MAINWAY
   HOME

TheInfoList



OR:

MAINWAY is a database maintained by the United States'
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
(NSA) containing
metadata Metadata is "data that provides information about other data", but not the content of the data, such as the text of a message or the image itself. There are many distinct types of metadata, including: * Descriptive metadata – the descriptive ...
for hundreds of billions of
telephone call A telephone call is a connection over a telephone network between the called party and the calling party. First telephone call The first telephone call was made on March 10, 1876, by Alexander Graham Bell. Bell demonstrated his ability to "ta ...
s made through the largest telephone carriers in the United States, including
AT&T AT&T Inc. is an American multinational telecommunications holding company headquartered at Whitacre Tower in Downtown Dallas, Texas. It is the world's largest telecommunications company by revenue and the third largest provider of mobile ...
,
Verizon Verizon Communications Inc., commonly known as Verizon, is an American multinational telecommunications conglomerate and a corporate component of the Dow Jones Industrial Average. The company is headquartered at 1095 Avenue of the Americas ...
, and
T-Mobile T-Mobile is the brand name used by some of the mobile communications subsidiaries of the German telecommunications company Deutsche Telekom AG in the Czech Republic ( T-Mobile Czech Republic), Poland ( T-Mobile Polska), the United States (T-Mobil ...
. The existence of this database and the NSA program that compiled it was unknown to the general public until ''
USA Today ''USA Today'' (stylized in all uppercase) is an American daily middle-market newspaper and news broadcasting company. Founded by Al Neuharth on September 15, 1982, the newspaper operates from Gannett's corporate headquarters in Tysons, Virgini ...
'' broke the story on May 10, 2006. It is estimated that the database contains over 1.9
trillion ''Trillion'' is a number with two distinct definitions: *1,000,000,000,000, i.e. one million million, or (ten to the twelfth power), as defined on the short scale. This is now the meaning in both American and British English. * 1,000,000,000,00 ...
call-detail record A call detail record (CDR) is a data record produced by a telephone exchange or other telecommunications equipment that documents the details of a telephone call or other telecommunications transactions (e.g., text message) that passes through that ...
s. The records include detailed call information (caller, receiver, date/time of call, length of call, etc.) for use in
traffic analysis Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication, it can be performed even when the messages are encrypted. In general, the greater the number of messages observe ...
"And, by the way, I hate the term 'metadata.' What's wrong with 'traffic analysis,' which is what we've always called that sort of thing?" and
social network analysis Social network analysis (SNA) is the process of investigating social structures through the use of networks and graph theory. It characterizes networked structures in terms of ''nodes'' (individual actors, people, or things within the network) ...
, "The data are used for 'social network analysis,' the official said, meaning to study how terrorist networks contact each other and how they are tied together." but do not include audio information or transcripts of the content of the phone calls. According to former NSA director Michael Hayden, the NSA sought to deploy MAINWAY prior to 9/11 in response to the
Millennium Plot A series of Islamist terrorist attacks linked to al-Qaeda were planned to occur on or near January 1, 2000, in the context of millennium celebrations, including bombing plots against four tourist sites in Jordan, the Los Angeles International Air ...
but did not do so because it did not comply with US law. Hayden wrote: "The answer from he Justice Departmentwas clear: ' ... you can't do this.'" As of June 2013, the database stores metadata for at least five years. According to
Pulitzer Prize The Pulitzer Prize () is an award for achievements in newspaper, magazine, online journalism, literature, and musical composition within the United States. It was established in 1917 by provisions in the will of Joseph Pulitzer, who had made ...
winning journalist
James Risen James Risen (born April 27, 1955) is an American journalist for ''The Intercept''. He previously worked for ''The New York Times'' and before that for ''Los Angeles Times''. He has written or co-written many articles concerning U.S. government ...
, MAINWAY was the most important of the four components that comprised the ThinThread program. The database's existence has prompted fierce objections. It is often viewed as an illegal warrantless search and violation of the
pen register A pen register, or dialed number recorder (DNR), is an electronic device that records all numbers called from a particular telephone line. The term has come to include any device or program that performs similar functions to an original pen regi ...
provisions of the
Foreign Intelligence Surveillance Act The Foreign Intelligence Surveillance Act of 1978 ("FISA" , ) is a United States federal law that establishes procedures for the physical and electronic surveillance and the collection of "foreign intelligence information" between "foreign pow ...
and (in some cases) the Fourth Amendment of the United States Constitution. The George W. Bush administration neither confirmed nor denied the existence of the domestic call record database. This contrasts with a related NSA controversy concerning warrantless surveillance of selected telephone calls; in that case they did confirm the existence of the program of debated legality. That program's code name was
Stellar Wind A stellar wind is a flow of gas ejected from the upper atmosphere of a star. It is distinguished from the bipolar outflows characteristic of young stars by being less collimated, although stellar winds are not generally spherically symmetric. ...
. Similar programs exist or are planned in other countries, including Sweden (
Titan traffic database The Titan traffic database is a database allegedly in use by the Swedish signals intelligence agency, the National Defence Radio Establishment (FRA), according to a news report by ''Rapport'' on SVT in June 2008, based on an account from an ano ...
) and Great Britain (
Interception Modernisation Programme The Interception Modernisation Programme (IMP) was a UK government initiative to extend the government's capabilities for lawful interception and storage of communications data. It was widely reported that the IMP's eventual goal was to store deta ...
). The MAINWAY equivalent for Internet traffic is
MARINA A marina (from Spanish , Portuguese and Italian : ''marina'', "coast" or "shore") is a dock or basin with moorings and supplies for yachts and small boats. A marina differs from a port in that a marina does not handle large passenger ships or ...
.


