Beruflich Dokumente
Kultur Dokumente
29
NSA Slides Explain The PRISM Data-Collection Program, WASH. POST (June 6,
2013), http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-
documents/. The complete list of current providers is extensive, and seems to contain
almost all important internet companies. Id.
30
Id.
31
Minimization means the process through with the NSA targets individuals for
surveillance, and supposedly complies with section 702 of FISA, codified at 50 U.S.C.
1881a. According to the Electronic Frontier Foundation, Americans still have a lot to worry
about with regard to the so-called minimization. Kurt Opsahl & Mark Rumold, Reassured
by NSA's Internal Procedures? Don't Be. They Still Don't Tell the Whole Story, EFF.ORG
(June 21, 2013), https://www.eff.org/deeplinks/2013/06/recently-revealed-nsa-procedures-
likely-ones-found-unconstitutional-fisa-court.
32
Barton Gellman & Laura Poitras, U.S., British Intelligence Mining Data From Nine
U.S. Internet Companies in Broad Secret Program, WASH. POST (June 6, 2013),
http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-
10
The Snowden Disconnect
even though collecting such information without a warrant is illegal. And,
unlike the Verizon metadata collection mentioned above, PRISM actually
collects the content of the communications. For instance, PRISM collects
email, video & voice chats, VOIP calls, and social networking data.
33
This combinationthe type of data collected along with the low
threshold to collect itmeans that NSA is watching and listening to
American citizens. According to Senator Mark Udall, as long as the NSA
inadvertently or accidentally collected the information in the first place,
there is nothing [in the law] to prohibit the intelligence community from
deliberately search[ing] for the phone calls or e-mails of specific
Americans.
34
If the content-oriented and non-targeted nature of PRISM are
interesting, then so are NSAs reasons for implementing it in the first place.
According to the NSA, it built PRISM to overcome shortcomings in the
normal FISA procedure of obtaining warrants for each intercept request.
35
PRISM simultaneously takes advantage of and negates the U.S.s Internet
home field advantage. Because much of the Internets physical architecture
exists in the U.S., NSA has excellent access to that architecture. But it also
needs individual warrants for even wholly non-U.S. targets if the collection
happens on U.S. soil. That is, FISA requires a warrant to monitor foreigners
when that monitoring actually takes place on U.S. soil, even if the
communications are only incidentally traveling through the U.S. from one
internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-
d970ccb04497_story.html.
33
NSA Slides Explain The PRISM Data-Collection Program, WASH. POST (June 6,
2013), http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-
documents/; Glenn Greenwald & Ewen MacAskill, NSA Prism Program Taps in to User
Data of Apple, Google and Others, THE GUARDIAN (June 6, 2013),
http://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data.
34
Id. (quoting a Dec. 27, 2012 Senate floor debate).
35
Greenwald & MacAskill, supra note 33.
11
The Snowden Disconnect
foreign place to another.
36
According to NSA, FISA was broken because it
provided privacy protections to people who were not entitled to them.
37
Apparently, the NSA does not believe in a fundamental privacy right.
After the PRISM-related disclosures, some Internet companies sought
and obtained governmental permission to disclose some information about
the nature and number of government FISA requests. However, these so-
called transparency reports reveal only aggregated data and are therefore
not particularly telling. Facebook, for instance, received between zero and
999 requests for user data (in the form of National Security Letters) during
the last half of 2013.
3. Devouring an Entire Countrys Voice Communications: MYSTIC
In a more recent disclosure, the Snowden files provided insight into a
NSA surveillance program called MYSTIC, which is capable of recording
100% of a foreign countrys telephone calls. According to a senior program
manager, MYSTIC is somewhat like a time machineit allows retroactive
retrieval of calls for up to one month so that NSA need not identify a target
for surveillance in advance.
38
Begun in 2009 and operational in 2011, MYSTIC keeps a 30-day rolling
buffer of every single phone conversation in a target nation.
39
(The
Washington Post did not disclose the name of the target nation at the
request of U.S. officials but some suspect that nation is Iraq.)
40
Although
36
Id.
37
Id. (quoting a NSA presentation acquired through the Snowden files).
38
Barton Gellman & Ashkan Soltani, NSA Surveillance Program Reaches Into The
Past To Retrieve, Replay Phone Calls, WASH. POST (March 18, 2014),
http://www.washingtonpost.com/world/national-security/nsa-surveillance-program-
reaches-into-the-past-to-retrieve-replay-phone-calls/2014/03/18/226d2646-ade9-11e3-
a49e-76adc9210f19_story.html.
