September 22, 2016 | Posted in 4th Amendment, Al-Qaeda, Classified Information, Department of Defense, Director of National Intelligence, E.O. 12333, FISA, FISC, Intelligence, Leaks, NSA, President Obama, Russia, Snowden, Terrorism | By Tom Wither
In recent days, in the run-up to the release of an Oliver Stone helmed movie about him and his self-admitted theft of secrets from NSA and subsequent flight to China and then Russia, Edward Snowden has stated that he believes he deserves a presidential pardon for his crimes.
He bases this on a belief that, “If not for these disclosures, if not for these revelations, we would be worse off,” and goes on to say that a pardon would be appropriate, “…for the exceptions, for the things that may seem unlawful in letters on a page but when we look at them morally, when we look at them ethically, and when we look at the results, it seems obvious that these were necessary things,”. Both these quotes come from a CNN article that cites an interview in The Guardian.
Estimates reported by news outlets vary, but he allegedly stole approximately 1.5 million classified documents from NSA’s internal networks, far more material than anyone could have possibly needed to demonstrate alleged malfeasance and abuse by the government. According to NBC and Defense One, he did so by using computer passwords and credentials belonging to a civilian employee of NSA, a member of the military, and an NSA contractor to hide his criminal acts – in other words, he acted as a thief and con man to gain access to as much classified material as he could before he fled to China, and Russia – two great bastions of freedom and personal privacy.
Much has been made in various media outlets of the alleged impropriety, illegality, or unconstitutionality of NSA’s foreign intelligence efforts, both within the U.S. and abroad. However, after extensive public debate, the most controversial tools that concerned U.S. citizens remain in NSA’s toolbox, one of them, the ‘Section 215’ program, retooled by Congress and the Obama administration to ally the public’s concerns about potential overreach or misuse, but not halt it.
Moreover, NSA’s extensive efforts to preserve and protect the privacy rights of U.S. citizens is now documented the Director of National Intelligence’s ‘IC on the Record’ pages on Tubmlr. Thousands of now declassified documents that demonstrate how the government worked within the constitutional and complex legal framework set up to protect U.S. citizen privacy rights during the conduct of NSA’s SIGINT operations – controls that have been in place since at least 1980.
With regard to Mr. Snowden’s assertion that we “…look at the results…” of his actions to see that his pardon is warranted, we can do that. The report from the DoD Information Review Task Force-2 (IRTF-2) Initial assessment in December of 2013, titled ‘Impact Resulting from the Compromise of Classified material by a Former NSA Contractor’, said in its overall assessment that, “The IRTF-2 assesses with high confidence that the information compromise by a former NSA contractor….will have a GRAVE impact on U.S. national defense.”
In January 2015, Al-Qaeda created a YouTube video after the Snowden leaks teaching its operatives how to evade what the terrorists referred to somewhat erroneously as ‘FBI Secret Spying technology’. In May of 2015, the Henry Jackson Society, a conservative British think-tank published a 78-page report that drew heavily from the testimony from senior security sources outlining how terror groups had changed their communications methods and began more extensive use of encryption to hide terrorist operations from intelligence agencies. A July 2015 report in the New York Times also reported the Islamic State learning communications security from the Snowden leaks.
More recently, a Wall Street Journal article discussed how an Islamic State terrorist who led the November 13th terror attacks in Paris, evaded western intelligence agencies using better operational discipline and technical savvy in his communications. An awareness of which Mr. Snowden’s leaks undoubtedly raised, given the previous reporting.
The results of Mr. Snowden’s theft and leaks are pretty clear to my mind. Operating from a misguided sense of superiority and a flawed and incomplete understanding of the extensive U.S. person privacy protections in place within the intelligence community more broadly, and NSA in particular; he elected himself congressman, attorney general, and judge of a process and an oversight regime he initially tried to cheat his way into, and then barely had three months of experience in as a contractor (I’ll bet none of that is in the movie).
President Obama believes Snowden should stand trial, and so do I.
December 20, 2015 | Posted in Air Force, Author, Blog, Classified, Classified Information, Congress, Cyber attack, Department of Defense, E.O. 12333, FISA, Intelligence, Law Enforcement, Leaks, NSA, PPD-28, President Obama, Privacy, Snowden, U.S. Code Title 10, U.S. Code Title 50, Writing | By Tom Wither
I hope you’ve had a great summer and fall, and are enjoying the holiday season. I’d like to extend my thanks for being fans of my work, and wish you happy holidays and a bright new year.
I’ve been busy crafting my next novel, a project I’ve named ROGUE SENTINEL, and I will finish the manuscript shortly after the New Year. ROGUE SENTINEL will see Shane Mathews take on a solo mission to Jordan to find and capture an Islamic State mission planner known only as ‘Al-Amriki’ – The American.
Up next, I’ll be resuming work on SWIFT JUSTICE, the third and concluding novel of the ‘Aziz Trilogy’ that started with THE INHERITOR and AUTUMN FIRE, with main characters Shane Mathews and Emily Thompson.
