EFF Grabs Two More Docs From The NSA, Detailing Expanded Post-9/11 Surveillance Powers And Section 702 Justifications

from the terrorism-still-trumps-4th-amendment-protections dept

Thanks to its ongoing FOIA lawsuit against the NSA, the EFF has managed to secure another set of documents detailing the legal rationalizations behind the intelligence agency's "collect it all" approach, as well as the FISA's courts approval of expanded surveillance powers in the wake of the 9/11 attacks.



The documents were supposed to be released in January, but the NSA ignored a direct court order and unceremoniously dumped them in the EFF's lap late in the evening of March 2nd.



The so-called "raw take" document dates back to July 2002 and shows the FISA court granting the NSA, FBI and CIA to continue increased surveillance powers and expanded information sharing.

This matter is before the Court on the motion of the United States, filed by James A. Baker, Counsel for Intelligence Policy and approved by the Attorney General of the United States, to modify the minimization procedures already approved and in use in the above captioned cases since January 1, 2001: to authorize the Federal Bureau of Investigation (FBI) to disseminate to the Central Intelligence Agency (CIA) and to the National Security Agency (NSA) "raw data" (unminimized information) only where the raw data relates to international terrorism; to include communications of or concerning United States persons collected by the FBI in electronic surveillances and physical searches authorized by this Court under the Foreign Intelligence Surveillance Act and to allow the CIA and NSA to review, translate, analyze, minimize, use, retain and disseminate such information pursuant to supplementary minimization procedures approved by the Attorney General and filed with the Government's motion.

This opinion… purportedly represents the FISC’s full assessment of the range of legal issues presented by NSA surveillance under Section 702 of the FAA—a provision of law authorizing the government to conduct warrantless surveillance within the United States of overseas targets. Importantly, the opinion likely discusses the constitutionality of the NSA’s upstream surveillance operations—currently, the only federal court decision on this topic. Despite this opinion's centrality to understanding FAA surveillance, it has remained secret for nearly 7 years.

If, in Order to protect against an immediate threat to national security, the NSA determines that it must take action, on a temporary basis, in apparent departure from these procedures and that it is not feasible to obtain a timely modification of these procedures from the Attorney General and [the DNI] NSA may take such action and will report that activity to [the Department of Justice and the Office of the DNI]. Under such circumstances, the Government will continue to adhere to all of the statutory limitations set forth in subsection 702(b) of [FISA].

The government expects that this departure provision will be invoked only under "very extreme circumstances," and in fact is not likely to be used at all.

In this case, there are three sets of minimization procedures that have been adopted by the Attorney General: a set of procedures for each of the two agencies that will conduct acquisitions, the NSA and the FBI, and a third set of procedures for the CIA, which may receive from those agencies the raw data from acquisitions. Each of these sets of procedures closely resembles minimization procedures that have been found by judges of this Court to meet the definition of minimization procedures under section 1801(h) in the context of cases that have a significantly greater likelihood of acquiring communications to, from, or about United States persons.

Any communication . . . acquired through the targeting of a person who at the time of targeting was reasonably believed to be a non-United States person located outside the United States but is in fact located inside the United States at the time such communication is acquired or was in fact a United States person at the time of the targeting shall be destroyed unless the Director of the [CIA] determines in writing that such communication is reasonably believed to contain: significant foreign intelligence information; evidence of a crime that has been, is being, or is about to be committed; or information retained for cryptanalytic, traffic analytic, or signal exploitation purposes.

[T]he Director of NSA may also authorize retention upon a finding that "the communication contains information pertaining to a threat of serious harm to life or property" or "information necessary to understand or assess a communications security vulnerability."

[T]he procedures adopted by this Court in In re Electronic Surveillance and Physical Search of International Terrorist Groups. Their Agents, and Related Targets, Order, No. [REDACTED] (May 2002), as extended and modified by orders of this Court, most recently on December 6, 2007…

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community. Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis. While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team

The documents cite several supporting documents and exhibits filed by the government. Unfortunately, none of those "attached" documents are actually attached, meaning it will take more legal wrangling to gain any more insight into the government's justification of expanded powers.The other document is a September 2008 FISA court opinion that the EFF refers to as the "Rosetta Stone" of FISA-authorized surveillance.The FISA court approved everything the government asked for and states its reasons for doing. Unfortunately, you'll (again) just have to take the FISA court's word that the government's arguments and supporting documents were satisfactory. Nearly everything involved in the crafting of this opinion was filedand reviewedSupposedly, targeting of a person will "cease immediately" once they're determined to either be a US person or have entered the United States. Collections past this point are supposed to be purged. But there are exceptions.The NSA then admits that it's not really in the business of thwarting immediate threats.The court notes that nothing in the applicable statutes actually requires the NSA tothe targeting of US persons. All it demands is that the NSA not do it "intentionally." Hence, all sorts of incidental collection . Sure, there are minimization procedures in place, but there's also a lot of information sharing between agencies (FBI, CIA) that utilizes "raw" data and communications.It's the minimization procedures that introduce the most loopholes. The CIA's loopholes are the most expansive.As for the NSA, its minimization exceptions leave the door propped open for the retention of US persons' communications and data.The order also notes that additional expansions of surveillance power occurred on May 2007, under the heading of "raw take."Interestingly, just as FISA Judge Mary McLaughlin was finding a bunch of governmentsubmissions wholly credible and the agency's Section 702 program no threat to the Fourth Amendment, the government was fighting with FISA Judge Walton for the survival of a less intrusive program (the bulk phone records collection)... and losing McLaughlin found the minimization and targeting practices the agency instituted to be a sufficient deterrent to abuse. Meanwhile, Reggie Walton was finding plenty of abuse and obfuscation in his dealings with the NSA. By early 2009, he was threatening to shut down the program for "frequent and systemic violations" of minimization procedures. One FISA judge took the government's claim that internal procedures would prevent abuse at face value -- for a program that gathered content and communications. Almost simultaneously, Judge Walton was discovering the NSA's internal procedures weren't preventing anything.This is as close to a "whole picture" as we have on the government's arguments for its internet backbone communications collection, at least at this point. And most of the arguments are missing. What we have is a judge stating that she believes the government when it says words like "oversight," "minimization" and "reasonable belief." Not exactly heartening, considering its past abuse of similar minimization procedures with its bulk records program.

Filed Under: nsa, section 702, surveillance

Companies: eff