39
Id. (quoting the leaked MYSTIC PowerPoint briefing deck).
40
Glenn Greenwald, NSA Blows Its Own Top Secret Program In Order To
Propagandize, THE INTERCEPT (Mar. 31, 2014),
https://firstlook.org/theintercept/2014/03/31/nsa-worlds-blows-top-secret-program/.
12
The Snowden Disconnect
originally rolled out against only the one target nation, the most recent
secret intelligence budget suggests that MYSTIC is up and running on more
countries, or will be in the near future. And, unlike other NSA bulk-
collection programs that collect only metadata, MYSTIC is directed at voice
specifically. This cuts against the commonly-held notion that voice
communications are less suited than text for intercept and storage. Indeed,
this type of capability may be driving the NSAs need for mega data storage
facilities like the one in Bluffdale, Utah.
41
According to U.S. officials, this sort of data vacuum is highly valuable
even though almost of the data sucked up is not relevant to American
security interests. As a spokeswoman for the National Security Council put
it, new or emerging threats are often hidden within the large and complex
system of modern global communications, and the United States must
consequently collect signals intelligence in bulk in certain circumstances in
order to identify these threats.
42
Indeed, the 30-day buffer of voice
communication allows an analyst to uncover a new name or telephone
number of interest after the fact and immediately pull up a list of that
targets movements, associates, and plans.
The government also acknowledges that many of the conversations
collected involve Americans, but NSA does not try to filter those calls out
of the collection scheme. Instead, NSA defines any American conversations
as collected incidentally, which exempts those conversations from many
protections they would otherwise have. Under NSAs minimization
procedures, the names of U.S. callers are generally redacted (subject to
several wide exceptions), but the conversations themselves are still
41
Some sources, including Englands The Star and Daily Mail, have reported that the
Utah data center is code named Bumblehive. However, Fox News claims that code name
is phony. What We Know About The NSA's Secret Data Data [sic] Warehouse In Utah,
FOX NEWS (June 13, 2013), http://www.foxnews.com/tech/2013/06/13/what-we3-know-
utah-nsa-mega-data-warehouse/.
42
Gellman & Soltani, supra note 38.
13
The Snowden Disconnect
available for use in intelligence reports and briefings.
43
Such wide-ranging technological abilities were not known before the
release of the Snowden files, however, and the government criticizes the
revelation in spite of privacy concerns. Speaking about programs like
MYSTIC, the NSA claims such disclosures are highly detrimental to the
national security of the United States and of our allies, and places at risk
those we are sworn to protect.
44
Indeed, the mass collection is so important
to the government that President Obama recently rejected an independent
panels suggestion that U.S. conversations be purged from the system upon
detection.
4. Other Revelations
As noted, the depth and breadth of the Snowden files is beyond the
scope of this essay. Reporters have only released a small portion of the
cache thus far, so more revelations are very likely in the coming months and
years. Recently, the American Civil Liberties Union released The NSA
Archive, which contains the full text of all the documents released. The
Archive allows keyword searching and robust filtering of the cache.
45
Those
interested in this topic should continue to engage with the media and their
Congress delegation. Chang is coming, discussed in part II below, but what
the change will look like remains unknownbe part of the discussion.
II. THE SNOWDEN FILES: HARBINGER OF CHANGE
In January of 2014, President Obama announced that he wanted to stop
NSA from collecting call records in bulk while still preserving the agencys
ability to do so when necessary. The proposal that followed asks the FISC
43
Id.
44
Id.
45
Emily Weinrebe, Introducing the ACLU's NSA Documents Database, ACLU.ORG
(April 3, 2014), https://www.aclu.org/blog/national-security/introducing-aclus-nsa-
documents-database.
14
The Snowden Disconnect
to extend the current programs authority for three more months, but the
administration hopes to implement changes thereafter with the help of
Congress. There are three major prongs to the proposed new data collection
program.
46
First, the NSA will stop its bulk collection of Americans calling habits
and metadata. Second, the phone companies themselves will retain the bulk
metadata records and make them readily available to the NSA on a per-
order basis (rather than en masse, as happens now). Third, the changes
would also implement judicial oversight of queries to the database itself
through the FISC process.
47
(As it now stands, NSA analysts may search
through any data already collected without judicial permission to do so.)
