Protect Privacy by Overhauling the Protect America Act
U.S. House of Representatives Committee on the Judiciary
Hearing Regarding Warrantless Surveillance and the Foreign Intelligence Surveillance Act (FISA): The Role of Checks and Balances in Protecting Americans鈥 Privacy Rights
September 5, 2007
2141 Rayburn House Office Building
Chairman Conyers, Ranking Member Smith, and Committee Members, on behalf of the 老澳门开奖结果 (鈥溊习拿趴苯峁), America鈥檚 oldest and largest civil liberties organization, its 53 affiliates and hundreds of thousands of Members, we write to share our views with the Committee regarding the recently enacted Protect America Act, Pub. L. 110-55, and legislation to replace that Act. Because 搂 6 of the Protect America Act causes the Act to sunset if not reauthorized or replaced within six months, the 老澳门开奖结果 recommends that this Committee allow the Act to expire. Alternatively, should Congress feel compelled to legislate, Congress should replace the Act with a full scale revision that respects the letter and spirit of the Fourth Amendment with regards to intercepting U.S. persons鈥 communications.
Congress must also vigorously resist legislative attempts to grant retroactive immunity to government employees and telecommunications companies and their employees for facilitating criminal and unconstitutional wiretapping. Absolving these individuals and companies of their violations of the Foreign Intelligence Surveillance Act鈥檚 (鈥淔ISA鈥) will encourage future lawlessness and interception of communications outside of FISA. Ultimately, extinguishing liability 鈥 especially while litigation is proceeding 鈥 will prevent U.S. citizens from vindicating their constitutional, legal and contractual rights as customers of the telecommunications companies.
Neither the Protect America Act, nor S. 2011, authored by Sen. Carl Levin (D-MI) and Intelligence Committee Chair, Sen. John D. Rockefeller, sufficiently protect the privacy of communications of innocent U.S. persons. Any legislation replacing the Protect America Act must reintroduce privacy protections into FISA鈥檚 treatment of communications intercepted between U.S. persons and persons reasonably believed to be outside of the United States.
In passing the Protect America Act, Congress legislated in the dark and should not do so again. Despite repeated requests for documents, testimony and briefings regarding the illegal, warrantless wiretapping conducted at the President鈥檚 bequest, Congress has to date been utterly stymied in conducting meaningful oversight over those illegal acts. The White House has flouted Congressional subpoenas and deadlines for the provision of documents related to that warrantless wiretapping. The end result is that Congress has effectively been prevented from conducting oversight regarding surveillance conducted on U.S. soil since September 12, 2001. In essence, Congress has been all but eliminated as an independent check on abuses by the President and the National Security Agency (鈥淣SA鈥). No amendments to FISA should be made permanent until Congress and the public receive answers about what surveillance activities have been conducted over the last six years and the legal basis for those programs. This Committee should hold extensive public hearings regarding the NSA鈥檚 warrantless wiretapping and the telecommunications companies鈥 facilitation of that illegal wiretapping. Information regarding this illegal activity to determine how the Administration ignored the clear mandates of FISA should be forthcoming prior to the enactment of any new legislation. After all, any Congressional effort to carefully draw the statutory lines between permissible surveillance to prevent acts of terrorism is meaningless should this, or a future, Administration choose to ignore or circumvent FISA鈥檚 mandates and limitations. Further, information regarding how the authorities provided for in the Protect America Act are being interpreted and operationalized by the NSA should be shared with Congress. To facilitate Congress鈥 legislative efforts, the NSA should be required to articulate with specificity the problematic aspects of the prior statutory scheme and whether the Protect America Act responds to those intelligence concerns.
The 老澳门开奖结果 also recommends that Congress codify a FISA regime that increases the privacy protections for U.S. persons鈥 communications as the level of intrusiveness of intercepts of those communications increases. If content is acquired and/or reviewed, particularly where probable cause has not been developed to investigate a U.S. persons鈥 communications, the government鈥檚 burden of protecting that communication should be increased, and commensurate limitations should be placed on the use or dissemination of that communication to ensure compliance with the Fourth Amendment. Additionally, meaningful judicial review of the NSA must be built into any legislation so that the court may act to ensure the privacy of U.S. persons鈥 communications. Only the Foreign Intelligence Surveillance Court (鈥淔ISC鈥) can insist that surveillance is targeted to individualized intercepts. Court review is also essential so as to force the NSA and Department of Justice to comply with the letter and spirit of any new law enacted.
