Archive for May, 2017

Social Media – The New York Times

Latest Articles

Berkeley Breathed, the creator of the comic strip, shared a (fake) letter telling him to stop using Mr. Trumps image.

By CHRISTINE HAUSER

Mark Zuckerberg is only about halfway through his goal to visit all the states, but the trips seem to be influencing his thinking, and his philosophy.

Twitters addition of the Aboriginal and Torres Strait Islander flags comes in time for the 50th anniversary of a vote to include the communities in the national census.

By TACEY RYCHTER

Creeping on your wifes account proves you are just as lame as the rest of us.

By JOHN HODGMAN

A teacher confronted the student, Daniel Barrow, on Thursday after seeing him in an online video with a gun, the police said. Mr. Barrow was arrested.

The Facebook chief plans to visit every state in the union and learn more about a sliver of the nearly two billion people who use the social network regularly.

By MIKE ISAAC

Ms. Mathers must remove graffiti in Los Angeles after taking a photograph of a naked 70-year-old in a shower area, in a case seen as body shaming.

By CHRISTINE HAUSER

It was not just family and friends mourning Martyn Hett this week. Even Mariah Carey was shocked by his death in the Ariana Grande concert bombing.

For one online personality, rushing to post Ariana Grande jokes had immediate consequence. Coca-Cola is one brand he will no longer be paid to plug.

By KATHERINE ROSMAN

With every step down the red carpet at the Cannes Film Festival, Chinese social media star Lili Xu reckons she is getting ever closer to her dream of a career in the movies.

Facebook converts many wide-angle panorama photos to 360-degree interactive images when they are uploaded, but you can revert to the original.

European Union ministers approved proposals on Tuesday to make social media companies such as Facebook, Twitter and Google's YouTube tackle videos with hate speech on their platforms. The proposals, which would be the first legislation at EU level on the issue, still need to be agreed with the European Parliament before becoming law. But EU lawmakers have similarly pushed for social media companies to do more to tackle hateful content on their platforms.

Pakistan's interior minister is warning that people posting "anti-state" content on social media will face prosecution.

The commencement speaker Yang Shuping, a senior at the University of Maryland, was accused on social media of selling out her homeland.

By MIKE IVES

Terrorism experts said the traumatizing effects on victims, which included many young girls, had been intended to grab the adult worlds attention.

By DAN BILEFSKY and RICK GLADSTONE

What changes would you like to see on the internet, and why?

By CAROLINE CROSSON GILPIN

A girl and her family were feeding a sea lion from a dock in British Columbia when the animal grabbed her by the dress and pulled her underwater, an episode that was caught on video.

By CRAIG S. SMITH

Social media has been abuzz with images of Mr. Trump joining Saudi and Egyptian leaders in laying hands on a white sphere.

By THE NEW YORK TIMES

Images of U.S. President Donald Trump placing his hands on a glowing orb has set alight the internet, prompting comparisons to science fiction and fantasy villains.

Pakistan has begun a crackdown on online criticism of its powerful military, with up to 200 social media accounts under investigation, a security official said on Monday.

Berkeley Breathed, the creator of the comic strip, shared a (fake) letter telling him to stop using Mr. Trumps image.

By CHRISTINE HAUSER

Mark Zuckerberg is only about halfway through his goal to visit all the states, but the trips seem to be influencing his thinking, and his philosophy.

Twitters addition of the Aboriginal and Torres Strait Islander flags comes in time for the 50th anniversary of a vote to include the communities in the national census.

By TACEY RYCHTER

Creeping on your wifes account proves you are just as lame as the rest of us.

By JOHN HODGMAN

A teacher confronted the student, Daniel Barrow, on Thursday after seeing him in an online video with a gun, the police said. Mr. Barrow was arrested.

The Facebook chief plans to visit every state in the union and learn more about a sliver of the nearly two billion people who use the social network regularly.

By MIKE ISAAC

Ms. Mathers must remove graffiti in Los Angeles after taking a photograph of a naked 70-year-old in a shower area, in a case seen as body shaming.

By CHRISTINE HAUSER

It was not just family and friends mourning Martyn Hett this week. Even Mariah Carey was shocked by his death in the Ariana Grande concert bombing.

For one online personality, rushing to post Ariana Grande jokes had immediate consequence. Coca-Cola is one brand he will no longer be paid to plug.

By KATHERINE ROSMAN

With every step down the red carpet at the Cannes Film Festival, Chinese social media star Lili Xu reckons she is getting ever closer to her dream of a career in the movies.

Facebook converts many wide-angle panorama photos to 360-degree interactive images when they are uploaded, but you can revert to the original.

European Union ministers approved proposals on Tuesday to make social media companies such as Facebook, Twitter and Google's YouTube tackle videos with hate speech on their platforms. The proposals, which would be the first legislation at EU level on the issue, still need to be agreed with the European Parliament before becoming law. But EU lawmakers have similarly pushed for social media companies to do more to tackle hateful content on their platforms.

Pakistan's interior minister is warning that people posting "anti-state" content on social media will face prosecution.

The commencement speaker Yang Shuping, a senior at the University of Maryland, was accused on social media of selling out her homeland.

By MIKE IVES

Terrorism experts said the traumatizing effects on victims, which included many young girls, had been intended to grab the adult worlds attention.

By DAN BILEFSKY and RICK GLADSTONE

What changes would you like to see on the internet, and why?

By CAROLINE CROSSON GILPIN

A girl and her family were feeding a sea lion from a dock in British Columbia when the animal grabbed her by the dress and pulled her underwater, an episode that was caught on video.

By CRAIG S. SMITH

Social media has been abuzz with images of Mr. Trump joining Saudi and Egyptian leaders in laying hands on a white sphere.

By THE NEW YORK TIMES

Images of U.S. President Donald Trump placing his hands on a glowing orb has set alight the internet, prompting comparisons to science fiction and fantasy villains.

Pakistan has begun a crackdown on online criticism of its powerful military, with up to 200 social media accounts under investigation, a security official said on Monday.

The rest is here:
Social Media - The New York Times

Why Instagram Is the Worst Social Media for Mental Health | Time.com – TIME

Instagram is the worst social media network for mental health and wellbeing, according to a recent survey of almost 1,500 teens and young adults. While the photo-based platform got points for self-expression and self-identity, it was also associated with high levels of anxiety, depression, bullying and FOMO, or the fear of missing out.

Out of five social networks included in the survey, YouTube received the highest marks for health and wellbeing and was the only site that received a net positive score by respondents. Twitter came in second, followed by Facebook and then Snapchatwith Instagram bringing up the rear.

The #StatusOfMind survey, published by the United Kingdoms Royal Society for Public Health, included input from 1,479 young people (ages 14 to 24) from across England, Scotland, Wales and Northern Ireland. From February through May of this year, people answered questions about how different social media platforms impacted 14 different issues related to their mental or physical health.

There were certainly some benefits associated with social networking. All of the sites received positive scores for self-identity, self-expression, community building and emotional support, for example. YouTube also got high marks for bringing awareness of other peoples health experiences, for providing access to trustworthy health information and for decreasing respondents levels of depression, anxiety, and loneliness .

But they all received negative marks, as wellespecially for sleep quality , bullying, body image and FOMO. And unlike YouTube, the other four networks were associated with increases in depression and anxiety.

Previous studies have suggested that young people who spend more than two hours a day on social networking sites are more likely to report psychological distress. Seeing friends constantly on holiday or enjoying nights out can make young people feel like they are missing out while others enjoy life, the #StatusOfMind report states. These feelings can promote a compare and despair attitude.

Social media posts can also set unrealistic expectations and create feelings of inadequacy and low self-esteem, the authors wrote. This may explain why Instagram, where personal photos take center stage, received the worst scores for body image and anxiety. As one survey respondent wrote, Instagram easily makes girls and women feel as if their bodies arent good enough as people add filters and edit their pictures in order for them to look perfect.

MORE : Why You Should Let Someone Else Choose Your Tinder Photo

Other research has found that the more social networks a young adult uses, the more likely he or she is to report depression and anxiety . Trying to navigate between different norms and friend networks on various platforms could be to blame, study authors sayalthough its also possible that people with poor mental health are drawn to multiple social-media platforms in the first place.

To reduce the harmful effects of social media on children and young adults, the Royal Society is calling for social media companies to make changes. The report recommends the introduction of a pop-up heavy usage warning within these apps or websitesomething 71% of survey respondents said theyd support.

It also recommends that companies find a way to highlight when photos of people have been digitally manipulated, as well as identify and offer help to users who could be suffering from mental health problems. (A feature rolled out on Instagram last year allowing users to anonymously flag troublesome posts .)

The government can also help, the report states. It calls for safe social media use to be taught during health education in schools, for professionals who work with youth to be trained in digital and social media and for more research to be conducted on the effects of social media on mental health.

The Royal Society hopes to empower young adults to use social networks in a way that protects and promotes their health and wellbeing, the report states. Social media isnt going away soon, nor should it. We must be ready to nurture the innovation that the future holds.

See the original post here:
Why Instagram Is the Worst Social Media for Mental Health | Time.com - TIME

Law review article: The Effects of Legislation on Fourth …

ABA Journal's Blawg 100 (2015-2016)

by John Wesley Hall Criminal Defense Lawyer and Search and seizure law consultant Little Rock, Arkansas Contact / The Book http://www.johnwesleyhall.com

2003-17, online since Feb. 24, 2003

~~~~~~~~~~~~~~~~~~~~~~~~~~

Fourth Amendment cases, citations, and links

Latest Slip Opinions: U.S. Supreme Court (Home) Federal Appellate Courts Opinions First Circuit Second Circuit Third Circuit Fourth Circuit Fifth Circuit Sixth Circuit Seventh Circuit Eighth Circuit Ninth Circuit Tenth Circuit Eleventh Circuit D.C. Circuit Federal Circuit Foreign Intell.Surv.Ct. FDsys, many district courts, other federal courts, other Military Courts: C.A.A.F., Army, AF, N-M, CG State courts (and some USDC opinions)

Google Scholar Advanced Google Scholar Google search tips LexisWeb LII State Appellate Courts LexisONE free caselaw Findlaw Free Opinions To search Search and Seizure on Lexis.com $

Research Links: Supreme Court: SCOTUSBlog S. Ct. Docket Solicitor General's site SCOTUSreport Briefs online (but no amicus briefs) Oyez Project (NWU) "On the Docket"Medill S.Ct. Monitor: Law.com S.Ct. Com't'ry: Law.com

General (many free): LexisWeb Google Scholar | Google LexisOne Legal Website Directory Crimelynx Lexis.com $ Lexis.com (criminal law/ 4th Amd) $ Findlaw.com Findlaw.com (4th Amd) Westlaw.com $ F.R.Crim.P. 41 http://www.fd.org Federal Law Enforcement Training Center Resources FBI Domestic Investigations and Operations Guide (2008) (pdf) DEA Agents Manual (2002) (download) DOJ Computer Search Manual (2009) (pdf) Stringrays (ACLU No. Cal.) (pdf)

Congressional Research Service: --Electronic Communications Privacy Act (2012) --Overview of the Electronic Communications Privacy Act (2012) --Outline of Federal Statutes Governing Wiretapping and Electronic Eavesdropping (2012) --Federal Statutes Governing Wiretapping and Electronic Eavesdropping (2012) --Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions (2012) ACLU on privacy Privacy Foundation Electronic Frontier Foundation NACDLs Domestic Drone Information Center Electronic Privacy Information Center Criminal Appeal (post-conviction) (9th Cir.) Section 1983 Blog

"If it was easy, everybody would be doing it. It isn't, and they don't." Me

I still learn something new every day. Pete Townshend, The Who 50th Anniversary Tour, "The Who Live at Hyde Park" (Showtime 2015)

"I can't talk about my singing. I'm inside it. How can you describe something you're inside of?" Janis Joplin

"Love work; hate mastery over others; and avoid intimacy with the government." Shemaya, in the Thalmud

"A system of law that not only makes certain conduct criminal, but also lays down rules for the conduct of the authorities, often becomes complex in its application to individual cases, and will from time to time produce imperfect results, especially if one's attention is confined to the particular case at bar. Some criminals do go free because of the necessity of keeping government and its servants in their place. That is one of the costs of having and enforcing a Bill of Rights. This country is built on the assumption that the cost is worth paying, and that in the long run we are all both freer and safer if the Constitution is strictly enforced." Williams v. Nix, 700 F. 2d 1164, 1173 (8th Cir. 1983) (Richard Sheppard Arnold, J.), rev'd Nix v. Williams, 467 US. 431 (1984).

"The criminal goes free, if he must, but it is the law that sets him free. Nothing can destroy a government more quickly than its failure to observe its own laws, or worse, its disregard of the charter of its own existence." Mapp v. Ohio, 367 U.S. 643, 659 (1961).

"Any costs the exclusionary rule are costs imposed directly by the Fourth Amendment." Yale Kamisar, 86 Mich.L.Rev. 1, 36 n. 151 (1987).

"There have been powerful hydraulic pressures throughout our history that bear heavily on the Court to water down constitutional guarantees and give the police the upper hand. That hydraulic pressure has probably never been greater than it is today." Terry v. Ohio, 392 U.S. 1, 39 (1968) (Douglas, J., dissenting).

"The great end, for which men entered into society, was to secure their property." Entick v. Carrington, 19 How.St.Tr. 1029, 1066, 95 Eng. Rep. 807 (C.P. 1765)

"It is a fair summary of history to say that the safeguards of liberty have frequently been forged in controversies involving not very nice people. And so, while we are concerned here with a shabby defrauder, we must deal with his case in the context of what are really the great themes expressed by the Fourth Amendment." United States v. Rabinowitz, 339 U.S. 56, 69 (1950) (Frankfurter, J., dissenting)

"The course of true law pertaining to searches and seizures, as enunciated here, has notto put it mildlyrun smooth." Chapman v. United States, 365 U.S. 610, 618 (1961) (Frankfurter, J., concurring).

"A search is a search, even if it happens to disclose nothing but the bottom of a turntable." Arizona v. Hicks, 480 U.S. 321, 325 (1987)

"For the Fourth Amendment protects people, not places. What a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection. ... But what he seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected." Katz v. United States, 389 U.S. 347, 351 (1967)

Experience should teach us to be most on guard to protect liberty when the Governments purposes are beneficent. Men born to freedom are naturally alert to repel invasion of their liberty by evil-minded rulers. The greatest dangers to liberty lurk in insidious encroachment by men of zeal, well-meaning but without understanding. United States v. Olmstead, 277 U.S. 438, 479 (1925) (Brandeis, J., dissenting)

Libertythe freedom from unwarranted intrusion by governmentis as easily lost through insistent nibbles by government officials who seek to do their jobs too well as by those whose purpose it is to oppress; the piranha can be as deadly as the shark. United States v. $124,570, 873 F.2d 1240, 1246 (9th Cir. 1989)

"You can't always get what you want / But if you try sometimes / You just might find / You get what you need." Mick Jagger & Keith Richards

"In Germany, they first came for the communists, and I didn't speak up because I wasn't a communist. Then they came for the Jews, and I didn't speak up because I wasn't a Jew. Then they came for the trade unionists, and I didn't speak up because I wasn't a trade unionist. Then they came for the Catholics and I didn't speak up because I wasn't a Catholic. Then they came for meand by that time there was nobody left to speak up." Martin Niemller (1945) [he served seven years in a concentration camp]

You know, most men would get discouraged by now. Fortunately for you, I am not most men! ---Pep Le Pew

Here is the original post:
Law review article: The Effects of Legislation on Fourth ...

Explosive Revelation of Obama Administration Illegal Surveillance of Americans – National Review

During the Obama years, the National Security Agency intentionally and routinely intercepted and reviewed communications of American citizens in violation of the Constitution and of court-ordered guidelines implemented pursuant to federal law.

The unlawful surveillance appears to have been a massive abuse of the governments foreign-intelligence-collection authority, carried out for the purpose of monitoring the communications of Americans in the United States. While aware that it was going on for an extensive period of time, the administration failed to disclose its unlawful surveillance of Americans until late October 2016, when the administration was winding down and the NSA needed to meet a court deadline in order to renew various surveillance authorities under the Foreign Intelligence Surveillance Act (FISA).

The administrations stonewalling about the scope of the violation induced an exasperated Foreign Intelligence Surveillance Court to accuse the NSA of an institutional lack of candor in connection with what the court described as a very serious Fourth Amendment issue. (The court is the federal tribunal created in 1978 by FISA; it is often referred to as a secret court because proceedings before it are classified and ex parte meaning only the Justice Department appears before the court.)

The FISA-court opinion is now public, available here. The unlawful surveillance was first exposed in a report at Circa by John Solomon and Sara Carter, who have also gotten access to internal, classified reports. The story was also covered extensively Wednesday evening by James Rosen and Bret Baier on Fox Newss Special Report.

According to the internal reports reviewed by Solomon and Carter, the illegal surveillance may involve more than 5 percent of NSA searches of databases derived from what is called upstream collection of Internet communications.

As the FISA court explains, upstream collection refers to the interception of communications as they transit the facilities of an Internet backbone carrier. These are the data routes between computer networks. The routes are hosted by government, academic, commercial, and similar high-capacity network centers, and they facilitate the global, international exchange of Internet traffic. Upstream collection from the Internets backbone, which accounts for about 9 percent of the NSAs collection haul (a massive amount of communications), is distinguished from interception of communications from more familiar Internet service providers.

Upstream collection is a vital tool for gathering intelligence against foreign threats to the United States. It is, of course, on foreign intelligence targets non-U.S. persons situated outside the U.S. that the NSA and CIA are supposed to focus. Foreign agents operating inside the U.S. are mainly the purview of the FBI, which conducts surveillance of their communications through warrants from the FISA court individualized warrants based on probable cause that a specific person is acting as an agent of a foreign power.

