Send a Tweet
Most Popular Choices
Share on Facebook Share on Twitter Share on LinkedIn Share on Reddit Tell A Friend Printer Friendly Page Save As Favorite View Favorites
OpEdNews Op Eds

What you can do about FISA RIGHT NOW

By   Follow Me on Twitter     Message Joan Brunwasser     Permalink    (# of views)   3 comments

Related Topic(s): ; ; ; ; ; ; ; ; ; ; (more...) ; ; , Add Tags  (less...)
Add to My Group(s)

View Ratings | Rate It Headlined to H2 7/4/08

Become a Fan
  (85 fans)
- Advertisement -
"We should celebrate our Constitution this Fourth of July -- and do everything we can to prevent it from being torn up when the Senate returns to Washington DC next week." Sen. Russ Feingold (WI)

I generally try not to send out many action alerts. We all get far too many and feel overwhelmed. I do feel very strongly about FISA. Sen. Feingold reports that all of the calls, petitions, emails and faxes have made a difference, achieving a temporary delay until after the holiday weekend.

I urge you to read this not-too-long article by Elliot Cohen. I read it a few nights ago and it kept me up. FISA and surveillance of American citizens are bad enough; but, I hadn't thought about what unfettered access to email, phone, text messages, etc. could mean in terms of our elections. The following morning, I awoke at 5am (needless to say, not my usual wake-up time) to send the article and a message to my senators.

Once civil liberties are gone, it's a heck of a lot harder to get them back. The vote is supposedly scheduled for Monday or Tuesday. Use a few minutes this weekend making your voice heard. What better time to be thinking about issues like democracy, freedom, and tyranny than on the 4th of July?

To make this as convenient as possible, I've included an action page to enable you to sign a petition against FISA. If you prefer to email, fax, or call your Senators (and any other senators), I urge you to do so. Washington needs to start listening to the voters and not the lobbyists and Big Business.

I'd like to hear from you. Thank you for your time. Happy Independence Day.

Thank you.
Joan Brunwasser, Election Integrity Editor, OpEdNews


- Advertisement -

Original Content at

July 3, 2008

Would the White House be Able to Eavesdrop on Obama Under the FISA Bill Barack Supports? You Bet.

- Advertisement -

By elliot cohen
Would the White House be Able to Eavesdrop on Obama Under the FISA Bill Barack Supports? You Bet.
Created 07/02/2008 - 7:10am
FISA Amendment Just In Time To Steal Election
By Elliot D. Cohen
Senate Democrats and Republicans alike are now poised to pass H.R. 6304, known as the FISA Amendments Act of 2008, a bill touted by both House and Senate leaders to be a compromise proposal to prior Senate Bill 2248. Unfortunately, H.R. 6304 may give the Bush administration, in its last months, the ammunition it needs to hijack the 2008 presidential election.
It has been known for some time that, since 2001, the Bush administration has conducted mass surveillance of the email and telephone calls made by American citizens. All electronic messages passing through switches in the US, regardless of whether they were international or domestic communications, have been systematically intercepted and screened by the National Security Agency (NSA). Technologies, which were installed at major hubs of telecommunication companies throughout the nation copy and deposit all electronic messages into a giant NSA computer network. The NSA then uses complex algorithms to parse through these messages using matching criteria such as key words, phone numbers, and dates, and linking these data to further data--anything from credit card and bank records to movie rentals.
H.R. 6304 does not, on the face of it, require that these complex algorithms that are used to parse through our electronic messages be examined and approved by a FISA Court. The role of the FISA Court seems to be limited to approving the general design of the software used in conducting acquisitions of information. This consists of reviewing the authorizations made by the Attorney General and Director of National Intelligence to see if this general design satisfactorily conforms to "minimization procedures," that is, that they take reasonable precautions to avoid targeting American citizens. However, without access to the algorithm itself, as well as to the actual source code and a representative sampling of the data that ultimately get caught in its electronic net, there is no way to confirm that the actual procedures pass legal muster and are constitutional.
The Act does require that the certification sent to the FISA Court "include the procedures adopted in accordance with subsections (d) [targeting procedures] and (e) [minimization procedures]." However, if this requirement is to have teeth, then it must be interpreted very strictly to include demonstrable evidence that the algorithm satisfies the said standards. Otherwise, the new rule is tantamount to a blank check to invade the privacy of every American citizen.
For example, according to H.R. 6304, an acquisition "may not intentionally target a person reasonably believed to be located outside the United States if the purpose of such acquisition is to target a particular, known person reasonably believed to be in the United States." This proscription against reverse targeting provides a potentially important protection. However, it means very little unless there is a way of proving that the procedures adopted do not reverse target particular Americans. Unfortunately, the Act does not appear to provide any way of verifying this because it does not require that the government provide particular names, addresses, places, and other details. For instance, the Boolean command, "If x > 0 and y > 0 then Flag Message" takes on meaning only if the variables x and y are given a physical interpretation. Thus, there would be serious breaches of both First and Fourth Amendment rights if these physical interpretations were "x = Name of American Journalist" and "y = Name on Bush Enemies List." Without such particular knowledge, the FISA Court would be impotent.

