The November NSA Trove III: More Details on the Bulk Telephony Metadata Program
Next in the November NSA Trove: the filling in of some additional detail, and in five different FISC-related documents, regarding the collection and handling, by the NSA, of telephony metadata on a mass scale.
In the first, a July 17, 2006 letter, the NSA advises that it is providing---pursuant to a prior order of the FISC---a report to Attorney-General Gonzales from the NSA Inspector General and General Counsel “assessing the adequacy of the management controls for the processing and dissemination o
Published by The Lawfare Institute
in Cooperation With
Next in the November NSA Trove: the filling in of some additional detail, and in five different FISC-related documents, regarding the collection and handling, by the NSA, of telephony metadata on a mass scale.
In the first, a July 17, 2006 letter, the NSA advises that it is providing---pursuant to a prior order of the FISC---a report to Attorney-General Gonzales from the NSA Inspector General and General Counsel “assessing the adequacy of the management controls for the processing and dissemination of U.S. person information” contained in bulk telephony metadata.
The brief report itself finds, in its entirety:
The management controls designed by the Agency to govern the processing, dissemination, security, and oversight of telephony metadata and U.S. person information obtained under the Order are adequate and in several aspects exceed the terms of the Order. However, due to the risk associated with the collection and processing of telephony metadata involving U.S. person information, three additional controls should be put in place, specifically, Agency management should (1) design procedures to provide a higher level of assurance that non-compliant data will not be collected and, if inadvertently collected, will be swiftly expunged and not made available for analysis; (2) separate the authority to approve metadata queries from the capability to conduct queries of metadata under the Order; and (3) conduct periodic reconciliation of approved telephone numbers to the logs of queried numbers to verify that only authorized queries have been made under the Order.Similar reporting followed, exactly one month later---only this time the filing was made by the executive branch with the FISC itself. On August 17, 2006, the NSA submitted this report to the court, detailing the methods by which NSA analysts queried telephony metadata between May 24 and August 2, 2006, as well as any reportable issues during that time period, as part of its application for renewal of authority to collect such records. The report first addresses the role of “data integrity analysts,” who access all collected metadata to “assur[e] the quality, accuracy and utility of the information received” before its use by intelligence analysts. These data integrity analysts discovered that while the NSA had guaranteed to the FISC that telephony metadata would not include a caller’s “name, address, or financial information,” approximately one in one hundred thousand records, or 0.001%, included a caller’s credit card number where one was used to make the call, while a smaller number of records included a proper name when one was used to place a collect call. While arguing in a footnote that credit card numbers on their own do not violate the prior FISC order because they do not reveal “anything about the financial situation, purchasing habits, payment record, or any other such private information,” the NSA acknowledged that “there exists a respectable argument that a credit card number is financial information” and so did not make use of this information. Instead, the NSA developed software to mask credit card digits and proper names when collected, and the report describes the complicated efforts by the NSA and the unnamed data provider to prevent future provision of the identifying information. The report goes on to describe the NSA’s procedures when applying the FISC’s previously disclosed “reasonable articulable suspicion” (“RAS”) standard for querying archived data, including a number of factors “militating in favor of using a particular phone number” for querying. These are:
- Contact between the phone number in question and that of a person reasonably believed to be a member or agent of an unnamed group,
- Other contact involving a person reasonably believed to be a member or agent of an unnamed group in which the telephone number in question is conveyed, and
- Open source information indicating a telephone number is used by a person who is reasonably believed to be a member of an unnamed group.
Sean A. Mirski practices a combination of foreign-relations, international, and appellate law at Arnold & Porter in Washington, DC. He is also a Visiting Scholar at the Hoover Institution. He clerked for Justice Samuel A. Alito, Jr., on the United States Supreme Court, and for then-Judge Brett M. Kavanaugh on the United States Court of Appeals for the D.C. Circuit. He also served as Special Counsel to the General Counsel of the U.S. Department of Defense. He is the author of We May Dominate the World: Ambition, Anxiety, and the Rise of the American Colossus, which Kirkus selected as one of the 100 Best Non-Fiction Books of 2023.
Matt Danzer is a graduate of Columbia Law School, where he was a member of the Columbia Law Review and served as president of the National Security Law Society. He also works as an editor for the Topic A public policy blogs on Roll Call. He graduated from Cornell University in 2012 with a B.S., with honors, in Industrial and Labor Relations.