Back to News & Commentary

Caught In the Internet

Big Brother is watching you.
Big Brother is watching you.
Patrick Toomey,
Deputy Director,
老澳门开奖结果 National Security Project
Share This Page
August 20, 2015

This piece was originally published by .

With the passage of the USA Freedom Act in June, Americans may think that the sprawling and unchecked surveillance apparatus that was secretly erected after 9/11 has finally been reined in. But the fight over government surveillance is far from over. For all the late-night filibusters and political brinkmanship that ultimately produced the USA Freedom Act, the legislation barely touched on many of the government鈥檚 most troubling spying programs鈥攖he ones aimed at the Internet.

Two years ago, the whistleblower Edward Snowden, then a government contractor, exposed the National Security Agency鈥檚 bulk collection of Americans鈥 phone records. That program is now being wound down, but phone records were just the tip of the surveillance iceberg. More and more, our daily communications take place over the Internet鈥攁nd there the NSA鈥檚 dragnet surveillance continues unabated. Putting an end to what some have 鈥渢he golden age of surveillance鈥 requires protecting our online communications from government spying, too.

Over the past 15 years, the NSA has embedded itself in the infrastructure of the Internet, often by secretly with telecommunications companies that operate the Internet 鈥渂ackbone.鈥 This backbone is the global network of high-capacity cables and routers that carries communications across countries and between continents. From outposts both inside and outside the United States, the NSA continuously monitors vast streams of Internet traffic as they flow past the agency鈥檚 surveillance devices. The NSA uses those devices to siphon off huge quantities of communications, often in bulk, copying them and then searching their contents for information of interest.

This is the new surveillance paradigm. It is one in which the government examines everyone鈥檚 e-mails, browsing activities, and online chats in real time, not just the communications of suspected spies and criminals. The old paradigm, in which surveillance had to be targeted to be technically and economically feasible, is being supplanted by population-level surveillance, where everyone鈥檚 communications and metadata are fair game. This new paradigm animated the NSA鈥檚 bulk collection of Americans鈥 call records, and it continues to animate its pervasive monitoring of Internet traffic. The breadth of this surveillance allows intelligence agencies to use 鈥渂ig data鈥 techniques鈥攕uch as sophisticated algorithms and analytic tools鈥攖o mine the flow of private communications and store large chunks of that data for later use. In short, today鈥檚 surveillance system is set up to search and collect as much data as possible now, so that intelligence agencies can figure out how to exploit it later.

There are two key legal authorities that govern the NSA鈥檚 warrantless surveillance of our Internet communications. Inside the United States, this surveillance is conducted under Section 702 of the Foreign Intelligence Surveillance Act (better known as FISA), and it principally affects Americans鈥 international communications. Outside the United States, the surveillance is carried out under Executive Order 12,333鈥攁 Reagan-era spying regulation written for the pre-Internet era. This order is even more permissive than Section 702 and lacks judicial review of any kind, not to mention meaningful congressional oversight. John Napier Tye, a whistleblower and former State Department official, has that the collection and storage of communications under Executive Order 12,333 is staggering in its scope and far broader than the surveillance programs that have thus far come to public attention.

Last March, I was part of a team of lawyers at the 老澳门开奖结果 who sued the government to stop Internet backbone surveillance conducted under Section 702. The 老澳门开奖结果鈥檚 clients in the case鈥擶ikimedia Foundation, Human Rights Watch, the Rutherford Institute, and six other civil society organizations鈥攁rgue that this warrantless surveillance violates the Fourth Amendment, which provides core safeguards against unreasonable searches and seizures, the First Amendment, and the text of Section 702 itself. In searching through international communications entering or leaving the United States, the NSA invades the plaintiffs鈥 privacy and harms their ability to engage in speech, advocacy, and other activities essential to their work. Public disclosures over the past two years鈥攊ncluding new about the NSA鈥檚 monitoring of Internet backbone traffic with the help of AT&T and Verizon鈥攕ubstantiate the plaintiffs鈥 claims. The Electronic Frontier Foundation is currently pursuing a similar, long-running challenge, which the government has sought to have the courts dismiss on the grounds of state secrets.

Because intelligence officials often claim that these programs are directed only at foreigners abroad (as though mass surveillance of the rest of the world is justified), many Americans believe that they aren鈥檛 vulnerable to the NSA鈥檚 dragnet spying. But the reality is far different.

For one thing, the NSA鈥檚 rules permit it to hold on to the communications of Americans that it intercepts 鈥渋ncidentally.鈥 That word conceals an enormous loophole. As long as the NSA is pursuing the communications of foreigners overseas, whether individually or en masse, it believes it is entitled to copy, review, and retain communications involving Americans without ever having to obtain a warrant. In other words, it uses surveillance supposedly directed at foreigners as a back door into Americans鈥 private communications. Intelligence officials in a 2006 hearing before the U.S. Senate Judiciary Committee that obtaining Americans鈥 international e-mails and phone calls was one of their core goals in seeking broader surveillance authority, calling those communications the ones 鈥渕ost important to us.鈥 And subsequent that the NSA is indeed collecting Americans鈥 communications in large quantities under Section 702 and Executive Order 12,333. For example, the Review Group on Intelligence and Communications Technologies, an oversight body created by U.S. President Barack Obama in the summer of 2013, found that Americans鈥 communications were 鈥渟ignificantly more likely鈥 to be acquired under Section 702 than through surveillance predicated on a warrant.