Content

According to an anonymous source, the database is "the largest database ever assembled in the world," and contains
call-detail record A call detail record (CDR) is a data record produced by a telephone exchange or other telecommunications equipment that documents the details of a telephone call or other telecommunications transactions (e.g., text message) that passes through that ...
s (CDRs) for all phone calls, domestic and international. A call-detail record consists of the phone numbers of the callers and recipients along with time, position and duration of the call. While the database does not contain specific names or addresses, that information is widely available from non-classified sources. According to the research group TeleGeography,
AT&T AT&T Inc. is an American multinational telecommunications holding company headquartered at Whitacre Tower in Downtown Dallas, Texas. It is the world's largest telecommunications company by revenue and the third largest provider of mobile ...
(including the former SBC),
Verizon Verizon Communications Inc., commonly known as Verizon, is an American multinational telecommunications conglomerate and a corporate component of the Dow Jones Industrial Average. The company is headquartered at 1095 Avenue of the Americas ...
, and
BellSouth BellSouth, LLC (stylized as ''BELLSOUTH'' and formerly known as BellSouth Corporation) was an American telecommunications holding company based in Atlanta, Georgia. BellSouth was one of the seven original Regional Bell Operating Companies after ...
connected nearly 500 billion telephone calls in 2005 and nearly two trillion calls since late 2001. It is reported that all four companies were paid to provide the information to the NSA.Since the NSA request, SBC has merged with AT&T, making the number of companies now involved three, not four.


Usage

Although such a database of phone records would not be useful as a tool in itself for
national security National security, or national defence, is the security and defence of a sovereign state, including its citizens, economy, and institutions, which is regarded as a duty of government. Originally conceived as protection against military att ...
, it could be used as an element of broader national security analytical efforts and data mining. These efforts could involve analysts using the data to connect phone numbers with names and links to persons of interest. Such efforts have been the focus of the NSA's recent attempts to acquire key technologies from high tech firms in
Silicon Valley Silicon Valley is a region in Northern California that serves as a global center for high technology and innovation. Located in the southern part of the San Francisco Bay Area, it corresponds roughly to the geographical areas San Mateo Cou ...
and elsewhere. Link analysis software, such as Link Explorer or the Analyst's Notebook, is used by law enforcement to organize and view links that are demonstrated through such information as telephone and financial records, which are imported into the program from other sources.
Neural network software Neural network software is used to simulate, research, develop, and apply artificial neural networks, software concepts adapted from biological neural networks, and in some cases, a wider array of adaptive systems such as artificial intelligen ...
is used to detect patterns, classify and cluster data as well as forecast future events. Using relational mathematics, it is possible to find out if someone changes their telephone number by analyzing and comparing calling patterns. ThinThread, a system designed largely by William Binney, which pre-dated this database, but was discarded for the
Trailblazer Project Trailblazer was a United States National Security Agency (NSA) program intended to develop a capability to analyze data carried on Telecommunications network, communications networks like the Internet. It was intended to track entities using commun ...
, introduced some of the technology which is used to analyze the data. Michael Hayden, former director of the NSA, admitted as much in an interview, saying: "But we judged fundamentally that as good as hinThreadwas, and believe me, we pulled a whole bunch of elements out of it and used it for our final solution for these problems, as good as it was, it couldn't scale sufficiently to the volume of modern communications." Where ThinThread encrypted privacy data, however, no such measures have been reported with respect to the current system.


