Congress Criminal Justice & the Rule of Law Cybersecurity & Tech Executive Branch Intelligence Lawfare News Surveillance & Privacy

Beyond Privacy & Security: The Role of the Telecommunications Industry in Electronic Surveillance

Mieke Eoyang, David Forscey
Monday, April 11, 2016, 7:22 AM

The court fight between Apple and FBI over access to a terrorist iPhone is just the latest chapter in the long-running tension between security professionals trying to get access to information and communications companies who hold user data. The debate is often framed as a balance between government power and individual privacy. Frequently overlooked is the critical role of the communications companies, who as physical and legal gatekeepers regulate government access to private information.

Published by The Lawfare Institute
in Cooperation With
Brookings

The court fight between Apple and FBI over access to a terrorist iPhone is just the latest chapter in the long-running tension between security professionals trying to get access to information and communications companies who hold user data. The debate is often framed as a balance between government power and individual privacy. Frequently overlooked is the critical role of the communications companies, who as physical and legal gatekeepers regulate government access to private information. This paper examines this gatekeeper function and recommends surveillance reforms that will reinforce it, without denying necessary government access to information.

Beyond Privacy and Security: The Role of the Telecommunications Industry in Electronic Surveillance, by Mie... by Hoover Institution

In particular, the paper argues, Congress has an opportunity to use the next renewal of the FISA Amendments Act (FAA) to review the safeguards in the statute and address the concerns raised by American technology companies in the wake of Edward Snowden. Allegations that the NSA accessed the overseas, internal networks of U.S. companies in secret tainted relations between Washington and Silicon Valley firms, who were frustrated that government officials violated their corporate integrity by treating them as a foreign adversary. Stories describing how the U.S. government collects data in bulk spooked overseas consumers and companies, particularly in Europe and South America, who began cancelling contracts with American companies and turning to foreign providers.

European regulators have begun scrutinizing the relationship between U.S. companies and intelligence agencies, transforming consumer discontent abroad into a potentially distressing legal obstacle to cross-border data flows. This situation has led many U.S. technology companies to assume an adversarial stance vis-à-vis their own government, who they and their foreign customers perceive to be overbroad in its approach.

When it comes to designing foreign intelligence collection, many national security professionals question the relevance of industry preferences. But there are important reasons to account for these concerns. The growing Internet economy and the technology firms that run it are an essential part of the American economy. Encouraging growth and American competitiveness in foreign markets is a bedrock principle of U.S. economic policy. American Internet technology dominates the global market and proliferates freedom of expression, freedom to organize, and a diversity of opinion.

More specifically, it is in the interest of the Intelligence Community to respect industry’s perspective. If the government treats the companies as just another surveillance target to exploit, business leaders will view the government as yet another unauthorized user to keep out. That kind of rivalry frustrates the government’s legitimate interest in accessing information necessary to securing the nation. The FBI’s recent attempt to compel Apple to break its own security measures has only fanned those flames. It’s time to turn down the temperature.

In approaching surveillance reform from the perspective of private industry, Congress should consider three proposals to fix these problems: (1) extending the FAA to apply to all overseas intelligence collection sourced from a U.S. corporation; (2) amending the FAA to clarify that U.S. companies must filter data using court-authorized selectors before handing it over to government agencies; and (3) funding the establishment of an international working group to harmonize standards on electronic surveillance.

FISA Exclusivity

First, the U.S. government must placate American companies enraged by allegations that the NSA secretly accessed their data and modified their products. The best way to do this is to expand the FAA framework to cover all overseas intelligence collection that draws from a U.S. corporate source. The FAA would become the exclusive means for obtaining data from U.S. companies in order to conduct electronic surveillance.

Specifically, Congress could mandate that: (1) whenever the government wants overseas data on non-U.S. persons reasonably believed to be outside the United States, (2) which is in the possession of or transmitted by a U.S. company, (3) agencies shall only compel production of that data using a FISC order provided to the company. Surreptitious collection against U.S. corporations would be banned. Executive Order 12333 (EO 12333) could no longer authorize the clandestine collection of data held within the networks of U.S. companies, even if the interception occurred outside of U.S. territory.

This would leave the IC free to target, using EO 12333, the information of foreign individuals held by foreign entities. It could rely on other collection methods to obtain the same information, such as a physical search of the target’s premises, physical surveillance of the target, wireless signal interception, or human intelligence. It could also use Section 704 of the FAA to target U.S. persons based on probable cause.

