How EFF's FOIA Litigation Helped Expose the NSA’s Domestic Spying Program
In a single year, the public learned more information about the NSA and its global surveillance dragnet than we learned during the previous 30 years combined. Much of that knowledge can be attributed to whistleblower Edward Snowden and the journalists tirelessly working to inform the public about the NSA’s surveillance programs. But another force, one that has received far less attention, has been hard at work, too: the Freedom of Information Act, or FOIA.
FOIA can get a bad rap. It can be slow, it can be tedious, and it can be frustrating—but when FOIA works, it can recalibrate the balance of power in our democracy.
Nearly every document released by the government about the NSA’s spying programs (and posted on its Tumblr, IContheRecord) has been released as a result of FOIA litigation—and a great majority of documents were released in response to lawsuits brought by EFF. Sunshine Week provides a great opportunity to look back at a banner year for FOIA and fighting the secrecy surrounding government surveillance programs.
For years, EFF has been fighting in federal courts to make information about the NSA’s surveillance programs public. In particular, we have long focused on making opinions of the secret Foreign Intelligence Surveillance Court, or FISA court, public. This year, those fights finally paid off: EFF’s litigation resulted in the disclosure of hundreds (if not thousands) of pages of previously secret FISA court opinions.
Here are just a few of the highlights from the documents EFF’s lawsuits forced into the public domain:
- An October 3, 2011 FISA court opinion disclosed that the NSA had collected tens of thousands of purely domestic communications. As a result of that collection, Judge John Bates found the NSA’s surveillance violated the Fourth Amendment and the spirit of federal surveillance law and ordered the NSA to make changes to its program.
- The October 3 opinion confirmed for the first time what we had long suspected: the NSA was conducting “upstream” surveillance—that is, surveillance directly from the internet backbone of certain providers.
- A footnote in the October 3 opinion revealed other significant problems with the NSA’s domestic surveillance programs. Judge Bates railed against the NSA’s lack of candor with the FISA court, noting that the collection of wholly domestic communications marked the “third instance in less than three years in which the government has disclosed a substantial misrepresentation regarding the scope of a major collection program.”
- Those “misrepresentations” were spelled out in later opinions disclosed in response to our lawsuits. A March 2009 FISA court opinion described how the NSA violated the secret court’s orders limiting the NSA’s ability to search its massive database of Americans’ call records. For nearly three years, the NSA repeatedly violated the limitations on search imposed by the court.
- The March 2009 opinion further revealed that “there was no single person who had a complete technical understanding” of the NSA’s call records collection program. These failures, among others, nearly led the FISA court to shut down the program in its entirety.
- Disclosures also confirmed that the NSA used Section 215 to collect cell-site location information on millions of Americans. Although the government purportedly abandoned the program, the records disclosed to EFF confirmed that NSA had collected the information in the first place—without seeking Congressional or court approval first.
As these disclosures show, FOIA can be the difference between having a full, informed public debate and having a debate on the government’s terms, with the information it deigns to release to us.
EFF—and the public—fought back last year. But there is still much to accomplish, and still far too much government secrecy. In 2014, we’ll keep using FOIA to fight against secret surveillance law and to fight for the public’s right to know.
You can find all of EFF's Sunshine Week posts linked here.
Recent DeepLinks Posts
Jul 31, 2015
Jul 31, 2015
Jul 30, 2015
Jul 30, 2015
Jul 30, 2015
- Fair Use and Intellectual Property: Defending the Balance
- Free Speech
- Know Your Rights
- Trade Agreements and Digital Rights
- State-Sponsored Malware
- Abortion Reporting
- Analog Hole
- Anti-Counterfeiting Trade Agreement
- Bloggers' Rights
- Broadcast Flag
- Broadcasting Treaty
- Cell Tracking
- Coders' Rights Project
- Computer Fraud And Abuse Act Reform
- Content Blocking
- Copyright Trolls
- Council of Europe
- Cyber Security Legislation
- Defend Your Right to Repair!
- Defending Digital Voices
- Development Agenda
- Digital Books
- Digital Radio
- Digital Video
- DMCA Rulemaking
- Do Not Track
- E-Voting Rights
- EFF Europe
- Encrypting the Web
- Export Controls
- FAQs for Lodsys Targets
- File Sharing
- Fixing Copyright? The 2013-2015 Copyright Review Process
- Genetic Information Privacy
- Hollywood v. DVD
- How Patents Hinder Innovation (Graphic)
- International Privacy Standards
- Internet Governance Forum
- Law Enforcement Access
- Legislative Solutions for Patent Reform
- Locational Privacy
- Mandatory Data Retention
- Mandatory National IDs and Biometric Databases
- Mass Surveillance Technologies
- Medical Privacy
- National Security and Medical Information
- National Security Letters
- Net Neutrality
- No Downtime for Free Speech
- NSA Spying
- Online Behavioral Tracking
- Open Access
- Open Wireless
- Patent Busting Project
- Patent Trolls
- PATRIOT Act
- Pen Trap
- Policy Analysis
- Public Health Reporting and Hospital Discharge Data
- Reading Accessibility
- Real ID
- Search Engines
- Search Incident to Arrest
- Section 230 of the Communications Decency Act
- Social Networks
- SOPA/PIPA: Internet Blacklist Legislation
- Student and Community Organizing
- Surveillance and Human Rights
- Surveillance Drones
- Terms Of (Ab)Use
- Test Your ISP
- The "Six Strikes" Copyright Surveillance Machine
- The Global Network Initiative
- The Law and Medical Privacy
- TPP's Copyright Trap
- Trans-Pacific Partnership Agreement
- Travel Screening
- Trusted Computing
- Video Games