II. Analysis of the Protect America Act and S. 2011
President Bush enacted sweeping revisions to FISA on August 5, 2007 by signing into law the Protect America Act. The Act was signed just two days after final passage by the U.S. Senate and one day after final passage by the U.S. House of Representatives. Director of National Intelligence McConnell allegedly lobbied heavily and personally for the Act鈥檚 passage, briefing more than 200 Members of Congress on the NSA鈥檚 purported need to close an intelligence gap. This rush to legislate led to a substantially overbroad law that does not appear to provide the type of narrowly-targeted expansion of surveillance authority McConnell claims to have sought. Rather, the Act appears to have eroded Americans鈥 privacy protections for their e-mails and phone calls to and from foreign-based persons 鈥 including U.S. citizens living, working or traveling abroad 鈥 in a tidal wave of over-reaching legislative language. The 老澳门开奖结果 calls upon Congress to reverse this sea change in the laws governing surveillance by the U.S. government of U.S. citizens and lawful permanent residents.
The Protect America Act turns the Fourth Amendment to the U.S. Constitution on its head.[i] It eviscerates privacy protections for U.S. persons鈥 communications and does great damage to the Fourth Amendment鈥檚 protections by:
(i) expressly permitting non-targeted, warrantless mass acquisition of U.S. persons鈥 communications with foreign-based communicants by defining such communications as outside of the definition of FISA-protected 鈥渆lectronic surveillance鈥;
(ii) failing to require the NSA to demonstrate that they have probable cause to believe one party to the communication is a terrorist or foreign power before intercepting U.S. persons鈥 communications;
(iii) eliminating requirements that factual predicates for surveillance be listed with specificity such as the 鈥渇acilities, places, premises, or property at which the acquisition of foreign intelligence information will be directed;鈥 and
(iv) implicitly permitting the limitless warehousing and subsequent data mining of both the metadata regarding those communications and the content of the communications themselves.
First, the Act states that all intercepts of communications 鈥 both e-mail and phone calls 鈥 between any person the government 鈥渞easonably believe[s]鈥 is located outside the U.S. and anyone within the U.S. are exempt from the definition of Fourth Amendment-protected electronic surveillance. Protect America Act, Pub. L. 110-55 at 搂 105B(a). Thus, for the first time, FISA: (i) permits the mass acquisition of U.S. persons鈥 communications, (ii) eliminates any requirement that the government target its acquisition to acquire only certain persons鈥 conversations; and (iii) eliminates the requirement that a judge approve those interceptions. Now, if the government is directing its surveillance at foreign-based communicants it may sweep up the conversations of U.S.-based persons. FISA previously required the government to establish reasonable suspicion or probable cause to obtain, keep and utilize the communications of U.S. persons that were inadvertently acquired. Second, the Protect America Act eliminates any requirement that the NSA, in obtaining a general warrant, provide facts to target the interceptions to specific facilities, places, premises or property. Id. at 搂 105B(b). In short, the FISC no longer plays a meaningful role 鈥 one that it had played effectively since 1978 鈥 and it can no longer provide judicial oversight given the powers granted to the NSA in the Protect America Act. This amendment to FISA essentially establishes a system of surveillance solely dictated and controlled by Executive Branch fiat without the independent review by the judicial branch. Further, the Act essentially eliminates judicial review of DOJ and NSA activities by the FISC. The end result is a cosmetic patina of judicial review without providing the FISC with substantive authority to halt or modify improper intercepts. Finally, the Protect America Act permits continued warrantless surveillance of a person, account or facility 鈥 even when it becomes clear that the subject of surveillance will have repeated contact with a U.S. person.
All of these constitutional and policy failings are only exacerbated by the fact that the Protect America Act allows the government to retain, use and disseminate the content of or the data about these communications however it sees fit. While supporters of the Protect America Act point to so-called 鈥渕inimization procedures,鈥 those procedures have never been used on mass, otherwise legalized collection, nor have those procedures ever had a public airing. In effect, the Protect America Act resorts back to 鈥渢rust us,鈥 and leaves the Administration to its own devices to operate in secret and without any limitation on how to treat U.S. information. Thus, the NSA is now permitted to intercept and utilize communications without minimizing the U.S. persons鈥 identity and personally identifiable information. Prior to the Protect American Act, personally identifiable information and 鈥渉eader鈥 information identifying a particular U.S. person would have been minimized.
