Surveillance by Algorithm - Academic Paper by Peter Margulies
Surveillance by Algorithm - Academic Paper by Peter Margulies
July 2016
Recommended Citation
Peter Margulies, Surveillance By Algorithm: The NSA, Computerized Intelligence Collection, and Human Rights, 68 Fla. L. Rev. 1045
(2016).
Available at: http://scholarship.law.ufl.edu/flr/vol68/iss4/3
This Article is brought to you for free and open access by UF Law Scholarship Repository. It has been accepted for inclusion in Florida Law Review by
an authorized editor of UF Law Scholarship Repository. For more information, please contact [email protected], [email protected].
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
Peter Margulies*
Abstract
ISIS’s cultivation of social media has reinforced states’ interest in
using automated surveillance. However, automated surveillance using
artificial intelligence (“machine learning”) techniques has also sharpened
privacy concerns that have been acute since Edward Snowden’s
disclosures. This Article examines machine-based surveillance by the
NSA and other intelligence agencies through the prism of international
human rights.
Two camps have clashed on the human rights implications of machine
surveillance abroad. The state-centric camp argues that human rights
agreements like the International Covenant on Civil and Political Rights
(ICCPR) do not apply extraterritorially. Moreover, the state-centric camp
insists, machine surveillance is inherently unintrusive, like a dog seeing
a human step out of the shower. Surveillance critics respond that machine
and human access to data are equivalent invasions of privacy and legal
protections must be equal for individuals within a state’s borders and non-
nationals overseas. In a controversial recent decision, Schrems v. Data
Protection Commissioner, the European Court of Justice appeared to side
with surveillance’s critics.
This Article argues that both the state-centric and critical positions are
flawed. This Article agrees with surveillance critics that the ICCPR
applies extraterritorially. Machine access to data can cause both
ontological harm, stemming from individuals’ loss of spontaneity, and
consequential harm, stemming from errors that machines compound in
databases such as no-fly lists. However, the Schrems decision went too
far by failing to acknowledge that human rights law provides states with
a measure of deference in confronting threats such as ISIS. Deference on
overseas surveillance is particularly appropriate given U.N. Security
Council resolutions urging states to deny terrorists safe havens. But
deference cannot be absolute. To provide appropriate safeguards, this
Article recommends that machine searches abroad be tailored to
compelling state purposes, scientifically validated, and subject to
independent review.
* Professor of Law, Roger Williams University School of Law; B.A., Colgate University,
1978; J.D., Columbia Law School, 1981. I thank Sudha Setty and participants at a workshop at
Western New England University School of Law for comments on a previous draft.
1045
INTRODUCTION ...................................................................................1047
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 2
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
3.
Overseas Machine Surveillance
and Privacy Trade-Offs .........................................1091
4. Deference and Post-Snowden Privacy
Decisions from European Courts ..........................1092
a. Schrems v. Data Protection
Commissioner and the Need
for a More Privacy-Friendly
Transatlantic Data-Sharing
Agreement ......................................................1092
i. Structure in Schrems .............................1094
ii. Schrems and the Interplay
of Substance and Procedure .................1096
b. Zakharov v. Russia: Putin as the
Elephant in the Room.....................................1102
B. Deferential Proportionality and Article 17
of the ICCPR ................................................................1104
C. Applying the Deferential Proportionality
Standard .......................................................................1106
1. The Purpose of Machine Surveillance ..................1106
2. Reliability ..............................................................1107
3. Review...................................................................1110
a. Independence .................................................1110
b. Notice .............................................................1113
c. Recourse .........................................................1114
CONCLUSION .......................................................................................1116
INTRODUCTION
Searching for a needle in a haystack is a metaphor for human futility,
but searching for a fact in a haystack of data is just more code for a
computer.1 Nevertheless, appreciation for the computer’s prowess has not
translated into applause for automated surveillance. Concerned
commentators invoke Jeremy Bentham’s panopticon, in which minders
perpetually keep tabs on inmates.2 Others assert that automated
surveillance designed to detect overseas terrorists such as Islamic State
of Iraq and Syria (ISIS) recruits3 is ineffective, echoing humans’ ill-fated
1. See IAN H. WITTEN ET AL., DATA MINING 21–22 (3d ed. 2011) (discussing private sector
data mining of Internet usage patterns).
2. See, e.g., BRUCE SCHNEIER, DATA AND GOLIATH: THE HIDDEN BATTLES TO COLLECT
YOUR DATA AND CONTROL YOUR WORLD 32 (2015); CHRISTOPHER SLOBOGIN, PRIVACY AT RISK
92–93 (2007).
3. ISIS, also known as ISIL or the Islamic State, is fighting the Assad regime and Western-
backed forces in Syria, gaining control of territory in Iraq, and inspiring recruits to violence
worldwide. See Anne Barnard & Michael R. Gordon, Goals Diverge and Perils Remain as U.S.
and Turkey Take on ISIS, N.Y. TIMES (July 27, 2015), http://www.nytimes.com/2015/07/28/world
/middleeast/us-and-turkey-agree-to-create-isis-free-zone-in-syria.html.
4. See William C. Banks, Programmatic Surveillance and FISA: Of Needles in Haystacks,
88 TEX. L. REV. 1633, 1661 (2010).
5. The term “machine search” refers to a search conducted by a computer or computer
network at human initiative or under human direction. When using a machine search, human
analysts may not review all the data accessed by the machine but may only view a far smaller set
of data outputs. Professor William Banks acknowledges that machine searches of massive troves
of data, sometimes called “data mining,” may be effective as a “preliminary screening method”
in identifying terrorists. See id.; NAT’L RESEARCH COUNCIL OF THE NAT’L ACADS., PROTECTING
INDIVIDUAL PRIVACY IN THE STRUGGLE AGAINST TERRORISTS 4, 77 (2008) (discussing risks and
possible benefits of counterterrorism data mining). Given the difficulty in identifying violent
extremists and the risks posed by false negatives (here, terrorists erroneously classified as
innocents), even a “preliminary” detection method has promise.
6. While this Article touches on the domestic use of machine searches, it leaves extended
discussion of Fourth Amendment issues to others. See, e.g., SLOBOGIN, supra note 2, at 21–47
(providing a comprehensive approach to new technology); Andrew Guthrie Ferguson, Big Data
and Predictive Reasonable Suspicion, 163 U. PA. L. REV. 327, 388–92 (2015) (cataloguing risks
and benefits of new technology and its effect on the Fourth Amendment). In searches abroad,
targeting persons with no ties to the United States, the Fourth Amendment does not apply. See
United States v. Verdugo-Urquidez, 494 U.S. 259, 265, 274–75 (1990).
7. International Covenant on Civil and Political Rights, Dec. 19, 1966, 999 U.N.T.S. 171,
177 [hereinafter ICCPR].
8. See U.S. DEP’T OF STATE, SECOND AND THIRD PERIODIC REPORT OF THE UNITED STATES
OF AMERICA TO THE UN COMMITTEE ON HUMAN RIGHTS CONCERNING THE INTERNATIONAL
COVENANT ON CIVIL AND POLITICAL RIGHTS, ANNEX I (2005) [hereinafter STATE DEP’T PERIODIC
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 4
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
REPORTS]; see also Ashley Deeks, An International Legal Framework for Surveillance, 55 VA. J.
INT’L L. 291, 307 (2015) (observing that the “United States has long interpreted the ICCPR not to
apply extraterritorially”); Peter Margulies, The NSA in Global Perspective: Surveillance, Human
Rights, and International Counterterrorism, 82 FORDHAM L. REV. 2137, 2143 (2014).
9. See, e.g., Richard A. Posner, Privacy, Surveillance, and Law, 75 U. CHI. L. REV. 245,
254 (2008) (arguing that machine searches do not intrude on privacy because computers are not
“sentient beings”). For a more nuanced critique of privacy advocates’ assumptions, see William
H. Simon, Rethinking Privacy, BOS. REV. (Oct. 20, 2014), http://bostonreview.net/books-
ideas/william-simon-rethinking-privacy-surveillance (asserting that privacy advocates derive
their views from an illusory baseline in which individuals form their identities uninfluenced by
the views of others).
10. See SCHNEIER, supra note 2, at 130 (arguing that surveillance conducted via computer
algorithms is materially identical to human surveillance in terms of intrusiveness).
11. In other words, the U.S. and other states will generally do whatever they are
technologically capable of doing. See Ryan Devereaux et al., Data Pirates of the Caribbean: The
NSA Is Recording Every Cell Phone Call in the Bahamas, INTERCEPT (May 19, 2014, 12:37 PM),
https://firstlook.org/theintercept/2014/05/19/data-pirates-caribbean-nsa-recording-every-cell-
phone-call-bahamas/ (quoting Michael German, former American Civil Liberties Union counsel
and former FBI agent, as observing that intelligence officials “have this mentality—if we can, we
will”); cf. Axel Arnbak & Sharon Goldberg, Loopholes for Circumventing the Constitution:
Unrestrained Bulk Surveillance on Americans by Collecting Network Traffic Abroad, 21 MICH.
TELECOMM. & TECH. L. REV. 317, 319–22 (2015) (arguing that surveillance conducted by National
Security Agency (NSA) is driven by technological capabilities and unconstrained by provisions
of relevant law).
12. E.g., David Cole, We Are All Foreigners: NSA Spying and the Rights of Others, JUST
SECURITY (Oct. 29, 2013, 12:48 PM), https://www.justsecurity.org/2668/foreigners-nsa-spying-
rights/ (critiquing U.S. surveillance policy overseas as inconsistent with human rights); see also
Ben Emmerson (Special Rapporteur on the Promotion and Protection of Human Rights and
Fundamental Freedoms While Countering Terrorism), Promotion and Protection of Human
Rights and Fundamental Freedoms While Countering Terrorism, ¶ 43, U.N. Doc. A/69/397 (Sept.
23, 2014) (asserting that states are “legally bound to afford the same protection to nationals and
non-nationals, and to those within and outside their jurisdiction”); Jennifer Granick, Foreigners
and the Review Group Report: Part 2, JUST SECURITY (Dec. 19, 2013, 12:47 PM),
https://www.justsecurity.org/4838/foreigners-review-group-report-part-2/ (welcoming a Review
Group’s recommendation to limit U.S. surveillance of non-U.S. persons). A U.S. person within
the meaning of this Article refers to a U.S. citizen or lawful resident, or an individual of any
nationality or immigration status who is physically present in the United States.
13. See, e.g., SLOBOGIN, supra note 2, at 195 (explaining that machine searches
accompanied by restrictions on analysts’ queries of the resulting database could preserve
anonymity and therefore reduce intrusions on privacy).
14. Surveillance critics use this assertion for descriptive purposes; as a normative matter,
they argue vigorously that the government should not collect everything it can collect. See, e.g.,
SCHNEIER, supra note 2, at 92–98 (addressing privacy rights and abuse of government
surveillances).
15. See, e.g., id. at 97–98.
16. However, privacy advocates are right to assert that the temptations posed by the
technological imperative require further privacy safeguards, including independent review of
intelligence collection and a public advocate at the United States’ Foreign Intelligence
Surveillance Court (the FISC) who will provide a voice opposing the government’s surveillance
requests. See Marty Lederman & Steve Vladeck, The Constitutionality of a FISA “Special
Advocate,” JUST SECURITY (Nov. 4, 2013, 1:34 PM), https://www.justsecurity.org/2873/fisa-
special-advocate-constitution/ (discussing the Privacy and Civil Liberties Oversight Board’s
“special advocate” proposal).
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 6
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
17. Cf. STUART J. RUSSELL & PETER NORVIG, ARTIFICIAL INTELLIGENCE 694–95 (3d ed.
2010) (describing the three types of feedback that determine learning: unsupervised learning,
reinforcement learning, and supervised learning).
18. See WITTEN ET AL., supra note 1, at 467, 469.
19. E.g., SCHNEIER, supra note 2, at 136–39.
20. 2006-XI Eur. Ct. H.R.
21. See id. at paras. 87–88; Sarah St. Vincent, International Law and Secret Surveillance:
Binding Restrictions upon State Monitoring of Telephone and Internet Activity, CTR. FOR
DEMOCRACY & TECH. (Sept. 4, 2014), https://cdt.org/files/2014/09/CDT-IL-surveillance.pdf. The
ECHR’s deferential approach suggests that European and U.S. legal analysis of the intersection
of privacy and national security may not be all that different, despite differences in rhetoric; cf.
Francesca Bignami, European Versus American Liberty: A Comparative Privacy Analysis of
Antiterrorism Data Mining, 48 B.C. L. REV. 609, 632–33 (2007) (noting parallels in European
and U.S. conceptions); James Q. Whitman, The Two Western Cultures of Privacy: Dignity Versus
Liberty, 113 YALE L.J. 1151, 1161 (2004) (arguing that the United States protects privacy to
safeguard liberty, while Europeans view privacy as central to dignity, which they define as sparing
the individual from unwelcome public attention).
