staggering $200 billion. China is in fact primed to surpass the United States in e-commerce transactions. With the internet becoming a pervasive component of business and society and digital footprints growing larger, officials have naturally become concerned with issues surrounding the ways Chinese companies collect and store information about internet users. The benefits that the internet brings have come at an inevitable cost: the loss of data privacy, making users more susceptible to data breaches and identity fraud. Perhaps more importantly, officials have recognized that protecting consumer privacy can increase international commercial interests. Despite China’s robust e-commerce market, some companies are hesitant about entering a foreign environment with dubious security measures.

    Although an omnibus privacy framework has yet to exist, the Chinese government has responded to concerns with a variety of piecemeal provisions. Notably, in 2013, the National People’s Congress enacted the first national standard on personal information protection, though the actual efficacy of the guideline has yet to be realized. After all, China and its “Great Firewall” is not historically known for embracing privacy with open arms. We will see within the upcoming years if its efforts produce actual results.

     

     

    Christina Schnurr

    https://www.accessnow.org/blog/2014/01/24/structural-changes-to-surveillance-court-offer-hope-for-new-protections-for

    Recall our class lecture and discussion about the privacy protections, or arguably lack thereof, for United States persons and non-United States persons under section 702. We noted that the statutory language limiting the government’s targeting program—for example, the government cannot intentionally target anyone located in the US and cannot intentionally target a non-US person for the purpose of targeting a person reasonably believed to be in the US—is broad and, consequently, cause for concern, particularly in light of the increasing use of ex parte proceedings before the Foreign Intelligence Surveillance Court (FISC).

    Attached is a link to an article by Drew Mitnick and Peter Micek for Access, an international human rights organization, suggesting structural changes to FISC that Mitnick and Micek argue will better protect the privacy of US and non-US persons: incorporating special advocates at FISC deliberations, increasing technical assistance to FISC judges, and changing the appointment procedures. While the recommendations for improving technical knowledge and diversity of viewpoints from the FISC judges are significant to protecting privacy, Mitnick and Micek’s recommendation for special advocates’ involvement is of particular interest to us in light of our in-class discussion about the concern that, currently, no person challenges or demands in-court clarification of FISC’s or the government’s statutory interpretation of “intentionally” or “reasonably believed” in authorizing collection of content under section 702.

    Mitnick and Micek provide a list of special advocate best practices to ensure various goals of reforms such as expertise, fair representation, accountability, and due process. In addition, they note that having a special advocate would ensure transparency through declassifications of certain FISC opinions—a highly desired element of reform, but often seen as too risky to national security because of the sensitive information found in some opinions. Mitnick and Micek also suggest special advocates have full access to join a FISC deliberation voluntarily rather than only by a summoning by a FISC judge. (It might be even more advisable to mandate the presence of a special advocate in all deliberations, but that is not mentioned in the article). The list of best practices, particularly the special advocates’ abilities to declassify certain opinions and join deliberations on their own initiative, are viable remedies to the concern that section 702 does not curtail government abuse because of the broad statutory language that goes largely unchallenged.

    To be sure, calling for a special advocate to challenge the government’s claims in FISC proceedings is not a novel reform idea—both reports by the Privacy and Civil Liberties Oversight Board and President Obama’s Review Group endorsed an independent public advocate—which perhaps indicates the receptivity by intelligence agencies and the practicability in implementation.

     

     

    Adam Mechanic

    Article by Eli Lake, February 17, 2014: Spy Chief: We Should’ve Told You We Track Your Calls.

     

    This article discusses an exclusive interview with James Clapper, Director of National Intelligence. In the interview Clapper admitted that public concern over the collection of their phone records by the government could have been avoided. Clapper is of the opinion that the American people would have been more comfortable with surveillance had the government been open about the necessity of it in the wake of 9/11, clearly explained how the process would work, and what the safeguards were going to be.

     

    Clapper explained that the initial program of surveillance after 9/11 was the origin of the program now codified in section 215, a formerly secret law revealed by Edward Snowden. Although Clapper has subsequently declassified a lot of material relating to 215, admitting that the government should have been more transparent is a dramatic departure for the Director of National Intelligence. The article points out that, in a testimony in front of the Senate Select Committee on Intelligence, Clapper openly denied the collection of American citizen’s data. It seems clear that Clapper supported a policy of secrecy at some point, so perhaps the Snowden leaks and subsequent media scrutiny made him realize the error in such a policy.

     

    Would transparency from the outset have helped Americans feel comfortable with surveillance? One should keep in mind that a majority of Americans think that NSA phone tracking is acceptable in the context of fighting terrorism, but this majority is a small one: 56%. Perhaps people’s concern is more about the secrecy of surveillance and less about the actual surveillance itself, which would mean initial transparency would certainly have helped. The problem for the government also seems to be the media frenzy that occurred after the Snowden leaks despite the majority support for certain NSA activities. Overall, it seems that things could not have gone worse for the government than they did after the Snowden leaks, at least from a PR perspective, if they were simply honest with the American people at the beginning.

     

     

    Oren Hoffman

    Surveillance and the Big Tech Companies

    Last year, commentators heavily criticized technology giants such as Google, Yahoo, and LinkedIn for revealing troves of user data to the United States government in response to Foreign Intelligence Surveillance Act (“FISA”) requests and national security letters (“NSLs”).  The Foreign Intelligence Surveillance Court (“FISC”) is charged with overseeing FISA requests for surveillance, and the Court operates largely in secret.  NSLs are issued by FBI officials and typically have nondisclosure provisions.  Until recently, it was entirely unclear the volume and type of information internet companies were revealing to the government in response to these secretive requests.

    Google, Yahoo, Facebook, and LinkedIn sued the Department of Justice last summer.  These companies wanted to publicly reveal more information about the types and content of data requests they receive from the government.  The companies contended that their “businesses are hurt by any perception [that] they are arms of vast government surveillance.”

