2nd Circuit Decision in the Microsoft Ireland Warrant Case

**The 2nd Circuit [Opinion](http://pdfserver.amlaw.com/nlj/microsoft_ca2_20160714.pdf)** (pdf; 43 pages)

**Background:**

> [Microsoft Corporation v. United States of America](https://en.wikipedia.org/wiki/Microsoft_Corporation_v._United_States_of_America) – Wikipedia

> [The Microsoft Ireland Case: A Brief Summary](https://www.lawfareblog.com/microsoft-ireland-case-brief-summary) (July 15, 2016) – LawFare

**News Reports:**

> [Microsoft Wins Appeal on Overseas Data Searches](http://www.nytimes.com/2016/07/15/technology/microsoft-wins-appeal-on-overseas-data-searches.html) (July 14, 2016) – New York Times

**Analysis and Criticism:**

> [Reactions to the Microsoft Warrant Case](https://www.lawfareblog.com/reactions-microsoft-warrant-case) (July 15, 2016) – LawFare

> [Second Circuit: Warrants Cannot be Used to Compel Disclosure of Emails Stored Outside the United States](https://www.washingtonpost.com/news/volokh-conspiracy/wp/2016/07/14/second-circuit-warrants-cannot-be-used-to-compel-disclosure-of-emails-stored-outside-the-united-states/) (July 14, 2016) and [Does It Matter Who Wins the Microsoft Ireland Warrant Case?](https://www.washingtonpost.com/news/volokh-conspiracy/wp/2015/07/23/does-it-matter-who-wins-the-microsoft-ireland-warrant-case/) (July 23, 2016) – Orin Kerr in The Washington Post

> [Microsoft Just Won a Big Victory Against Government Surveillance — Why It Matters](https://www.teachprivacy.com/microsoft-just-won-a-big-victory-against-government-surveillance-why-it-matters/) (July 15, 2016) – Daniel Solove at TeachPrivacy

> [The Microsoft Ireland Case and the Future of Digital Privacy](https://www.justsecurity.org/32076/microsoft-ireland-case-future-digital-privacy/) (July 18, 2016) – Jennifer Granick at JustSecurity

> [Three Key Takeaways: The 2d Circuit Ruling in The Microsoft Warrant Case](https://www.justsecurity.org/32041/key-takeaways-2d-circuit-ruling-microsoft-warrant-case/) (July 14, 2016) – Jennifer Daskal at JustSecurity

> [Microsoft v. USA: A Win for Privacy, or Is It?](https://iapp.org/news/a/microsoft-v-usa-a-win-for-privacy-or-is-it/) (July 14, 2016) – Omer Tene at IAPP

> [Microsoft Case Shows the Limits of a Data Privacy Law](http://www.nytimes.com/2016/07/19/business/dealbook/microsoft-case-shows-the-limits-of-a-data-privacy-law.html) (July 18, 2016) – New York Times

**Related:**

> [Microsoft’s President Explains the Company’s Quiet Legal War for User Privacy](https://www.washingtonpost.com/news/the-switch/wp/2016/07/22/microsofts-president-explains-the-companys-quiet-legal-war-for-user-privacy/?postshare=7501469393208504&tid=ss_tw) (July 22, 2016) – The Washington Post

> [U.S. Government Presents Draft Legislation for Cross-Border Data Requests](https://www.lawfareblog.com/us-government-presents-draft-legislation-cross-border-data-requests) (July 16, 2016) – David Kris at LawFare

07/23/2016: 

Quote of the Day – on Online Commercial Surveillance:

From the ever interesting Maciej Ceglowski at his [Idle Words](http://idlewords.com/talks/what_happens_next_will_amaze_you.htm):

> “The proximate reasons for the culture of total surveillance are clear. Storage is cheap enough that we can keep everything. Computers are fast enough to examine this information, both in real time and retrospectively. Our daily activities are mediated with software that can easily be configured to record and report everything it sees upstream. But to fix surveillance, we have to address the underlying reasons that it exists. These are no mystery either. State surveillance is driven by fear. And corporate surveillance is driven by money.”

