June 1 – 2, 2015 - Georgetown University Law Center

advertisement
NATIONAL SECURITY, SURVEILLANCE TECHNOLOGY AND THE LAW
June 1 – 2, 2015
Workshop for the Federal Judicial Center
Georgetown Law
Gewirz Center, 12th Floor
120 F Street, NW
Washington, D.C. 20001
TECHNOLOGY SOURCEBOOK
I.
Session One – Interception and Location Tracking
A. Technology Readings
1. Marshall Brain & Tom Harris, How GPS Receivers Work,
HOWSTUFFWORKS.COM, September 2006.
2. C.M. Roberts, Radio Frequently Identification (RFID), 25 Computers
& Security 18 (2006).
3. StingRay
a. Devlin Barrett, U.S. Will Change Stance on Secret Phone
Tracking, WALL STREET JOURNAL, May 3, 2015.
b. Cyrus Farivar, Department of Justice Will Review How it
Deploys Cell Phone Snooping Tech, ARS TECHNICA, May 3,
2015.
c. Ryan Gallagher, Meet the Machines that Steal your Phone’s
Data, ARS TECHNICA, September 25, 2013.
d. Megan Geuss, Cops Hid Use of Phone Tracking Tech in Court
Documents at Feds’ Request, ARS TECHNICA, June 20, 2014.
e. David Kravets, FBI Says Search Warrants Not Needed to Use
“Stingrays” in Public Places, January 5, 2015.
f. Pierluigi Paganini, StingRay Technology: How Government
Tracks Cellular Devices, INFOSEC INSTITUTE, November 10,
2014.
B. Legal Readings
1. Statutory Authority
a. 18 U.S.C. § 3121 et seq.
b. Electronic Surveillance Manual Procedures and Case Law
Forms, DOJ (June 2005).
2. Judicial Decisions
a. U.S. v. Davis, 2015 WL 2058977 (11th Cir. May 5, 2015) (en
banc).
b. Riley v. California, 573 U.S.
(2014).
c. U.S. v. Rigmaiden, 844 F. Supp. 2d 982 (D. Ariz. 2012).
II.
III.
3. Commentary
a. Susan Freiwald, Cell Phone Location Data and the Fourth
Amendment: A Question of Law, not Fact, 70 MARYLAND LAW
REVIEW 681 (2010).
b. Brian L. Owsley, The Fourth Amendment Implications of the
Government’s Use of Cell Tower Dumps in its Electronic
Surveillance, 16 UNIVERSITY OF PENNSYLVANIA JOURNAL OF
CONSTITUTIONAL LAW 1 (2013).
c. Stephanie K. Pell & Christopher Soghoian, Can You See Me
Now?: Toward Reasonable Standards for Law Enforcement
Access to Location Data that Congress Could Enact, 27
BERKELEY TECH. LAW JOURNAL 117 (2012).
d. Stephanie K. Pell & Christopher Soghoian, Your Secret
StingRay’s No Secret Anymore: The Vanishing Government
Monopoly over Cell Phone Surveillance and Its Impact on
National Security and Consumer Privacy, 28 HARVARD
JOURNAL OF LAW & TECHNOLOGY 1 (2014).
e. Marc Rotenberg & Alan Butler, In Riley v. California, a
Unanimous Supreme Court Sets out Fourth Amendment for
Digital Age, SCOTUSBLOG, June 26, 2014.
Session Two – The Internet of Things
A. Technology Readings
1. Luigi Atzori et al., The Internet of Things: A Survey, 54 Computer
Networks 2787 (2010).
2. Andrew Whitmore et al., The Internet of Things—A Survey of Topics and
Trends, 17 Information Systems Frontiers 261 (2015).
B. Legal Readings
1. Commentary: Scott R. Peppet, Regulating the Internet of Things: First
Steps Toward Managing Discrimination, Privacy, Security, and Consent,
93 TEXAS LAW REVIEW 85 (2014).
Session Three – Computer Architecture and Remote Access
A. Technology Readings
1. Networks in COMPUTER STRUCTURE AND LOGIC (Pearson Certification
2011).
2. Kevin Poulsen, Visit the Wrong Website and the FBI Could End up in
Your Computer, WIRED, August 5, 2014.
3. Philip Sealey, Remote Forensics, Digital Investigation (2004).
B. Legal Readings
1. Statutory Authority
a. Preliminary Draft to the Proposed Amendment of Rule 41 of the
Federal Rules of Criminal Procedure.
b. Computer Crime and Intellectual Property Section, Criminal
Division, SEARCHING AND SEIZING COMPUTERS AND OBTAINING
EVIDENCE IN CRIMINAL INVESTIGATIONS (Office of Legal
Education Executive Office for United States Attorneys 2009).
2. Judicial Decisions
a. U.S. v. Warshak, 631 F.3d 266 (6th Cir. 2010).
b. In re Warrant to Search a Target Computer at Premises
Unknown, 958 F. Supp. 2d 753 (S.D. Tex. 2013) (denying the
warrant).
c. Third Amended Application for a Search Warrant, In the Matter of
the Search of Network Investigative Technique for email address
texan.slayer@yahoo.com, Case 1:12-sw-05685-KMT (D.Colo.