The global structure of the Internet helps the NSA take advantage of the 鈥渋ncidental鈥 loophole, by funneling Americans鈥 communications into the NSA鈥檚 net. Communications today are transmitted across the Internet with little regard for national boundaries. Thus, even when both the sender and the recipient of an e-mail are inside the United States, there are many ways that communication could end up outside of the country. Companies such as Google, Yahoo!, and Microsoft often shuttle huge amounts of customer data around the world in the course of storing backup copies, improving network access, or conducting basic tasks such as spam filtering. Internet communications rarely take the shortest route to their destination, and factors such as network congestion or contractual agreements may cause purely domestic communications to take an international route. Because of how the Internet is built, Americans have little control over the routing of their data. The fact that the NSA believes it can seize and search many of these communications without a warrant, simply because they happen to have crossed a border, is profoundly disturbing.

The shift to population-level surveillance has grave ramifications for our liberty. It means that the government is storing copies of our private communications for years at a time, even if it has no reason to believe we鈥檝e done anything wrong. It means that the government can search through those communications at its leisure, for a variety of investigative purposes, without ever having to go before a judge. It means that the government has already built a surveillance architecture that could be used to stifle dissent, to profile people based on race or religion, and to impair the ability to travel, obtain work, and associate freely. This may seem far-fetched, but some of it is already happening today. Secret surveillance has helped funnel individuals onto terrorist watch lists鈥攕uch as the 鈥渘o fly鈥 list, which is used to bar suspects from boarding flights to, from, or within the United States. Once on that list, individuals have no meaningful opportunity to challenge the surveillance or clear their names. More broadly, as a issued last year by Human Rights Watch and the 老澳门开奖结果 shows, the chilling effects of this surveillance on journalists, lawyers, and others are palpable. It makes sources unwilling to talk to journalists, even about topics that may be of tremendous public interest, and it undermines the ability of lawyers to communicate with their clients in confidence.

There are other corrosive effects, too. Today鈥檚 surveillance apparatus depends on a massive, secretive state bureaucracy, one that is often at odds with the core democratic principles of transparency, accountability, and popular consent. A secret court, created under FISA, exists solely to consider government surveillance requests. In the past decade, that court has repeatedly reinterpreted the country鈥檚 surveillance laws to authorize spying that is far broader than any member of the public could have known. At the same time, there is an epidemic of overclassification, which stifles citizens鈥 ability to hold their government accountable, especially when it comes to novel forms of surveillance.

Indeed, the government is deliberately standing in the way of an informed public debate about its spying programs. The NSA has refused to count, or even estimate, the number of Americans whose communications it retains each year under Section 702鈥攜et that number is almost certainly enormous. Similarly, the FBI has refused to disclose how many times it conducts 鈥渂ackdoor searches鈥 on Americans using its Section 702 database, a practice that converts warrantless spying into a tool for everyday law enforcement. Surveillance under Executive Order 12,333 is even more of a black box, despite about its broad impact on the rights of Americans. One recent news noted that even the U.S. Senate Select Committee on Intelligence, which is supposed to oversee the intelligence agencies, could not identify all the spying programs conducted under this authority.

Although the recent public debate has focused less on the NSA鈥檚 Internet backbone surveillance than on its bulk collection of phone records, there are mounting calls for transparency and reform. In 2014, the U.S. House of Representatives voted by a wide margin to ban warrantless backdoor searches on Americans, although the U.S. Senate failed to pass equivalent legislation. This past May, Representative Bob Goodlatte (R-Va.), chairman of the House Judiciary Committee, promised to hold hearings on the use of Section 702 surveillance because of mounting pressure from his committee members to reform this law. The Review Group on Intelligence and Communications Technologies has curtailing the government鈥檚 ability to exploit information about Americans鈥攃ollected under Section 702 and Executive Order 12,333鈥攂y requiring the government to purge much of that information and banning its use altogether in criminal proceedings. And the Privacy and Civil Liberties Oversight Board, an independent and bipartisan agency within the executive branch, is currently conducting its own review of certain surveillance activities under Executive Order 12,333.

Having secretly secured a viselike grip on the Internet鈥檚 backbone, the intelligence agencies will no doubt resist such efforts. In a world where our digital trails increasingly follow us everywhere, the recent battle over bulk collection of phone records was only a prelude. Our public institutions must not give in to fearmongering, misinformation, and rampant secrecy, because the stakes for liberty and privacy are incredibly high.

Learn More 老澳门开奖结果 the Issues on This Page