In announcing the new proposal, President Obama acknowledged that
fears about our privacy in this age of the Internet and big data are
justified.
48
However, he also clung to the idea that mass data collection is a
useful tool in the fight against terrorism, even though, according to the N.Y.
Times, the government has been unable to point to any thwarted terrorist
attacks that would have been carried out if the program had not existed.
49
From a privacy advocates standpoint, the Presidents proposal, which
he urged Congress to implement quickly, leaves much to be desired. For
instance, the proposal refers to U.S. citizens as consumers in some
46
President Obamas original proposal in January 2014 also calls for the inclusion of a
panel of properly-cleared public advocates who can represent the public interest, but only
when the FISA court encounters a novel issue of law. Brian Fung, Everything You Need To
Know About Obamas NSA Reforms, In Plain English, WASH. POST (Jan. 17, 2014).
However, the administrations fact sheet about the reforms, from March 2014, does not
include that proposal.
47
Zeke J. Miller, Obama Calls for Congress to Pass NSA Reform Quickly, TIME.COM
(Mar. 25, 2014), http://time.com/37173/obama-calls-for-congress-to-pass-nsa-reform-
quickly/.
48
Id.
49
Charlie Savage, Obama to Call for End to N.S.A.s Bulk Data Collection, N.Y.
TIMES (Mar. 24, 2014), http://www.nytimes.com/2014/03/25/us/obama-to-seek-nsa-curb-
on-call-data.html.
15
The Snowden Disconnect
instances
50
and the Electronic Frontier Foundation rates the proposal at 3.5
out of 12. Additionally, why does Congress need to legislate these data
collection and access reformsthe overreach was instituted exclusively
through executive branch powers, should the executive also rein itself in?
51
However, the proposal of any reform at all comes after many months of
governmental posturingthe government vigorously asserted that NSAs
actions were completely legal, necessary, and righteous. Therefore, these
proposals, modest as they are, signal a significant change in the post-
Snowden-revelations rhetoric.
III. ANALYSIS
This part analyzes the diametrically opposed reactions to the Snowden
files that occur at either side of the spectrum. The differences are set forth in
subpart A. Then, subpart B reconciles those views by suggesting that, when
both sides actually engage in a meaningful conversation, the good results of
Snowdens acts far outweigh the bad.
A. Two Views, One Set of Files
Wide disparity exists across the United States in the response that
American citizens have to Mr. Snowden and his disclosures. On one end of
the spectrum, the security hawks present leaking the files as a traitorous act
with grave national security implications. At the extreme, some claim that
the leaks will lead to American deaths.
52
On the other side, privacy
advocates view the disclosures as essential information concerning
governmental overreach and constitutional violation. In their view, such
50
Peter Van Buren, Dissecting Obama's Proposed NSA Reforms, HUFFPOST.COM
(Mar. 28, 2014), http://www.huffingtonpost.com/peter-van-buren/dissecting-obamas-
propose_b_5048694.html.
51
The pessimistic view is that this is simple smokescreen for political legitimacy.
52
Julia Angwin, NSA Chief: Snowden Leaks Will Cause Deaths, WSJ.COM (Oct. 10,
2013), http://blogs.wsj.com/washwire/2013/10/10/nsa-chief-snowden-leaks-will-cause-
deaths/.
16
The Snowden Disconnect
knowledge empowers society to make cogent choices concerning privacy
and security and Snowden should be hailed, not condemned.
However, the current Snowden-based dialogue generally sees little
conversation taking placeboth positions are talking past each other, not
to each other. This gives ride to an interesting, if not altogether unique,
situation. And until there is some remedy to it, there can be little progress
toward reconciling the interests of the two groups. Without a meaningful
dialogue, both sides will continue to dig in their heels and take positional,
rather than interest-based, postures.
Positional thinking is black and whiteSnowden is a bad guy or a good
guybut fails to understand the connection between the position and the
interests that underlie it. That is, security hawks forget that their interest is
in national security, not in trampling on the Fourth Amendment. Such a
positional approach ignores the interests of the other side (e.g., privacy
rights) and does not allow a meaningful conversation to take place.
Ultimately, this lack of conversation stems from the two diametrically
opposed ways of interpreting the Snowden disclosures. That is, the two
positions are not in conversation because they are not using the same lens;
each position views the Snowden revelations in completely different light.
To explain, this essay groups Snowdens revelations in two distinct ways
the red lens and the blue lens.
