If any terrorists are reading this column, now would be a good time to turn on C-Span 2. For the next few days, you guys got it made. Section 215 of the Patriot Act has expired and the Senate has only just started debating the bill that would renew and tailor these authorities.
So if you suspect you might be under investigation, go ahead and switch burner phones. No more roving wiretaps. Feel free to contact any compatriots inside the United States on a landline. No more bulk collection of telephone metadata. Gather ye rosebuds. Carpe diem.
This is what the White House and others would have you believe. Speaking Sunday on “Face the Nation,” CIA Director John Brennan warned that terrorists are monitoring the Congressional debate carefully. President Obama himself warned on Saturday that terrorists like al-Qaida and the Islamic State “aren’t suddenly going to stop plotting against us at midnight tomorrow. And we shouldn’t surrender the tools that help keep us safe.” What happened to the Barack Obama of 2008, who warned voters about the politics of fear?
Well, in this case it’s more “politics” than “fear.” It’s true that part of the Patriot Act has expired, including the piece that the government interpreted as giving it the authority for bulk collection of telephone meta-data. The Senate is likely to pass the USA Freedom Act, which will require the NSA to search out connections between suspicious phone numbers using data stored by the telecom companies, rather than data banked by the NSA itself. The Patriot Act’s “lone wolf” and roving wiretap powers will be restored in the USA Freedom Act.
Never miss a local story.
But what about these vulnerable days in the meantime? The reality is they’re not very vulnerable. There are probably workarounds that let the government continue its surveillance of bad guys, citing authorities other than the lapsed provisions of the Patriot Act or relying on some “fuzziness” in the Patriot Act, to use Senator Bob Corker’s term.
The worst terrorist group these days does a lot of its business in public. The Islamic State recruits and signals its followers on Twitter.
This is not to say that terrorists do not also have more clandestine ways of communicating. Al-Qaida, for example, developed an encrypted Internet-based communications system. U.S. officials have also warned that terrorists have changed how they communicate since some of the disclosures by former NSA contractor Edward Snowden.
So proponents of government surveillance are exaggerating. But their opponents are grandstanding as well. Senator Rand Paul has portrayed himself as a wrestler about to take on Obama and the security state. But even Paul acknowledges that the authorities he allowed to expire will be reauthorized soon enough in the USA Freedom Act.
It’s natural to wonder how genuine Paul’s interest in privacy is. Does his campaign buy cell phone data on voters? In the past few years, companies have sprung up to help candidates maximize their political dollars by sifting through purchase patterns, phone records and all kinds of other electronic data of their constituents.
I asked Michigan Rep. Justin Amash why it is OK for campaigns to collect this metadata, but not for the NSA to do so. “Because campaigns can’t put people in prison,” he responded.
That’s true. But this would be a strange moment for the republic if the government powers had truly lapsed. Data collection for the national security state would seem more restricted than data collection for politicians. But it’s all just politics and posturing. Bottom line for terrorists: You’re still being watched.
Eli Lake is a Bloomberg View columnist who writes about politics and foreign affairs.