Read the whole thing, including details of his six, sensible, suggested fixes: (1) the right of users of an online site or service to download data (in usable format) that was provided to or collected by the online site or service; (2) the right at any time to delete one’s account (and all associated personal information) from an online service; (3) a ban on selling or sharing behavioral data, as well as relatively short limits on its storage (e.g., 90 days); (4) physical turn-internet-connectivity-off switches for IoT connected devices (which should be required to remain functioning in the off state); (5) a ban on third-party ad tracking (with sites only able to target ads based on page content itself and information the site has about the visitor), and (6) legally enforceable privacy promises with significant penalties that act as meaningful deterrents.

Also: Watch his presentation on “The Website Obesity Crisis” at [Vimeo](https://vimeo.com/147806338?ref=tw-share) (53 minutes)

Problems with Current Crypto Implementation

**Academic Paper:** “Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice” ([pdf](https://weakdh.org/imperfect-forward-secrecy-ccs15.pdf); 13 pages), published earlier this year, but presented at a recent conference

**General Explanation** (by two of the fourteen co-authors of the academic paper): [How is NSA Breaking So Much Crypto?](https://freedom-to-tinker.com/blog/haldermanheninger/how-is-nsa-breaking-so-much-crypto/) – Freedom to Tinker

**EFF’s Two Part Explainer:** [Logjam, Part 1:](https://www.eff.org/deeplinks/2015/05/logjam-internet-breaks-again) “Why the Internet is Broken Again” and [Logjam, Part 2:](https://www.eff.org/deeplinks/2015/05/logjam-part-2-did-nsa-know-years-internet-was-broken) “Did the NSA Know the Internet Was Broken”

**EFF’s Practical Advice:** [How to Protect Yourself from NSA Attacks on 1024-bit DH](https://www.eff.org/deeplinks/2015/10/how-to-protect-yourself-from-nsa-attacks-1024-bit-DH)

**Bruce Schneier:** [Breaking Diffie-Hellman with Massive Precomputation (Again)](https://www.schneier.com/blog/archives/2015/10/breaking_diffie.html) and his previous post [The Logjam (and Another) Vulnerability against Diffie-Hellman Key Exchange](https://www.schneier.com/blog/archives/2015/05/the_logjam_and_.html)

10/15/2015: 

2014 Wiretap Report Released

**The Wiretap Report:**

> The 2014 Wiretap Report ([summary and links to several pdfs](http://www.uscourts.gov/statistics-reports/wiretap-report-2014)) released by the Administrative Office of the United States Courts.

**News Coverage:**

> [Federal Wiretaps Down Slightly, Encryption Impact Decreases; California and Arizona Lead Nation in Authorized Wiretaps](http://www.networkworld.com/article/2942611/security0/federal-wiretaps-down-slightly-encryption-impact-decreases.html) – NetworkWorld

> [Data Shows Little Evidence for FBI’s Concerns About Criminals ‘Going Dark’](http://motherboard.vice.com/read/data-shows-little-evidence-for-fbis-concerns-about-criminals-going-dark) – Motherboard/VICE

07/1/2015: 

Quote of the Day:

> “Usability is critical. Lots of good crypto never got widely adopted as it was too hard to use; think of PGP. On the other hand, Tails is horrifically vulnerable to traditional endpoint attacks, but you can give it as a package to journalists to use so they won’t make so many mistakes. The source has to think ‘How can I protect myself?’ which makes it really hard, especially for a source without a crypto and security background. You just can’t trust random journalists to be clueful about everything from scripting to airgaps. Come to think of it, a naive source shouldn’t trust their life to securedrop; he should use gpg before he sends stuff to it but he won’t figure out that it’s a good idea to suppress key IDs. Engineers who design stuff for whistleblowers and journalists must be really thoughtful and careful if they want to ensure their users won’t die when they screw up. The goal should be that no single error should be fatal, and so long as their failures aren’t compounded the users will stay alive.”

