The
Fourth Amendment Protection Acts, are a collection of state legislation aimed at withdrawing state support for bulk data (metadata) collection and ban the use of warrant-less data in state courts. They are proposed
nullification laws that, if enacted as law, would prohibit the state governments from co-operating with the
National Security Agency
The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
, whose
mass surveillance
Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by Local government, local and federal governments or intell ...
efforts are seen as unconstitutional by the proposals' proponents. Specific examples include the Kansas Fourth Amendment Preservation and Protection Act and the
Arizona Fourth Amendment Protection Act. The original proposals were made in 2013 and 2014 by legislators in the American states of
Utah
Utah is a landlocked state in the Mountain states, Mountain West subregion of the Western United States. It is one of the Four Corners states, sharing a border with Arizona, Colorado, and New Mexico. It also borders Wyoming to the northea ...
,
Washington
Washington most commonly refers to:
* George Washington (1732–1799), the first president of the United States
* Washington (state), a state in the Pacific Northwest of the United States
* Washington, D.C., the capital of the United States
** A ...
,
Arizona
Arizona is a U.S. state, state in the Southwestern United States, Southwestern region of the United States, sharing the Four Corners region of the western United States with Colorado, New Mexico, and Utah. It also borders Nevada to the nort ...
,
Kansas
Kansas ( ) is a landlocked U.S. state, state in the Midwestern United States, Midwestern region of the United States. It borders Nebraska to the north; Missouri to the east; Oklahoma to the south; and Colorado to the west. Kansas is named a ...
,
Missouri
Missouri (''see #Etymology and pronunciation, pronunciation'') is a U.S. state, state in the Midwestern United States, Midwestern region of the United States. Ranking List of U.S. states and territories by area, 21st in land area, it border ...
,
Oklahoma
Oklahoma ( ; Choctaw language, Choctaw: , ) is a landlocked U.S. state, state in the South Central United States, South Central region of the United States. It borders Texas to the south and west, Kansas to the north, Missouri to the northea ...
and
California
California () is a U.S. state, state in the Western United States that lies on the West Coast of the United States, Pacific Coast. It borders Oregon to the north, Nevada and Arizona to the east, and shares Mexico–United States border, an ...
. Some of the bills would require a warrant before information could be released, whereas others would forbid state universities from doing NSA research or hosting NSA recruiters, or prevent the provision of services such as water to NSA facilities.
History
The events of
the 9/11 terrorist attacks led to some sweeping changes in national security policies. Through the enactment of
Title II: Enhanced Surveillance Procedures of the
USA PATRIOT Act of 2001, many government agencies were granted increased power of surveillance. Controversy arose from the increased surveillance that was granted. Proponents of the act argued that the increased surveillance measures were necessary for the protection and safety of the country, while detractors argued that the increased power of surveillance infringed upon Fourth Amendment protections.
Among the controversial programs that were put into place was the
President's Surveillance Program
The President's Surveillance Program (PSP) is a collection of secret intelligence activities authorized by the President of the United States George W. Bush after the September 11 attacks in 2001 as part of the War on Terrorism. Information co ...
, which embodied the
Terrorist Surveillance Program. Through this surveillance program, President George W. Bush authorized the
NSA
The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
to wiretap international calls where one party was suspected of having affiliations with Al Qaeda. It also reportedly allowed for data mining of emails, internet activity, text messaging and telephone call records, stored in a NSA call database.
The Terrorist Surveillance Program became publicly known after several NSA whistleblowers,
William E. Binney, Ed Loomis,
Thomas A. Drake and J. Kirk Wiebe, came forward with information about the agency's database collection program,
Trailblazer, which eliminated the privacy protections for U.S. citizens that its predecessor, the
ThinThread Project, promised. The information presented by Binney, Loomis, Drake and Wiebe brought the controversial practices of the NSA to the public eye, further inciting the controversy around the increased power that government agencies were granted. Information continued to come forward through many national news sources over the next several years about continuation of data collection programs carried out by government agencies.
In 2013, former NSA whistle-blower,
Edward Snowden
Edward Joseph Snowden (born June 21, 1983) is a former National Security Agency (NSA) intelligence contractor and whistleblower who leaked classified documents revealing the existence of global surveillance programs.
Born in 1983 in Elizabeth ...