FAA exclusivity would reassure companies that court authorization was the only avenue by which the US government intentionally accesses their infrastructure worldwide, restoring a sense of forthrightness in the presently-strained relationship. Further, the U.S. technology industry could turn to their foreign customers and users and point to the FAA as a high standard affording judicial review and congressional oversight—something other governments do not offer in the context of foreign intelligence collection. Transparency reporting structures agreed to between the companies and the government—not feasible under EO 12333—would give international customers and users some sense of how small a proportion of the total traffic was requested.

Reassuring Foreign Customers

A hotly debated question at the heart of the post-Snowden debate is at what point government surveillance constitutes a privacy violation. Are individual rights implicated when the government copies electronic data, filters the data for potentially useful information, searches the post-filter data, or stores the filtered data? According to the Privacy and Civil Liberties Oversight Board (PCLOB), Section 702 of the FAA authorizes so-called “Upstream” surveillance, by which the NSA accesses Internet data via “backbone” fiber optic cables. It then runs the data through two electronic filters, the first of which removes any purely domestic communications. The second filter eliminates any communications that do not contain an authorized “selector,” such as an email address. The remaining data “take” comprises only those communications containing selectors, and is held by the NSA for review, analysis, and dissemination (subject to certain restrictions). Congress should amend the FAA to clarify that government agencies must provide these filters to private companies, who would themselves sift the backbone data and deliver the filtered product to the government. The government would compensate industry for these added costs. Affirming the custody of the handover interface could resolve numerous privacy concerns by those who fear the government is collecting data in bulk. It would eliminate the possibility that the government might abuse its position and use bulk data in improper ways—no matter how strong the legal controls are. Regardless of what the NSA actually does in practice, it has paid a price in suspicion and concern from a public that remembers past misconduct. With this reform, it will no longer be a question of whether the NSA is adhering to stated guidelines—it simply will not be able to accomplish what critics of bulk collection fear most.

Such a change is not politically impossible. It would mirror similar reforms to domestic metadata collection made by the USA FREEDOM Act. The government would retain access to important foreign intelligence information. Considering the administration’s public position that the NSA only accesses post-filter data, it would be hard-pressed to criticize the transfer of the handover interface into private hands.

International Surveillance Working Group

Going forward, this will not be the last challenge to electronic surveillance norms, and the international community must at least try to find a lasting solution. We are in the middle of a golden age of surveillance where governments can compel production of location data, browser histories, message drafts, private online diaries, as well as content and metadata around calls. Governments cannot assume their surveillance programs will remain secret forever, and thus must design them keeping in mind the consequences of public disclosure. For obvious reasons, there is little discussion around the state of global norms around national security espionage. The U.S. should jumpstart an international forum with like-minded foreign governments who share an interest in the growth of global technology and have respect for their citizens’ privacy.

The problem is clearly most acute in Europe, where the Snowden revelations continue to impact U.S. business abroad and U.S. diplomatic relations with our allies. To be able to discuss the national security implications in light of the economic impacts, the U.S. should start a NATO-OECD working group to discuss international norms around privacy, security, and trans-border data flows. This would allow the U.S. and Europe (and some non-European allies) to begin to talk about electronic surveillance norms and have both the security and economic interests represented in the discussion. Such a working group could advise European data protection authorities on the appropriate controls that should exist within a country, and help advise on technical aspects in the wake of future furors over electronic surveillance programs.

Conclusion

As Congress approaches the next round of electronic surveillance reform, it must consider industry concerns, both to ensure future cooperation, and to protect U.S. competitiveness abroad. The U.S. government must rectify the current relationship with technology companies, poisoned by allegations that the NSA obtained unauthorized access to their data and/or products. Demonstrating a respect for U.S. corporate integrity by acquiring information through court process, rather than breaking in, could reduce corporate opposition. In order to protect U.S. competitiveness abroad, the U.S. could end bulk, unfiltered foreign collection in favor of a system that keeps the unfiltered stream in the private sectors’ hands, restricting government access to only the information necessary to protect national security. And, finally, we must begin a conversation around electronic surveillance norms with our closest allies, establishing a forum to discuss economic and security considerations and develop balanced solutions.

These three steps, taken together, would be a tremendous statement of U.S. commitment to the privacy of individuals around the world, and to the free competition of U.S. businesses in the global marketplace.


Mieke Eoyang is the vice president for the National Security Program at Third Way and a former professional staff member of the House Permanent Select Committee on Intelligence.
David Forscey is Managing Director for Aspen Digital’s cyber & technology programming at the Aspen Institute. Previously he worked in the Resource Center for State Cybersecurity at the National Governors Association and as National Security Fellow at Third Way. He graduated from Georgetown University Law Center in 2015 and earned his undergraduate degree from the University of Virginia in 2011.

Subscribe to Lawfare