    The parties reached an agreement last month.  Under this new agreement, companies such as Google can reveal more information about the types and volume of data requests originating from the government.  These companies are also permitted to reveal how many customer accounts are affected by these requests.

    This agreement represents a minor step towards creating a more transparent surveillance system.  For instance, Google can only reveal the kind and volume of information the government is requesting, and how many users are affected.  This agreement did not impact the standard the government must establish for a FISC order or the nondisclosure elements of NSLs.

    Nevertheless, internet users can now begin to understand the breadth and volume of the government’s surveillance.  This new information will both inform the debate as to whether to curtail this type of surveillance and allow internet users to better identify what kinds of data they are potentially sharing with the government when using the web.

     

     

    Geetanjali Visvanathan

    http://www.nytimes.com/2014/02/26/us/justice-dept-informs-inmate-of-pre-arrest-surveillance.html?

    http://www.nytimes.com/2014/01/30/us/warrantless-surveillance-challenged-by-defendant.html

    Yesterday’s NY Times carried the third incident of the government serving a notice informing a US citizen of his pre-arrest warrantless wiretapping under the FISA Amendment Act, 2008 (FAA). Unfortunately in this case the critical information was given to the defendant much after he had accepted the plea bargain.  This recent change in DOJ’s policy of issuing notices and informing defendants of such warrantless wiretapping is the result of Solicitor General, Donald Verrilli Jr. statements made before the Supreme Court in Clapper v. Amnesty International USA where he conceded that prosecutors were obliged to inform the defendants if they faced any such evidence.  Though last year the Supreme Court dismissed this particular constitutional challenge to the FAA on the ground of lack of evidence and standing, this issue is far from over.

    In January this year Mr. Muhtorov, a Colorado resident, who was the first to receive such a notice filed a motion before the District Court of Colorado challenging the validity of FAA. The surprising part in Mr. Muhtorov case was that the FAA notice was given to him 20 months after the initial FISA notice. Thus, raising a reasonable suspicion that the prosecutors had initially informed the defense only about the evidence collected under a wiretap order and concealed prior evidence collected through warrantless wiretapping.

    Apart from challenging FAA on the ground of violation of the reasonable expectation of privacy, warrantless search and reasonableness standard under the Fourth Amendment, Mr. Muhtorov also argues that FAA’s targeting and minimization requirements permit the government to target any foreigner abroad for surveillance and to acquire and retain any U.S. persons’ international communications with (or about) those foreigners that relate to “the conduct of the foreign affairs of the United States”. Thus, FAA exposes every international communication-including by US citizens at one end to warrantless surveillance-thus giving unfettered surveillance power to the government. In all probability this issue will again be before the Supreme Court and we can only wait and see how the Supreme Court determines it this time.

     

     

    Brian Wood

    Charlie Savage, “Warrantless Surveillance Challenged by Defendant,” The New York Times (Jan. 29, 2014)

    The Foreign Intelligence Surveillance Act (FISA) has been in the news a lot lately in the aftermath of the Snowden Leaks. The FISA Amendments Act of 2008 permits the targeted domestic surveillance of non-US persons for national security purposes. Up until now NSA has engaged in its FISA surveillance largely in secret, but there has been growing public consciousness and demand for transparency and judicial review of such domestic surveillance.

    Because of the secretive nature of the NSA in its surveillance pursuant to FISA, there are very limited opportunities to look into how FISA powers are being used, and just as few opportunities for the courts to review those powers. Just last month, two different district courts are now in the midst of first-of-their kind legal actions that could promise future transparency.

    First, an Illinois District Court Judge ordered the government to turn over to a defendant-classified information gathered pursuant to FISA surveillance conducted for national security purposes. “No defense lawyer has apparently ever been allowed to see such materials since the Foreign Intelligence Surveillance Act was enacted in 1978.” The court took this first-of-its-kind move over the protests of Attorney General Eric Holder, who in a sworn affidavit argued that such disclosure of confidential FISA material would threaten national security. The court considered Holder’s protest and considered the fact that defense counsel already had security clearance, and wrote that “[w]hile this court is mindful of the fact that no court has ever allowed disclosure of FISA materials to the defense, in this case, the court finds that the disclosure may be necessary….This finding is not made lightly, and follows a thorough and careful review of the FISA application and related materials.”

    Second, and the focus of the New York Times article, the defense in a Colorado District Court criminal case filed a motion to suppress evidence collected from the FISA-related domestic surveillance of the perminant-resident defendant. The motion, which can be found at http://www.documentcloud.org/documents/1010478-muhtorov-defendants-motion-to-suppress.html argued that the surveillance amounted to a “search” in violation of the Fourth Amendment. “The fruits of the government’s surveillance of Mr. Muhtorov must be suppressed because the statute [the FISA Amendments Act of 2008] that authorized the surveillance is unconstitutional.”

    The defendants in both cases have the same immediate goals for relief: discovery and exclusion of the fruits of FISA materials. Bigger picture, both cases could bring the issue before the Supreme Court of whether surveillance under the FISA Amendments Act of 2008 amounts to a violation of the Fourth Amendment. In the Illinois case, defense counsel are holding off on challenging the constitutionality of FISA, which they may get to eventually in the event they need to argue for a mistrial; at the moment they are more concerned with discovery. On the other hand, defense counsel in the Colorado case are already actively challenging the statute’s constitutionality.

    Both cases are operating in the wake of last year’s Supreme Court decision in Clapper v. Amnesty International to reject a challenge to the 2008 Amendment, although the court did so on procedural grounds, finding that the plaintiffs could not prove that they had been the victims of wiretapping, and therefore lacked standing to challenge the law. The court came to this conclusion after Soliciter General Donald Verrilli “assured the justices that such defendants would receive notice, allowing anyone with proper standing to challenge the 2008 law.” However, as the Snowden leaks would help reveal, at the time when the alleged wiretapping took place in Amnesty International, the government had never put a large class of surveilled defendants on notice that they had been wiretapped.

