Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

BlueCheese

(2,522 posts)
Wed Jul 31, 2013, 01:10 AM Jul 2013

Dianne Feinstein op-ed in the Washington Post

Sen. Dianne Feinstein (D-CA) wrote an op-ed for the Post in which she defended the NSA phone records program and proposes modest reforms about it. You can read it here. In my opinion, it was the usual vague and unconvincing reassurances about how the government and its secret court oversee the program, followed by an allusion to terrorism and how frightening it should be.

However, one section stood out to me:

When the NSA learns of a number used by a terrorist connected to al-Qaeda, it can search its database of phone records.

Only 22 highly vetted NSA analysts can approve a query of this database — and only when they have a reasonable, articulable suspicion that the number is connected to terrorism.

If the NSA analyst believes that circumstances justify the need to know the actual content of the call to probe further into what may be an active terrorist plot, the numbers are sent to the FBI, which requests a warrant from the court that oversees the Foreign Intelligence Surveillance Act (FISA). Ultimately, this court determines if “probable cause” is sufficient to grant the warrant to collect the content of the call.


According to this, the NSA can query its database of phone records. If they determine "the call" is important, they can ask the FISA court for a warrant to listen to "the call". What call is she talking about? It's not previously specified before she refers to it. In particular, is this a call that was made in the past? If so, how could they "collect" the content of it, if they didn't already have it stored somewhere? Do they already have it stored somewhere?

Perhaps this was just poorly phrased, and she means collection of future calls. But I'd really like to know.

Any thoughts?
35 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Dianne Feinstein op-ed in the Washington Post (Original Post) BlueCheese Jul 2013 OP
What it means is that she'll be charged with Espionage Savannahmann Jul 2013 #1
Ayup! BrotherIvan Jul 2013 #9
very interesting PowerToThePeople Jul 2013 #2
Is this the LEAST UNTRUTHFUL? chimpymustgo Aug 2013 #33
Seems totally logical to me. Major Hogwash Jul 2013 #3
it's just as they previously said grasswire Jul 2013 #4
Actually, I think the content is looked at before the warrant issues. reusrename Jul 2013 #20
Please Ms. Feinstein.. pipoman Jul 2013 #5
the fisa court was established post watergate: nixon had taken the view that the president struggle4progress Jul 2013 #10
Maybe I could agree if I saw any pipoman Jul 2013 #12
california deserves BETTER than this neocon disguised as a democrat. alp227 Jul 2013 #6
Absolutely, she is an abomination BrotherIvan Jul 2013 #11
After listening to and reading what Sen. Wyden has to say, I think DiFi is full of shit. Luminous Animal Jul 2013 #7
people who believe her are the usual folk who believe anything Skittles Jul 2013 #8
If you believe Feinstein, I've got oceanfront property in Arizona I'd like to sell you. backscatter712 Jul 2013 #13
Wow Life Long Dem Jul 2013 #22
They promise, it's only the Metadata! Just ask Clapper! backscatter712 Jul 2013 #28
She's talking about stored content dreamnightwind Jul 2013 #14
A number of intelligence officals and past whistleblowers over at truedelphi Jul 2013 #16
Thank You For That !!! WillyT Jul 2013 #25
I believe they have a way to get the content dreamnightwind Aug 2013 #35
In other words... davidn3600 Jul 2013 #15
Thank you. woo me with science Jul 2013 #18
They are collecting everything. woo me with science Jul 2013 #17
What you said n/t Catherina Jul 2013 #27
Why the hell did I ever vote for her? vanlassie Jul 2013 #19
Cause she was the lesser of evils. It's the only reason I vote. Fear. WCLinolVir Jul 2013 #26
^ Wilms Jul 2013 #21
Cat is out of the bag now. boston bean Jul 2013 #23
Letter to me from DiFi MindPilot Jul 2013 #24
This is close to what Obama said, but without misrepresentation that "there's no content" in there leveymg Jul 2013 #29
it's not coherent. Igel Jul 2013 #30
The 2008 FISA Amendment supposedly barred warrantless "reverse targeting." That's the difference leveymg Aug 2013 #32
Frankly, Mrs Feinstein, you can kiss my lilly white ass. Gravitycollapse Aug 2013 #31
And she can kiss my caramel brown ass. chimpymustgo Aug 2013 #34
 

Savannahmann

(3,891 posts)
1. What it means is that she'll be charged with Espionage
Wed Jul 31, 2013, 01:13 AM
Jul 2013

You see, she just let the cat out of the bag. They do capture and store contents of calls. Which is exactly what they said they did not do. Now, releasing that information, was in fact releasing secret information. So Diane Feinstein just committed Espionage by the definitions tossed about here constantly.

 

PowerToThePeople

(9,610 posts)
2. very interesting
Wed Jul 31, 2013, 01:17 AM
Jul 2013

Either she does not understand how it works or she does.

So either she is mistaken and giving false information or
They are recording everything.....

grasswire

(50,130 posts)
4. it's just as they previously said
Wed Jul 31, 2013, 01:57 AM
Jul 2013

Everything is hoovered up and stored. She's saying that when the need arises, they get a warrant and access the content of the troublesome call that was already stored.

That's her simplistic explanation. Nothing to see here.

 

reusrename

(1,716 posts)
20. Actually, I think the content is looked at before the warrant issues.
Wed Jul 31, 2013, 06:51 AM
Jul 2013

That's the way the law is written and that's also the way Snowden et. al. have described it.

The analyst is used somewhat like a robosigner in this process. He fills out a form or template and the act of completing the form releases the content for review.

Then, sometime within the next 72 hours the warrant is requested from the FISA court. The FISA court automatically approves the warrant request submitted in this manner because the software modules ensure that all legal requirements for the warrant are met during the process of the analyst completing the initial form or template.

So, yes, a warrant is necessary in order to peek at the content.

And, yes, an analyst can look at the stuff on his own authority, without a warrant.

The law gives an analyst legal access to the content, on his own authority, once he has been verbally authorized by either the Director of National Intelligence (Clapper) or the Attorney General (Holder).

 

pipoman

(16,038 posts)
5. Please Ms. Feinstein..
Wed Jul 31, 2013, 02:17 AM
Jul 2013

why is it again that we need a "secret court" to issue these warrants? as opposed to our massive federal court system already in place and funded? a court which can ignore the transparency of public records requests? it isn't because federal courts are governed by different laws, to wit: the constitution, Bill of Rights, and the numerous publicly accessible laws, as opposed to secret laws? Do these judges, when sworn in, swear to uphold the Constitution of the United States? What exactly is the oath they take?

struggle4progress

(118,282 posts)
10. the fisa court was established post watergate: nixon had taken the view that the president
Wed Jul 31, 2013, 02:58 AM
Jul 2013

had unlimited ability to perform certain wiretapping operations related to national security, and the judicial branch had been upholding him in this regard; to reduce the possibility of further nixonian abuses, the fisa courts were established as a compromise involving all three branches of government in various ways

it's not enough to hold the house, senate, and presidency long enough to re-do the fisa legislation: we need also to hold the senate and presidency long enough to change the long-term complexion of the federal judiciary, so that we won't simply revert to the law according to the nixon-era courts

 

pipoman

(16,038 posts)
12. Maybe I could agree if I saw any
Wed Jul 31, 2013, 03:01 AM
Jul 2013

inclination whatsoever to "re-do the fisa legislation". Has any meaningful Democrat even suggested such a thing?

alp227

(32,025 posts)
6. california deserves BETTER than this neocon disguised as a democrat.
Wed Jul 31, 2013, 02:30 AM
Jul 2013

I think she's retiring, so California better get a REAL progressive in the senate by 2016!

backscatter712

(26,355 posts)
13. If you believe Feinstein, I've got oceanfront property in Arizona I'd like to sell you.
Wed Jul 31, 2013, 03:52 AM
Jul 2013

Oh, sure, they record and store your phone calls, but they PROMISE they won't listen to them unless one of their elite magic experts concludes you're a terrorist first!

dreamnightwind

(4,775 posts)
14. She's talking about stored content
Wed Jul 31, 2013, 04:09 AM
Jul 2013

Hard to believe she would just out and say that, but it's pretty clear. And she referenced the "content of the call" twice in that statement, which makes it less likely that it was unintended.

What she described is pretty much how I had thought it might be. They have it all, going back a certain number of years (she say it's a 5-year retention period, though in that statement she says "phone records" so it's unclear if the content has that retention period) only some other agency, contractor, or even telecom company probably collects it so the NSA can kind of say they don't do it. When a person or phone call is flagged (either by profiling/tracking software or by an analyst, it's probably not all automated) they can go get the content from that dataset.

She seems to claim that every request for content first gets approved by FISA, a claim I'm skeptical of.

I could imagine them having some broad outstanding authorizations from the court, so that they don't get every single phone call request reviewed by the court, such a practice could lead to wholesale abuse of the system, though I'm only speculating.

I sure don't think we can just trust them, though, there needs to be real oversight by elected people who are at least supposed to be responsible to the public.

Great find, this seems like a big deal to me. I wouldn't hold my breath for the MSM to make it big news, I guess that's up to us.

K & R

truedelphi

(32,324 posts)
16. A number of intelligence officals and past whistleblowers over at
Wed Jul 31, 2013, 04:38 AM
Jul 2013

Sibel Edmonds' website have stated that the conversations can be re-constituted from the meta data. That the text of the emails can be re-constituted. Going back for years.

And although Di Fi's writing in the OP is a bit ambiguous, Binney and others have spoken very clearly about it.

Edmonds' website is boilingfrogs.com

dreamnightwind

(4,775 posts)
35. I believe they have a way to get the content
Thu Aug 1, 2013, 08:14 PM
Aug 2013

but the metadata is for indexing and profiling, it doesn't contain the content, if it does it isn't metadata it's data, and I'm pretty sure they wouldn't do anything so obvious as to call the actual content metadata. It's the same in the end either way, they have the content stored and a way to get to it.

Oh, and good to hear from you.

 

davidn3600

(6,342 posts)
15. In other words...
Wed Jul 31, 2013, 04:10 AM
Jul 2013

We are spying on you. We are collecting your data. But we promise not to look into it unless we designate you a terrorist and our secret court says we can.

woo me with science

(32,139 posts)
18. Thank you.
Wed Jul 31, 2013, 04:55 AM
Jul 2013

Still the cart before the horse. What a despicable, unconstitutional charade.

They have no right to collect and store the information in the first place.

woo me with science

(32,139 posts)
17. They are collecting everything.
Wed Jul 31, 2013, 04:53 AM
Jul 2013

If they weren't, they wouldn't engage in these ridiculous contortions. They wouldn't have to make up absurdities like the "three hop rule" in order to simultaneously claim that they are bound by limits for spying *and* explain why they are surveilling MILLIONS of us.

They are lying brazenly to our faces, again and again and again and again and again, just like their shameless, amoral mouthpieces in the press and across the internet.

They are corrupt, and they are liars.

vanlassie

(5,670 posts)
19. Why the hell did I ever vote for her?
Wed Jul 31, 2013, 05:11 AM
Jul 2013

Major League Warmonger. Supporting women's rights while fucking us ALL.

boston bean

(36,221 posts)
23. Cat is out of the bag now.
Wed Jul 31, 2013, 08:58 AM
Jul 2013

No one can say they aren't collecting the actual recording of the call, anymore.

This spells it out pretty clearly.

 

MindPilot

(12,693 posts)
24. Letter to me from DiFi
Wed Jul 31, 2013, 09:03 AM
Jul 2013

This is the boilerplate reply I received from Feinstein in response to my concerns about NSA spying.



> From: <senator@feinstein.senate.gov>
> To: <>
> Subject: U.S. Senator Dianne Feinstein responding to your message
> Date: Wed, 17 Jul 2013 10:19:22 -0400
>
> <http://feinstein.senate.gov/>
>
>
>
> Dear Mindpilot:
>
>
>
> I received your communication indicating your concerns about the two
> National Security Agency programs that have been in the news recently.
> I appreciate that you took the time to write on this important issue
> and welcome the opportunity to respond.
>
>
>
> First, I understand your concerns and want to point out that by law,
> the government cannot listen to an American's telephone calls or read
> their emails without a court warrant issued upon a showing of probable
> cause. As is described in the attachment to this letter provided by
> the Executive Branch, the programs that were recently disclosed have
> to do with information about phone calls - the kind of information
> that you might find on a telephone bill - in one case, and the
> internet communications (such as email) of non-Americans outside the
> United States in the other case. Both programs are subject to checks
> and balances, and oversight by the Executive Branch, the Congress, and
> the Judiciary.
>
>
>
> As Chairman of the Senate Intelligence Committee, I can tell you that
> I believe the oversight we have conducted is strong and effective and
> I am doing my level best to get more information declassified. Please
> know that it is equally frustrating to me, as it is to you, that I
> cannot provide more detail on the value these programs provide and the
> strict limitations placed on how this information is used. I take
> serious my responsibility to make sure intelligence programs are
> effective, but I work equally hard to ensure that intelligence
> activities strictly comply with the Constitution and our laws and
> protect Americans' privacy rights.
>
>
>
> These surveillance programs have proven to be very effective in
> identifying terrorists, their activities, and those associated with
> terrorist plots, and in allowing the Intelligence Community and the
> Federal Bureau of Investigation to prevent numerous terrorist attacks.
> More information on this should be forthcoming.
>
>
>
> • On June 18, 2003, the Director of the National Security Agency (NSA)
> testified to the House Intelligence Committee that there have been
> "over 50 potential terrorist events" that these programs helped
> prevent.
>
>
>
> • While the specific uses of these surveillance programs remain
> largely classified, I have reviewed the classified testimony and
> reports from the Executive Branch that describe in detail how this
> surveillance has stopped attacks.
>
>
>
> • Two examples where these surveillance programs were used to prevent
> terrorist attacks were: (1) the attempted bombing of the New York City
> subway system in September 2009 by Najibullah Zazi and his
> co-conspirators; and (2) the attempted attack on a Danish newspaper
> that published cartoons of the Prophet Mohammed in October 2009 by U.S.
> citizen David Headley and his associates.
>
>
>
> • Regarding the planned bombing of the New York City subway system,
> the NSA has determined that in early September of 2009, while
> monitoring the activities of Al Qaeda terrorists in Pakistan, NSA
> noted contact from an individual in the U.S. that the FBI subsequently
> identified as Colorado-based Najibullah Zazi. The U.S. Intelligence
> Community, including the FBI and NSA, worked in concert to determine
> his relationship with Al Qaeda, as well as identify any foreign or
> domestic terrorist links. The FBI tracked Zazi as he traveled to New
> York to meet with co-conspirators, where they were planning to conduct
> a terrorist attack using hydrogen peroxide bombs placed in backpacks.
> Zazi and his co-conspirators were subsequently arrested. Zazi
> eventually pleaded guilty to conspiring to bomb the NYC subway system.
>
>
>
> • Regarding terrorist David Headley, he was also involved in the
> planning and reconnaissance of the 2008 terrorist attacks in Mumbai,
> India that killed 166 people, including six Americans. According to
> NSA, in October 2009, Headley, a Chicago businessman and dual U.S. and
> Pakistani citizen, was arrested by the FBI as he tried to depart from
> Chicago O'Hare airport on a trip to Europe. Headley was charged with
> material support to terrorism based on his involvement in the planning
> and reconnaissance of the hotel attack in Mumbai 2008. At the time of
> his arrest, Headley and his colleagues were plotting to attack the
> Danish newspaper that published the unflattering cartoons of the
> Prophet Mohammed, at the behest of Al Qaeda.
>
>
>
> Not only has Congress been briefed on these programs, but laws passed
> and enacted since 9/11 specifically authorize them. The surveillance
> programs are authorized by the Foreign Intelligence Surveillance Act
> (FISA), which itself was enacted by Congress in 1978 to establish the
> legal structure to carry out these programs, but also to prevent
> government abuses, such as surveillance of Americans without approval
> from the federal courts. The Act authorizes the government to gather
> communications and other information for foreign intelligence purposes.
> It also establishes privacy protections, oversight mechanisms
> (including court review), and other restrictions to protect privacy
> rights of Americans.
>
>
>
> The laws that have established and reauthorized these programs since
> 9/11 have passed by mostly overwhelming margins. For example, the
> phone call business record program was reauthorized most recently on
> May 26, 2011 by a vote of 72-23 in the Senate and 250-153 in the House.
> The internet communications program was reauthorized most recently on
> December 30, 2012 by a vote of 73-22 in the Senate and 301-118 in the
> House.
>
>
>
> Attached to this letter is a brief summary of the two intelligence
> surveillance programs that were recently disclosed in media articles.
> While I very much regret the disclosure of classified information in a
> way that will damage our ability to identify and stop terrorist
> activity, I believe it is important to ensure that the public record
> now available on these programs is accurate and provided with the
> proper context.
>
>
>
> Again, thank you for contacting me with your concerns and comments. I
> appreciate knowing your views and hope you continue to inform me of
> issues that matter to you. If you have any additional questions or
> concerns, please do not hesitate to contact my office in Washington,
> D.C. at (202) 224-3841.
>
>
>
> Sincerely yours,
>
>
> Dianne Feinstein
> United States Senator
>

leveymg

(36,418 posts)
29. This is close to what Obama said, but without misrepresentation that "there's no content" in there
Wed Jul 31, 2013, 09:13 PM
Jul 2013

Compare Feinstein's OpEd to the language the President used in describing the way the Sec. 702 system works.

Obama’s Misleading Statement to Charlie Rose: “There is no content in that database”

The President's interview with Rose is excerpted at length, below: http://www.democraticunderground.com/10023050432

Program 215, (the President) said gets data from the service providers like a Verizon in bulk, and basically call pairs.

"You have my telephone number connecting with your telephone number. There are no names. There is no content in that database. All it is, is the number pairs, when those calls took place, how long they took place. So that database is sitting there," he said.

"Now, if the NSA through some other sources, maybe through the FBI, maybe through a tip that went to the CIA, maybe through the NYPD. Get a number that where there's a reasonable, articulable suspicion that this might involve foreign terrorist activity related to al-Qaeda and some other international terrorist actors.

Then, what the NSA can do is it can query that database to see did this number pop up? Did they make any other calls? And if they did, those calls will be spit out. A report will be produced. It will be turned over to the FBI. At no point is any content revealed because there's no content," Obama explained.


We now see that the President's statement is, at the least, misleading, if not confused: "There is no content in that database."

In fact, both parts – content and metadata - go through a single NSA database, and the NSA slide show that.

I think what Obama did there was conflate the Sec.702 system (PRISM) with one small part of that database, MARINA (voice) and MAINWAY (email), where metadata is stored. Voice content, meanwhile, goes to NUCLEON, below.

The slide that came out today is referenced below as "DNI Content," and that is the data the analyst can access at the profiling (Target Acquisition) stage in order to determine whether to pass the case over to the FBI for a FISA warrant. That DNI Content in turn goes into the PINWALE database for further analysis.

Igel

(35,309 posts)
30. it's not coherent.
Wed Jul 31, 2013, 11:59 PM
Jul 2013

Start with "the need to know the actual content of the call."

What call? We introduce new topics with "a." There are exceptions--generics, for example, or something that is specific and so "in the context" that it's been introduced. But no call, definite or specific, is in the context. Suspicion: Bad edit.

Or no a very felicitous use of a generic noun. You get to the "the" and you stumble. Some people are clumsy enough not to notice.

Then we get to the phrase "the warrant to collect the content of the call." If it's already collected, why is it being collected? If it's a call that was already made but the content wasn't collected, how do you collect it without a time warp or TARDIS? It's one thing to need a warrant to listen to an already collected call from last week. It's entirely another thing to need a warrant to collect a call from last week.

I think there's a bad edit. There's a category of calls that are collected but not open to the NSA. This has been discussed before. When you have permission to wiretap somebody overseas you sometimes pick up not just foreign nationals calling foreign nationals. And if you know that 999-888-9999 called your terrorist suspect in Peshawar that you're wiretapping it may be handle to search to see if 999-888-9999 placed any other calls to anybody else you've been wiretapping--perhaps a suspect in London. It may be that she's referring to those, because in the NSA slide that is referred to upstream the explanation was precisely this sort of case.

Note that there was a (R) politician from Alaska that was caught in a bribery scandal in this sort of way. A building contractor was wiretapped. In wiretapping the contractor you necessarily also pick up the other person's call. Nobody considered this a breech of the Constitution.

leveymg

(36,418 posts)
32. The 2008 FISA Amendment supposedly barred warrantless "reverse targeting." That's the difference
Thu Aug 1, 2013, 09:09 AM
Aug 2013

from the Stevens case.

Latest Discussions»General Discussion»Dianne Feinstein op-ed in...