Response

* In response, the Bush administration defended its activities, while neither specifically confirming or denying the existence of the potentially illegal program. According to the Deputy White House Press Secretary, "The intelligence activities undertaken by the United States government are lawful, necessary and required to protect Americans from terrorist attacks." *
Senator A senate is a deliberative assembly, often the upper house or chamber of a bicameral legislature. The name comes from the ancient Roman Senate (Latin: ''Senatus''), so-called as an assembly of the senior (Latin: ''senex'' meaning "the el ...
Arlen Specter Arlen Specter (February 12, 1930 – October 14, 2012) was an American lawyer, author and politician who served as a United States Senator from Pennsylvania from 1981 to 2011. Specter was a Democrat from 1951 to 1965, then a Republican fr ...
claimed he would hold hearings with the telecommunications CEOs involved. The
Senate Intelligence Committee The United States Senate Select Committee on Intelligence (sometimes referred to as the Intelligence Committee or SSCI) is dedicated to overseeing the United States Intelligence Community—the agencies and bureaus of the federal government o ...
was expected to question
Air Force An air force – in the broadest sense – is the national military branch that primarily conducts aerial warfare. More specifically, it is the branch of a nation's armed services that is responsible for aerial warfare as distinct from an ...
General Michael Hayden about the data-gathering during his confirmation hearings as
Director of the Central Intelligence Agency The director of the Central Intelligence Agency (D/CIA) is a statutory office () that functions as the head of the Central Intelligence Agency, which in turn is a part of the United States Intelligence Community. Beginning February 2017, the ...
. Hayden was in charge of the NSA from 1999 through 2005. * Commenting on the apparent incompatibility of the NSA call database with previous assurances by President Bush, former Republican Speaker of the
House A house is a single-unit residential building. It may range in complexity from a rudimentary hut to a complex structure of wood, masonry, concrete or other material, outfitted with plumbing, electrical, and heating, ventilation, and air cond ...
Newt Gingrich Newton Leroy Gingrich (; né McPherson; born June 17, 1943) is an American politician and author who served as the 50th speaker of the United States House of Representatives from 1995 to 1999. A member of the Republican Party, he was the U. ...
told
Fox News The Fox News Channel, abbreviated FNC, commonly known as Fox News, and stylized in all caps, is an American multinational conservative cable news television channel based in New York City. It is owned by Fox News Media, which itself is o ...
, "I'm not going to defend the indefensible. The Bush administration has an obligation to level with the American people ... I don't think the way they've handled this can be defended by reasonable people." Later on ''
Meet the Press ''Meet the Press'' is a weekly American television Sunday morning talk shows, news/interview program broadcast on NBC. It is the List of longest-running television shows by category, longest-running program on American television, though the curr ...
'', Gingrich stated that "everything that has been done is totally legal," and he said the NSA program was defending the indefensible, "because they refuse to come out front and talk about it." * Republican Senator
Lindsey Graham Lindsey Olin Graham (born July 9, 1955) is an American lawyer and politician serving as the senior United States senator from South Carolina, a seat he has held since 2003. A member of the Republican Party, Graham chaired the Senate Committee on ...
told Fox News, "The idea of collecting millions or thousands of phone numbers, how does that fit into following the enemy?" * House Republican Caucus chairwoman
Deborah Pryce Deborah Denine Pryce (born July 29, 1951) is an American lawyer, jurist, and politician from Ohio who was the member of the United States House of Representatives for Ohio's 15th congressional district, which includes the western half of Columbu ...
said, "While I support aggressively tracking
al-Qaida Al-Qaeda (; , ) is an Islamic extremist organization composed of Salafist jihadists. Its members are mostly composed of Arabs, but also include other peoples. Al-Qaeda has mounted attacks on civilian and military targets in various countri ...
, the administration needs to answer some tough questions about the protection of our civil liberties." May 11, 2006 * Former Republican House Majority Leader
John Boehner John Andrew Boehner ( ; born , 1949) is an American retired politician who served as the 53rd speaker of the United States House of Representatives from 2011 to 2015. A member of the Republican Party, he served 13 terms as the U.S. represe ...
said, "I am concerned about what I read with regard to NSA databases of phone calls." * Democratic senator
Patrick Leahy Patrick Joseph Leahy (; born March 31, 1940) is an American politician and attorney who is the senior United States senator from Vermont and serves as the president pro tempore of the United States Senate. A member of the Democratic Party, ...
, ranking member of the
Senate Judiciary Committee The United States Senate Committee on the Judiciary, informally the Senate Judiciary Committee, is a standing committee of 22 U.S. senators whose role is to oversee the Department of Justice (DOJ), consider executive and judicial nominations ...
, said "Are you telling me that tens of millions of
Americans Americans are the citizens and nationals of the United States of America.; ; Although direct citizens and nationals make up the majority of Americans, many dual citizens, expatriates, and permanent residents could also legally claim Ame ...
are involved with al-Qaida? These are tens of millions of Americans who are not suspected of anything. ... Where does it stop?" * On May 15, 2006, FCC Commissioner
Michael Copps Michael Joseph Copps (born April 23, 1940) is a former Commissioner of the U.S. Federal Communications Commission (FCC), an independent agency of the United States government. He was sworn in on May 31, 2001 and served until December 31, 2011. ...
called for the FCC to open an inquiry into the lawfulness of the disclosure of America's phone records. *In May 2006,
Pat Robertson Marion Gordon "Pat" Robertson (born March 22, 1930) is an American media mogul, religious broadcaster, political commentator, former presidential candidate, and former Southern Baptist minister. Robertson advocates a conservative Christian ...
called the NSA wire-tapping a "tool of oppression." *In May 2006, former majority leader
Trent Lott Chester Trent Lott Sr. (born October 9, 1941) is an American lawyer, author, and politician. A former United States Senator from Mississippi, Lott served in numerous leadership positions in both the United States House of Representatives and the ...
stated "What are people worried about? What is the problem? Are you doing something you're not supposed to?" * On May 16, 2006, both Verizon and BellSouth stated not only did they not hand over records, but that they were never contacted by the NSA in the first place. * On June 30, 2006, Bloomberg reported the NSA "asked AT&T Inc. to help it set up a domestic call monitoring site seven months before the Sept. 11, 2001 attacks," citing court papers filed June 23, 2006 by lawyers in ''McMurray v. Verizon Communications Inc.'', 06cv3650, in the Southern District of New York.