During the year I’ve written a few Op-Eds on current issues that have been published in the Baltimore Sun and in The Hill’s Congress Blog. Here’s a list so you can look at them if you’re interested.
‘The NSA data collection program isn’t criminal; ending it is’ – http://www.baltimoresun.com/news/opinion/oped/bs-ed-nsa-data-20151203-story.html
‘Open Letter from a cyber terrorist’ – http://thehill.com/blogs/congress-blog/homeland-security/255370-open-letter-from-a-cyber-terrorist
‘Stand with our watchers’ – http://thehill.com/blogs/congress-blog/homeland-security/261237-stand-with-our-watchers
‘Access to encrypted communication, a balancing act’ – http://www.baltimoresun.com/news/opinion/oped/bs-ed-encryption-data-20151001-story.html
‘Clinton E-mails: Who else was involved?’ – http://www.baltimoresun.com/news/opinion/oped/bs-ed-clinton-emails-20150908-story.html
‘The country is vulnerable without CISPA’ – http://www.baltimoresun.com/news/opinion/oped/bs-ed-cispa-redux-20150209-story.html
Thanks again for being fans of my stories, and feel free make them presents for the fiction reader on your holiday list – they can be purchased from Amazon or Barnes & Nobel as e-books or hardcopies in trade paperback. You can even contact me via firstname.lastname@example.org for a signed copy if you like.
Take care and Happy Holidays!
As the new Congress comes into session in January, it will have many issues to address. One of the most important will be changes and improvements to the Foreign Intelligence Surveillance Act, commonly known as FISA. Some of its Patriot Act created provisions, like the better known Section 215 used to collect bulk phone records, and the less well known Section 702 authority compelling telecommunication providers to provide the government non-U.S. person communications have been hotly debated in Congressional committee hearings and by the general public during 2014.
The Senate recently failed to advance ‘USA Freedom Act’ to change FISA, ensuring that the debate will be rekindled in the next Congress early in 2015. Hopefully, the next version of the bill will address some of the concerns that Judge John Bates (a federal district judge who has served on the FISA Court) described – laid out about the concerns the FISA Court might have, and challenges it might face in its processes, if that version of the USA Freedom Act had become law.
Congress will work its will in passing a final set of changes to FISA from these bills, enhancing existing privacy protections in light of the rapid advances in modern communications and the public outcry over government access and storage of telephone and internet activity by ordinary citizens.
Once signed into law, I am certain the professionals within NSA, both military and civilian, will comply with the changes to the FISA statute, whatever their final form. That compliance is not only an integral part of their oaths to the Constitution, it is also completely consistent with the professional attitudes of the many men and women at NSA I have worked with over the years.
However, in light of this long debate, three ‘lessons learned’ are abundantly clear in this era of rapidly evolving modern telecommunications and the ‘internet of things’:
The public needs a better understanding of exactly what information they surrender when they use communications technology. This is a difficult goal to attain given the technological complexity of modern personal communications devices and the limited time or desire someone may have to delve into the privacy related issues attendant to the device or service they use. Do you know what personal information the operating system on your mobile device stores when you use an application? During the INFOSEC 2014 conference in Orlando earlier this year, an iPhone demonstration proved that while the app you use may keep your personal information secure, the phone’s underlying operating system may be storing much of it in a very unsecure manner.
Next, Congress and local legislatures need to play a more active role in the oversight of law enforcement and intelligence activities where they involve modern telecommunications technology. Law enforcement and intelligence organizations operate within the laws they are given, and the law must keep pace with advances in technology. As such, laws like FISA must continue to have yearly ‘sunset’ clauses built into them to force legislatures to engage regularly and keep pace with the leaps forward in technology. Police and intelligence services will leverage new technologies to conduct their missions, and they need laws adopted at a quicker pace, not just to constrain their actions within our Constitutional principles, but also properly enable them to bring criminals to trial or monitor agents and actions of a foreign adversary.
Lastly, a level of increased transparency is required. The days of ‘No Such Agency’, borne from the Cold War era, are long over, and a new balance needs to be struck. I believe law enforcement and intelligence organs must have and foster public trust, but intelligence organs cannot operate effectively if operational means and methods are exposed to the whole of the American public, and therefore, our adversaries. Adversaries would exploit such knowledge to kill our citizens, damage or destroy our critical national infrastructure, or win in battles with our military. We have begun to see the first steps towards increased transparency with the release of unclassified versions of FISA Court opinions and reports of aggregate counts of FISA warrants and NSLs. Among other things, greater transparency can be achieved by: providing unclassified titles for the closed door briefings to intelligence oversight committees; including in the aggregate counts of FISA warrants actively in use by each government agency; and releasing unclassified versions of all damage assessments produced as a result of unauthorized leaks of classified information. The government cannot claim damage due to leaks, without backing the claim in a credible manner in a public forum – something I believe can be done without exposing sources and methods or risking lives.
