Page 22 - AssessmentReport
P. 22

Recommendation 7:  Examine the Technical Feasibility of Limiting
               Particular Types of “About” Collection

               Status:

               Implemented

               Text of the Board’s Recommendation:

               The NSA periodically should review the types of communications acquired through “about”
               collection under Section 702, and study the extent to which it would be technically feasible
               to limit, as appropriate, the types of “about” collection.

               Explanation for the Recommendation:

               In the upstream collection process, the NSA acquires not only Internet communications
               sent to and from the selector, such as an email address, used by a targeted person, but also
               communications that simply contain reference to the selector, sometimes in the body of the
               communication. These are termed “about” communications, because they are not to or
               from, but rather “about” the communication selectors of targeted persons. In addition, for
               technical reasons, “about” collection is needed even to acquire some communications that
               actually are to or from a target. Other types of “about” collection can result in the
               acquisition of communications between two non-targets, thereby implicating greater
               privacy concerns. Moreover, the permissible scope of targeting in the Section 702 program
               is broad enough that targets need not themselves be suspected terrorists or other bad
               actors. Thus, if the email address of a target appears in the body of a communication
               between two non-targets, it does not necessarily mean that either of the communicants is
               in touch with a suspected terrorist.

               While “about” collection is valued by the government for its unique intelligence benefits, it
               is, to a large degree, an inevitable byproduct of the way the NSA conducts much of its
               upstream collection. At least some forms of “about” collection present novel and difficult
               issues regarding the balance between privacy and national security. But current
               technological limits make any debate about the proper balance somewhat academic,
               because it is largely unfeasible to limit “about” collection without also eliminating a
               substantial portion of upstream’s “to/from” collection, which would more drastically
               hinder the government’s counterterrorism efforts. We therefore recommend that the NSA
               work to develop technology that would enable it to identify and distinguish among the
               types of “about” collection at the acquisition stage, and then selectively limit or modify its
               “about” collection, as may later be deemed appropriate.











                                                             22
   17   18   19   20   21   22   23   24   25   26