Why the White House Can’t Defend Against the NSA Court Ruling

Evan Vucci/AP

AA Font size + Print

The intelligence agency's massive surveillance program was dealt a deep blow by a federal judge. By James Oliphant

A District Court decision that the NSA’s sweeping data collection program is unconstitutional paves the way for a Supreme Court review of the counterterrorism program, and creates a major headache for the Obama administration in the process.

I cannot imagine a more ‘indiscriminate’ and ‘arbitrary’ invasion than this systematic and high-tech collection and retention of personal data on virtually every single citizen for purposes of querying and analyzing it without prior judicial approval,” U.S. District Court Judge Richard Leon wrote.

Here are five takeaways from Leon’s incendiary opinion.

1) The government can’t or won’t justify the program. The NSA, through affidavits, offered three instances in which metadata collected under the program was helpful in piercing a terror plot, but Leon found none of them warranted the intrusion into the privacy of innocent individuals. “The government does not cite a single instance in which analysis of the NSA’s bulk metadata collection actually stopped a terrorist attack, or aided the government in an investigation that was time-sensitive in nature,” he wrote. He seized upon a concession by Robert Holley, the assistant director of the FBI’s counterterrorism division, that collection of bulk data only “sometimes” was faster than the Bureau’s other investigation methods. Going further, he noted that the NSA has publicly asserted that the surveillance program has prevented “54” attacks, but noted none of that evidence had been brought before him, even in private in a classified briefing.

2) Technology is moving faster than the law. Leon rejected earlier legal precedent, saying a 1979 case that upheld the FBI’s collection of telephone records in criminal investigations had no applicability in the current climate. “The almost-Orwellian technology that enables the government to store and analyze the telephone metadata of almost everyone in the United States is almost unlike anything that could have been conceived in 1979,” Leon wrote. Phones themselves have changed, he said. They are maps and cameras and music players and “lighters people hold up at rock concerts.” The ubiquity of phones, he wrote, “has dramatically altered the quantity of information that is now available and more importantly, what that information can tell the Government about people’s lives.”

3) Americans are at the mercy of an unprecedented union between industry and government. With alarm, Leon noted that the NSA program was not the traditional situation in which law enforcement approached a private company to secure its reluctant assistance. Instead, he suggested an almost conspiratorial fusion between the interests of the NSA and the telecom industry: “It’s one thing to say people expect telephone companies to occasionally provide information to law enforcement. It is quite another to suggest our citizens expect all phone companies to operate what is essentially a joint intelligence-gathering program with the government.”

(Related: Eight Tech Giants Urge Obama and Congress to Rein In NSA)

4) Leon is just one judge—and can be an iconoclast. Much was made Monday about Leon being an appointee of George W. Bush, but he has a history of not buying the government’s line when it comes to counterterrorism. After assuming the trial bench in 2002, he quickly forced the government to justify keeping detainees at Guantanamo Bay without supplying evidence in court to support their unlimited imprisonment. Ultimately, he ordered the release of five of them in 2008. More importantly, the decision of a single federal judge at the district court level has no bearing on the conclusion that another district court judge might reach or what an appeals court might conclude.

5) The Senate’s “nuclear option” could make trouble for Obama. The White House hailed Majority Leader Harry Reid’s decision last month to trigger the so-called “nuclear option” to eliminate the minority party’s ability to block federal judicial nominees. But in this case, that move could come back to haunt the administration. Two potential liberal votes to scale back the NSA program, Patricia Millett and Nina Pillard, were confirmed to the D.C. Circuit last week, with a third nominee, Robert Wilkins, expected to be approved by the Senate this week. The presence of the three reshapes the balance of power on the court between conservatives and liberals and greatly increases the chances that the three-judge panel that ends up hearing Leon’s appeal could be comprised of two or even three Democratic appointees – and that Leon’s opinion could be upheld.

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.