22. S.C. Res. 2178, paras. 2–4 (Sept. 24, 2014).
23. S.C. Res. 1373, paras. 1–3 (Sept. 28, 2001).
24. See David E. Pozen, Privacy-Privacy Tradeoffs, 83 U. CHI. L. REV. 221, 229 & n.38
(2016).
25. Michael N. Schmitt, Unmanned Combat Aircraft Systems and International
Humanitarian Law: Simplifying the Oft Benighted Debate, 30 B.U. INT’L L.J. 595, 595–98 (2012)
(analyzing surveillance and reconnaissance in the context of using drones for targeted killing
during an armed conflict).
26. Handyside v. United Kingdom, 24 Eur. Ct. H.R. (ser. A), paras. 47, 66 (1976)
(regulating public dissemination of information about human sexuality to protect children). The
ECHR’s use of the margin of appreciation in cases involving free expression provides an a fortiori
case for the margin’s materiality in adjudicating surveillance.
27. These include the limits that President Barack Obama outlined in Presidential Policy
Directive No. 28 (PPD-28), which restricted bulk collection of content abroad to specific
purposes, such as countering terrorism, espionage, arms proliferation, cybercrime or other
international lawbreaking, or evasion of lawful sanctions. See Press Release, Office of the Press
Sec’y, Presidential Policy Directive – Signals Intelligence Activities (Jan. 12, 2015),
https://www.whitehouse.gov/the-press-office/2014/01/17/presidential-policy-directive-signals-inte
lligence-activities [hereinafter PPD-28]. The U.S. government distinguishes between bulk and
targeted collection. Id. Bulk collection obtains virtually all communications content or other data
for subsequent analysis, while targeted collection obtains only data that corresponds to certain
specific identifiers. See PPD-28 Section 4 Procedures, USSID SP0018: Supplemental Procedures
for the Collection, Processing, Retention, and Dissemination of Signals Intelligence Information
and Data Containing Personal Information of Non-United States Persons, at 7 n.1–2 (Jan. 12,
2015) [hereinafter PPD-28 Supplemental Procedures].
28. See Devereaux et al., supra note 11.
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 8
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
29. See, e.g., Zakharov v. Russia, Eur. Ct. H.R., para. 147 (2015); Kennedy v. United
Kingdom, Eur. Ct. H.R., paras. 79–80 (2010).
30. Case C-362/14, Schrems v. Data Prot. Comm’r, 2015 E.C.R.
31. Joined Cases C-293/12 & C-594/12, Digital Rights Ireland Ltd. v. Comm’r, 2014 E.C.R.
32. See Banks, supra note 4, at 1661; Deeks, supra note 8, at 358.
33. See Foreign Intelligence Surveillance Court, FED. JUD. CTR., http://www.fjc.gov/
history/home.nsf/page/courts_special_fisc.html (last visited Mar. 18, 2016).
34. Exec. Order No. 12,333, 46 Fed. Reg. 59,941–42 (Dec. 4, 1981).
35. 50 U.S.C. § 1803(i) (2012); see also Stephen I. Vladeck, The FISA Court and Article
III, 72 WASH. & LEE L. REV. 1161, 1179 (2015) (suggesting that “special advocate” in FISC
proceedings who would oppose government requests in a wider range of cases would ameliorate
concerns that the provisions for FISC review of surveillance procedures under § 702 violate
Article III of the U.S. Constitution, which governs the role of federal courts).
36. See European Comm’n, Commission Implementing Decision Pursuant to Directive
95/46/EC of the European Parliament and of the Council on the Adequacy of the Protection
Provided by the EU–U.S. Privacy Shield 26 (Feb. 2016) [hereinafter EC Adequacy Decision].
37. See Jorge Garcia, Machine Learning and Cognitive Systems: The Next Evolution of
Enterprise Intelligence (Part I), WIRED, http://www.wired.com/insights/2014/07/machine-
learning-cognitive-systems-next-evolution-enterprise-intelligence-part/ (last visited Mar. 18,
2016).
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 10
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
explanation of the machine’s reasoning path. This raises a legal issue that
this Article addresses in subsequent Parts: ranking transparency and
accuracy, when enhancing one value will sacrifice the other.38
A. Scanning Versus Collection
If one analogizes machine access to living arrangements, scanning is
like a quick visit, while collection resembles a lengthy stay. Scanning
intrudes on privacy in passing, while collection contemplates the storage
of data by the collecting entity. The differences between scanning and
collection matter less in the private sector, where scanning of internet
users’ data is ubiquitous and recurring. Those differences have higher
stakes for the government’s machine access.
1. Scanning in Government and the Private Sector
Scanning involves the recurring inspection, usually by machine, of
information from individuals, but it does not entail the storage of all the
information by the scanning party. A private firm or government agency,
respectively, can scan a user’s email, as Google does with Gmail, or gain
access to interchange points in the transmission of internet
communications, as the U.S. government does pursuant to statute.39 For
example, in scanning pursuant to Section 702 of the Foreign Intelligence
Surveillance Act (FISA) Amendments Act,40 the NSA’s machines gain
access through a buffer, cache, or other device that temporarily stores
transnational communications in the course of transmitting them to their
destination. Scanning is by definition a process that allows machines to
gain access to a huge volume of communications, the vast majority of
which are substantively irrelevant. In the process of scanning, the
machine selects material that is relevant and designates that material for
collection and subsequent analysis.
In the commercial internet space, scanning is not a part of the business
model; it is the business model.41 Google’s computers use algorithms
devised by Google’s own engineers or searches crafted by the firm’s
computers to scan users’ web-browsing histories and the contents of
individuals’ emails.42 Private firms engage in such scanning for two key
reasons. First, firms refine their knowledge of users’ aggregate browsing
practices, which Google then uses to make its searches and search
rankings more precise.43 Second, Google and other firms gather
information about particular users, which firms use to tailor web-based
advertising to that user’s habits and interests.44
The U.S. government uses scanning internationally but not
domestically. Both the Constitution and various statutes preclude the
government from scanning the content of purely domestic
communications—communications between two individuals located
within the United States.45 However, under FISA, the U.S. government
scans devices such as buffers and caches used in international
communications—communications between a person in the United
States and a person that government officials reasonably believe to be
located overseas.46 Under Section 702 of the FISA Amendments Act of
42. See Samuel Gibbs, Gmail Does Scan All Emails, New Google Terms Clarify, GUARDIAN
(Apr. 15, 2014, 8:24 AM), http://www.theguardian.com/technology/2014/apr/15/gmail-scans-all-
emails-new-google-terms-clarif; Steven Levy, Exclusive: How Google’s Algorithm Rules the
Web, WIRED (Feb. 22, 2010, 12:00 PM), http://www.wired.com/2010/02/ff_google_algorithm/.
Private sector scanning is premised on either express or implicit consent by internet users. See In
re Yahoo Mail Litig., 308 F.R.D. 577, 584–85 (N.D. Cal. 2015); cf. BENJAMIN WITTES &
GABRIELA BLUM, THE FUTURE OF VIOLENCE 135 (2015) (arguing that users’ web data “tends to be
material we have disclosed to others, often in exchange for some benefit and often with the
understanding . . . that it will be aggregated and mined for what it might say about us”).
43. See Levy, supra note 42.
44. See Gibbs, supra note 42.
45. See Riley v. California, 134 S. Ct. 2473, 2490, 2494–95 (2014) (in holding that a digital
search of a suspect’s cell phone is not a search incident to arrest and therefore requires a warrant,
the Court described the cell phone as a “cache of sensitive personal information”); cf. Orin S.
Kerr, The Fourth Amendment and the Global Internet, 67 STAN. L. REV. 285, 291–92 (2015)
(discussing case law on the effect of borders on Fourth Amendment rights). But see Jennifer
Daskal, The Un-territoriality of Data, 125 YALE L.J. 326, 364–66 (2015) (arguing that national
borders are an artificial and outmoded basis for determining Fourth Amendment limits on data
searches). Government scanning of domestic communications content for data mining on
terrorism would be problematic on legal, ethical, and policy grounds. Cf. James X. Dempsey &
Lara M. Flint, Commercial Data and National Security, 72 GEO. WASH. L. REV. 1459, 1466–67
(2004) (warning of the adverse privacy consequences of government data mining of domestic
records for pattern-based searches).
46. PPD-28 Supplemental Procedures, supra note 27, at 7 n.2 (permitting temporary
acquisition of data “to facilitate targeted collection, such as search and development
activities . . . or the processing of a signal that is necessary to select specific communications for
forwarding for intelligence analysis”). Some have argued that intelligence agency access to
international data outside the purview of bilateral Mutual Legal Assistance Treaties (MLATs) is
problematic. This Article focuses on human rights issues, and the role of MLATs is beyond its
scope. It is worth noting that the ECHR has held that transnational surveillance of another
country’s nationals does not violate the sovereignty of that country because no physical intrusion
occurs. See Weber v. Germany, 2006-XI Eur. Ct. H.R. para. 81; Joris V.J. van Hoboken & Ira S.
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 12
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
Rubinstein, Privacy and Security in the Cloud: Some Realism About Technical Solutions to
Transnational Surveillance in the Post-Snowden Era, 66 ME. L. REV. 487, 490 (2014). A
country’s consent to another state’s surveillance would address concerns about sovereignty but
would not trump human rights. See Weber, 2006-XI Eur. Ct. H.R. at para. 25.
47. See 50 U.S.C. § 1881a(a) (2012); see also David R. Shedd, Paul Rosenzweig & Charles
D. Stimson, Maintaining America’s Ability to Collect Foreign Intelligence: The Section 702
Program, HERITAGE FOUND. (May 13, 2016), http://www.heritage.org/research/reports/2016/
05/maintaining-americas-ability-to-collect-foreign-intelligence-the-section-702-program (noting
§ 702’s effectiveness at producing foreign intelligence); Chris Inglis & Jeff Kosseff, In Defense
of FAA Section 702: An Examination of Its Justification, Operational Employment, and Legal
Underpinnings (Hoover Inst. Series Paper No. 1604, 2016), https://www.lawfareblog.com/defense-
faa-section-702-examination-its-justification-operational-employment-and-legal-underpinnings
(same).
48. See 50 U.S.C. § 1881a(b).
49. See PRIVACY AND CIVIL LIBERTIES OVERSIGHT BD., REPORT ON THE SURVEILLANCE
PROGRAM OPERATED PURSUANT TO SECTION 702 OF THE FOREIGN INTELLIGENCE SURVEILLANCE
ACT 32–33 (2014), https://www.pclob.gov/library/702-Report.pdf; cf. PPD-28 Supplemental
Procedures, supra note 27, para. 3.4, at 6 (noting that United States can collect “foreign private
commercial information or trade secrets” for limited purposes, such as detecting violations of fair
trade laws or sanctions, but not to supply U.S. firms with a competitive advantage).
50. 50 U.S.C. § 1881a(g)–(i) (noting that the Attorney General and the Director of National
Intelligence must file certifications under Section 702 with FISC for review). Professor Daphna
Renan has helpfully analogized the FISC’s role to that of an administrative agency setting
parameters for a regulated industry. See Daphna Renan, The Fourth Amendment as Administrative
Governance, 68 STAN. L. REV. 1039, 1103–08 (2016); cf. Zachary K. Goldman, The Emergence
of Intelligence Governance, in GLOBAL INTELLIGENCE OVERSIGHT: GOVERNING SECURITY IN THE
TWENTY-FIRST CENTURY 207, 230–32 (Zachary K. Goldman & Samuel J. Rascoff eds. 2016)
(discussing role of courts in framing incentives for executive action and forcing greater
transparency); Samuel J. Rascoff, Presidential Intelligence, 129 HARV. L. REV. 633 (2016)
(discussing role of the President in coordinating principled and collaborative approach to
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 14
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
The United States has used bulk collection in two principal contexts.
First, before the USA Freedom Act became fully effective, the
government, with authorization from the FISC, collected most domestic
land-line call records (metadata, as opposed to content) detailing both
phone numbers called by persons in the United States and the duration of
the calls.54 After government officials brought overreaching to the
attention of the FISC in 2009, intelligence analysts restricted queries to
specific identifiers, such as phone numbers, that triggered a reasonable
and articulable suspicion (RAS) of links to terrorism.55
Second, even more importantly for this Article’s present discussion,
Executive Order 12,333 (EO 12,333), enacted during the Reagan
Administration, empowers the President, acting pursuant to a presidential
finding, to order surveillance abroad.56 While the Executive Branch has
54. Peter Margulies, Dynamic Surveillance: Evolving Procedures in Metadata and Foreign
Content Collection After Snowden, 66 HASTINGS L.J. 1, 13 (2014); see also Kris, supra note 51,
at 235 (noting the government’s argument that “the telephony metadata must be available in bulk
to allow NSA to identify the records of terrorist communications because without access to the
larger haystack of data, it cannot find the needles using the much narrower querying process”).