    Since Amnesty International, (and since the Snowden revelations), Soliciter General Donald Verrilli put pressure on the Justice Department to change its policy, which had previously not required giving defendants notice that they had been subject to FISA surveillance when that surveillance was an “earlier link in an investigative chain.” The Justice Department complied, and began going through its case files looking for defendants who had been subjected to early-stage FISA surveillance. The defendants in the Colorado case and the Illinois case are the only two defendants to have been given notice of their surveillance following this investigation, and as such, if either case were to go to the Supreme Court, neither would be a knocked down on the same standing issue as Amnesty International, and the court may be forced to finally grapple with the FISA Amendment Act’s constitutionality.

     

     

    Sindhu Kandachar Suresh

    http://www.rightsidenews.com/2014022433911/us/homeland-security/fisa-the-nsa-and-america-s-secret-court-system.html

    This article focuses on the Foreign Intelligence Surveillance Court (FISA Court or FISC) created in 1978 as a result of recommendations of the Church Committee. Even though the primary function of the FISC was to double up as a protective measure against arbitrary activities of the intelligence services by requiring the agency to obtain warrants from the Court before intercepting communications and thereby bringing NSA under the realm of regular judicial supervision, the article looks at how FISC has failed to perform this essential function.

    The article looks at the secretive nature of the FISC which unlike regular Courts, meets secretively and holds in camera proceedings with select few government representatives lacking the required ‘due process of law’ with government being the only party to the proceeding. Further, a warrant sought for surveillance from FISC may authorize mass collection of information of millions of people for a long duration which has been condemned by Judge Leon in Klayman preliminary judgment stating “… no court has ever recognized a special need sufficient to justify continuous, daily searches of virtually every American citizen without any particularized suspicion”. The Court’s role as a check in curbing the agency’s arbitrary surveillance activity is further diminished by the statistics provided in the article. For Instance, In the 33,949 applications that were resolved from 1979-2012, only 11 were rejected (0.0324%).

    The overarching powers of FISC have expanded to conducting quasi-constitutional proceedings, allegedly validating the surveillance programs as being within the constitutional powers of the US government. This brings us to ponder on whether a Court which conducts secretive hearings in absence of affected parties and which fails to follow due process of law should be recognized as a Court at al.

     

  • February 20 PANEL 09

    Yael Tzipori

    http://www.washingtonpost.com/news/volokh-conspiracy/wp/2014/02/06/no-fourth-amendment-right-in-metadata-embedded-in-posted-photo-court-holds/

    On January 30, 2014, a judge of the Southern District of Texas determined that there is no reasonable expectation of privacy in the metadata embedded in a photograph posted on the Internet. The defendant in the case, United States v. Post, had uploaded child pornography images to a website, and investigators used publicly available software to scan at least one photograph for the precise location of where the photograph was taken. The photograph had been taken with a cell phone. When a cell phone is used to take a photograph while the location services feature is set to “on,” the camera will store the information from the phone’s GPS in the image file. Investigators were able to scan the image and determine the location at which the photograph was taken, and the location led them directly to the defendant.

    The defendant acknowledged that he had no expectation of privacy in the image itself, which had been voluntarily uploaded to the Internet, but argued that he did have a reasonable expectation of privacy in the metadata (the location information) embedded in the image because he had not intended for that information to be made public. The district court judge stated that there was no basis for dividing the image up based on the type of content it contained–when the defendant made the image publicly available, he relinquished his right to privacy in any of the information contained in that image. The judge analogized the situation to one in which a defendant voluntarily leaves his clothing at a crime scene, but does not realize that he has also left DNA evidence on that clothing. Leaving the clothing in a public place causes the defendant to relinquish any privacy interest in information contained on the clothing, “regardless of how he contemplated that clothing could be used.” Such a conclusion, said the judge, was equally applicable to the defendant in Post.

     

     

    Daniela Badiola

    States Address Privacy Concerns

    Post-Snowden revelations, states have taken it into their own hands to increase the privacy protections of citizens and individual residents. The states taking this action, by enacting stronger privacy protection legislation, are mainly addressing two issues: 1) the courts’ hesitancy to adapt fourth amendment jurisprudence to technological advances that create the capability to store & collect unprecedented amounts of data; and 2) the federal government’s inertia in amending privacy protecting legislation to reflect modern technological use & societal norms.

    In this week’s readings we have seen that while some courts recognize that new uses and dependence on technology renders law like Smith to be irrelevant or wholly distinguishable regarding the NSA’s collection of metadata (Klayman v. Obama, 2013), others cling on to strict analogies to letters and telephones which could only be used to make phone calls (ACLU v. Clapper, 2013).  As a result, 4th amendment jurisprudence regarding mobile phones, which serve a mini-personal computers rather than simple telephones is extremely confused. In addition, legislation such as the Electronic Communications Privacy Act (ECPA) is inadequate in today’s context of mass data. As a result, states are fighting back.

    In Arizona and Tennessee state legislators have proposed, a will likely pass, legislation that bars the state from providing material support to the NSA. In addition, data collected without a warrant cannot be used as evidence in state court. The evidence ban creates a bright line test in the face of confused jurisprudence regarding an individual’s right to privacy from the government.

    In New Hampshire, a proposed bill requires that law enforcement obtain a warrant before searching “information in an electronic portable device.” This mirrors the holding in US v. Wurie (2013) which found that evidence found when a cop searched an arrestee’s phone without a warrant violated the 4th amendment. However, on appeal this might be reversed and other courts might disagree. New Hampshire’s law provides clarity. In addition, New Hampshire is also proposing a bill that will protect “expectation of privacy in personal information, including personal identifiers, content, and usage, given or available to third-party providers of information and services, including telephone; electric, water and other utility services; internet service providers; social media providers; banks and financial institutions; insurance companies; and credit card companies.” This is a necessary slap in the face to the third party doctrine – which taken to its extreme in today’s digital world – diminishes the 4th amendment protections to a mere novelty.