U.S. intelligence and law enforcement agencies exist and operate from the bedrock of public confidence. More transparency, consistent with protecting sources, methods, operational intelligence, and our troops in the field, is achievable, and since the Snowden leaks and the misinformation that has stemmed from them, something I believe is now mandatory.
Tom Wither is the author of the military/intelligence thrillers: “The Inheritor” (Turner Publishing, June 2014) and “Autumn Fire” (Turner Publishing, September 2014). He is also a 25 year veteran of the intelligence community. The views and opinions expressed are his own and are not those of any organization or element of the intelligence community or Department of Defense. His email is Tom@TomWither.com.
July 27, 2014 | Posted in 4th Amendment, Department of Defense, Director of National Intelligence, E.O. 12333, FISA, FISC, Intelligence, Leaks, NSA, PPD-28, Privacy, Snowden, U.S. Code Title 50 | By Tom Wither
Over the last year, some media outlets have used the leaked classified material from Edward Snowden to write news stories that imply NSA has either: allegedly violated the privacy rights of ‘every American’ or exceeded its authorities. In every one of these stories, what is usually missing is a SIGINT professional’s level of understanding on the part of the journalist, admittedly difficult to gain when SIGINT operational training is classified.
Signals intelligence, referred to as SIGINT, is both technically complex due to the nature of modern communications technologies, and legally complex, due to the heavy legal and Constitutional burdens placed on the professionals at NSA who conduct it.
These professionals spend months and oftentimes years during a career training in the operational, technical, and legal aspects of conducting SIGINT – which includes training in the protection of U.S. person privacy.
For example, a recent Washington Post article on July 11th, ‘How 160,000 intercepted communications led to our latest NSA story’; written to amplify its July 5th story ‘Non-targets far outnumber targets in NSA data collection’, states that the rules for ‘minimization’ of U.S. person information are ‘opaque’ – in fact, they are not opaque at all.
The minimization rules come in two forms, both of which are written in black and white for anyone to read, now that they have been declassified. They are contained in the Foreign Intelligence Surveillance Court’s minimization instructions as part of its numerous court rulings, and United States Signals Intelligence Directive 18 (USSID 18). USSIDs provide implementation guidance and direction to NSA’s civilian and military workforce, ensuring our Constitutional principles, current laws, Executive Orders, and binding court orders are implemented and enforced within the entire United States SIGINT System. For the purposes of this blog post, we’ll focus on USSID 18.
USSID 18 is titled, “Legal Compliance and U.S. Persons Minimization Procedures”, and is fifty-two pages long. Naturally, portions of many paragraphs are blanked out as part of the declassification process, but the direction in, and intent of USSID 18 are very clear, and I can tell you from my experience in the intelligence community that it is binding and followed by all SIGINT professionals.
Discussing all the limits USSID 18 places on SIGINT operations would take several blog posts worth of space, but we can look at one instance where USSID 18 applies in the Washington Post’s July 5th story.
The Post’s story states that, in the sample of surveillance files it reviewed, ‘NSA analysts masked, or “minimized,” more than 65,000 [references to U.S. citizens or residents], but the Post found nearly 900 additional e-mail addresses, unmasked in the files, that could be strongly linked to U.S. citizens or U.S. residents.’ This line is clearly meant to bolster the implication that U.S. person identities or identifiers incidentally collected under the legally authorized, and court monitored FISA Amendments Act (the Patriot Act) Section 702 program are not properly minimized.
If this element of the Post’s story is accurate, that translates to a 98.7% accuracy rate (based on (900 / 65,900) x 100) of minimization, as required under USSID 18 – an operational standard that many U.S. corporations would envy. The Post didn’t word it that way, but it is example of how the professionals at NSA take protection of U.S. person privacy seriously, rather than supporting the Post’s implication that NSA treats U.S. person data in a cavalier manner.
The Post’s explanatory piece on the 11th also expresses its concern about the volume and nature of incidental collection, the Director of National Intelligence’s assertion that it is unable to estimate how many Americans are affected, and that no outside watchdog – the Congress, courts, or the President’s Privacy and Civil Liberties Oversight Board have access to the content to judge for themselves.
The reason for this is obvious to a professional. Although the Post could traipse at will through its purported pile of 160,000 intercepts (reviewing U.S. citizen’s private information under the comforting blanket of the 1st Amendment) – the government cannot legally look through incidental collection to identify and characterize it because laws, and both executive and court orders forbid it. Laws and orders every American citizen, including those working at NSA, must obey.
At this stage of the debate, I had hoped to see stories covering how NSA adheres to law and policy to conduct their assigned foreign intelligence mission, using background interviews with NSA’s professionals and managers in a more transparent environment. Instead, we continue to see stories from some members of the media filled with a selected set of ‘facts’ provided by a man charged with theft and violations of the espionage act, filtered through well-intended, but only partially educated journalist guesswork, resulting in implications or insinuations of impropriety or illegality. There is more to the story than just what Mr. Snowden, or the journalists who support him, would have you believe.
