As Bobby and others have already noted, the NSA announced Friday that it is ending “about” collection under Section 702’s upstream component. I won’t rehash the basics here; readers should consult Charlie Savage’s essential New York Times story, NSA’s statements (here and here), and Bobby’s analysis. Rather, I want to inject into the discussion a few issues that I haven’t yet seen broached elsewhere.
1) What is the net effect for 702’s intelligence and counterterrorism value?
As Bobby notes, dropping “about” collection means that NSA will also lose some upstream collection of communications to or from a target. It appears that this was the price of placating the FISC after NSA analysts apparently (per the NYT) erroneously queried upstream data seeking information about one or more U.S. persons. (Recall that, as the PCLOB’s 2014 report explained, under the NSA’s 702 minimization procedures “U.S. person identifiers are prohibited from being used to query the NSA’s Section 702 upstream collection of Internet transactions.”).
In isolation, that collateral reduction in “to/from” collection would be a bad thing for NSA’s foreign intelligence mission. Several caveats are in order here, however.
Read the full article at Lawfare.
More from CNAS
CommentaryTake Greenland Seriously and Literally as a Vital National Security Issue
It is tempting to dismiss talk of Greenland’s significance for defense and foreign policy simply because President Trump infamously made it a punch line last year. The world’...
By David Priess & Martijn Rasser
PodcastStories from the Backchannel: Season Two Trailer
Now more than ever, Americans are interested in the people working behind the scenes on consequential national security decisions. In Season Two of Stories from the Backchanne...
By Ilan Goldenberg, Richard Fontaine, Susanna V. Blume, Kayla M. Williams, Price B. Floyd, Kurt Campbell & Kara Frederick
PodcastWhen your data is held hostage
Technology and security expert Kara Frederick explains how and why U.S. local governments and electoral rolls are vulnerable to ransomware and what can be done about it. List...
By Kara Frederick
CommentarySetting the Stage for U.S. Leadership in 6G
Every day there are more headlines about China’s rise in 5G, the next generation of wireless communications technologies, and the economic and national security risksto the Un...
By Martijn Rasser