The government wants our data, whether it’s sitting on our iPhones or in transit across the Internet.
Last week, we learned that the FBI is trying to force Apple to break its own security features in order to access data stored on an iPhone that belonged to one of the San Bernardino shooters. Many predict that this would set a dangerous precedent for future cases — and they’re right. But it’s important to keep in mind that the government’s appetite for data isn’t limited to iPhones. In fact, this is only the latest front in the government’s long-running efforts to access our data wherever it can be found.
While the country debates what kind of access the FBI should have to the devices we use every day to communicate, the NSA is already intercepting, copying, and searching through vast quantities of our communications as they travel across the Internet backbone from point A to point B. This warrantless spying, known as “Upstream” surveillance, ensnares essentially everyone’s international Internet communications — including emails, chats, text messages, and even web-browsing information. It constitutes a mass intrusion into our privacy online.
With the compelled assistance of the country’s biggest telecommunications providers, such as AT&T and Verizon, the NSA conducts Upstream surveillance by tapping directly into the Internet backbone — the high-capacity cables, switches, and routers that carry Americans’ online communications. The NSA’s surveillance devices are installed at backbone "chokepoints,” major junctions on the Internet through which the vast majority of international communications travel. After copying virtually all of the international text-based traffic, the NSA searches this traffic for key terms, called “selectors,” that are associated with its thousands of targets. Critically, however, the NSA isn’t just plucking out the communications of suspected terrorists or spies. Instead, it’s drinking from a firehose: It’s copying and searching nearly everyone’s international communications, looking for information about its targets. And it does all of this without a warrant.
SCROLL TO CONTINUE WITH CONTENT
Never Miss a Beat.
Get our best delivered to your inbox.
In other words, it’s as if the NSA dispatched agents to the U.S. Postal Service’s major processing centers and had them open, copy, and read the contents of everyone’s international mail. If a letter contained something of interest — for example, a reference to a phone number believed to be associated with a target — the NSA would add the letter to its files and retain that copy for later use. Of course, the Fourth Amendment protects us from precisely this kind of general, warrantless search. The government can’t simply open all of our letters to look for those that are potentially of interest to it. There’s no question that this would violate the Constitution, and there’s no reason to treat Americans’ private Internet communications differently.
Last year, the ACLU filed a suit challenging Upstream surveillance on behalf of a coalition of educational, legal, media, and advocacy organizations, including the Wikimedia Foundation. All of the plaintiffs engage in sensitive international communications in the course of their work — with journalists, foreign government officials, victims of human rights abuses, clients, witnesses, and the hundreds of millions of people who read and edit Wikipedia. The dragnet surveillance of these communications by the government undermines the privacy and confidentiality on which the plaintiffs’ work depends.
The case, Wikimedia v. NSA, is now on appeal in the Fourth Circuit, after the district court improperly concluded that the plaintiffs did not have standing to sue because they hadn’t plausibly alleged that the NSA was monitoring their communications. The opening brief in the appeal was filed last week, and yesterday, a number of other groups, including technologists, media organizations, and law professors, filed amicus briefs in support of the plaintiffs.
The surveillance state runs deep. But there’s still plenty of room to fight back.