When you get a chance, please read my Op-Ed in the Baltimore Sun.
Please feel free to contact me with your comments using the e-mail address in the tag line at the end of the piece. We live in a free society and I respect any point of view that you may have, so long as you express it in a civil manner.
Thanks to all who have already sent me comments. I’ve enjoyed reading them, and I am doing my best to respond to all of them individually. Also, I’d like to thank Tricia Bishop and the other members of the Sun’s Editorial Board who thought my Op-Ed was worth publishing.
January 26, 2014 | Posted in Classified Information, Department of Defense, Director of National Intelligence, E.O. 12333, FISA, FISC, Intelligence, NSA, President Obama, Snowden, Terrorism, U.S. Code Title 18 | By Tom Wither
The editorial boards of the New York Times and Washington Post, a handful of members of Congress and others in the general public will undoubtedly continue to advocate for the extension of clemency for Mr. Snowden. The reasons why he will not be receiving clemency are pretty clear to me.
Let’s review what he’s charged with (you can read the criminal complaint filed with the court yourself). Bear in mind that this is likely only the initial set of charges. They could be amended once he’s in custody and a fuller understanding of his actions and activities is known (charges of misuse of government computer and telecommunications systems, etc.).
Snowden is charged with:
- Theft of Government Property – 18 U.S.C. Section 641
- Unauthorized Communication of National Defense Information – 18 U.S.C. 793(d)
- Willful Communication of Classified Communications Intelligence Information to an Unauthorized Person – 18 U.S.C. 798(a) (3)
HOW MANY COUNTS & THE PENALTY IF CONVICTED
One of the things missing so far is the number of counts for each of these charges. Something the government may amend the compliant to include once Mr. Snowden is in custody or been arraigned. Statements by various NSA officials to the media have provided the following numbers to consider: 1.7 million documents stolen. 200,000 of those leaked to journalists so far. In briefly perusing the 2013 Federal Sentencing guidelines, for just one conviction of violating 18 U.S.C 793(d) or 18 U.S.C. 798(a)(3), the minimum sentence is between seven and nine years.
Even if we assume the best case, and the government treats the entire theft of 1.7 million documents as one theft, and the communication of the information to Mr. Greenwald and Ms. Poitras are treated as two counts of unauthorized communication of National Defense Information, and two counts of Willful Communication of Classified Communications Intelligence Information; Mr. Snowden is looking at between 35 and 45 years in prison, aside from whatever fines the court may impose.
Worst case, the government chooses to make a point with Mr. Snowden’s case, and they charge him with just 10 counts each (out of a possible 1.7 million thefts and 200,000 unauthorized and willful communications). Do the math for 10 counts on each charge and that’s 210 to 270 years in prison.
THE GOVERNMENT’S POSITION
Any hope that some in Congress, the public, and the media may have that Mr. Snowden will be given clemency should be tempered by the following statements:
President Obama – “…I will say that our nation’s defense depends in part on the fidelity of those entrusted with our nation’s secrets. If any individual who objects to government policy can take it into their own hands to publicly disclose classified information, then we will not be able to keep our people safe, or conduct foreign policy. Moreover, the sensational way in which these disclosures have come out has often shed more heat than light, while revealing methods to our adversaries that could impact our operations in ways that we may not fully understand for years to come.”
Attorney General Holder – “We’ve always indicated that the notion of clemency isn’t something that we were willing to consider. Instead, were he coming back to the U.S. to enter a plea, we would engage with his lawyers. ”
A CRIMINAL NOT A WHISTLEBLOWER
What Mr. Snowden continues to fail to understand is something the President pointed out in his speech, and that FBI Director Comey pointed to in his remark quoted above.
“What I did not do is stop these programs wholesale — not only because I felt that they made us more secure, but also because nothing in that initial review, and nothing that I have learned since, indicated that our intelligence community has sought to violate the law or is cavalier about the civil liberties of their fellow citizens.” – President Obama
You can’t ‘blow the whistle’ on a program that is implemented under a law Congress passed, the President signed, and that the Courts oversaw in concert with Congress. Should Congressional Oversight have been tighter? From what I’ve seen in the open hearings, there is a reasonable argument to made there. Should legislators and the Courts keep better pace in all areas of law regarding the rapid advances in telecommunications technology and related privacy issues? There is a case for that too.
Did those changes need to be fomented by a series of media sensationalized, unauthorized leaks of classified material describing lawful activities by the intelligence community where no evidence of willful abuse had occurred? Leaks that damaged diplomatic relations with our allies and other friendly nations? Leaks that have, according to members of the intelligence committees, caused terrorists to change their communications methods and potentially exposed military operations, increasing the risk to our military service members at home and abroad? Leaks that will in all likelihood continue because ‘journalists’ like Mr. Greenwald and Ms. Poitras care more about selling stories than they do about the safety and security of American, allied, and friendly nation’s citizens throughout the world? No, it did not.