, came forward with information about continued surveillance on US Citizens through the
PRISM
PRISM is a code name for a program under which the United States National Security Agency (NSA) collects internet communications from various U.S. internet companies. The program is also known by the SIGAD . PRISM collects stored internet ...
surveillance project, that allowed the NSA to collect communications from providers like
Google Inc
Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
.,
Yahoo
Yahoo (, styled yahoo''!'' in its logo) is an American web portal that provides the search engine Yahoo Search and related services including My Yahoo, Yahoo Mail, Yahoo News, Yahoo Finance, Yahoo Sports, y!entertainment, yahoo!life, an ...
and
Verizon
Verizon Communications Inc. ( ), is an American telecommunications company headquartered in New York City. It is the world's second-largest telecommunications company by revenue and its mobile network is the largest wireless carrier in the ...
among others. Collected data was stored in the NSA database
Boundless Informant
Boundless Informant (stylized as BOUNDLESSINFORMANT) is a big data analysis and data visualization tool used by the United States National Security Agency (NSA). It gives NSA managers summaries of the NSA's worldwide data collection activities by ...
and collected through the NSA Analytical tool
XKeyscore
XKeyscore (XKEYSCORE or XKS) is a secret computer system used by the United States National Security Agency (NSA) for searching and analyzing global Internet data, which it collects in real time. The NSA has shared XKeyscore with other intelligen ...
, which allowed for the collection of most any form of data, from emails, to social media, and web browsing history. Snowden's revelations and released documents detailed that the NSA's data collection programs were much broader, deeper, and insidious than previously released information had shown, and included collection of data even from users of
Xbox Live
The Xbox network, formerly known and commonly referred to as Xbox Live, is an online multiplayer gaming and digital media delivery service created and operated by Microsoft Gaming for the Xbox brand. It was first made available to the origina ...
,
World of Warcraft
''World of Warcraft'' (''WoW'') is a 2004 massively multiplayer online role-playing (MMORPG) video game developed and published by Blizzard Entertainment for Windows and Mac OS X. Set in the '' Warcraft'' fantasy universe, ''World of War ...
and
Second Life
''Second Life'' is a multiplayer virtual world that allows people to create an Avatar (computing), avatar for themselves and then interact with other users and user-created content within a multi-user online environment. Developed for person ...
, as well as NSA agents spying on their own love interests.
In 2014, former U.S. State Department whistle-blower,
John Tye, wrote an opinion piece in the ''Washington Post'', outlining his concerns over data collection under Executive Order 12333. Part 2.3 (i) allows that "incidentally obtained information that may indicate involvement in activities that may violate federal, state, local or foreign laws" may be collected, retained and disseminated.
In light of all of the information that came out over the previous 12–13 years, many states began invoking their
Tenth Amendment rights to propose and enact Fourth Amendment Protection Acts in order to stop NSA collection within those states, or to disallow any unconstitutionally collected data to be utilized in state courts. Some states proposed actions to stop NSA Centers from accessing state controlled utilities, such as water and electricity, in an effort to block NSA data collections from within the state.
Fourth Amendment Protection Act by state
California
On January 6, 2014, the state of California proposed Senate Bill 828 (2013–14). It was introduced by senators
Ted Lieu
Ted Win-Ping Lieu ( ; born March 29, 1969) is an American lawyer and politician. He is a member of the Democratic Party and has represented California's 36th congressional district in the United States House of Representatives since 2023. He re ...
and
Joel Anderson
Joel Anderson (born February 11, 1960) is an American politician serving as a member of the San Diego County Board of Supervisors. A Republican, he is a former California state senator, assemblyperson, and board member of a municipal water ...
, with the intention of adding Chapter 32.5 (commencing with Section 7599) to the state government's code. Its intention aimed to prohibit providing any resources, participation, or aid of any sort to requests made by federal agencies that attempt to collect metadata by means in which the state finds illegal. Furthermore, it would prohibit agencies such as the NSA from using public universities as recruitment centers, as well as prohibiting such agencies from performing research on campus grounds. On November 30, 2014, it was approved by the governor and was accepted into California State law.
