{"id":4330,"date":"2014-03-03T15:14:58","date_gmt":"2014-03-03T20:14:58","guid":{"rendered":"http:\/\/journals.law.harvard.edu\/nsj\/?p=4330"},"modified":"2014-03-03T15:14:58","modified_gmt":"2014-03-03T20:14:58","slug":"monthly-national-security-forum-february-2014","status":"publish","type":"post","link":"https:\/\/journals.law.harvard.edu\/nsj\/2014\/03\/monthly-national-security-forum-february-2014\/","title":{"rendered":"Monthly National Security Forum: February 2014"},"content":{"rendered":"<p><em>The Harvard National Security Journal is launching a new initiative that will allow law students, legal scholars, and professionals to comment on some of the most pressing national security issues as they happen. Each month, panelists will comment on a question posed by the staff of the National Security Journal, presenting unique and informed opinions from a variety of backgrounds and experiences.<\/em><\/p>\n<p>The question for February 2014:<\/p>\n<p><strong>What,<\/strong><b> if any, metadata should the government be allowed to collect? In what circumstances?<\/b><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Michael Dziuban<\/strong> is a 2L at Harvard Law School. He has served as a Senior Editor and a Staff Editor for the <i>Harvard National Security Journal<\/i>.<\/p>\n<p>Given appropriate circumstances, there should be no limits on the kinds of metadata the government should be able to collect and analyze. We live in a \u201cwired\u201d world in which people use multiple forms of communication every day. As a result, any limit on what forms of communication the government is allowed to monitor would be arbitrary. Moreover, such a limit would be impractical: with the knowledge that the government only collects phone and email metadata, for example, people whom the government has reason to monitor could escape surveillance by limiting themselves to other media.<\/p>\n<p>But what exactly are those appropriate circumstances, under which the government should be allowed to collect metadata in the first place? I believe that FISA should continue to apply to surveillance against foreign governments and their agents and employees who are non-U.S. persons. However, when it comes to non-state actors, the legal standard for authorizing metadata collection should be higher. Such collection should only be permitted when the government has probable cause to believe that the individual whose information is sought is connected to a prior terrorist act that is the subject of investigation, or to a potential future attack that the government is trying to prevent. In other words, it is time to take terrorism by non-state actors outside of FISA, and to start subjecting it to ordinary law enforcement standards and Fourth Amendment protections.<\/p>\n<p>Foreign intelligence-gathering has for most of history been a practice by which governments gain information about each other. Indeed, agencies like the NSA and CIA were created in an era in which states, or popular movements seeking to overthrow states, were the primary drivers of global politics. Terrorism has altered that arrangement significantly. Now, states don\u2019t threaten each other so much as terrorists threaten states. But the criminal law as a tool for dealing with private actions against states and their citizenries is just as old, if not older, than the tool of foreign intelligence-gathering. The fact that non-state actors now threaten states doesn\u2019t mean we can treat the former like the latter for intelligence-gathering purposes. Vast disparities between individual power and state power still exist. Such disparities are the bailiwick of criminal law and procedure, which should constrain intelligence-gathering\u2014not the other way around.<\/p>\n<p>How can counterterrorism be just another criminal law enforcement effort when it occurs\u2014as it often must\u2014outside of U.S. territory? Three answers come to mind. First, rather than be an effort at U.S. global policing, counterterrorism should be a matter of local law enforcement. The United States can still form partnerships with governments to help catch and prosecute terrorists, even if the United States isn\u2019t the government doing the prosecuting. Second, many terrorist threats exist not just against U.S. persons abroad, but also against U.S. interests like military bases, where any terrorism crime committed would likely fall under U.S. jurisdiction. Third, and most importantly, constitutional limitations should constrain U.S. Government efforts against non-state individuals no matter where those individuals are or whether they are U.S. persons. Constitutional protections limit how our government mobilizes and uses its resources against individuals. Since all humans ought to be able to enjoy the rights the Constitution embodies, whether or not the rights attach shouldn\u2019t depend on the identity or location of the persons the government is targeting.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Taylor Bates<\/strong> is a 2L from Williston, Vermont. \u00a0At HLS, he is active in NSJ and serves as President of the HLS Democrats.<\/p>\n<p>Journalist Michael Kinsley <a href=\"http:\/\/www.cnn.com\/ALLPOLITICS\/1997\/03\/10\/time\/kinsley.html\" target=\"_blank\">once wrote<\/a>, \u00a0\u201cthe scandal isn&#8217;t the illegal behavior \u2013 the scandal is what&#8217;s legal.\u201d\u00a0 When it comes to NSA collection of metadata, proponents of the NSA position can claim legitimacy for the program\u2014it was authorized under Section 215 of the PATRIOT Act, reported to the Intelligence Committees, apparently constitutional under the Pen Register cases, and subject to oversight by the Foreign Intelligence Surveillance Court.\u00a0 So why does it feel so scandalous?<\/p>\n<p>Unlike many encroachments on civil liberties, the metadata program falls on every single American.