WASHINGTON, June 1, 2019 - Congress needs a plan for how to proceed when certain provisions of the USA FREEDOM Act, including the controversial call detail records program, expires in December, said speakers at a public forum held by members of the Privacy and Civil Liberties Oversight Board on Friday.
According to Caroline Lynch, former chief counsel of the House Judiciary Subcommittee on Crime, Terrorism, Homeland Security and Investigations, Congress has three options for moving forward. First, they could simply allow Section 215 (the provision involving call detail records) to expire, effectually repealing call detail authority.
However, this would also remove all legislative changes made to the Foreign Intelligence Surveillance Act since 2001, including the specific selection term requirement. Other important provisions that would expire include the roving wiretaps provision and the “lone wolf” amendment.
The second option would be for Congress to revisit the statute and repeal just the section dealing with call detail records, preserving selection term requirements and the relevancy standard. The challenge with this approach is that it would allow for amendments on a variety of other topics. That could be divisive and controversial, especially just before an election year.
Lynch recommended the third option: Straight re-authorization. This would keep the controversial call detail record program on the books. Although likely to be met with opposition, Lynch advised this as the “most politically expedient option.”
The board was established by the Implementing Recommendation of the 9/11 Commission Act of 2007. Although the measure calls for a five-member board, there are three current members: Chairman Adam Klein; Edward Felten a professor at Princeton; and attorney Jane Nitze. The board is responsible to make recommendations to Congress.
Some panelists disagreed with a straight re-authorization
Susan Landau, a cyber security and policy professor at Tufts University, took a different approach. She said it was important to evaluate the efficacy of the call detail program before even considering its impact on privacy. The technical advances and societal changes since 2001 make the program much less helpful today, she said.
One reason for this is that the main terrorist threat has shifted from Al Qaeda to ISIS. Whereas Al Qaeda had tight central control of terrorist attacks, providing training and direction, most ISIS-related attacks within the United States are not specifically coordinated by ISIS operators, making the call records much less relevant.
Additionally, there have been changes in communication modality, with messages increasingly being encrypted. This also makes call detail records less helpful. Landau supported removal that provision.
But George Mason University National Security Institute Executive Director Jamil Jaffer disagreed with this interpretation. Both Al Qaeda and ISIS still present a “huge” terrorist threat, he said. The fact that communication methods have changed highlights the need to “broaden our authorities,” he argued, recommending that Congress reauthorize the act and increase its scope.
Although the call record program has generated both public and congressional suspicion, Jaffer argued that the actual number of queries made is “fairly small,” thus causing minimal impact on the American people.
In all of the years that the USA FREEDOM Act has been in place, there has not been an instance of intentional abuse or misuse of the program, he said, and any mistakes that were made were quickly self-caught, self-reported, and self-corrected.
But the fact that there have been no intentional abuses does not mean that the program always works smoothly. Last year, technical difficulties led to the NSA collecting information that it was not authorized to hold. In response to this, the agency deleted all of their stored call detail records.
Some urge the call detail records program to ‘quietly die’
According to Cato Institute Senior Fellow Julian Sanchez, this unauthorized collection of information was one reason that the program should be allowed to “quietly die.” In addition, retaining large quantities of data for no purpose presents an inherent security risk.
One of the main questions discussed on Friday was why 19 million unique records were collected from just over 40 initial targets.
Lynch explained that the discrepancy between these figures is indicative of how individuals use telecommunication technologies today. The NSA is allowed to collect records for individuals up to two times removed from targets, creating exponential growth in the total number of records. Without this “two hops” rule, the effectiveness of the program would be “greatly diminished,” according to Jonathan Mayer, a professor of computer science and public affairs at Princeton University.
Jaffer suggested that the relatively low number of initial targets demonstrated the inability of the intelligence community to identify and investigate potential threats under the current laws, which he said should be “maintained and expanded.” He also assured board members that the large number of records collected should not be a cause for concern, as the records contain only metadata, which he termed “the most privacy protected” method of data collection.
However, Mayer cited his own 2016 study on the privacy properties of telephone metadata to refute this claim. The study collected telephone records of several individuals and utilized machine learning algorithms and manual analysis to match identities to phone numbers as well as making “remarkably precise inferences” about many aspects of the subjects’ lives.
Mayer also discussed a potential issue with the current call detail records program, explaining that certain numbers disproportionately communicate with other individuals. These numbers are unlikely to produce helpful information, but could potentially contain a large volume of sensitive records. Mayer highlighted the importance of finding a way to avoid collecting data from this type of number.
Former General Counsel for the House Intelligence Committee Michael Bahar pointed out that in the past five years, the potential dangers of misusing personal data have become more readily apparent, and that technology has advanced to the point where “disparate pieces of information can be readily put together to form whole pictures of individuals.”
He said that the value of call detail records to intelligence agencies is going down even as the potential risks of collecting this information increase. The publicity surrounding the USA FREEDOM Act means that terrorists likely know to communicate through several degrees of separation or through encrypted applications.
(Photo of the Privacy and Civil Liberties Oversight Board meeting by Emily McPhie.)
- Big Tech’s Response to Coronavirus: Face Masks, Hiring Binges, Free Web Sites and Cash Donations
- Democrats Call for New Infrastructure Stimulus Legislation Includes Large Broadband Provision
- The FCC Could Do More Now About the Digital Divide, Say Panelists at Broadband Breakfast Live Online Event
- Coronavirus Roundup: Senators Urge Distance Learning, Zoom Privacy, NTIA Broadband and RUS Grants
- Federal Communications Commission Proposal for Unlicensed Spectrum in 6 GHz Band Widely-Praised
Signup for Broadband Breakfast
China1 month ago
Tech Officials Diagnose Excessive Trump Actions as Product of ‘Huawei Derangement Syndrome’
Health4 weeks ago
Battling Coronavirus COVID-19, Broadband Could Provide Relief Although Telemedicine May Not Help
Health2 weeks ago
Broadband Breakfast Live Online Will Stream Daily in March on ‘Broadband and the Coronavirus’
Net Neutrality1 month ago
FCC Seeks Comment on Net Neutrality Issues Remanded by Appeals Court: Public Safety, Pole Attachments and Lifeline
Section 2301 month ago
Attorney General Bill Barr Calls for ‘Recalibrated’ Section 230 as Justice Department Hosts Tech Immunity Workshop
Artificial Intelligence1 month ago
U.S. Progress on AI and Quantum Computing Will Best China, Says CTO Michael Kratsios
Broadband Mapping & Data1 month ago
Poor Broadband Maps and Lack of a Consolidated Voice Hinder Advocacy for Better Rural Internet
Antitrust1 week ago
Information Technology and Innovation Foundation Brings Global Antitrust Experts Together in Videoconference