Fixing surveillance

COMMENTARY Defense

Fixing surveillance

Jan 27, 2006 3 min read
COMMENTARY BY
James Jay Carafano

Senior Counselor to the President and E.W. Richardson Fellow

James Jay Carafano is a leading expert in national security and foreign policy challenges.

The controversy over whether the president has the power to authorize the National Security Agency to monitor international communications with terrorists obscures a simple fact: The Foreign Intelligence Surveillance Act (FISA) is no longer adequate.


Passed in 1978, FISA didn't anticipate the development of global communication networks or advanced technical methods for intelligence gathering. Congress should amend FISA to provide for programmatic approvals of cutting-edge technologies -- including automated monitoring of suspected terrorist communications.


While pundits and politicians are already passing judgment on the president's actions, many of their comments are premature. Not enough is known yet to justify many of the factual assertions and legal conclusions being offered. And, because of the highly classified nature of the methods used in this particular program, the only proper forum for reviewing these actions in detail is in the appropriate congressional committees with suitable safeguards for national security and with the full disclosure of all relevant documents and briefings by the Bush administration.


Nevertheless, what is clear is that the existing FISA procedures are themselves inadequate to authorize the use of advanced technical methods against global terrorist threats. The critical question being overlooked in the partisan bickering is whether there's a better way to stay one step ahead of the terrorists as well as protect the liberties of American citizens. There is.


FISA is cumbersome. It requires individual application to a judge for authorization to target a specific individual or source based on showing a connection to a foreign power or foreign terrorist. Although FISA permits applications to be made after the fact in certain cases, it doesn't provide a mechanism for programmatic pre-approval of technical methods like automated data analysis.


Automated screening can monitor data to uncover terrorist connections without human beings ever looking at anybody's emails or listening in on their phone calls. Only when the computer identifies suspicious connections or information do humans get involved. What's needed is a legal mechanism for pre-approving such methods so that when threats are identified, analysts can move quickly to provide the kind of "actionable intelligence" that can prevent terrorist acts. FISA can't do that.


Further, FISA applies to foreign intelligence collection conducted "within the United States" or against "U.S. persons." However, advances in information technology together with the borderless nature of terrorist threats and global communications has made place-of-collection and U.S. personhood an increasingly unworkable basis for controlling the collection of intelligence. Indeed, it may no longer even be technically possible to determine exactly when a communication is taking place "within the United States" and no practical means exists to determine if a particular participant is a U.S. person or not until after further investigation. FISA does not account for this.


Consider the following case: A computer is recovered in Afghanistan containing Pakistani e-mail addresses and phone numbers used by al Qaeda. NSA is told to exploit this intelligence. Assuming that the interception isn't "within the United States" and is not intentionally targeting a "U.S. person," FISA isn't applicable and NSA has full legal authority to monitor the communications. That's OK.


The debate begins when NSA monitoring uncovers a U.S. connection, like a U.S. person or phone number communicating with the foreign source. Under existing rules, U.S. person information collected collaterally in a legitimate foreign intercept is subject to "minimization" (shielded from further disclosure) and the U.S. person cannot be "targeted" without a warrant. That's OK, too.


The problem arises when the initial "monitoring" is conducted by technical or automated means that use computer analysis to identify connections, key words or patterns. Only those communications matching these criteria are then selected for further analysis. Critics of the current program contend that in all cases where a U.S. person or U.S. source communication is "intercepted," a warrant is required.


But how would this work for communications that are technically intercepted and analyzed but not selected for further investigation? Would these critics propose that retroactive FISA warrants be required for all "collection" of U.S. person information even if analysis showed those communications to be of no interest? If so, the very fact that they were found to be of no interest would preclude issuing a warrant.


Yet, without monitoring all the inbound and outbound traffic from a known terrorist communication node -- like Abu Musab Zarqawi's cell phone number -- no intelligence can be gained.


FISA must be amended to enable programmatic approvals for automated monitoring programs, since authorization for practical reasons cannot be sought on an individual basis even after the fact. With programmatic approval for the initial automated screening, existing FISA warrant procedures could then be followed for targeted monitoring of identified U.S. persons or sources in appropriate cases where follow-up investigation is needed.


By all means, let us debate who should have the authority to authorize and oversee such intelligence-gathering programs. But amid the partisan bickering, let's not forget that someone must do it -- and that the existing mechanisms are inadequate.


K. A. (Kim) Taipale is the executive director of the Center for Advanced Studies in Science and Technology Policy.  James Carafano is a senior research fellow for defense and homeland security at The Heritage Foundation.

First appeared in The Washington Times

Exclusive Offers

5 Shocking Cases of Election Fraud

Read real stories of fraudulent ballots, harvesting schemes, and more in this new eBook.

The Heritage Guide to the Constitution

Receive a clause-by-clause analysis of the Constitution with input from more than 100 scholars and legal experts.

The Real Costs of America’s Border Crisis

Learn the facts and help others understand just how bad illegal immigration is for America.