January 20, 2006

Al Gore Fiddles While Intercepts Burn

Hatched by Dafydd

Victoria Toensing has an illuminating commentary in yesterday's Wall Street Journal (who says day-old news is stale?) that vindicates one of our own prominent bloggers, though I don't know if she -- or he -- realizes it yet.

In "Terrorists on Tap" (available to WSJ subscribers only, but you can find it here, though I don't know for how long... read it quick! I'll wait), Toensing addresses the failings of FISA, the 1978 Foreign Intelligence Surveillance Act, which she describes as "technologically antediluvian."

It was drafted by legislators who had no concept of how terrorists could communicate in the 21st century or the technology that would be invented to intercept those communications. The rules regulating the acquisition of foreign intelligence communications were drafted when the targets to be monitored had one telephone number per residence and all the phones were plugged into the wall. Critics like Al Gore and especially critics in Congress, rather than carp, should address the gaps created by a law that governs peacetime communications-monitoring but does not address computers, cell phones or fiber optics in the midst of war.

The "killer arg" that Democrats keep raising, each time as if it were brand new and had never before occurred to anyone, is best exemplified by our erstwhile vice president and pretender to the throne, Albert J. Gore, jr. In his speech before the Liberty Coalition on Martin Luther King Day (January 16th, 2006), Gore began pitching curve balls at the administration. But his pitches simply pinwheeled into the stands or burrowed into the dirt as if trying to bowl over a cricket wicket:

The discovery that the FBI conducted this long-running and extensive campaign of secret electronic surveillance designed to infiltrate the inner workings of the Southern Christian Leadership Conference and to learn the most intimate details of Dr. King's life was instrumental in helping to convince Congress to enact restrictions on wiretapping.

And one result was the Foreign Intelligence and Surveillance Act, often called FISA, which was enacted expressly to ensure that foreign intelligence surveillance would be presented to an impartial judge to verify that there was indeed a sufficient cause for the surveillance.

It included ample flexibility and an ability for the executive to move with as much speed as desired. [This emphasis, and indeed all emphasis in this post, is added by Big Lizards]

Gore, of course, has never actually had to fill out a FISA warrant application nor deal with the problems of obtaining "sufficient cause" to maintain an electronic intercept, or any other activity that an actual law-enforcement official would understand. Naturally, he believes this makes him an expert on the subject.

But I want to focus on the last line of that excerpt above -- that the FISA process allows "the executive to move with as much speed as desired." I'll take it as read that we all understand how important speed is in electronic surveillance of terrorists: the moment the terrorists know or even suspect that a phone number has been burned, they will drop it in the nearest trash can and break out a new disposable cell phone with a different number. So the only time available to gain useful information are those scant hours between capturing a live cell phone and other terrorists realizing what has happened.

Hours, even minutes may make the difference.

Let me first turn the mike over to John Hinderaker, who analyzed the "72 hour exception" of the FISA rules so oft cited by Democrats as the reason why there was "no need" to conduct warrantless electronic surveillance of phone calls and e-mails from al-Qaeda to persons in the United States. (Hinderaker aptly framed the point with his paraphrase of a George Bush quotation: "if al-Qaeda is calling you, we want to know why.")

John had earlier discussed the legality of the National Security Agency electronic intercept program here, here, and again here. But in a subsequent post -- 72 Hours: Who Could Ask For More? -- John takes on the Democratic claim that Bush could simply have used the "72-hour [emergency] provision of FISA" instead of issuing a presidential directive to surveil without passing through the FISA court.

Hinderaker begins:

We've been getting emails from liberals demanding to know why we haven't written about the 72-hour provision of FISA, which, they say, definitively proves that there couldn't possibly have been any need to go outside the FISA structure for purposes of speed. Actually, there are quite a number of FISA provisions that we haven't written about, but, since the left seems to be putting so much emphasis on this one, here goes: why the 72-hour clause doesn't eliminate the problem of FISA delay.

John then quotes extensively from FISA itself; long boring legalese snipped to avoid brains turning to tapioca.

[A] FISA application is no simple document, and Sec. 1805(f), notwithstanding that it contemplates an "emergency," provides no relief from the full filing requirement of Sec. 1804. The government has 72 hours from the time when a telephone is found in, say, Afghanistan, and the Attorney General gives the order to begin surveillance, until a FISA judge actually signs the order based on the government's application. How does that compare to the length of time it normally takes to obtain a FISA order? ...

Byron York wrote on ths subject last month: ...