The Act, therefore, erects a geometric increase in the kind and quantum of U.S. persons鈥 communications that may be intercepted. It is no exaggeration to state that all communications 鈥 both e-mails and phone calls 鈥 originating from a non-U.S.-based person could be intercepted. Similarly, the communications to people abroad originating from the U.S. also are likely to be intercepted as part of the communications chain. In short, it is likely that all, or substantially all, communications entering or exiting the U.S. will be intercepted. The implications of such a change are profound, likely leading to the acquisition of all communications in the following illustrative scenarios:
(i) communications to U.S.-based businesses from their foreign-based subsidiaries or business partners/clients;
(ii) calls and e-mails to U.S.-based parents of high-school, college, and university students participating in 鈥渟tudy abroad鈥 programs;
(iii) calls and e-mails between missionaries and their religious sponsor churches, mosques and synagogues in the U.S.;
(iv) e-mails and calls from any U.S. citizen travelling outside of the U.S. on vacation; and
(v) purely domestic calls and e-mails between U.S. persons that are routed through foreign countries, such as Canada, simply for ease, cost-savings, or network efficiency.
Now, the mass interception of foreign-to-U.S. communications is permissible due to the evisceration of Fourth Amendment-based statutory requirements that mandated the targeting of, interception and judicial approval of individualized surveillance.
The Protect America Act also implicitly authorizes mass warehousing and limitless data mining of the communications of U.S. persons intercepted. The Act states that the government may engage in 鈥渁cquisition [of] foreign intelligence information鈥 from a 鈥渃ustodian鈥 either as the communications are 鈥渢ransmitted or while they are stored . . . .鈥 Id. at 搂 105B(a)(3). In essence, the Act facilitates the application by the NSA for a general warrant for a group of individuals and their communications, no matter whether a U.S. person鈥檚 communications are swept up. Because Congress failed to limit the types of data mining that may occur, or prevent data mining of the metadata concerning the communications, we can expect the application of link analysis data mining to attempt to establish the relationship between a foreign-based communicant and the U.S. person with whom they communicate, even if the contact is casual, incidental or accidental. Thus, an innocent U.S. person whose communications are intercepted because they received a phone call or e-mail from a person reasonably believed to be located overseas could come under government suspicion simply because they were sent an e-mail or received a phone call.
The failure of Congress to limit the data mining of either the metadata concerning the communications or the content of those communications is likely to have profound legal and practical consequences for innocent U.S. persons. The Act does not limit the NSA鈥檚 ability to interpret the communications intercepted, thus innocent U.S. persons鈥 communications could be misinterpreted because the data mining of the content of those communications detects the presence of some code word. The implications for innocent U.S. persons wrongly drawn into this web of government suspicion are heretofore unknown. Certain questions naturally arise from this lack of legal limitation:
(i) will innocent U.S. persons鈥 exercise of legally or constitutionally guaranteed rights and privileges be limited?;
(ii) what redress, if any, will innocent U.S. persons have when their communications are misinterpreted?;
(iii) how will an innocent person who is wrongly suspected recover his or her good name and reputation?; and
(iv) will the friends, families and associates of the wrongly suspected U.S. persons also come under suspicion? If so, are there any limits to the concentric rings of communicants (i.e., how many degrees of separation removed from the foreign-based communicant) the government will draw into this burgeoning web of suspicion?
The Protect America Act鈥檚 revisions of FISA also render the longstanding law unrecognizable by virtually eliminating the role of telecommunications providers as independent guarantors of their customers鈥 privacy under this new mass communications acquisition scheme. The Act substantially eliminates the ability of the telecoms to resist facilitating the interception of U.S. persons鈥 communications. As originally drafted, FISA placed the telecoms in the shoes of their customers and permitted the telecoms to go to court to resist an allegedly improper FISA intercept application on a customer鈥檚 behalf. The Protect America Act eviscerates this third-party guarantor role. It permits the NSA to demand that telecoms facilitate interception. Id. at 搂 105B(e). Should a telecom resist such a directive, the NSA may obtain a court order compelling facilitation. Id. at 搂 105B(g). Failure to comply with that court order is punishable with a finding of contempt of court. Id. Although the Act sets forth procedures for a telecom to challenge a directive, the streamlining of the FISA application 鈥 such as the elimination of the requirement that the NSA provide specific targeting facts 鈥 prevents attorneys for any telecom from having certain pre-existing avenues to challenge the legal sufficiency of a mass acquisition directive. Further, the FISC must review any ex parte, sealed submissions regarding the interception, which lessens the likelihood that a telecom could successfully resist such an interception directive. Id. at 搂 105B(k).
