Page 158 - Privacy in a Cyber Age Policy and Practice
P. 158

146  PRIVACY IN A CYBER AGE

                            3. Cross-Border Communications

           The government’s initial position has been that PRISM is not targeting
           Americans or those known to reside within the borders of the United
           States. 176  In addition, the NSA cannot target a foreign communication with
           the intention of back tracking to a person in the United States. 177
              However, critics of the PRISM program, such as Senator Ron Wyden
           (D-OR), have argued that a loophole in Section 702 allows the government
           to conduct “backdoor” or warrantless searches of Americans’ communi-
           cations. 178  Specifically, critics argue that the incidental collection of data
           belonging to Americans who communicate with foreign nationals abroad
           further increases the potential pool of Americans being electronically
           monitored by the government. When the NSA collects information on a
           foreign target “means, at minimum, that everyone in the suspect’s inbox or
           outbox is swept in.” Furthermore, “intelligence analysts are typically taught
           to chain through contacts two ‘hops’ out from their target, which increases
           ‘incidental collection’ exponentially.” 179  And the 2008 amendment to
           FISA removed the warrant requirement for any communication involv-
           ing a foreign target — even if the communication involved an American
           sender or recipient. 180
              Much of the legal reasoning that justifies the collection of phone records
           (e.g., the general acceptance of “checkpoint searches” as being in accor-
           dance with the Fourth Amendment), can also be used to justify PRISM’s
           incidental collection of communications between Americans and those
           across the border. In addition, the fact that these communications occur
           at the cyber-equivalent of a border also could be used to justify this kind
           of search. The Supreme Court has held that “searches made at the border,
           pursuant to the longstanding right of the sovereign to protect itself by stop-
           ping and examining persons and property crossing into this country, are
           reasonable simply by virtue of the fact that they occur at the border.” 181  The
           Court has similarly maintained that such searches without probable cause
           are reasonable not just at the physical borders, but at the “functional equiv-
           alents” of the border as well. 182  These searches are all justified by the fact
           that the United States has an overriding interest, and authority, to protect its
           “territorial integrity” as well as preserve national security. 183  More broadly,
           the exception is based on the government’s “sovereign right to protect itself
                                                            184
           from terrorist activities, unlawful migration, and contraband.”  Whether
           PRISM should be applied to dealing with acts other than terrorism is a very
           weighty normative and legal issue that calls for a separate treatment that is
           beyond the scope of this chapter.
              The review so far suggests that PRISM is a legal and reasonable program.
           This assumes that it is employed as depicted by the government. How to
   153   154   155   156   157   158   159   160   161   162   163