People familiar with the process say the problem is not so much with the court itself as with the process required to bring a case before the court. "It takes days, sometimes weeks, to get the application for FISA together," says one source. "It's not so much that the court doesn't grant them quickly, it's that it takes a long time to get to the court. Even after the Patriot Act, it's still a very cumbersome process. It is not built for speed, it is not built to be efficient. It is built with an eye to keeping [investigators] in check...."

If it takes "days, sometimes weeks" to assemble a FISA application, then 72 hours is not long enough to be confident the process can be completed. Anyone who thinks that it is easy for multiple lawyers and officials to collaborate on a set of documents, present them to a federal judge and have the judge sign the order within 72 hours has, I'm afraid, no experience whatever at obtaining orders from federal judges.

And note what happens if the 72 hour deadline is missed. Suppose that the government gets the FISA application to a judge on time, but the judge has not yet signed the order when the 72nd hour expires. At that point, there is a forfeiture: the surveillance is to be terminated immediately, and information gained from the surveillance during that key 72 hour period cannot be used for any purpose--not even communicated to federal anti-terror employees--without a certification that it "indicates a threat of death or serious bodily harm to any person."

Given the complexity of the process, and the uncertainty whether a judge will actually sign an order on short notice even if it is presented to him in a timely fashion, the 72 hour "emergency" provision is completely inadequate to assure that surveillance can be initiated promptly, approved in a timely fashion, and continue without interruption.

With that in mind, compare what Victoria Toensing wrote -- remember her? her column is actually the subject of this convoluted post! -- about the physical reality of obtaining a FISA warrant, which she often had to do in her capacity as deputy assistant attorney general in the Reagan administration with the "terrorism portfolio."

And to correct an oft-cited misconception, there are no five-minute "emergency" taps. FISA still requires extensive time-consuming procedures. To prepare the two-to-three-inch thick applications for non-emergency warrants takes months. The so-called emergency procedure cannot be done in a few hours, let alone minutes. The attorney general is not going to approve even an emergency FISA intercept based on a breathless call from NSA.

For example, al Qaeda agent X, having a phone under FISA foreign surveillance, travels from Pakistan to New York. The FBI checks airline records and determines he is returning to Pakistan in three hours. Background information must be prepared and the document delivered to the attorney general. By that time, agent X has done his business and is back on the plane to Pakistan, where NSA can resume its warrantless foreign surveillance. Because of the antiquated requirements of FISA, the surveillance of agent X has to cease only during the critical hours he is on U.S. soil, presumably planning the next attack.

I am very impressed that Hinderaker's analysis of the actual statute itself, and his personal knowledge of how long it takes judges to shift themselves, dovetails perfectly with Victoria Toensing's real-world experience filling out such FISA applications in actual terrorism cases. As Hannibal Smith says, "I love it when a plan comes together." Or in this case, when legal analysis and practical application buttress each other.

But John Hinderaker continues:

There is a second, even more fundamental reason why FISA's 72-hour provision does not solve the "speed" problem. Note that even under a 72-hour "emergency" application, the government must certify that "factual basis for issuance of an order under this subchapter to approve such surveillance exists...."

Now let's apply that standard to what must be a common situation where electronic surveillance is important: our forces capture a terrorist overseas who has a cell phone. Let's pretend that there are no procedural problems with the 72-hour provision, and that our soldiers can immediately begin intercepting communications to that cell phone in expectation of a warrant to be issued later. That won't do them a lot of good. There may be some incoming calls, but there will be no conversations to monitor since presumably our soldiers won't be answering the phone. So what they will be able to obtain is a list of phone numbers--numbers taken from incoming calls, and numbers recorded on the cell phone as having been called by the terrorist before he was captured. What we really need to do, to roll up the cell of which the captured terrorist was a member, it to begin monitoring those other phone numbers. Those are the telephones on which the other terrorists will be talking; among other things, they will be wondering what happened to their comrade.

But, as far as I know, the fact that a particular phone called a terrorist's (or suspected terrorist's) phone does not provide probable cause to believe that the owner of that phone is the agent of a foreign power. It could be the terrorist's mother; it could be his tentmaker or his landlord, dunning him for rent.

And, like a tennis ball, back we fly to Ms. Toensing:

Even if time were not an issue, any emergency FISA application must still establish the required probable cause within 72 hours of placing the tap. So al Qaeda agent A is captured in Afghanistan and has agent B's number in his cell phone, which is monitored by NSA overseas. Agent B makes two or three calls every day to agent C, who flies to New York. That chain of facts, without further evidence, does not establish probable cause for a court to believe that C is an agent of a foreign power with information about terrorism. Yet, post 9/11, do the critics want NSA to cease monitoring agent C just because he landed on U.S. soil?