    Relying on out of date precedent, ignoring the modern reality that communication of information is not truly voluntary if one wants to participate in society, and not acknowledging the unprecedented scope of data collection possible using previously acceptable devices, courts have not adapted 4th amendment jurisprudence to adequately protect the privacy of American citizens. In its current gridlock, Congress cannot be depended to make sweeping changes either. As a result, the states have stepped up to the plate. Although this is of little condolence to one interacting with a federal court, it is a step in the right direction.

     

     

    Kevin Thomas

    http://www.dotnews.com/2014/sj-court-decision-impacts-04-savin-hill-murder-trial

    A decision by the Massachusetts Supreme Judicial Court has the effect of throwing out “key evidence” against the defendant from a 2011 murder trial. The decision focused on law enforcement access to cell-site location information (CSLI). More specifically, whether the government needed to meet the traditional “probable cause” requirement for obtaining a warrant, or whether a court order for the information could be obtained through the much less demanding “specific and articulable” facts standard.

    Here the majority found that CSLI, as with GPS in Massachusetts, implicates the constitutionally protected interest of a reasonable expectation of privacy in one’s personal movements. It chose not to apply the same third party doctrine used in Smith v. Maryland and United States v. Miller to the acquisition of CSLI. Interestingly, the dissent distinguished the use of “call CSLI” wherein a user’s location is recorded during phone calls and “registration CSLI” in which the phone’s location is transmitted automatically every seven seconds.

    The District Attorney noted that, because of the gray area in the law, police have been obtaining warrants for this kind of information for years. As a result, this ruling will not impact very many criminal cases in Massachusetts.

     

     

    Jessica Heller

    http://www.nytimes.com/2013/09/10/business/the-border-is-a-back-door-for-us-device-searches.html?pagewanted=2&_r=0&hp

    This article discusses the ways in which the government can use border crossings to perform warrantless searches and seizures of electronic devices.

    The article specifically focuses on the case of David House, a former fundraiser for Bradley Manning’s legal defense, and the government documents that were released as part of House’s legal settlement with the Department of Homeland Security.  The government tagged House as a ‘person of interest’ because of his connection with Private Manning.  As a result, when House flew from Mexico to the U.S., immigration officials seized his computer without a warrant and performed a thorough search.  The documents revealed that after searching over 26,000 of House’s files, there was no evidence of any criminal wrongdoing.

    Though the government may lawfully perform warrantless searches and seizures of electronic devices because of the border crossing exception to the Fourth Amendment, in an increasing number of cases like House’s, it is being asserted that the government is abusing its power, and that power should be curtailed.  An A.C.L.U lawyer working on House’s case said that the government had abused its power to execute a search that “no court would have approved.”

    The government’s ability to skirt constitutional protections is particularly concerning given the high volume of searches on electronic devices.  In the last 3 years, Customs and Border Protection has conducted warrantless electronic media searches on an average of 15 people per day.

     

     

    Christine Kuveke

    http://www.nytimes.com/2013/10/02/technology/google-accused-of-wiretapping-in-gmail-scans.html

    This article discusses a lawsuit that has been brought against Google, alleging that it is wiretapping its users in violation of the Electronic Communications Privacy Act (ECPA). The plaintiffs assert that Google has acted illegally in collecting user data in Gmail and Street View. One practice, which is challenged, is the scanning of emails used to provide targeted advertisements.

    Google has argued that its users have consented to its practices by agreeing to its service and privacy policy. Consent is one of the ECPA exceptions that we discussed in class. Google has also argued that non-Gmail users have no reasonable expectation of privacy when they send emails to Gmail users. Another argument is that Google is entitled to protection under ECPA because it is acting in the ordinary course of business. The counterargument, of course, is that creating user profiles and providing targeted ads are not related to Google’s core business of providing email services. Two federal judges have ruled against Google in its motions to dismiss. One of the themes that runs through the article is the argument that ECPA is “stuck in the past and has failed to keep up with new technologies.”

     

     

    Nathan Monroe Yavneh

    http://www.nytimes.com/2013/05/08/us/politics/obama-may-back-fbi-plan-to-wiretap-web-users.html

    This article, by Charlie Savage of the New York Times, describes the policy debate that surrounds efforts to update the Communications Assistance for Law Enforcement Act (CALEA).

    CALEA, which dates to 1994, already requires phone and network carriers to build interception capabilities into their systems. Today, however, more people are choosing to communicate online, using protocols like VoIP. CALEA does not apply to such modern Internet-based methods of communication. This has prompted a concern by law enforcement officials, such as FBI Director Robert S. Mueller, III, that voice communication is “going dark” – that is, moving to media that law enforcement are not able to intercept.

    The FBI has put out two proposals to update CALEA in recent years. The first proposal, in 2010, would have required Internet communications services to build a backdoor into their systems which law enforcement could use for wiretapping. It would also have required those companies to unscramble encrypted data at the request of law enforcement.

    The more recent proposal takes a different tack, strengthening wiretap orders issued by judges. Under the proposal, a company would first receive notice that it may receive a surveillance request in the future. If it has received such notice, and fails to comply, it would be eligible for steep fines. This would have more teeth than the current law, which affords companies “wiggle room” to argue that they can not surveil for technical reasons.

    There has been criticism of both proposals. Critics argue that it will stifle innovation, potentially driving tech startups overseas to countries where they would not have to comply with wiretap requests. Others worry about security, pointing out that any backdoors built into systems for law enforcement could also be discovered and exploited by hackers or other malicious agents.

    While it remains unclear what form the revisions to CALEA will take, this article indicates that we are at a crossroads with regards to government surveillance of the internet. As technology outpaces a two decade old law, some decision must be reached balancing the privacy interests of Internet users and the law enforcement interests of the government. The abandonment of the FBI’s 2010 proposal to require backdoors and decryption of communications seems to indicate that the balance has swung slightly in favor of user’s privacy, but beyond that it is difficult to predict.

