This series of publications will highlight the copious amounts of surveillance orchestrated by the National Security Agency on U.S. and foreign citizens, intelligence agencies, and other entities that may have piqued the interest of the NSA.
The Foreign Intelligence Surveillance Act (FISA) of 1978 Amendments Act of 2008 is an extension of the original FISA Act of 1978 that was signed into law by President George W. Bush and the 110th United States Congress on July 10, 2008. It was then re-authorized by President Barack Obama on December 30, 2012.
NSA STATEMENT ON STOPPING FISA § 702 “UPSTREAM” ACTIVITIES
Excerpt from the NSA Statement:
“Under Section 702, NSA collects internet communications in two ways: “downstream” (previously referred to as PRISM) and “upstream.” Under downstream collection, NSA acquires communications “to or from” a Section 702 selector (such as an email address). Under upstream collection, NSA acquires communications “to, from, or about” a Section 702 selector. An example of an “about” email communication is one that includes the targeted email address in the text or body of the email, even though the email is between two persons who are not themselves targets. The independent Privacy and Civil Liberties Oversight Board described these collection methods in an exhaustive report published in 2014.”
PCLOB REPORT PURSUANT TO FISA § 702 (PDF FILE)
The Privacy and Civil Liberties Oversight Board (PCLOB) in 2014 issued this report some time after it became a new, independent agency. The Section 702 Study came into the spotlight when “[PCLOB] Board Members identified a series of programs and issues to prioritize for review.”
On page 7 of the report, PCLOB identifies FISA § 702:
FISA § 702, according to PCLOB, has not been intentionally abused by the various intelligence agencies (FBI, CIA, NSA, CSS, etc.) that have practiced it.
Source (PDF): https://www.pclob.gov/library/702-report.pdf
PCLOB & SECTION 215
HOW THE NSA USES FISA 2008 § 702 – ABUSES & PROCEDURES
FISA 2008 § 702 & WIKILEAKS
This is more speculative on our end, but if we were the U.S. intelligence agencies, and Wikileaks was publishing damaging info about us, we would ABSOLUTELY want to exploit FISA to detect and intercept future publications to save our public confidence.
Someone wants to send DNC emails to Wikileaks? Use FISA to find out who it is.
Someone wants to leak war crimes to Wikileaks? Use FISA and find out who it is.
Someone wants to expose the NSA botnet? Use FISA and find out who it is.
Someone wants to expose the intelligence agencies abusing FISA? Use FISA and find out who it is.
You get the idea. Some are starting to believe that FISA was used to identify the one who leaked the DNC emails to Wikileaks. It would make sense, considering Wikileaks boasts a very secure and encrypted submission process. It would take the power of an entire intelligence agency to figure it out.
More coming soon! This is still developing, so we will publish more as we come across new information.