— Ross Anderson at [Light Blue Touchpaper](https://www.lightbluetouchpaper.org/2015/05/02/meeting-snowden-in-princeton/)

05/12/2015: 

Second Circuit Bulk Collection Decision (link roundup)

The Opinion: [pdf](http://www.ca2.uscourts.gov/decisions/isysquery/5b758b27-c77d-44a2-b6e5-dbf456f5c142/1/doc/14-42_complete_opn.pdf#xml=http://www.ca2.uscourts.gov/decisions/isysquery/5b758b27-c77d-44a2-b6e5-dbf456f5c142/1/hilite/) (110 pages)

News Reports:

[NSA Program on Phone Records is Illegal, Court Rules](http://www.washingtonpost.com/world/national-security/appeals-court-rules-nsa-record-collection-violates-patriot-act/2015/05/07/c4fabfb8-f4bf-11e4-bcc4-e8141e5eb0c9_story.html) – Washington Post

[NSA Phone Program is Illegal, Appeals Court Rules](http://www.wsj.com/article_email/appeals-court-rules-nsa-phone-program-not-authorized-by-patriot-act-1431005482-lMyQjAxMTA1MDA2NzcwNTc0Wj) – Wall Street Journal

Audio Summary for Laypersons: Professor William McGeveran on [Wisconsin public radio](http://www.wpr.org/listen/755961) (approx. 10 minutes)

Analysis and Opinion:

[Second Circuit Rules that Section 215 Does Not Authorize Telephony Bulk Collection Program](http://justsecurity.org/22799/breaking-circuit-rules-section-215-authorize-telephony-bulk-collection-program/) – Marty Lederman at Just Security

[Second Circuit Rules, Mostly Symbolically, that Current Text of Section 215 Doesn’t Authorize Bulk Surveillance](http://www.washingtonpost.com/news/volokh-conspiracy/wp/2015/05/07/second-circuit-rules-mostly-symbolically-that-current-text-of-section-215-doesnt-authorize-bulk-surveillance/) – Orin Kerr in the Washington Post

[Court Backs Snowden, Strikes Secret Laws](http://www.bloombergview.com/articles/2015-05-07/court-backs-snowden-strikes-secret-laws?cmpid=yhoo) – Noah Feldman at BloombergView

Background Legal Paper by an Attorney for one of the Amici Curiae: [Bulk Metadata Collection: Statutory and Constitutional Considerations](http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2344774) by Laura Donohue (2013)(pdf download at the link)

Impact on Patriot Act Section 215 Status/Sunset:

[How the Second Circuit’s Decision Changes the Legislative Game](http://www.lawfareblog.com/2015/05/how-the-second-circuits-decision-changes-the-legislative-game/) – Liza Goiten at LawFare

[The Second Circuit and the Politics of Surveillance Reform](http://justsecurity.org/22839/circuit-politics-surveillance-reform/) – Steve Vladeck at Just Security

Related:

[If the Supreme Court Tackles the NSA in 2015, It’ll be One of these Five Cases](http://arstechnica.com/tech-policy/2015/01/if-the-supreme-court-tackles-the-nsa-in-2015-itll-be-one-of-these-five-cases/) – The Hill

05/8/2015: 

What Went Wrong With the FISA Court

A [report by the Brennan Center for Justice](http://www.brennancenter.org/publication/what-went-wrong-fisa-court#.VQorcVAp4s8.twitter) on the legitimacy of today’s FISA Court, which concludes that the court longer functions in keeping with constitutional requirements ([direct link to pdf](http://www.brennancenter.org/sites/default/files/analysis/What_Went_%20Wrong_With_The_FISA_Court.pdf) – 83 pages)

03/18/2015: 

President Obama on Surveillance, Cybersecurity and Related Matters


Re/code’s Kara Swisher interviews the President at Stanford University on February 13th (25 minute video).


00:20    Cybersecurity breaches

04:17    U.S. offensive capabilities

06:22    U.S. cybercommand

08:02    Government relationship with Silicon Valley

10:51    Encryption and Backdoors

15:24    Privacy and Data Ownership

18:13    Immigration, STEM, diversity, loss of U.S. tech leadership

23:22    President’s personal tech habits

But:

[President Obama’s Cyber Pitch Misses Mark in Silicon Valley](http://thehill.com/policy/cybersecurity/233400-obama-cyber-pitch-misses-mark-in-silicon-valley) – The Hill

[What President Obama is Getting Wrong about Encryption](http://www.washingtonpost.com/blogs/the-switch/wp/2015/02/19/what-president-obama-is-getting-wrong-about-encryption/) – The Washington Post

New Tails and Tor

[Tor Browser 4.0.3](https://blog.torproject.org/blog/tor-weekly-news-%E2%80%94-january-21st-2015) and [Tails 1.2.3](https://tails.boum.org/news/version_1.2.3/index.en.html) have been released, in each case allegedly addressing security issues in their respective prior releases.