So much for Al Gore's risible claim that the FISA rules allow "ample flexibility and an ability for the executive to move with as much speed as desired." Once again, Hinderaker and Toensing are perfectly in synch, despite writing separately more than a week apart; and only the man who would be king is left twisting slowly, slowly in the wind.



Rantin' Al

Simply put, the NSA electronic surveillance is not just the law, it's also a good idea. It is, in fact, a necessary, urgent, and irreplaceable arrow in the quiver of intelligence-gathering to thwart terrorist attacks.

Hatched by Dafydd on this day, January 20, 2006, at the time of 3:22 AM

Trackback Pings

TrackBack URL for this hissing: http://biglizards.net/mt3.36/earendiltrack.cgi/417

Comments

The following hissed in response by: matoko kusanagi

But, as far as I know, the fact that a particular phone called a terrorist's (or suspected terrorist's) phone does not provide probable cause to believe that the owner of that phone is the agent of a foreign power. It could be the terrorist's mother; it could be his tentmaker or his landlord, dunning him for rent.
that's not how it works. see social network theory.

The above hissed in response by: matoko kusanagi [TypeKey Profile Page] at January 20, 2006 7:34 AM

The following hissed in response by: Mr. Michael

MK, don't you just push the question back a notch? From the Wiki:

"Social network theory produces an alternate view, where the attributes of individuals are less important than their relationships and ties with other actors within the network."

Thus, in order to get useful information from those phone numbers that would allow you to get a FISA warrant, the investigators would have to prove the nature of the TIE to that number before the intercepts could be given a warrant, rather than prove that there WAS a tie, and that the phone they got the number from belonged to a terrorist...

Look. There are two major different reasons to gather information: ONE: To develop a legal prosecution of a lawbreaker, TWO: To develop a defense against an attack.

Can we agree that intercepting phone calls of people who are outside our legal jurisdiction are done in the pursuit of option number two? I'll propose here that foreign nationals outside the United States are outside our Legal jurisdiction.

I'll toss this in: If the Gov't listens to a phone call without a warrant, then they cannot use the information in that phone call at a Criminal Trial. Does that make you feel better? Now can we get back to protecting us from foreign attack?

The above hissed in response by: Mr. Michael [TypeKey Profile Page] at January 20, 2006 9:58 AM

The following hissed in response by: papashazz

Thanks for the post on this - I had read John's analysis on the 72-hour "emergency" FISA application provision and when I saw Victoria Toensing's article in the WSJ the other day, I saw the same thing you so nicely summarized - that in the real world, the FISA process is totally unworkable. ("Antediluvian" is a nice touch!)

The above hissed in response by: papashazz [TypeKey Profile Page] at January 20, 2006 10:04 AM

The following hissed in response by: KarmiCommunist

ummmm...that photo of Al. It appears that Al has taken a course on public speaking since he ran in 2000, and i suspect that it was the "Hitler and Power Speaking" course...

The above hissed in response by: KarmiCommunist [TypeKey Profile Page] at January 20, 2006 2:11 PM

The following hissed in response by: Bill Faith

The above hissed in response by: Bill Faith [TypeKey Profile Page] at January 20, 2006 11:16 PM

The following hissed in response by: matoko kusanagi

Mr. Michael.
In social network theory nodes and hubs are evaluated on the basis of connections and traffic. "Influence" is one metric that can be applied to a node.
The procedure is automatic.
A node is initially flagged automatically, perhaps by automatic speech recognition or keyword detection, or by connecting to another node-of-influence.
My point is, there is considerable evidence by the time an individual phone number has achieved enough influence to require a human "eavesdropper". And at that point, listening should commence immediately.
You can also see how this tech could flag US-US calls, but that it would not neccessarily result in a wiretap unless the influence and connection score met some value.
My other point is, machines are doing the listening in the first stages. Is that wiretapping?

The above hissed in response by: matoko kusanagi [TypeKey Profile Page] at January 21, 2006 7:06 AM

Post a comment

Thanks for hissing in, . Now you can slither in with a comment, o wise. (sign out)

(If you haven't hissed a comment here before, you may need to be approved by the site owner before your comment will appear. Until then, it won't appear on the entry. Hang loose; don't shed your skin!)


Remember me unto the end of days?


© 2005-2009 by Dafydd ab Hugh - All Rights Reserved