What this means is that the FISA Court must require such particular knowledge and it must avail itself of independent expert witnesses who have the mathematical and scientific expertise to adequately assess the software being used by the government to conduct its surveillance activities. It also means that the program needs to be under constant and careful watch by a vigilant judiciary. This would involve periodic audits to make sure that the software being used is actually the software for which a certification has been granted by the FISA Court.
Unfortunately, even with such a safeguard, the proposed legislation would still grant both retroactive and future legal immunity to telecom companies that help government conduct its surveillance activities. Not only does H.R. 6304 grant immunity from civil action to telecoms that participated in the president's surveillance program during the period beginning on September 11, 2001 and ending on January 17, 2007. It also unconditionally releases these companies from any future liability (presumably both civil and criminal). For it unqualifiedly states, "No cause of action shall lie in any court against any electronic communication service provider for providing any information, facilities, or assistance in accordance with a directive issued pursuant to paragraph (1)." So, if American citizens cannot file suit against these companies for past or future violations of their Fourth Amendment right to privacy, then it has to be questioned how this Act preserves this constitutional right..
Nevertheless, the importance of placing the government under careful judicial watch cannot be underestimated because without such oversight of government surveillance activities, American citizens would be left completely vulnerable to having their privacy unlawfully abridged. And with retroactive and future immunity given to the telecoms, Americans would then have no available legal recourse to seek redress for these violations-or even to know or find out that they are being so violated.
Therefore, before its passage, H.R. 6304 should in the very least be amended to make explicit that there be demonstrable evidence that the procedures adopted for surveillance purposes meet the constitutional requirements the law demands. In its present form there appears to be a serious disconnection between these constitutional provisions and the Court procedures for determining whether they have been met.
The implications for not doing this can be profound and far reaching for the survival of democracy in America and they cannot be understated. Two of the most urgent and immediate of these implications are as follows:
Without rigorous judicial oversight and monitoring of surveillance procedures, the Bush administration will, in the next months, have a timely window of opportunity to intercept its Democratic opponents' email messages and phone calls according to self-serving algorithms that screen for names, addresses, and other indicators that are correlated to these individuals. During the Nixon administration technology was not so sophisticated and Nixon's Burglars had to break into Democratic National Headquarters in order to plant a bug. This can now be done simply by implanting the appropriate algorithm into an NSA computer network.
Second, electronic voting is essentially tied to the phone lines because all votes cast in individual precincts must pass through the phone lines on their way to be tabulated at the main tabulation center. This makes it possible to electronically reconfigure votes before they even arrive at a central tabulation point by embedding the appropriate software in the lines, thereby destroying the prospect of a fair election outcome.

This case resembles "black box" voting where once the votes are cast, it is impossible to see what happens to them. Those who have seen the danger of this have sought to create a paper trail that could provide a means of verifying an election outcome. But now we may be faced with a potentially more ominous strain of the black box problem-votes that disappear into the void of cyberspace only to reappear at the other end of a wire in an altered state. In this digital age, independent inspection of voting machines and careful monitoring of election practices may therefore prove insufficient when cyberspace is not also safeguarded.

The Obama Campaign may be assuming that such electronic manipulation of votes will not happen, but this may be wishful thinking given what we now know about how far this administration will go to get what it wants-and what it clearly wants is to see John McCain "win" the election.
Senate Democrats who are backing the proposed legislation may do well to rethink their commitment as elected officials before signing off on it without adding the requirement that there be demonstrable evidence that surveillance procedures satisfy constitutional requirements.
Elliot D. Cohen, Ph.D., is a political analyst and media critic. His most recent book is "The Last Days of Democracy: How Big Media and Power-Hungry Government Are Turning America Into a Dictatorship." He was first-prize winner of the 2007 Project Censored Award.
Authors Bio: Elliot D. Cohen, Ph.D. is a political analyst and media critic. His most recent book is The Last Days of Democracy: How Big Media and Power-Hungry Government are turning America into a Dictatorship. He is the first prize winner of the 2007 Project Censored Award.

Here is a petition to sign and a two-minute video statement by Sen. Russ Feingold explaining why this is a bad bill. See if you don't agree.
Thank you.


- Advertisement -

View Ratings | Rate It

Joan Brunwasser is a co-founder of Citizens for Election Reform (CER) which since 2005 existed for the sole purpose of raising the public awareness of the critical need for election reform. Our goal: to restore fair, accurate, transparent, secure elections where votes are cast in private and counted in public. Because the problems with electronic (computerized) voting systems include a lack of (more...)

Joan Brunwasser Social Media Pages: Facebook page url on login Profile not filled in       Twitter page url on login Profile not filled in       Linkedin page url on login Profile not filled in       Instagram page url on login Profile not filled in

Go To Commenting
The views expressed herein are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.
Follow Me on Twitter     Writers Guidelines
Contact AuthorContact Author Contact EditorContact Editor Author PageView Authors' Articles
Support OpEdNews

OpEdNews depends upon can't survive without your help.

If you value this article and the work of OpEdNews, please either Donate or Purchase a premium membership.

If you've enjoyed this, sign up for our daily or weekly newsletter to get lots of great progressive content.
Daily Weekly     OpEdNews Newsletter
   (Opens new browser window)

Most Popular Articles by this Author:     (View All Most Popular Articles by this Author)

Interview with Dr. Margaret Flowers, Arrested Tuesday at Senate Roundtable on Health Care

Renowned Stanford Psychologist Carol Dweck on "Mindset: The New Psychology of Success"

Howard Zinn on "The People Speak," the Supreme Court and Haiti

Fed Up With Corporate Tax Dodgers? Check Out!

Snopes confirms danger of Straight Ticket Voting (STV)

Literary Agent Shares Trade Secrets With New Writers