\u00a0 True, proponents of the program will say that the database is rarely searched and only on reasonable, articulable suspicion of a terrorist connection\u2014but the program\u2019s secrecy undermines public trust in these assurances, and knowledge that the NSA has collected all phone records implies that government surveillance has cast at least a cursory glance over everyone.<\/p>\n<p>To those familiar with the state of civil liberties in America, such a cursory glance might feel insignificant compared to the more serious violations occurring every day.\u00a0 The fact that this surveillance is so broad, however, makes reform of the program an important coalition-building tool for civil libertarians and an important opportunity for the Obama administration to restore trust in government.<\/p>\n<p>Given that the program is relatively unobtrusive when used lawfully, greater controls on who can access the database, more notification and recordkeeping of when the database is accessed, and regular audits of the system will go far in establishing public trust.\u00a0 A public advocate before the Foreign Intelligence Surveillance Court and public disclosure of which metadata is being collected will be other important steps.\u00a0 True, more transparency could instruct terrorists in how to evade notice, but given that these programs have little evidence of stopping terrorist plots and an outsized impact on Americans\u2019 trust in their government, a this balance seems a reasonable one.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Zoe Bedell <\/strong>is currently a 1L who served in the Marine Corps and then worked in investment banking before coming to law school.<strong><br \/>\n<\/strong><\/p>\n<p><em>Not \u2018If,\u2019 But \u2018How\u2019: A Plea for More Transparency and Effective Oversight<\/em><\/p>\n<p>The fact that the government has been collecting metadata is not actually new to Americans. USA Today first <a href=\"http:\/\/usatoday30.usatoday.com\/news\/washington\/2006-05-10-nsa_x.htm\" target=\"_blank\">reported<\/a> on this program in 2006. The recent Presidential Review Group on Intelligence and Communications Technologies <a href=\"http:\/\/perma.cc\/UCH3-NHLN?type=pdf\" target=\"_blank\">pointed out<\/a> that the government has required phone companies to retain this data for consumer protection purposes since the 1980\u2019s. Courts have ruled since at least the 1960s that Americans had <a href=\"http:\/\/perma.cc\/U9CG-DUFK\" target=\"_blank\">no expectation of privacy<\/a> associated with these call records. And Americans <a href=\"http:\/\/www.people-press.org\/2013\/06\/10\/majority-views-nsa-phone-tracking-as-acceptable-anti-terror-tactic\/\" target=\"_blank\">actually generally (grudgingly) approve<\/a> of the programs. So while there is certainly still a valid question of <i>whether<\/i> the government should collect this data, these facts suggest that the NSA should spend a bit more time thinking about the <i>how<\/i>.<\/p>\n<p>The current system isn\u2019t working. While it might have been easier for the NSA to operate in complete secrecy essentially since its founding, that approach has now generated a sense of <a href=\"http:\/\/www.people-press.org\/2013\/07\/26\/few-see-adequate-limits-on-nsa-surveillance-program\/\" target=\"_blank\">distrust and unease<\/a> as Snowden\u2019s stolen materials slowly trickle onto the internet. With every revelation, the American public learns of more privacy violations that undermine our faith in the system. It\u2019s difficult understand the value of the program when we\u2019re inundated with stories of everything from <a href=\"http:\/\/www.washingtonpost.com\/blogs\/the-switch\/wp\/2013\/08\/24\/loveint-when-nsa-officers-use-their-spying-power-on-love-interests\/\" target=\"_blank\">LOVEINT<\/a>, to the collection of <a href=\"http:\/\/www.theguardian.com\/world\/2014\/feb\/27\/gchq-nsa-webcam-images-internet-yahoo\" target=\"_blank\">sexually-explicit webcam images<\/a>, to the NSA\u2019s <a href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say\/2013\/10\/30\/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html\" target=\"_blank\">infiltration of the Yahoo! and Google systems<\/a> without their knowledge.<\/p>\n<p>If the NSA wants to retain its data collection capabilities and the trust of the American people, it needs to get ahead of these stories, which aren\u2019t likely to stop any time soon. Continuing to insist on total secrecy \u2013 knowing that at least some of the material is going to end up all of the news anyway \u2013 is both silly and self-defeating. A meaningful assessment of what must truly stay secret, followed by a comprehensive public report sharing what in many ways is already public, would do more than the thin <a href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/nsa-statements-to-the-post\/2013\/08\/15\/f40dd2c4-05d6-11e3-a07f-49ddc7417125_story.html\" target=\"_blank\">statements<\/a> that seem to constitute the response strategy thus far.<\/p>\n<p>No internally generated report or statement will completely quiet concerns, however, which is why the NSA should also facilitate a meaningful system of external review and oversight. The President and the NSA like to point out that their programs are <a href=\"http:\/\/www.theverge.com\/2013\/6\/7\/4406416\/president-obama-on-nsa-spying-congress-has-known-about-it-and\" target=\"_blank\">supervised<\/a> by all three branches of the government. But these systems have not prevented <a href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/nsa-broke-privacy-rules-thousands-of-times-per-year-audit-finds\/2013\/08\/15\/3310e554-05ca-11e3-a07f-49ddc7417125_story.html\" target=\"_blank\">repeated and expansive<\/a> violations of privacy policies. Members of the judicial branch <a href=\"http:\/\/www.washingtonpost.com\/politics\/court-ability-to-police-us-spying-program-limited\/2013\/08\/15\/4a8c8c44-05cd-11e3-a07f-49ddc7417125_story.html\" target=\"_blank\">acknowledge their own limitations<\/a> in effectively supervising and preventing breaches. Furthermore, Congressional oversight is <a href=\"http:\/\/www.theguardian.com\/commentisfree\/2013\/aug\/04\/congress-nsa-denied-access\" target=\"_blank\">limited to a few members<\/a> of relevant committees, and even those committee members <a href=\"http:\/\/www.theguardian.com\/commentisfree\/2013\/sep\/27\/ron-wyden-nsa-systematically-deceived\" target=\"_blank\">aren\u2019t comfortable<\/a> with the NSA\u2019s programs.