Kevin Bankston | |
---|---|
Born | Kevin Stuart Bankston July 2, 1974 |
Education | University of Texas, Austin (BA) University of Southern California (JD) |
Occupation | Lawyer |
Kevin Stuart Bankston [1] (born July 2, 1974) [2] is an American attorney who specializes in the areas of free speech and privacy law. [3] He is currently Privacy Policy Director at Facebook, where he leads policy work on AI and emerging technologies. [4] He was formerly the director of the Open Technology Institute (OTI) at the New America Foundation in Washington, D.C. [5]
Bankston earned a B.A. at the University of Texas at Austin. In 2001 he completed a Juris Doctor at the University of Southern California. [6]
In his early career Bankston served, from 2001 until 2002, [7] as a Justice William J. Brennan First Amendment Fellow for the American Civil Liberties Union (ACLU) in New York City. At the ACLU he litigated Internet-related free speech cases. [6]
He then joined the Electronic Frontier Foundation in 2003 as an Equal Justice Works/Bruce J. Ennis Fellow. [7] From 2003 until 2005 he studied the impact anti-terrorism-related surveillance initiatives had on online privacy and free speech after 9/11. At the EFF he specialized in free speech and privacy law [3] and later became senior staff attorney. [8] In the EFF’s lawsuits against the National Security Agency (NSA) and AT&T where the lawfulness of the NSA’s warrantless wiretapping program was challenged, Bankston was a lead counsel. [6]
After working for almost ten years at the EFF Bankston joined the Center for Democracy & Technology (CDT) in Washington, D.C. in early 2012. As senior counsel and the director of the Free Expression Policy Project [8] he advocated a variety of internet and technology policy issues at the Nonprofit organization. [9] In November 2013 he spoke before the Senate Committee on the Judiciary, Subcommittee on Privacy, Technology and the Law on The Surveillance Transparency Act of 2013. [10] He later became the director of the Open Technology Institute (OTI) at the New America Foundation in Washington DC. [5]
The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for global intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems. The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine. The NSA has roughly 32,000 employees.
Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be completed by governments, corporations, criminal organizations, or individuals. It may or may not be legal and may or may not require authorization from a court or other independent government agencies. Computer and network surveillance programs are widespread today and almost all Internet traffic can be monitored.
The Electronic Privacy Information Center (EPIC) is an independent nonprofit research center established in 1994 to protect privacy, freedom of expression, and democratic values in the information age. Based in Washington, D.C., their mission is to "secure the fundamental right to privacy in the digital age for all people through advocacy, research, and litigation." EPIC believes that privacy is a fundamental right, the internet belongs to people who use it, and there's a responsible way to use technology.
Center for Democracy & Technology (CDT) is a Washington, D.C.–based 501(c)(3) nonprofit organization that advocates for digital rights and freedom of expression. CDT seeks to promote legislation that enables individuals to use the internet for purposes of well-intent, while at the same time reducing its potential for harm. It advocates for transparency, accountability, and limiting the collection of personal information.
End-to-end encryption (E2EE) is a method of implementing a secure communication system where only communicating users can participate. No one else, including the system provider, telecom providers, Internet providers or malicious actors, can access the cryptographic keys needed to read or send messages.
NSA warrantless surveillance — also commonly referred to as "warrantless-wiretapping" or "-wiretaps" — was the surveillance of persons within the United States, including U.S. citizens, during the collection of notionally foreign intelligence by the National Security Agency (NSA) as part of the Terrorist Surveillance Program. In late 2001, the NSA was authorized to monitor, without obtaining a FISA warrant, phone calls, Internet activities, text messages and other forms of communication involving any party believed by the NSA to be outside the U.S., even if the other end of the communication lies within the U.S.
James Andrew Baker is a former American government official at the Department of Justice who served as general counsel for the Federal Bureau of Investigation (FBI) and later served as deputy general counsel at Twitter, Inc. before being fired by Elon Musk in December 2022.
MAINWAY is a database maintained by the United States' National Security Agency (NSA) containing metadata for hundreds of billions of telephone calls made through the largest telephone carriers in the United States, including AT&T, Verizon, and T-Mobile.
The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group based in San Francisco, California. It was founded in 1990 to promote Internet civil liberties.
Bullrun is a clandestine, highly classified program to crack encryption of online communications and data, which is run by the United States National Security Agency (NSA). The British Government Communications Headquarters (GCHQ) has a similar program codenamed Edgehill. According to the Bullrun classification guide published by The Guardian, the program uses multiple methods including computer network exploitation, interdiction, industry relationships, collaboration with other intelligence community entities, and advanced mathematical techniques.
Caspar Pemberton Scott Bowden was a British privacy advocate, formerly a chief privacy adviser at Microsoft. Styled as "an independent advocate for information privacy rights, and public understanding of privacy research in computer science", he was on the board of the Tor anonymity service. and a fellow of the British Computer Society. Having predicted US mass surveillance programmes such as PRISM from open sources, he gathered renewed attention after the Snowden leaks vindicated his warnings.
The Day We Fight Back was a one-day global protest against mass surveillance by the US National Security Agency (NSA), the UK GCHQ, and the other Five Eyes partners involved in global surveillance. The "digital protest" took place on February 11, 2014 with more than 6,000 participating websites, which primarily took the form of webpage banner-advertisements that read, "Dear Internet, we're sick of complaining about the NSA. We want new laws that curtail online surveillance. Today we fight back." Organizers hoped lawmakers would be made aware "that there's going to be ongoing public pressure until these reforms are instituted."
The USA Freedom Act is a U.S. law enacted on June 2, 2015, that restored and modified several provisions of the Patriot Act, which had expired the day before. The act imposes some new limits on the bulk collection of telecommunication metadata on U.S. citizens by American intelligence agencies, including the National Security Agency. It also restores authorization for roving wiretaps and tracking lone wolf terrorists. The title of the act is a ten-letter backronym that stands for Uniting and Strengthening America by Fulfilling Rights and Ensuring Effective Discipline Over Monitoring Act of 2015.
The FISA Improvements Act is a proposed act by Senator Dianne Feinstein, Chair of the Senate Intelligence Committee. Prompted by the disclosure of NSA surveillance by Edward Snowden, it would establish the surveillance program as legal, but impose some limitations on availability of the data. Opponents say the bill would codify warrantless access to many communications of American citizens for use by domestic law enforcement.
The Director of National Intelligence Review Group on Intelligence and Communications Technologies was a review group formed by the Director of National Intelligence of the United States in light of the global surveillance disclosures of 2013. In December 2013, the five-member group produced a public report.
Former U.S. President Barack Obama favored some levels of mass surveillance. He has received some widespread criticism from detractors as a result. Due to his support of certain government surveillance, some critics have said his support violated acceptable privacy rights, while others dispute or attempt to provide justification for the expansion of surveillance initiatives under his administration.
Attempts, unofficially dubbed the "Crypto Wars", have been made by the United States (US) and allied governments to limit the public's and foreign nations' access to cryptography strong enough to thwart decryption by national intelligence agencies, especially the National Security Agency (NSA).
Library Freedom Project's stated mission, "is radically rethinking the library professional organization by creating a network of values-driven librarian-activists working together to build information democracy."
Marcia Clare Hofmann is an American attorney and US-UK Fulbright Scholar. Hofmann is known for her work as an advocate of electronic privacy and free expression, including defending individuals charged with high-profile computer crimes, such as Marcus Hutchins and Weev.
The Apple–FBI encryption dispute concerns whether and to what extent courts in the United States can compel manufacturers to assist in unlocking cell phones whose data are cryptographically protected. There is much debate over public access to strong encryption.