Computers, Privacy & the Constitution

View   r3  >  r2  ...
JudyWangFirstPaper 3 - 10 Apr 2015 - Main.ClaireM
Line: 1 to 1
 
META TOPICPARENT name="WebPreferences"
Deleted:
<
<
-- JoseEnriqueFrias - 06 Mar 2015
 
Changed:
<
<
Minors and their iPhones
>
>

Is the United States Circumventing Constitutional Law Through Intelligence Sharing?

 
Deleted:
<
<
 
<--/commentPlugin-->
 
Changed:
<
<
Minors:
>
>
Edward Snowden not only revealed the existence of both American and British mass surveillance programs, but also exposed the close cooperation between the two countries’ intelligence agencies.* In particular, the Guardian reported that GCHQ has had access to PRISM since at least June 2010, and that a joint NSA-GCHQ team examines material intercepted by GCHQ through its Tempora program. The United States may either seek to take advantage of another country’s more lax surveillance laws, or simply benefit from the fact that domestic laws place fewer or no restrictions on the gathering of foreign intelligence. GCHQ lawyers, for example, told the Americans in legal briefings on Tempora that they have a “light oversight regime compared with the US,” and that it was “[their] call” when it came to judging the necessity and proportionality of what they were allowed to look for. While NSA spokeswoman Judith Emmel has denied that the NSA relies on its foreign partners to circumvent U.S. constitutional law, it is unclear whether U.S. law—specifically the Fourth Amendment—applies in the same way, if at all, to surveillance of U.S. persons undertaken in cooperation with a foreign country as it does to surveillance carried out by U.S. agencies alone.** Courts rarely find the Fourth Amendment to apply in cases involving searches and seizures carried out in cooperation with foreign governments, and the sharing of intelligence collected through mass surveillance presents a new question. Even in the cases where U.S. participation is held sufficient to trigger the Fourth Amendment, courts have rarely excluded evidence, ultimately finding that the Fourth Amendment was not actually violated—but this essay will not consider the separate question of what the Fourth Amendment requires once triggered.
 
Deleted:
<
<
Minors have always been subject to special protection in every country of the world. They are looked as a vulnerable sector of society that is in a weak position when dealing with third parties and, hence, need to be provided with a special safeguard that, in some way, aim to balance this natural disequilibrium. Therefore, in most of modern societies minors are considered as citizens with limited capacity of enjoying their rights and obligations.
 
Changed:
<
<
Generally, minors can’t buy and/or consume certain products, read certain books, watch certain movies, attend certain places, or live by themselves without the watch of a tutor or guardian. Moreover, they can’t be punished as adults for the commission of felonies, travel abroad alone, get married, or apply for public positions. Despite for specific exceptions, minors are not entitled to enter into binding agreements, or at least, they are not compelled to comply with them if they don’t want to.
>
>

Constitutional Limitations on Intelligence Sharing

 
Deleted:
<
<
Minors’ Protection Laws:
 
Changed:
<
<
California’s Family Code (§ 6700, § 6701, § 6710) states that a minor can only make binding contracts when such don’t involve the delegation or powers, the disposition of real property, or a matter different to an arms length transaction. However, minors are allowed to disaffirm (i.e. repudiate, or declare it void) such binding agreements at any point of their underage situation or in a “reasonable” period after they become adults.
>
>
While the Fourth Amendment protects U.S. citizens against unreasonable searches or seizures conducted by U.S. officials both at home and abroad, it does not apply to searches or seizures conducted exclusively by foreign governments. Under the “international silver platter doctrine,” evidence seized by foreign governments may be turned over to U.S. law enforcement and admitted in domestic criminal prosecutions, except in the extraordinary circumstance that their conduct “shocks the judicial conscience.”*** Courts have justified this doctrine on the basis that American courts can do little, if anything, to deter unreasonable searches by foreign governments. If U.S. officials cooperate with foreign law enforcement, however, they must comply with the Fourth Amendment. The legal issue then becomes precisely how much American involvement in a search is permissible before the conduct constitutes a “joint venture” triggering the Fourth Amendment. Most courts have generally required a substantial degree of participation: there are only a handful of cases in which U.S. participation in foreign investigations has been found sufficient to trigger the Fourth Amendment. In almost all of these cases, U.S. officials both initiated and actively participated in the search (see, e.g., United States v. Stokes). United States v. Juda is a notable outlier, where the court held that the Fourth Amendment was triggered by the fact that Australian authorities installed a tracking device on a narcotics smuggling vessel at the request of United States officials.
 
