View Single Post
Old 12-23-2005, 01:19 PM   #302 (permalink)
Elphaba
Deja Moo
 
Elphaba's Avatar
 
Location: Olympic Peninsula, WA
It would appear that getting a warrant from FISA was not possible, because Bush had the NSA monitoring large blocks of phone traffic. I don't see how a fishing expedition could be considered legal.

http://www.truthout.org/docs_2005/122305K.shtml

Quote:
Wiretaps Said to Sift All Overseas Contacts
By Charlie Savage
The Boston Globe

Friday 23 December 2005

Vast US effort seen on eavesdropping.

Washington - The National Security Agency, in carrying out President Bush's order to intercept the international phone calls and e-mails of Americans suspected of links to Al Qaeda, has probably been using computers to monitor all other Americans' international communications as well, according to specialists familiar with the workings of the NSA.

The Bush administration and the NSA have declined to provide details about the program the president authorized in 2001, but specialists said the agency serves as a vast data collection and sorting operation. It captures reams of data from satellites, fiberoptic lines, and Internet switching stations, and then uses a computer to check for names, numbers, and words that have been identified as suspicious.

"The whole idea of the NSA is intercepting huge streams of communications, taking in 2 million pieces of communications an hour," said James Bamford, the author of two books on the NSA, who was the first to reveal the inner workings of the secret agency.

"They have a capacity to listen to every overseas phone call," said Tom Blanton, director of the National Security Archive at George Washington University, which has obtained documents about the NSA using Freedom of Information Act requests.

The NSA's system of monitoring e-mails and phone calls to check for search terms has been used for decades overseas, where the Constitution's prohibition on unreasonable searches does not apply, declassified records have shown.

But since Bush's order in 2001, Bamford and other specialists said, the same process has probably been used to sort through international messages to and from the United States, though humans have never seen the vast majority of the data.

"The collection of this data by automated means creates new privacy risks," said Marc Rotenberg, executive director of the Electronic Privacy Information Center, a watchdog group that has studied computer-filtered surveillance technology through Freedom of Information Act lawsuits.

Among the risks, he said, is that the spy agency's computers will collect personal information that has no bearing on national security, and that intelligence agents programming those computers will be tempted to abuse their power to eavesdrop for personal or political gain.

But even when no personal information intercepted by the NSA's computers make it to human eyes and ears, Rotenberg said, the mere fact that spy computers are monitoring the calls and e-mails may also violate the Fourth Amendment. The Supreme Court has never ruled on whether automated surveillance of phone calls and e-mails, without a warrant, is constitutional.

The closest comparisons, legal specialists said, are cases challenging the use of dogs and infrared detectors to look for drugs without a warrant. The Supreme Court approved the use of drug-sniffing dogs to examine luggage in an airport, but said police could not use infrared scanners to check houses for heat patterns that could signal an illegal drug operation.

"This is very much a developing field, and a lot of the law is not clear," said Harvard Law School professor Bill Stuntz.

President Bush and his aides have refused to answer questions about the domestic spying program, other than to insist that it was legal. Attorney General Alberto Gonzales this week said the program only targeted messages "where we have a reasonable basis to conclude" that one of the parties is affiliated with Al Qaeda.

And some legal scholars have maintained that a computer cannot violate other Americans' Fourth Amendment rights simply by sorting through their messages, as long as no human being ever looks at them.

Alane Kochems, a lawyer and a national security analyst at the conservative Heritage Foundation, said, "I don't think your privacy is violated when you have a computer doing it as opposed to a human. It isn't a sentient being. It's a machine running a program."

But Yale Law School professor Jack Balkin said that Fourth Amendment privacy rights can still be violated without human contact if the NSA stores copies of everyone's messages, raising the possibility that a human could access them later. The administration has not revealed how long the NSA stores messages, and the agency has refused to comment on the program.

Balkin added that as technology becomes ever more sophisticated, any legal distinction between human agents and their tools is losing meaning. Under the theory that only human beings can invade people's privacy, he said, the police "could simply use robots to do their dirty work."

In 1978, following revelations that President Nixon had used the NSA to spy on his domestic enemies, Congress enacted a law making it illegal to wiretap a US citizen without permission from a secret national security court. The court requires the government to show evidence that the target is a suspected spy or terrorist.

Under the 1978 law, NSA officials have had to obtain a warrant from the secret court before putting an American's information into their computers' search terms.

The restrictions largely limited NSA to collecting messages from overseas communications networks, but some Americans' messages were intercepted before the 2001 terrorist attacks.

Occasionally, the interception was deliberate. In April 2000, the NSA's then-director, General Michael Hayden, told Congress that since 1978 "there have been no more than a very few instances of NSA seeking [court] authorization to target a US person in the United States."

More often, the interception was accidental. Because American international calls travel through foreign networks, some of which are monitored by the NSA, the agency's computers have sifted through some American international messages all along.

"Long before 9/11, the NSA gathered from the ether mountains of [overseas] phone calls and e-mail messages on a daily basis," said Columbia Law School professor Deborah Livingston. "If you have such an extensive foreign operation, you'll gather a large amount of phone traffic and e-mails involving Americans. That's something we've lived with for a long time."

But Bush's order cleared the way for the NSA computers to sift through Americans' phone calls and e-mails.

According to a New York Times report last week, Bush authorized the NSA's human analysts to look at the international messages of up to 500 Americans at a time, with a changing list of targets.

Hayden, now the deputy director of national intelligence, told reporters this week that under Bush's order, a "shift supervisor" instead of a judge signs off on deciding whether or not to search for an American's messages.

The general conceded that without the burden of obtaining warrants, the NSA has used "a quicker trigger" and "a subtly softer trigger" when deciding to track someone.

Bamford said that Hayden's "subtly softer trigger" probably means that the NSA is monitoring a wider circle of contacts around suspects than what a judge would approve.
Elphaba is offline  
 

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360