Through the red lens, Snowdens revelations have done damage to the
U.S. security apparatus. Take disclosure of NSAs MYSTIC program,
discussed supra Part I.B.3, for example. Assuming that MYSTIC is in fact
targeting Iraq, and Iraq did not know about the program, one can easily
imagine the damage done. Terrorists and security threats within that country
are now on notice that their communications are completely compromised;
before the Snowden files, they probably were not taking appropriate
precautions because they did not even know they were under surveillance.
In this view, it is not particularly important that some American
17
The Snowden Disconnect
conversations might get swept up among the mass of Iraqi calls, and the
efficacy of NSAs MYSTIC program is severely compromised.
Through the blue lens, Snowdens revelations simply exposed a vast and
unknown security apparatus. For instance, the PRISM program and Verizon
metadata-collection disclosures, discussed supra Parts I.B.12, tell the story
of a government agency gone astray. The NSA, an agency that supposedly
only operated outside of the U.S., had instead turned its eyes and ears on the
homelandsurreptitiously collecting data about U.S. citizens that were on
American soil. Adding to that baseline, the fact that many large companies
seemed to be complicit, whether knowing or not, in the NSAs data
collection meant to many people that Snowden revealed a military-
industrial complex that disregards large sections of the Constitution.
This major and fundamental difference trickles down into other aspects
of the Snowden affair and the medias portrayal thereof. The position that a
person takes on the Snowden revelations depends on which version of the
Snowden account, illustrated above, that she accepts. For example, people
infer Snowdens intentions based on the color of their own personal lens.
Those seeing red portray Snowden as an egotistic, self-interested attention
seeker who cares little for the safety of the United States. The blue-lens
people, though, portray him as a moral and principled patriot who risked it
all because of his convictions.
Two reasonable people can take radically different positions on the
whole affair based simply on their own biaselevating one view
automatically subjugates the other. In this way, privacy advocates and
security hawks are really not even part of the same conversation.
B. The Disconnects, Reconnected
Understanding the viewpoint disconnect illustrated above informs the
associated disconnect between Snowden the hero versus Snowden the
traitor. Because the security hawks only see the harm that Snowden did,
18
The Snowden Disconnect
they call for his prosecution. Privacy advocates take the opposite line,
concluding that his disclosures fueled democratic debate and cast light into
a dark area of government actionand that Snowden should therefore be
indemnified. However, arriving at a real answerwhether Snowden is a
hero or a traitorrequires rejecting the notion that this is a positional black
or white debate, an either/or question. Indeed, the only way to find the
right answer is to balance the benefits produced by the Snowden files
against the harms. And then, to apply that analysis to United States
democracy.
So far, the government has been unwilling to engage in such a balanced
inquiry. Indeed, President Obamas proposed reforms to the NSAs bulk
data collection policy do not even acknowledge the Snowden files as the
precursor (or even a precursor) to the proposal. It is disingenuous for the
government to disclaim or ignore such an obvious connection; one must
infer that President Obama had some purpose for avoiding it. One obvious
purpose for avoiding a direct discussion of the Snowden-to-reform
connection is to maintain the ideological disconnect between the two.
53
Of
course, maintenance of the disconnect is an illegitimate policy rationale.
This is a sort of political doublethink. If the Snowden files are not the
impetus for these proposed changes, then the executive can take credit for
acting on its own to improve Americans privacy protections (even though,
facially, that is absurd). The intertwined result is that the executive will
continue to push for Snowdens extradition and prosecution.
54
Though of
53
A less nefarious purpose might be to avoid compromising the criminal case against
Snowden. However, that purpose still places a position (Snowden is guilty!) above an
interest (national security may require some invasion of privacy) and fails to persuade in a
representational democracy that vaunts the marketplace of ideas.
54
See, e.g., E.L., Treachery And Its Consequences, THE ECONOMIST (Jan. 10, 2014),
http://www.economist.com/blogs/democracyinamerica/2014/01/snowden-case-prosecution;
Grant Gross, Petitions Call On US Government To Leave Snowden Alone, PCWORLD
(Mar. 25, 2014), http://www.pcworld.com/article/2111700/petitions-call-on-us-
government-to-leave-snowden-alone.html.
19
The Snowden Disconnect
course these positions are fundamentally inconsistent, they allow the
executive to simultaneously play both sidesappease the privacy advocates
but remain tough on terrorism for the security hawks.