Changed:
<
<
Moreover, Peruvian Civil Code (§ 43, § 44, and § 227) proclaims that when not dealing with arms length transactions, minors under 16 years old are absolutely incapable of binding themselves through any agreement, being any contract that they enter into null and void. Likewise, it asserts that acts of minors between 16 and 18 years old can be disaffirmed at any point without further reason.
>
>
Most courts agree that merely providing tips or information or conveying suspicions to foreign police, resulting in a search or seizure, will not trigger the protections of the Fourth Amendment. For example, the Second Circuit in United States v. Maturo upheld a judgment that Turkish law enforcement officers were not acting as U.S. agents when they wiretapped the phones of a suspect under investigation by the DEA, finding no evidence that the DEA was specifically involved in the decision to seek a wiretap. Many courts have also held that U.S. agents may request, be present during, or even participate in a search so long as they did not initiate and control it. The court in United States v. Behety declined to find a joint venture where American agents provided information for a search, were present while it was conducted, and videotaped part of it. The same principles generally apply where the United States makes a request to a foreign government pursuant to a mutual legal assistance treaty (MLAT). For example, although an American MLAT request detailed specific evidence to be seized by Spanish authorities in United States v. Adler, “Spanish officers chose how to implement the search, conducted it without American input besides the MLAT request, and benefited from the fruits of the search.” As these cases show, courts are extremely reluctant to find sufficient U.S. involvement for the purpose of applying the Fourth Amendment even in cases whose facts appear demonstrate a substantial degree of participation.
 
Deleted:
<
<
Each state has its own minor’s protection laws and, even more, there are binding international treaties that protect them.
 
Changed:
<
<
iPhones and iOS:
>
>

Does the Fourth Amendment Apply to U.S.-U.K. Intelligence Sharing?

 
Deleted:
<
<
iPhones are sold in the U.S. (and, hence, in California), in Peru, and in most of the countries of the world. iPhones are used worldwide by adults, and also by minors. iPhones are not only mobile devices that allow users to communicate among them, but are also devices by means of which users make contracts with third parties.
 
Changed:
<
<
Since the Internet era, cellphones became “smart” and stopped being just artifacts that permitted wireless phone conversations, converting into multipurpose goods. An iPhone can be used as a GPS, as a payment device, as a videoconference device, as a photo camera, as a video camera, as a search device, etc. By connecting an iPhone to Internet, its users are enabled to access to an immense amount of information. However, by connecting an iPhone to Internet, its users also enable third parties to access to an immense amount of their personal information, and they are not always as aware as they should about it.
>
>
Similar to the NSA’s upstream collection, the U.K. government’s Tempora program involves the bulk interception, storage, and search of Internet traffic passing through fiber optic cables. According to the Guardian, GCHQ has intercepted more than 200 fiber optic cables landing the United Kingdom. The NSA’s involvement in this program suggests to some that it is essentially a joint project. The collected data is automatically searched and then extracted according to terms selected by both agencies: GCHQ has set over 40,000 search terms, while the NSA has set at least 31,000. Reports further indicate that a team consisting of 250 NSA and 300 GCHQ analysts is tasked with examining the intercepted material. The NSA also paid GCHQ at least 100 million pounds between 2010 and 2013 for its services, and in one report, GCHQ boasted about its “unique contributions” to the NSA’s investigation of the American citizen responsible for an attempted car bomb attack in Times Square in 2010. Whether this intelligence sharing implicates the Fourth Amendment may depend of course on the precise details of the arrangement, but Snowden’s disclosures suggest there is enough of a possibility that the U.K. is playing a role in American surveillance for this scenario to present a useful hypothetical at the very least.
 