Relying on the third-party doctrine, the Supreme Court has held that government access to
metadata, as opposed to content, does not pose a Fourth Amendment problem. See Smith v.
Maryland, 442 U.S. 735, 744 (1979). That doctrine holds that individuals who voluntarily make
information available to third parties, such as phone companies that need metadata to complete
calls, have no reasonable expectation of privacy in such data. Id. at 743–44. But see SLOBOGIN,
supra note 2, at 156–58 (criticizing the third-party doctrine); Jonathan Mayer, Patrick Mutchler
& John C. Mitchell, Evaluating the privacy properties of telephone metadata, 113(20)
PROCEEDINGS NAT’L ACAD. SCI. 5536 (May 17, 2016) (using digital research and probabilistic
analysis to demonstrate that collection of metadata can have serious privacy consequences); cf.
Robert S. Litt, The Fourth Amendment in the Digital Age, 126 YALE L.J. F. 8, 13–16 (2016)
(suggesting that courts should replace both third-party doctrine and “reasonable expectation of
privacy” test articulated in Katz v. United States, 389 U.S. 347 (1967), with inquiry focusing on
how government handles data and the data’s intended use).
55. Margulies, supra note 54, at 45–46; cf. LAURA K. DONOHUE, THE FUTURE OF FOREIGN
INTELLIGENCE: PRIVACY AND SURVEILLANCE IN A DIGITAL AGE 104–05 (2016) (criticizing the
program’s intrusiveness); Laura K. Donohue, Bulk Metadata Collection: Statutory and
Constitutional Considerations, 37 HARV. J.L. & PUB. POL’Y 757, 897–900 (2014) (criticizing the
statutory and constitutional predicate for the program); Christopher Slobogin, Panvasive
Surveillance, Political Process Theory, and the Nondelegation Doctrine, 102 GEO. L.J. 1721,
1757–58 (2014) (suggesting that Congress’s authorization for the program may have been
adequate under the applicable statute but arguing that courts should revive delegation theory to
curb executive discretion over the program’s nature and scope).
56. Exec. Order No. 12,333, 46 Fed. Reg. 59,941–43 (Dec. 4, 1981). EO 12,333 mirrors
provisions of the National Security Act that authorize covert action abroad based on a presidential
finding. See 50 U.S.C. § 3093 (2012); Steven G. Bradbury, The Developing Legal Framework for
Defensive and Offensive Cyber Operations, 2 HARV. NAT’L SECURITY J. 629, 640–41 (2011); cf.
Amos Toh, Faiza Patel & Elizabeth Goitein, Overseas Surveillance in an Interconnected World,
BRENNAN CTR. FOR JUSTICE (Mar. 16, 2016), https://www.brennancenter.org/publication/overseas-
surveillance-interconnected-world (expressing concern about intrusiveness of collection under EO
12,333). See generally Robert Chesney, Military-Intelligence Convergence and the Law of the
Title 10/Title 50 Debate, 5 J. NAT’L SECURITY L. & POL’Y 539, 543 (2012) (providing background
on the statutory authority for covert action).
57. See PPD-28, supra note 27, at sec. 2.
58. See PPD-28 Supplemental Procedures, supra note 27, at 7 n.1 (defining bulk collection
as the collection of “large quantities of SIGINT [signals intelligence] data that, because of
technical or operational considerations, is acquired without the use . . . of specific identifiers or
selection terms”).
59. Id.
60. See Stephanie K. Pell & Christopher Soghoian, Your Secret StingRay’s No Secret
Anymore: The Vanishing Government Monopoly over Cell Phone Surveillance and Its Impact on
National Security and Consumer Privacy, 28 HARV. J.L. & TECH. 1, 14–15, 34, 55–56 (2014)
(describing StingRay as a portable device that gathers mobile phone signals within a relatively
narrow area).
61. See Jacob Kastrenakes, The NSA Is Capturing Nearly Every Phone Call in Afghanistan,
WikiLeaks Claims, VERGE (May 23, 2014, 9:41 AM), http://www.theverge.com/2014/5/23/57446
16/nsa-capturing-nearly-all-afghanistan-phone-calls; Devereaux et al., supra note 11.
62. See PPD-28 Supplemental Procedures, supra note 27, at 5–6.
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 16
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
70. See Gregory L. Fordham, Using Keyword Search Terms in E-Discovery and How They
Relate to Issues of Responsiveness, Privilege, Evidence Standards and Rube Goldberg, RICH. J.L.
& TECH., Spring 2009, para. 10.
71. See Fordham, supra note 70, at para. 10; Nat’l Day Laborer Org. Network, 877 F.
Supp. 2d at 110.
72. Fourth Amendment cases on protocols for digital searches of laptops pursuant to
lawfully obtained warrants are instructive on the deception that criminals use to hide their
handiwork. See, e.g., United States v. Stabile, 633 F.3d 219, 238–39 (3d Cir. 2011) (suggesting
that law enforcement officials conducting digital searches pursuant to warrants need broad latitude
to address deceptive tactics used by criminals in labeling and storing files); United States v. Mann,
592 F.3d 779, 782 (7th Cir. 2010) (observing that “[u]nlike a physical object that can be
immediately identified as responsive to the warrant or not, computer files may be manipulated to
hide their true contents”); United States v. Hill, 459 F.3d 966, 978 (9th Cir. 2006) (declining to
take a rigid approach to search protocols used to investigate a laptop covered by a warrant,
pertaining to deceptive labeling of computer files); Wolf v. State, 266 P.3d 1169, 1173–75 (Idaho
Ct. App. 2011) (allowing an officer broad discretion to search a computer based on an affidavit
describing that officer’s prior experience in child pornography investigations); cf. United States
v. Schesso, 730 F.3d 1040, 1050 (9th Cir. 2013) (cautioning that judicial inclusion of detailed
search protocols in warrants authorizing laptop searches may unduly constrain law enforcement
efforts to unravel criminals’ deceptive data practices); Nathan Alexander Sales, Run for the
Border: Laptop Searches and the Fourth Amendment, 43 U. RICH. L. REV. 1091, 1123 (2009)
(discussing the advantages of narrowly focused search protocols in laptop searches at U.S. border
entry points). But see In re Appeal of Application for Search Warrant, 71 A.3d 1158, 1182 & n.23
(Vt. 2012) (barring “sophisticated search techniques” beyond keyword searching absent specific
evidence that the suspect had tried to hide laptop files); Orin S. Kerr, Ex Ante Regulation of
Computer Search and Seizure, 96 VA. L. REV. 1241, 1255–58 (2010) (arguing that “[t]he search
protocol must forbid the use of tools that would discover illegality relating to evidence outside
the scope of the warrant”); see also United States v. Comprehensive Drug Testing, Inc., 621 F.3d
1162, 1179–80 (9th Cir. 2010) (en banc) (Kozinski, J., concurring) (recommending that judges
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 18
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 20
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
from each neuron to others, as does a long fiber called the axon.99 The
interchange between neurons is called a synapse.100 As in the human
brain, neurons in an artificial network are interconnected but distinct,
enabling the neurons to break down complex problems into more
manageable component parts.101
In the human brain, all neurons fire at the same time—all neurons in
the human brain simultaneously send signals.102 Some signals might
transmit visual or auditory cues, while others may transmit bits of context
and memory.103 This simultaneous firing allows the human brain to
readily perform certain tasks, such as distinguishing between two small,
red, round, and organic objects, one of which is an apple and the other a
tomato. In contrast, even complex software that seeks to mimic the
human brain will generally not allow all artificial neurons in a network to
fire at once. For that reason, using neural networks for visual pattern
recognition is a sophisticated task, albeit one which has seen remarkable
progress.
i. Training Neural Networks
Neural networks use inductive learning algorithms that allow a
machine to draw inferences based on massive amounts of data.104 One
builds a neural network by deciding how many nodes or units are required
for a task, how to connect those nodes, and how to initialize the synaptic
“weights” that comprise a neural network’s primary means of long-term
storage.105 As with any form of machine learning, neural networks are
first trained with examples that the network digests with the aid of a
learning algorithm.106 Certain types of neural networks can then generate
outputs that find patterns between a new stimulus and data in the training
set.107 For example, suppose the training set for the neural network
consists of photos of suspected terrorists. Suppose further that the
network receives a new stimulus in the form of a small piece of one photo
from the training set. The network will readily reproduce the entire photo,
including that small piece.108
99. Id.
100. See id.
101. WITTEN ET AL., supra note 1, at 232–33.
102. Neurons and Their Jobs, NAT’L INST. ON AGING, https://www.nia.nih.gov/alzheimers/
publication/part-1-basics-healthy-brain/neurons-and-their-jobs (last updated Jan. 22, 2015).
103. Id.
104. See Aikenhead, supra note 96, at 34.
105. See WITTEN ET AL., supra note 1, at 235; Aikenhead, supra note 96, at 35.
106. See Aikenhead, supra note 96, at 35.
107. See id. at 35–36, 36 n.11.
108. See, e.g., Human Face Recognition Found in Neural Networks Based on Monkey
Brains, MIT TECH. REV. (Feb. 13, 2015), http://www.technologyreview.com/view/535176/
human-face-recognition-found-in-neural-network-based-on-monkey-brains/ (explaining how
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 22
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
scientists have created a neural network based on a monkey’s brain that is able to recognize faces
and then match the face to an identity).
109. Zhou et al., supra note 78, at 149–50.
110. See RUSSELL & NORVIG, supra note 17, at 729. Hidden layers are also a feature of
another machine learning technique, support vector machines (SVMs). See WITTEN, ET AL., supra
note 1, at 191–92. One virtue of SVMs is that they deal effectively with data that has many
variables, and therefore many “dimensions” that an SVM can plot in space, using hyperplanes
that cleanly separate disparate groups. Id. at 223–25. Linear modes of data analysis such as graphs
can only plot two variables at a time, including the intersection of mass and acceleration to
compute force or age and education to help predict an individual’s likelihood of voting. Id. In
contrast, the hyperplanes derived by SVMs can separate groups along twenty or more variables.
Id. Using hidden layers, SVMs discern relationships between variables that humans would miss.
To illustrate how an SVM could aid in counterterrorism, consider the identification of ISIS
recruits through the relationship of a large number of variables, each of which alone might be
useless. For example, ISIS recruits might cite particular commentaries or interpretations of sacred
texts as authorizing violence. In addition, ISIS recruits might refer to such religious commentaries
or to operational and logistical details using code. A directed search would find only codes already
known to government officials. In contrast, a SVM could also find uses of language that were
analogous to known codes in syntax, frequency of word choice, and similar factors. The SVM
might detect new codes by grouping the incidence of certain word choices with other individual
behaviors, such as frequent visiting of chat rooms advocating violent extremism, use of specific
kinds of encryption, or patronage of stores selling burner phones. In this fashion, ISIS recruits that
would escape detection by humans, directed searches, or other autonomous searches would “pop”
in SVM outputs.
111. See, e.g., Human Face Recognition Found in Neural Network Based on Monkey Brains,
supra note 108. Use of facial recognition technology in either the domestic or transnational
context requires safeguards; for example, no state should use such technology to identify or target
political opponents. See Laura K. Donohue, Technological Leap, Statutory Gap, and
Constitutional Abyss: Remote Biometric Identification Comes of Age, 97 MINN. L. REV. 407, 545–
48 (2012).
112. See, e.g., Human Face Recognition Found in Neural Network Based on Monkey Brains,
supra note 108.
113. Id.
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 24
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
120. See Dave Gershgorn, These Are What the Google Artificial Intelligence’s Dreams Look
Like, POPULAR SCIENCE (June 19, 2015), http://www.popsci.com/these-are-what-google-
artificial-intelligences-dreams-look (explaining Google’s approach to teaching an artificial
neutral network what a fork is).
121. See Zhou et al., supra note 78, at 150–51; Michael L. Rich, Machine Learning,
Automated Suspicion Algorithms, and the Fourth Amendment, 164 U. PA. L. REV. 871, 906 (2016).
