PRISM's Not-So-Slippery Slope
4:08 PM, Jun 11, 2013 • By JOHN MCCORMACK
In the Washington Examiner, Timothy Carney warns that the NSA's PRISM program puts the United States on the slippery slope to tyranny:
When Carney writes that "the federal government doesn't need to obtain a warrant on us in order to get our emails," the "us" in that sentence seems to refer to U.S. citizens. But, in fact, the law requires that warrants must be issued to target communications between two U.S. citizens. As civil liberties activist Glenn Greenwald admitted on Monday, "individual warrants are needed ... when two people are both inside the United States and are both American citizens."
So could the next president really use the NSA program to target U.S. citizens who are violent felons, drug dealers, or tax cheats, as Carney suggests? No. The president is barred by statute and the 4th Amendment from targeting U.S. citizens in such a manner. "Sec. 702 of FISA only permits targeting of non-U.S. persons outside the U.S. who are agents of a foreign power (i.e., either foreign spies or operatives of foreign terrorist orgs)," former federal prosecutor Andrew C. McCarthy told me in an email. "PRISM involves the implementation of 702, so the president can't 'expand' it in a way that would violate the statute, let alone the Constitution. The STATUTE would be infirm if it violated the 4th Amendment, so obviously the president's implementation procedures may not accomplish what the statute itself may not accomplish."
To repeat, the PRISM program is not designed to target electronic communications among American citizens. But that is not to say that PRISM does not raise privacy concerns. The Washington Post claims that "a great deal" of American data can be "incidentally" scooped up by PRISM:
On the other hand, the administration claims that there are "extensive procedures, specifically approved by the court, to ensure that only non-US persons outside the US are targeted, and that minimize the acquisition, retention and dissemination of incidentally acquired information about US persons."
Michael Hayden, former NSA and CIA chief, said in an interview Sunday with NPR that analysts must immediately stop a search if they discover they're looking at American-to-American communications. "As you go through it, you are under a constant requirement," Hayden said, to try to determine "whether you're still sure it's foreign or American. And if it's American, you're done."
It's fine to be skeptical of the government's claims. Some have turned out to be false. But we should also be skeptical of the Washington Post and its source. Journalist Ed Bott notes that the Post has already changed its story once because it "took a leaked PowerPoint presentation from a single anonymous source and leaped to conclusions without supporting evidence." Furthermore, Bott writes:
As Michael Moynihan writes at the Daily Beast, Snowden "indulges in the conspiratorial." Snowden told a Washington Post reporter that the U.S. intelligence community "will most certainly kill" the Post reporter to stop the leak about the NSA. This is simply delusional. So long as you are an American citizen--and are not a senior operational leader of al Qaeda camped out in some place like Yemen--there is no reason to believe that the American government will target you for assassination. That does not mean that other claims made by Snowden are necessarily inaccurate, but it should heighten our skepticism.
Back to the potential problem with PRISM: How many "incidental" American-to-American communications are collected by the NSA? And is it possible that emails between American citizens collected "incidentally" by PRISM might be shared with law enforcement officials to bust Americans for run of the mill crimes? We do not have a definitive answer.
The fact sheet issued by DNI James Clapper says that "the dissemination of information about U.S. persons is expressly prohibited unless it is necessary to understand foreign intelligence or assess its importance, is evidence of a crime, or indicates a threat of death or serious bodily harm." But is Clapper referring to "information about U.S. citizens" obtained through incidental collection of American-to-American communications? Or is he referring to information about U.S. citizens obtained by legitimately viewing foreign communications? Whatever the case, when may such information be disseminated and to whom? A spokesman for the DNI did not respond to a request for comment from THE WEEKLY STANDARD.
"I think what they can do in the way of disseminating the American-to-American communications they 'incidentally' seize depends on what the minimization instructions say," Andrew McCarthy told me. "I see that the Post reported in 2010 that the government says it purges these improper seizures. I assume that is because the minimization instructions require that -- but I have not seen the minimization instructions (which I think are classified)."
No one has alleged that "incidental" information obtained by the NSA has been shared with law enforcement officials. If it were, such evidence would likely be thrown out in court, since it was gathered through a warrantless search.
The federal government should never be able to use American-to-American communications picked up accidentally through foreign intelligence gathering operations to arrest or prosecute U.S. citizens. If the FISA law needs to be amended to make it perfectly clear that the government cannot do that, then it should be amended, both to protect the rights of Americans and to protect a useful anti-terror program from being dismantled.
Recent Blog Posts