Yahoo secretly scanned customer emails for U.S. intelligence

Daily News Article - October 7, 2016

Questions

1. The first paragraph of a news article should answer the questions who, what, where and when. List the who, what, where and when of this news item. (NOTE: The remainder of a news article provides details on the why and/or how.)

2. Define the following as used in the article:
-complied
-directive (government directive)
-classified
-selector
-privacy rights (right to privacy)
-precedent

3. What information was Reuters unable to determine about the Yahoo email search?

4. a) How did Yahoo respond to questions about the revelation?
b) How did the National Security Agency respond to questions?

5. Why do experts think it was likely that the NSA or FBI had approached other Internet companies with the same demand?

6. For what reasons is it lawful under FISA for the government to ask private internet companies for data?

7. According to some experts, on what grounds could Yahoo have fought complying with the government’s directive?

8. From paragraphs 3 and 10:
Some surveillance experts said this represents the first case to surface of a U.S. Internet company agreeing to a U.S. government's demand to search all arriving messages, as opposed to examining stored messages or scanning a small number of accounts in real time.
U.S. phone and Internet companies are known to have handed over bulk customer data to intelligence agencies. But some former government officials and private surveillance experts said they had not previously seen either such a broad directive for real-time Web collection or one that required the creation of a new computer program.
a) Would you be opposed to this if you knew it led to the capture/prevention of terrorist attacks in the U.S.? Explain your answer.
b) How should the government ensure Americans’ right to privacy while protecting citizens from terrorist attacks?
c) Do you think Yahoo should have refused the government’s request the way Apple did when authorities needed help unlocking the terrorist’s phone? Why or why not?

9. a) Write out the text of the Fourth Amendment.
b) A commentator at Constitution Daily writes: The Fourth Amendment provides a bulwark against this type of dragnet surveillance. Before searching Americans’ private communications, the Fourth Amendment requires that the government demonstrate probable cause or individualized suspicion. Do you agree with this assertion? Explain your answer.