Proposed “USA Freedom Act” – Link Roundup (updated with death of the bill in 113th Congress)

Background: [U.S. Senate Bill Proposes Sweeping Curbs on NSA surveillance](http://www.reuters.com/article/2014/07/29/us-usa-nsa-congress-idUSKBN0FY1EM20140729) – Reuters’ news report.

Update: On November 18, 2014, the Senate voted to end further discussion of the proposed Act during the 113th United States Congress. [Critical NSA Reform Bill Fails in the Senate](http://www.wired.com/2014/11/usa-freedom-act-fails-in-senate/) – Wired

Text: txt, pdf and html versions at [Congress.gov](https://beta.congress.gov/bill/113th-congress/senate-bill/2685/text?q={%22search%22%3A[%22USA+Freedom+Act+Senate%22]}).

Summary of the Bill: [Senator Leahy’s NSA Reform Bill: A Quick and Dirty Summary](http://www.lawfareblog.com/2014/07/senator-leahys-nsa-reform-bill-a-quick-and-dirty-summary/) — LawFare

Position of the Electronic Frontier Foundation: [EFF’s Decision to Support the Bill](https://www.eff.org/deeplinks/2014/08/understanding-new-usa-freedom-act-questions-concerns-and-effs-decision-support) and [The New Senate USA FREEDOM Act: A First Step Towards Reforming Mass Surveillance](https://www.eff.org/deeplinks/2014/07/new-senate-usa-freedom-act-first-step-towards-reforming-mass-surveillance) at EFF’s DeepLinks blog.

Other Commentary: [Our Privacy and Liberty Still at Risk, Even if Leahy NSA Bill Passes](http://www.truth-out.org/news/item/25491-our-privacy-and-liberty-still-at-risk-even-if-leahy-nsa-bill-passes) – Elizabeth Goitein of the Brennan Center for Justice.

Debate1: Stewart Baker, former NSA general counsel, debating Harley Geiger, Deputy Director for the Freedom, Security and Surveillance Project at the Center for Democracy and Technology ([Steptoe Cyberlaw Podcast](http://www.steptoecyberblog.com/2014/08/15/steptoe-cyberlaw-podcast-debate-with-harley-geiger/)); debate sponsored by the Federalist Society).


  1. http://html5-player.libsyn.com/embed/episode/id/3019695/height/400/width/450/theme/standard/direction/no/autoplay/no/autonext/no/thumbnail/yes/preload/no/no_addthis/no/ 

11/19/2014: 

Executive Order 12333

[Feds call it ‘twelve triple three’ – Whistleblowers Say it’s the Heart of the Mass Spying Problem](http://arstechnica.com/tech-policy/2014/08/a-twisted-history-how-a-reagan-era-executive-order-led-to-mass-spying/) – ArsTechnica

[Text of Executive Order 12333](http://www.archives.gov/federal-register/codification/executive-order/12333.html) – National Archives

[Executive Order 12333 and the Golden Number](http://justsecurity.org/16157/executive-order-12333-golden-number/) – Alvaro Bedoya at Just Security

[Executive Order 12333 on American Soil, and Other Tales from the FISA Frontier](http://webpolicy.org/2014/12/03/eo-12333-on-american-soil/) – Jonathan Mayer of Stanford University

08/28/2014: 

Matthew Green on Email Encryption

> “The path to a proper encrypted email system isn’t that far off. At minimum, any real solution needs:

> ‘A proper approach to key management. This could be anything from centralized key management as in Apple’s iMessage — which would still be better than nothing — to a decentralized (but still usable) approach like the one offered by Signal or OTR. Whatever the solution, in order to achieve mass deployment, keys need to be made much more manageable or else submerged from the user altogether.’

