Vermont Bar Journal, Vol. 40, No. 2 Spring 2014, Vol. 40, No. 1 | Page 19

Countless questions remain unanswered: How much information has been collected from internet companies like Yahoo and Google? How has it been stored and used? Is Glenn Greenwald’s claim that “analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications” true and, if so, how has it been used? Does the NSA have access to metadata from banks and credit card companies? Has the NSA collected any of that information and, if so, how is it stored and used? Can the Boundless Informant program be used to identify groups of people regarding single issues or interests and, if so, has it ever been used for that purpose? I worked in the former Soviet Union for two years. I saw what happens to free speech when people think their communications may be monitored by the government. People develop a filter between their minds and their mouths. They dare to criticize soccer players but hesitate to criticize public policy. Likewise, when government monitors peoples’ associations with other people, especially would be activists, their freedom of association wilts.  We have had one president who was willing to break into his opponent’s headquarters and who kept his own special “enemies list.” We have had an F.B.I. director who used the Bureau to blackmail congressmen and to suppress civil rights activists and anti-war activists in the 1960s. We have had FBI agents wiretapping Martin Luther King’s telephone and sending anonymous letters threatening to expose his extra-marital affairs if he didn’t commit suicide.44 It is fair and reasonable to insist that today’s surveillance searches and data seizures by the executive branch be subjected to far stricter oversight by Congress and a firmly independent judiciary. Government should be able to collect intelligence and to keep information secret, but it shouldn’t be able to keep those powers, or the scope of those powers, secret. The threat of terrorism, combined with new communication technologies, has taken us into dangerous waters, made even more treacherous by the obfuscations of our intelligence community. We have learned through bitter history that the passage to a genuinely secure harbor is by adhering to the principles we charted over two centuries ago: We are endowed by our Creator with certain unalienable rights; Among these rights are free speech, a free press, www.vtbar.org freedom of association, and the freedom to be secure in our persons, houses, papers and effects; Governments are created to secure those rights. Most importantly, those governments derive their just powers only from the consent of the governed. ____________________ David Kelley, Esq., practices law in Greensboro, Vermont. He also coaches the Hazen Union debate team. ____________________ In re Certain Children, Orleans County Sup. Ct., Opinion and Order Regarding Search Warrant, Aug. 7, 1984 (Mahady, J.). 2 Id. 3 Codified at 50 U.S.C. 1861. 4 Relying on Section 215 of the Patriot Act (50 U.S.C. 1861). 5 http://www.theguardian.com/world/2013/ jun/06/us-tech-giants-nsa-data; see also http:// www. washingtonpost.com/wp-srv/special/politics/prism-collection-documents 6 http://www.theguardian.com/world/2013/ jun/08/nsa-boundless-informant-global-datamining 7 http://www.theguardian.com/world/2013/ jul/31/nsa-top-secret-program-online-data 8 Id. 9 Klayman v. Obama, ___ F. Supp. ___ (D.C. Dist. Ct. 2013), at http://apps.washingtonpost. com/g/page/world/federal-judge-rules-nsa-program-is-likely-unconstitutional/668. 10 442 U.S. 745 (1979 – is this right? A later cite (n. 12) has something from p. 742. 11 [need citation – where did FISC say this?] 12 442 U.S. 742-44. Klayman, at 43. Is the citation to Klayman or to Smith? If the latter, where does the citation to Klayman belong? 13 Klayman, at 53. 14 Id. at 49. 15 Id. at 64. 16 ACLU v. Clapper, ___ F. Supp. ___ (SDNY, 2013), at http://apps.washingtonpost.com/g/ documents/world/us-district-judge-pauleys-ruling-in-aclu-vs-clapper/723. 17 Id. at 25. Of course Adams, Jefferson, Madison et al., were all breaking the law in 1776. In fact, they risked their lives for what they believed was right and might well have been hung as traitors if King George had won the war. 18 http://sensenbrenner.house.gov/news/documentsingle.aspx?DocumentID=339292. Judge Pauley claims that Congress has been fully informed by the NSA concerning the agency’s various programs, but after the Snowden revelations 205 members of the House of Representatives, who felt they hadn’t been informed, voted to halt the NSA’s dragnet collection of telephone metadata. As Chairman of the Senate Judiciary Committee, Sen. Patrick Leahy is one of the memb