By Doug Porter
It’s a one topic day for this news roundup.
The Guardian newspaper has a major scoop on its hands. Reporter Glen Greenwald yesterday published a leaked copy of a Patriot Act Section 215 order. The order itself is the scoop, since Section 215 orders are secretly authorized by a secret court to tell individuals to take actions in secret.
Revealing the existence of one of these secret orders is against the law. So we can expect a Federal investigation with its own set of secret court orders into who leaked this document.
And, sorry conservatives, this isn’t anything unique to the Obama administration. Members of both parties have been playing this hush-hush sport for way too long. Before 9/11 even.
As California Senator Diane Feinstein, who led efforts to defeat language requiring specific ties to terrorists with Section 215 orders, put it this morning, “It’s called protecting America.” She and Georgia Senator Chambliss told the media, “monitoring of phone records… has been going on for years, Congress is regularly briefed about it.”
So the content of the leaked document, which ordered a single telecommunications provider to share transactional information about every transaction made through its system, is… Not. Really. News. To anybody who’s been paying attention.
An expert interviewed by the Washington Post today said the Section 216 order appeared to be a routine renewal of a standing order that’s been more or less in place since 2006. And while the leaked document refers to Verizon, other telecommunications providers almost certainly are under similar orders.
Here’s what the government wants, from the Guardian story:
The information is classed as “metadata”, or transactional information, rather than communications, and so does not require individual warrants to access. The document also specifies that such “metadata” is not limited to the aforementioned items. A 2005 court ruling judged that cell site location data – the nearest cell tower a phone was connected to – was also transactional data, and so could potentially fall under the scope of the order.
While the order itself does not include either the contents of messages or the personal information of the subscriber of any particular cell number, its collection would allow the NSA to build easily a comprehensive picture of who any individual contacted, how and when, and possibly from where, retrospectively.
So it’s totally legal for the federal government to collect such data on phone calls without any specific basis for suspicion. The Supreme Court has already ruled that such data has no Fourth Amendment protection, on the theory that sharing information with a third party gives no “reasonable expectation of privacy” with respect to the government obtaining information from that party.
As David Cole at The Nation puts it:
Congress has placed some limits on the gathering of such data, but as this order reveals, they are largely meaningless. A controversial provision of the USA PATRIOT Act, Section 215, allows the government to demand “business records” from any business, so long as they are “relevant to an authorized investigation … to obtain foreign intelligence information … or to protect against international terrorism.” Section 215 orders are granted in secret, as this one was, and until now little was known about how extensively the government relied upon them, or how “relevant” was interpreted. By this single order, however, the NSA has been given access to records on literally millions of customers, without suspicion about any of them. We don’t know the government’s theory, but it appears that it may be arguing that in order to protect against international terrorism, it is “relevant” to sweep up phone call data about all of us all of the time.
Last year, Senators Ron Wyden and Mark Udall warned, in a letter to Attorney General Eric Holder, “We believe most Americans would be stunned to learn the details of….these secret court opinions. As we see it, there is now a significant gap between what most Americans think the law allows and what the government secretly claims the law allows.” Count me as one of those stunned. The leak of this secret court opinion certainly narrows the gap in our knowledge that secrecy permitted. But it does so by confirming that those most paranoid about government spying were right after all.
Is all this data collection necessary to keep us ‘safe’ from terrorists? Or is this just a part of the every day routine of 21st century governance?
Columnist Richard Seymour at The Guardian weighs in:
Technically, one could argue that there is no need for this surveillance. The inspector general of five federal intelligence bureaucracies published a report in 2009 indicating that FISA’s requirements had in no way hindered intelligence-gathering efforts. That may be missing the point, however. Expanding the state’s ability to gather information on citizens, no matter what the justification, always increases its options – be they repressive or productive. Further, the convergence of spying on the one hand and secrecy on the other is just characteristic of the state’s tendency to monopolise information.
The conventional liberal critique of such practices is prudential. As the liberal writer Stephen Holmes argued, secrecy undermines security by allowing the state to conceal and perpetuate errors. It removes the necessity to have plausible reasons for one’s policies, so that eventually one stops having plausible reasons. These strictures apply even more in the case of emergencies. Holmes evoked the image of an emergency room, in which medical staff are having to cope with life-threatening situations; unless their behaviour is governed by certain rules, medical staff will be prone to error.