Mr. Snowden could (and should) have gone to the NSA Inspector General, or the Director of National Intelligence’s Inspector General, or the Department of Defense’s Complaint Hotline for classified complaints. He also could have made a complaint to the FBI or Attorney General’s Office, or his company’s security office or leadership. If all of those failed, he could have gone to Congress himself with his concerns. Oversight committees LOVE to investigate potentially unlawful acts by the executive branch, and moreover, it’s their job to do so.
Instead, Snowden chose to steal 1.7 million classified documents and shared at least 200,000 of them (so far) with two members of the media, then made sure everyone knew he did it as soon as possible, so he could rise from obscurity, and show everyone that he really did know better than the collective wisdom of the members of Congress, the 15 judges on the FISA Court, and the administrations of two Presidents. Moreover, real whistle blowers have the courage to stand up and be counted, even if they must stand in a courtroom to do it. They don’t run away to a foreign nation to avoid the consequences of their actions, afraid of punishment for their criminal activities before the charges are even filed.
This is a very informative and interesting session that occurred at Penn Law last November. Not only is Mr. Inglis, the recently retired Deputy Director of NSA, giving a keynote address that provides an excellent insight into the technological environment NSA operates in, and the constraints it operates under; the Q&A session provides pretty direct answers to some of the questions many Americans may have since the Snowden Leaks. I think it’s worth your time.
You Tube – Chris Inglis Keynote and Q&A at Penn Law
President Obama is currently enjoying the sun, sand, water, and golfing to be found on his annual Hawaiian vacation. I begrudge no President his time off. The duties and responsibilities of the office are such that regular time off is a must.
Once he comes back from his vacation, he’ll be getting ready to act on the recommendations of the Presidential Review Group on Intelligence Capabilities and Technologies. Mr. Michael Moore recently posted an Op-Ed in the Washington Post correcting the record on the Group’s recommendations as they were reported in many newspapers and websites.
Briefly, I think that when the President gives his speech later this month, he will announce, consistent with the current provisions of Executive Order 12333, DoD Regulation 5240.1-R, and USSID 18 that already provide U.S. person privacy protections:
- Changes to the process the National Security Council uses to establish, vet, and levy intelligence tasking on NSA.
- Creation of the position of Special Assistant to the President for Privacy, and improvements/changes to the charter and purview of the Privacy & Civil Liberties Oversight Board
- The FISA 215 (Phone Records Collection Program) & FISA 702 programs will continue
- NSA will continue to hold the FISA 215 & 702 records, but do so only for two to three years vice five (the phone companies want to charge $50 million a year – EACH to hold the FISA 215 records)
- Additional transparency will be introduced by means of providing Congress additional details in a classified setting, and providing more general information to the public in unclassified form (e.g. counts of currently operative FISA warrants in use by NSA, number of FISA 215 phone numbers turned over to the FBI, etc.)
- Request enabling legislation from Congress to:
- Add a ‘Civil Liberties Counsel’ to participate in the proceedings of the FISA Court
- Immediate improvements to the security clearance vetting processes, changing the ‘need-to-share’ culture post 9/11 back to a ‘need-to-know’ culture (call it work related if you like, that’s what it will be)
- Direct immediate improvements to computer network security throughout the Intelligence Community to reduce and eliminate the potential for more Snowden-like actions
It will be two or three weeks, but I look forward to seeing how closely the President comes to meeting my predictions.
December 15, 2013 | Posted in 4th Amendment, Director of National Intelligence, E.O. 12333, FBI, FISA, FISC, Intelligence, Law Enforcement, NSA, Privacy, U.S. Code Title 10, U.S. Code Title 50 | By Tom Wither
Absolutely not. A nation where every move of every American citizen is recorded, cataloged and data based by the government runs counter to the privacy rights each citizen of the United States expects, and would be an abhorrent infringement upon one of the principle freedoms of our democracy. Protecting those rights is something I swore to do as a member of the intelligence community, and was required to do as a civil servant and uniformed member of the armed forces.
In light of the ‘Snowden revelations’ and the plethora of news stories (few of those stories entirely accurate and not jaundiced by sensationalism), many Americans are concerned about invasions of their privacy by the government. I share those concerns, but mine are tempered by the testimony offered before the House and Senate Intelligence and Judiciary committees, the declassified documents posted on the IConTheRecord tumbler site, and my own professional experiences within the intelligence community.
Much like the majority of the 100,000+ members of the intelligence community, I have a lifetime obligation to protect the classified material I’ve been exposed to. I understand the valid reasons for that secrecy, and I respect them. I was also made fully aware early in my career of the myriad of mechanisms in place to report perceived illegal or improper acts, from IG reporting through classified channels to include arranging closed door testimony before the relevant Congressional committees if needed. For the record, in my more than twenty-five years in the intelligence community, I never encountered any instance of willful or intentional misuse of the tools, capabilities, or authorities any of my colleagues or I operated under, had access to, or could utilize. Certainly honest errors were made, as they would be in any human endeavor, and those errors were reported through the proper mechanisms, and corrected.