122. See Zhou et al., supra note 78, at 150–51 (explaining that because of hidden layers’ role
in connecting inputs and outputs, which gives neural networks a “highly nonlinear structure,”
there is no definitive way “to easily interpret the relative strength of each input to each output in
the network”). This confluence of accuracy and difficulty in substantive explanation is not
confined to machines. It extends to other nonhuman search aids. For example, drug-sniffing dogs
are often extraordinarily accurate in detecting traces of contraband. Humans, whose sense of smell
is laughably crude by comparison, lack any detailed substantive or scientific explanation of the
physiology behind dogs’ uncanny olfactory accuracy. See Rich, supra note 121, at 911–12. A
warrant application or a legal justification of a warrantless search based on a drug-sniffing dog’s
reaction will not try to quantitatively classify a smell as so many parts per million. Instead, the
legal justification will be methodological in nature. The justification will describe the dog’s
reaction, on the theory that the canine reaction alone is sufficient demonstration of the presence
of drugs. A methodological explanation is sufficient based on validated scientific techniques that
using dogs works.
123. See Tal Z. Zarsky, Transparent Predictions, 2013 U. ILL. L. REV. 1503, 1519–20 (noting
that in many cases using only techniques that would permit a substantive, verbal explanation of
the machine’s calculations would reduce the accuracy of the search).
124. See id.
125. See id. at 1520.
126. United States v. U.S. District Court, 407 U.S. 297, 320 (1972).
127. Cf. United States v. Warshak, 631 F.3d 266, 287–88 (6th Cir. 2010) (requiring showing
of probable cause to obtain the contents of emails); United States v. Davis, 785 F.3d 498, 505
(11th Cir. 2015) (en banc) (holding that locational data was available upon individualized
statutory showing, requiring “specific and articulable facts showing reasonable grounds to believe
the records [or other information sought] are relevant and material to an ongoing criminal
investigation,” while noting that this statutory showing was less rigorous than probable cause).
128. See 18 U.S.C. § 2339B (2012); see also Holder v. Humanitarian Law Project, 561 U.S.
1, 8 (2010) (upholding the constitutionality of material support statute against vagueness and First
Amendment challenges); Peter Margulies, Advising Terrorism: Material Support, Safe Harbors,
and Freedom of Speech, 63 HASTINGS L.J. 455, 486–93 (2012) (defending the Humanitarian Law
Project’s decision that upheld limits on active relationships with foreign terrorist groups, based
in part on the difficulty of gaining information about such groups’ activities abroad).
129. Let us suppose that either the machine or a human analyst assessing search results would
also apply a test for false positives, such as information that a particular individual flagged by the
search was a lawyer, journalist, academic, or human rights researcher.
130. See Illinois v. Gates, 462 U.S. 213, 238–39 (1983) (holding that probable cause is a fair
probability that contraband or evidence of a crime will be found in a particular place).
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 26
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
Keith Alexander arguing that “you need the haystack to find the needle”); see also NAT’L
RESEARCH COUNCIL OF THE NAT’L ACADS., supra note 5, at 13 (noting that a massive amount of
data must be analyzed to distinguish between terrorist activities and legitimate ones, and that
innocent people’s data will be collected, resulting in a privacy issue).
135. NAT’L RESEARCH COUNCIL OF THE NAT’L ACADS., supra note 5, at 196.
136. SCHNEIER, supra note 2, at 137.
137. See Jim Michaels, New U.S. Intelligence Estimate Sees 20-25K ISIL Fighters, USA
TODAY (Feb. 4, 2016, 5:35 PM), http://www.usatoday.com/story/news/world/2016/02/03/isil-
fighters-new-estimate-25000-iraq-syria/79775676/.
138. See Population: Middle East, INDEX MUNDI, http://www.indexmundi.com/map/?
v=21&r=me&l=en (last visited Mar. 25, 2016).
139. SCHNEIER, supra note 2, at 136–38.
140. FLACH, supra note 80, at 6; RUSSELL & NORVIG, supra note 17, at 709, 736; WITTEN ET
AL., supra note 1, at 18–19, 29.
141. Cf. FLACH, supra note 80, at 6 (explaining a phenomenon called overfitting, where a
machine will learn all the characteristics of past information but cannot generalize it to new, future
information).
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 28
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
part of its working hypothesis for predicting terrorist status. That would
make the hypothesis a poor basis for generalizing about the presence of
terrorism in a larger population. Programmers can address overfitting, but
in the absence of enough data, a machine still lacks the ingredients for an
accurate search. For the most ardent critics of surveillance, this problem
is insurmountable.142
While the surveillance critics raise strong points, particularly on the
effect of data on accuracy,143 their arguments are less persuasive than they
might appear. First, machine searches could be very effective at
pinpointing confluences of facts that suggest terrorist plots, such as
contact between an individual that facial recognition technology showed
was taking photographs of New York City landmarks and another
individual buying large quantities of explosives.144 Moreover, the critics
stack the deck when they posit that a machine search must uncover
imminent attacks to be considered effective.145 The critics are right that
imminent attacks are rare, once one leaves sites of armed conflict such as
Afghanistan. However, in a conflict zone, attacks are more frequent. The
United States and other states have a legitimate interest in detecting
planned attacks in conflict zones.146 In addition, the thousands of ISIS
recruits that have traveled or conspired to travel to the Middle East147 are
a more substantial group than the isolated ring of conspirators that
surveillance critics posit. Fortunately, the number of ISIS recruits does
not approach the numbers of Amazon customers or Gmail users that
private firms mine.148 However, the cohort of active ISIS recruits may be
big enough to provide generalizable data. Indeed, ISIS’s reliance on
social media149 may actually make its adherents more like the commercial
internet users that private firms mine for purchasing habits. As
surveillance critics concede, data mining is good at finding mutual tastes
142. See, e.g., SCHNEIER, supra note 2, at 139 (asserting that the problems with data mining
for terrorists “cannot be fixed”).
143. Cf. Margaret Hu, Small Data Surveillance v. Big Data Cybersurveillance, 42 PEPP. L.
REV. 773, 812–16 (2015) (discussing the application of the Daubert test on scientific evidence to
validate machine searching techniques).
144. See PEDRO DOMINGOS, THE MASTER ALGORITHM 232–33 (2015) (noting that machine
searches of contacts and records can uncover patterns of criminal activity, even when specific
data points seems “innocent enough in isolation”).
145. See, e.g., SCHNEIER, supra note 2, at 138.
146. See, e.g., NAT’L RESEARCH COUNCIL OF THE NAT’L ACADS., supra note 5, at 115.
147. Eric Schmitt & Somini Sengupta, Thousands Enter Syria to Join ISIS Despite Global
Efforts, N.Y. TIMES (Sept. 26, 2015), http://www.nytimes.com/2015/09/27/world/middleeast/
thousands-enter-syria-to-join-isis-despite-global-efforts.html?.
148. See Sean Madden, How Companies Like Amazon Use Big Data to Make You Love
Them, FAST COMPANY (May 2, 2012, 8:30 AM), http://www.fastcodesign.com/1669551/how-
companies-like-amazon-use-big-data-to-make-you-love-them; Gibbs, supra note 42.
149. Schmitt & Sengupta, supra note 147.
150. SCHNEIER, supra note 2, at 140 (finding that “political dissidents are likely to share a
well-defined profile”).
151. NAT’L RESEARCH COUNCIL OF THE NAT’L ACADS., supra note 5, at 81.
152. Id. at 235–36.
153. See Margulies, supra note 54, at 15. The metadata program first supplied this lead,
although it might have been available from other sources. See PRIVACY & CIVIL LIBERTIES
OVERSIGHT BD., REPORT ON THE TELEPHONE RECORDS PROGRAM CONDUCTED UNDER SECTION
215 OF THE USA PATRIOT ACT AND ON THE OPERATIONS OF THE FOREIGN
INTELLIGENCE SURVEILLANCE COURT 150 (2014), https://www.pclob.gov/library/215-Report_on
_the_ Telephone_Records_Program.pdf.
154. See id. at 1.
155. Barton Gellman et al., In NSA-Intercepted Data, Those Not Targeted Far Outnumber
the Foreigners Who Are, WASH. POST (July 5, 2014), https://www.washingtonpost.com/world
/national-security/in-nsa-intercepted-data-those-not-targeted-far-outnumber-the-foreigners-who-
are/2014/07/05/8139adf8-045a-11e4-8572-4b1b969b6322_story.html.
156. Id.
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 30
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
157. Id.
158. While the deontological view is an important touchstone in thinking about privacy,
many contemporary legal scholars deal with either direct or more intangible consequences of
privacy intrusions. See, e.g., Julie E. Cohen, What Privacy Is For, 126 HARV. L. REV. 1904, 1909–
10 (2013) (discussing theories of the self, while also linking privacy with participation in
democratic governance); cf. SLOBOGIN, supra note 2, at 94–95 (surveying research suggesting
individual’s knowledge of ubiquitous surveillance may limit spontaneity). But see Daniel J.
Solove, Conceptualizing Privacy, 90 CALIF. L. REV. 1087, 1145 & nn. 342–44 (2002) (citing
sources while rejecting the deontological view).
159. See, e.g., Neil M. Richards, The Dangers of Surveillance, 126 HARV. L. REV. 1934,
1945–47, 1951 (2013) (discussing the importance of privacy in the ability to think freely without
government intimidation); Solove, supra note 158, at 1151 (arguing that protecting privacy
prevents “exercises of power employed to destroy or injure individuals”).
160. See, e.g., Posner, supra note 9, at 249–51.
161. Cohen, supra note 158, at 1910–11, 1916–17 (discussing spontaneity and play in the
development of selfhood, and suggesting that systematic intrusions by the government and
corporations adversely affects such development).
162. Id. at 1916–18.
163. Id.
164. See Posner, supra note 9, at 254.
165. See id.
166. Ross Andersen, An Eye Without an ‘I’: Justice and the Rise of Automated Surveillance,
ATLANTIC (June 14, 2012), http://www.theatlantic.com/technology/archive/2012/06/an-eye-
without-an-i-justice-and-the-rise-of-automated-surveillance/258082/.
167. Dan Froomkin, The Computers Are Listening: How the NSA Converts Spoken Words
Into Searchable Text, INTERCEPT (May 5, 2015, 10:08 AM), https://firstlook.org/
theintercept/2015/05/05/nsa-speech-recognition-snowden-searchable-text/ (quoting Kim
Taipale, Stilwell Center for Advanced Studies in Science and Technology Policy, as noting that
“[a]utomated analysis has different privacy implications” than access to data by human analysts).
168. JEFFREY ROSEN, UNWANTED GAZE 4–6, 8 (2000).
169. Id. at 88–94.
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 32
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
170. See FLACH, supra note 80, at 131 (discussing the use of a penalty for a machine that set
predictive criteria that were too complex to efficiently generalize to future cases).
171. NAT’L RESEARCH COUNCIL OF THE NAT’L ACADS., supra note 5, at 214.
172.The late Senator Ted Kennedy was sometimes delayed in boarding because his name
matched one on the list. See PETER MARGULIES, LAW’S DETOUR: JUSTICE DISPLACED IN THE BUSH
ADMINISTRATION 44–45 (2010). Errors in the no-fly list have attracted greater attention after the
June 2016 ISIS-inspired mass shooting at an Orlando nightclub because of legislative proposals
to bar those on the list from buying guns. See Molly O’Toole & Paul McLeary, Here’s How
Terrorism is Scrambling America’s Gun Debate, FOREIGN POL’Y (June 21, 2016),
http://foreignpolicy.com/2016/06/21/heres-how-terrorism-is-scrambling-americas-gun-debate/.
173. NAT’L RESEARCH COUNCIL OF THE NAT’L ACADS., supra note 5, at 206.
174. See Latif v. Holder, 28 F. Supp. 3d 1134, 1161 (D. Or. 2014) (holding that the
Department of Homeland Security’s process for correcting the erroneous placement of travelers
on the no-fly list left them stranded on the list indefinitely and violated their procedural due
process rights); Ibrahim v. Dep’t of Homeland Sec., 62 F. Supp. 3d 909, 929–31 (N.D. Cal. 2014)
(same); Irina D. Manta & Cassandra Burke Robertson, Secret Jurisdiction, 65 EMORY L.J.
(forthcoming 2016) (discussing litigation over no-fly lists and finding that “[w]hile people like
Ted Kennedy did not remain on the no-fly list for long, less connected individuals like Rahinah
Ibrahim and many others were not so lucky, receiving recourse after many years, if at all”); cf.
Abdelfattah v. Dep’t of Homeland Sec., 787 F.3d 524, 529–43 (D.C. Cir. 2015) (detailing lawful
resident plaintiff’s difficulties with repeated security checks that information in government
databases may have prompted and holding that plaintiff could seek relief under both the Privacy
Act and the U.S. Constitution, but denying relief because the plaintiff had not established a factual
basis, including tangible harm, for the relief sought).
175. NAT’L RESEARCH COUNCIL OF THE NAT’L ACADS., supra note 5, at 76 (discussing errors
when machine searches inspect multiple databases, each of which may have incorrect inputs).