> ‘Forward secrecy baked into the protocol. This should be a pre-condition to any secure messaging system.’

> ‘Cryptography that post-dates the Fresh Prince. Enough said.’

> ‘Screw backwards compatibility. Securing both encrypted and unencrypted email is too hard. We need dedicated networks that handle this from the start.'”

— Professor Matthew Green, Johns Hopkins University, writing at his blog: [A Few Thoughts on Cryptographic Engineering](http://blog.cryptographyengineering.com/2014/08/whats-matter-with-pgp.html).

WIRED Interviews Edward Snowden

The Interview: [The Most Wanted Man in the World](http://www.wired.com/2014/08/edward-snowden/) — James Bamford in Wired

Two Companion Pieces in WIRED: [I Left the NSA Clues, But They Couldn’t Find Them](http://www.wired.com/2014/08/snowden-breadcrumbs/) and [A Day With Edward Snowden](http://www.wired.com/2014/08/scott-dadich-snowden/)

The Importance of Privacy

National security reporter, Barton Gellman, responding in a [Washington Post Q&A](http://live.washingtonpost.com/nsa-surveillance-bart-gellman.html) to the question of why anyone should care about U.S. government surveillance if they have nothing to hide:

> “Information is power. The US government (and US companies) now learn more about us than anyone has ever known about anyone, and secrecy prevents us from learning what they do. That puts us, in effect, behind a one way mirror. As a citizen who wants to hold my government to account, I find that troubling.
I am not saying that the government is abusing the power it has accrued. Sometimes the scandal is what’s legal, especially if lawmakers and citizens had no reasonable opportunity to learn what the executive branch believed it was authorized to do. But abuse is not far behind us in our history. Spying on enemies was one of the Articles of Impeachment against Nixon, and the FBI’s Hoover died in the lifetime of many people still living. I don’t know whether I’ve ever met someone who truly has nothing to hide. If you think that’s you, post a link to everything on your phone, your computer, your email accounts and your web browsing and purchasing history. And even if you have no secrets, you’re probably in possession of the secrets of others — the friend who is going to leave her husband, or wants to find a new job, or just got diagnosed with something she does not want people to know about. Privacy is relational. We may tell things to our friends we don’t tell our parents or our kids, and so on. I want control of my own secrets, personal and professional. That’s the bottom line.”

Also worthwhile: Barton Gellman’s 2003 lecture at Princeton on “Secrecy, Security and Self-Government: An Argument for Unauthorized Disclosures” (transcript: [Part I](http://www.tcf.org/work/foreign_policy/detail/secrecy-security-and-self-government-an-argument-for-unauthorized-disclosur/) and [Part II](http://www.tcf.org/work/foreign_policy/detail/secrecy-security-and-self-government-how-i-learn-secrets-and-why-i-print-th/)), as well as Conor Friedersdorf’s [Why the Press Can Publish Any Classified Material It Likes](http://www.theatlantic.com/politics/archive/2014/05/why-the-press-can-publish-any-classified-material-it-likes/371488/) in The Atlantic.

07/31/2014: 

A Fundamental Problem with the NSA’s Domestic Bulk Data Collection

[**NSA = J. Edgar Hoover On Steroids**](http://www.ritholtz.com/blog/2014/07/nsa-j-edgar-hoover-on-steroids/) – **The Big Picture**:

>”With a few hundred cable probes and computerized decryption, the NSA can now capture the kind of gritty details of private life that J. Edgar Hoover so treasured and provide the sort of comprehensive coverage of populations once epitomized by secret police like East Germany’s Stasi. And yet, such comparisons only go so far. After all . . . . J. Edgar Hoover still only knew about the inner-workings of the elite in one city: Washington, D.C. To gain the same intimate detail for an entire country, the Stasi had to employ one police informer for every six East Germans — an unsustainable allocation of human resources. By contrast, the marriage of the NSA’s technology to the Internet’s data hubs now allows the agency’s 37,000 employees a similarly close coverage of the entire globe with just one operative for every 200,000 people on the planet. In the Obama years, the first signs have appeared that NSA surveillance will use the information gathered to traffic in scandal, much as Hoover’s FBI once did.”

