[This is G again. I’m back, still working off the timeline of the Snowden affair that my friends prepared these last three weeks. Fred asked me to remind you that he wants to “open source” the Timeline, so he’ll consider any and all suggestions for improving it. He’s very opinionated, as you know, so he’s not guaranteeing he will accept all changes, but he promises to give them all a fair hearing. I expect that’s better than you might get anywhere else.

Today we’re going to take a closer look at the NSC’s approach to collecting data about Americans, and compare it with the criteria set out in NSA’s “foundational authority” for spying, i.e., in Executive Order 12333.[1] Of course, that Order dates from 1981, but it’s still around[2], so it’s still “operative,” to use an old expression[3]. But is it being followed? Let’s take a look.]

Executive Order 12333.

This Order dates from the Reagan Administration. The people who wrote it were very careful to observe the Constitutional niceties. Nothing in the Order, they said, “shall be construed to authorize any activity in violation of the Constitution or statutes of the United States. [4]“ That’s an important statement, I think, because it says even the Intelligence Community must obey the rule of law. Media pundits, Hollywood script writers and others of similar ilk may not agree, but hey! That’s show business!

Assassination is prohibited[5] as a tool of intelligence, and human experiments are closely controlled. [6] One of these days we’ll look into the history of this; I’m sure there’s quite a story there. But that’s a tomorrow problem. Today we’ll just note that Intelligence agencies can’t break these rules or ask others to do so.[7] At least that’s what the Executive Order says.

Now let’s move on to our main topic, i.e., how and when does the U.S. Government spy on Americans?

Of course, by now we all know what the U.S. Constitution[8] says. The Fourth Amendment says our right “to be secure in [our] persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated …”[9] The Government must first get a warrant, based on “probable cause,” and describing the particulars of what it is looking for, before it can invade our personal space.

So how does that work when the Government’s after intelligence? Well, it’s not absolutely clear. The Intelligence Community needs information to protect us, and will pursue it in a “vigorous, innovative and responsible manner.”[10] But at the same time, its activities must be “consistent with the Constitution and applicable law and respectful of the principles upon which the United States was founded.[11]” Sounds like a conundrum, doesn’t it? A puzzle, a riddle, a problem to be solved?

Well, apparently there is a solution, or at least a process, that intelligence bureaucrats can invoke if they’re suspicious of a citizen.[12] If the suspect is in this country or abroad, the Government should:

  • Use the “least intrusive collection techniques feasible”[13]
  • Don’t use electronic surveillance, unconsented physical search, mail surveillance, physical surveillance or monitoring devices unless such techniques are regulated by the Head of the Agency involved and the regulations are approved by the Attorney General.[14]
  • In general, use the CIA for surveillance overseas, and the FBI to do the same job in the U.S.[15]

So, just looking at the four corners of Executive Order 12333, it seems our Government has, or had, a system carefully tuned to examine individual cases, determine the appropriate surveillance techniques, and apply them. Today, however, we seem to have developed a different, parallel system. We have the new, improved …

NSC/NSA Vacuum Cleaner

No doubt you all remember June 6, when The Guardian released the first of its articles on Edward

Snowden and the documents he purloined from the NSA.[16] It turns out the NSA has been collecting signals intelligence on a wholesale basis for some time now, and has accumulated a massive data base including, what a surprise, data on U.S. persons at home or abroad. Is this because the Government has probable cause to believe that many of us are a danger to our country? No, not really. The Government needs all of that data because someday, somewhere, a pattern may emerge from it that predicts terrorist activity of some sort at some place or another.

And how do I know that? Well, because the Director of National Intelligence said so. He said the data collected “is broad in scope” because “more narrow collection would limit our ability to screen for and identify terrorism-related communications.”[17] Acquiring lots of data in this manner “allows us [the Government] to make connections related to terrorist activities over time.[18]” QED. The Government gets all of this data because someday it might be useful.

Isn’t that a bit of an overreach? Of course, some terrorists are very dangerous; but we’ve had dangerous outlaws before in this country. Consider, for example, the case of John Dillinger. In 1933-1934 he and his associates robbed at least a dozen banks; raided police stations and federal arsenals for weapons; escaped from jail a couple of times (once with a wooden gun); vacationed in Florida; and killed a bunch of people, including bystanders and police.[19] Dillinger was killed in 1934 in a faceoff with agents of a newly minted federal agency, the FBI. Some say that without John Dillinger the modern FBI might not exist.

So how did the FBI do it? How did they catch John Dillinger? Did agents search the homes and offices of the innocent, intercept their mail, tap their phones, etc. and accumulate massive amounts of data in the hope that someday, some of it might give a clue as to Dillinger’s whereabouts? No. After all, the pesky old Fourth Amendment was supposed to protect the general public from hysterical intrusions by over-zealous police. They needed a warrant and “probable cause” to search, homes, papers, etc.

Instead the FBI relied on informants. Dillinger was caught because he was staying in a brothel in Chicago, and the head madam there gave him up. And there’s a lesson in that for the NSC. If you want to catch today’s Dillingers, the terrorists, check first with the hookers[20]. They know a lot more than you do about the criminal element.

[1] See Executive Order 12333. The Order was published in 1981, in the Reagan Administration, and still in effect. You can get it online from the Federal Register at http://www.archives.gov/federal-register/codification/executive-order/12333.html Henceforth it will be cited as Executive Order 12333 at ___.

[2] Actually, according to Wikipedia it’s been amended and ‘strengthened” a couple of times. For their short article, go to Wikipedia at http://en.wikipedia.org/wiki/Executive_Order_12333

[3] I’m referring to Ron Zeigler, President Nixon’s press secretary, who famously said: “This is the operative statement. The others are inoperative.” You can find the quote in Wikipedia. Just go to the website and search Ron Zeigler, or click here: http://en.wikipedia.org/wiki/Ron_Ziegler

[4] See Executive Order 12333 at § 2.8.

[5] See Executive Order 12333 at § 2.11: “No person employed by or acting on behalf of the United States Government shall engage in, or conspire to engage in, assassination.” Wikipedia says that this prohibition has been weakened a bit. For Wikipedia’s short article, go to http://en.wikipedia.org/wiki/Executive_Order_12333

[6] See Executive Order 12333 at § 2.10: “No agency within the Intelligence Community shall sponsor, contract for or conduct research on human subjects except in accordance with guidelines issued by the Department of Health and Human Services.”

[7] See Executive Order 12333 at § 2.12: “No agency of the Intelligence Community shall participate in or request any person to undertake activities forbidden by this Order.”

[8] For the version of the Constitution we use, go to Transcript of Constitution of the United States (1787), Art. II, Sec. 4 at http://www.ourdocuments.gov/doc.php?doc=9&page=transcript You can download a copy from the Government Printing Office; just go to http://www.gpo.gov/fdsys/search/pagedetails.action?granuleId=CDOC-110hdoc50&packageId=CDOC-110hdoc50

[9] See U.S. Constitution, Amendment 4: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”

[10] See Executive Order 12333 at § 2.1.

[11] Id.

[12] The actual term used is “United States person.” See Executive Order 12333 at § 3.4(i).In this case, U.S. citizens also include permanent resident aliens, many corporations incorporated in the U.S., and unincorporated associations substantially composed of U.S. citizens or permanent resident aliens.

[13] See Executive Order 12333 at § 2.4.

[14] See Executive Order 12333 at § 2.4.

[15] See Executive Order 12333 at § 2.4(a), (b) & (c).

[16] See the guardian, Greenwald, NSA collecting phone records of millions of Verizon customers daily (June 5, 2013) at http://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order ; the guardian, Greenwald, et al., The National Security Agency: surveillance giant with eyes on America (June 6, 2013) at http://www.theguardian.com/world/2013/jun/06/national-security-agency-surveillance ; See the guardian, Greenwald, et al., NSA Prism program taps in to user data of Apple, Google and others (June 6, 2013), at http://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data

[17] See Office of the Director of National Intelligence, Clapper, DNI statement on Recent Unauthorized Disclosures of Classified Information (June 6, 2013), available as a pdf. from the Office of the DNI: go to http://www.dni.gov/index.php/newsroom/press-releases/191-press-releases-2013/868-dni-statement-on-recent-unauthorized-disclosures-of-classified-information?tmpl=component&format=pdf

[18] Id.

[19] There’s a good history of John Dillinger in Wikipedia. Just go to the website and search John Dillinger, or click here: http://en.wikipedia.org/wiki/John_Dillinger

[20] Apologies to the sociologists among you. I realize that the modern term for “hooker” is “sex worker.” I used the old terminology as a literary device.