Skip to main content

Why does the NSA need your phone records to track terrorists?

Why does the NSA need your phone records
bikeriderlondon/Shutterstock

The House of Representatives on Wednesday narrowly defeated an amendment, sponsored by Michigan Republican Rep. Justin Amash and Democrat Rep. John Conyers, which would have prevented the National Security Agency from collecting phone metadata on virtually everyone in the country.

Opponents of the so-called Amash amendment, which would have required the NSA to limit its telephone data collection only to individuals “under investigation,” argue that the NSA telephone data surveillance program is vital to the protection of U.S. national security. Supporters, conversely, believe that it would have placed reasonable limits on the NSA’s spying powers, and restored Fourth Amendment protections against unreasonable searches and seizures. Why, after all, can’t the NSA simply limit its data collection to only those under investigation? 

Recommended Videos

The simple answer is that an NSA investigation is far more complex and expansive than what the average detective novel reader might think of as an investigation. This is due to the scope of the NSA’s national security mission – stop all terrorist threats – and the amount of data involved in carrying out this mission. 

Why, after all, can’t the NSA simply limit its data collection to only those under investigation?

For starters, collecting everyone’s telephone metadata (the details of which Foreign Policy breaks down here), rather than just that of those suspected of a crime or a terrorist plot, is just easier. Dragnet collection means being able to issue a single court order rather than one every time the NSA or FBI suspects an individual of having a terrorist agenda. It’s quicker, in other words, to scoop water out of a pond with a backhoe rather than a spoon.

Furthermore, if the NSA does not collect the data, it will be lost forever. Phone companies do not store this metadata indefinitely, as doing so is prohibitively expensive. According to Sen. Saxby Chambliss (R-GA), however, the government is exploring ways for phone companies to store their data longer, rather than have the NSA collect the data.

As for limiting the collection to only those “under investigation,” well, even that isn’t as simple as it sounds. More people are likely “under investigation” than you might think. In fact, according to agency officials, the NSA believes that the majority of people may be worth investigating. NSA Deputy Director Chris Inglis revealed to Congress earlier this month that agency analysts will look at the metadata and Internet records of people “two or three hops” from a suspected terrorist – up to three degrees of separation from a suspect.

In other words, if you are suspected of plotting a terrorist attack, NSA analysts may look into the phone and Internet communications of everyone who communicates with you. That’s one “hop.” In the second hop, the NSA looks at everyone with whom those people communicate. According to the Washington Post, analysts typically stop at this point. Inglis’ testimony reveals that they may go a step further; everyone people in hop number two communicate with may also get checked out by the NSA, in at least some scenarios – hop number three. Given that, according to University of Milan and Facebook researchers, everyone in the entire world is only separated by 4.74 degrees of separation, more than half of all people on Earth fall into the NSA’s purview, at least theoretically.

NSA Headquarters
Image used with permission by copyright holder

That said, NSA officials claim the law differentiates between the NSA collecting information, which is legal under Section 215 of the Patriot Act, and searching that information, which may still require the NSA to obtain a court order before doing so – though statements by Senate Intelligence Committee Chairwoman Sen. Diane Feinstein (D-CA) seem to imply that no court order is legally necessary for search queries. (This is a matter of contention.) Regardless, the NSA explains that it only searches telephone metadata “when there is reasonable suspicion, based on specific and articulated facts,” that the records are associated with specific terrorist organizations. The NSA claims “less than 300 identifiers were queried” in 2012.

Perhaps the most controversial aspect of the NSA’s telephone surveillance program is that it collects the metadata because it can. Thanks to something known as the “third party doctrine,” data that you share with third parties – be it Verizon or Facebook – is not protected by the Fourth Amendment, meaning the NSA does not have to get a warrant to collect this metadata since the phone company has easy access to it. Without disrupting third party doctrine, the Amash amendment would have put greater Fourth Amendment restraints on NSA telephone data collection.

Finally, the NSA collects this data because it thinks it is necessary. As the NSA’s fact sheet explains, the September 11 attacks revealed that the NSA was missing crucial intelligence that may have been used to stop the disaster. Among that intelligence: Telephone metadata. 

Top image courtesy of bikeriderlondon/Shutterstock

Andrew Couts
Former Digital Trends Contributor
Features Editor for Digital Trends, Andrew Couts covers a wide swath of consumer technology topics, with particular focus on…
How to record phone calls on your Android phone
Google Pixel 3 XL review

There might be times you need to record a call, like when you’re on an important work call with someone, and recording it is easier than trying to remember all the details later. Although Android devices don’t have the native ability to do so, you can use Google Voice or even turn to an external recording device to get the job done.

Read more
iOS 17.3 will give your iPhone a much-needed security upgrade
A person holding the Apple iPhone 15 Plus and Apple iPhone 15 Pro Max.

Apple has started testing a new feature that will add an extra layer of protection to your iPhone, something that will also dissuade thieves from snatching your phone. The feature in question is called Stolen Device Protection, and it is currently rolling out with the developer build of iOS 17.3 for users. This comes just one day after iOS 17.2 started rolling out to the public.

“This new feature adds an additional layer of security in the unlikely case that someone has stolen your phone and also obtained your passcode,” says Apple. Once enabled, this feature sets three additional security walls on your iPhone, which are as follows:

Read more
This is the fastest phone and laptop charger I’ve ever used. Here’s why you need it
Ugreen 300W GaN fast charger with four USB-C and one USB-A port in hand held against pink and yellow flowers.

I make a living out of testing gadgets and spend a significant portion of my time bouncing between things to charge -- and their respective chargers. This is why I find fast charging not only irresistible, but also indispensable for my sanity.

In recent years, I have found solace in fast chargers with multiple output ports, especially because they're easy to travel with. And I am constantly and eagerly upgrading to faster, more efficient chargers with more ports. In this pursuit, I now arrive at the Ugreen Nexode 300-watt fast charger with five USB ports.

Read more