     

     

    Siobhan Atkins

    Article: Chanakya Sethi, Do Americans Care About the Privacy of our Metadata?

    Every day, Americans share vast amounts of information with cell phone service providers, credit card companies, and Internet vendors.  The frequency and volume of information shared with third parties in the digital age raises an important question: do Americans truly “voluntarily” give away all such information, thus waiving any Fourth Amendment protections against that information’s collection? Or, given the degree to which citizens must share such data to participate in modern society, do Americans perhaps expect a greater degree of privacy now than ever before?

    This article briefly explores American sentiments towards metadata collection, and ultimately argues that Americans who disclose more information may expect more privacy in the electronic information they share.  The article first discusses findings made by the panel of intelligence experts convened by President Obama in December 2013 to evaluate the NSA telephony metadata program.  The panel argued that Americans’ extensive disclosure in the digital age does not reflect an increasing apathy about the information’s release to the wider world, but rather is a “necessary accommodation to the realities of modern life.”

    The article goes on to discuss a Pew Research poll that indicates that many Americans are increasingly concerned about the information available about them online – even, paradoxically, as they share more of that information with third parties.  Perhaps most interesting was the poll’s finding that those who have taken more steps to remain anonymous online are more likely than others to have posted information about themselves online – an indication that our desire for privacy may grow stronger in the digital age, even as we share more information about ourselves with others.

    The changing nature of disclosure in modern society, as well as shifting public opinions on privacy, may influence whether courts continue to use Smith v. Maryland as a guide in assessing the constitutionality of metadata collection programs. In Klayman v. Obama, Judge Leon cited the changing frequency and nature of phone use – and an Associated Press survey revealing increased concern about data privacy – in support of his argument that Smith is “of little value” in evaluating the Fourth Amendment claims raised by the NSA’s telephony metadata collection program.  In contrast, Judge Pauley argued in ACLU v. Clapper that the ubiquity of cell phones today “does not undermine the Supreme Court’s ruling that a person has no subjective expectation of privacy in telephony metadata.”  It will be interesting to see how – or whether – changing habits and public sentiment influence court rulings in the future.

     

     

    Paul Hanft (submitted 25 February)

    http://www.usatoday.com/story/news/politics/2014/01/20/poll-nsa-surveillance/4638551/

    http://swampland.time.com/2013/12/17/nsa-takes-a-hit-in-fight-for-american-public-opinion/

    These two articles from Time and USA today discuss the overall public opinion of the American public on the NSA and its collection of metadata. The NSA has been trying to assuage the public that its collection of metadata phone records does not amount to domestic spying, as such former public affairs officer for the Federal Bureau of Investigation and CBS correspondent John Miller featured NSA head Keith Alexander who attempted to explain the NSA’s actions to the American public. The segment was heavily criticized for being inaccurate and the current public opinion leans heavily against the NSA with a 53% majority disapproving of the metadata collection program against 40% approving.

    President’s Obama’s most recent proposals that a third party rather than the government to hold the massive stores of phone metadata and that intelligence analysts would need a court order to search it except in emergencies were also surveyed and respondents expressed little confidence in them in protecting privacy. By 73%-21% margin, those who paid attention to the speech say his proposals won’t make much difference in protecting people’s privacy.

    The article discusses Judge’s Leon recent ruling that the NSA’s broad collection of information from cell-phone records violates the constitution. Particular bothering both to judge Leon and likely to the public as a whole is the NSA’s ability to collect data without any particularized suspicion of wrongdoing and inability of individuals to avoid government collection while simultaneously being integrated into modern life (that is one generally must have a cell-phone).

  • February 13 PANEL 10

    Angela Lelo

    http://www.msnbc.com/msnbc/how-sotomayor-undermined-obamas-nsa

    This article’s author discusses the influence that Sotomayor’s concurring opinion in U.S. v. Jones has already had on the White House, federal judges, and legal scholars. To recall, Sotomayor asserted in that case that the third party doctrine is no longer tenable in the digital age where individuals routinely convey a vast amount of information about themselves to third parties.

    This article’s author suggests that Sotomayor’s position may have important ramifications for the NSA’s metadata program: Should the NSA’s metadata program ever reach the Supreme Court, “the high court will have to reckon with Sotomayor’s reasoning in Jones.”

    This article raises a number of questions: Faced with challenges from legal scholars and civil liberties groups, is the third party doctrine likely to lose its judicial stronghold? More pointedly, will Sotomayor’s stance evolve into the Supreme Court’s majority position over time?

     

     

    Benjamin Goldberg

    Article by Susan Lahey 5 February 2014: ECPA and A Reasonable Expectation of Privacy in the Digital Age

    Since we just discussed the ECPA in class on Wednesday, I thought it would be a good idea to find an article on ECPA for my blog post. As such a hot-button issue, ECPA seems to always be in the news and there were no shortage of recent articles. I chose an incredibly recent one that I thought also summed up a number of issues we discussed.

    The article, in summarizing a recent panel discussion on ECPA, focuses mainly on the cloud and the inherent privacy risks that the ECPA creates. As the article notes, the ECPA hasn’t been changed in nearly 30 years whereas technology has grown leaps and bounds. One panelist noted that a computer in 1986 (the year ECPA was enacted) could only store the data equivalent of two digital photographs. 

    The article, however, also did a good job noting the panelists who defended ECPA. That panelist questioned whether citizens can really have any privacy in the cloud. Since privacy laws were created to protect what was done in the home, communication done in a public forum arguably has no privacy right. Public activity such as cloud storage, tweets, Facebook posts, and information stored on servers in other countries shouldn’t be protected. The panelist further argued that people who store data in the cloud are trading privacy for convenience. The counter-argument, however, is that there is a difference between making information public and allowing the government to access your information.