Changed:
<
<
iOS is iPhone’s operating system and it is developed and exclusively used by Apple Inc. By obligation, every iPhone user is, at the same time, an iOS user, and, therefore, is required to agree with its terms and conditions in order to use its mobile device. iOS 8.1’s terms and conditions (http://images.apple.com/legal/sla/docs/iOS81.pdf) state, among other things that, by using their iPhones, users grant Apple Inc. the following rights (the “Rights”):
>
>
Given the current state of the joint venture doctrine, the United States government may have a plausible legal argument that receiving information on U.S. persons from the United Kingdom does not constitute a joint venture to which the Fourth Amendment applies—even if the NSA requests the information from GCHQ or provides them with tips. The U.S. government may argue that its setting almost half of the terms according to which data is searched may be considered such a request. The case law suggests that NSA officials may also be present and participate in the search, so long as they do not “control” it (see, e.g., United States v. Cotroni). Reports that a team consisting of 250 NSA and 300 GCHQ analysts is tasked with examining Tempora’s intercepted material may indicate a variety of levels of U.S. participation, or may be irrelevant if the analysis takes place after the “search” is complete. It is also difficult to analyze the allegation that the NSA paid GCHQ over 100 million pounds between 2010 and 2013 without more information. For example, payment may be analogized to the consideration involved in mutual legal assistance treaties, or could be justified by the fact that it facilitates British compliance with the UKUSA Agreement and related obligations. While one can expect courts to draw the line at intentional circumvention of domestic law, U.S. government officials have denied this, and it would in any case be quite difficult to prove.
 
Changed:
<
<
- Collect, maintain, process and use, diagnostic, technical, usage and related information; - Access to their locations (whenever they enable such option in their phones); - Share users’ personal information with third parties (partners, developers, content providers, etc.); - Use users’ location data; and, - In general, access, collect, maintain, process and use all your conversations, pictures, videos, messages, among other things related to the iPhone’s use.
>
>
Criticisms of the joint venture doctrine and courts’ reluctance to find sufficient U.S. involvement for the purpose of applying the Fourth Amendment in even seemingly clear-cut cases are especially salient when it comes to cooperation involving electronic surveillance. In the few cases in which courts have found joint investigations sufficient to trigger the Fourth Amendment, U.S. officials have been physically present during the search and either directly seized evidence or provided armed cover in support of a foreign seizure. Unlike the search or seizure of physical evidence, electronic surveillance does not necessarily require the presence of law enforcement at all, let alone that of U.S. officials. Other than making the request, it is not clear how else the United States could participate in such a foreign investigation. It is therefore difficult to imagine how the sharing of electronic surveillance would ever trigger the Fourth Amendment under the current application of the joint venture doctrine. Furthermore, it is not clear how the doctrine would apply to foreign electronic surveillance of U.S. persons located in the United States since all of the cases involve foreign investigations of U.S. persons located abroad.
 
Changed:
<
<
These terms and conditions don’t only have to be accepted before the iPhone’s first use, but also every time the iOS system is updated (something which has happened frequently since its release in 2007).
>
>
Mass surveillance programs are unlike foreign investigations involving the electronic surveillance of a U.S. person because they collect vast quantities of data that may either be searched automatically on an ongoing basis according to certain terms, or stored and later searched once a request has been made. In the case of automatic searching, the United States could hypothetically have an enormous influence on whether a particular search is carried out—by setting search terms, helping design the surveillance system, or contributing to its infrastructure—without ever requesting surveillance of any individual. If the NSA has unrestricted access to Tempora, or jointly analyzes the intercepted data, then it would be very difficult to deny their substantial participation. If GCHQ both automatically searches the intercepted information and shares it with the NSA according to a set of criteria predetermined by American officials, it is difficult to see how the United Kingdom is acting as anything but a U.S. agent. In this case, a court may either apply the joint venture doctrine or it could find the doctrine wholly inapplicable and conclude that the NSA is receiving intelligence from GCHQ about U.S. persons located in the United States and apply the Fourth Amendment as though the NSA were collecting the same intelligence itself. The Fourth Amendment may not be triggered under the joint venture doctrine, however, if GCHQ only shared intelligence gathered through the program upon its own initiative or in response to a particularized NSA request for information on a U.S. person located abroad.
 
