{"id":38977,"date":"2014-01-27T12:00:53","date_gmt":"2014-01-27T12:00:53","guid":{"rendered":"http:\/\/www.transcend.org\/tms\/?p=38977"},"modified":"2015-05-05T22:20:02","modified_gmt":"2015-05-05T21:20:02","slug":"watchdog-report-says-n-s-a-program-is-illegal-and-should-end","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2014\/01\/watchdog-report-says-n-s-a-program-is-illegal-and-should-end\/","title":{"rendered":"Watchdog Report Says N.S.A. Program Is Illegal and Should End"},"content":{"rendered":"<p>An independent federal privacy watchdog has concluded that the <a target=\"_blank\" href=\"http:\/\/topics.nytimes.com\/top\/reference\/timestopics\/organizations\/n\/national_security_agency\/index.html?inline=nyt-org\" title=\"More articles about National Security Agency, U.S.\" >National Security Agency<\/a>\u2019s program to collect bulk phone call records has provided only \u201cminimal\u201d benefits in counterterrorism efforts, is illegal and should be shut down.<\/p>\n<p>The findings are laid out in a <a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/1008957-final-report.html\" >238-page report<\/a>,\u00a0scheduled for release by Thursday [23 Jan 2014] and obtained by The New York Times, that represent the first major public statement by the\u00a0Privacy and Civil Liberties Oversight Board, which Congress made an independent agency in 2007 and only recently became fully operational.<\/p>\n<p>The report is likely to inject a significant new voice into the debate over surveillance, underscoring that the issue was not settled by a <a target=\"_blank\" href=\"http:\/\/www.nytimes.com\/2014\/01\/18\/us\/politics\/obama-nsa.html\" >high-profile speech<\/a> <a target=\"_blank\" href=\"http:\/\/topics.nytimes.com\/top\/reference\/timestopics\/people\/o\/barack_obama\/index.html?inline=nyt-per\" title=\"More articles about Barack Obama\" >President Obama<\/a> gave last week. Mr. Obama consulted with the board, along with <a target=\"_blank\" href=\"http:\/\/www.nytimes.com\/2013\/12\/19\/us\/politics\/report-on-nsa-surveillance-tactics.html?_r=0\" >a separate review group<\/a> that last month delivered its own report about surveillance policies. But while he said in his speech that he was tightening access to the data and declared his intention to find a way to end government collection of the bulk records, he said the program\u2019s capabilities should be preserved.<\/p>\n<p>The Obama administration has portrayed the bulk collection program as useful and lawful while at the same time acknowledging concerns about privacy and potential abuse. But in its report, the board\u00a0lays out what may be the most detailed critique of the government\u2019s once-secret legal theory behind the program: that a law known as Section 215 of the <a target=\"_blank\" href=\"http:\/\/topics.nytimes.com\/top\/reference\/timestopics\/subjects\/u\/usa_patriot_act\/index.html?inline=nyt-classifier\" title=\"More articles about the USA Patriot Act.\" >Patriot Act<\/a>, which allows the F.B.I. to obtain business records deemed \u201crelevant\u201d to an investigation, can be legitimately interpreted as authorizing the N.S.A. to collect all calling records in the country.<\/p>\n<p>The program \u201clacks a viable legal foundation under Section 215, implicates constitutional concerns under the First and Fourth Amendments, raises serious threats to privacy and civil liberties as a policy matter, and has shown only limited value,\u201d the report said. \u201cAs a result, the board recommends that the government end the program.\u201d<\/p>\n<p>While a majority of the five-member board embraced that conclusion, two members dissented from the view that the program was illegal. But the panel was united in 10 other recommendations, including deleting raw phone records after three years instead of five and tightening access to search results.<\/p>\n<p>The report also sheds light on the history of the once-secret bulk collection program. It contains the first official acknowledgment that the Foreign Intelligence Surveillance Court produced no judicial opinion detailing its legal rationale for the program <a target=\"_blank\" href=\"http:\/\/www.nytimes.com\/2013\/09\/18\/us\/opinion-by-secret-court-calls-collection-of-phone-data-legal.html?_r=0\" >until last August<\/a>, even though it had been issuing orders to phone companies for the records and to the N.S.A. for how it could handle them <a target=\"_blank\" href=\"http:\/\/www.dni.gov\/files\/documents\/section\/pub_May%2024%202006%20Order%20from%20FISC.pdf\" >since May 2006<\/a>.<\/p>\n<p>The<a target=\"_blank\" href=\"http:\/\/www.pclob.gov\/about-us\/leadership\" > privacy board<\/a>\u2019s legal critique of the program was approved by David Medine, the board\u2019s chairman and a former Federal Trade Commission official in the Clinton administration; Patricia M. Wald, a retired federal appeals court judge named to the bench by President Jimmy Carter; and James X. Dempsey, a civil liberties advocate who specializes in technology issues.<\/p>\n<p>But the other two members \u2014 Rachel L. Brand and Elisebeth Collins Cook, both of whom were Justice Department lawyers in the George W. Bush administration \u2014 rejected the finding that the program was illegal.<\/p>\n<p>They wrote in separate dissents that the board should have focused exclusively on policy and left legal analysis to the courts. Last month, two Federal District Court judges reached <a target=\"_blank\" href=\"http:\/\/www.nytimes.com\/2013\/12\/17\/us\/politics\/federal-judge-rules-against-nsa-phone-data-program.html\" >opposite<\/a> legal <a target=\"_blank\" href=\"http:\/\/www.nytimes.com\/2013\/12\/28\/us\/nsa-phone-surveillance-is-lawful-federal-judge-rules.html\" >conclusions<\/a> in separate lawsuits challenging the program.<\/p>\n<p>Ms. Brand wrote that while the legal question was \u201cdifficult,\u201d the government\u2019s legal theory was \u201cat least a reasonable reading, made in good faith by numerous officials in two administrations of different parties.\u201d She also worried that declaring that counterterrorism officials \u201chave been operating this program unlawfully for years\u201d could damage morale and make agencies overly cautious in taking steps to protect the country.<\/p>\n<p>But the privacy board was unanimous in recommending a series of immediate changes to the program. The three in the majority wanted those changes as part of a brief wind-down period, while the two in dissent wanted them to be structural for a program that would continue.<\/p>\n<p>Some of those recommendations dovetailed with the steps Mr. Obama announced last week, including limiting analysts\u2019 access to the call records of people no further than two links removed from a suspect, instead of three, and creating a panel of outside lawyers to serve as public advocates in major cases involving secret surveillance programs.<\/p>\n<p>Other recommendations \u2014 like deleting data faster \u2014 were not mentioned in the president\u2019s speech. And all members of the board expressed privacy concerns about requiring phone companies to retain call records longer than they normally would, which might be necessary to meet Mr. Obama\u2019s stated goal of finding a way to preserve the program\u2019s ability without having the government collect the bulk data.<\/p>\n<p>The program began in late 2001 based on wartime authority claimed by President Bush. In 2006, the Bush administration persuaded the surveillance court to begin authorizing the program based on the Patriot Act under a theory the Obama administration would later embrace.<\/p>\n<p>But the privacy board\u2019s report criticized that, saying that the legal theory was a \u201csubversion\u201d of the law\u2019s intent, and that the program also violated the Electronic Communications Privacy Act.<\/p>\n<p>\u201cIt may have been a laudable goal for the executive branch to bring this program under the supervision\u201d of the court, the report says. \u201cUltimately, however, that effort represents an unsustainable attempt to shoehorn a pre-existing surveillance program into the text of a statute with which it is not compatible.\u201d<\/p>\n<p>Defenders of the program have argued that Congress acquiesced to that secret interpretation of the law by twice extending its expiration without changes. But the report rejects that idea as \u201cboth unsupported by legal precedent and unacceptable as a matter of democratic accountability.\u201d<\/p>\n<p>The report also scrutinizes in detail a handful of investigations in which the program was used, finding \u201cno instance in which the program directly contributed to the discovery of a previously unknown terrorist plot or the disruption of a terrorist attack.\u201d<\/p>\n<p>Still, in her dissent, Ms. Cook criticized judging the program\u2019s worth based only on whether it had stopped an attack to date. It also has value as a tool that can allow investigators to \u201ctriage\u201d threats and provide \u201cpeace of mind\u201d if it uncovers no domestic links to a newly discovered terrorism suspect, she wrote.<\/p>\n<p><i>A version of this article appears in print on January 23, 2014, on page A14 of the New York edition with the headline: Watchdog Report Says N.S.A. Program Is Illegal and Should End. <\/i><\/p>\n<p><a target=\"_blank\" href=\"http:\/\/www.nytimes.com\/2014\/01\/23\/us\/politics\/watchdog-report-says-nsa-program-is-illegal-and-should-end.html?hp&amp;_r=0\" >Go to Original \u2013 nytimes.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The findings are laid out in a 238-page report, scheduled for release by Thursday [23 Jan 2014] and obtained by The New York Times, that represent the first major public statement by the Privacy and Civil Liberties Oversight Board, which Congress made an independent agency in 2007 and only recently became fully operational.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-38977","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/38977","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=38977"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/38977\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=38977"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=38977"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=38977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}