Internet monitoring


''Wired'' magazine

On May 22, 2006, it was revealed by investigative reporter
Seymour Hersh Seymour Myron "Sy" Hersh (born April 8, 1937) is an American Investigative journalism, investigative journalist and political writer. Hersh first gained recognition in 1969 for exposing the My Lai Massacre and its cover-up during the Vietnam Wa ...
and ''Wired'' magazine that the program involved the NSA setting up splitters to the routing cores of many telecoms companies and to major Internet traffic hubs. These provided a direct connection via an alleged "black room" known as
Room 641A Room 641A is a telecommunication interception facility operated by AT&T for the U.S. National Security Agency, as part of its warrantless surveillance program as authorized by the Patriot Act. The facility commenced operations in 2003 and its ...
. This room allows most U.S. telecoms communications and Internet traffic to be redirected to the NSA. The NSA used them to eavesdrop and order police investigations of tens of thousands of ordinary Americans without judicial warrants. According to a security consultant who worked on the program, "What the companies are doing is worse than turning over records ... they're providing total access to all the data," and a former senior intelligence official said, "This is not about getting a cardboard box of monthly phone bills in alphabetical order ... the NSA is getting real-time actionable intelligence."


Partial retraction

On June 30, 2006 ''USA Today'' printed a partial retraction about its controversial article the prior month saying: "... USA TODAY also spoke again with the sources who had originally provided information about the scope and contents of the domestic calls database. All said the published report accurately reflected their knowledge and understanding of the NSA program, but none could document a contractual relationship between BellSouth or Verizon and the NSA, or that the companies turned over bulk calling records to the NSA. Based on its reporting after the May 11 article, USA TODAY has now concluded that while the NSA has built a massive domestic calls record database involving the domestic call records of telecommunications companies, the newspaper cannot confirm that BellSouth or Verizon contracted with the NSA to provide bulk calling records to that database ..."


Denials

Five days after the story appeared, BellSouth officials said they could not find evidence of having handed over such records. "Based on our review to date, we have confirmed no such contract exists and we have not provided bulk customer calling records to the NSA," the officials said. ''USA Today'' replied that BellSouth officials had not denied the allegation when contacted the day before the story was published. Verizon has also asserted that it has not turned over such records. Companies are permitted by US securities law (15 U.S.C. 78m(b)(3)(A)) to refrain from properly accounting for their use of assets in matters involving national security, when properly authorized by an agency or department head acting under authorization by the
President of the United States The president of the United States (POTUS) is the head of state and head of government of the United States of America. The president directs the Federal government of the United States#Executive branch, executive branch of the Federal gove ...
. This
legalese Legal writing involves the analysis of fact patterns and presentation of arguments in documents such as legal memoranda and briefs. One form of legal writing involves drafting a balanced analysis of a legal problem or issue. Another form of leg ...
essentially means that companies can falsify their accounting reports and lie about their activities when the President decides that it is in the interests of national security to do so. President Bush issued a
presidential memorandum A presidential memorandum is a type of directive issued by the president of the United States to manage and govern the actions, practices, and policies of the various departments and agencies found under the executive branch of the United Stat ...
on May 5, 2006 delegating authority to make such a designation to
Director of National Intelligence The director of national intelligence (DNI) is a senior, cabinet-level United States government official, required by the Intelligence Reform and Terrorism Prevention Act of 2004 to serve as executive head of the United States Intelligence Co ...
John Negroponte, just as the NSA call database scandal appeared in the media.


Lawsuits

The
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group based in San Francisco, California. The foundation was formed on 10 July 1990 by John Gilmore, John Perry Barlow and Mitch Kapor to promote Internet ...
filed a related suit against AT&T on January 31, 2006, alleging that the firm had given NSA access to its database, a charge reiterated in the ''
USA Today ''USA Today'' (stylized in all uppercase) is an American daily middle-market newspaper and news broadcasting company. Founded by Al Neuharth on September 15, 1982, the newspaper operates from Gannett's corporate headquarters in Tysons, Virgini ...
'' article. Verizon and BellSouth have both claimed they were never contacted by the NSA, nor did they provide any information to the agency, though US codes of law permit companies to lie about their activities when the President believes that telling the truth would compromise national security. On June 6, 2013, in the wake of well-publicized leaks of top secret documents by former NSA contractor
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is an American and naturalized Russian former computer intelligence consultant who leaked highly classified information from the National Security Agency (NSA) in 2013, when he was an employee and su ...
, conservative public interest lawyer and
Judicial Watch Judicial Watch (JW) is an American conservative activist group that files Freedom of Information Act (FOIA) lawsuits to investigate claimed misconduct by government officials. Founded in 1994, JW has primarily targeted Democrats, in particu ...
founder
Larry Klayman Larry Elliot Klayman (born July 20, 1951) is an American attorney, right-wing activist, and former U.S. Justice Department prosecutor. He founded both Judicial Watch and Freedom Watch. In addition to his numerous lawsuits against the Clinton ad ...
filed a lawsuit ('' Klayman v. Obama'') challenging the constitutionality and statutory authorization of the government's wholesale collection of phone record metadata. On June 10, the
American Civil Liberties Union The American Civil Liberties Union (ACLU) is a nonprofit organization founded in 1920 "to defend and preserve the individual rights and liberties guaranteed to every person in this country by the Constitution and laws of the United States". T ...
and
Yale Law School Yale Law School (Yale Law or YLS) is the law school of Yale University, a private research university in New Haven, Connecticut. It was established in 1824 and has been ranked as the best law school in the United States by '' U.S. News & World ...
's Media Freedom and Information Clinic filed a motion with the
Foreign Intelligence Surveillance Court The United States Foreign Intelligence Surveillance Court (FISC), also called the FISA Court, is a U.S. federal court established under the Foreign Intelligence Surveillance Act of 1978 (FISA) to oversee requests for surveillance warrants aga ...
(FISC) asking for the secret FISC opinions on the Patriot Act to be made public in the light of the ''
Guardian Guardian usually refers to: * Legal guardian, a person with the authority and duty to care for the interests of another * ''The Guardian'', a British daily newspaper (The) Guardian(s) may also refer to: Places * Guardian, West Virginia, Unit ...
s publication of a leaked FISC court order about the collection of Verizon call records metadata. On June 11, the ACLU filed a lawsuit ('' ACLU v. Clapper'') against
Director of National Intelligence The director of national intelligence (DNI) is a senior, cabinet-level United States government official, required by the Intelligence Reform and Terrorism Prevention Act of 2004 to serve as executive head of the United States Intelligence Co ...
James Clapper challenging the legality of the NSA's telephony metadata collection program. Once the judge in each case had issued rulings seemingly at odds with one another, Gary Schmitt (former staff director of the
Senate Select Committee on Intelligence The United States Senate Select Committee on Intelligence (sometimes referred to as the Intelligence Committee or SSCI) is dedicated to overseeing the United States Intelligence Community—the agencies and bureaus of the federal government of ...
) wrote in ''
The Weekly Standard ''The Weekly Standard'' was an American neoconservative political magazine of news, analysis and commentary, published 48 times per year. Originally edited by founders Bill Kristol and Fred Barnes, the ''Standard'' had been described as a "re ...
'', "The two decisions have generated public confusion over the constitutionality of the NSA's data collection program—a kind of judicial 'he-said, she-said' standoff." The ACLU contested the decision in the
Second Circuit Court of Appeals The United States Court of Appeals for the Second Circuit (in case citations, 2d Cir.) is one of the thirteen United States Courts of Appeals. Its territory comprises the states of Connecticut, New York and Vermont. The court has appellate juri ...
. In 2015, the appeals court ruled that Section 215 of the Patriot Act did not authorize the bulk collection of metadata, which judge
Gerard E. Lynch Gerard Edmund Lynch (born September 4, 1951) is an American lawyer who serves as a senior United States circuit judge of the United States Court of Appeals for the Second Circuit. He was confirmed to that seat on September 17, 2009, after previo ...
called a "staggering" amount of information. In November 2014, an appeals court in Washington heard arguments in the case '' Klayman v. Obama''. During the hearings, Justice Department attorney H. Thomas Byron defended the NSA's collection of phone records and stated that "the government doesn't and never has acquired all or nearly all of the telephone call data records."


Claims

;New Jersey Spurred by the public disclosure of the NSA call database, a lawsuit was filed against Verizon on May 12, 2006 at the Federal District Court in Manhattan by Princeton, N.J. based attorneys Carl Mayer and Bruce Afran. The lawsuit seeks $1,000 for each violation of the
Telecommunications Act of 1996 The Telecommunications Act of 1996 is a United States federal law enacted by the 104th United States Congress on January 3, 1996, and signed into law on February 8, 1996, by President Bill Clinton. It primarily amended Chapter 5 of Title 47 of ...
, and would total approximately $5 billion if the court certifies the suit as a class-action lawsuit. ;Oregon On May 12, 2006, an Oregon man filed a lawsuit against Verizon Northwest for $1 billion. ;Maine On May 13, 2006, a complaint in Maine was filed by a group of 21 Maine residents who asked the Public Utilities Commission (PUC) to demand answers from Verizon about whether it provided telephone records and information to the federal government without customers' knowledge or consent. Maine law requires the PUC to investigate complaints against a utility if a petition involves at least 10 of the utility's customers. ;California (E.F.F.) Shortly after the NSA call database story surfaced, a San Francisco lawsuit, '' Hepting v. AT&T'', was filed by the
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group based in San Francisco, California. The foundation was formed on 10 July 1990 by John Gilmore, John Perry Barlow and Mitch Kapor to promote Internet ...
.


Justice Department response

On May 14, 2006, the Los Angeles Times reported that the U.S. Justice Department called for an end to an eavesdropping lawsuit against AT&T Corp., citing possible damage from the litigation to national security.In 1970, when stolen
COINTELPRO COINTELPRO ( syllabic abbreviation derived from Counter Intelligence Program; 1956–1971) was a series of covert and illegal projects actively conducted by the United States Federal Bureau of Investigation (FBI) aimed at surveilling, infiltrati ...
documents were released to members of Congress, journalists, and organizations who were named in the files, the administration's response to the disclosures was to warn that any further disclosures "could endanger the lives or cause other serious harm to persons engaged in investigation activities on behalf of the United States." Stone, Geoffrey R., Perilous Times: Free Speech in Wartime from the Sedition Act of 1798 to the War on Terrorism, p. 495
In an April 28 Statement of Interest of the AT&T case, the US government indicated that it intends to invoke the State Secrets Privilege in a bid to dismiss the action.


Legal status

The NSA call database was not approved by the
Foreign Intelligence Surveillance Court The United States Foreign Intelligence Surveillance Court (FISC), also called the FISA Court, is a U.S. federal court established under the Foreign Intelligence Surveillance Act of 1978 (FISA) to oversee requests for surveillance warrants aga ...
(FISC) as required by the
Foreign Intelligence Surveillance Act The Foreign Intelligence Surveillance Act of 1978 ("FISA" , ) is a United States federal law that establishes procedures for the physical and electronic surveillance and the collection of "foreign intelligence information" between "foreign pow ...
(FISA). The FISC was established in 1978 to secretly authorize access to call-identifying information and interception of communications of suspected foreign agents on U.S. soil. Stanford Law School's
Chip Pitts Chip Pitts is a lecturer who has regularly taught at Stanford, Oxford, and as a Professor or Visiting Professor at other major universities in the West and Asia. Considered one of the world’s “top academics on corporate responsibility,” h ...
provided an overview of the relevant legal concerns in The Washington Spectator. Separate from the question of whether the database is illegal under FISA, one may ask whether the call detail records are covered by the
privacy protection Privacy engineering is an emerging field of engineering which aims to provide methodologies, tools, and techniques to ensure systems provide acceptable levels of privacy. In the US, an acceptable level of privacy is defined in terms of compliance ...
of the Fourth Amendment of the U.S. Constitution. This is unclear. As the U.S. has no explicit constitutional guarantee on the secrecy of correspondence, any protection on communications is an extension from
litigation - A lawsuit is a proceeding by a party or parties against another in the civil court of law. The archaic term "suit in law" is found in only a small number of laws still in effect today. The term "lawsuit" is used in reference to a civil act ...
of the privacy provided to "houses and papers." This again is dependent on the flexuous requirement of a ''
reasonable expectation of privacy Expectation of privacy is a legal test which is crucial in defining the scope of the applicability of the privacy protections of the Fourth Amendment to the United States Constitution. It is related to, but is not the same as, a ''right to privacy ...
''. The most relevant U.S. Supreme Court case is ''
Smith v. Maryland ''Smith v. Maryland'', 442 U.S. 735 (1979), was a Supreme Court case holding that the installation and use of a pen register by the police to obtain information on a suspect's telephone calls was not a "search" within the meaning of the Fourth Ame ...
''. In that case, the Court addressed
pen register A pen register, or dialed number recorder (DNR), is an electronic device that records all numbers called from a particular telephone line. The term has come to include any device or program that performs similar functions to an original pen regi ...
s, which are mechanical devices that record the numbers dialed on a telephone; a pen register does not record call contents. The Court ruled that pen registers are not covered by the Fourth Amendment: "The installation and use of a pen register, ... was not a 'search,' and no warrant was required." More generally, "This Court consistently has held that a person has no legitimate expectation of privacy in information he ... voluntarily turns over to third parties." The data collecting activity may however be illegal under other telecommunications
privacy law Privacy law is the body of law that deals with the regulating, storing, and using of personally identifiable information, personal healthcare information, and financial information of individuals, which can be collected by governments, public o ...
s.


