by Nathan Sales
Vol. 101 No. 1 (2017) | Citizen-centered Courts | Download PDF Version of ArticleIn the wake of a catastrophic terrorist attack like 9/11, what balance should the government strike between its weighty national-security responsibilities and its equally solemn duty to preserve Americansâ privacy and civil liberties? The question may sound theoretical but it has enormous practical importance. If authorities err on the side of assertiveness, they risk doing violence to our countryâs most basic values. But if they err on the side of restraint, they risk missing signs of the next plot.
Laura Donohue, a professor at Georgetown University Law Center and one of the countryâs leading voices in the field of national-security law, is well positioned to tackle the problem. Her important new book, The Future of Foreign Intelligence, argues that the governmentâs post-9/11 surveillance programs, begun by the George W. Bush administration and largely continued by President Barack Obama, represent the first kind of error. Faced with an unprecedented threat, she says, authorities responded with equally unprecedented â and unjustified â countermeasures. Agree or not, Donohueâs book is a must-read for lawmakers, judges, and citizens who want to understand the difficult policy choices and legal judgments made as the nation confronts the terrorist threat in the digital age.
Donohue begins by describing STELLARWIND, a suite of NSA surveillance programs launched shortly after 9/11. STELLARWIND involved whatâs known as âbulkâ or âprogrammaticâ collection.1Â In addition to targeting individual suspects, as in criminal investigations, the NSA swept up huge troves of data in an effort to identify previously unknown terrorists. In particular, Fort Meade intercepted both metadata and content from phone calls and internet communications. âMetadataâ is âinformation that describes who is communicatingâ â the phone number one dials, the address from which an email is sent, and so on â whereas âcontentâ is the actual substance of the communication.2Â Metadata is the envelope, the letter is content.3
At its inception, STELLARWIND wasnât authorized by statute, nor did officials get permission from the Foreign Intelligence Surveillance Court (FISC). Instead, the government grounded the programs on the Presidentâs constitutional powers as commander in chief. The administration eventually had second thoughts about this muscular view of presidential power, however, and STELLARWIND was placed on more stable statutory foundations. In 2004, the government transferred the internet metadata program to the part of the Foreign Intelligence Surveillance Act (FISA) that authorizes the FISC to approve pen registers and trap-and-trace devices (which record phone numbers dialed and received); it was discontinued in late 2011. Telephony metadata was shifted in 2006 to FISAâs business-records authority â known as âsection 215,â which is the part of the USA PATRIOT Act that enacted it in its current form. Congress effectively abolished the program in the USA Freedom Act of 2015. Authority to collect internet and telephony content was transferred to section 702 of the 2008 FISA Amendments Act (FAA), in which Congress approved the programs with certain limits.
At its high-water mark, Donohue argues, STELLARWIND represented an enormous and unwarranted intrusion into the private lives of ordinary Americans who had no involvement in terrorism whatsoever. According to Donohue, âthousands of citizensâ telephone numbers and e-mail addresses were targeted for content collectionâ4Â in a dragnet that âswe[pt] in millions of Americansâ communications.â5 Unsupervised bulk surveillance certainly poses serious questions about privacy and civil liberties, but itâs important to be precise about the extent to which Americans found themselves in Fort Meadeâs crosshairs. Take, for instance, the two content programs. The NSAâs objective was to intercept the international communications of suspected al Qaeda operatives located overseas, including their phone calls and emails to and from the United States.6
So, yes, the NSA did eavesdrop on Americans, but this was a byproduct of targeting terrorists in foreign countries. The collection on Americans was âincidental.â (The FAA reflects this distinction as well. It expressly bars the government from targeting Americans anywhere in the world,7Â and authorizes warrantless surveillance only when the government seeks to monitor non-Americans who are âreasonably believed to be located outside the United States.â8) Incidental collection raises important concerns, to be sure, and strict safeguards are needed to prevent misconduct. But the problem, while serious, differs fundamentally from the deliberate targeting of Americans that produced the notorious abuses of the 1960s and â70s â the monitoring of Rev. King, Operation CHAOS, among others.
Nor should we overstate the novelty of bulk collection in the post-9/11 era. For Donohue, programmatic surveillance is a radical âdepart[ure] from how FISA traditionally workedâ; normally authorities must obtain FISC approval to monitor specific individuals who are suspected of being spies or terrorists.9. Yet certain forms of bulk collection both predate FISA and were preserved by it. When Congress enacted the statute in the late 1970s, the NSA was intercepting huge volumes of telecommunications traffic into and out of the United States â specifically, it was tapping cables in international waters and monitoring satellite-based radio transmissions, all without judicial supervision. Part of the reason for FISAâs convoluted definition of âelectronic surveillanceâ is that Congress wanted to maintain these capabilities.10 Donohue next provides a lengthy account of the founding generationâs hostility to general warrants â âpromiscuousâ authorizations that donât name âthe place to be searched and the individual on whom the warrant would be servedâ11 â before turning to the main event: a critique of telephony metadata collection, on both policy and constitutional grounds. The now-defunct 215 program, she argues, was a gross affront to individual privacy. Government access to huge troves of metadata enables it to piece together the most intimate details of our private lives.