176. Peter M. Shane, The Bureaucratic Due Process of Government Watch Lists, 75 GEO.
WASH. L. REV. 804, 810 (2007). The government has established a program to directly handle
complaints about difficulties in boarding aircraft that may be due to erroneous inclusion on a
terrorist watch list. See DHS Traveler Redress Inquiry Program (DHS TRIP), U.S. DEP’T OF
HOMELAND SEC. (Sept. 11, 2015), http://www.dhs.gov/dhs-trip. Recently, the government
expanded the information it would provide to travelers who encountered such difficulties. See
Dibya Sarkar, Justice Department Revises Procedures for Individuals on No-Fly List Seeking
Redress, FIERCEGOVERNMENTIT (Apr. 16, 2015), http://www.fiercegovernmentit.com/story/justi
ce-department-revises-procedures-individuals-no-fly-list-seeking-redre/2015-04-16. A program
like DHS TRIP is a useful supplement to, but not a substitute for, a program that would address
complaints about wrongful data collection and retention. Wrongful collection or retention or flawed
data inputs that conflate an innocent with a terrorist can manifest themselves in a range of harms;
difficulty in boarding an aircraft is just one of them. In such cases, it is more effective to address
the problem at the source. The DHS TRIP program shows that such redress is feasible.
177. See Peter Margulies, Aftermath of an Unwise Decision: The U.N. Terrorist Sanctions
Regime After Kadi II, 6 AMSTERDAM L.F. 51, 52–53 (2014).
178. Lee Ferran, Ex-NSA Chief: ‘We Kill People Based on Metadata,’ ABC NEWS
(May 12, 2014), http://abcnews.go.com/blogs/headlines/2014/05/ex-nsa-chief-we-kill-people-
based-on-metadata/.
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 34
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
179. Gregory S. McNeal, Targeted Killing and Accountability, 102 GEO. L.J. 681, 685 (2014)
(concluding based on document review and interviews that U.S. targeting decisions involved
elaborate analysis engaged in by dozens or even hundreds of officials); cf. Ferran, supra note 178
(indicating that General Hayden did not make his remarks about metadata in the course of
describing U.S. targeted killing procedures but instead highlighted that the Patriot Act domestic
metadata program required directed searches based on identifiers linked to terrorism and did not
allow autonomous machine searches).
180. See supra note 11 and accompanying text.
181. Transcript of President Obama’s Jan 17 Speech on NSA Reforms, WASH. POST (Jan.
17, 2014), http://www.washingtonpost.com/politics/full-text-of-president-obamas-jan-17-speech
-on-nsa-reforms/2014/01/17/fa33590a-7f8c-11e3-9556-4a4bf7bcbd84_story.html.
officials.182 For example, search filters can prevent analysts from gaining
access to machine-generated data unless the analysts use pre-approved
queries. Software can also monitor analyst’s online work to ensure that
analysts do not try to circumvent such safeguards or otherwise
overreach.183
As a descriptive matter, the technological imperative also unduly
discounts the force of law. In an unprecedented summary of norms
governing intelligence collection, NSA officials implementing President
Obama’s PPD-28 guidance to respect privacy worldwide declared that
signals intelligence scanning, collection, processing, and retention should
be “as tailored as feasible.”184 NSA has also stated that it will prioritize
reliance on “diplomatic and public sources.”185 Admittedly, these
guidelines preserve much of the intelligence agencies’ flexibility, since
the terms “feasible” and “prioritize” do not expressly preclude other
options. Nevertheless, it would be glib to dismiss the importance of such
constraints.
Guidelines such as those implementing PPD-28 start a conversation,
which in itself is valuable in the often-closed world of intelligence
collection.186 In the future, if intelligence agencies give in too readily to
the temptation to “collect it all” that the technological imperative
describes, privacy advocates can cite the government’s own guidelines in
seeking positive change. Legislators as well as bodies such as the Privacy
and Civil Liberties Oversight Board (PCLOB) can provide oversight. In
182. See NAT’L RESEARCH COUNCIL OF THE NAT’L ACADS., supra note 5, at 72; cf. John
DeLong, Aligning the Compasses: A Journey through Compliance and Technology, IEEE
Security and Privacy, at 85, 86–88 (July–Aug. 2014) (discussing importance of technology that
promotes compliance with legal rules); Litt, supra note 54, at 18 (same).
183. See id. (discussing individual audit records that compile all queries and permit
comparison between analysts to detect anomalies that might indicate overreaching); Nathan
Alexander Sales, Mending Walls: Information Sharing After the USA PATRIOT Act, 88 TEX. L.
REV. 1795, 1853 (2010) (same); see also In re Production of Tangible Things, No. BR 08-13,
2009 WL 9150913, at *5, *7–8 (FISA Ct. Mar. 2, 2009) (discussing technological safeguards);
Margulies, supra note 54, at 44 (same); Pozen, supra note 24, at 236–38 (same); Gellman et al.,
supra note 155 (including comments by Robert Litt, General Counsel for the Director of National
Intelligence, on technological safeguards).
184. PPD-28 Supplemental Procedures, supra note 27, para. 3.5, at 6.
185. Id.
186. See, e.g., Transcript of President Obama’s Jan 17 Speech on NSA Reforms, supra note
181. For an argument that intelligence agencies and their lawyers prior to Snowden’s disclosures
failed to model this kind of proactive conversation, see Margo Schlanger, Intelligence Legalism
and the National Security Agency’s Civil Liberties Gap, 6 HARV. NAT’L SEC. J. 112 (2015); cf.
Shirin Sinnar, Institutionalizing Rights in the National Security Executive, 50 HARV. C.R.-C.L. L.
REV. 289, 340–41 (2015) (discussing virtues and risks of establishing units in the U.S. Executive
Branch to promote internal compliance with civil and human rights).
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 36
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
191. See generally JACK GOLDSMITH, POWER AND CONSTRAINT (2012) (analyzing both
President Bush’s and President Obama’s counterterrorism programs and finding that presidents
act with greater discretion and secrecy during times of war).
192. See Deeks, supra note 8, at 330.
193. See Emmerson, supra note 12, para. 43, at 16.
194. This is the U.S. position. See STATE DEP’T PERIODIC REPORTS, supra note 8, at Annex
1; Michael J. Dennis, Application of Human Rights Treaties Extraterritorially in Times of Armed
Conflict and Military Occupation, 99 AM. J. INT’L L. 119, 124–26 (2005) (defending the U.S.
view). The United Kingdom’s Investigatory Powers Tribunal shares this view. See Human Rights
Watch v. Sec’y of State, paras. 52–63 (Investig. Powers Trib. 2016), http://www.bailii.org/uk/cas
es/UKIPTrib/2016/15_165-CH.html.
195. In this Section, this Article addresses the equivalency theorists’ claim that the U.S. must
accord identical rights to those within and without its borders. See infra notes 196–213 and
accompanying text.
196. ICCPR, supra note 7, art. 2(1) (emphasis added). For more detailed explanation of this
and other textual arguments, see Margulies, supra note 8, at 2143; see also Marko Milanovic,
Human Rights Treaties and Foreign Surveillance: Privacy in the Digital Age, 56 HARV. INT’L L.J.
81, 85 (2015) [hereinafter Milanovic, Human Rights Treaties and Foreign Surveillance]
(supporting extraterritorial application of the ICCPR); Marko Milanovic, From Compromise to
Principle: Clarifying the Concept of State Jurisdiction in Human Rights Treaties, 8 HUM. RTS. L.
REV. 411, 429 (2008) (same); Beth Van Schaack, The United States’ Position on the
Extraterritorial Application of Human Rights Obligations: Now Is the Time for Change, 90 INT’L
L. STUD. 20, 57–59 (2014) (same). See generally Sarah H. Cleveland, Embedded International
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 38
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
Law and the Constitution Abroad, 110 COLUM. L. REV. 225 (2010) (noting that the Supreme Court
abandoned the formalistic territorial approach). But see J. Andrew Kent, A Textual and Historical
Case Against a Global Constitution, 95 GEO. L.J. 463, 464–65 (2006) (suggesting caution in
extraterritorial reading of the U.S. Constitution).
197. Vienna Convention on the Law of Treaties art. 31(1), May 23, 1969, 1155 U.N.T.S.
198. Margulies, supra note 8, at 2143. Satisfaction of either condition would trigger an
obligation if the treaty drafters had placed the subjunctive term “or” between the two conditions.
199. The textual arguments against the current U.S. reading were made most
comprehensively in a 2010 memorandum by then-U.S. State Department Legal Adviser Harold
Koh. See Harold Hongju Koh, Memorandum Opinion on the Geographic Scope of the
International Covenant on Civil and Political Rights 2 (Oct. 19, 2010) [hereinafter Koh
Memorandum].
200. Id. at 9.
201. See Abbe R. Gluck & Lisa Schultz Bressman, Statutory Interpretation from the Inside—
An Empirical Study of Congressional Drafting, Delegation, and the Canons: Part I, 65 STAN. L.
REV. 901, 930, 934–35 (2013) (noting the canon’s importance for courts while reporting that
congressional drafters do not necessarily view the canon as central to their work, since legislators
prefer surplus language as a way of stressing substantive points).
The U.S. position also violates the rules of grammar.202 Under the U.S.
view, a state party must “respect . . . to all individuals within its territory
and subject to its jurisdiction the rights” listed in the treaty. 203 Consider
on the phrase, “respect… to all individuals.” That phrase entails an
ungrammatical mating of verb and preposition. In English and French
syntax, one does not “respect” rights “to” rights holders. Americans
might tolerate sloppy drafting in English, but the French would surely
insist on flawless French. Massaging the sense of the language could ease
the grammar problem. For example, one could respect rights “with
regard” to individuals. However, reading the ICCPR in that way adds two
words to Article 17. This seems incongruous for a textualist approach that
purports to rely on the literal language of the treaty. Textualist canons
exclude a reading that depends on adding words, just as they are skeptical
of treating some words in the text as superfluous.204 In sum, the statist
position is stuck with a choice of two alternatives that are both flawed
from a textualist perspective. Either the drafters used bad grammar, which
seems unthinkable for the French, or they inadvertently omitted two
words (“with regard”) from the provision’s text. Each assumption clashes
with a textualist reading.
A reading that requires a state to respect rights everywhere but ensure
rights only in a more limited area where it has greater control is also
consistent with the intent of the ICCPR’s drafters, as revealed in the
arguments made by U.S. Representative Eleanor Roosevelt. As Roosevelt
explained, the United States feared that a broad view of the agreement’s
territorial scope would require it to guarantee rights within each of the
defeated Axis powers that the United States and its allies occupied after
World War II.205 The early wording of Article 2 imposed on a signatory
state the duty to “guarantee to all persons residing on their territory and
within their jurisdiction the rights defined in the present covenant.”206
The term “guarantee” could have created a U.S. commitment to ensure
rights in the former Axis states. This commitment would have been
burdensome, impracticable, and arguably illegal under U.S. law.207 To
forestall this daunting prospect, Roosevelt told the drafting group that the
agreement’s language should clearly disavow any duty by states to
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 40
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
208. U.N. ESCOR, 6th Sess., 194th mtg. at 5, U.N. Doc. E/CN.4/SR.194 (May 16, 1950)
(summarizing statements made by Eleanor Roosevelt regarding the adoption of an amendment to
the agreement).
209. Id. at 9.
210. See Emilie M. Hafner-Burton & Kiyoteru Tsutsui, Human Rights in a Globalizing
World: The Paradox of Empty Promises, 110 A.J.S. 1373, 1373–74 (2005).
211. See Milanovic, Human Rights Treaties and Foreign Surveillance, supra note 196, at
108–11.
212. See Nazi Camps, U.S. HOLOCAUST MEMORIAL MUSEUM, https://www.ushmm.org/wlc/e
n/article.php?ModuleId=10005144 (last updated Jan. 29, 2016).
213. See King v. Burwell, 135 S. Ct. 2480, 2495–96 (2015) (underlining the need to appraise
the context and structure of statutes, while conceding, citing Justice Felix Frankfurter, that such
assessments are a “subtle business” (quoting Palmer v. Massachusetts, 308 U.S. 79, 83 (1939))).
