<<

ECHELON: THE AGENCY'S COMPLIANCE WITH APPLICABLE LEGAL GUIDELINES IN LIGHT OF THE NEED FOR TIGHTER NATIONAL SECURITY

Erin L. Brown

I. INTRODUCTION LON is whether this global communications inter- ceptor infringes upon the Fourth Amendment's Article II of the ConstitutionI broadly states guarantees of protection from unreasonable 7 that the President has the fundamental duty to search and seizure. preserve, protect and defend the Constitution of This issue now must be analyzed in light of the the . In United States v. United States World Trade Center and Pentagon tragedies of District Court,2 Justice Powell elaborated on Article September 11, 2001.8 These tragic events have led II by stating, "Implicit in that duty is the power to Americans to reevaluate the debate between pri- protect our Government against those who would vacy and national security in a new context. Gone subvert or overthrow it by unlawful means."3 The are the days when "Big Brother" was the only con- United States is the most powerful country in the cern that Americans had in regard to the govern- world, and it arguably has the most enemies. The ment's use of electronic . Americans ("NSA"), in upholding are now faced with questions that will substantially the provisions of Article II, operates intelligence gathering systems that protect our nation from its affect the manner in which they view their funda- mental constitutional rights. Americans must ask enemies. 4 In carrying out this duty, the NSA must government surveillance constantly monitor communications to and from if they will tolerate ECHE- the United States, while remaining cognizant of through the use of technologies, such as the constitutional protections granted to its citi- LON, used in the hopes of detecting, preventing zens. and apprehending terrorist threats to the United One of the most controversial tools at the States. Americans must also ask if they are willing NSA's disposal is ECHELON. ECHELON is a tele- to surrender some personal in order to communications spy network operated by the strengthen both national security and their knowl- 5 NSA in conjunction with four other countries. It edge that chances of another September 11th oc- intercepts telephone, fax and e-mail transmissions curring during their lifetimes will be substantially traveling to and from, and sometimes within, the reduced. United States.6 The key issue concerning ECHE- Citizens and inhabitants of the United States

1 U.S. CONST. art. II, § 1, cl. 8. OF THE ATOMIC SCIENTISTS, available at http://bullatomsci. 2 407 U.S. 297 (1972). org/issues/2000/maOO/maOOrichelson.html (Mar./Apr. 3 Id. at 310 (holding that the President may find it neces- 2000) [hereinafter Richelson] (raising the issue of "Big sary to use electronic surveillance to obtain intelligence on Brother" and government surveillance and the feeling of a those foreign agents who conspire to harm the United States lack of privacy that these surveillance techniques have in- government). stilled in the American people. This article also provides the 4 NATIONAL SECURITY AGENCY, ABOUT THE NATIONAL SE- historical and technical background of ECHELON and CURITY AGENCY: WHAT Is THE NSA?, at http://www.nsa.gov/ claims that the NSA has not been adequately able to keep up about.nsa/index.html (last visited January 12, 2003). with evolving technological breakthroughs in its operation of 5 Sarah Ferguson, Overloading Big Brother, THE VILLAGE intelligence gathering for national security purposes). Hijacked Jets Destroy VOICE, available at http://www.villagevoice.com/issues/ 8 See N.R. Kleinfeld, U.S. Attacked; 9942/ferguson.php (Oct. 20-25, 1999). Twin Towers and Hit Pentagon In A Day of Terror, N.Y. TIMES, 6 Id. (explaining the motivation and plan behind hack- September 12, 2001, at Al (describing the terrorist attacks on tivists' "Jam Echelon Day"). the World Trade Center and the Pentagon on September 11, 7 Jeffrey Richelson, Desperately Seeking Signals, BULLETIN 2001). COMMLAW CONSPECTUS [Vol. 11 may not realize that systems such as ECHELON tablished statutory and administrative guidelines do not require them to make this sacrifice, be- governing its operation, and, in doing so, will seek cause the NSA must strictly adhere to legal stan- to provide assurance that the NSA complies with dards when conducting electronic surveillance ac- applicable legal requirements in its maintenance tivities. However, in the wake of the September and operation of ECHELON. 11, 2001 tragedies, it may be beneficial for the NSA to know that it has the support of those it II. THE NATIONAL SECURITY AGENCY seeks to protect and that the controversy sur- rounding ECHELON may subside for years to The NSA was established by President Harry S. come. The more Americans realize that national Truman's directive in 1952 to provide both signals security allows them to realize their rights and intelligence and communications security activi- privileges, the more likely it is that they will toler- ties to the government.' 0 The present-day NSA ate the slim prospect that their privacy may be in- has a twofold mission: to protect United States in- fringed upon in the operation of ECHELON. formation systems and to produce foreign signals This Comment seeks to lay forth the legal intelligence information.'' To achieve these framework in which the NSA operates and to es- objectives, the NSA works in conjunction with the tablish that the NSA is not permitted to conduct 12 and various other gov- domestic surveillance on the general populace. ernment organizations to gather intelligence in- Part I of this Comment provides the purposes and formation. ' 4 The NSA claims that it strictly follows powers of the NSA. Part II goes into detail as to the laws and regulations designed to protect how the technological aspects of ECHELON oper- United States' citizens' Fourth Amendment rights ate. Part III explains the legal guidelines of the and that it therefore performs Foreign Intelligence Surveillance Act ("FISA"), operations only against foreign powers or agents Executive Order 12,333 and the Fourth Amend- of foreign powers, not against citizens or inhabi- 14 ment of the Constitution, with which the NSA tants of the United States. must comply in its operation of technological sur- There are judicial, statutory and administrative veillance. Part IV discusses the main concerns sur- safeguards that regulate the NSA's collection of rounding the operation of ECHELON. This Com- signals intelligence. These safeguards are de- ment focuses on allegations of domestic surveil- signed to balance the government's need for for- lance and invasion of privacy, but will not address eign intelligence information with the privacy the highly debated issue of economic ?' rights afforded to United States citizens under the Lastly, this Comment will analyze the technologi- Fourth Amendment. 15 The NSA also has an inter- cal aspects of ECHELON in the context of the es- nal process overseen by the Office of the Inspec-

9 See Michael Mosier, Note, Causes of Action for Foreign Vic- at I (stating that the "CSS was established in 1972 to provide tims of Economic Espionage Abroad by U.S. Intelligence, 11 DUKEJ. cryptologic activities within the ." This article does COMP. & INT'L L. 427, 427-29 (2001) (claiming that ECHE- not focus on the NSA's information assurance mission). LON is used for economic espionage purposes for which for- 13 NATIONAL SECURITY AGENCY, FREQUENTLY ASKED QUES- eign individuals have no recourse). TIONS at http://www.nsa.gov/about-nsa/faqsinternet.html 10 NATIONAL SECURITY AGENCY, NSA AND THE INTELLI- (last visited Nov. 19, 2000) [hereinafter NSA FREQUENTLY GENCE COMMUNITY 1, at http://www.nsa.gov/about-nsa/nsa_ ASKED QUESTIONS] (listing the twelve other organizations in role.html (last visited Nov. 19, 2000) [hereinafter NSA AND the intelligence community, including: Central Intelligence THE INTELLIGENCE COMMUNITY] (providing information as to Agency, National Imagery and Mapping Agency, Federal Bu- how the NSA was established and where it fits into the intelli- reau of Investigation, Defense , National gence community). Reconnaissance Office, Department of Energy, Army Intelli- 11 NATIONAL SECURITY AGENCY, MISSION STATEMENT 1, at gence, Air Force Intelligence, Navy Intelligence, Marine http://www.nsa.gov/aboutnsa/mission.html (last visited Corps Intelligence, Department of Treasury and Department Nov. 19, 2000) [hereinafter MISSION STATEMENT] (stating of State). that the Information Assurance mission provides "the solu- 14 Id. (providing information on the guidelines and fo- tions, products and services, and conducts defensive informa- cus of the collection of signals intelligence). tion operations, to achieve information assurance for infor- 15 Id. (stating that the House Permanent Select Commit- mation infrastructures critical to U.S. national security inter- tee on Intelligence and the Senate Select Committee on In- ests, " whereas the signals intelligence mission "allows for an telligence ensure that the NSA adheres to applicable laws effective, unified organization and control of all the foreign and regulations); but see generally Lawrence D. Sloan, Note, signals collection and processing activities of the United ECHELON and the Legal Restraints on Signals Intelligence: A Need States"). for Reevaluation, 50 DUKE L.J. 1467, 1503-05 (2001) (alleging 12 NSA AND THE INTELLIGENCE COMMUNITY, supra note 10, that ECHELON's ability to collect nearly all signals makes its 20031 ECHELON: The National Security Agency's Compliance General ("OIG"), whose responsibility is to en- munication and their respective data twenty-four sure that the NSA complies with Executive Order hours a day, seven days a week. The data is 12,333 and related implementing directives and processed and, if necessary, is sent to the appro- regulations in its execution of intelligence-gather- priate UKUSA country. 19 ing operations. 16 Executive Order 12,333 provides The five agencies that are active participants in the NSA and the other members of the intelli- the interception, analysis and redistribution of gence community with responsibilities and appro- ECHELON-gathered intelligence are the United priate procedures to which to adhere in collecting States' NSA, Britain's Government Communica- intelligence and counterintelligence informa- tions Headquarters ("GCHQ"), 's 7 tion. 1 Government Communications Headquarters Now that the foundation for the powers and re- ("GCSB"), 's Defense Signals Directorate sponsibilities of the NSA in its collection of intelli- ("DSD") and Canada's Communications Security gence and counterintelligence information has Establishment ("CSE").20 Each of the agencies has 2 1 been laid, we will explore the technology behind a regional allocation for which it is responsible. ECHELON and its operation. These five agencies work together to ensure that ECHELON is intercepting all , micro- wave, cellular and fiber-optic traffic at any given III. BACKGROUND OF ECHELON moment.2 2 It has been estimated that ECHELON A. General Framework intercepts "as many as 3 billion communications every day, including phone calls, e-mail messages, ECHELON is an automated global satellite- downloads [and] satellite transmis- 23 based interception and relay system operated by sions." the intelligence agencies of five nations: the ECHELON was the offspring of the 1947 United States, Britain, New Zealand, Australia and UKUSA agreement, which defined the relations Canada ("UKUSA countries").' This telecommu- between the signals intelligence ("SIGINT") 24 de- nications spy network intercepts all means of com-