Stored Communications Act

The 1986 Stored Communications Act (18 U.S.C. § 2701) forbids turnover of information to the government without a warrant or court order, the law gives consumers the right to sue for violations of the act.
A governmental entity may require the disclosure by a provider of electronic communication service of the contents of a wire or electronic communication ... only pursuant to a warrant issued using the procedures described in the Federal Rules of Criminal Procedure
However, the Stored Communications Act also authorizes phone providers to conduct electronic surveillance if the Attorney General of the United States certifies that a court order or warrant is not required and that the surveillance is required:
elephone providersare authorized to ... intercept ... communications or to conduct electronic surveillance ... if such provider ... has been provided with a certification in writing by ... the Attorney General of the United States that no warrant or court order is required by law, that all statutory requirements have been met, and that the specified assistance is required.
The Act provides for special penalties for violators when "the offense is committed ... in violation of the Constitution or laws of the United States or any State." Finally, the act allows any customer whose telephone company provided this information to sue that company in civil court for (a) actual damages to the consumer, (b) any profits by the telephone company, (c) punitive damages, and (d) attorney fees. The minimum amount a successful customer will recover under (a) and (b) is $1,000:


Communications Assistance for Law Enforcement Act

President Clinton signed into law the
Communications Assistance for Law Enforcement Act The Communications Assistance for Law Enforcement Act (CALEA), also known as the "Digital Telephony Act," is a United States wiretapping law passed in 1994, during the presidency of Bill Clinton (Pub. L. No. 103-414, 108 Stat. 4279, codified at 47 ...
of 1994, after it was passed in both the House and Senate by a voice vote. That law is an act "to make clear a telecommunications carrier's duty to cooperate in the interception of communications for law enforcement purposes, and for other purposes." The act states that a court order isn't the only lawful way of obtaining call information, saying, "A telecommunications carrier shall ensure that any interception of communications or access to call-identifying information effected within its switching premises can be activated only in accordance with a court order or other lawful authorization."


Historical background

The
FISC Under the Merovingians and Carolingians, the fisc (from Latin ''fiscus,'' whence we derive "fiscal") applied to the royal demesne which paid taxes, entirely in kind, from which the royal household was meant to be supported, though it rarely was. ...
was inspired by the recommendations of the
Church Committee The Church Committee (formally the United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities) was a US Senate select committee in 1975 that investigated abuses by the Central Intelligence ...
, p. 34 which investigated a wide range of intelligence and counter-intelligence incidents and programs, including some U.S. Army programs and the FBI program
COINTELPRO COINTELPRO ( syllabic abbreviation derived from Counter Intelligence Program; 1956–1971) was a series of covert and illegal projects actively conducted by the United States Federal Bureau of Investigation (FBI) aimed at surveilling, infiltrati ...
. In 1971, the US media reported that COINTELPRO targeted thousands of Americans during the 1960s, after several stolen FBI dossiers were passed to news agencies. The
Church Committee The Church Committee (formally the United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities) was a US Senate select committee in 1975 that investigated abuses by the Central Intelligence ...
Senate final report, which investigated COINTELPRO declared that:


Legality

The legality of blanket wiretapping has never been sustained in court, but on July 10, 2008 the US Congress capitulated to the administration in granting blanket immunity to the administration and telecom industry for potentially illegal domestic surveillance. The bill was passed during the crucible of the 2008 presidential campaign, and was supported by then-Sen. Barack Obama, D-Ill., who was campaigning against Sen. John McCain, R-Ariz., for the presidency. Obama provided qualified support for the bill. He promised to "carefully monitor" the program for abuse, but said that, "Given the legitimate threats we face, providing effective intelligence collection tools with appropriate safeguards is too important to delay. So I support the compromise." It is difficult to argue that appropriate safeguards are in place, when CDRs from all the major telecommunications companies are provided to the NSA. The Foreign Intelligence Surveillance Court has released an opinion, dated August 29, 2013, written by U.S. District Judge
Claire Eagan Claire Veronica Eagan (born October 9, 1950) is a Senior United States district judge of the United States District Court for the Northern District of Oklahoma and a former Judge of the United States Foreign Intelligence Surveillance Court. Effe ...
of the Northern District of Oklahoma, in which she said "metadata that includes phone numbers, time and duration of calls is not protected by the Fourth Amendment, since the content of the calls is not accessed." In the option, Judge Eagan said "data collection is authorized under Section 215 of the Patriot Act that allows the FBI to issue orders to produce tangible things if there are reasonable grounds to believe the records are relevant to a terrorism investigation." The option authorized the FBI to "collect the information for probes of 'unknown' as well as known terrorists." According to the ''
New York Times ''The New York Times'' (''the Times'', ''NYT'', or the Gray Lady) is a daily newspaper based in New York City with a worldwide readership reported in 2020 to comprise a declining 840,000 paid print subscribers, and a growing 6 million paid ...
'', "other judges had routinely reauthorized the data collection program every 90 days."