    The article also discussed the growing problem of intimidation tactics used by some investigators to access information. As the article notes, “For example, an investigator might say “The attorney general isn’t going to be happy with your refusal to cooperate.” As Robinson said, as an attorney, he knows to respond “The attorney general is your boss, not mine” and require that any requests follow proper channels. A company who doesn’t have a staff attorney might not know to do that.” Furthermore, the investigators often don’t understand the technology and ask the hosting company to conduct the research for them. The panelist supporting ECPA surprisingly supported the idea of charging fees for those kinds of services.

    Finally, the article highlighted a discussion on the panel of what reforms to the law will be necessary going forward. Some ideas: protecting electronic information, limiting the discretion of certain agencies and lawmakers, and closing loopholes in the law.

    All in all, I really thought this article, though it only summarized a panel discussion, did a great job highlighting some of the main criticisms of the ECPA, put forth potential solutions, and also offered a balanced defense of the legislation as well.

     

     

    Andrew Choi

    http://dailycaller.com/2014/01/27/its-time-to-protect-data-in-the-cloud/

    This is an article in the Daily Caller that criticizes Obama for not providing a more clear vision for how he aims to bring more balance to surveillance and data collection activities of the government.  The article specifically proposes that the ECPA be updated and expanded to protect data in the cloud – which the article defines as private data stored on servers on the internet.

    The author, Stephen Titch, observes that cloud computing had not been conceived of at the time of the ECPA’s passage.  Moreover, cloud computing is unique in a number of practical ways that may require special treatment, at least with respect to government or third party access.  Unlike traditional information storage, information on the cloud is continually accessible by the user in a way that does not require location proximate to the storage location.  It is also used for a wide variety of promising practical applications (smart homes, driverless cars, and wearable computers) that are useful in personal everyday day-to-day activity.  Moreover, usage in these personal everyday activities requires the divulging and storage of massive amounts of personal data.  For instance, cloud usage in driverless cars would require constant divulging of one’s GPS location.  Hence, the article notes that “companies involved in cloud technology will require a high degree of trust and goodwill from the marketplace if consumers are going to feel comfortable sharing data.”

    Titch proposes extending ECPA protections to data that is collected in the cloud.  Titch thinks this is important because the United States has already lost a lot of political capital and public trust in the US government’s respect for information privacy.  He notes that a number of foreign companies have become hesitant or refused to store data in the United States.

    An ambiguity that Titch does not address is exactly how the ECPA should be modified to address cloud storage – or if in fact the ECPA needs to be modified to address it.  On an obvious reading, cloud storage appears to be clearly covered under the Stored Communications Act.  This would be most obvious in cases where the data stored are traditional documents (like .pdf documents, mp3 files and the like).  That said, in the case of uses like driverless cars, much of the data may not operate as stored communication so much as transmission.  Driverless cars may, for instance, be using the cloud as an intermediary for transmitting data between a GPS satellite, a remote Google computer and the driverless car.  On this reading, cloud storage may be covered under the Wiretap Act, as accessing cloud information would essentially involve “intercepting” information passing (through the cloud) from a driverless cloud to a remote Google computer or GPS satellite.  On another reading, cloud storage may be covered under the Pen Register Act, since much of the information stored in the cloud may be purely incidental  or irrelevant to any content that a user intends to send (such as GPS location).  This is to say, it is not clear if the ECPA needs to be modified to address cloud storage and computing, but it is not exactly clear if cloud storage is a distinct “kind” that needs to be covered by the ECPA.  Information seemingly could fit under any of the three Acts, which would make the ECPA sufficient.  However, this ambiguity and the public conception of “the cloud” as a single type of medium, may be a good reason to explicitly designate “the cloud” as a type of medium that needs to be protected.

     

     

    Matthew Weprin

    http://www.forbes.com/sites/jennifergranick/2014/01/24/told-ya-so-nsas-collection-of-metadata-is-screamingly-illegal/

    Forbes recently posted an article titled “Told Ya So: NSA’s Collection of Metadata is Screamingly Illegal.” The article claims that not only does the NSA’s metadata collection violate the constitution (specifically the Fourth Amendment), but that it is also forbidden because no law authorizes it and several laws forbid it. The NSA relies on section 215 of the Patriot Act which allows the FBI to obtain court orders for companies to produce “tangible things” that are “relevant” to an authorized foreign intelligence investigation.

    The Privacy and Civil Liberties Oversight Board (“PCLOB”), a blue-ribbon panel looking into this issue found that section 215 does not provide an adequate legal basis to support the program because (1) telephone records acquired under in it have no connection to a specific FBI investigation, (2)  they are collected in bulk and cannot be regarded as “relevant,” (3) it obligates telephone companies to furnish new calling records rather than just turning over records in their possession, and (4) the statute only permits the FBI to obtain items for its investigation rather than the NSA.

    The article argues that not only is the NSA metadata collection not authorized by section 215, but it is also prohibited by the Electronic Communications Privacy Act (“ECPA”). Sections 2702 and 2703 of the ECPA prohibit phone companies from sharing their customer information records with the government except within a specific set of enumerated circumstances that does not include section 215 orders. This article presents a compelling case that the NSA metadata collection is not just unauthorized but actually violates the law. The secrecy of the program and the judicial proceedings related to it make it very difficult for the public to understand that the law is being violated and even harder to fight back against it.

    However, the article is also a bit one-sided and may overstate its case by claiming that this metadata collection is “screamingly illegal.” The article claims that the data collection violates the fourth amendment as if it is a given, but the truth is more complicated. Under some relevant case law, the collection of metadata arguably is not a fourth amendment search because metadata does not constitute the content of the call/message. While there is an argument that the scale of data collection makes this unconstitutional, the article does not address it and just takes the fact that metadata collection is unconstitutional as a given. The article also overstated how obvious it is that the metadata collection violated the law.

    Overall, this is an interesting article that does a good job explaining the laws that we studied in class and how they connect to the NSA metadata collection program in layman’s terms. It also provides a good summary of the findings of the PCLOB. However, by overstating its case, it loses some credibility. The authors would have been better off explaining the complexity of the counterarguments to their article in more detail rather than simply dismissing them as obviously wrong.