Read the whole thing. Domestic bulk data collected by the NSA conveys immense power on those with access to this information and will be prone to political (and financial) abuse. History demonstrates that the lure of such data for improper purposes likely will be irresistible. Hoover stayed in office for decades, aided in large part by the information the the FBI had collected on politicians of the day. Imagine what could be done with the data collected by the NSA.

07/16/2014: 

Today’s Must Read on the NSA

“The NSA has become too big and too powerful. What was supposed to be a single agency with a dual mission — protecting the security of U.S. communications and eavesdropping on the communications of our enemies — has become unbalanced in the post-Cold War, all-terrorism-all-the-time era . . . . The result is an agency that prioritizes intelligence gathering over security, and that’s increasingly putting us all at risk. It’s time we thought about breaking up the National Security Agency.” **Bruce Schneier** at [CNN.Opinion](http://www.cnn.com/2014/02/20/opinion/schneier-nsa-too-big/index.html) with practical suggestions for reform.

02/21/2014: 
Tags:   

Recommended:

####Cyber Law, Tech and Policy

+ [**Spying for the Sake of Spying**](http://www.washingtonpost.com/opinions/anne-applebaum-spying-for-the-sake-of-spying/2013/10/31/170f7556-4250-11e3-a624-41d661b0bb78_story.html): an Op-Ed in the Washington Post by **Anne Applebaum**, lauded author of “Gulag” and “Iron Curtain: The Crushing of Eastern Europe, 1944-1956”:

> “But Bismarck couldn’t tap phones. We can. And that, as far as I can tell, explains why we were doing it. White House spokesman Jay Carney declared this week that the president is anxious to ensure ‘that we are not just collecting information because we can but because we should.’ Yet almost everything publicly known about the NSA to date indicates the opposite: The United States collects information because it can, whether or not it is moral to do so, violates the trust of allies or is a monumental waste of time and money.”

+ [**Senate Committee Votes in Favor of NSA Phone-Records Snooping**](http://www.wired.com/threatlevel/2013/10/phone-snooping-approved/) at **Wired**, and [**Feinstein Releases Fake NSA Reform Bill, Actually Tries To Legalize Illegal NSA Bulk Data Collection**](http://www.techdirt.com/articles/20131031/12394625090/feinstein-releases-fake-nsa-reform-bill-actually-tries-to-legalize-illegal-nsa-bulk-data-collection.shtml) at **TechDirt**. The original sources: Senator Feinstein’s [**press release**](http://www.feinstein.senate.gov/public/index.cfm/press-releases?ContentRecord_id=3aa4ed70-e80b-4c2b-afd6-dc2e5bc75a7b) and her [**draft bill** (pdf)](http://www.intelligence.senate.gov/pdfs113th/113fisa_improvements.pdf) which has been approved by the Senate Intelligence Committee.

+ [**Want To Avoid Defaming Someone Online? Link To Your Sources**](http://blog.ericgoldman.org/archives/2013/10/want-to-avoid-defaming-someone-online-link-to-your-sources-forbes-cross-post.htm): Law Professor **Eric Goldman** at the **Technology & Marketing Law Blog**. See also, his recent post on California’s new “do-not-track” law: [**How California’s New ‘Do-Not-Track’ Law Will Hurt Consumers**](http://blog.ericgoldman.org/archives/2013/10/how_californias.htm).

+ [**Tech Companies Are Better Off Targeting Geezers Instead Of Youngsters**](http://www.businessinsider.com/tech-companies-are-better-off-targeting-silver-surfers-than-the-saturated-younger-poorer-market-gartner-2013-10) at **Business Insider**.

+ [**Finally, a Bill to End Patent Trolling; Bipartisan Bill has Most of What Reformers Want—and a Real Chance of Passing**](http://arstechnica.com/tech-policy/2013/10/its-finally-here-a-bill-to-end-patent-trolling/): at **ArsTechnica**.

####General Interest

+ [**The 50 Greatest Breakthroughs Since the Wheel**](http://www.theatlantic.com/magazine/archive/2013/11/innovations-list/309536/) ranked by a panel of scientists, entrepreneurs, engineers and historians of technology – **The Atlantic** (via [**kottke**](http://kottke.org/13/10/50-greatest-innovations-since-the-wheel)).