The costs, then, are substantial. What about the benefits? Here, Donohue argues, the 215 program was essentially useless. The government could only point to a single case where it helped identify a terrorist, and â[i]t was hardly a smoking gun: for two months, the FBI did nothing with the information.â12Â She then develops a more ambitious, and more debatable, claim â that metadata generally âis not a particularly good [tool] for uncovering terrorist plots.â13Â In fact, communications and other metadata can be enormously valuable to a technique known as link analysis, in which officials probe hidden ties between known threats and their yet-unknown associates. If authorities had been able to analyze airline reservation data before 9/11, it would have been possible to uncover the links among all 19 hijackers.14
 The story is worth telling at some length:
Start with two men who helped fly American Airlines flight 77 into the Pentagon: Nawaq Alhamzi and Khalid Al-Midhar. Their names appeared on a U.S. watchlist, because they previously had been spotted at a terrorist meeting in Malaysia. So they would have been flagged when they bought their tickets. Tugging on that thread would have revealed three other hijackers who used the same addresses as the first two: Salem Al-Hamzi, Marwan Al-Shehhi, and Mohamed Atta, the plotâs operational ringleader. Officials would have discovered another hijacker (Majed Moqed) who used the same frequent-flyer number as Al-Midhar. Five other hijackers used the same phone numbers as Mohamed Atta: Fayez Ahmed, Mohand Alshehri, Wail Alshehri, Waleed Alshehri, and Abdulaziz Alomari. . . . Officials could have found a twelfth hijacker in an INS watch list for expired visas (Ahmed Alghamdi), and the remaining seven could have been flagged through him by matching other basic information.15 What about the Constitution? Donohue argues that the âthird-party doctrineâ of Smith v. Maryland16Â cannot justify bulk metadata collection. In Smith, the Supreme Court held that people have no reasonable expectation of privacy in the information they turn over to third parties. Police use of a pen register to record the phone numbers dialed by a suspect therefore isnât a âsearchâ and doesnât require a warrant or probable cause. Donohue counters that section 215 simply collects too much information of the utmost sensitivity to fall within Smith. âThe information being sought is not different in degree. It is different in kind.â17
More broadly, the third-party doctrine may have a dim future, as Donohue suggests.18Â Scholars have deplored it for decades â Orin Kerr calls it âthe Lochner of search and seizure lawâ19Â â and five members of the Supreme Court questioned its viability in United States v. Jones, a case involving GPS tracking.20Â Yet itâs not clear that the Court is ready to abandon it in national-security cases. Justice Alitoâs concurrence, joined by three others, argued that long-term GPS monitoring amounts to a search âin investigations of most offenses.â21Â This is so because people reasonably expect that, for garden-variety crimes, police wonât devote the substantial resources it would take to track their movements 24 hours a day. But Justice Alito leaves open the possibility that lengthy monitoring might not require a warrant for âextraordinary offensesâ; in such cases, society might reasonably expect authorities to undertake âlong-term tracking . . . using previously available techniques.â Terrorism, espionage, nuclear proliferation, and other national-security crimes certainly sound like the sorts of âextraordinary offensesâ Justice Alito and his colleagues had in mind.
Donohue has a somewhat more sympathetic view of the content collection authorized by section 702. A legislative fix to FISA was necessary, she explains, because of the email problem. Thanks to the internetâs architecture, foreign-to-foreign messages â emails sent from, say, London to Paris â sometimes pass through servers located in the United States. As a result, âcommunications previously exempted from FISA had begun to fall within the statute, triggering the FISC approval process.â22Â Section 702 restored the default rule: The feds neednât obtain a court order to intercept foreign-to-foreign communications, even if they happen to pass through this country on their way to their final destinations. The NSA has implemented section 702 expansively, using it not just to target particular suspects but for bulk collection. Two programs are of particular interest: PRISM, in which the NSA receives bulk data from communications providers, and âupstreamâ collection, in which the NSA taps into the internet backbone.
Constitutionally speaking, this surveillance depends on a foreign-intelligence exception to the Fourth Amendmentâs warrant requirement, and Donohue faults a 2002 decision of the Foreign Intelligence Surveillance Court of Review (FISCR) that she says announced such a rule âfor the first time.â23Â âThe U.S. Supreme Court,â she points out, âhas never recognizedâ a foreign-intelligence exception.24Â Thatâs true, but plenty of other courts have, including the Third, Fourth, Fifth, and Ninth Circuits.25Â Indeed, the FISCR emphasized that âall the other courts to have decided the issue, held that the President did have inherent authority to conduct warrantless searches to obtain foreign intelligence information.â26
While section 702 doesnât require judges to approve particular targets before the government monitors them, it does direct the FISC to review the governmentâs âtargetingâ and âminimizationâ procedures at regular intervals to ensure that they are âconsistent with the requirements of [the FAA] and with the fourth amendment.â27Â The point of these procedures is to keep the NSA from deliberately collecting Americansâ communications and, if it inadvertently does, to limit what can be done with them. Donohue cautions that the FISCâs review is fairly perfunctory. Even when a violation occurs the court is reluctant to give more than âa slap on the wrist.â28Â Yet an incident from late 2011 gives reason to hope that FISC oversight is more robust than that.
