By Dale Ton Although the Foreign Intelligence Surveillance Court (FISC) has largely avoided the public limelight for the nearly four decades of its existence, its time in the shadows may be ending. The early days of President Donald Trump’s administration turned America’s attention towards the federal judiciary, with individual judges and the institution becoming subjected […]Read More →
In the past decade the Senate and House of Representatives have attempted to address the ever-growing concerns surrounding cyber-attacks (i.e., independent computer-network attacks), and cyber-espionage (i.e., government funded network attacks) through a variety of legislation. The majority of proposed legislation on this topic is targeted towards improving information sharing networks across both private and public […]Read More →
Earlier this year, a Somali-American man, Mohamed Mohamud, was convicted of trying to use a weapon of mass destruction at a Christmas tree lighting ceremony in Portland, Oregon in 2010. On Tuesday, November 19, 2013, the Department of Justice’s prosecutors filed a two-page notice in the United States District Court for the District of Oregon disclosing […]Read More →
Privacy vs. Security: Analyzing Rep. Rogers’ Comments about Privacy in the Context of Blanket NSA Surveillance.
On October 29, 2013, the Permanent Select Committee on Intelligence held public hearings regarding NSA surveillance of U.S. citizens, and potential changes to the Foreign Intelligence Services Act (FISA). Towards the end of the hearing, Chairman Mike Rogers (R.-MI.) defended domestic NSA surveillance, arguing that no one had complained about the program in ten years, […]Read More →
The Necessity of the Haystack to Find the Needle: A Look into the Controversial NSA Bulk Collection Program
Through leaking thousands of top-secret documents owned by the National Security Agency (NSA), Edward Snowden publicly disclosed the broad interpretation of § 215 of the Patriot Act by the Foreign Intelligence Surveillance Court (FISC) in June 2013 (wordy). With the leaking, the telephony metadata collection program known as the “bulk collection” program, was discovered, […]Read More →