     

     

    Sarah Sullivan

    http://www.digitaltrends.com/web/the-digital-self-can-the-4th-amendment-fit-in-140-characters/

    We are living in a time that is completely dominated by social media. Many people maintain a presence on several different social media platforms. We put an unprecedented amount of information out into the public sphere through these services, but most people have probably not considered the implications that third party doctrine could have on these social media communications. This article considers how third party doctrine could affect social media communications, including the potential privacy implications and the possibility for future development in this area of law.

    Third party doctrine developed several decades ago, with the Supreme Court decisions in Smith v. Maryland and United States v. Miller. These cases found that warrantless government access of information individuals had shared with a third party – in Smith the information was shared with a phone company, and in Miller it was shared with a bank – was not a Fourth Amendment violation. The Court in Miller explained, “The depositor takes the risk, in revealing his affairs to another, that the information will be conveyed by that person to the Government. This Court has held repeatedly that the Fourth Amendment does not prohibit the obtaining of information revealed to a third party and conveyed by him to Government authorities, even if the information is revealed on the assumption that it will be used only for a limited purpose and the confidence placed in the third party will not be betrayed.” An individual would have no legitimate expectation of privacy in any information shared with a third party, and the government would be free to obtain that information without a warrant.

    Based on Miller and Smith cases, it seems clear that social media platforms such as Facebook would be considered third parties. This raises the concern that any information shared with them would therefore be available to the government without raising any Fourth Amendment violations. However, there have been significant technological developments since those decisions, and the Court has never ruled on third party doctrine as specifically applied to third parties in the digital age. The article notes that Justice Sotomayor’s recent dissent in United States v. Jones left open the possibility that the law could be changing in light of these concerns. She wrote in her dissent, “all information voluntarily disclosed to some member of the public for a limited purpose” is not necessarily “disentitled to Fourth Amendment protection.”

    The article fleshes out the issue at hand by noting that while email communications have been given Fourth Amendment protection in spite of the third party implications, social media raises different, unique concerns. We do not yet have an answer on whether things like tweets or Facebook status updates are entitled to any Fourth Amendment protection – the article points out that “[c]ourts are still divided” and have “not yet [provided] clear guidance on this issue.”

    The article goes on to raise a number of interesting questions to consider as we wait for courts to address what constitutes search and seizure or reasonableness for purposes of the Fourth Amendment with regard to social media. Although people who use social media have some understanding that their communications there are not completely private, many of these platforms have privacy settings or terms of use that address privacy concerns. In spite of the decision to share this information with the public, many people still strive for privacy and ways to protect their internet and social media communications.

    Is this enough to constitute a reasonable expectation of privacy under the Fourth Amendment? Perhaps not, and the article even suggests that our widespread use of social media could actually be eroding our privacy rights, claiming “the very act of sharing parts of your life online, or agreeing to hand over your data recklessly, potentially weakens the constitutional protections awarded to us all.”

    Whatever implications social media has for our privacy rights, Alan Butler, Appellate Advocacy Counsel for the Electronic Privacy Information Center (EPIC), asserts, “courts will be forced to update their Fourth Amendment analysis to adjust for new technologies.” In the meantime, all we can do is wait for the courts to clarify how third party doctrine will affect social media privacy. This is clearly an area of law that is ripe for further development.

     

     

    Christina Skaliks
    http://bits.blogs.nytimes.com/2013/06/09/intelligence-agencies-and-the-data-deluge/?_php=true&_type=blogs&_r=0

    Given our discussion of the ECPA and the third party doctrine I decided to look for an article discussing the protection, or lack thereof, for cell phone meta data.

    This article raises several issues we identified in our discussions of U.S. v.  Jones and the ECPA.  Specifically it addresses Obama’s statement regarding the NSA surveillance program that the NSA was not listening to citizen’s phone calls or reading their e-mails.  The article rightly states that this distinction between content and non-content is disingenuous. This distinction aims to reassure the American people that their expectation of privacy is not being violated or at the very least minimally invaded.  As the author points out, while metadata may not contain what is traditionally thought of as “content”, it can be very revealing.  Meta data can provide insight about an individual’s location, political affiliation, social network and location.  Further, according to the article and a Nature study cited in the article, “four data points about the location and time of a mobile phone call made it possible to identify the sender 95 percent of the time.”   The article also focuses on how metadata is more valuable to the NSA as it cuts down on the traffic the NSA must assess and is easier to organize, and detect patterns.

    Given the value and power of metadata, it is concerning that there are gaps in its protection under current privacy law.  Metadata does not appear to be sufficiently protected under the ECPA. The article notes that metadata is the “least protected form of communications information”.   The NSA reportedly was gaining access to cellular metadata under the pen register act.  This means they gained the metadata upon a showing that the information likely to be obtained was relevant to an ongoing criminal investigation.

    Given the Court’s acceptance of the third party doctrine, even the judicial system could fail to protect one’s expectation of privacy in his or her metadata. This article brought to mind Justice Sotomayor’s discussion of the third party doctrine in her concurrence in US v. Jones.  As Sotomayor noted, the third party doctrine is ill suited to the digital age.  As technology advances, individuals are sharing a wealth of information about themselves without realizing the implications of their actions. An individual may understand that their cellular phone will reveal their location to their service provider, but they may not reasonably suspect that “their movements will be recorded and aggregated in a manner that enables the Government to ascertain, more or less at will, their political and religious beliefs, sexual habits…”

    Overall, I think this article is useful in understanding the basic objections in the recent NSA surveillance controversy.

     

     

    Dave Hamell

    Verizon Issues First Transparency Report, Revealing Widespread Collection of User Location Data

    In the months following former National Security Agency (NSA) contractor Edward Snowden’s leak of a large number of top secret NSA documents revealing that the agency’s broad surveillance programs were sweeping in the information of millions of domestic electronic communications users, internet giants such as Google and Microsoft, and later, telecom providers including AT&T and Verizon, have petitioned the Justice Department for permission to release information related to government requests they’ve received that seek user information. After negotiations with the government over the content and format of permissible disclosures, certain companies are beginning to publicly report such information. On January 22, 2014, Verizon released its first Transparency Report for the 2013 calendar year. The first report of its kind from Verizon, with significantly more detail than reports previously released by other companies, the Transparency Report adds a significant amount of clarity to our understanding of the type and volume of government requests for caller information – an understanding that has previously been clouded by incomplete data on requests for information relating to the location and identities of targeted callers, which law enforcement officers obtain by subpoena, or by court order under the Pen Register Act (PRA), and certain expansions thereof under the FCC’s interpretation of the Communications Assistance for Law Enforcement Act (CALEA). The report reveals a startling number of information requests, particularly by subpoena, and under the broader and more lenient provisions of CALEA.

    In 1986, Congress passed the Electronic Communications Privacy Act (ECPA), which significantly updated the law governing the ability of law enforcement agencies to intercept oral communications made telephonically or through other electronic media, and access content and user information related to non-oral communications sent and stored electronically. The PRA was passed as Title III of the ECPA, and specifically addressed law enforcement’s capabilities to obtain the telephone numbers dialed from a particular targeted telephone (traditionally obtained in real time through a device known as a pen register), as well as the numbers of incoming calls to that targeted telephone (traditionally obtained in real time through a trap and trace device). A court order to use such devices would be issued upon a showing that the information likely to be obtained through their use would be relevant to an ongoing investigation – an exceedingly low standard, particularly as compared with the requirement supported by a showing of probable cause necessary for a court order to be issued under other provisions of the ECPA. In response to the emergence of new communications technology which created barriers for law enforcement agencies attempting to access information transmitted or stored by communications carriers, in 1994 Congress passed CALEA, which at its core, requires that all telecommunications providers have a means to provide law enforcement agencies with information they have legal authorization to access in the course of an investigation. In a case challenging the surveillance capabilities that were interpreted by the FCC as necessary for telecommunications companies to provide under CALEA, the D.C. Circuit court upheld the requirement that carriers make available the physical location of the antenna towers that mobile phone users connect to throughout a call. Analogizing to the location information typically obtained by accessing phone records gathered from pen registers and trap and trace devices, the court reasoned that providing access to such location information from antenna towers instead, was not an expansion of previous law enforcement capabilities under the PRA, and was thus consistent with CALEA’s legislative mandate. Notably, however, because such information is not obtained under the PRA – because no pen registers or trap and trace devices are used in the collection of location information from antenna towers – the authority for gathering such information falls under CALEA, backstopped only by the 4th Amendment, which does not generally protect such information.

    While the Transparency Report revealed that only approximately 6,300 pen register and trap and trace device orders were received, Verizon disclosed that approximately 35,000 requests to produce location information were received. Among those, 11,000 requests were pursuant to warrants, while 24,000 requests were pursuant to court orders. These numbers show a disturbingly great desire for user location data. For example, Verizon received around 63,000 general orders, half of which it described as requiring “the same types of basic information that could also be released pursuant to a subpoena.” This would include information such as user names, addresses, and a list of phone numbers called, which law enforcement officers can obtain by subpoena, in the course of an investigation without judicial approval. Location data is particularly sensitive to many people, as it reveals not only who we were, but where we go. The fact that less than one third of this information was obtained pursuant to a warrant – only issued upon the requisite showing of probable cause mandated by the 4th Amendment to the U.S. Constitution, which many citizens believe is the standard that must be met before their personal information can be gathered by law enforcement agencies – illustrates the high rate at which such information is being disclosed pursuant to a far lower standard.

    Still more unsettling, is the revelation that 3,200 warrants or orders were for “cell tower dumps.” According to the report, “[i]n such instances, the warrant or court order compelled [Verizon] to identify the phone numbers of all phones that connected to a specific cell tower during a given period of time.” Such requests seem inherently overbroad, and as described by the ACLU, are “ripe for misuse.” For example, in one known instance, police in Michigan requested a cell tower dump to gather information on all cell phones that were congregated in a particular area, because of purported concerns of a possible riot. There was, however, no riot, and it was discovered that the only planned congregation in that area was an organized labor protest. As described by Stephen W. Smith, a federal magistrate in Houston, prosecutors have been using requests for location information as “a surreptitious tracking device,” demonstrating that law enforcement has conceived of methods for using location information that are far more insidious than a mere ex post examination of user data.

    Verizon reports that such requests are up substantially from 2012, and are expected to continue to rise. While Verizon has taken an important first step toward increasing the transparency of law enforcement surveillance practices, other carriers should follow Verizon’s lead and provide statistic that are more disaggregated. Moreover, the Justice Department should recognize the great public interest in increased transparency and enable Verizon and other carriers to issue more comprehensive disclosures with data disaggregation, and report more detailed explanations of the type of information requested, the effect on individual users, and the legal basis for such requests. Absent Congressional action or a change in law enforcement practices, only increased disclosure and transparency can assure the public that surveillance abuses are not taking place.

     

     

    Joanne Luckey

    http://www.technologyreview.com/news/523981/android-app-warns-when-youre-being-watched/

    For all of you Android users, there’s an app for that.  The Android app alerts users when their location data is being accessed by apps on their phones.  It also identifies which apps are accessing the information.  It will be available in Google Play in the next couple of months.  There’s also an an app available in the Apple Store called ProtectMyPrivacy.  Unfortunately for iPhone users, the app requires the users to first jailbreak their phones.

    I included this article because I thought students might find it useful.  The developer of the Android app hoped that it would encourage Google and Android apps to provide more prominent disclosures and collect less personal information.  Ultimately, consumers will decide whether they want to exchange their privacy for Flappy Bird and Facebook, but at least they will know that they are making that choice.