The government alerted the FISC that the NSAâs upstream collection was sweeping up telecommunications bundles that included both foreign-to-foreign messages (which may be intercepted under section 702) as well as domestic ones (which may not). Observing that the NSAâs procedures âtend[] to maximize retention of [domestic] information,â the court held that they violated both section 702 and the Fourth Amendment, and it ordered the government to adopt stricter minimization procedures within 30 days or end the program.29Â The following month officials came back with more restrictive rules â among other changes, the NSA would segregate the bundles in restricted databases, stamp them with special markings, and keep them for just three years (down from five).30Â The court thus performed pretty much how we would expect a neutral and detached magistrate to perform. It identified constitutional and statutory violations, struck down the offending procedures, and allowed the program to continue only after the government cured the violations.
Donohue is also skeptical of the FISCâs role in traditional FISA cases, describing the court as more or less a rubber stamp for the governmentâs surveillance requests. âBetween 1979 and 2003,â she observes, the âFISC denied only 3 out of 16,450 applications.â And of the 18,473 applications decided in the past decade, it âonly denied 8 in whole and 3 in part.â31Â Yet there are other signs that the FISC is more active in policing the government than this lopsided batting average would suggest. The FISCâs presiding judge recently reported that, over a three-month period in 2013, he and his colleagues declined to approve nearly 25 percent of the governmentâs applications, requiring âsubstantive changesâ before allowing the requested surveillance.32Â The FISC doesnât say ânoâ very much, put it says ânot yetâ pretty often.
Donohue concludes by proposing reforms that she says would strike a more equitable balance between privacy values and national-security needs. Her first is to rebuild the pre-9/11 âwallâ that prevented cops and spies from sharing information with one another. Doing so is necessary, she argues, to prevent pretextual surveillance; the government might âuse FISA in place of [criminal laws] . . . to avoid restrictions that protect individual rights.â33
At the risk of overstatement, this would be a catastrophic mistake. The information-sharing wall was as responsible as any other factor for the governmentâs failure to stop the 9/11 attacks. The 9/11 Commission reported that, in August 2001, a group of intelligence analysts was trying desperately to find Khalid al-Midhar, an al Qaeda operative who had entered the country a few months earlier. An FBI agent saw a message describing the manhunt and immediately contacted the intelligence team, demanding to know more and offering to help. He was told to stand down. Because he âwas designated a âcriminalâ FBI agent, not an intelligence FBI agent, the wall kept him from participating in any search for Midhar.â And, for good measure, he should âdestroy his copyâ of the message âbecause it contained NSA information.â The agent responded with an angry email: âWhatever has happened to this â someday somebody will die â and wall or not â the public will not understand why we were not more effective and throwing every resource we had at certain âproblems.ââ34Â Tragically, he was right. Days later Khalid al-Midhar would help crash American Airlines flight 77 into the Pentagon.
Fortunately there are a number of promising reforms that stop short of rebuilding the wall. An important one is already in place. FISC proceedings are normally ex parte, but Congress recently authorized the court to appoint outside counsel to provide an adversarial perspective in a case that âpresents a novel or significant interpretation of the lawâ;35Â the court has named Donohue herself as one of the people who are eligible for appointment. In addition, to reduce the risk that rogue officers might rummage around in sensitive data, policymakers might require judicial approval for â[a]ny query of foreign intelligence databases . . . where citizensâ information is involved.â36Â (The Obama administration required something similar for the 215 program before it was abolished; analysts could query the database only if the FISC found a âreasonable, articulable suspicion.â) And to prevent mission creep â the risk that information collected for national-security purposes will be used in routine matters like criminal law, public health, and for âmyriad other purposesâ37Â â policymakers could insist on stronger minimization rules with stricter limits on the types of investigations in which the information may be used.
In the end, the story Donohue tells may be a familiar one after all. Facing an unparalleled terrorist threat and immense challenges posed by technological change, the executive branch responded aggressively with novel initiatives that disrupted established ways of doing business. Then, as the immediate crisis receded, Congress and the courts began to reassert themselves and police the executiveâs use of power more rigorously. The result was that some of the new programs were discontinued while others were domesticated â allowed to persist, now on more durable statutory foundations and with additional safeguards in place. It is, in other words, a tale of executive action followed by legislative and judicial reaction. That story points to the strains our tripartite system of government experiences when Hamiltonâs âvigorous Executiveâ38Â takes decisive steps in times of national emergency. But it also has a more comforting lesson about the systemâs durability, and its tendency to roll back initial excesses and restore something like the prior equilibrium.
Footnotes: