FacebookTwitterGoogle+RedditEmail

The NSA on Trial

by MARJORIE COHN

Edward Snowden, who worked for the National Security Agency (NSA), revealed a secret order of the Foreign Intelligence Surveillance Court (FISC), that requires Verizon to produce on an “ongoing daily basis … all call detail records or ‘telephony metadata’ created by Verizon for communications (i) between the United States and abroad; or (ii) wholly within the United States, including local telephone calls.”

The government has admitted it collects metadata for all of our telephone communications, but says the data collected does not include the content of the calls.

In response to lawsuits challenging the constitutionality of the program, two federal judges issued dueling opinions about whether it violates the Fourth Amendment’s prohibition on unreasonable searches and seizures.

Judge Richard J. Leon, of the US District Court for the District of Columbia, held that the metadata program probably constitutes an unconstitutional search and seizure. Judge William H. Pauley III, of the US District Court for the Southern District of New York, determined that it does not violate the Fourth Amendment.

Leon’s Opinion

Leon wrote, “Because the Government can use daily metadata collection to engage in ‘repetitive surreptitious surveillance of a citizen’s private goings on,’ the ‘program implicates the Fourth Amendment each time a government official monitors it.'” The issue is “whether plaintiffs have a reasonable expectation of privacy that is violated when the Government indiscriminately collects their telephony metadata along with the metadata of hundreds of millions of other citizens without any particularized suspicion of wrongdoing, retains all of that metadata for five years, and then queries, analyzes, and investigates that data without prior judicial approval of the investigative targets. If they do—and a Fourth Amendment search has thus occurred—then the next step of the analysis will be to determine whether such a search is ‘reasonable.'” The first determination is whether a Fourth Amendment “search” has occurred. If so, the second question is whether that search was “reasonable.”

The judicial analyses of both Leon and Pauley turn on their differing interpretations of the 1979 U.S. Supreme Court decision, Smith v. Maryland. In Smith, a robbery victim reported she had received threatening and obscene phone calls from someone who claimed to be the robber. Without obtaining a warrant, the police installed a pen register, which revealed a telephone in the defendant’s home had been used to call the victim. The Supreme Court held that a person has no reasonable expectation of privacy in the numbers dialed from his telephone because he voluntarily transmits them to his phone company.

Leon distinguished Smith from the NSA program, saying that whether a pen register constitutes a “search” is “a far cry from the issue in [the NSA] case.” Leon wrote, “When do present-day circumstances—the evolution of the Government’s surveillance capabilities, citizens’ phone habits, and the relationship between the NSA and telecom companies—become so thoroughly unlike those considered by the Supreme Court thirty-four years ago that a precedent like Smith simply does not apply? The answer, unfortunately for the Government, is now.”

Then Leon cited the 2012 Supreme Court case of United States v. Jones, in which five justices found that law enforcement’s use of a GPS device to track the movements of a vehicle for nearly a month violated a reasonable expectation of privacy. “Significantly,” Leon wrote, “the justices did so without questioning the validity of the Court’s 1983 decision in United States v. Knotts, that the use of a tracking beeper does not constitute a search because ‘[a] person travelling in an automobile on public thoroughfares has no reasonable expectation of privacy in his movements from one place to another.'” Leon contrasted the short-range, short-term tracking device used in Knotts with the constant month-long surveillance achieved with the GPS device attached to Jones’s car.

Unlike the “highly-limited data collection” in Smith, Leon noted, “[t]he NSA telephony metadata program, on the other hand, involves the creation and maintenance of a historical database containing five years’ worth of data. And I might add, there is the very real prospect that the program will go on for as long as America is combating terrorism, which realistically could be forever!” He called the NSA program “effectively a joint intelligence-gathering operation [between telecom companies and] the Government.”

“[T]he almost-Orwellian technology that enables the Government to store and analyze the phone metadata of every telephone user in the United States is unlike anything that could have been conceived in 1979,” Leon exclaimed, calling it “the stuff of science fiction.” He cited Justice Scalia’s opinion in Kyllo v. United States, which held the use of a thermal imaging device, that measures heat waste emanating from a house, constitutes a “search.” Justice Scalia was concerned about increasing invasions of privacy occasioned by developing technology.

Leon wrote, “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high-tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval.”

Quoting Justice Sotomayor’s concurrence in Jones, Leon noted the breadth of information our cell phone records reveal, including “familial, political, professional, religious, and sexual associations.”

Having determined that people have a subjective expectation of privacy in their historical record of telephony metadata, Leon turned to whether that subjective expectation is one that society considers “reasonable.” A “search” must ordinarily be based on individualized suspicion of wrongdoing in order to be “reasonable.” One exception is when there are “special needs,” beyond the need for ordinary law enforcement (such as the need to protect children from drugs).

“To my knowledge, however, no court has ever recognized a special need sufficient to justify continuous, daily searches of virtually every American citizen without any particularized suspicion,” Leon wrote. “In effect,” he continued, “the Government urges me to be the first non-FISC judge to sanction such a dragnet.”

Leon stated that fifteen different FISC judges have issued 35 orders authorizing the metadata collection program. But, Leon wrote, FISC Judge Reggie Walton determined the NSA has engaged in “systematic noncompliance” and repeatedly made misrepresentations and inaccurate statements about the program to the FISC judges. And Presiding FISC Judge John Bates noted “a substantial misrepresentation [by the government] regarding the scope of a major collection program.”

Significantly, Leon noted that “the Government does not cite a single instance in which analysis of the NSA’s bulk metadata collection actually stopped an imminent attack, or otherwise aided the Government in achieving any objective that was time-sensitive in nature.”

Pauley’s Opinion

Pauley’s analysis of the Fourth Amendment issue was brief. He explained that prior to the September 11th terrorist attacks, the NSA intercepted seven calls made by hijacker Khalid al-Mihdhar to an al-Qaeda safe house in Yemen. But the overseas signal intelligence capabilities the NSA used could not capture al-Mihdhar’s telephone number identifier; thus, the NSA mistakenly concluded that al-Mihdhar was not in the United States. Pauley wrote: “Telephony metadata would have furnished the missing information and might have permitted the NSA to notify the Federal Bureau of Investigation (FBI) of the fact that al-Mihdhar was calling the Yemeni safe house from inside the United States.”

“If plumbed,” Pauley noted, the telephony metadata program “can reveal a rich profile of every individual as well as a comprehensive record of people’s association with one another.” He noted, “the Government acknowledged that since May 2006, it has collected [telephony metadata] for substantially every telephone call in the United States, including calls between the United States and a foreign country and calls entirely within the United States.”

But, unlike Leon, Pauley found Smith v. Maryland controls the NSA case. He quoted Smith: “Telephone users … typically know that they must convey numerical information to the telephone company; that the telephone company has facilities for recording this information; and that the telephone company does in fact record this information for a variety of legitimate business purposes.” Thus, Pauley wrote, when a person voluntarily gives information to a third party, “he forfeits his right to privacy in the information.”

While Leon’s distinction between Smith and the NSA program turned on the breadth of information collected by the NSA, Pauley opined, “The collection of breathtaking amounts of information unprotected by the Fourth Amendment does not transform that sweep into a Fourth Amendment search.” And whereas Leon’s detailed analysis demonstrated how Jones leads to the result that the NSA program probably violates the Fourth Amendment, Pauley failed to meaningfully distinguish Jones from the NSA case, merely noting that the Jonescourt did not overrule Smith.

Leon’s decision is the better-reasoned opinion.

Looking Ahead

This issue is headed to the Court of Appeals. From there, it will likely go the Supreme Court. The high court checked and balanced President George W. Bush when he overstepped his legal authority by establishing military commissions that violated due process, and attempted to deny constitutional habeas corpus to Guantanamo detainees. It remains to be seen whether the court will likewise refuse to cower before President Barack Obama’s claim of unfettered executive authority to conduct dragnet surveillance. If the court allows the NSA to continue its metadata collection, we will reside in what can only be characterized as a police state.

Marjorie Cohn is a Professor of Law at Thomas Jefferson School of Law, past president of the National Lawyers Guild, and deputy secretary general of the International Association of Democratic Lawyers. Her next book, Drones and Targeted Killing, will be published in 2014 by University of California Press.

This essay originally appeared in the Jurist.

Marjorie Cohn is professor emerita at Thomas Jefferson School of Law and former president of the National Lawyers Guild. She writes, speaks and does media about human rights and U.S. foreign policy. Her most recent book is “Drones and Targeted Killing: Legal, Moral, and Geopolitical Issues.” Visit her website at http://marjoriecohn.com/ and follow her on Twitter at @marjoriecohn.

More articles by:

CounterPunch Magazine

minimag-edit

bernie-the-sandernistas-cover-344x550

zen economics

Weekend Edition
May 26, 2017
Friday - Sunday
Anthony DiMaggio
Swamp Politics, Trump Style: “Russiagate” Diverts From the Real White House Scandals
Paul Street
It’s Not Gonna Be Okay: the Nauseating Nothingness of Neoliberal Capitalist and Professional Class Politics
Jeffrey St. Clair
The ICEmen Cometh
Ron Jacobs
The Deep State is the State
Pete Dolack
Why Pence Might be Even Worse Than Trump
Patrick Cockburn
We Know What Inspired the Manchester Attack, We Just Won’t Admit It
Thomas Powell
The Dirty Secret of the Korean War
Mark Ashwill
The Fat Lady Finally Sings: Bob Kerrey Quietly Resigns from Fulbright University Vietnam Leadership Position
John Davis
Beyond Hope
Uri Avnery
The Visitation: Trump in Israel
Ralph Nader
The Left/Right Challenge to the Failed “War on Drugs”
Traci Yoder
Free Speech on Campus: a Critical Analysis
Dave Lindorff
Beware the Supporter Scorned: Upstate New York Trump Voters Hit Hard in President’s Proposed 2018 Budget
Daniel Read
“Sickening Cowardice”: Now More Than Ever, Britain’s Theresa May Must be Held to Account on the Plight of Yemen’s Children
Ana Portnoy
Before the Gates: Puerto Rico’s First Bankruptcy Trial
M. Reza Behnam
Rethinking Iran’s Terrorism Designation
Brian Cloughley
Ukraine and the NATO Military Alliance
Josh Hoxie
Pain as a Policy Choice
David Macaray
Stephen Hawking Needs to Keep His Mouth Shut
Ramzy Baroud
Fear as an Obstacle to Peace: Why Are Israelis So Afraid?
Kathleen Wallace
The Bilious Incongruity of Trump’s Toilet
Seth Sandronsky
Temping Now
Alan Barber – Dean Baker
Blue Collar Blues: Manufacturing Falls in Indiana, Ohio and Pennsylvania in April
Jill Richardson
Saving America’s Great Places
Richard Lawless
Are Credit Rating Agencies America’s Secret Fifth Column?
Louis Proyect
Venezuela Reconsidered
Murray Dobbin
The NDP’s Singh and Ashton: Flash Versus Vision
Ron Leighton
Endarkenment: Postmodernism, Identity Politics, and the Attack on Free Speech
Anthony Papa
Drug War Victim: Oklahoma’s Larry Yarbrough to be Freed after 23 Years in Prison
Rev. John Dear
A Call to Mobilize the Nation Over the Next 18 Months
Yves Engler
Why Anti-Zionism and Anti-Jewish Prejudice Have to Do With Each Other
Ish Mishra
Political Underworld and Adventure Journalism
Binoy Kampmark
Roger Moore in Bondage
Rob Seimetz
Measuring Manhoods
Edward Curtin
Sorry, You’re Not Invited
Vern Loomis
Winning the Lottery is a State of Mind
Charles R. Larson
Review: Mary V. Dearborn’s “Ernest Hemingway”
David Yearsley
The Ethos of Mayfest
May 25, 2017
Jennifer Matsui
The Rise of the Alt-Center
Michael Hudson
Another Housing Bubble?
Robert Fisk
Trump Meets the New Leader of the Secular World, Pope Francis
John Laforge
Draft Treaty Banning Nuclear Weapons Unveiled
Benjamin Dangl
Trump’s Budget Expands War on the Backs of America’s Poor
Alice Donovan
US-Led Air Strikes Killed Record Number of Civilians in Syria
Andrew Moss
The Meaning of Trump’s Wall
FacebookTwitterGoogle+RedditEmail