operation a direct violation of the statutory framework of the 21 Duncan Campbell, Somebody's Listening, at http://www. Foreign Intelligence Surveillance Act and the Fourth Amend- gn.apc.org/duncan/echelon-dc.htm (last visited Nov. 19, ment because it does not comply with the warrant and proba- 2001) [hereinafter Somebody's Listening] (exposing the tech- ble cause elements of the Fourth Amendment and that ECH- nology of ECHELON to the general public for the first time, ELON is a device used to conduct domestic surveillance). Campbell explains ECHELON's capabilities and describes 16 NSA FREQUENTLY ASKED QUESTIONS, supra note 13. the technological forefathers of electronic surveillance). 17 See Exec. Order No. 12,333, 3 C.F.R. §200 (1982), re- Campbell also determined the separate jurisdictions of which printed in 50 U.S.C. §401 (1994). each government agency is in charge. GCHQ is the coordi- 18 AMERICAN UNION, FREEDOM NETWORK, nating center for , Africa and Russia. The NSA covers ANSWERS TO FREQUENTLY ASKED QUESTIONS (FAQ) ABOUT parts of Eastern Europe and most of North and South ECHELON, at http://www.aclu.org/echelonwatch/faq.html America. Australia coordinates the electronic monitoring of (last modified Oct. 15, 2001) [hereinafter FREQUENTLY ASKED the South Pacific and South East Asia. Id. AMERICAN CIVIL LIBERTIES UNION, FREEDOM NETWORK, QUESTIONS] (explaining the technical aspects of ECHELON, 22 how it is operated, what kind of information it intercepts and ACLU URGES CONGRESS TO INVESTIGATE ECHELON SURVEI- what is done with the intercepted information. The article LANCE SYSTEM, at http://www.aclu.org/congress/lg040699a. elaborates on the technical aspect of ECHELON by claiming html (last visited Nov. 19, 2001) [hereinafter ACLU LETTER] that there is no governmental oversight in its operation); but (claiming that the interception of these forms of communica- see generally Legal Standardsfor the Intelligence Community in Con- tion is a direct violation of the fights of United States persons ducting Electronic Surveillance, at http://www.fas.org/irp/nsa/ because the National Security Agency is allegedly conducting standards.html [hereinafter Legal Standards] (establishing the domestic surveillance). legal basis and constitutionality of ECHELON's existence). 23 FREQUENTLY ASKED QUESTIONS, supra note 18. 19 Patrick S. Poole, ECHELON: America's Secret Global Sur- 24 Duncan Campbell, Interception Capabilities 2000 6, at veillance Network at http://fly.hiwaay.net/-pspoole/echelon. http://www.iptvreports.mcmail.com/ic2kreport.htm (last vis- html (last visited Nov. 19, 2001) [hereinafter ECHELON: ited Nov. 19, 2001) [hereinafter Interception Capabilities] (ex- America's Secret Network] (discussing the plaining that communications intelligence deals with techni- UKUSA agreement between the United States, Australia, Ca- cal and intelligence information derived from foreign com- nada, New Zealand and Britain. Poole states that Australia, munications by those other than the intended recipient and Canada, New Zealand and Britain are considered the "Sec- is included in the broader category of signals intelligence ond Parties" to the agreement. There are also "Third Party which also includes the collection of non-communications Members" including , , Norway, South Korea signals such as radar emissions). This article was part of the and Turkey). Scientific and Technical Options Assessment report released 20 Id. by the British Parliament for the purpose of alerting the COMMLAW CONSPECTUS [Vol. 11 partments of the five participating governments. 25 zations, businesses and private individuals on be- The UKUSA agreement originally was enacted to half of these nations.3 2 The interception process protect against U.S.S.R.'s arms build-up during is divided into three stages: the collection of intel- the .26 However, the countries decided ligence, its analysis and contextualization and its 3 3 to expand their signals and communications intel- redistribution. ligence efforts by developing technologically ad- vanced capabilities to ward off not only Russian B. Interception enemies, but any threat to the safety of the 27 UKUSA nations. One way in which ECHELON collects commu- This is where ECHELON came in. ECHELON nication transmissions is via large satellite dishes allegedly came into existence in the 1970's, but located at various points around the world.34 has only recently been acknowledged by any of These dishes are aimed at orbiting the the UKUSA nations. 28 To this day, the United Earth that transmit telephone and fax communi- States denies the existence of ECHELON despite cations between civilians. This information is in 29 overwhelming evidence to the contrary. turn funneled through the ground dishes from 35 ECHELON has a very complex, technological these satellites. and precise method of gathering data. The inter- The second source of ECHELON-gathered ception process captures all data from e-mail communications is the United States satellite net- transmissions, telephone calls and fax transmis- work and its reception bases that are scattered sions.30 Therefore, the communications that are throughout the United States, Canada, New Zea- captured consist of vocal conversations, as well as land, Britain and Australia.- 6 This network deals transmissions containing written data.31 These in- with signals intelligence rather than the afore- terceptions are designed to capture non-military mentioned, and not as high-tech, interception of communications of governments, private organi- satellite communications. 37 The United States' world that the NSA conducts illegal surveillance including States). commercial espionage. Id. 31 See id. 25 ECHELON: America's Secret Global Surveillance Network, 32 Richelson, supra note 7, at 1. supra note 19 (explaining the /United 33 Rupert Goodwins, Echelon: How it Works 1-3, at http:// States of America "UKUSA" agreement as stemming from the news.zdnet.co.uk/story/printer/0,,s2079849,00.html (June BRUSA alliance formed during World War 1I. The UKUSA 29, 2000) (arguing that despite ECHELON's impressive and agreement defined the relations between the signals intelli- highly technical design, it is still not sufficient to keep up gence departments of the five governments and was a prod- with the new technologies of encryption and wireless tech- uct of the Commonwealth SIGINT Organization formed in nology that make communications virtually impossible to col- 1946-47). lect and analyze). 26 See Interception Capabilities, supra note 24, at 6 (stating 34 ECHELON: America's Secret Global Surveillance Network, that the NSA has reaffirmed a present need for signals intelli- supra note 19. gence after the necessity seemed to have disappeared follow- The Morenstow [satellite] station directs its ears towards ing the Cold War). the traversing the atmosphere above the Atlan- 27 ECHELON: America's Secret Global Surveillance Network, tic and Indian Oceans and transmitting to Europe, Af- supra note 19 (claiming that the rise of gave the rica and western parts of Asia. The Yakima station... NSA the justification it needed to develop ECHELON). targets Pacific Ocean communications in the Northern 28 Richelson, supra note 7 (stating that Australia and Ca- Hemisphere, as well as the Far East. Another NSA facility nada have recently issued statements acknowledging for the at Sugar Grove, , covers traffic for the first time their participation in the UKUSA alliance). whole of North and South America. A DSD station at 29 See Richard Barry, ECHELON: The Evidence, 1, at Geraldton, Australia, and the Waihopai, New Zealand http://news.zdnet.co.uk/story/0,,s2079850,00.html (June GCSB facility cover Asia, the South Pacific countries and 29, 2000) (claiming that there is ample evidence supporting the Pacific Ocean. An additional station on Ascension the existence of ECHELON, including documentation and Island in Ocean... is suspected of covering oral statements made by government agents. Barry also the Atlantic 's Southern Hemisphere communi- claims that the primary concern about ECHELON's exis- cations. tence is that it allegedly aids the NSA and CIA in the acquisi- Id. tion of information for commercial espionage). 35 Id. (stating that the satellite interceptions occasionally 30 Niall McKay, Did EU Scuttle Echelon Debate?, WIRED.COM, carry diplomatic and governmental communications, but at http://wired.com/news/politics/0,1283,15429,00.html only on rare occasions). (Oct. 5, 1998) (alleging that the reason why the European 36 Id. Parliament did not investigate ECHELON further after re- 37 Richelson, supra note 7, at 3 (stating that communica- ceiving the STOA reports was because they feared jeopardiz- tions interceptions occur through the use of ground dishes ing relations between the and the United that intercept using the old fashioned method of eavesdrop- 20031 ECHELON: The National Security Agency's Compliance satellite network is far more sweeping than the and codify" the intercepted messages during the network of previously mentioned satellites be- analysis process through the use of programs that cause it gathers information from e-mail and cell have optical character recognition and voice rec- 43 phone transmissions, in addition to phone and ognition capabilities. The NSA and its UKUSA fax transmissions. 3 Internet and e-mail intercep- partners are mainly concerned with any form of tions require the use of a complex technological communication that could pose a threat to their 44 device that is not required to parlay ordinary national security. The determination of whether 39 phone and fax signal interceptions to the NSA. the intercepted information will be removed from Even though the ECHELON listening stations the network prior to analysis or remain in the sys- primarily tem for further investigation depends on the con- are located on foreign soil, the NSA is 45 responsible for the American-owned downlink sta- tents of dictionaries supplied by the five nations. tions. 40 The downlink, or reception stations, con- The dictionaries can be found in computers sist of , which are enormous golf-ball-like supplied by each of the five UKUSA countries that structures that contain satellite dishes and other contain a list of keywords whose appearance raises 46 listening equipment. 41 The radomes capture in- a red flag for its corresponding country. If an formation that is then poured into memory buff- intercepted message is red-flagged, it then is auto- ers capable of storing five trillion pages of data at matically transcribed, assigned a four-digit code, 42 NSA's headquarters. recorded by the system and forwarded to the in- terested country's computer. 47 The agents at the receiving site then analyze the message further to C. Analysis and Dissemination determine whether it is a threat to national secur- After the satellite dishes capture the signals, ity. Often, the messages that are red-flagged are they are then sent to a large computer network nothing more than innocent conversations and for analysis. This network consists of many state- do not have substantial merit as threats to na- 48 of-the-art computers that "decrypt, filter, examine tional security. ping, whereas signals intelligence is operated by the usage of telligence information). SILKWORTH is the main computer satellites intercepting communications and relaying them to system at the Menwith Hill facility that drives the keyword the ground stations); see also Interception Capabilities, supra search programs. PATHFINDER is a tool that "sifts through note 24, at 5 (defining communications intelligence as "tech- large databases of text-based documents and messages look- nical and intelligence information derived from foreign com- ing for keywords and phrases based on complex algorithmic munications by other than the intended recipient." Commu- criteria." VOICECAST is able to pinpoint an individual's nications intelligence ("Comint") is a major component of voice pattern so that every call that a person makes is tran- signals intelligence ("SIGINT"), which "also includes the col- scribed and analyzed. Id. lection of non-communications signals such as radar emis- 44 See Richelson, supra note 7. sions."). 45 ECHELON: America's Secret Global Surveillance Network, 38 ECHELON: America's Secret Global Surveillance Network, supra note 19 (stating that very few messages are actually tran- supra note 19, at 6. scribed and recorded by the system); but see Ex-Snoop Confirms 39 FREQUENTLY ASKED QUESTIONS, supra note 18, at 2. Echelon Network, CBSNEWS.coM, at http://cbsnews.com (Feb. 40 ECHELON: America's Secret Global Surveillance Network, 12, 2001) [hereinafter Ex-Snoop Confirms Echelon Network] supra note 19. (concluding that ECHELON intercepts and analyzes all elec- 41 David Ruppe, Big Ears and Big Secrets, ABCNEWS.coM, tronic communications, including those from the "good at http://www.abcnews.go.com/sections/world/DailyNews/ guys" in order to determine who the threats are to the na- Echelon 990709.html (July 16, 2000) [hereinafter Ruppe] tion's security). (stating that the radomes located at Menwith Hill in York- 46 See id. shire, download information from various satellites 47 Id. that conduct surveillance of Europe, North Africa and west- and Dale Hurd, Surveillance Soci- ern Asia. Ruppe also commented that the European Parlia- 48 See Erin Zimmerman ment's STOA report put fear in all Europeans that the ety: Exposing Echelon, at http://www.christianity.com/CC/ar- United States also engages in to defeat ticle/1,1 183,PTID2546%7CCHID%7CCI1D136183,00.html European competitors in major trade competitions). [hereinafter Zimmerman & Hurd] (stating that ECHELON 42 Vernon Loeb, Test of Strength, WASHINGTONPOST.COM at intercepts over two million communications every hour); see http:www.washingtonpost.com/wp-dyn/style/postmagazine/ also Ex-Snoop Confirms Echelon Network, supra note 45 (recal- A44781-2001Ju124.html (July 29, 2001) (explaining a largely ling a situation in which a woman's communication was inter- unknown security crisis in the United States, due to a system cepted and red-flagged because she told a friend on the failure at the NSA). phone that her son had "bombed" in a school play. The sys- 43 ECHELON: America's Secret Global Surveillance Network, tem alerted the analysts to this communication, and there- supra note 19 (explaining the various technologies that work fore it was further analyzed to determine its propensity for in conjunction with ECHELON to provide the NSA with in- alarm). COMMLAW CONSPECTUS [Vol. 11

This system is quite efficient despite the over- reports were prepared to provide the European whelming amount of intercepted data because it Parliament with a guide to technological advance- allows users to focus on a specific subject.49 If a ments, while developing policy recommendations red flag is not raised when the network examines for the operation and control of technologies the message, the message will automatically fall such as ECHELON. 5 The first report, released in out of the system without wasting time and re- 1998, suggested that ECHELON indiscriminately 50 sources. intercepts large amounts of communications, in- cluding economic intelligence, constituting mal- 56 IV. THE CONTROVERSY SURROUNDING practice and negligence. "Interception Capabili- ECHELON ties 2000," written by British investigative journal- ist Duncan Campbell, contained accusations from The debate over the legality and constitutional- the French government that the NSA uses ECHE- 57 ity of ECHELON's existence and operation came LON for industrial and commercial espionage. to Congress' attention in 1988, when a whistle- In response to this report, the French govern- blower stationed at the Menwith Hill Facility in ment issued a decree encouraging the public to England during the 1980s was interviewed by the use more powerful encryption to disable the inter- 5 Cleveland Plain Dealer.51 The , Mar- ception capabilities of ECHELON. 1 garet Newsham, filed a lawsuit concerning corrup- The STOA reports prompted action from the tion and misspending on United States govern- American Civil Liberties Union, who brought it to ment black projects, claiming that she overheard Congress' attention that the NSA and its elec- real-time intercepts of Senator Strom Thur- tronic surveillance operations needed to be ex- mond's telephone conversations. 52 This lawsuit amined to ensure that Americans' privacy rights 59 raised fears that the NSA conducted domestic sur- were not being willfully invaded by the NSA. veillance of Americans, over which it had no juris- Congressman Bob Barr led the Congressional 53 diction. movement to force the NSA to account for the In addition to Ms. Newsham's lawsuit, the Sci- fact that United States citizens' communications entific and Technical Options Assessment pro- are intercepted by ECHELON in the name of na- gram office ("STOA") of the European Parlia- tional security.60 The NSA eventually submitted ment released two reports, "An Appraisal of Tech- the legal standards to which it adheres in the in- nologies of Political Control" and "Interception terception of communications, but did so without Capabilities 2000," that describe the capabilities ever acknowledging the existence of ECHE- of American surveillance and ECHELON. 54 Both LON." 1

49 FREQUENTLY ASKED QUESTIONS, supra note 18 (stating 55 ACLU LETTER, supra note 22. that the dictionaries allow the system to work more efficiently 56 FREQUENTLY ASKED QUESTIONS, supra note 18 (claim- because they provide ECHELON with key words, addresses, ing that domestic surveillance and economic espionage are and the like that are to be flagged for inspection); see also an unacceptable and illegal use of ECHELON). Interception Capabilities, supra note 24, at 18 (explaining that 57 Id. the dictionary computers store a database of specified targets 58 See Ruppe, supra note 41. including names, topics, addresses, telephone numbers and 59 See ACLU LETTER, supra note 22 (describing ECHE- the like). LON to the House Committee on Government Reform. The 50 See Richelson, supra note 7. letter also raised allegations of the role of ECHELON in do- 51 ECHELON: America's Secret Global Surveillance Network, mestic surveillance, and its violation of United States citizens' supra note 19. civil liberties inder the Fourth Amendment). 52 See Somebody's Listening, supra note 21. 60 See Zimmerman & Hurd, supra note 48 (pointing out 53 See Zimmerman & Hurd, supra note 48 (claiming that that Congressman Barr asked the NSA to supply the Ameri- the five-country partnership that runs ECHELON creates a can people with basic information regarding the NSA's legal legal loophole in which no country has to spy on its own citi- basis for intercepting communications. Barr eventually zens, but is able to receive intercepted information pertain- pushed a bill through the House requiring the NSA, CIA and ing to their own citizens, from another UKUSA country). Attorney General to supply the House Select Committee on 54 FREQUENTLY ASKED QUESTIONS, supra note 18 (stating Intelligence with this information); see also AMERICAN CIVIL that due to the STOA reports, the LIBERTIES UNION, FREEDOM NETWORK, ECHELONWATCH: formed a temporary committee of Enquiry to investigate UNITED STATES CONGRESSIONAL ACTION, at http://www.aclu. ECHELON. In May 2001, committee members were sched- org/echelonwatch/congress.html (describing the process tiled to meet with NSA and CIA personnel to discuss ECHE- through which H.R. 1555 was passed). LON, but the meetings were never realized). 61 See generally Legal Standards, supra note 18. 2003] ECHELON: The National Security Agency's Compliance

V. LEGAL GUIDELINES ation. The Committee hoped that the hearing would rebut the assumption that ECHELON cir- ECHELON's astounding ability to intercept sat- cumvents the federal requirement that it is neces- ellite-based communications leaves an impression sary to obtain a warrant prior to on on Americans that they are the objects of govern- communications involving United States "per- 62 ment surveillance. However, the NSA must ad- sons," a term which refers to both citizens and 69 here to strict rules in the operation of its elec- non-citizen inhabitants. tronic surveillance equipment. ECHELON is sub- Congressman Porter Goss of Florida, the Re- ject to the Fourth Amendment of the United publican Chair of the House Permanent Select States Constitution, which requires reasonable- Committee on Intelligence, requested that the ness and probable cause for searches and NSA disclose its legal standards to the commit- 63 seizures. ECHELON is also subject to strict regu- tee.70 The NSA invoked the attorney-client privi- lation by the Foreign Intelligence Surveillance Act lege and refused disclosure of the requested infor- of 1978,64 as well as Executive Order 12,333,65 mation.71 In response, Congressman Barr pro- which deal with intelligence gathering and sur- posed a bill that would require the NSA to dis- veillance in terms of national defense. Lastly, the close to Congress the legal standards that apply to 72 NSA has provided Congress with its own set of le- the operation of ECHELON. gal guidelines that apply to its operation and use Subsequently, the House of Representatives 66 of ECHELON. These internal guidelines incor- amended a bill7 3 authorizing funds for intelli- porate the standards of the Fourth Amendment, gence operations. The amendments required the FISA and Executive Order 12,333. Director of the Central Intelligence Agency, the Director of the NSA and the Attorney General to A. Legal Standards for the Intelligence prepare a report disclosing the legal standards for Community gathering intelligence via electronic surveillance. The bill passed both houses of Congress, but the ECHELON has recently come into the spotlight Senate version required only a report and did not under a cloud of suspicion and fear, causing au- require full disclosure of all signals intelligence 7 4 thorities to question the legality and constitution- activities. ality of its existence. 67 Congressman Bob Barr ini- President Clinton signed the Senate version tiated hearings to determine whether United into law as an intelligence community funding States' signals intelligence activities are violating bill-the Intelligence Authorization Act for Fiscal 75 the privacy rights of Americans. 68 In April 2000, Year 2000. This act required disclosure reports the House Intelligence Committee held a hearing from the NSA, CIA and the Attorney General to to deal with these allegations and suspicions aris- include the legal standards for the: interception ing from ECHELON's alleged existence and oper-

62 See Erin Zimmerman and Dale Hurd, Surveillance Soci- 71 FREQUENTLY ASKED QUESTIONS, supra note 18. ety: A Spy's Story, at http://www.christianity.com/CC/article/ 72 See Zimmerman & Hurd, supra note 48 (reciting the 1,1 178,PTID2546%7CCHID%7CCIID 136183,00.html. question that Bob Barr posed to the NSA: 63 U.S. CONST. amend. IV. There seems to be very credible evidence that this opera- 64 Pub. L. No. 95-511, 92 Stat. 1783 (1978) (codified as tion is taking place, and has been taking place for quite amended in scattered sections of 18 U.S.C. §2511, 2518-2520, some time. At this point, all we're asking for is the basic 47 U.S.C. §605-606, 50 U.S.C. §1801-1811 (1994)). information telling us what do you at the NSA, the Na- 65 Exec. Order No. 12,333, 3 C.F.R. §200 (1982), re- tional Security Agency, believe is the legal basis for you printed in 50 U.S.C. § 401 (1994). to gather this information? That's the starting point: 66 Legal Standards, supra note 18. What's the basis that you believe you're authorized to do 67 AMERICAN CIVIL LIBERTIES UNION, FREEDOM NETWORK, this?). SUPER-SECRET GLOBAL SURVEILLANCE SYSTEM EAVESDROPS ON 73 AMERICAN CIVIL LIBERTIES UNION, FREEDOM NETWORK, CONVERSATIONS WORLDWIDE, at http://www.aclu.org/action/ UNITED STATES CONGRESSIONAL ACTION, at http://www.aclu. echelon107.html [hereinafter ACLU ALERT] (stating that org/echelonwatch/congress.html (providing the process of concerned groups include the European Parliament, mem- H.R. 1555 being passed by both the House and the Senate, bers of Congress, the American Civil Liberties Union and and stating the requirements imposed on the NSA and CIA United States citizens). in response to the Bill). 68 Richelson, supra note 7. 74 Id. 69 ACLU ALERT, supra note 67. 75 Intelligence Authorization Act for 2000, 70 See Richelson, supra note 7. Pub. L. No. 106-120, 309, 113 Stat. 1606, 1613. COMMLAW CONSPECTUS [Vol. 11

of communications when such interception may a minimum amount of information is acquired re- result in the acquisition of information from a garding the United States person. If the inciden- communication to or from United States persons; tally acquired information pertains to foreign in- 8 4 intentional targeting of the communications to or telligence, it may be disseminated. from United States persons; receipt from non- Lastly, in order for the NSA to conduct proper United States sources of information pertaining dissemination of information acquired about to communications to or from United States per- United States persons, it must comply with FISA sons; and dissemination of information acquired and the minimization procedures therein. In or- through the interception of the communications der to disseminate personally identifiable infor- 76 to or from United States persons. mation concerning a United States person, the in- In the NSA's report to Congress, titled "Legal formation must be deemed necessary to under- 8 5 Standards for the Intelligence Community in stand foreign intelligence. Conducting Electronic Surveillance, ' 7 7 the NSA In sum, the aforementioned legal standards for stated that its internal legal standards are gov- electronic surveillance are governed by both a erned by the Fourth Amendment, 7 FISA,79 and statutory framework that governs foreign intelli- by Executive Order 12,333.80 Further, the NSA gence collection and the procedures and restric- stated that it abides by the FISA requirements of tions that apply to the interception of foreign prior judicial notice and probable cause in con- communications, as well as Executive Order ducting electronic surveillance that either targets 12,333, which sets the guidelines for interception United States persons or may result in the acquisi- of information dealing with a United States per- tion of information involving them.8 ' The NSA son who is abroad at the time of surveillance. The also reported that incidentally-acquired informa- NSA states that it also abides by the Fourth tion about a United States person who is not an Amendment's necessary requirements of reasona- approved target may be retained and dissemi- bleness and probable cause in its surveillance and nated if the communication is in regard to for- communication interception activities.8 6 The fol- eign intelligence or counterintelligence.8 2 The lowing is a more detailed discussion of FISA, Ex- standards also posit that the requirements for ob- ecutive Order 12,333 and the Fourth Amend- taining and utilizing information regarding a ment. United States person is governed by a much stricter set of rules than in a situation in which the 3 B. Foreign Intelligence Surveillance Act of are foreign. 8 7 parties 1978 ("FISA") If an electronic interception may result in inci- dentally acquired information directed to or from Congress enacted FISA in 1978 to further a United States person, both FISA and Executive United States counterintelligence and to deter- Order 12,333 apply, and the surveillance must be mine who has the authority to engage in activities conducted in a reasonable manner to ensure that that involve the interception of intelligence and

76 Id. at §309(b). gathering surveillance operations). 77 Legal Standards, supra note 18 (providing Congress 83 Legal Standards, supra note 18 (stating that it is suffi- with the legal standards that the NSA, CIA and Attorney Gen- cient in the case of a non-U.S. person to show that the infor- eral adhere to in the conduction of intelligence information mation to be acquired is merely related to the national de- gathering per the 2000 Intelligence Authorization Act). fense or security of the United States or the conduct of for- 78 U.S. CONST. amend. V. eign affairs; where a United States person is involved, the 79 Pub. L. No. 95-511, 92 Stat. 1783 (1978) (codified as contents of the application must include a showing that the amended at 18 U.S.C. §§2511, 2518-2520, 47 U.S.C. §§605- acquisition of such information is necessary to national de- 606, 50 U.S.C. §§1801-1811 (1994). fense or security or the conduct of foreign affairs). 84 Id. (providing the legal standards for receipt from 80 Exec. Order No. 12,333, 3 C.F.R. §200 (1982), reprinted non-United States sources of information pertaining to com- in 50 U.S.C. §401 (1994). 81 Legal Standards, supra note 18. munication to or from United States persons). 85 Id. 82 Id. (stating that they must still conduct their surveil- 86 Id. lance in a manner that minimizes the acquisition, retention 87 Pub. L. No. 95-511, 92 Stat. 1783 (1978) (codified as and dissemination of information about incidentally ac- amended at 18 U.S.C. §§2511, 2518-2520, 47 U.S.C. §605-606, quired communications pertaining to United States per- 50 U.S.C. §§1801-1811 (1994)). sons); see also 50 U.S.C. §1801(h) (1994) (defining the mini- mization procedures that must be followed in intelligence 20031 ECHELON: The National Security Agency's Compliance what restrictions should apply to those activities.88 surveillance must be conducted in accordance This act also was aimed at lessening the competi- with the certifications and the minimization pro- tion between the Federal Bureau of Investigation cedures93 adopted by the Attorney General. 4 ("FBI") and the Department of Justice on the one These procedures allow the federal government side and the CIA and other segments of the intel- to use intercepted communications involving a ligence community on the other side.8 9 The intel- United States person only if they have complied ligence community was viewed as a mysterious with the minimization procedures set out in the 9 5 group that answered to no one, and this charac- act. terization made citizens nervous in regard to their FISA has also established a specialized court, perceived lack of privacy.99 the Foreign Intelligence Surveillance Court FISA allows the President, acting through the ("FISC"), with the purposes of reviewing Depart- Attorney General, to acquire foreign intelligence ment of Justice applications requesting the use of information for periods up to one year, if the sur- electronic surveillance and issuing secret warrants veillance is directed at intercepting communica- authorizing these activities. 96 Applications to this tions between or among foreign powers. 91 FISA court must adhere to a strict set of guidelines es- states that the surveillance must not operate with tablished by FISA before the Department of Jus- 97 a substantial likelihood that the intercepted com- tice can expect FISC to grant its application. munications would involve any United States per- The Chief Justice of the United States Supreme son.92 United States citizens' privacy rights are Court designates seven district court judges from protected by this act. The method of electronic seven of the judicial circuits whose purpose is to

88 Gerald H. Robinson, We're Listening! Electronic Eaves- prohibit the dissemination, of nonpublicly available in- dropping,FISA, and the Secret Court, 36 WILLAMETTE L. REv. 51, formation concerning unconsenting United States per- 51-52 (2000) [hereinafter We're Listening.] (providing the sons consistent with the need of the United States to ob- background and inception of the Foreign Intelligence Sur- tain, produce, and disseminate foreign intelligence in- veillance Act and its court). formation; 89 Id. at 52. (2) procedures that require that nonpublicly available 90 Id. (arguing that the FISA and its court are operated in information, which is not foreign intelligence informa- a crippling shadow of secrecy that makes it nearly impossible tion, as defined in subsection (e) (1), shall not be dis- for checks and balances to be brought against their opera- seminated in a manner that identifies any United States tion in regard to ECHELON). person, without such person's consent, unless such per- 91 FISA defines "foreign power" as: son's identity is necessary to understand foreign intelli- (1) a foreign government or any component thereof gence information or assess its importance; whether or not recognized by the United States; (3) notwithstanding paragraphs (1) and (2), proce- (2) a faction of a foreign nation or nations, not substan- dures that allow for the retention and dissemination of tially composed of United States persons; information that is evidence of a crime which has been, (3) an entity that is openly acknowledged by a foreign is being, or is about to be committed and that is to be government or governments to be directed and con- retained or disseminated for law enforcement purposes; trolled by such foreign government or governments; and (4) a group engaged in international terrorism or activi- (4) notwithstanding paragraphs (1), (2), and (3), with ties in preparation therefore; respect to any electronic surveillance approved pursuant (5) a foreign-based political organization, not substan- to 102(a) [50 U.S.C. § 1802 (a)], procedures that require tially composed of United States persons; or that no contents of any communication to which a (6) an entity that is directed and controlled by a foreign United States person is a party shall be disclosed, dissem- government or governments inated, or used for any purpose or retained for longer 50 U.S.C. §1801(a) (1.994). than twenty-four hours unless a court order under sec- 92 FISA defines an United States person as: tion 105 [50 U.S.C. § 1805] is obtained or unless the At- an alien lawfully admitted for permanent residence, ... torney General determines that the information indi- an unincorporated association a substantial number of cates a threat of death or serious bodily harm to any per- members of which are citizens of the United States or son. aliens lawfully admitted for permanent residence, or a 50 U.S.C. §1801(h) (1994). corporation which is incorporated in the United States, 94 50 U.S.C. §1802(a) (2) (1994). but does not include a corporation or an association 95 See 50 U.S.C. §1801(h) (1994). which is a foreign power. 96 We're Listening, supra note 88, at 51 (providing statis- 50 U.S.C. § 1801(i) (1994). tics concerning the Foreign Intelligence Surveillance Court 93 The minimization procedures with respect to elec- ("FISC")). tronic surveillance include: 97 See 50 U.S.C. §1804 (1994) (establishing the necessary (1) specific procedures, which shall be adopted by the showing of a detailed application to FISC in the gathering of Attorney General that are reasonably designed in light intelligence information. This section makes it clear that the of the purpose and technique of the particular surveil- necessary showings are very stringent even when foreign pow- lance, to minimize the acquisition and retention, and ers are the proposed targets). COMMLAW CONSPECTUS [Vol. 11 sit on the FISC bench and hear applications for, mation sought indicates a threat of death or seri- 1 2 and grant orders approving, electronic surveil- ous bodily harm to any person lance for counterintelligence purposes. 98 If the FISC denies an application, the govern- The FISC will grant the application if the gov- ment can move for review by a panel of three ernment has adhered to the stated guidelines, judges who are designated by the Chief Justice. If compliance with which allows the court to make the court of review affirms the denial of the appli- certain findings required pursuant to FISA before cation, the government may petition for a writ of an application can be granted.99 The orders certiorari to the Supreme Court of the United themselves also must adhere to established specifi- States.103 cations, often including a description of the target of electronic surveillance, the nature and location C. Executive Order 12,333104 of the targeted surveillance, the type of informa- tion sought and the allotted time to conduct the Executive Order 12,333 was issued in 1981 by surveillance.' 00 However, if the target is solely President Reagan with the purpose of establishing comprised of foreign powers, certain information the policies and procedures to which each partici- may be excluded from the order.101 Orders may pant in the intelligence community must adhere also be granted on an emergency basis without all in the collection, retention and dissemination of of the aforementioned formalities, while still intelligence information. 10 5 The Order estab- utilizing the minimization procedures if the infor- lishes the framework in which the government

98 50 U.S.C. §1803(a) (1994). title to approve such surveillance exists; he may author- 99 To issue an order, the FISC must first make the neces- ize the emergency employment of electronic surveil- sary findings of: lance if a judge having jurisdiction under section 103 is (1) the President has authorized the Attorney General informed by the Attorney General of his designee at the to approve applications for electronic surveillance for time of such authorization that the decision has been foreign intelligence information; made to employ emergency electronic surveillance and (2) the application has been made by a Federal officer if an application in accordance with this title is made to and approved by the Attorney General; that judge as soon as practicable, but no more that (3) on the basis of the facts submitted by the applicant twenty-four hours after the Attorney General authorizes there is probable cause to believe that - such surveillance. If the Attorney General authorizes (A) the target of the electronic surveillance is a foreign such emergency employment of electronic surveillance, power or agent of a foreign power or an agent of a for- he shall require that the minimization procedures re- eign power solely upon the basis of activities protected quired by this title for the issuance of ajudicial order be by the first amendment to the Constitution of the followed. In the absence of a judicial order... the sur- United States; and veillance shall terminate when the information sought is (B) each of the facilities or places at which the elec- obtained, when the application for the order is denied, tronic surveillance is directed is being used, or is abused, or after the expiration of twenty-four hours from the or is about to be used, by a foreign power or an agent of time of authorization by the Attorney General, which- a foreign power; ever is earliest. In the event that such application for ap- (4) the proposed minimization procedures meet the proval is denied, or in any other case where the elec- definition of minimization procedures under section tronic surveillance is terminated and no order is issued 104(h) [50 U.S.C. §1804(h)]; and approving the surveillance, no information obtained or (5) the application which has been filed contains all evidence derived from such surveillance shall be re- statements and certifications required by section 104 [50 ceived in evidence or otherwise disclosed in any trial, U.S.C. §1804] and, if the target is a United States per- hearing, or other proceeding in or before any court... son, the certification or certifications are not clearly er- or any authority of the United States... and no informa- roneous on the basis of the statement made under sec- tion concerning any United States person acquired from tion 104(a)(7)(E) [50 U.S.C. §1804(a)(7)(E)] and any such surveillance shall subsequently be used or disclosed other information furnished under section 104(d) [50 in any other manner by Federal officers or employees U.S.C. §1804(d)]. without the consent of such person, except with the ap- 50 U.S.C. §1805(a) (1994). proval of the Attorney General if the information indi- 100 50 U.S.C. §1805(c) (1994). cates a threat of death or serious bodily harm to any per- 101 50 U.S.C. §1805(d) (1994). son. A denial of the application under this subsection 102 FISA authorizes emergency orders when the Attorney may be reviewed as provided in section 103. General reasonably determines that: 50 U.S.C. §1805(f) (1994). (1) an emergency situation exists with respect to the 103 50 U.S.C. §1803(b) (1994). employment of electronic surveillance to obtain foreign 104 Exec. Order No. 12,333, 3 C.F.R. §200 (1982), re- intelligence information before an order authorizing printed in 50 U.S.C. §401 (1994). such surveillance can with due diligence be obtained; 105 United Presbyterian Church in the U.S.A. v. Reagan, and 557 F. Supp. 61, 66 (D.D.C. 1982) (holding that Executive (2) the factual basis for issuance of an order under this Order 12,333 is Constitutional). 20031 ECHELON: The National Security Agency's Compliance and its agencies are to gather foreign intelligence mation incidentally acquired that indicates in- and counterintelligence information and the volvement in activities that may violate federal, manner in which the information collection will state, local or foreign laws.1 be conducted in the United States and abroad. 10 6 The NSA must, in accordance with this Order, The Order sought to strike a balance between the use the least intrusive means authorized by the At- Fourth Amendment rights of United States per- torney General in the collection, retention and sons with the need for an effective national secur- dissemination of intelligence information in the ity regime able to protect the United States from United States or directed at United States persons "international terrorist and international narcot- abroad.' 12 Executive Order 12,333 also states that ics activities, and other hostile activities directed the NSA may not conduct physical surveillance of against the United States by foreign powers, orga- a United States person abroad to collect foreign 10 7 nizations, persons, and their agents." intelligence unless the information is significant The Order's goal was to "enhance human and and cannot be reasonably acquired by other avail- technical collection techniques, especially those able means." 3 undertaken abroad, and the acquisition of signifi- Executive Order 12,333 gives the Attorney Gen- cant foreign intelligence, as well as the detection eral power to approve the use of electronic sur- and countering of international terrorist activities veillance within the United States or against a and espionage conducted by foreign powers." 108 United States person abroad if it is determined The Order also stated that the collection of intelli- that there is probable cause to believe that the gence is a "priority objective and will be pursued "technique is directed against a foreign power or in a vigorous, innovative and responsible manner an agent of a foreign power."114 In authorizing 10 9 that is consistent with the Constitution." electronic surveillance, the Attorney General Executive Order 12,333 authorized the NSA to must also comply with FISA. Since FISA pertains collect, retain and disseminate information per- to electronic surveillance of United States persons taining to United States persons if the procedures as well as foreign countries, FISA is much more are authorized by the Attorney General, and the comprehensive than Executive Order 12,333, information constitutes foreign intelligence or which only deals with United States persons lo- counterintelligence not otherwise obtainable."" cated abroad and/or United States persons acting 115 Under this Order, the NSA may also collect infor- as foreign agents.

106 Id. at 62. 108 The stated purpose of Executive Order 12,333 is: 107 Exec. Order No. 12,333 §1.4 states: to enhance human and technical collection techniques, The agencies within the Intelligence Community shall, especially those undertaken abroad, and the acquisition in accordance with applicable United States law and with of significant foreign intelligence, as well as the detec- the other provisions of this Order, conduct intelligence tion and countering of international terrorist activities activities necessary for the conduct of foreign relations and espionage conducted by foreign powers. and the protection of the national security of the United Exec. Order No. 12,333 §2.2 (1982). States, including: 109 Exec. Order No. 12,333 §2.1 (1982). (a) Collection of information needed by the President, 110 See Exec. Order No. 12,333 §2.3(b) (1982) (stating the National Security Council, the Secretaries of State that foreign intelligence collection may not be undertaken and Defense, and other Executive Branch officials for for the purpose of spying on American citizens). the performance of their duties and responsibilities; III Exec. Order No. 12,333 §2.3(i) (1982). (b) Production and dissemination of intelligence; 112 Exec. Order No. 12,333 §2.4 provides: (c) Collection of information concerning, and the con- Agencies are not authorized to use such techniques as duct of activities to protect against, intelligence activities electronic surveillance, unconsented physical search, directed against the United States, international terrorist mail surveillance, physical surveillance, or monitoring and international narcotics activities, and other hostile devices unless they are in accordance with procedures activities directed against the United States by foreign established by the head of the agency concerned and ap- powers, organizations, persons, and their agents; proved by the Attorney General. Such procedures shall (d) Special activities; protect constitutional and other legal rights and limit (e) Administrative and support activities within the the use of such information to lawful government pur- United States and abroad necessary for the performance poses. of authorized activities; and Exec. Order No. 12,333 §2.4 (1982). (f) Such other intelligence activities as the President 113 Exec. Order No. 12,333 §2.4(d) (1982). may direct from time to time. 114 Exec. Order No. 12,333 §2.5 (1982). Exec. Order No. 12,333 §1.4 (1982). 115 See Exec. Order No. 12,333 (1982). COMMLAW CONSPECTUS [Vol. 11

D. The Fourth Amendment Court, which examined past precedent for search and seizure cases. The Court's opinion relied on The most prominent argument leveled against Weeks v. United States121 in conjunction with the ECHELON is that the NSA, in its operation of history of the Fourth Amendment. l2 2 It held that ECHELON, violates American citizens' civil liber- the Founders would not have wanted the lan- ties guaranteed by the Fourth Amendment of the guage of the Fourth Amendment to be stretched Constitution, which provides: beyond the practical meaning of the words. 123 The right of the people to be secure in their persons, Therefore, the Constitution was not violated un- houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no less there had been "an official search and seizure Warrants shall issue, but upon probable cause, sup- of his person, or such a seizure of his papers or ported by Oath or affirmation, and particularly describ- his tangible material effects, or an actual physical ing the place to be searched, and the persons or things to be seized.1 1 6 invasion of his house 'or curtilage' for the pur- pose of 24 The government's participation in electronic making a seizure.' The Olmstead court ultimately found that surveillance was first considered in light of the the government's use of a Fourth Amendment's provisions in Olmstead v. wiretap on the defendant's phone line did not amount United States. 1 7 The issue in Olmstead was whether to a search or seizure, and therefore did the Fourth Amendment. 2 5 the use of private telephone conversations inter- not violate cepted by means of wiretapping was in violation of Justice Brandeis entered a powerful dissent. He the Fourth and Fifth Amendments." 8 The defen- contended that the issue of privacy is an ever- dant argued that wiretapping his phone lines to evolving condition that the Founders took into ac- 126 gain evidence of an alleged conspiracy, in viola- count while drafting the Fourth Amendment. tion of the National Prohibition Act, was a tres- He argued that the Constitution must be able to pass upon his and comparable to break- evolve with changing circumstances and new tech- ing and entering his home to steal letters. 119 In nology. 12 7 He also noted that more offensive contrast, the government contended that the case means of invading the privacy of those protected was more analogous to a situation in which a fed- by the Constitution are arising at an alarming eral officer overheard a conversation on the rate, and the Constitution should evolve to pro- 20 28 street.1 tect Americans from these invasions.' Chief Justice Taft delivered the opinion of the An example of such a case is Silverman v. United

116 U.S. CONST. amend. IV. seizures is of no value, and... might as well be stricken 117 277 U.S. 438 (1928). from the Constitution. t18 Id. at 455. Id. 119 Id. at 460-65 (comparing Olmstead's situation to 122 Olmstead, 277 U.S. at 463 (stating that the Fourth cases that have found that letters are protected from unrea- Amendment's purpose was to do away with the destructive sonable search under the Fourth Amendment); see also Ex English practice of general warrants and writs of assistance); ParteJackson, 96 U.S. 727, 733 (1877) (holding that "letters see also Boyd v. U.S., 116 U.S. at 625-26 (explaining general and sealed packages... in the mail are as fully guarded from warrants and writs of assistance). Writs of assistance empow- examination and inspection.., as if they were retained by the ered the officers to search suspected places for smuggled parties forwarding them in their own domiciles"). goods at their own discretion. General warrants were issued 120 Olmstead, 277 U.S. at 464-65 (claiming that eavesdrop- for searching houses for the search and seizure of books and ping in public does not violate the Fourth Amendment be- papers that might be used to convict their owner of the cause there is no invasion of one's right to be secure in their charge of libel. Id. persons, houses, papers or effects); see also Goldman v. 123 Olmstead, 277 U.S. at 465. United States, 316 U.S. 129, 133-34 (1942) (holding that the 124 Id. at 466. government's use of a detactaphone (a high-tech micro- 125 Id. phone) to listen in on one's conversation from an adjacent 126 Id. at 472-73 (Brandeis,J., dissenting) (arguing "time apartment did not violate the Fourth Amendment because it works changes, brings into existence new conditions and pur- did not amount to an interception of the conversation). poses. Therefore a principle to be vital must be capable of 121 232 U.S. 383, 398 (1914) (holding that it was uncon- wider application than the mischief which gave it birth."). stitutional for the police to intercept mail without a warrant 127 See id. at 473 (Brandeis, J., dissenting). because it amounted to an unreasonable search and seizure). 128 See id. at 473-75 (Brandeis, J. dissenting) (citing En- The Court reasoned that: tick v. Carrington, 19 Howles State Trials, 1030, 1066). if letters and private documents can thus be seized and It is not the breaking of his doors, and the rummaging held and used as evidence against a citizen accused of an of his drawers, that constitutes the essence of the of- offense, the protection of the Fourth Amendment de- fense; but it is the invasion of his indefeasible right of claring his right to be secure against such searches and personal security, personal liberty and private property, 20031 ECHELON: The National Security Agency's Compliance

States,129 in which the Supreme Court held that accessible to the public, and therefore, his conver- law enforcement officers' warrantless use of a sation was constitutionally protected.13 7 Justice microphone to eavesdrop on the defendant vio- Harlan's concurring opinion provided an impor- lated the Fourth Amendment because such a de- tant test for a reasonable in 138 vice constituted a physical intrusion into the de- regard to Fourth Amendment protections. fendant's premises.' 30 The officers stationed This reasonable expectation of privacy rule has re- themselves in an adjacent row house and placed mained in effect to this day. 139 the microphone in the heating system of the de- Justice Black delivered a powerful argument fendant's home.1 3 1 Absent such a physical intru- against the requirement of search warrants for sion, the Supreme Court would have held that the wiretapping and other forms of electronic surveil- defendant's Fourth Amendment protection lance. He posited that the Fourth Amendment against unreasonable search and seizure would was framed to deter the practice of actual break- 132 not have been violated even without a warrant. ing and entering to gain evidence against a per- Six years later in Katz v. United States,1 33 the Su- son to be used in a court of law140 and not to ap- 141 preme Court conducted a major revision of the ply to intangible things such as spoken words. law regarding the government's use of electronic The very characteristics of conversation provide surveillance. The petitioner posed his issues to the that this intangible concept cannot properly fit Court in terms of constitutionally protected areas under the the Fourth Amendment because it is and privacy rights in general.1 3 4 However, in tak- not a search or a seizure in the traditional ing an alternate view, the Court rephrased the is- sense. 142 sue as whether the petitioner's Constitutional In the 1972 case of United States v. United States rights under the Fourth Amendment were vio- District Court,143 the Supreme Court elaborated on lated when an electronic listening device was at- its Olmstead holding. 144 The government argued tached to a public telephone booth in which the that the Omnibus Crime Control Act imparts on 1 35 defendant was using the telephone. the government the right to conduct warrantless The Court relied on the reasoning that peti- electronic surveillance to thwart threats to the na- 145 tioner had a reasonable expectation of privacy, tion's security. and therefore the use of listening device was The Court recognized the necessity to balance deemed an unconstitutional search and the citizens' needs for privacy and free expression seizure.1 36 The Court held that although the with the government's efforts to "protect itself Fourth Amendment protects people and not from acts of subversion and overthrow directed places, the petitioner sought to keep his conversa- against it."146 The Court concluded that the use of tion private despite the fact that he was in an area wiretaps for domestic aspects of national security

where that right has never been forfeited by its convic- Fourth Amendment protection, they must have an actual tion of some public offense. (subjective) expectation of privacy, and the expectation must Id. be one that society is prepared to deem as reasonable). 129 365 U.S. 505 (1961). 139 See United States v. Charbonneau, 979 F. Supp. 1177, 130 Id. at 508-10. 1184 (S.D. Ohio 1997) (stating that a person challenging the 131 Id. at 506-07. validity of a search and seizure may only assert a "reasonable 132 See id. (stating that the reason why the government subjective expectation of privacy." The Court held that the violated petitioner's Fourth Amendment rights was because defendant did not have a reasonable and subjective expecta- they overheard his conversation by means of trespassing into tion of privacy on the Internet because the openness of the the heating system in his home). chat room diminished his expectation of privacy incre- 133 389 U.S. 347 (1967). mentally). 134 Id. at 349-50 (posing the issues in terms of whether a 140 Katz, 389 U.S. at 367. public telephone booth is a constitutionally protected area so 141 Id. at 365-66. that evidence obtained by attaching an electronic listening 142 Id. device to the top of the booth is in violation of the constitu- 143 407 U.S. 297 (1972). tional rights of privacy guaranteed to the occupant of the 144 Olsntead, 277 U.S. at 466 (holding that the wiretap- booth and whether the protected area must be physically ping did not amount to a search and seizure because there penetrated before search and seizure can be deemed in viola- was no actual trespass committed against petitioner). tion of the Fourth Amendment). 145 United States District Court, 407 U.S. at 303. 135 Id. at 353. 146 Id. at 315. 136 Id. The question that must be asked is whether the needs of 137 Id. at 351. citizens for privacy and free expression may not be bet- 138 Id. at 361 (holding that in order for a person to have ter protected by requiring a warrant before such a sur- COMMLAW CONSPECTUS [Vol. 11 require prior judicial approval. 147 United States.' 49 The NSA adheres to the strict The previous discussion's goal was to aid the guidelines established by FISA when it conducts reader in understanding the legal regime that the surveillance on foreign powers. FISA requires the NSA adheres to in its operation of electronic sur- NSA to gain authorization from the Attorney Gen- veillance for intelligence gathering purposes. The eral and abide by FISA's minimization procedures following section is a discussion on the operation if the electronic surveillance is directed at foreign of ECHELON within the aforementioned legal powers, and there is no substantial likelihood that framework. the surveillance will incidentally acquire informa- tion pertaining to a United States citizens' com- 150 VI. ECHELON'S OPERATION WITHIN ITS munications. There is no need to obtain a war- STATED LEGAL REGIME rant or court order to conduct this surveillance, because foreign powers are not granted the con- Despite the recent terrorist attacks on the stitutional protections that are granted to the 1 5 1 United States, Americans are not willing to sur- American people. render or loosen their hold on their fundamental .' 48 The majority of Americans, if aware of the existence of ECHELON, would be- 2. United States Persons lieve that the Fourth Amendment protections against unreasonable search and seizure are di- FISA requires the NSA to obtain a court order rectly violated by the operation of this surveillance from the Foreign Intelligence Surveillance Court technology. However, this Comment asserts that if a United States person is involved in electronic the oversight in the legal framework for operating surveillance. If the United States person is located ECHELON adequately guarantees the steadfast abroad, Executive Order 12,333 is the guiding au- protections warranted by the Fourth Amendment, thority, and the NSA must obtain permission from while maintaining the national security of the the Attorney General to conduct electronic sur- 152 United States. veillance. The only way a United States person would be the object of the NSA's electronic sur- veillance would be if that individual is deemed an A. Allegations of Domestic Surveillance agent of a foreign power, in that he acts for, or on 1. Non-United States Persons behalf of the foreign power by: knowingly engag- ing in intelligence gathering; knowingly engaging The NSA is not permitted to spy on American in sabotage or international terrorism; knowingly citizens. The NSA's main priority is to gather sig- entering the United States under a false or fraud- nals intelligence from foreign powers and individ- ulent identity; or knowingly aiding or abetting any 5 3 uals that pose a threat to the security of the persons in the above-mentioned activities.1

veillance is undertaken... and whether a warrant re- 151 Id. quirement would unduly frustrate the efforts of Govern- 152 Legal Standards, supra note 18. ment to protect itself from acts of subversion and over- 153 FISA defines agent of a foreign power to include: throw directed against it. (2) any person who- Id. (A) knowingly engages in clandestine intelligence gath- 147 Id. at 321. ering activities for or on behalf of a foreign power, 148 See Philip Shenon & Neil A. Lewis, Groups Fault to Lis- which activities involve or may involve a violation of the ten, Search and Seize, NYTIMES.COM, at http://www.nytimes. criminal statutes of the United States; com (Sept. 21, 2001) (claiming that the broader wiretapping (B) pursuant to the direction of an intelligence service authority granted by the Combating Terrorism Act 2001 is or network of a foreign power, knowingly engages in any vehemently opposed by numerous United States organiza- other clandestine intelligence activities for or on behalf tions); but see Ariana Eunjung Cha & Jonathan Krim, Privacy of such foreign power, which activities involve or are Trade-Offs Reassessed, The Post, Sep. 13, 2001, at about to involve a violation of the criminal statutes of E01 (providing testimony that Americans are much more tol- the United States; erant of government surveillance in the wake of the terrorist (C) knowingly engages in sabotage or international ter- attacks on the United States). rorism, or activities that are in preparation therefor, for 149 See Exec. Order No. 12,333 §1.12(b), 46 Fed. Reg. or on behalf of a foreign power; 59941 (Dec. 4, 1981) (establishing that the responsibilities of (D) knowingly enters the United States under a false or the NSA are to collect, process and disseminate signals intelli- fraudulent identity for or on behalf of a foreign power gence for national foreign intelligence purposes). or, while in the United States, knowingly assumes a false 150 See 50 U.S.C. §1802 (1994). or fraudulent identity for or on behalf of a foreign 2003] ECHELON: The National Security Agency's Compliance

If gathered information concerns a United NSA intercepts a vast amount of telephone, fax States person, the acquired information may be and e-mail communications, but only a small frac- used in a criminal proceeding if the Attorney tion actually get analyzed by NSA employees. The General provides advanced authorization, the ag- majority of intercepts flow through the system grieved person is notified, and the FISA minimiza- without ever being seen or heard by a live person. tion procedures are followed. 154 The acquisition If the communication does not get flagged for of such information must be necessary for, and analysis, it simply gets kicked out of the system, not merely related to, national defense, national and no one's privacy is violated. Simply stated, if security or the conduct of foreign affairs of the people are not doing anything wrong or illegal, 155 United States. they have nothing to fear. The operation of ECHELON adheres to the aforementioned legal standards because it does B. War and National Defense Legislation not conduct surveillance on its own citizens. The NSA, in its operation of ECHELON, intercepts Terrorism has notjust recently become a threat communications that are sent abroad. If the com- to the United States-it was a threat to the United munications are to and from United States per- States long before September 11, 2001. However, sons and travel within the United States, the NSA the recent attacks on the United States brought will not target those communications. 5 6 The the issue of terrorism to the forefront. The NSA NSA's objective is to intercept foreign intelli- was established in 1952 and has performed the gence, not domestic intelligence.' 57 However, it functions of gathering intelligence and counter- may appear that the NSA spies on its own citizens intelligence information since that time, attempt- because the other UKUSA countries may inter- ing to prevent and detect acts of terror and war cept United States persons' communications and against the United States, so our nation's citizens analyze them for threatening content. 58 It is al- may continue to realize their rights under the leged that there are situations in which another Constitution.' 6 3 President Reagan sought to UKUSA country intercepted American communi- strengthen this purpose with Executive Order cations, analyzed them, and then determined that 12,333, which was of great historical significance they were a threat to the national security of the in the evolution of war and national defense legis- United States and therefore notified the NSA of lation in the United States. 164 The statutory provi- the situation. 159 This is legal under the stated sion in which Executive Order 12,333 was incor- 60 guidelines.' If the intercepted information was porated states: mistakenly tagged as containing questionable in- In enacting this legislation, it is the intent of Congress formation, the analyst would examine the data to provide a comprehensive program for the future se- and then discard it from the system if she deter- curity of the United States; to provide for the establish- ment of integrated policies and procedures for the de- mined that the contents do not warrant con- partments, agencies, and functions of the Government 161 165 cern. relating to the national security. ECHELON's operation also adheres to the min- Congress' motivation in enacting this legisla- imization procedures established by FISA. 16 2 The tion was based on findings that "recent revolution-

power; or 161 See Richelson, supra note 7. (E) knowingly aids or abets any person in the conduct 162 See NSA FREQUENTLY ASKED QUESTIONS, supra note 13 of activities described in subparagraph (A), (B), or (C) (stating that there is an internal review process within the or knowingly conspires with any person to engage in ac- NSA, the Office of the Inspector General, that oversees com- tivities described in subparagraph (A), (B), or (C). pliance with Executive Order 12,333). 50 U.S.C. §1801(b) (1994). 163 See id. 154 50 U.S.C. §1806 (1994). 164 See United Presbyterian Church in the U.S.A. v. Rea- 155 Legal Standards, supra note 18. gan, 557 F. Supp 61, 62 (D.D.C. 1982) (holding Executive 156 Id. Order 12,333 constitutional. Stating that the Order "estab- 157 NSA FREQUENTLY ASKED QUESTIONS, supra note 13 lishes the framework in which our governmental and military (stating that the NSA performs signals intelligence opera- agencies are to effectuate the process of gathering foreign tions against foreign powers or agents of foreign powers, and intelligence and counterintelligence information, and the not on Americans). manner in which intelligence-gathering functions will be 158 See Zimmerman & Hurd, supra note 48. conducted at home and abroad). 159 See id. 165 Pub. L. No. 85-599, 61 Stat. 496 (1947) (codified as 160 See generally Legal Standards, supra note 18. amended at 50 U.S.C. §401). COMMLAW CONSPECTUS [Vol. 11 ary world events require a fundamental reassess- However, if Congress finds that questionable ment of the defense and national security policies technology is necessary to effectuate the purpose of the United States,"' 6' 6 and "real and potential of a government agency, the military or the Con- military threats to the United States and its allies stitution, it may determine that new legislation is will continue to exist for the foreseeable future necessary despite public opinion to the contrary. from not just the but also from ter- In response to the September l1th tragedy, for rorism and from Third World nations." 6 7 Con- example, Congress enacted the Uniting and gress, back in 1947, realized that the United States Strengthening America Act by Providing Appro- would have trouble maintaining its superpower priate Tools Required to Intercept and Obstruct status. It also determined that our nation's ability Terrorism Act of 2001 ("U.S.A. ") .172 to guard against subversive countries establishes This bill provided the government with reduced the United States' position as "mother hen" over judicial oversight for tapping phones, tracing e- those countries that cannot adequately protect mail, retrieving voice mail and tracking web surf- 168 73 themselves from opposing governments. ing.1 The NSA must balance the aforementioned considerations with the privacy rights granted to VII. CONCLUSION all Americans. In doing so, the NSA has devel- oped technological breakthroughs such as ECHE- In light of the recent terrorist attacks on the LON that aid in the goals of preventing hostile United States, the evaluation of privacy matters governments and radical groups from destroying must be conducted in a new context. The NSA is the security of the United States. 169 At first glance, not asking Americans to put their privacy rights by ECHELON may appear to tread upon forbidden the wayside, but it does hope to prove that its in- soil, but further investigation reveals that ade- terception capabilities are not as broadly sweep- quate safeguards have been established to protect ing as one may imagine. The prospect that one's the civil liberties of all Americans.1 70 The NSA private communications have a slim chance of in- and its intelligence community partners will con- terception by a government agency should be tinue to fight an uphill battle against those who weighed against the benefit of the existence of 174 challenge their every move. With ever-evolving technological surveillance such as ECHELON. technological advances coming out of the wood- For law-abiding citizens, the benefits of a secure work, the government agencies and military fac- nation far outweigh the infrequent risks to one's tions in the intelligence community will have to individual expectation of private communica- justify the existence of such increased technology tions. Despite certain intrusions into United to their respective oversight boards and Congres- States citizens' privacy rights, there are adequate sional oversight committees.' 7' In some situa- judicial, statutory and administrative safeguards tions, the oversight committees may find that the that protect Americans from an abuse of govern- encroachment on United States persons' civil lib- mental power and secrecy. If the NSA is to con- erties is too broad, and the men and women that tinue to serve the nation by providing and pro- our people have elected to represent our best in- tecting vital information, we must "embrace terests will be zealous advocates in a time of need. change and resume our place on the forward

166 Pub. L. No. 101-511, 104 Stat. 1898 (1990) (codified 172 Pub. L. No. 107-56, 115 Stat. 272 (2001) (providing as amended at 50 U.S.C. §401). law enforcement authorities with new powers to conduct a 167 Id. more comprehensive form of wiretap surveillance). The 168 Id. (stating that "emerging democracies around the ramifications of the U.S.A. Patriot Act of 2001 on ECHE- world will require political, technical, and economic assis- LON's operation are not discussed in this Comment. tance, as well as military assistance, from the developed free 173 Jess Bravin, Senate Sends AntiterrorismBill to Bush, WALL nations in order to thrive and to become productive mem- ST. J., Oct. 26, 2001, at A3 (describing the implications of the bers of the world community"). U.S.A. Patriot Act). 169 See NSA FREQUENTLY ASKED QUESTIONS, supra note 13. 174 Lawrence D. Sloan, Note, ECHELON and the Legal Re- 170 See Legal Standards, supra note 18. straints on Signals Intelligence: A Need for Reevaluation, 50 DuKE 171 See Bob Barr, Legislative Reform Commentaries: A Ty- L.J. 1467, 1510 (2001) (stating that ECHELON must be "per- rant's Toolbox: Technology and Privacy in America, 26 J. LEGIS. mitted to function in the most effective manner possible that 71, 72-76 (2000) (discussing the various technological ad- does not unacceptably compromise the privacy and freedoms vancements and the need for an effective mechanism for pro- that are so important to Americans"). tecting privacy in the ). 20031 ECHELON: The National Security Agency's Compliance edge of technology."' 75

175 NATIONAL SECURITY AGENCY, TRANSFORM THE CRYPTOLOGIC SYSTEM, at http://www.nsa.gov/about-nsa/ strategic/transform.htm1.