Political action

The
Senate Armed Services Committee The Committee on Armed Services (sometimes abbreviated SASC for ''Senate Armed Services Committee'') is a committee of the United States Senate empowered with legislative oversight of the nation's military, including the Department of Def ...
was scheduled to hold hearings with NSA whistle-blower
Russell Tice Russell D. Tice (born 1961) is a former intelligence analyst for the United States Air Force, Office of Naval Intelligence, Defense Intelligence Agency (DIA), and National Security Agency (NSA). In December, 2005, Tice helped spark a national cont ...
the week following the revelation of the NSA call database. Tice indicated that his testimony would reveal information on additional illegal activity related to the NSA call database that has not yet been made public, and that even a number of NSA employees believe what they are doing is illegal. Tice also told the ''
National Journal ''National Journal'' is an advisory services company based in Washington, D.C., offering services in government affairs, advocacy communications, stakeholder mapping, and policy brands research for government and business leaders. It publishes d ...
'' that he "will not confirm or deny" if his testimony will include information on
spy satellite A reconnaissance satellite or intelligence satellite (commonly, although unofficially, referred to as a spy satellite) is an Earth observation satellite or communications satellite deployed for military or intelligence applications. The ...
s being used to spy on American citizens from
space Space is the boundless three-dimensional extent in which objects and events have relative position and direction. In classical physics, physical space is often conceived in three linear dimensions, although modern physicists usually consi ...
. However, these hearings did not occur and the reason why is unknown.


Polls

*In a ''
Newsweek ''Newsweek'' is an American weekly online news magazine co-owned 50 percent each by Dev Pragad, its president and CEO, and Johnathan Davis (businessman), Johnathan Davis, who has no operational role at ''Newsweek''. Founded as a weekly print m ...
'' poll of 1007 people conducted between May 11 and 12, 2006, 53% of Americans said that "the NSA's surveillance program goes too far in invading privacy " and 57% said that in light of the NSA data-mining news and other executive actions the Bush-Cheney Administration has "gone too far in expanding presidential power" while 41% see it as a tool to "combat terrorism" and 35% think the Administration's actions were appropriate. *According to a ''
Washington Post ''The Washington Post'' (also known as the ''Post'' and, informally, ''WaPo'') is an American daily newspaper published in Washington, D.C. It is the most widely circulated newspaper within the Washington metropolitan area and has a large na ...
'' telephone poll of 502 people, conducted on May 11, 63% of the American public supports the program, 35% do not; 66% were not bothered by the idea of the NSA having a record of their calls, while 34% were; 56% however thought it was right for the knowledge of the program to be released while 42% thought it was not. May 12, 2006 These results were later contradicted by further polls on the subject, specifically a ''USA Today''/
Gallup poll Gallup, Inc. is an American analytics and advisory company based in Washington, D.C. Founded by George Gallup in 1935, the company became known for its public opinion polls conducted worldwide. Starting in the 1980s, Gallup transitioned its ...
showing 51% opposition and 43% support for the program.


Qwest Communications

The ''USA Today'' report indicated that
Qwest Qwest Communications International, Inc. was a United States telecommunications carrier. Qwest provided local service in 14 western and midwestern U.S. states: Arizona, Colorado, Idaho, Iowa, Minnesota, Montana, Nebraska, New Mexico, North Dako ...
's then CEO,
Joseph Nacchio Joseph P. Nacchio (born June 22, 1949 in Brooklyn, New York) is an American executive who was chairman of the board and chief executive officer of Qwest Communications International from 1997 to 2002. Nacchio was convicted of insider trading durin ...
, doubted the NSA's assertion that
warrants Warrant may refer to: * Warrant (law), a form of specific authorization ** Arrest warrant, authorizing the arrest and detention of an individual ** Search warrant, a court order issued that authorizes law enforcement to conduct a search for eviden ...
were unnecessary. In negotiations, the NSA pressured the company to turn over the records. Qwest attorneys asked the NSA to obtain approval from the
United States Foreign Intelligence Surveillance Court The United States Foreign Intelligence Surveillance Court (FISC), also called the FISA Court, is a U.S. federal court established under the Foreign Intelligence Surveillance Act of 1978 (FISA) to oversee requests for surveillance warrants aga ...
. When the NSA indicated they would not seek this approval, Qwest's new CEO Richard Notebaert declined NSA's request for access. Later,
T-Mobile T-Mobile is the brand name used by some of the mobile communications subsidiaries of the German telecommunications company Deutsche Telekom AG in the Czech Republic ( T-Mobile Czech Republic), Poland ( T-Mobile Polska), the United States (T-Mobil ...
explicitly stated they do not participate in warrantless surveillance.


See also


References


External links

* (Original report of the NSA call database) * * * * * * * * * * * {{National Security Agency National Security Agency Government databases in the United States George W. Bush administration controversies Privacy of telecommunications Counterterrorism in the United States Surveillance scandals Mass surveillance Surveillance Law enforcement databases in the United States de:National Security Agency Call Database