In addition, to reduce the telecom industry鈥檚 resistance to facilitating mass communications interception, the Protect America Act provides significant financial inducement to the telecoms. Pursuant to the Act, the telecoms are compensated 鈥渁t the prevailing rate鈥 for 鈥減roviding information, facilities, or assistance鈥 to aid the government鈥檚 wiretapping. Id. at 搂 105B(f). Thus, the Act guarantees that wiretapping facilitation remains profitable for the telecoms. More importantly, to further erode telecom resistance to this massive wiretapping expansion, the Act grants the telecoms seeming absolute prospective immunity for wiretapping of e-mails and phone calls pursuant to the Act. Id. at 搂 105B(l).
The reporting requirements of the Act do not guarantee that Congress, much less the media or the public, will have sufficient information about wiretapping permitted under the Act to judge its efficacy or the NSA鈥檚 compliance with the Act. The Attorney General of the U.S. is only required to brief the four lead Congressional Committees 鈥 the House and Senate Intelligence and Judiciary Committees 鈥 semiannually. That report need only provide a 鈥渄escription . . . of incidents of non-compliance by an element of the Intelligence Community with guidelines or procedures established for determining that the acquisition of foreign intelligence [pursuant to the Act] concerns persons reasonably believed to be outside the United States.鈥 Further, the report only must list the number of certifications issued by the Attorney General and the number of directives to telecoms to facilitate interceptions during the relevant period. In short, Congress鈥 failure to require additional information or reporting specificity prevents the provision of information to judge:
(i) whether the Act鈥檚 expansion was justified or useful from an intelligence resource perspective;
(ii) whether violations of U.S. persons鈥 constitutional or legal rights occurred;
(iii) whether the interceptions ordered are targeted in any way to comport with the Fourth Amendment鈥檚 requirements; and
(iv) whether and/or what disciplinary action was taken for any violations of any procedural, regulatory, legal or constitutional violations by any NSA or Department of Justice employee.
The Protect America Act also includes a six month-long 鈥渟unset鈥 provision, which causes the Act to expire if it is not replaced within six months after the date of enactment (i.e., after February 5, 2007).
The Democrats鈥 alternative legislative proposal, S. 2011 (the short title of S. 2011 was also the Protect America Act, therefore, hereinafter 鈥淒emocrats鈥 alternative鈥 or 鈥淪. 2011鈥), introduced by senior Intelligence Committee Member Senator Carl Levin (D-MI) and Committee Chair John D. Rockefeller (D-WV), failed 老澳门开奖结果 standards in several important respects. First, the Democrats鈥 alternative eliminated targeting requirements in language identical to the Protect America Act. S. 2011 at 搂 105(B)(b)(2). This allows for the mass acquisition of communications involving at least one U.S. person. Further, the legislation authorized year-long interceptions. Id. at 搂 105B(a). Additionally, the Democrats鈥 alternative would have created a 鈥渓isten-first-apply-for-a-warrant-later鈥 procedure authorizing immediate interception of U.S. persons鈥 communications with persons reasonably believed to be outside the U.S. Id. at 搂 105C. Finally, the alternative left the Executive Branch to minimize U.S. persons鈥 communications through secret Attorney General-issued procedures, and did not require that improperly intercepted U.S. persons鈥 communications be destroyed. This amendment would have permitted surveillance without any indicia of Fourth Amendment protection in that U.S. persons鈥 communications could be intercepted and reviewed in the absence of any targeting of the foreign-based communicant and without probable cause or reasonable suspicion to have been developed with respect to the U.S. person.