At this point, let me point out some of the facts now available for every citizen to evaluate when deciding for themselves if the government is violating your privacy rights, and temper that with a few other thoughts. Using just the FISA 215 program as an example, all of what follows is either from declassified documentation/information released by the ODNI, or provided as testimony on public session in front of the intelligence or judiciary committees by the senior leaders of the intelligence community. See the ODNI’s IC on the Record website for the details on the FISA 702 program.
The FISA 215 Program
- Gathers and centralizes at NSA, telephone call records from various U.S. telecommunications companies
- The telephone companies are compelled to provide the information to the government by a FISA Court order
- The FISA Court approves the orders based on the law and precedent (e.g. Smith v. Maryland, the FISA Law Congress passed twice, etc.) subsequent to receiving an application for the order by the government (usually the FBI, after coordination with the NSA, ODNI, and the National Security branch of the DoJ)
- The FISA Court requires the government to store, access, and utilize the call records obtained under the order in a specific manner outlined by the Court, and report all deviations from those orders
- The only records provided to the government by the telephone companies are:
Date & Time of the Call
Duration of the Call
- For example: Phone number 203-555-1212 called phone number 203-555-1414 at 0900 on the 10 Oct 2012 and the call lasted 10 minutes
- No names, no addresses, or other identifying information is provided by the telephone companies under the FISA Court’s order
- The content of conversations are not collected under this program – other warrants are required to collect content, and NSA says it currently has only 60 active warrants for content collection against U.S. persons
- Searches of the call records under this authority can only be conducted with a ‘seed phone number’ that can be reasonably and articulately described, in writing, as being terrorism related
- The written articulation must be signed off on by an NSA manager (an intelligence professional, not a political appointee) before a query is run against the records in the database
- ALL queries of the database are recorded, tracked, and audited to ensure the FISA Court’s instructions are not violated
- The returned call records meeting the intelligence need (i.e. not all of the returned records) are turned over to the FBI for any follow-up action
- If the government wishes to wiretap any number based on the call records NSA provides, it must apply to the appropriate court for a warrant
Laws, Executive Orders, and Congressional Oversight
The United States intelligence community operates under several enabling laws, Executive Orders from the President, and Congressional Oversight. These laws, orders, and oversight apply to every intelligence program conducted by the United States government. Some of the most notable of these are, USC Title 10, USC Title 50, Executive Order 12333, the Foreign Intelligence Surveillance Act of 1978 (as amended), and the oversight of the Senate Permanent Select Committee on Intelligence, the House Permanent Select Committee on Intelligence, and the Senate and House Committees on the Judiciary. Within the SIGINT system specifically, the primary instruction for the protection of U.S. citizen’s 4th Amendment rights is outlined in USSID 18.
The recently declassified United States SIGINT Intelligence Directive (USSID) 18, Legal Compliance and U.S. Persons Minimization Procedures, dated 25 January 2011, describes the U.S. person privacy protections all elements of the NSA are obligated and required to follow. Paragraphs 1.1 – 1.4 show that U.S. person privacy protections required by the 4th Amendment were in place long before Mr. Snowden’s massive leaks of classified material made the subject of U.S. person privacy a daily staple of newspaper front pages and legitimate public concern. USSID 18 has been in existence since at least 1993. In addition, the ODNI has made the training materials used by NSA to teach their analysts what is allowed and what is not allowed when dealing with FISA 215 data available for you to see.
Corporate America is ‘Spying’ on You All the Time – And you let them
Every time you make a purchase at a store, they know what you buy, and how often. That frequent shoppers card you use at the checkout ties you to every item on your shopping list – vegetables, meats, shampoos, bakery products, gluten free items, condoms, feminine hygiene items, etc. How many, which brands, how often, and which charge card you used. Think about the ‘pattern of life’ information that offers the company that owns that store about you and your family. You even surrendered it willingly. Companies use the information to target advertising, sending you e-mails and paper circulars featuring the products you buy most often using a process called data mining. You may not mind that, but what else are they using it for? Reporting to the FDA about how much red meat a family consumes in a year? How far you travel to get to the store? How many times a week you go? At what times of day? If you have children and how old they are? Are you under a doctor’s care or do you have an annoying hemorrhoid problem? The list is practically endless.
Your credit card company shares your purchasing habits with marketing companies. They may offer you the option to opt out, but I recently received a notice from one of my credit card companies telling me that they shared my personal information and purchase history with eight other companies, only offering me the opportunity to ‘opt out’ of the sharing with two of those companies.
How many video or still cameras did you appear on today as you went about your ‘private’ business? Did you even notice them? Did you notice the ones in every store you walk into, each ATM you passed, and the cell phone everyone you passed on the street was carrying? How many of those cell phone captured videos or still images were forwarded to a friend, lover, relative, or business colleague by the shutterbug/videographer? Do you know that there is a copy of that video or image on the telecommunication’s company’s servers or systems? Do you know how long it stays there or what is done with it? Are they kept for hours or years? By whom? How and where are they stored? Are they ever deleted? How can you be sure?
