Page 164 - Privacy in a Cyber Age Policy and Practice
P. 164

152  PRIVACY IN A CYBER AGE

                surveillance, particularly that taking authority from executive order,
                “lies entirely outside of FISC review,” and as such “is only subject to
                the NSA’s internal ‘checks and balances.’” 220
              ●   Annual reports by Inspectors General regarding the activities of the
                NSA 221
              ●   Stronger laws protecting whistleblowers; a category that should be
                limited to those who go through established channels rather than
                leak information to the public and the press. 222
              ●   Subjecting the NSA to closer oversight by various Congressional
                         223
                committees.  One should note, however, the danger of overcorrecting
                for the current problems. Famously, the Department of Homeland
                Security is subject to so many committees that its senior staff spends a
                very large portion of their time testifying before Congress and preparing
                for such appearances.
              ●   Reforming how FISA court judges are selected to ensure greater inde-
                pendence from government and creating multiple judge panels that
                might allow for dissents. 224
              ●   Senator Dianne Feinstein has suggested that the government should
                keep records for only two or three years rather than for the present
                five-year retention period. 225  However, there is no apparent evidence
                that such a short period is sufficient. Sleeper cells often stay inactive
                for ten years or longer. A case in point is the Russian spy ring that was
                broken up in 2010. 226
              ●   Implement audit trails to ensure that only the proper authorities have
                access to any given piece of information. 227

              A report on the operation of the Terrorist Finance Tracking Program
           (TFTP) provides a powerful example. A project developed by the U.S.
           Treasury, the TFTP collects large amounts of data from a financial mes-
           saging system (called Swift) that records data on financial transfers. The
           TFTP used this information to uncover terrorist networks and to prevent
           multiple attacks. 228  Importantly, the TFTP was subjected to significant
           oversight—only narrowly focused searches and analysis of the data were
           permitted, and two different groups of independent auditors ensured that
           those restrictions were being strictly adhered to. 229  Moreover, any time a
           government analyst wanted to query the system, they had to submit a
           reason for their query that could then be approved or denied by a Swift
           representative. 230  (It is not obvious that this arrangement is scalable to the
           NSA level. Queries by analysts are already reviewed by managers at NSA.
           Select queries are subject to a “two person” rule.)
              Other suggestions involve Congress; for example, some have suggested
           increasing the number of members of Congress who are being briefed or
   159   160   161   162   163   164   165   166   167   168   169