<\/p>\n<p>Proposed reforms such as appointing a privacy advocate for the FISC and requiring judicial approval to access and view data would begin the process of establishing effective and credible oversight mechanisms. Privacy violations should be regularly reported and made public, along with the measures taken to fix the problems, when possible. The NSA should also allow service providers to share certain amounts of information with the public about how our call data is shared and used.<\/p>\n<p>It\u2019s nearly impossible to propose solutions from the outside without a full understanding of the program and its capabilities. But so far, the government\u2019s piecemeal and reluctant response has done little to address Americans\u2019 valid concerns.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Tony Carr<\/strong> is a 1L at Harvard Law School with an interest in the intersection of law and policy in the area of national security. \u00a0He is also a veteran of the U.S. Air Force and an opinion writer on defense and veteran issues.<\/p>\n<p>Until Edward Snowden\u2019s recent disclosures, Americans had no idea records of their phone calls were being indiscriminately swept up and stored indefinitely by their own government.\u00a0 Upon learning of this practice, most registered unease, and not without good cause. The popular intuition &#8212; that bringing the tools of espionage to bear on ordinary citizens is dangerous and unjustifiable under all but extreme circumstances &#8212; is an important one. Notwithstanding the insistence by security officials that they need this program to keep the country safe, it is mutually exclusive with the fundamental vision of the Constitution and cannot be countenanced under any but the most extreme circumstances of imminent and specific threat.\u00a0 There are two good reasons for this.<\/p>\n<p>The first is lenity, which holds that irreconcilable ambiguity should be resolved in favor of the defendant.\u00a0 This is a canonical expression of the Constitutional vision that citizens must be given the benefit of the doubt in close-call disputes with government, especially when such disputes involve the suspension of liberty. When it comes to the NSA\u2019s metadata program, the applicable jurisprudence is contradictory.\u00a0 Key Supreme Court decisions from the 1970s hold that citizens have no expectation of privacy in their phone records, given that those records are knowingly shared with service providers.\u00a0 But this philosophy is upended by changes in technology that allow government to collect, store, and search practically unlimited amounts of data, and by an anti-terror context that gives government unprecedented latitude to prevail on service providers for investigative assistance.\u00a0 Given the jurisprudential ambiguity raised by these contextual changes, lenity dictates resolution in favor of ordinary citizens.<\/p>\n<p>The second reason the program should be used only in emergencies involves the basic expectations of citizens. In the context of its authoring and insertion into the Bill of Rights, the Fourth Amendment stands for giving ordinary Americans stable expectations concerning when their freedom from government intrusion might be subject to compromise. Even if the Amendment is seen to allow the NSA program on the grounds that citizens have no reasonable expectation of privacy in their phone records, this would offend the overarching principle that even if not legally constrained, government must limit its intrusive actions to the bounds of discrete purpose and necessity.\u00a0 Collection of a specific citizen\u2019s data predicated on a specific objective is qualitatively different than government warehousing oceans of data for un undefined or prospectively vague purposes. \u00a0The latter sets too low a bar for government, leaving the associations of ordinary citizens too vulnerable to mischief, which is a common handmaiden of power. Especially power free to operate behind a veil of secrecy.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Harvard National Security Journal is launching a new initiative. Each month, panelists will comment on a question posed by the NSJ staff. This month&#8217;s topic: metadata. <i>Image courtesy of NASA.<\/i> <\/p>\n","protected":false},"author":20,"featured_media":4338,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[32,24,1],"tags":[],"class_list":["post-4330","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-monthly-national-security-forum","category-online","category-uncategorized"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2014\/03\/Eagle_Image.jpg?fit=640%2C419&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/peZtUX-17Q","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/posts\/4330","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/comments?post=4330"}],"version-history":[{"count":0,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/posts\/4330\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/media\/4338"}],"wp:attachment":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/media?parent=4330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/categories?post=4330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/tags?post=4330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}