Washington
In the state of Washington, multiple bills have been proposed in order to offer protections from certain NSA data collection operations. Specifically, those conducted without warrants. In 2017, House Bill 1193 (2017-18) was introduced, and given its first reading on January 13. Its primary intention was to prevent the use of data and online information obtained without a proper warrant from being used as evidence against individuals being prosecuted in a court of law. It would also prohibit the utilization of state resources and services for data collection operations that the state deems unconstitutional. In addition, any persons or corporations found to have been providing services to federal agencies for unconstitutional purposes would be guilty of misdemeanors. As of 2018, the bill remains in committee. An earlier version of the bill was proposed in 2013 as House Bill 2272.
Arizona
Similar to California's Fourth Amendment Protection Act, Arizona State had also proposed their own protections under
Senate Bill 1156 (2014). It was supported by many members of the Senate, including its president at the time,
Andy Biggs
Andrew Steven Biggs (born November 7, 1958) is an American lawyer and politician who represents in the United States House of Representatives. The district, which was once represented by U.S. Senators John McCain and Jeff Flake, is in the he ...
. In Arizona, it would have prevented digital information obtained without a warrant from being used in court, prohibited federal agencies from using state funding to carry out data collection without proper warrants, and eliminated numerous gray areas not mentioned in the Fourth Amendment. It was intended to go into effect on January 1, 2015. However, this bill did not pass.
Federal Level
On June 2, 2015, President
Barack Obama
Barack Hussein Obama II (born August 4, 1961) is an American politician who was the 44th president of the United States from 2009 to 2017. A member of the Democratic Party, he was the first African American president in American history. O ...
signed a revised version of the
USA Freedom Act. Under Section 215 the mass collection of phone data was no longer allowed. Phone records could now only be obtained through the Federal Courts. Companies also now had the ability to publicly report the number of records requests they had received, making it even harder for massive amounts of information to be requested. This was the first time such protections were added for citizens since the attacks on
September 11, 2001
The September 11 attacks, also known as 9/11, were four coordinated Islamist terrorist suicide attacks by al-Qaeda against the United States in 2001. Nineteen terrorists hijacked four commercial airliners, crashing the first two into ...
. Many Americans had concerns after
Snowden's information leaks, causing data privacy and security concerns to become much larger and widely discussed issues. Still, others in government, such as Senate Leader
Mitch McConnell
Addison Mitchell McConnell III (; born February 20, 1942) is an American politician and attorney serving as the senior United States senator from Kentucky, a seat he has held since 1985. McConnell is in his seventh Senate term and is the long ...
, were pushing for more terrorism protections and would realize that this bill, while losing some ground on their end, was still their best chance, as protections granted from the previous bill had already expired.
Even as the Government was adding privacy protections, the advancements in technology were making surveillance practices easier. Devices such as satellites, cell phones, smart cars, smart-grid power reading, smart televisions, drones and automatic license place readers, to name a few, were becoming more and more prevalent in the surveillance world and the ways that information is gathered. New technology such as stingray surveillance technology is now used to create a more prominent signal for devices to gain connectivity to the internet, or cell phone towers, which, in turn, grants access to the information stored on connected devices. These types of devices have been used by many law enforcement agencies, growing the public's concern, and need for more privacy protection laws.
Two large technology companies,
Microsoft
Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
and
Apple
An apple is a round, edible fruit produced by an apple tree (''Malus'' spp.). Fruit trees of the orchard or domestic apple (''Malus domestica''), the most widely grown in the genus, are agriculture, cultivated worldwide. The tree originated ...
, were involved in litigation with the US Government in 2016 on the basis of protecting the privacy of their consumers. In February 2016
Bill Gates
William Henry Gates III (born October 28, 1955) is an American businessman and philanthropist. A pioneer of the microcomputer revolution of the 1970s and 1980s, he co-founded the software company Microsoft in 1975 with his childhood friend ...
, co-founder of Microsoft, filed a lawsuit against the US Government for breaking the
US Constitution
The Constitution of the United States is the supreme law of the United States of America. It superseded the Articles of Confederation, the nation's first constitution, on March 4, 1789. Originally including seven articles, the Constitut ...
by not allowing Microsoft to "inform their customers when federal agencies sought their information." Apple was involved in court proceedings in relations to a cell phone connected to a mass shooting in December 2015. The
FBI
The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
was requesting that they unlock an encrypted cell phone so that they could gain access to the phone. This would have required Apple to write new software to bypass the password encryption on the phone.