This metaphor may work, if we assume the patient is a crisis-stricken American capitalism and its global authority. Obama’s hoarding of executive power can only be understood in the context of his mission to restore American global power, rationalise its productive base, and expand the state’s capacity to process dysfunctions. In this respect, his agenda is not fundamentally dissimilar from that of his predecessor, which is why he needs many of the same means.
I would like to error on the side of the freedoms that George Bush told us the ‘terrorists hate us so much for’ on this issue. I think this leak is a good thing…IF it provokes a non-hysterical discussion about what government does in the name of national security. I know the chances of that are small, because the chickenhawks squawking about such dialogue revealing our (military) weaknesses have traditionally triumphed. But I’d like to hope for it anyway.
As Conor Friedersdorf at The Atlantic says:
There would be fewer leaks if the Bush and Obama administrations hadn’t improperly hid so much of consequence from the American people, including policies that made federal employees uncomfortable or ashamed, usually because they’re illegal, immoral, or at odds with American values.
As a first-term Illinois senator turned president-elect once put it, “often the best source of information about waste, fraud, and abuse in government is an existing government employee committed to public integrity and willing to speak out. Such acts of courage and patriotism, which can sometimes save lives and often save taxpayer dollars, should be encouraged rather than stifled. We need to empower federal employees as watchdogs of wrongdoing and partners in performance.”
Just as we celebrate Daniel Ellsberg of Pentagon Papers fame, recognizing that his leak made America stronger rather than weaker, I hope and trust we’ll one day celebrate the War on Terror leakers who kept reminding Americans that their national security state is out of control.
On This Day: 1944 – The D-Day invasion of Europe took place on the beaches of Normandy, France. 400,000 Allied American, British and Canadian troops were involved. 1968 – Senator Robert F. Kennedy died at 1:44am in Los Angeles after being shot by Sirhan Sirhan. Kennedy was shot the evening before while campaigning for the Democratic presidential nomination. 1972 – David Bowie’s “Ziggy Stardust and the Spiders From Mars” was released.
Did you enjoy this article? Subscribe to “The Starting Line” and get an email every time a new article in this series is posted!
I read the Daily Fishwrap(s) so you don’t have to… Catch “the Starting Line” Monday thru Friday right here at San Diego Free Press (dot) org. Send your hate mail and ideas to DougPorter@SanDiegoFreePress.

Ya know, I’m finding it rather hard to muster up any outrage about this. What the NSA has done (and done so since the Bush administration, with no one raising a stink about it until it was revealed to have happened on the Black President’s watch) is to collect phone numbers. Nothing more than phone numbers. No names, no recordings of conversations, no text messages. Just the phone numbers and who they’ve called or been called by. They then match up any numbers with the numbers of known terror suspects, and then they MIGHT have probable cause for further investigation.
So, they have my number, but they don’t have my name associated with it. They don’t know it’s mine until they have reason to dig further, which I have not and will not give them (I don’t have any ties to terrorists…..not that I know of, at least). So I don’t really see how my privacy has been invaded. When that happens, then let’s talk.
Until then……..
yeah, yeah, yeah… the old ‘if you’re not doing anything illegal, why should you be bothered by surveillance?’ argument. it got used a lot by ‘good Americans’ when civil rights and anti-war protestors complained about being spied on.
i am not “outraged” by the Guardian’s disclosures. i am not even surprised. but i think a broader discussion of what constitutes privacy is warranted.
finally, metadata is actually more useful to intelligence agencies than ‘content’. transcribing recordings (even if done by software) is a tedious process that slows down analysis. and the gov’t has never had the resources to use the recordings it has collected for intelligence purposes. that’s why there are still literally boxcars full of magnetic tape in Maryland of intercepted Soviet communications…
From Businessinsider:
Last year, Nokia held what it called “Interdependence and Predictability of Human Mobility and Social Interactions” dedicated competition.
Basically, volunteers gave competing research teams the exact same information the NSA just acquired.
Here’s what they were able to tell from that information:
— Your location in 24 hours, to within 20 meters.
— Your demographics — race, age, class.
— Your intent, or the reason you a traveling to a certain area.
Read more: http://www.businessinsider.com/what-nsa-meta-data-can-do-2013-6#ixzz2VSw4k86w
Andy, Here is how the system will work…….
The Free Press is a terrorist newspaper and therefore you are working for the terrorists. Hence, you are guilty of treason and the death penalty awaits you. –“Nothing to hide” argument is a very dangerous platform. You have rights as a human being, the state is the state. (liberal, conservative vs republican vs democrat, pepsi vs coke, etc…..is all diversion tactics we are ground into lower and lower economic and social rights. )
NSA SPOOKS
Mr. Cohen, you are quite naiive. You think all they have is your phone number.
All those millions and millions of Internet message, phone calls and e-mails that the NSA and CIA are storing — I heard Diane Feinstein (Chair of the Senate Intelligence Committee), along with her Republican buddy, Rep. Mike Rogers (R-Michigan), chairman of the House “Intelligence” Committee, declaring on the George Stephanopolous show how harmless and innocuous this information is, because they collect only phone numbers, date-time, and length of calls, and that there are NO NAMES collected. What idiots! If you have only that information, and run it through the NSA super-computer programs and algorithms, you can extrapolate all kinds of information that could identify innocent people as suspects.
How did Feinstein and Rogers ever get onto so-called “intelligence” committees?
Mr. Cohen:
Here is something for you to try: Enter your own 10-digit telephone number into a Google search, and see what kind of information you can retrieve. You may be shocked. For just $1 you may be able to extract all of the following:
Owner Name
Age
Address
Possible Relatives
Historical Locations
Phone Carrier
And for only $10 you can have unlimited searches for a whole month.
The NSA, of course, has its own SUPER computers, highly sophisticated search programs and has unlimited free search on millions of calls every day. Kind of scary, isn’t it?
Have you ever wondered who was spying on Gen. David Petraeus while he was Director of the CIA? Well, it certainly was not Bradley Manning, but it could have been any one of thousands of low-level intelligence people. And ask yourself, if General Petraeus, CIA Director, was not aware his calls and emails were being tapped while he was having an amorous relationship with that wealthy Florida socialist, then how in the world is any average person to know when Big Bad Brother is spying on them?
They’ve got your number, all right.
I don’t know about “outrage,” exactly, but it sure makes me worry.
The “war on terror” makes the “war on drugs” look brilliant and honest by comparison.
Institutionalizing undisclosed snooping and dumping fortunes of money on it are changing the kind of nation we thought we were. And the Democratic President is constitutional lawyer!
It’s been imperfect, but I have always felt fortunate and grateful to have been born in this country. Now I am worrying and doubting. I guess I need to go up to Mt. Soledad and say a little prayer to the wargods.
Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple, Verizon, Sprint…etc…have been sharing your personal information with each other for years now.
Will the mainstream media ever do a show about the “corporate war on privacy”?
Oh…that’s right…nevermind.
IF HE HAS DONE NOTHING WRONG …
Long before the NSA, CIA and FBI; long before the East German Stasi and the Catholic Inquisition, there were domestic government spies in ancient Rome, Persia and Babylonia and China. All oppressed freedom of speech and liberty. They imprisoned, beheaded and quartered traitors who disrespected the emperor, or blasphemed god. Their common element was the dark stream of secrecy. Apostle John wrote “And men loved darkness rather than light because their deeds were evil.”
The Roman poet Juvenal penned in his Satires “Quis custodiet ipsos custodes?” which translates “Who will guard the guards themselves?” That is the preeminent question in American today: Who will keep our cyber totalitarians in check? How can we rein them back in and restore Constitutional law in the United States? We can never accept that it is too late. It is too late for those already killed by our cyber tyrants, but it is not too late for Bradley Manning, and not too late for Edward Snowden. And it is not too late to save the democratic soul of our nation.
Bring to trial James Clamper, the NSA director, who lied to the US Senate and the American people. Try Clamper for gross violations of the Bill of Rights.
If Clapper has done nothing wrong, he has nothing to fear.