This also allows the executive to avoid answering some of the hard
questions. For instance, Director of National Intelligence James Clapper
recently admitted that the NSA investigates US persons without
warrants.
55
Even if such actions were legal, which is highly suspect, then
Clapper still lied about his agencys actions to directly to Congress. Thus
far, there have been no calls for punishment. What is the lesson here, that
lying to cover up eviscerating the Constitution is better than telling the truth
to protect it?
This, of course, is highly hypocritical. Is it really breaking the law to tell
the public that one of its leaders is breaking the law? Would Deep Throat
have been prosecuted for revealing the Watergate scandal to The
Washington Post?
These questions cannot be answered without an honest accounting of
the Snowden files, and an honest accounting requires balancing the good
with that bad, as discussed above. Here, the balance is clear.
Our country has a long history of rejecting the overreach of authority. It
is why and how we exist. Henry Thoreau and other abolitionists rightly
detested slavery and refused to pay the taxes that supported it. After being
jailed for his conscience, Thoreau wrote Civil Disobedience and argued
powerfully that individuals cannot allow governments to overrule and that
citizens have a duty to avoid being agents of injustice. Martin Luther King,
Jr. went one step further: one has a moral responsibility to disobey unjust
laws. Indeed, an unjust law is no law at all.
Patrick Henry wanted either liberty or death and nothing in between; the
55
Spencer Ackerman & James Ball, NSA performed warrantless searches on
Americans' calls and emails Clapper, THE GUARDIAN (Apr. 1, 2014),
http://www.theguardian.com/world/2014/apr/01/nsa-surveillance-loophole-americans-data.
20
The Snowden Disconnect
Declaration of Independence itself, codified in the Constitution, recognizes
the unalienable right for individuals to be secure in their persons and
effects. Indeed, one of the cases belli for the American Revolution was the
British Crowns issuance of writs of assistance, which were generalized
warrants akin to National Security Letters from the FISC. Indeed, that
grievance led directly to the Fourth Amendment itself.
Benjamin Franklin is oft quoted with the enduring statement, They
who would give up essential Liberty, to purchase a little temporary Safety,
deserve neither Liberty nor Safety.
56
Here, though, the government is
trying to take liberty in order to give safety, without an accurate accounting
of that transaction. Snowdens revelations are a glimpse at the national
blotter, remind us that the governments power derives from its citizens
liberty, not the other way around, and gives the nation a chance to take back
the liberty that it did not even know it had lost.
CONCLUSION
In the end, the lack of any honest accounting from the executive is itself
proof that the Snowden files have done more good than harm. If contrary
facts existed, surely the government would have produced them by now. As
it stands, the Snowden files have done far more good than they have done
harm. It is not congruent for the government to simultaneously engage in
fixing the NSAs surveillance apparatus while calling for Snowdens
prosecution. The ends, in this case, have justified the means. Like Daniel
Ellsberg, history will look favorably back at Edward Snowden and his trove
of security revelations.
Therefore, the U.S. needs to reconsider its position on this issue,
particularly in terms of the pending criminal prosecution of Snowden. At
56
Benjamin Franklin, Pennsylvania Assembly: Reply to the Governor,
FRANKLINPAPERS.ORG,
http://franklinpapers.org/franklin/framedVolumes.jsp?vol=6&page=238a (capitalization in
original) (last visited April 10, 2014).
21
The Snowden Disconnect
the very least, the U.S. should extend Snowden the same protections that he
would have enjoyed under the Whistleblower Protection Act
57
(had he not
been a contractor). The U.S. should certainly drop both Espionage Act
charges, and continue its case on the Theft of Government Property charge
alone, if at all. However, if the government is serious about restoring trust,
which is essential both to American experiment and to national security, it
should drop all charges against Snowden. Leaving that distraction and
hypocrisy behind will be good for the country and good for the world,
allowing the United States to focus instead of implementing meaningful
reforms that address both security and privacy interests.
* * *
57
Pub. L. 101-12, 5 U.S.C. 12011222. The Whistleblower Protection Act (WPA)
provides statutory protections for federal employees who engage in whistleblowing
making a disclosure evidencing illegal or improper government activities. See L. Paige
Whitaker, RL33918, The Whistleblower Protection Act: An Overview, Cong. Res. Serv.
(2007), available at http://www.fas.org/sgp/crs/natsec/RL33918.pdf.
22