Apple
An apple is a round, edible fruit produced by an apple tree (''Malus'' spp.). Fruit trees of the orchard or domestic apple (''Malus domestica''), the most widely grown in the genus, are agriculture, cultivated worldwide. The tree originated ...
felt that by doing this for this case, they would be opening this up for future cases, and removing the security of the password on the cell phones.
The Supreme Court was involved in another case involving a string of robberies throughout Michigan and Ohio. A self-confessed robber in the case, gave the name and cell phone number of Timothy Carpenter to
FBI
The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
agents, stating that he was involved. The FBI was able to use the location records of Timothy's cell phone to place him near the crimes, of which he was later convicted of aiding and abetting. His attorneys had argued that the cell phone records were not legally able to be used as evidence, due to lack of search warrant. However, the court had ruled that the cell phone data was not protected. After appeals, the final ruling was that "the records in this case fall on the unprotected side of the
Fourth Amendment."
Chief Justice John Roberts was later quoted as saying, "
..ome of the courts most challenging cases involve applying long held rules created by the courts to quickly developing technology."
S. 139 was introduced on January 12, 2017, sponsored by
Senator Orrin G. Hatch. The bill will continue
Section 702 of the
Foreign Intelligence Surveillance Act
The Foreign Intelligence Surveillance Act of 1978 (FISA, , ) is a Law of the United States, United States federal law that establishes procedures for the surveillance and collection of foreign intelligence on domestic soil.[NSA
The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...]
and
FBI
The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
to further continue warrantless access to personal social media and conversation activities of
foreigners to America, that also involves U.S citizens' private communications, for an additional six years. The S. 139 bill has made minor key changes to potentially enhance more effective ways to protect privacy in the United States while still tracking possible terrorist attacks. A few changes will now require the
Foreign Intelligence Surveillance Court
The United States Foreign Intelligence Surveillance Court (FISC), also called the FISA Court, is a U.S. federal court established under the Foreign Intelligence Surveillance Act of 1978 (FISA) to oversee requests for surveillance warrants ag ...
to approve specified query procedures every year, as well as have the
Inspector General of the Department of Justice overlook the query procedures and practices of the
FBI
The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
, and have limited use of
Section 702 to not allow information found to be used against U.S citizens for
criminal case
Criminal procedure is the adjudication process of the criminal law. While criminal procedure differs dramatically by jurisdiction, the process generally begins with a formal criminal charge with the person on trial either being free on bail ...
s.
Section 702 originally expired on December 31, 2017 but was then continued until January 19, 2018 where the vote ruled in favor of the extension by 256–164.
President Donald Trump
Donald John Trump (born June 14, 1946) is an American politician, media personality, and businessman who is the 47th president of the United States. A member of the Republican Party (United States), Republican Party, he served as the 45 ...
signed to
enact S. 139 which became
Public Law
Public law is the part of law that governs relations and affairs between legal persons and a government, between different institutions within a state, between different branches of governments, as well as relationships between persons that ...
No: 115-118 that same day. On November 29, 2017 H.R. 4478 FISA Reauthorization Act of 2017, was introduced, sponsored by
Republican Devin Nunes to extend Section 702. Representatives
Justin Amish and
Zoe Lofgren
Susan Ellen "Zoe" Lofgren ( ; born December 21, 1947) is an American politician and lawyer serving as a United States House of Representatives, U.S. representative from California. A member of the Democratic Party (United States), Democratic Part ...
offered the USA Rights Act, pertaining a more balanced scale between security and liberty as this bill protects the
4th amendment along with eliminating the warrantless backdoor searches, that would then require government officials to obtain warrants in order to seize and view American citizens' data when the
NSA
The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
and
FBI
The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
tack into foreigner activities seeking any relations to terrorism. The bill resulted as a loss by a vote of 183–233.
See also
*
Fourth Amendment to the United States Constitution
The Fourth Amendment (Amendment IV) to the United States Constitution is part of the Bill of Rights. It prohibits unreasonable searches and seizures and sets requirements for issuing warrants: warrants must be issued by a judge or magistra ...
*
Arizona Fourth Amendment Protection Act
References
{{reflist
Mass surveillance
Privacy law in the United States