Dec. 11, 2012) (approving the warrant).
d. Third Amended Search and Seizure Warrant, In the Matter of the
Search of Network Investigative Technique (“NIT”) for email
address texan.slayer@yahoo.com, Case 1:12-sw-05685-KMT
(D.Colo. Dec. 11, 2012) (approving the warrant).
e. Warrant Return Inventory, In the Matter of the Search of NIT for
email address texan.slayer@yahoo.com, Case 1:12-sw-05685KMT (D.Colo. Feb. 15, 2013) (approving the warrant).
f. Application for a Search Warrant, In the Matter of the Search of
NIT for email 512SocialMedia@gmail.com, Case No. 1:12mj00748-ML (W.D.Tex. Dec. 18, 2012) (approving the warrant).
g. Search and Seizure Warrant, In the Matter of the Search of NIT for
email 512SocialMedia@gmail.com, Case No. 1:12-mj00748-ML
(W.D.Tex. Dec. 18, 2012) (approving the search and seizure
warrant).
3. Commentary
a. Report on Proposed Amendments to Rule 41, Advisory Committee
on Rules of Practice and Procedure, May 5, 2014.
b. Letter from the DOJ to the Advisory Committee re Proposed
Amendments to Rule 41, September 18, 2013.
c. Letter from the DOJ to the Advisory Committee re Further Issues
Concerning Proposed Amendments to Rule 41. December 22,
2014.
d. Testimony and Statement on Proposed Amendments to Rule 41 of
the Federal Rules of Criminal Procedure before the Judicial
Conference Advisory Committee on Criminal Rules, Alan Butler,
Senior Counsel, Electronic Privacy Information Center, November
5, 2014.
IV.
V.
e. Letter to Attorney General Holder and Secretary Johnson from
Sen. Patrick Leahy and Sen. Charles Grassley re Use of Cell Phone
Tracking Program, December 23, 2014.
f. Press Release, Leahy and Grassley Press Administration on Use of
Cell Phone Tracking Program, December 31, 2014.
g. Matthew Tokson, Automation and the Fourth Amendment, 96
IOWA LAW REVIEW 581 (2009).
Session Four – Metadata and Social Network Analytics
A. Technology Readings
1. Social Network Analysis: An Introduction in THE SAGE HANDBOOK OF
SOCIAL NETWORK ANALYSIS (John Scott & Peter J. Carrington ed., Sage
2011.
2. Jonathan Mayer & Patrick Mutchler, MetaPhone: The Sensitivity of
Telephone Metadata, WEBPOLICY, March 12, 2014.
3. Valdis E. Krebs, Mapping Networks of Terrorist Cells, 24 CONNECTIONS 3
(2002).
B. Legal Readings
1. Statutory Authority
a. 50 U.S.C § 1861 (Section 215)
b. USA FREEDOM Act
2. Judicial Decisions
a. ACLU v. Clapper, Docket 14-42-cv (May 7, 2015, 2d Cir.).
b. U.S. v. Ganias, 755 F.3d 125 (2d Cir. 2014).
c. Klayman v. Obama, 957 F. Supp. 2d 1 (D.D.C. 2013).
d. U.S. v. Jones, 132 S. Ct. 945 (2012).
e. Smith v. Maryland, 442 U.S. 735 (1979).
3. Commentary
a. Obama Administration White Paper on the Bulk Collection of
Telephony Metadata Under Section 215 of the USA PATRIOT
Act, August 9, 2013.
b. Laura K. Donohue, Bulk Metadata Collection: Statutory and
Constitutional Considerations, HARVARD JOURNAL OF LAW &
PUBLIC POLICY (2014).
c. Beryl A. Howell, Seven Weeks: The Making of the USA PATRIOT
Act, 72 GEORGE WASHINGTON LAW REVIEW 1145 (2004).
d. David S. Kris, On the Bulk Collection of Tangible Things, 7
JOURNAL OF NATIONAL SECURITY LAW & POLICY 209 (2014).
Session Five – Classification and Case Management
A. Technology Reading: KEEPING GOVERNMENT SECRETS: A POCKET GUIDE ON THE
STATE-SECRETS PRIVILEGE, THE CLASSIFIED INFORMATION PROCEDURES ACT, AND
VI.
CLASSIFIED INFORMATION SECURITY OFFICERS (Robert Timothy Reagan, 2d ed.
2013).
B. Legal Readings
1. Judicial Decision: ACLU v. Clapper, No. 14-42 (2d Cir. May 7, 2015).
2. Commentary:
a. National Security Case Studies: Special Case-Management
Challenges (Robert Timothy Reagan, 2013).
b. Offices of Inspectors General, Report on the President's
Surveillance Program (July 10, 2009).
Session Six – Cloud Computing and Global Communications
A. Technology Readings
1. Peter Mell, Timothy Grance, THE NIST DEFINITION OF CLOUD
COMPUTING, DEPARTMENT OF COMMERCE, September 2011.
2. Shyam Patidar et al., A Survey Paper on Cloud Computing, 2012 Second
International Conference on Advanced Computing & Communication
Technologies, 394-98 (2012).
B. Legal Readings
1. Statutory Authority
a. 50 U.S.C § 1881 et seq. (Section 702)
b. Executive Order 12333 (as amended)
2. Judicial Decisions
a. U.S. v. Mohamud, case 3:10-cr-00475-KI, (D.Ore. Mar. 19, 2014).
b. Memorandum Opinion re: NSA’s Surveillance under Section 702,
Judge Bates (FISC Oct. 3, 2011).
c. United States v. Verdugo-Urquidez, 494 U.S. 259 (1990).
d. Youngstown Sheet & Tube Co. v. Sawyer, 343 U.S. 579 (1952).
3. Commentary
a. Laura K. Donohue, Section 702 and the Collection of International
Telephone and Internet Content, 38 HARVARD JOURNAL OF LAW &
PUBLIC POLICY (2015).
b. Orin Kerr, The Fourth Amendment and the Global Internet, 67
STANFORD LAW REVIEW 285 (2015).
Download