California lawmakers move to bar state help to NSA
Proposal to prohibit sale of water, electricity by state owned facilities to the NSA will likely be copied by legislators in other states
Computerworld - Two California lawmakers this week introduced a bill that would prohibit state agencies and corporations from providing material support to the National Security Agency.
The so-called Fourth Amendment Protection Act, sponsored by State Senators Ted Lieu (D-Torrance) and Joel Anderson (R-San Diego) would bar state and locally-owned utilities from providing water and electricity to NSA facilities in California.
Under the proposed legislation, any information gathered without a warrant by the NSA and provided to California law enforcement authorities would be inadmissible in state courts.
The bill would also block public universities from hosting NSA recruiting or research facilities, and sanction private companies that provide material support to the agency.
"The President and Congress to date have done nothing to rein in the NSA, and it is time for states to make their views known" about the agency's warrantless collection of phone metadata records, Sen. Lieu said in an interview with Computerworld Tuesday.
"The NSA is deliberately violating the Fourth Amendment rights of all Americans, including more than 38 million Californians," Lieu contended, adding that the legislation would ensure that state-funded public resources aren't used to aid NSA warrantless data collection programs.
There are no NSA facilities in California and the bill would prevent the U.S. spy agency from opening a facility or receiving any state help in the future, he said.
Lieu compared the bill to the Trust Act, which took effect on Jan. 1. Among other things, that state law limits cooperation between state and federal law enforment agencies on immigration matters. For instance, the law requires that state agencies only provide the U.S. Immigration and Customs Enforcement agency information on illegal immigrants who have committed serious crimes.
Lieu said the bill has attracted the attention of legislators in other states.
For instance, Arizona State Senator Kelli Ward, R-Lake Havasu City, last month announced plans to introduce an identical bill in Arizona state legislature.
The California and Arizona bills are modeled on a template developed by the Tenth Amendment Center, an advocacy group focused on state and individual sovereignty issues.
The advocacy group is working to convince lawmakers in various states to create laws that would make it difficult for the NSA to operate in that state. Michael Maharrey, the Tenth Amendment Center's communication director, said on Tuesday that two other states, Utah and Washington, are considering similar legislation.
Also, he said, lawmakers in Kansas and Missouri have introduced bills that would prohibit information gathered without a warrant by the NSA to be used by state law enforcement agencies or courts.
The Utah bill aims to prohibit state and local agencies from providing water to a giant new NSA data center near Salt Lake City.
The facility reportedly requires 1.7 million gallons of water a day to cool the massive supercomputers and storage systems used to collect and analyze surveillance data from around the world. The Jordan Valley River Conservancy District, a state-owned entity, is currently supposed to provide water to the facility.
"Things move fast as the legislatures gear up for the 2014 session, as the introduction of the bill in California illustrates," Maharrey said.
Ward last month said that her plans to introduce the bill were being driven by her constituents in Arizona.
"Of course, we can't physically bar the NSA from operating here. But we can refuse any state cooperation with the agency as long as it insists on violating the Constitution," she said. "The idea is to make it difficult to impossible for the NSA to do what it wants to do. Banning our state from participating in programs that the NSA is currently carrying out will help make that happen."
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His email address is firstname.lastname@example.org.
- NSA defends collecting data from U.S. residents not suspected of terrorist activities
- Groups fear bill would allow free flow of data between private sector and NSA
- Google's move into home automation means even less privacy
- Bill to require warrant for email searches gains ground in House
- Coming soon to a fridge near you -- targeted ads
- Snowden leaks prompt tech firms to tout privacy, transparency policies
- License reader lawsuit can be heard, appeals court rules
- Is EU's 'right to be forgotten' really the 'right to edit the truth'?
- Tails 1.0: A bootable Linux distro that protects your privacy
- Privacy jitters derail controversial K-12 big data initiative
Read more about Privacy in Computerworld's Privacy Topic Center.
- 5 Customers Deliver Virtual Desktops and Apps to Empower a Modern Workforce Learn how Citrix solutions helped 5 companies realize the full value of desktop virtualization through a project-by-project approach based on key business priorities.
- Top 10 Reasons to Strengthen Information Security with Desktop Virtualization Regain control and reduce risk without sacrificing business productivity and growth
- IDC MarketScape: Worldwide Client Virtualization Software 2013 Vendor Assessment IDC has placed Citrix in the 2013 IDC MarketScape Leaders Category once again noting that, "Citrix's position reflects the company's market leadership and...
- Infographic: Top Use Cases for Desktop Virtualization A wide range of business issues is driving IT toward desktop virtualization. One solution-Citrix XenDesktop with FlexCast technology-helps IT teams empower their entire...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- What Does it Take to Deliver a Superior Customer Experience? The Two Top-Rated Online Retailers, B&H Photo and Crutchfield Electronics, Share Their Secrets Discuss practical CX tools and service methods such as contact center agents and the use of realtime speech analytics to help contact center... All Privacy White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!