214. Handyside v. United Kingdom, 24 Eur. Ct. H.R. (ser. A), para. 47 (1976).
privacy rights that the state provides to its citizens or other individuals
within its borders.215
Three crucial considerations buttress the case for deference. First,
overseas surveillance serves substantial international law interests,
permitting states to further the intent of U.N. Security Council
resolutions, such as Resolution 2178, which the Security Council recently
adopted to promote international cooperation against the threat posed by
foreign and returning fighters associated with ISIS and other terrorist
groups.216 Second, when used to identify, locate, and deter members of
groups such as ISIS engaged in an armed conflict with a state, overseas
surveillance is also consistent with the LOAC.217 Third, surveillance can
help states ease privacy threats from cyber criminals and foreign
nations.218
A. Deference, Human Rights, and Machine Access
The first touchstone of any review of state surveillance policies is the
measure of deference that states have received from transnational human
rights bodies such as the ECHR. This deference is sometimes couched in
terms of the complementarity that international tribunals allow to
individual state determinations219 or the “margin of appreciation” that
transnational human rights tribunals such as the ECHR show to individual
states on matters of security and public safety.220 Deference is rooted in
the structure and logic of international norms.
All international law depends on the cooperation of states.221 State
practice shapes customary international law. In addition, state consent is
required for the promulgation of treaties.222 Failing to allow a measure of
deference for state interpretation of treaty terms would discourage future
215. See, e.g., Emmerson, supra note 12, para. 43, at 16.
216. S.C. Res. 2178, supra note 22, at 1–2.
217. Cf. Schmitt, supra note 25, at 596–97 (noting the importance of intelligence,
surveillance, and reconnaissance in war-fighting).
218. See generally Pozen, supra note 24, at 229 (noting that with a reduction in surveillance,
“risk may be shifted not only among groups that suffer privacy harms but also among groups that
cause harm to a certain privacy interest—among privacy violators as well as victims”).
219. Samuel C. Birnbaum, Predictive Due Process and the International Criminal Court, 48
VAND. J. TRANSNAT’L L. 307, 337–39 (2015).
220. Handyside v. United Kingdom, 24 Eur. Ct. H.R. (ser. A), para. 47 (1976); see also
Robert D. Sloane, Human Rights for Hedgehogs?: Global Value Pluralism, International Law,
and Some Reservations of the Fox, 90 B.U. L. REV. 975, 983 (2010) (noting that the ECHR allows
states “a ‘margin of appreciation’ within which to implement or interpret human rights in ways
that may be sensitive or responsive to prevailing social, cultural, and other norms within their
polities”).
221. See William W. Burke-White, Power Shifts in International Law: Structural
Realignment and Substantive Pluralism, 56 HARV. INT’L L.J. 1, 38 (2015).
222. See Duncan B. Hollis, Why State Consent Still Matters––Non-State Actors, Treaties,
and the Changing Sources of International Law, BERKLEY J. INT’L L. 137, 144 (2005).
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 42
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
cross borders, in both physical and virtual domains.229 Such groups are
not known for their acquiescence to Security Council resolutions.230 Nor
do they advertise their specific plans for violence. Indeed, a crucial aspect
of ISIS’s tactical advantage is the power of surprise it has gained through
its diffuse, decentralized operation.231
ISIS has also taken advantage of the weakness and chaos that has
afflicted states in the Middle East. A terrorist group that establishes a safe
haven in a state that is riven by armed conflict, such as Syria, Iraq, or
Yemen, can then mount or inspire operations in other states.232 Even
when those state targets of terror have functioning legal systems and
control over their own territory, they are unable to directly regulate
terrorist groups that have found safe havens in other countries.233
Cultivating informants and other sources of human intelligence is
difficult when a safe harbor state is unwilling or unable to cooperate with
the international community.234
Because an international framework is only as strong as its weakest
link, safe haven states can undermine global counterterrorism efforts. In
the face of terrorists’ opportunism in finding safe havens, a target state’s
ability to conduct surveillance abroad can help bridge the gap in
knowledge of terrorists groups’ structure, operations, and plans for future
violence.235 Surveillance that harnesses today’s technology, but does so
with appropriate constraints, can be an equalizer in the battle against ISIS
and other groups that practice violent extremism. A rigid definition of
international privacy norms that short-circuits this counterterrorism effort
would ultimately be self-defeating, leaving the initiative with forces like
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 44
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
236. For leading literature on international armed conflict law, see YORAM DINSTEIN, THE
CONDUCT OF HOSTILITIES UNDER THE LAW OF INTERNATIONAL ARMED CONFLICT (2d ed. 2010);
Michael N. Schmitt et al., The Manual on the Law of Non-International Armed Conflict, INT’L
INST. HUMANITARIAN L. 1, 2, 8 (2006).
237. See Legality of the Threat Or Use of Nuclear Weapons, Advisory Opinion, 1996 I.C.J.
Rep. 226, ¶¶ 95–96 (July 8); Gerald L. Neuman, Understanding Global Due Process, 23 GEO.
IMMIGR. L.J. 365, 387 (2009) (endorsing “modifying the content of . . . treaty norms . . . by
importing relevant rules (if any exist) from the law of armed conflict”).
238. See Hassan v. United Kingdom, Eur. Ct. H.R. para. 36 (2014). Historically, LOAC has
been viewed as lex specialis—as law that preempts other otherwise operative provisions of
international law. See Neuman, supra note 237, at 387. However, courts, including the ECHR in
Hassan, have aimed for a more tempered approach that reconciles LOAC and human rights norms
without the wholesale displacement of either corpus of law.
239. Hassan, Eur. Ct. H.R. at para. 104 (ruling that in an international armed conflict, human
rights norms “continue to apply, albeit interpreted against the background” of LOAC’s
provisions).
240. Id. at para. 3.
241. Id. at para. 7. The Hassan court interpreted the European Convention on Human Rights,
which in Article 5, Section 1 secures the right to “liberty and security of the person” and
enumerates specific exceptions, such as detention pending criminal trial or deportation. Id. at para.
96. These exceptions do not include detention during an armed conflict. Id. at paras. 96–97. The
Hassan court asserted that the “fundamental purpose of Article 5 § 1” of the European Convention
court recognized that in armed conflict, a state had the legal right to detain
combatants whom it had captured to prevent them from reentering the
fray.242 Although detention under LOAC was not expressly enumerated
in the European Convention on Human Rights, the Hassan court
interpreted the Convention to accommodate this venerable aspect of
armed conflict.243
A similar analysis might govern surveillance. On the one hand,
reconnaissance and surveillance of another party to an armed conflict are
accepted incidents of war.244 The law of war does not preclude
espionage245 and permits a wide range of observation of enemy forces.
This observation can be clandestine or open. A non-international armed
conflict, such as the conflict between the United States and Al Qaeda and
associated forces, does not diminish a state’s prerogatives to engage in
such observation of its adversaries.246 A rigid application of the ICCPR
was “to protect the individual from arbitrariness.” Id. at para. 105.
242. Id. at para. 104.
243. Id.
244. See Schmitt, supra note 25, at 597. Even absent an armed conflict, surveillance of cyber
threats might be an appropriate countermeasure for a state injured by another state’s failure to
control cyber intrusions emanating from the second state’s territory. See Michael N. Schmitt,
“Below the Threshold” Cyber Operations: The Countermeasures Response Option and
International Law, 54 VA. J. INT’L L. 697, 705–07 (2014).
245. Jordan J. Paust, Can You Hear Me Now?: Private Communication, National Security,
and the Human Rights Disconnect, 15 CHI. J. INT’L L. 612, 647 (2015) (noting that “widely
practiced espionage regarding foreign state secrets is not a violation of international law”). The
International Court of Justice has issued preliminary relief barring one state from conducting
surveillance on officials of another state in peacetime. See Questions Relating to the Seizure and
Detention of Certain Documents and Data (Timor-Leste v. Australia), Provisional Measure, 2014
I.C.J. Rep. 147, ¶ 27 (Mar. 3). That decision turned on the integrity of arbitral proceedings
involving the two countries. See id. ¶ 42 (asserting that the right of a state to engage in arbitration
could “suffer irreparable harm” if the state conducting such surveillance used the information
acquired to gain an advantage).
246. Schmitt, supra note 25, at 597–98. One question remaining after the ECHR’s decision
in Hassan is the applicability of its holding to non-international armed conflicts between a state
and a non-state actor, such as Al Qaeda or ISIS. See generally Hakimi, supra note 234 (discussing
the state of the law on armed conflicts against non-state actors). Some language in Hassan
supports a narrow reading, which would limit authority to detain to traditional international armed
conflicts between states. See Hassan, Eur. Ct. H.R. at para. 104 (noting that “[i]t can only be in
cases of international armed conflict, where the taking of prisoners of war and the detention of
civilians who pose a threat to security are accepted features . . . that Article 5 could be interpreted
as permitting the exercise of such broad powers”). If this narrow view is correct, in a non-
international armed conflict, a state would have to formally derogate from its duties under the
governing human rights treaty. This derogation would then be subject to proportionality review.
See A. and Others v. United Kingdom, Eur. Ct. H.R. paras. 14–17 (2009). This is the view taken
by an intermediate-level British court. See Mohammed v. Sec’y of State for Defence [2015]
EWCA Civ. 843 [¶¶ 242, 246] (Eng.), https://www.judiciary.gov.uk/wp-
content/uploads/2015/07/serdar-mohammed-v-ssd-yunus-rahmatullah-v-mod-and-fco.pdf.
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 46
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
that precluded such observation would disrupt LOAC. On the other hand,
unchecked overseas surveillance in an armed conflict could lead to the
arbitrary intrusions on privacy that the ICCPR prohibits. Given this
tension, compliance with safeguards would permit tailored
reconnaissance and surveillance, while protecting rights.247
3. Overseas Machine Surveillance and Privacy Trade-Offs
Another reason to extend a measure of deference to states is the
presence of what Professor David Pozen has called privacy–privacy
trade-offs.248 Nationals of all states face privacy threats not only from
their own government, but also from other states and non-state actors.
While states wishing to conduct surveillance overseas cannot use this risk
as a blanket justification for any surveillance scheme, the need to conduct
surveillance to detect and monitor such privacy threats is an added
justification for granting states a quantum of discretion.
As an example, consider the view expressly held by the U.S.
government that China has been responsible for a wide range of cyber
intrusions in the United States.249 To facilitate these intrusions, Chinese
operatives may have sought to “spoof” other Internet Protocol addresses
based in other states or take over networks of computers in other
jurisdictions.250 While tradecraft of this kind can make it difficult to
A broader reading of Hassan would argue that the Court’s language was dicta because the
case concerned an international armed conflict. This view would stress the convergence of the
law regarding international and non-international armed conflicts and the functional case for
detaining participants in the latter situation to prevent them from engaging in further violence
during the pendency of the conflict. See id. ¶¶ 205–09, 235–40 (discussing commentary by
academics and legal advisers for the International Committee of the Red Cross). The U.S.
Supreme Court has held that the conflict with Al Qaeda is a non-international armed conflict, in
which both the power of states to detain and the safeguards accorded captives under Common
Article 3 of the Geneva Conventions presumptively apply. See Hamdan v. Rumsfeld, 548 U.S.
557, 630 (2006) (holding that conflict with Al Qaeda is “not of an international character” and is
therefore subject to the Geneva Conventions’ Common Article 3); cf. Geoffrey Corn & Eric
Talbot Jensen, Transnational Armed Conflict: A “Principled” Approach to the Regulation of
Counter-Terror Combat Operations, 42 ISR. L. REV. 46, 66 (2009) (contending that the non-
international armed conflict designation model is most appropriate for purely internal rebellions
or civil wars and that conflict with transnational terrorist organizations like Al Qaeda or ISIS
requires a different model).
247. Cf. WITTES & BLUM, supra note 42, at 200–01 (conceding the risk that U.S. surveillance
could target disfavored groups but arguing that safeguards have vastly reduced this risk).
248. See Pozen, supra note 24, at 222.
249. Randal L. Gainer, DOD Adopts Interim Cyber Rules as Claims of Chinese Cyber Attacks
Continue, DATA PRIVACY MONITOR (Sept. 14, 2015), http://www.dataprivacymonitor.com/internati
onal-privacy-law/dod-adopts-interim-cyber-rules-as-claims-of-chinese-cyber-attacks-continue/.
250. See David D. Clark & Susan Landau, Untangling Attribution, 2 HARV. NAT’L SECURITY
J. 531, 535 & n.5 (2011); Peter Margulies, Sovereignty and Cyber Attacks: Technology’s
Challenge to the Law of State Responsibility, 14 MELB. J. INT’L L. 496, 503 (2013).
251. See SCHNEIER, supra note 2, at 132 (discussing the attribution of responsibility for cyber
intrusions based on forensic analysis).
252. Case C-362/14, 2015 E.C.R.
253. Eur. Ct. H.R. paras. 147, 300–04 (2015).
254. Case C-362/14, Schrems, at I-4. For commentary on Schrems, see Francesca Bignami
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 48
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
& Giorgio Resta, Transatlantic Privacy Regulation: Conflict and Cooperation 131–32 (George
Washington Univ. Pub. Law, Research Paper No. 2015-52, 2015), http://ssrn.com/abstract=2705
601 (praising CJEU’s upholding of privacy principles); Scott J. Shackelford, Seeking a Safe
Harbor in a Widening Sea: Unpacking the EJC’s Schrems Decision and What It Means for
Transatlantic Relations, SETON HALL J. DIPL. & INT’L REL. (forthcoming 2016) (manuscript at 3),
http://ssrn.com/abstract=2680263 (critiquing the decision as failing to offer an accurate account
of U.S. intelligence collection); Peter Swire, US Surveillance Law, Safe Harbor, and Reforms
Since 2013, at 10–18 (Ga. Tech. Scheller Coll. of Bus., Research Paper No. 36),
http://ssrn.com/abstract=2709619 (pointing out mischaracterizations of U.S. programs such as
Section 702 in an opinion on Safe Harbor by EU Advocate General Bot, which CJEU relied on in
its opinion).
255. Case C-362/14, Schrems, at I-3, I-31.
256. Id. at I-9.
257. Id. at I-9 to -10.
258. Id. at I-19; Juliet Fioretti & Georgina Prodhan, Schrems: The Law Student Who Brought
down a Transatlantic Data Pact, REUTERS (Oct. 6, 2015, 4:29 PM), http://www.reuters.com/arti
cle/us-eu-ireland-privacy-schrems-idUSKCN0S02NY20151006; cf. Mieke Eoyang, Beyond
Privacy and Security: The Role of the Telecommunications Industry in Electronic Surveillance
11–12 (Hoover Inst. Essay Series Paper No. 1603, 2016) (Apr. 2016) (discussing EU indignation
about U.S. surveillance post-Snowden that led up to Schrems decision).
259. Case C-362/14, Schrems, at I-19.
260. Id. at I-19 to -20.
261. Id. at I-21.
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 50
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
268. James Madison had warned that the weak federal government of the Articles of
Confederation period allowed “any indiscreet member [state] to embroil the confederacy with
foreign nations”). See THE FEDERALIST No. 42, at 281 (James Madison) (Jacob Ernest Cooke ed.,
1961).
269. See Case C-362/14, Schrems, at I-10 to -12 (citing EU Data Protection Directive,
Preamble, 13th recital). “[A]ctivities [such as]… public safety, defence, State security
or . . . criminal laws fall outside the scope of [European] Community law . . . .” EU Data
Protection Directive, Preamble, 13th recital. Directive 95/46/EC, of the European Parliament and
of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing
of Personal Data and on the Free Movement of Such Data, O.J. (L 281) 2.
270. See Shackelford, supra note 254, at 4 (warning that absent reaching an agreement that
will satisfy all EU members and the CJEU, companies will have to resort to “expensive and time-
consuming model contracts or other agreements to continue transatlantic data transfers”).
271. Stuart W. Risch, Hostile Outsider or Influential Insider? The United States and the
International Criminal Court, 2009 ARMY LAWYER 61, 80–81 (2009) (noticing that “[t]hese
bilateral accords certify that neither signing state will arrest, extradite, or otherwise surrender the
other’s personnel to the Court”).
272. See Shackelford, supra note 254, at 4.
273. See Risch, supra note 271, at 82 (stating that “the Bilateral Immunity Agreements
(BIAs) do not bind the ICC in any way”).
274. Convention for the Protection of Human Rights and Fundamental Freedoms art. 8(1),
Nov. 4, 1950, 213 U.N.T.S. 221 [hereinafter Convention for the Protection of Human Rights]
(“Everyone has the right to respect for his private and family life, his home and his
correspondence.”); id. art. 8(2) (“There shall be no interference by a public authority with the
exercise of this right except such as is in accordance with the law and is necessary in a democratic
society in the interests of national security, public safety or the economic well-being of the
country, for the prevention of disorder or crime, for the protection of health or morals, or for the
protection of the rights and freedoms of others.”).
275. See Risch, supra note 271, at 66 (discussing how the United States’ bilateralist approach
to avoiding jurisdiction of ICC has been costly to America’s global reputation and to necessary
collaboration with other states); see also JOSEPH S. NYE, JR., THE PARADOX OF AMERICAN POWER
35 (2002) (arguing that a failure by the United States to build global consensus will result in the
loss of “important opportunities for cooperation in the solution of global problems such as
terrorism”); cf. Harold Hongju Koh, On American Exceptionalism, 55 STAN. L. REV. 1479, 1480
(2003) (highlighting international perception that the United States believes that its global role
creates entitlement to exceptions from human rights and other norms).
276. See Bignami & Resta, supra note 254, at 129 (noting the Schrem court’s “hardening
stance on the right to personal data protection”); cf. Google Spain v. Spanish Data Prot. Agency
& Costeja, 2014 I.C.J. paras. 20, 99 (May 13) (finding a “right to be forgotten” based on EU
privacy guarantees that require internet search firms such as Google to heed requests to delete
irrelevant, outdated, and prejudicial material from searchable online data upon an application by
an aggrieved party).
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 52
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
277. See Swire, supra note 254, at 10–21 (discussing how the media has misclassified U.S.
intelligence collection reforms under Section 702 and how they provide much more protection
and oversight than widely believed).
278. The CJEU could also consider an appeal by an individual from a decision by state
authorities finding as a substantive matter that the U.S. provided protections equivalent to those
in the EU.
279. Case C-362/14, Schrems v. Data Prot. Comm’r, 2015 E.C.R. I-31 to -32.
280. See Swire, supra note 254, at 26 (“This approach was codified in the USA Act, passed
in 2015, which also prohibited the bulk collection of telephone metadata and required the queries
to be submitted with court approval to the providers.”).
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 54
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
choice is the widespread recognition that espionage engaged in by a state within a foreign state
can violate the latter’s domestic law, but widely practiced espionage regarding foreign state
secrets is not a violation of international law.”).
289. See PPD-28, supra note 27, at 3–6.
290. See Case C-362/14, Schrems v. Data Prot. Comm’r, 2015 E.C.R. I-32.
291. Id.
292. See Swire, supra note 254, at 18.
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 56
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
293. See id. at 22 (explaining that the “total number of individuals targeted under Section
702 in 2013 was 92,707, a tiny fraction of total EU or global Internet users”).
294. Joined Cases C-293/12 & C-594/12, Digital Rights Ireland Ltd. v. Comm’r, 2014 E.C.R.
295. Case C-362/14, Schrems, at I-33.
296. Id.
297. In a familiar example of a sliding scale, courts trade off the irreparability of harm,
balance of hardships between the parties, and probability of success on the merits in considering
whether to grant a preliminary injunction. See Dataphase Sys. v. CL Sys., 640 F.2d 109, 113 (8th
Cir. 1981); Jared A. Goldstein, Equitable Balancing in the Age of Statutes, 96 VA. L. REV. 485,
487 (2010) (discussing the balance of equities test); cf. MATTHEW BENDER, 13 MOORE’S FEDERAL
PRACTICE § 65.22(5)(b)–(i) (2015) (analyzing tests in different federal appellate tribunals).
298. See Zakharov v. Russia, Eur. Ct. H.R., para. 147 (2015) (noting that under CJEU case
law review can be by either a “court or by an independent administrative body”).
299. See EC Adequacy Decision, supra note 35; Letter from Robert S. Litt, Gen’l Counsel,
Office of the Dir. of Nat’l Intelligence, to Justin S. Antonipillai, U.S. Dep’t of Commerce and Ted
Dean, Dep. Ass’t Sec’y, Int’l Trade Admin. (Feb. 22, 2016) (hereinafter ODNI Letter), http://ec.e
uropa.eu/justice/data-protection/files/privacy-shield-adequacy-decision-annex-6_en.pdf.
300. See EC Adequacy Decision, supra note 36, at 26.
301. This vagueness spurred criticism of the proposed Privacy Shield agreement by EU data
protection officials. See ARTICLE 29 DATA PROTECTION WORKING PARTY, Opinion 01/2016 on the
EU-U.S. Privacy Shield Draft Adequacy Decision (Apr. 13, 2016), http://ec.europa.eu/justice/
data-protection/article-29/documentation/opinion-recommendation/files/2016/wp238_en.pdf.
302. Both the ECHR and the CJEU have found in a different context—the fairness of
procedures for designating individuals as terrorist financiers and blocking their assets—that an
ombudsperson is not a substitute for more formal judicial review. See Al-Dulimi v. Switzerland,
(Eur. Ct. Hum. Rts. 2016); Kadi v. Eur. Comm’n (European Court of Justice 2013).
303. See Zakharov v. Russia, Eur. Ct. H.R., paras. 1, 3 (2015) (“The applicant alleged that
the system of secret interception of mobile telephone communications in Russia violated his right
to respect for his private life and correspondence and that he did not have any effective remedy in
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 58
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
that respect.”).
304. Id. at para. 232.
305. Id. at paras. 302–05 (“It is significant that the shortcomings in the legal framework as
identified above appear to have an impact on the actual operation of the system of secret
surveillance which exists in Russia.”). Shortly after Zakharov, the ECHR reached a similar
decision regarding surveillance in Hungary, a former Iron Curtain state with a legal system that
suffers from fundamental flaws comparable to Russia’s. See Szabo v. Hungary, Eur. Ct. H.R.
(2016).
306. See Carly Nyst, European Human Rights Court Deals a Heavy Blow to the Lawfulness
of Bulk Surveillance, JUST SECURITY (Dec. 9, 2015, 11:15 AM), https://www.justsecurity.org/282
16/echr-deals-heavy-blow-lawfulness-bulk-surveillance/ (suggesting parallels between Russian
and United Kingdom surveillance programs); Lorna Woods, Zakharov v. Russia: Mass
Surveillance and the European Court of Human Rights, EU L. ANALYSIS (Dec. 16, 2015), http://e
ulawanalysis.blogspot.com/2015/12/zakharov-v-russia-mass-surveillance-and.html (same).
307. Zakharov, at paras. 111, 116 (discussing “remote-control” access to data by law
enforcement agencies).
308. Id. at paras. 37, 261.
309. Id. at para. 261.
310. Id. at para. 262.
311. Id. at para. 263.
The ECHR found that the actual practice of Russian courts entailed
merely pro forma review.312 The ECHR noted that law enforcement
agency requests routinely lacked any supporting materials, that courts
“never” requested such materials, and that a mere passing “reference” to
national security justifying a search was usually enough to grant a law
enforcement agency’s request.313 Moreover, law enforcement authorities
were not required to show the pro forma approval to telecommunications
providers before conducting surveillance.314 This Potemkin village
version of oversight, according to the ECHR, all too predictably led to
rampant “arbitrary and abusive surveillance practices.”315 The Russian
judge on the ECHR, Judge Dmitry Dedov, concurred in the majority’s
assessment, observing that a “widespread suspicion” is prevalent among
Russia’s population that surveillance extends to “human-rights activists,
opposition activists and leaders, journalists,” and all others “involved in
public affairs.”316
This focus on the special problems posed by Putin’s despotic security
apparatus limits Zakharov’s utility as a template for analysis of
surveillance systems in European democracies. However, insistence on
crucial safeguards such as independent review will likely figure in those
future decisions.
B. Deferential Proportionality and Article 17 of the ICCPR
To fashion a standard for assessing a state’s machine surveillance, one
can combine arguments for reasonable, but not absolute, deference to
Article 17’s language, which bars “arbitrary” intrusions on privacy.317
Some form of proportionality review is common in international and
human rights cases and may also apply in the case of Article 17. 318 The
312. The ECHR made these findings without expressly mentioning the elephant in the room:
Russian President Vladimir Putin, whose commitment to legal niceties such as the separation of
powers is open to question. However, that unspoken presence is an important element of
Zakharov’s context. That element is absent in pending surveillance cases involving the United
Kingdom or other states, whatever the excesses.
313. Zakharov, at para. 263.
314. Id. at para. 269.
315. Id. at para. 303.
316. Id. at pt. 4 (Dedov, J., concurring).
317. See CCPR General Comment No. 16: Article 17 (Right to Privacy), U.N. Human Rts.
Comm., The Right to Respect of Privacy, Family, Home and Correspondence, and Protection of
Honour and Reputation, 32d Sess., para. 1 (Apr. 8, 1988).
318. The Human Rights Committee, which is designated by the United Nations to receive
reports from member states on compliance with the ICCPR, has recently advised the United States
that intrusions on privacy are subject to “the principles of legality, proportionality and necessity.”
ICCPR, supra note 7, at 10; cf. Emmerson, supra note 12, at 16 & n.34 (discussing
proportionality). To comply with the legality requirement, states must provide individuals with
some level of guidance about the state’s surveillance practices, although states need not provide
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 60
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
notice that will allow targets of surveillance to “adapt” their behavior and thereby frustrate state
efforts. See Kennedy v. United Kingdom, 52 Eur. H.R. Rep. para. 152 (2010).
