Vermont Bar Journal, Vol. 40, No. 2 Spring 2014, Vol. 40, No. 1 | Page 16

by David F. Kelley, Esq. Taking Terabytes Out of the Constitution: Can We Fight Terrorism Without Big Brother? Last year my wife and I hosted an exchange student from Pakistan. He came to the U.S. under the auspices of the State Department’s Kennedy Lugar Youth Exchange. We continue to be friends on Facebook, to Skype, and to exchange emails. We wanted to help improve relations with Pakistan. By communicating with this student and his family and friends, without ever knowing it, we gave the National Security Agency (NSA) carte blanche to delve into every corner of our lives. Our right to be secure in our “persons, houses, papers, and effects, against unreasonable searches and seizures” is the product of a struggle that is primordial. One Vermont judge described it this way: “The history of western civilization reveals an ancient and profound respect for the dwelling of an individual. It also illustrates the antiquity and importance of the requirement that the authorities must have cause to invade such dwellings and may do so only with specific and particularized authority.”1  In that decision Judge Frank Mahady recalled that in 1761, when British customs inspectors were given general warrants to search the property of any and all Boston merchants, James Otis, Jr. unsuccessfully represented the merchants who fought those warrants. One of those present at the trial, John Adams, later wrote, ‘Then and there the Child of Independence was born. In fifteen years, namely in 1776, he grew up to manhood, and declared himself free.’”2 In 1761 the British customs agents did their searches in person—and they at least had the semblance of a warrant. Today, with surveillance searches and data seizures pursuant to Section 215 of the Patriot Act,3 the government can enter homes and businesses through a fiber optic cable and gain access to more persons, houses, papers and effects than George III could have ever imagined, even in his wildest dreams. Last summer’s revelations from Edward Snowden revealed that this power casts a dark shadow across the First, Fourth, and Fifth Amendments to the U.S. Constitution. The National Security Agency (NSA) Programs The challenges to the NSA programs 16 that have made their way through the first round of litigation thus far (at the time of this writing) have focussed primarily on the NSA’s collections of bulk records of telephone data (so-called “telephony metadata”). However there are other executive branch programs that are less understood and perhaps more troubling.4 Glenn Greenwald, in articles published in the Guardian, based on documents disclosed by Snowden, described a program called “Prism” on June 6, 2013. According to Greenwald: • The National Security Agency has obtained direct access to the systems of Google, Facebook, Apple, and other US internet giants. • Using Prism, officials can collect material including search history, the content of emails, file transfers, and live chats. Prism collects metadata with a court warrant through the “front door.”5 On October 30, 2013, the Washington Post disclosed another NSA program referred to as “Muscular.” The so-called Muscular program collects metadata from Google and Yahoo data centers around the world. By adding and removing encryption the NSA collects this data through the “back door,” outside the U.S., and thus avoids the restrictions imposed by U.S. law. Digital communications and cloud storage don’t recognize national boundaries, thus allowing virtually unrestricted access to much of the U.S. internet traffic. On June 11, 2013, Glen Greenwald, again writing in the Guardian disclosed another program called “Boundless Informant.” Boundless Informant records, counts, categorizes, and analyses surveillance searches and data seizures. Over a thirty-day period it collects three billion pieces of intelligence.6 The dangers of this kind of tool became clear recently during protests in the Ukraine, when the Ukrainian government sent texts to the cell phones of protesters in the center of Kiev telling them they had been identified as being at the protest. If the Ukrainian government has that capability it is hard to imagine the NSA’s capabilities. But the most troubling of the disclosures to date is the “XKeyscore” program described by Greenwald in the Guardian on July 31, 2013.7 According to GreTHE VERMONT BAR JOURNAL • SPRING 2014 enwald: • Xkeyscore allows analysts to search with no prior authorization through vast databases containing emails, online chats, and the browsing histories of millions of individuals. • Analysts can use it and other systems to mine enormous agency databases (called “the Corporate Store”) by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.  • The program covers “nearly everything a typical user does on the internet,” including the content of emails, websites visited, and searches, as well as their metadata. • Analysts can also use  XKeyscore  and other NSA systems to obtain ongoing “real-time