May 02, 2017

Today’s Big News About “Backdoor Searches”

By Adam Klein

One of the most hotly debated aspects of Section 702 is the practice of querying 702-acquired data using U.S.-person identifiers—in particular, queries conducted by the FBI in non-national-security criminal investigations.  Some label these “backdoor searches,” although the Foreign Intelligence Surveillance Court has held that such queries are not searches that trigger the Fourth Amendment’s warrant requirement.

Even assuming that the practice is constitutional, however, it nonetheless raises legitimate civil liberties concerns.  General Michael Hayden quipped yesterday that “even to this former director of NSA, using U.S. person data to query the lawfully collected foreign intelligence is a not trivial privacy question.”

The challenge for observers has long been assessing the scale of the potential privacy problem.  The FBI told the Privacy and Civil Liberties Oversight Board that it is “extremely unlikely that an agent or analyst who is conducting an assessment of a non-national-security crime would get a responsive result from the query against the [FBI’s] Section 702-acquired data.”  (Note that the FBI only receives data from 702’s PRISM, or downstream, component; until last week’s major change to 702’s upstream component, upstream was far more likely to pull in some wholly domestic communications.)  But that failed to assuage many critics, perhaps because “extremely rare” lacks the power of a simple number.

Read the full article at Lawfare.

  • Podcast
    • January 17, 2020
    Stories from the Backchannel: Season Two Trailer

    Now more than ever, Americans are interested in the people working behind the scenes on consequential national security decisions. In Season Two of Stories from the Backchanne...

    By Ilan Goldenberg, Richard Fontaine, Susanna V. Blume, Kayla M. Williams, Price B. Floyd, Kurt Campbell & Kara Frederick

  • Podcast
    • September 10, 2019
    When your data is held hostage

    Technology and security expert Kara Frederick explains how and why U.S. local governments and electoral rolls are vulnerable to ransomware and what can be done about it. List...

    By Kara Frederick

  • Commentary
    • Lawfare
    • August 13, 2019
    Setting the Stage for U.S. Leadership in 6G

    Every day there are more headlines about China’s rise in 5G, the next generation of wireless communications technologies, and the economic and national security risksto the Un...

    By Martijn Rasser

  • Commentary
    • Foreign Affairs
    • September 27, 2018
    China’s Quantum Future

    China should be a “global leader in innovation” by 2035, President Xi Jinping declared during the Chinese Communist Party’s 19th National Congress last October. His remarks re...

    By Elsa B. Kania

View All Reports View All Articles & Multimedia