The NSA’s phone-call database: A defense of mass surveillance.

The NSA’s Phone Database Makes Sense. But It Needs Transparent Safeguards.

The NSA’s Phone Database Makes Sense. But It Needs Transparent Safeguards.

Innovation, the Internet, gadgets, and more.
June 10 2013 6:33 PM

The Case for Mass Surveillance

The NSA’s database of phone calls makes sense. But it needs clear safeguards to prevent abuse.

Director of National Intelligence James Clapper testifies before a Senate Intelligence Committee hearing on "Current and Projected National Security Threats to the United States" on Capitol Hill in Washington March 12, 2013.
James Clapper, director of national intelligence, testifying before the Senate Intelligence Committee, March 12, 2013.

Photo by Kevin Lamarque/Reuters

You can also listen to William Saletan read this piece.

William Saletan William Saletan

Will Saletan writes about politics, science, technology, and other stuff for Slate. He’s the author of Bearing Right.

What’s wrong with the National Security Agency’s phone surveillance program? The answer, according to civil libertarians, is its scope. Edward Snowden, the ex-NSA contractor who exposed the program, calls it “omniscient, automatic, mass surveillance.” Glenn Greenwald, the Guardian reporter who broke the story, accuses the U.S. government of  “collecting the phone records of all Americans, regardless of any suspicion of wrongdoing … monitoring them, keeping dossiers on them.” Sen. Rand Paul, R-Ky., says the feds are “trolling through billions of phone records.”

It sounds as though NSA goblins have been studying everyone’s phone calls. But that isn’t how the program works. It’s a two-stage process. The first stage—collection—is massive and indiscriminate. The second stage—examination of particular records—is restricted. We can argue over whether this two-tiered policy is too intrusive. But either way, our debate about it has focused on the wrong stage. The problem isn’t the data collection. It’s how the data are used.


The first document published by the Guardian, an order from the Foreign Intelligence Surveillance Court, instructs Verizon to “produce” to the NSA electronic copies of “all call detail records” related to phone calls within, to, or from the United States. Although the order pertains only to the date, length, and phone numbers involved in each call—not to what was said—it’s still a colossal demand. But what happens to the data once the NSA gets it? James Clapper, the director of national intelligence, gives this account:

“The collection is broad in scope because more narrow collection would limit our ability to screen for and identify terrorism-related communications. Acquiring this information allows us to make connections related to terrorist activities over time. … By order of the FISC, the Government is prohibited from indiscriminately sifting through the telephony metadata acquired under the program. … The court only allows the data to be queried when there is a reasonable suspicion, based on specific facts, that the particular basis for the query is associated with a foreign terrorist organization. … Only a very small fraction of the records are ever reviewed because the vast majority of the data is not responsive to any terrorism-related query.”

In other words, the rules that most of us would apply at the collection stage—reasonable suspicion, specific facts, court approval—are applied instead at the query stage. Michael Hayden, the former head of the NSA, CIA, and national intelligence office under President Bush (no, he didn’t hold all three of those jobs at once), describes how the program operates. “The government acquires records … from the telecom providers, but then doesn't go into that database without an arguable reason connected to terrorism to ask that database a question,” Hayden explained on Fox News Sunday. For instance, “You roll up something in Waziristan. You get a cell phone. It's the first time you've ever had that cell phone number. You know it's related to terrorism because of the pocket litter you've gotten in that operation. Here's how it works: You simply ask that database, ‘Hey, any of you phone numbers in there ever talked to this phone number in Waziristan?’ ”

Note the indefinite past tense. The analyst asks whether any of the numbers in the database has ever talked to the number in Waziristan. That’s why the database is colossal: Its aspiration is to capture and preserve records of every call so that no potential lead is missed. Big Brother isn’t watching you. But he does want your records in the database so that if any number you called later surfaces in a plot, he can look back through history, spot the connection, and check you out.

The magnitude of this project—a permanent, comprehensive library of which phones called which other phones, when, and for how long—means that no record is deleted. Chris Wallace asked Hayden, “What do you do with all the records, the billions of records that you have on all of us law-abiding citizens?” Hayden replied: “Nothing. … You get the cell phone with that [Waziristan] number six months from now. You want to know the history of that number. … So you do retain the information so that you can ask questions of it in the future.”