The Democrats鈥 alternative was superior to the Protect America Act in two respects, neither of which outweighed the alternative鈥檚 implications for vastly expanded acquisition of U.S. persons鈥 communications with foreign-based persons. First, S. 2011 would have required court review of the Attorney General鈥檚 certification and application for surveillance. Id. at 搂 105B. In contrast, the Protect America Act requires only certification by the Attorney General. Second, S. 2011 would have required the NSA to obtain a warrant from the FISC to continue interception at the point at which the U.S. person became the subject of surveillance. Id. at 搂 105B(d). The 老澳门开奖结果 supports both of these improvements.
III. Recommended Principles for Reforming the Protect America Act
The 老澳门开奖结果 notes again that Congress is not compelled to pass additional legislation. The effect of not doing so would be to return FISA to the statutory limitations in place prior to enactment of the Protect America Act. The 老澳门开奖结果 believes that no legislation would be better than the permanent authorization of the Protect America Act or any legislation that substantially mirrors that Act. Further, any grant of retroactive telecom immunity will reward law-breaking and fundamentally undermine the FISA structure by eliminating any arm鈥檚 length distance between the telecoms and the government. In short, should the telecoms be given amnesty for violating the law, AT&T, Verizon and other companies will essentially be functioning as quasi-governmental appendages of the NSA.
In the alternative, should Congress feel compelled to legislate, the 老澳门开奖结果 recommends that this Committee adhere to the following principles in drafting legislation to replace the Protect America Act:
1. Any further legislation must reiterate that FISA is the exclusive means of intelligence gathering on U.S. soil, and the legislation must include automatically triggered consequences for violating this exclusivity. As initially enacted by Congress, the exclusivity of FISA was unambiguous. This new exercise in defining the lawful extent of surveillance authorities will be useless if the resulting legislation can be ignored. We further recommend that any new legislation state explicitly that the Authorization for the Use of Military Force in Afghanistan and Iraq do not authorize any surveillance outside FISA. Additionally, we recommend that the NSA be required to report to Congress repeatedly on its implementation of any new surveillance activities conducted pursuant to FISA.
2. Interceptions of U.S. persons鈥 communications within the U.S. should continue to be included within, and, therefore, protected by the definition of 鈥渆lectronic surveillance.鈥 The Protect America Act鈥檚 seeming elimination of this protection should be repealed.
3. Collection and isolation of the particular communications sought by the government should be conducted by the telecommunications industry itself 鈥 the government should not be given direct and unfettered access to telecommunications infrastructure. We are concerned that the Protect America Act appears to allow the government to 鈥渟it on the line鈥 and scoop up all communications and sort through them later. Instead, the government should receive only the information it is authorized to intercept by law.
4. The FISC must play a meaningful role in ensuring compliance with the law. First and foremost, electronic surveillance should be authorized by the FISC through the issuance of an individualized warrant based on probable cause. This oversight should include, where possible, prior and, always, regular judicial approval and review of surveillance based on full disclosure about what information is to be sought, whose communications will be collected, how it will be gathered and how content and other data in communications to and from the United States will be handled. The Court must also have regular access to information about how many U.S. communications are being collected and the authority to require court orders when it becomes clear that a certain program or surveillance of a target is scooping up communications of U.S. persons.
5. Under any new amendment to FISA established in your legislation, when the government intercepts a communication to which a person in the U.S. is a party, there should be a presumption requiring the NSA to immediately destroy that communication unless the NSA documents that it has reason to believe that the communication reflects an immediate threat to life or limb. All public FISA legislation has been deficient in that it has lacked a presumption of destruction of the improperly intercepted communications of U.S. persons. Without such a presumption, the Administration鈥檚 secret 鈥渕inimization鈥 procedures will be all that govern U.S. communications. Congress has the authority 鈥 and the responsibility 鈥 to explicitly define how these communications are treated, and should no longer defer to the Executive branch鈥檚 unknown policies. If the programs are truly directed at people overseas, this should be noncontroversial.
6. Once the government has reason to believe that there is a substantial likelihood that a specific account, person or facility will have contact with someone in the United States, the government should be required to return to the FISC to obtain a court order for continued surveillance of that account, person or facility. Reliance on the FISC will help ensure the privacy of U.S. persons鈥 communications.
[i] The Fourth Amendment to the Constitution provides in pertinent part that 鈥渘o warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be search, and the persons or things to be seized.鈥