+ [**Memo to Workers: The Boss Is Watching; Tracking Technology Shakes Up the Workplace**](http://online.wsj.com/news/articles/SB10001424052702303672404579151440488919138): **The Wall Street Journal**.
+ [**Who Made that Coffee Lid?**](http://www.nytimes.com/2013/10/27/magazine/who-made-that-coffee-lid.html?_r=0): **New York Times Magazine**.

+ [**How to Succeed as an Author: Give up on Writing; The Rancid Smell of 21st Century Literary Success**](http://www.newrepublic.com/article/115016/publishing-back-so-long-successful-authors-give-writing): **Lionel Shriver** in the **New Republic**.

11/1/2013: 

Developments on the NSA Surveillance Front

[**The Case for NSA Reform**](http://www.politico.com/story/2013/10/leahy-sensenbrenner-nsa-reform-98953.html?hp=l5) – by **Senator Patrick Leahy** and **Congressman Jim Sensenbrenner**:
>”[W]e were the primary authors of the USA PATRIOT Act . . . . [W]e strongly agree that the dragnet collection of millions of Americans’ phone records every day — whether they have any connection at all to terrorism — goes far beyond what Congress envisioned or intended to authorize. More important, we agree it must stop. [Today] we will introduce bicameral, bipartisan legislation that will put an end to the National Security Agency’s indiscriminate collection of personal information. Our proposal, the USA FREEDOM Act, provides stronger privacy safeguards with respect to a range of government surveillance programs. While the USA FREEDOM Act ends the dragnet collection of telephone records, it preserves the intelligence community’s ability to gather information in a more focused way, as was the original intent of the PATRIOT Act. Our bill also ensures that this program will not simply be restarted under other legal authorities, and includes new oversight, auditing and public reporting requirements. No longer will the government be able to employ a carte-blanche approach to records collection or enact secret laws by covertly reinterpreting congressional intent. And to further promote privacy interests, our legislation establishes a special advocate to provide a counterweight to the surveillance interests in the FISA Court’s closed-door proceedings.”

**The USA Freedom Act**: [**pdf**](http://www.leahy.senate.gov/download/usa-freedom-act_-introduced-10-29-131)

**See also:**

[**The White House on Spying**](http://www.nytimes.com/2013/10/29/opinion/the-white-house-on-spying.html?hp&rref=opinion/international): **New York Times Editorial Board**

[**Spycraft: how do we fix a broken NSA? – Reformers are still struggling to imagine an NSA that doesn’t overstep the constitution**](http://www.theverge.com/2013/10/28/5035986/after-snowden-what-should-nsa-reform-look-like): **Russell Brandon** at **The Verge**.

**Counterpoint**: [**We Need an Invasive NSA**](http://www.newrepublic.com/article/115002/invasive-nsa-will-protect-us-cyber-attacks) by Harvard Law Professor **Jack Goldsmith**

10/29/2013: 

Sounds About Right:

[**Amateur Hour in Intelligence Gathering**](http://blogs.the-american-interest.com/wrm/2013/10/25/amateur-hour-in-intelligence-gathering/)

“The NSA spied on other people too much, and it bungled the protection of its own secrets. Imprudence matched with incompetence doesn’t lead to anything good. We need a thorough airing out of this mess, with personnel changes where appropriate, so that the NSA can stop doing things it ought not to be doing and instead spend its energy making sure that it does a good job on what we really need it to do . . . . It’s time to call in some grown ups to clean up the mess: we would suggest a series of congressional hearings combined with a blue ribbon, bipartisan commission to review what’s happened, to consult with our key allies, and to make recommendations. We need to do this not because intelligence gathering is bad and NSA surveillance is unnecessary. We need to do it because intelligence gathering and surveillance are so important, but so dangerous, that they must be done right.”



—   **Walter Russell Mead** at [**ViaMedia**](http://blogs.the-american-interest.com/wrm/2013/10/25/amateur-hour-in-intelligence-gathering/)

10/26/2013: