Reforming the NSA Surveillance Programs – The Testimony I Would Have Given
The House Permanent Select Committee on Intelligence was to have had a hearing today on proposed reforms to the NSA surveillance programs. I was invited as a witness on a panel with Steve Bradbury and Steve Vladek and prepared testimony. Unfortunately, Representative Bill Young's untimely death resulted in the House not being in session today and the hearing has been rescheduled for next Tuesday when I cannot attend.
Preparing the testimony did, however, give me a chance to work through my thoughts about the right framework for analysis and how it might apply to some of the proposed reforms
Published by The Lawfare Institute
in Cooperation With
The House Permanent Select Committee on Intelligence was to have had a hearing today on proposed reforms to the NSA surveillance programs. I was invited as a witness on a panel with Steve Bradbury and Steve Vladek and prepared testimony. Unfortunately, Representative Bill Young's untimely death resulted in the House not being in session today and the hearing has been rescheduled for next Tuesday when I cannot attend.
Preparing the testimony did, however, give me a chance to work through my thoughts about the right framework for analysis and how it might apply to some of the proposed reforms. Never one to let work go to waste, I post these thoughts here for such value as others might find in the analysis. Like most issues, in the end I think the only answer you can really give is "it depends."
For those who don't want to read the entire statement, here is the short bullet summary:
In my statement, I want to make four basic points:
-
First, the reality of data analytics has fundamentally changed. We may wish that were not the case, but it is and in my judgment, Congress would be wise to recognize this fact. Our privacy laws must, in turn, change to meet this reality;
-
Second, transparency is good. Too much transparency defeats the very purpose of democracy;
-
Third, applying these concepts to the consideration of NSA surveillance leads me to the following conclusions (and here I have selected only a few of the most prominent proposals for discussion):
- An in-house advocate before the FISA court, called at the court’s discretion, might improve decision-making;
- Data retention rules and distributed databases will be ineffective and no more privacy protective;
- Post-collection judicial assessment of reasonable articulable suspicion is worth considering;
- Codifying existing judicial interpretations of FISA is not necessary but may be beneficial;
- Requiring disclosure of aggregate (but not company specific) data about collection efforts will improve transparency;
- We should reject the assertion that the FISA court is somehow either a rubberstamp or a packed court; and
- Finally, the most effective reforms are likely structural rather than legislative
-
Fourth, our current system of intelligence oversight generally works. It is incumbent on this Committee and those in Congress with knowledge of how our intelligence apparatus operates to defend that system as effective and appropriate.
DRAFT Statement for HPSCI
As an initial matter, two caveats are in order. First, as the current holder of an active Top Secret security clearance I am enjoined not to access classified materials that have been illegally disclosed. Naturally, that has caused a bit of a challenge in preparing a statement, since some of what is the subject of discussion today is public only because of such illegal disclosures. Fortunately, however, many of the most important underlying materials have been properly declassified by the Director of National Intelligence and may, therefore, be discussed in open session. Equally fortunately, I can confidently state that none of the programs we will be discussing today were within my purview when I was at the Department of Homeland Security. Hence everything I write about today is based on the public record, as I understand it – without, by the way, necessarily assuming that everything in that record is an accurate reflection of what is actually happening within NSA and the Intelligence Community. Second, in offering my statement to you, I necessarily tread where others who are far smarter than I have already walked.[1] In particular, I have relied upon two truly magnificent legal analyses of the topic, one by Steve Bradbury, who served in the Office of Legal Counsel during the Bush Administration,[2] and the other by David Kris, who served as Assistant Attorney General for the National Security Division during the Obama Administration.[3] In my statement, I want to make four basic points:- First, the reality of data analytics has fundamentally changed. We may wish that were not the case, but it is and in my judgment, Congress would be wise to recognize this fact. Our privacy laws must, in turn, change to meet this reality;
- Second, transparency is good. Too much transparency defeats the very purpose of democracy;
- Third, applying these concepts to the consideration of NSA surveillance leads me to the following conclusions (and here I have selected only a few of the most prominent proposals for discussion):
- An in-house advocate before the FISA court, called at the court’s discretion, might improve decision-making;
- Data retention rules and distributed databases will be ineffective and no more privacy protective;
- Post-collection judicial assessment of reasonable articulable suspicion is worth considering;
- Codifying existing judicial interpretations of FISA is not necessary but may be beneficial;
- Requiring disclosure of aggregate (but not company specific) data about collection efforts will improve transparency;
- We should reject the assertion that the FISA court is somehow either a rubberstamp or a packed court; and
- Finally, the most effective reforms are likely structural rather than legislative.
- Make the NSA Inspector General, a presidential appointment, with Senate confirmation;
- Require statutorily, the appointment of an NSA Civil Liberties & Privacy Officer;
- Change the jurisdiction of the Privacy and Civil Liberties Oversight Board to include all intelligence activities, not just those with a counter-terrorism focus;
- Create panels of cleared external reviewers for consultation by the DNI regarding new programs;
- Institutionalize privacy and civil liberties concerns by making it a factor in performance reviews; and
- Have the DNI annually report in a public forum on privacy and civil liberties matters.
[1] As Sir Isaac Newton said, if I see farther it is because I am “standing on the shoulders of giants.” Letter to Robert Hooke (15 February 1676).
[2] Steven G. Bradbury, “Understanding the NSA Programs: Bulk Acquisition of Telephone Metadata Under Section 215 and Foreign-Targeted Collection Under Section 702,” 1 Lawfare Res. Paper Series No. 3 (Sept. 2013), //lawfare.s3-us-west-2.amazonaws.com/staging/s3fs-public/uploads/2013/08/Bradbury-Vol-1-No-3.pdf.
[3] David S. Kris, “On the Bulk Collection of Tangible Things,” 1 Lawfare Res. Paper Series No. 4 (Sept. 2013), //lawfare.s3-us-west-2.amazonaws.com/staging/s3fs-public/uploads/2013/09/Lawfare-Research-Paper-Series-No.-4-2.pdf.
[4] An article by William Safire instigated a significant political controversy over an early data surveillance program, Total Information Awareness. See William Safire, ”You Are a Suspect,” The New York Times, Nov. 14, 2002, at A35. It led directly to the creation of a blue-ribbon panel, the Technology and Privacy Advisory Committee, and, eventually, to the cancellation of the Total Information Awareness program. The final report of the Technology and Privacy Advisory Committee is available at http://www.defense.gov/news/Jan2006/d20060208tapac.pdf (last visited Feb. 23, 2010).
[5] See, e.g., Scott Shane & Eric Lipton, “Passengers’ Actions Thwart a Plan to Down a Jet,” The New York Times, Dec. 27, 2009, at A1.
[6] In these next two sections, I self-plagarize liberally from Chs. 9 and 10 of my book. Paul Rosenzweig, Cyber Warfare: How Conflict in Cyberspace is Challenging America and Changing the World (Praeger Press 2013).
[7] Though the original statement may be apocryphal, many have quoted it since, including McNealy himself. See, e.g., Matt Hamblen, “McNealy Calls for Smart Cards,” Computer World, Oct 12, 2001, http://www.computerworld.com/s/article/64729/McNealy_calls_for_smart_cards_to_help_security.
[8] See, e.g., Kyllo v. United States, 533 U.S. 27 (2001) (the use of thermal imagining outside the home without a warrant is an illegal search when it is used, even indirectly, to reveal activity taking place within the home).
[9] I learned this from discussions with ChoicePoint’s CEO Derek Smith and other industry practitioners. See also Ralph M. Stair & George W. Reynolds, Fundamentals of Information Systems 362 (2003) (discussing Experian’s collection of public records from government databases).
[10] Stephanie Clifford, “Online Ads Follow Web Users, and Get Much More Personal,” The New York Times, July 30, 2009, at A1.
[11] Peter Baker & Carl Hulse, ”Obama Hears of Signs That Should Have Grounded Plot,” The New York Times, Dec. 30, 2009, at A1.
[12] I have begun trying to apply these principles to specific cases in Whither Privacy?, Society & Surveillance Vol. 10 (3/4): 340 (2012), http://library.queensu.ca/ojs/index.php/surveillance-and-society/article/view/whither/whither.
[13] I first wrote about the thoughts in this section in Paul Rosenzweig, Calibrated Openness, Harv. Int’l Rev. (Summer 2004).
[14] As an aside, proposals to significantly shorten the time frame for data retention are, in my judgment, unwise. If we have learned only one thing in the past decade it is that terrorist plots take a long time to mature and retrospective analysis may often look back as long as 8 or 10 years. More to the point, old-style retention limitations misunderstand the new privacy paradigm I think controls – we should focus on controlling use and misuse, not on artificially limiting our own capabilities.
[15] Statement of Stewart A. Baker before the Committee on the Judiciary, United States Senate, July 31, 2013, http://www.judiciary.senate.gov/pdf/7-31-13BakerTestimony.pdf.
[16] Charlie Savage, “Roberts’s Picks Reshaping Secret Surveillance Court,” New York Times (July 25, 2013), http://www.nytimes.com/2013/07/26/us/politics/robertss-picks-reshaping-secret-surveillance-court.html?_r=0
[17] NPR, FISA Court Appears To Be Rubber Stamp For Government Requests, http://www.npr.org/2013/06/13/191226106/fisa-court-appears-to-be-rubberstamp-for-government-requests
[18] Letter, Chief Judge Walton to Senator Leahy, (July 29, 2013), http://www.uscourts.gov/uscourts/courts/fisc/honorable-patrick-leahy.pdf
[19] I am not alone in making this point. My colleague Ben Wittes said something very similar to the Senate Select Committee on Intelligence last month. Statement of Benjamin Wittes before the Select Committee on Intelligence, United States Senate (Sept. 26, 2013), www.intelligence.senate.gov/130926/wittes.pdf.
Paul Rosenzweig is the founder of Red Branch Consulting PLLC, a homeland security consulting company and a Senior Advisor to The Chertoff Group. Mr. Rosenzweig formerly served as Deputy Assistant Secretary for Policy in the Department of Homeland Security. He is a Professorial Lecturer in Law at George Washington University, a Senior Fellow in the Tech, Law & Security program at American University, and a Board Member of the Journal of National Security Law and Policy.