319. Vienna Convention on the Law of Treaties art. 31(1), May 23, 1969, 1155 U.N.T.S.
320. See David Sloss, Using International Law to Enhance Democracy, 47 VA. J. INT’L L. 1,
18 n.76 (2006).
321. Cf. Paust, supra note 245, at 633–34 (viewing proportionality as reasonable balancing
of rights and “just requirements of morality, public order and the general welfare in a democratic
society” (quoting Universal Declaration of Human Rights, G.A. Res. 217 A (III), U.N. Doc.
A/810, at art. 1 (1948))).
322. For an example of such a standard, see Martin Lutern, The Lost Meaning of
Proportionality, in PROPORTIONALITY AND THE RULE OF LAW: RIGHTS, JUSTIFICATION,
REASONING 21, 34 & n.39 (Grant Huscroft, Bradley W. Miller & Gregoire Webber eds., 2014)
(discussing the need for the ECHR to show deference in terrorism-related cases brought under the
European Convention on Human Rights to minimize future violations of human rights by non-
state actors; the European Convention, tellingly, does not expressly include the ICCPR’s
arbitrariness language but, according to the author, should nonetheless be read as incorporating a
relaxed proportionality standard); cf. id. at 35 (noting the frequency of cases that hinge on “many
subjective features of particular states and societies, of which a reviewing court (especially an
international court) will have no significant knowledge”).
323. 27 Eur. H.R. Rep. 667 (1997).
324. Id. at 678–81.
325. Convention for the Protection of Human Rights, supra note 274, at 11.
326. Zana, 27 Eur. H.R. Rep. at 667–68, 679.
327. Id. at 688.
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 62
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
difficulties of tracking overseas threats and the risk that terrorists will find
safe havens in other countries. The ECHR case law also suggests that
machine access to a substantial database of communications content may
be appropriate as long as human access is restricted.333 This principle
would cover directed searches tailored to terrorism and autonomous
searches based on data sets dealing with terrorism as long as those
searches were properly validated.
However, a state could not engage in untrammeled bulk collection of
content, even if human access were limited. Such untrammeled collection
would be problematic under both the deontological and consequential
branches of the first equivalency thesis. In a deontological sense,
unfettered machine searches would undermine the perception of control
that persons abroad have a right to expect. On a consequential level,
unbridled access could cause harm given the amount of incorrect
information in searched databases and human analysts’ unawareness of
or indifference to this problem.334
In an effort to accommodate LOAC, states would be allowed to use
machine searches in other countries that are the site of an armed conflict
involving the state conducting surveillance. That would authorize the
United States to engage in bulk collection of content throughout
Afghanistan. In countries without an armed conflict, a state would only
be able to engage in more tailored bulk collection of content linked to a
particular geographic area within that country where evidence indicated
a substantial terrorist presence and where more targeted techniques
indicated a spike in terrorist activity. In the Bahamas, for example, the
United States could target drug or human traffickers, but it could not
collect in bulk all other Bahamian communications content. Complying
with this standard would represent a change from current reported U.S.
policy. However, that change would be worthwhile in confirming the
United States’ devotion to constraints mandated by international human
rights.
2. Reliability
A valid purpose for a search is of little help if the search is unreliable.
Searches that are unreliable will yield too many false positives and thus
intrude unduly on innocent individuals. Validation is necessary to avoid
333. See id. at para. 32 (noting that German authorities used keywords to search
communications content).
334. See Latif v. Holder, 28 F. Supp. 3d 1134, 1152 (D. Or. 2014) (discussing “a 2009 report
by the Department of Justice Office of the Inspector General that concluded that the TSDB
contains many errors and that the TSC has failed to take adequate steps to remove or to modify
records in a timely manner even when necessary”).
335. See Hu, supra note 143, at 808–16 (discussing the Daubert standard).
336. See supra Subsection I.C.2.a.ii.
337. Granting states the flexibility to use methodological, not substantive, explanations for
overseas computer searches is consistent with what Professor Paul Berman has called global legal
pluralism. For more detail on global legal pluralism, see generally PAUL SCHIFF BERMAN, GLOBAL
LEGAL P LURALISM (2012) (examining the difficulties of a legal pluralistic world where multiple
legal regimes imposed by state, sub-state, transnational, supranational, and non-state communities
may regulate one person); Paul Schiff Berman, Global Legal Pluralism, 80 S. CAL. L. REV. 1155
(2007) (recognizing that the existence of multiple, overlapping legal regimes causes conflict but
arguing that this conflict can be beneficial to produce alternative ideas and provide a forum for
communication among multiple communities).
338. See FLACH, supra note 80, at 56; WITTEN, supra note 1, at 174–77 (discussing various
methods used to evaluate false positive versus false negative trade-off).
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 64
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
identified); the false negative rate for positives (the number of false
negatives as a proportion of the total number of actual positives); and the
false positive rate for negatives (the “false alarm” rate—the number of
false positives as a proportion of the total number of actual negatives).
Statisticians can plot these criteria against each other for a more refined
assessment.
To illustrate precision and recall, consider a stylized example.
Suppose software engineers have developed a program for recognizing
celebrities on the streets of New York. Analysts test the program on a day
in which an inordinate number of celebrities are present, such as Saturday
Night Live’s fortieth-anniversary bash. A video of Fifth Avenue includes
nine actual celebrities, such as Beyoncé, Jay Z, and Kim Kardashian,
along with dozens of anonymous pedestrians. The program identifies
seven celebrities. Four of the identifications are correct, but three of the
persons labeled as celebrities are actually random passers-by. The
program’s precision is 4/7, while its recall is 4/9.
This example highlights a challenge noted previously for machine
searches for terrorists, as opposed to celebrities: the availability of
adequate data. The celebrities are already identified. There may be
questions at the margins, such as people who used to be celebrities but
are now forgotten, or people who may be celebrities tomorrow but are
still part of the pack today. At the core, however, good data exists, based
on web searches, social media mentions, and the like. On the other hand,
ISIS recruits cannot necessarily be individually identified; if they could,
counterterrorism would be easier than it is. Indeed, identifying previously
unknown terrorists is a prime purpose of machine searches. That creates
a problem, at least for the recall criterion, which requires knowledge of
the number of actual positives in the relevant statistical universe.339 So
the lack of data, which is a problem for the efficacy of a national security
machine search in the first instance is also a problem in assessing the
efficacy of the search.
Analysts can work around this obstacle by comparing machine
searches to each other and to other search methods, using measures such
as the false negative rate for positives and the false positive rate for
negatives (the “false alarm” rate). For example, analysts could calculate
such rates for a search based only on human intelligence sources, such as
informants. Analysts could do similar calculations for the results of
directed searches that used identifiers such as phone numbers to trace the
contacts of suspected terrorists. Finally, analysts could compare the
results for autonomous searches using hidden layers in a neural network.
340. See Ellen Yaroshefsky, Cooperation with Federal Prosecutors: Experiences of Truth
Telling and Embellishment, 68 FORDHAM L. REV. 917, 937 n.89 (1999) (“Most prosecutors
distinguish informants from cooperators and believe that informants have even greater incentives
to lie than cooperators because, not only are they ‘working off’ cases, but their entire livelihood
is dependent on the Drug Enforcement Administration (DEA).”).
341. See Kris, supra note 51, at 219 (explaining “hops”).
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 66
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
342. Case C-362/14, Schrems v. Data Prot. Comm’r, 2015 E.C.R. I-22 (“The establishment
in Member States of independent supervisory authorities is . . . an essential component of the
protection of individuals with regard to the processing of personal data.” (internal citations
omitted)); Joined Cases C-293/12 & C-594/12, Digital Rights Ireland Ltd. v. Comm’r, 2014 E.C.R
para. 62 (disapproving of Directive 2006/24 because “access by the competent national authorities
to the data retained is not made dependent on a prior review carried out by a court or by an
independent administrative body”).
343. See Joined Cases C-293/12 & C-594/12, Digital Rights Ireland, 2014 E.C.R. at para.
34.
344. See id. at 62 (stressing the need to provide for “prior review” by a court or an
“independent administrative body”).
345. See id. at paras. 54–55. Other cases in European national courts have followed the
CJEU’s lead. See Davis v. Home Sec’y, No. CO/3365/2014, [2015] EWHC (Admin) 2092 [para.
91(c)] (Royal Ct. of Justice London Div. 2015); see also Case C-362/14, Schrems, 2015 E.C.R.
at I-32 (citing DRI in observing that EU–U.S. Safe Harbor regime, which allows corporations on
both sides of the Atlantic to self-certify that they are observing privacy rules, is problematic in
light of revelations about U.S. surveillance); cf. id. at I-28 (finding a lack of authority to invalidate
the Safe Harbor program and referring the matter to CJEU); Nikolaj Nielsen, French Court Backs
Mass Surveillance, EUROBSERVER (July 24, 2015, 9:26 AM), https://euobserver.com/justice/1297
60 (reporting on the French decision); Sam Schechner & Matthew Dalton, French Constituonal
Court Approves New Powers for Intelligence Services, WALL STREET J. (July 24, 2015, 5:40 AM),
http://www.wsj.com/articles/french-constitutional-court-approves-new-powers-for-intelligence-s
ervices-1437730809 (discussing France’s constitutional court decision that allows intelligence
services broad powers to spy).
346. 52 Eur. H.R. Rep. 4 (2010).
347. Id. at para. 232. A UK bill pending as of January 6, 2016, added a layer of judicial
review. See Shaheed Fatima, The “Snooper’s Charter” and Judicial Oversight, JUST SECURITY
(Dec. 21, 2015, 9:40 AM), https://www.justsecurity.org/28443/snoopers-charter-judicial-
oversight/.
348. Weber v. Germany, 2006-XI Eur. Ct. H.R. para. 25. The G10 has a mixed membership,
including a former judge and members of Parliament. Id.
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 68
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
361. See Davis v. Home Sec’y, No. CO/3365/2014, [2015] EWHC (Admin) 2092 [para. 91]
(Royal Ct. of Justice London Div. 2015).
362. See PPD-28 Supplemental Procedures, supra note 27, at 7 n.1 (defining bulk collection).
363. Id. at 7–8.
364. Id. at 7 n.2.
365. Id. at 7–8; see also 50 U.S.C. § 1801(e)(2)(B) (2012) (permitting limited collection of
foreign intelligence information related to “foreign affairs” of United States); supra notes 283–93
and accompanying text (discussing “foreign affairs” prong of Section 702).
366. See Kennedy v. United Kingdom, 52 Eur. H.R. Rep. paras. 79–80 (2010).
367. See id. at para. 127.
368. See NAT’L RESEARCH COUNCIL OF THE NAT’L ACADS., supra note 5, at 76, 274–75.
369. See, e.g., Latif v. Holder, 28 F. Supp. 3d 1134, 1141–42 (D. Or. 2014).
370. See Margulies, supra note 8, at 2163.
371. See Clapper v. Amnesty, Int’l USA, 133 S. Ct. 1138, 1149–50 (2013) (narrowly
construing the standing requirement for recourse in federal courts); cf. Obama v. Klayman, 800
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 70
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
F.3d 559, 561–62, (D.C. Cir. 2015) (vacating the preliminary injunction and remanding for further
proceedings on the ground that the plaintiffs had not demonstrated a likelihood of success on
standing to challenge government surveillance policies, since the plaintiffs had not shown a
sufficiently high probability that they had been subject to surveillance).
372. Judicial Redress Act of 2015, Pub. L. No. 114-126, 130 Stat. 282 (codified at 5 U.S.C.
552a note).
373. Id. § 2(d).
374. See 5 U.S.C. § 552a(d)–(g) (2012).
375. See id. § 552a(k)(2).
376. See id. § 552(b)(1).
377. See H.R. 1428, § 2(a)(1) (incorporating by reference exemptions in the Privacy Act).
378. If the Judicial Redress Act does not provide adequate recourse, then European data
commissioners and the European Court of Justice may not approve revisions to regimes such as
“Safe Harbor,” which permitted companies on both sides of the Atlantic to share customer data
to facilitate commercial transactions.
379. See Joined Cases C-584/10, C-593/10 & C-595/10, Kadi v. European Commission
(European Court of Justice 18 July 2013) (holding that ombudsperson was not sufficient to cure
procedural flaws in regime for blocking assets of suspected terrorist financiers).
380. Kennedy v. United Kingdom, 52 Eur. H.R. Rep. para. 79 (2010).
381. See id.
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 72
Margulies: Surveillance By Algorithm: The NSA, Computerized Intelligence Col
http://scholarship.law.ufl.edu/flr/vol68/iss4/3 74