The NSA conducts vacuum intelligence-collection under a different section of FISA section 702. It is inevitable that these section 702 surveillance authorities will incidentally intercept the communications of Americans inside the United States if those Americans are communicating with the foreign target. This does not raise serious Fourth Amendment concerns; after all, non-targeted Americans are intercepted all the time in traditional criminal wiretaps because they call, or are called by, the target. But FISA surveillance is more controversial than criminal surveillance because the government does not have to show probable cause of a crime and when the targets are foreigners outside the U.S., the government does not have to make any showing; it may target if it has a legitimate foreign-intelligence purpose, which is really not much of a hurdle at all.

So, as noted in coverage of the Obama administrations monitoring of Trump-campaign officials, FISA section 702 provides some privacy protection for Americans: The FISA court orders minimization procedures, which require any incidentally intercepted Americans identity to be masked. That is, the NSA must sanitize the raw data by concealing the identity of the American. Only the masked version of the communication is provided to other U.S. intelligence agencies for purposes of generating reports and analyses. As I have previously explained, however, this system relies on the good faith of government officials in respecting privacy: There are gaping loopholes that permit American identities to be unmasked if, for example, the NSA or some other intelligence official decides doing so is necessary to understand the intelligence value of the communication.

While that kind of incidental collection raises the concerns of privacy advocates, it is a small problem compared to upstream collection, the technology of which poses profound Fourth Amendment challenges.

In a nutshell, it is not possible to capture a single e-mail related to a single target as it transits the backbone routes (or switches) that connect networks. The NSA must instead capture packets of e-mail data which include lots of e-mails beside the targeted e-mail. It sifts through these packets, finds and assembles the components of the email it was looking for, and then discards the rest. (A New York Times report by Charlie Savage earlier this week, in connection with a different FISA issue, provides a good explanation of this process. By contrast, the relevant discussion in the FISA court opinion of multiple communications transactions, or MCTs, is brief and heavily redacted see the opinion at 1516.) Even if the NSA does exactly what it is supposed to do (i.e., sift and discard), this means American communications are being seized and subjected to an inspection however cursory in the absence of any warrant, probable cause, or foreign-intelligence relevance.

Now, couple this problem with the way the NSA targets. The upstream communications it collects end up in databases. When the NSA has a target about whom it seeks intelligence, it runs a search through the databases using what is variously called an identifier, a selection term, or a selector some e-mail address, phone number, or other identifying information related to the target. For years, U.S. intelligence agencies have not just sought any communications to or from this target; they have also sought any communications about this target e.g., when the target merely appears to have been referred to. This means the communications of people, including Americans inside the United States, are far more likely to be accessed and analyzed even though, again, there is no warrant or probable cause, there may be no direct communication with a proper intelligence target, and the Americans communications may be of no foreign-intelligence value.

So, to summarize, we have the communications of Americans inside the United States being incidentally intercepted, stored, sifted through, and in some instances analyzed, even though those Americans are not targets of foreign-intelligence collection. The minimization procedures are supposed to prevent the worst potential abuses, particularly, the pretextual use of foreign-intelligence-collection authority in order to conduct domestic spying. But even when complied with, there is a colorable argument that the minimization procedures do not eliminate the Fourth Amendment problem i.e., they permit seizure and search without adequate cause.

Now we know the minimization procedures have not been complied with. The new scandal involves their flouting.

In 2011, it became clear to the FISA court that the minimization procedures were providing insufficient protection to Americans. Of special concern was the use of identifiers of American citizens as selection terms for database searches. While the activities of these Americans might have made them worthy foreign-intelligence targets, there are other ways to monitor them under FISA. Targeting them for section 702 searches increased the likelihood that wholly domestic communications between Americans would be collected.

Thus, the minimization procedures were ratcheted up. The most significant change, as the FISA court opinion relates, was that the revised procedures categorically prohibited NSA analysts from using U.S.-person identifiers to query the results of upstream Internet collection (emphasis added).

