Page 64 - pclob usa freedom
P. 64

TOP SECRET//SI//NOFORN




               tightened up their operational security.” 307   Their shift to IP-based communications, including
               social media and encrypted chat apps, has not made telephony irrelevant to counterterrorism—
               people still use phones—but, as academic researchers have noted, it has become less central. 308
               “We are dealing with a challenge right now: New technologies that enable encryption and allow
               them to be fairly confident that they are communicating in a way that can’t be detected,” one US
               official told the news organization ProPublica in 2016. 309   “They know how to communicate
               securely.” 310

                       (U) This shift suggests that focusing on the full spectrum of digital communications
               technologies, rather than voice telephony in isolation, would likely yield greatest
               counterterrorism value going forward.  Whether the complexities that led to compliance and
               data-integrity problems during the life of this program are likely to persist into the future
               depends on predictive judgments about the future of telephony networks and company billing
               practices, as well as the possibility that the government could develop technical approaches to
               mitigate these complexities.  The technical experts at NSA and outside technologists familiar
               with the intricacies of telephony networks would be best positioned to render those predictive
               judgments.  Given the persistence of terrorist threats to the homeland, Congress may wish to ask
               agencies whether they need alternative tools to meet the operational need that the USA Freedom
               Act and the prior bulk CDR program were designed to address.

                       (U) It is also important to note that USA Freedom Act CDRs were only one of several
               avenues by which NSA and FBI can obtain and analyze communications metadata for
               counterterrorism purposes.  NSA collects phone metadata and electronic communications
               metadata as part of its global signals-intelligence mission carried out under Executive Order
               12333.  This metadata, stored in an internal repository, can be used to protect the homeland from
               international terrorism: NSA’s Supplemental Procedures Governing Communications Metadata
               Analysis allow “identifiers associated with both non-US persons and US persons to be used to
               query phone metadata and electronic communications metadata that NSA obtains through other
               lawful collection methods.” 311   NSA can also collect communications metadata under Section








               307  (U) Bipartisan Policy Center, Digital Counterterrorism: Fighting Jihadists Online, 15 (May 2018).

               308  (U) Susan Landau and Asaf Lubin, Explaining the Anomalies, Examining the Value: Should the USA Freedom
               Act’s Metadata Program be Extended?, at 62 (2019).
               309  (U) Sebastian Rotella, ISIS via WhatsApp: “Blow Yourself Up, O Lion,” ProPublica (July 11, 2016).
               310  (U) Sebastian Rotella, ISIS via WhatsApp: “Blow Yourself Up, O Lion,” ProPublica (July 11, 2016).

               311  (U) Part II(A)(1).

                                                             61




                                                TOP SECRET//SI//NOFORN
   59   60   61   62   63   64   65   66   67   68   69