Oh, and those private phone calls you make, or e-mails you send? The telecommunications companies can mine those records as needed to improve their infrastructure, determine what services to market, or even re-direct your communications through the network. In doing so, do to the technical sophistication of today’s communications networks, the e-mail from your wife or husband in Cleveland, OH, just may have been routed through Vladivostok, Russia, where a copy was left on a server in Russia. Are the Russian security services scanning that e-mail for information it might find of interest? Do you honestly think they care about your privacy as a U.S. citizen? Maybe they think that picture of your significant other in her new Victoria’s Secret undies is pretty hot and keep a few copies.
Internal to these companies, what are the company’s restrictions or policies on which employees can access, review or share that information? Do those employees go through any kind of background check before they are hired? What kind of oversight is there on the use or access to the data?
Just Who Might be Invading Your Privacy – The U.S. Government, a Corporation, or a Foreign Government?
Should we be reasonably concerned about U.S. Government overreach and invasion of privacy? Yes. It’s our government and we should keep an eye on it. But I’m less concerned about the U.S. intelligence community’s activities than I am about a telecommunications provider (especially a foreign one) or foreign government’s respect for ‘privacy’ as we perceive it.
In the U.S., the intelligence community’s motivations, codified in both law and executive order, and overseen by Congress and the Courts, is at least grounded in a desire to preserve, protect, and defend the Constitution and the nation. The professionals in that community undergo deep background checks, polygraph examinations, and in many cases, submit to financial disclosure requirements and psychiatric examinations before being exposed to intelligence operations or activities that may impact a U.S. person’s privacy in the modern digital age. Moreover, they seem, based on the information released by the ODNI, to be rigorously trained to protect the 4th Amendment rights of U.S. persons, and there is at least one directive in place at NSA that requires that U.S. person privacy is protected.
Corporations (U.S. or foreign) are motivated by a desire to make a profit for their shareholders, and they never have to go to a judge for a warrant to see data that might invade someone’s privacy. They also don’t have Congress and the Courts looking over their shoulder to be sure they aren’t using ‘private’ data to profile a person’s life, purchasing habits, or travel.
Foreign governments may not care at all about your privacy. France just passed a surveillance law that, according to the story in the NYT, “…defines the conditions under which intelligence agencies may gain access to or record telephone conversations, emails, Internet activity, personal location data and other electronic communications. The law provides for no judicial oversight and allows electronic surveillance for a broad range of purposes, including “national security,” the protection of France’s “scientific and economic potential” and prevention of “terrorism” or “criminality.””
Mr. Inglis, Deputy Director of NSA, made a statement during a Q&A session at Penn Law’s Center for Ethics and the Rule of Law Conference that I think is very relevant. He based it on the number of NSA employees and affiliates who have died since 9/11 and the twelve internally reported ‘willful abuses’ during the conduct of its SIGINT operations – “… it’s three times more likely that you’ll die for your country if you work for NSA than you are to abuse the [U.S. SIGINT] system.”
For myself, while I accept that there is always room to improve a process, law, and oversight; I put more trust in the professionals in the U.S. intelligence community, the laws and policies that govern their activities, the internal controls, and the oversight mechanisms in place in the courts and congress when it comes to protecting my 4th Amendment rights.
Over the last week, Mr. James Clapper (US Air Force, Lieutenant General, Retired) Director of National Intelligence, General Alexander, Director of NSA and Commander of US Cyber Command, Mr. Chris Inglis, Deputy Director of the NSA, and Mr. James Cole, Deputy Attorney General, DOJ testified before the House Permanent Select Committee on Intelligence, as more news stories about NSA, GCHQ, and foreign partner intelligence operations were reported by the media, and Mr. Snowden asked for clemency and the opportunity to testify before Congress.
First of all, I urge you to watch the past week’s testimony on C-Span’s website. In my opinion, it’s informative and straightforward, and far better than any of the news reporting I saw about it.
On Sunday, the White House, and the chairs of the Senate Select Committee on Intelligence, and the HPSCI all agreed that there would be no clemency for Mr. Snowden. I will point out that Mr. Snowden’s request does seem to indicate that he is guilty of the crimes he is charged with, since you wouldn’t ask for clemency to avoid or mitigate a criminal penalty unless you felt you would be found guilty.
Let’s talk about privacy for a minute. Privacy is a right that every U.S. citizen expects, as do most people in modern nations with educated populaces operating in a modern telecommunications environment. The testimony last Tuesday re-affirmed that the mission of the NSA is the production of foreign intelligence from SIGINT, which does not include the invasion of U.S. citizen’s privacy without a court order or warrant. It also highlighted that NSA’s mission (like all the other U.S. intelligence agencies) is driven by foreign intelligence requirements issued from the White House and the President’s national security staff in the form of the National Intelligence Priorities Framework (NIPF). Further, that the NSA’s mission is conducted in accordance with US law, and where U.S citizen’s privacy rights are concerned, with the added protections of oversight by the Office of the Director of National Intelligence, the Department of Justice, and the FISA Court.
In case you think I don’t know what I’m talking about, you can find out for yourself. Do a little research of your own into the legal authorities for the missions of the intelligence community. Read Executive Order 12333, and USC Title 50, Chapters 36 (FISA), 45 (Intelligence Community Authorities), 46 (CIA), 47 (NSA), and the Intelligence Community Directives (ICD) available on the Director of National Intelligence’s website. All of these require adherence to the U.S. Constitution’s Fourth Amendment protections against unreasonable search and seizure.
As for the on-going concerns expressed in the media of gross intentional violations of U.S. citizen’s privacy, I believe they are unfounded, based on the NSA’s now declassified internal reporting and the declassified legal opinions now available on the FISA Court and ICONTHERECORD web sites. For those that harbor concerns about the telephone metadata collection, read the posted court opinions and other material yourself. As you do so, remember two things: the call records were provided to NSA under a series of court orders applied for by the DOJ, under a law repeatedly approved by Congress. We also know now that those orders cited long standing Supreme Court precedent and placed specific controls on how the call data can be accessed and used. Those controls were developed and directed by the FISA Court, across multiple judges’ tenures, based on the knowledge of the professionals at NSA and the experience of honest error that occurs in any process humans engage in.
General Alexander also made some remarks in Baltimore last week where he took the media to task for continuing to write articles from the classified material Mr. Snowden took, and for writing stories that were inaccurate and/or mischaracterized what they were reading in the material. Personally, I wouldn’t want a journalist, not trained as a medical professional, looking at a set of power point slides or other internal hospital documents and then drawing a conclusion that every heart surgeon in that hospital was using improper technique and placing patient’s lives at risk – they just aren’t qualified to understand what they are looking at. Intelligence activities operate (in the U.S.) under the U.S. Constitution, U.S. law, and all the policies and procedures each agency derives from them. It is a complex professional environment that took me years during my career to truly master, and I assure you Mr. Snowden’s understanding of them, based on his statements and his alleged criminal acts, is sadly lacking.
I place much more weight on the statements of people like General Alexander, Mr. Inglis, and Mr. Cole; as well as people like Representative Rogers, Senator Feinstein, and many others on the relevant committees, particularly when they all resoundingly castigate Mr. Snowden for his apparent crimes, and demonstrate understanding and predominate agreement with these senior members of the intelligence community. Mr. Cole alone effectively recused himself, as the Snowden matter is an on-going investigation/item of litigation and he cannot comment under the requirements of professional ethics. As with any human endeavor, I’m sure there may be improvements to be made in the conduct of all intelligence operations, but those changes need to come from more Senators and Congressmen and women doing their ‘homework’ as Mr. Rogers put it during the hearing this week, not from a public debate on sources and methods that gives our nation’s adversaries the means to avoid U.S. intelligence scrutiny and places U.S. citizens, military members, diplomats, and our allies’ citizens in danger at home and abroad.
Moreover, I think you should keep something else in mind. According to the official statements, there are more than 100,000 men and women in the intelligence community of the United States, and more than 30,000 men and women working for NSA. Only one lone man, a systems administrator with no intelligence training to speak of, with an apparent surfeit of ego and naïveté, decided to steal and leak tens of thousands of classified documents to the media because he alone felt that illegal acts were being committed. I find it difficult to believe, based on my own extensive experience working with the dedicated, trained professionals at NSA and the rest of the intelligence community that ANY of those people would be shy about speaking up if anything they were asked to do was outside the law or their assigned intelligence mission.
I am also sure they would use the proper channels to reach out to the NSA Inspector General, the National Security Division of the Department of Justice, and the relevant committees in Congress where their concerns would have been given fair hearing and extreme scrutiny, rather than risk the lives of American citizens, military members, and innocent people abroad by exposing classified sources and methods information.
As Congress debates changes to the FISA law, the need for increased transparency to assure an understandably concerned public, and some its members reexamine the vigor with which they make themselves aware of the on-going intelligence operations of the U.S. government, I have no doubt that whatever direction the President issues or oversight requirements or changes in law Congress puts in place will be obeyed faithfully by the intelligence community – just as they have over the years since 9/11.
Finally, I’m sure that certain elements of the press will continue to publish articles from the classified material Mr. Snowden provided them, just as I’m sure our Russian friends are doing their level best to learn everything they can from Mr. Snowden about his brief time in the U.S. intelligence community. Remember, he can only stay in Russia for a year, and the extension of his stay is a very big carrot (and stick) to encourage him to talk. Otherwise, he might find himself on the next plane out of Russia – to a courtroom in the United States in the company of some U.S. Marshals.