{"id":4916,"date":"2017-02-01T13:24:56","date_gmt":"2017-02-01T17:24:56","guid":{"rendered":"http:\/\/ncjolt.org\/?p=4916"},"modified":"2020-06-04T20:52:57","modified_gmt":"2020-06-04T20:52:57","slug":"fbi-tech-battle-continues","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/fbi-tech-battle-continues\/","title":{"rendered":"Why Can\u2019t We Be Friends? The Battle Between FBI and Tech Continues"},"content":{"rendered":"<p>It seems like just yesterday the FBI was taking legal action to force Apple to unlock the San Bernardino terrorist\u2019s iPhone. <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/journals.law.unc.edu\\\/ncjolt\/tension-between-the-fbi-and-apple-is-halted-but-tension-between-national-security-and-privacy-will-persist\/\">Ultimately, in the case, the FBI found a way to unlock the phone and no longer needed Apple\u2019s help.<\/a><\/span> But, as a previous blog by\u00a0<span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/journals.law.unc.edu\\\/ncjolt\/tension-between-the-fbi-and-apple-is-halted-but-tension-between-national-security-and-privacy-will-persist\/\">Rhian Mayhew pointed out<\/a><\/span>, although the \u201ctension between the FBI and Apple is halted [the] tension between national security and privacy will persist.\u201d<br \/>\nJust a few months after the FBI\u2019s request to Apple, <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/yahoopolicy.tumblr.com\/post\/145258843473\/yahoo-announces-public-disclosure-of-national\">Yahoo announced<\/a><\/span> that the FBI had sent the tech company three National Security Letters (\u201cNSLs\u201d), which are <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.theverge.com\/2016\/6\/1\/11830334\/yahoo-national-security-letters-published\">\u201ccontroversial government demands for information usually accompanied by a gag order and rarely made public.\u201d<\/a> <\/span>While these NSLs, which are <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/www.washingtonpost.com\/opinions\/meet-executive-order-12333-the-reagan-rule-that-lets-the-nsa-spy-on-americans\/2014\/07\/18\/93d2ac22-0b93-11e4-b8e5-d0de80767fc2_story.html?utm_term=.382039a98f58\">authorized by Executive Order 12333<\/a><\/span>, can be seemingly innocuous and \u201climited to the name, address and length of service,\u201d they can \u201calso ask for \u2018electronic communications transactional records\u2019 associated with the account . . . [which] can include the IP addresses from which the service was accessed\u201d among other things. Critics of NSLs claim that they are <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.theverge.com\/2016\/6\/1\/11830334\/yahoo-national-security-letters-published\">\u201ca strikingly broad tool operating with little transparency or oversight.\u201d<\/a><\/span> Unfortunately for these critics, there has been <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.reuters.com\/article\/us-usa-twitter-surveillance-idUSKBN15C00W?il=0\">legislation proposed<\/a><\/span> to further the reach of NSLs to include \u201csenders and receipts of emails, some information about websites a person visits and social media log-in data.\u201d However, \u00a0<span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.reuters.com\/article\/us-usa-twitter-surveillance-idUSKBN15C00W?il=0\">\u201c[t]he legislation failed amid opposition from some major technology companies and civil liberties advocates, but lawmakers have said they intend to pursue the expansion again.\u201d<\/a><\/span><br \/>\nShortly after Yahoo\u2019s announcement, <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/blog.google\/topics\/public-policy\/sharing-national-security-letters-public\/\">Google came forward<\/a><\/span>, in December 2016, and published eight NSLs it had received from the government. Google <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/blog.google\/topics\/public-policy\/sharing-national-security-letters-public\/\">declared<\/a><\/span> that it would \u201cremain vigilant in opposing legislation that would significantly expand the universe of information that can be obtained with an NSL.\u201d<br \/>\nNow, just over a month after Google\u2019s announcement, Twitter, who is currently <a href=\"https:\/\/blog.twitter.com\/2014\/taking-the-fight-for-transparency-to-court\">suing the government<\/a> over the transparency of NSLs, has <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/blog.twitter.com\/2017\/transparency-update-twitter-discloses-national-security-letters\">disclosed<\/a><\/span> two <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.reuters.com\/article\/us-usa-twitter-surveillance-idUSKBN15C00W?il=0\">\u201cwarrantless surveillance\u201d<\/a><\/span> NSL requests which <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.reuters.com\/article\/us-usa-twitter-surveillance-idUSKBN15C00W?il=0\">\u201cappear[] to go beyond the scope of existing legal guidance in seeking certain kinds of internet records.\u201d<\/a><\/span> In Twitter\u2019s case, the government requested the aforementioned <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.reuters.com\/article\/us-usa-twitter-surveillance-idUSKBN15C00W?il=0\">\u201celectronic communication transaction records, which can include some email header data and browsing history, among other information.\u201d<\/a> <\/span><\/p>\n<blockquote><p>Although <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.reuters.com\/article\/us-usa-twitter-surveillance-idUSKBN15C00W?il=0\">\u201ca 2008 Justice Department legal memo . . . concluded that [NSLs] should be constrained to phone billing records,\u201d<\/a><\/span> in practice it the NSLs are going far beyond that and intruding on the privacy of users, exceeding what is allowed.<\/p><\/blockquote>\n<p>This sentiment is echoed by Andrew Crocker, a staff attorney at the Electronic Frontier Foundation, who believes <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.reuters.com\/article\/us-usa-twitter-surveillance-idUSKBN15C00W?il=0\">\u201cThis [to be] an ongoing practice [that] is significantly beyond the scope of what is intended.\u201d<\/a><\/span> Twitter\u2019s associate general counsel Elizabeth Banker noted that although the government requested \u201ca large amount of data, Twitter [only] provide[d] a very limit set of data.\u201d<br \/>\nThe national security interest in each case varies, but the risk to user privacy remains constant. In the San Bernardino case the national security interest was high and the public was aware of what the FBI stood to gain, but Apple realized the risk to privacy and stood tall to protect users from harmful precedent. With NSLs, the national security interest, for better or worse, is known only to the FBI, but the risk of harmful precedent to everyday tech users remains. Users will have to keep an eye on Twitter\u2019s legal battle (Twitter v. Lynch) to see if the fight for increased transparency regarding NSLs will prove successful. Hopefully the tech industry and the FBI can find a mutually beneficial middle ground that both protects privacy and ensures national security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It seems like just yesterday the FBI was taking legal action to force Apple to unlock the San Bernardino terrorist\u2019s iPhone. Ultimately, in the case, the FBI found a way to unlock the phone and no longer needed Apple\u2019s help. But, as a previous blog by\u00a0Rhian Mayhew pointed out, although the \u201ctension between the FBI <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/fbi-tech-battle-continues\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":4917,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[51],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/4916"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=4916"}],"version-history":[{"count":1,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/4916\/revisions"}],"predecessor-version":[{"id":7128,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/4916\/revisions\/7128"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media\/4917"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=4916"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=4916"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=4916"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}