Changed:
<
<
Minors and iOS terms and conditions:
>
>
The silver platter principle seems to be premised on the fact that investigations of U.S. persons abroad depend on, or are at least greatly facilitated by, the cooperation of foreign governments. If the United States asks another country to conduct a search of a U.S. person located in the United States, however, it is difficult to avoid the conclusion that the government is circumventing domestic law and not just practical or logistical realities—even if the joint venture analysis otherwise applies. The fact that both Tempora and Prism involve the mass collection of Internet data makes these programs especially problematic—both in terms of the joint venture doctrine and the Fourth Amendment. Unlike the NSA’s bulk telephony metadata collection program, which observes national borders insofar as only the American government can obtain the information from domestic third parties, the NSA and GCHQ may have direct access to a lot of the same Internet traffic, making it even more likely that the United States and the United Kingdom are circumventing domestic law. Current legal doctrines addressing the applicability of the Fourth Amendment do not adequately address this scenario. Of course, whether the United States is violating the Fourth Amendment is a separate question.
 
Changed:
<
<
As we have mentioned before, iPhones are not only used by adults, but also by minors. Although minors can’t sign service agreements with cellphone companies, they are able to buy iPhones at iStores and operate them through Wi-Fi Internet. Therefore, they are required to accept iOS’ terms and conditions (at the first use and also when updates are released), and, consequently, they individually grant their Rights to Apple Inc.
>
>
*Of course, these current reports of intelligence sharing between the United States and the United Kingdom are part of a much longer history of cooperation between the two countries in this area, dating back to the United Kingdom-United States of America (UKUSA) Agreement of 1946. While I could have equally addressed American intelligence sharing arrangements with the other members of the Five Eyes alliance (Canada, Australia, and New Zealand) or “third parties” (e.g. Israel), I have chosen to focus on the United States and United Kingdom because of their particularly close relationship.
 
Changed:
<
<
As of today, this situation has been assumed as normal, and users and Apple Inc. consider these agreements as binding and enforceable. However, how does this situation work under the Californian and Peruvian minors’ protection laws? How does this situation work and under the other minor’s protection laws that exist all over the world?
>
>
**Privacy International has raised similar concerns in the United Kingdom, alleging that GCHQ may be circumventing U.K. law by obtaining data on British citizens from the NSA’s PRISM program. The complaint separately challenges the Tempora program as violating the Regulation of Investigatory Powers Act of 2000, as well as EU law and the Human Rights Act.
 
Changed:
<
<
Can the authorization of permanently sharing ones’ location be considered an arms length transaction? Can the authorization of been permanently monitored be understood as a regular activity of an underage? Do we, as a society, consider that minors can allow third parties to “collect, maintain, process and use” their private conversations/pictures/videos? Is the right of disaffirming such obligations enough for protecting this vulnerable and defenseless sector of society?

Is Apple Inc. or any other company that make contracts with minors through smartphones aware of this situation? Do they have filters and procedures that help to confirm that their contract counterparties are citizens with full capacity to bind them? What if a minor that is an iPhone user disaffirms the granting of Rights? Will Apple Inc. delete all the minor’s personal information that was stored while their iOS terms and conditions were in full effect? Will this minor be able to use her iPhone without agreeing with iOS terms and conditions?

California’s Family Code and the Peruvian Civil Code are from 1993 and 1984, respectively. A lot of water (and data) has passed under the bridge since that moments, and regulations need to be updated. If one of the main purposes of societies is to protect minors, something needs to be done… and soon.

>
>
***Conduct deemed to “shock the judicial conscience” has included acts of “torture, terror, or custodial interrogation” or forcible abduction and would not apply to intelligence sharing.
 \ No newline at end of file

Revision 3r3 - 10 Apr 2015 - 19:20:30 - ClaireM
Revision 2r2 - 06 Mar 2015 - 20:16:49 - MatthieuWharmby
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM