The National Security Agency has been compiling a database of everyone’s phone records. But don’t worry. According to the Obama administration, it’s just “metadata.” “The information acquired does not include the content of any communications,” says White House spokesman Josh Earnest. Analysts can only search “phone numbers and durations of calls,” says President Obama. “They're not looking at content.” James Clapper, the director of national intelligence, likens it to reading the Dewey Decimal number on the cover of a library book. You’re not seeing what’s inside the book.
In this context, meta means that the thing you’re talking about is really about something else. Metadata is “data that provides information about other data.” When Obama, Clapper, and other officials say they’re just collecting metadata, they’re basically saying it’s empty. It tells you that a call happened, but it doesn’t tell you what was said. It’s referential, derivative, hollow.
Unfortunately, that’s also true of the administration’s statements about the NSA surveillance programs. Many Americans, upset about these programs, are asking how they work and what they reveal. Obama and his aides purport to answer these questions, but their replies are really just meta-answers. They don’t tell us what the programs do or where they stop. All they tell us, vaguely, is how the boundaries—whatever they are—are drawn.
The administration says the programs are governed by a “robust legal regime,” “strict controls,” “strict restrictions,” and “very careful procedures and processes to ensure particularly that the privacy and civil liberties of Americans are protected.” The programs have “a whole range of safeguards,” says Obama. They’re “consistently subject to safeguards,” says Clapper. The NSA’s Internet monitoring program, for instance, follows “legislatively mandated procedures” that “are very precise.” But the law doesn’t specify these safeguards or procedures, and the administration doesn’t explain them. We’re told they’re precise, but we aren’t told precisely what they are.
The procedures Obama and Clapper talk about aren’t procedures for using the data. They’re procedures for approving procedures for using the data. They’re metaprocedures. White House press secretary Jay Carney assures us that “there are procedures for both requirements for judicial consent and review and for congressional review,” as well as executive branch “procedures … for monitoring these programs.” Clapper says his office and the Justice Department give Congress “exhaustive semiannual reports assessing compliance with the targeting and minimization procedures.” The reports may be exhaustive, but the standards are completely unexplained. What exactly are the “targeting and minimization procedures”?
Obama says there’s an “audit process.” That sounds great. What does the audit examine? According to the president, it ascertains whether “all the safeguards are being properly observed.” What are the safeguards? He doesn’t say. Clapper says the administration performs “regular on-site reviews of how Section 702 authorities are being implemented.” Cool. So how are those authorities being implemented? Again, no answer.
Clapper loves to talk about specifics. He says we can trust the phone surveillance program because “the FISA court specifically approved this method of collection as lawful, subject to stringent restrictions.” For instance: “Only specially cleared counterterrorism personnel specifically trained in the court-approved procedures may even access the records.” What are these procedures and restrictions? He can’t tell us. “Orders that are issued by FISA judges are classified,” Earnest explains. “In terms of specific operational details, I just can't get into them.” Instead of specifics, we get vague assurances that the court orders and their implementation are precise.