{"id":29650,"date":"2015-03-12T00:46:34","date_gmt":"2015-03-12T04:46:34","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/civil-liberties-groups-file-lawsuit-against-nsa.php"},"modified":"2015-03-12T00:46:34","modified_gmt":"2015-03-12T04:46:34","slug":"civil-liberties-groups-file-lawsuit-against-nsa","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/nsa-spying\/civil-liberties-groups-file-lawsuit-against-nsa.php","title":{"rendered":"Civil liberties groups file lawsuit against NSA"},"content":{"rendered":"<p><p>    The suit, led by the American Civil Liberties Union, was filed    on Tuesday in a Maryland District Court \"challenges the    suspicion less seizure and searching of internet traffic\" by    the NSA on U.S. soil, according to court documents.  <\/p>\n<p>        READ: Did 47 Republican senators break the law in plain    sight?  <\/p>\n<p>    The plaintiffs argue that to do their jobs they must be able to    exchange information in confidence, free-from, warrantless    government search which undermines the named organizations'    ability to communicate with clients, victims of human rights    abuses, government officials and other civil society groups.  <\/p>\n<p>    The plaintiffs also contend NSA spying violates the First and    Fourth Amendments, as well as Article III of the Constitution,    because the surveillance orders are \"in the absence of any case    or controversy.\"  <\/p>\n<p>    The ACLU's concern is the government's interpretation of the    updated Foreign Intelligence Surveillance law, which in 2011    allowed the government to collect 250 million Internet    communications under the FISA Amendment Acts. And In 2013, the    director of National Intelligence reported the surveillance of    almost 90,000 individuals or groups relied on a single court    order.  <\/p>\n<p>    The government contends that \"upstream\" surveillance is covered    by the 2008 surveillance law and the practice includes    installing devices, with the assistance of companies such as    Verizon and AT&T, onto the network of cables, switches and    routers that Internet traffic flows through, known as it's    \"backbone.\"  <\/p>\n<p>    The ACLU further details the NSA's surveillance program by    intercepting massive amounts of communication in transit that    are then searched alongside thousands of keywords associated    with targets of intelligence analysts.  <\/p>\n<p>    In addition to having weak limitations and numerous exceptions    on who they can surveil, the program's pool of potential    targets can encompass completely innocent individuals as the    only requisite is that the person is likely to communicate    \"foreign intelligence information, which can include    journalists, professors, attorneys or aid workers.  <\/p>\n<p>    The \"upstream\" surveillance differs from another spying program    carried out by the NSA called \"PRISM,\" where information is    obtained directly from U.S. companies providing communications    services. \"Upstream\" allows the government to connect    surveillance devices at Internet access points, which are    controlled by telecommunications providers.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>The rest is here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.cnn.com\/2015\/03\/10\/politics\/nsa-spying-lawsuit-aclu\/index.html\/RK=0\/RS=v2PFStjrASX1OyH2Z_6dCexpcVY-\" title=\"Civil liberties groups file lawsuit against NSA\">Civil liberties groups file lawsuit against NSA<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The suit, led by the American Civil Liberties Union, was filed on Tuesday in a Maryland District Court \"challenges the suspicion less seizure and searching of internet traffic\" by the NSA on U.S. soil, according to court documents. READ: Did 47 Republican senators break the law in plain sight? <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[46],"tags":[],"class_list":["post-29650","post","type-post","status-publish","format-standard","hentry","category-nsa-spying"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/29650"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=29650"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/29650\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=29650"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=29650"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=29650"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}