This meant the NSA was not supposed to use an Americans phone number, e-mail address, or other identifier in running searches through its upstream database.

It is this prohibition that the NSA routinely and extensively violated. Evidently, there was widespread use of American identifiers throughout the years after the 2011 revision of the minimization procedures. The violation was so broad that, at the time the Obama administration ended, its scope had still not been determined.

The Trump Justice Department proposed new procedures in late March, which the FISA court has approved. These include the elimination of searches about a target henceforth, searches are limited to communications in which the target is presumptively a participant (i.e., to or from). The new procedures redouble efforts to assure that the database collects only foreign communications (i.e., at least one end of the communication is outside the U.S.).

We should note that section 702 is due to lapse unless reauthorized later this year, so the new rules will obviously be subjected to close scrutiny. A salient question will be whether this new scandal is mainly a case of technology outpacing the capacity to formulate rules that bring its use into constitutional compliance.

Im sure there is a good deal of that going on; that means the system is inadvertently inputting communications that should not be collected and stored. Plainly, though, something more insidious has also gone on. Even if the inputting has been inadvertently flawed, the outputs what is actually accessed from the database and analyzed would be less likely to violate American privacy if the minimization procedures were followed. The rules from 2011 forward were simple: Do not use American identifiers. Yet NSA used them not once or twice because some new technician didnt know better. This violation of law was routine and extensive, known and concealed.

Clearly, this new scandal must be considered in context.

The NSA says it does not share raw upstream collection data with any other intelligence agency. But that data is refined into reports. To the extent the data collected has increased the number of Americans whose activities make it into reports, it has simultaneously increased the opportunities for unmasking American identities. Other reporting indicates that there was a significant uptick in unmasking incidents in the latter years of the Obama administration. More officials were given unmasking authority. At the same time, President Obama loosened restrictions to allow wider access to raw intelligence collection and wider dissemination of intelligence reports.

This geometrically increased the likelihood that classified information would be leaked as did the Obama administrations encouragement to Congress to demand disclosure of intelligence related to the Trump campaign (the purported TrumpRussia connection). And of course, there has been a stunning amount of leaking of classified information to the media.

Enabling of domestic spying, contemptuous disregard of court-ordered minimization procedures (procedures the Obama administration itself proposed, then violated), and unlawful disclosure of classified intelligence to feed a media campaign against political adversaries. Quite the Obama legacy.

Andrew C. McCarthy is a senior policy fellow at the National Review Institute and a contributing editor of National Review.

View original post here:
Explosive Revelation of Obama Administration Illegal Surveillance of Americans - National Review

Facebook, Google, and other tech companies ask lawmakers to … – The Verge

In a letter sent today to House lawmakers, major tech companies asked for reforms to a legal authority underpinning controversial National Security Agency programs.

Section 702 is set to expire at the end of the year

Section 702 of the FISA Amendments Act, which is set to expire at the end of this year, is the legal basis for NSA programs that broadly sweep up electronic communications. The programs are meant to target non-US citizens overseas, although critics have long charged that Americans are unnecessarily caught up in the net. Section 702 is used to authorize the controversial PRISM program, which the NSA uses to collect information from tech companies.

The letter, signed by companies including Amazon, Facebook, Google, Twitter, and Uber, requests that lawmakers consider changes before reauthorizing 702, such as increasing transparency and oversight, as well as narrowing the amount of information collected under such programs. The companies also asked for more leeway in disclosing national security demands.

Last month, the NSA said it would halt 702 collections that simply mention foreign intelligence targets, a process that has been the subject of major criticism. The letter also requests that those changes to the process be codified by law.

The companies write that the letter is meant to express our support for reforms to Section 702 that would maintain its utility to the U.S. intelligence community while increasing the programs privacy protections and transparency.

More here:
Facebook, Google, and other tech companies ask lawmakers to ... - The Verge