by Geoffrey R. Stone, Edward H. Levi Distinguished Professor of Law and ACS Co-Faculty Advisor at the University of Chicago, and former ACS Board Chair
* This post originally appeared on The Huffington Post and is the third part of an ongoing series. The first part can be read here; the second part can be read here; the fourth part can be read here; the fifth part can be read here.
In my last post, I explored the pros and cons of the NSA's bulk telephony meta-data program. As I reported, after considering all the competing interests and perspectives, the Review Group concluded that, in light of the availability of other means by which the government could achieve its legitimate objectives, there was "no sufficient justification to allow the government itself to collect and store bulk telephony meta-data." The Review Group therefore recommended that the meta-data program, as currently constituted, "should be terminated as soon as reasonably practicable."
At the same time, though, the Review Group found that access to telephony meta-data can be useful to the government in its effort to identify terrorists operating inside the United States. The challenge was to figure out how best to preserve the legitimate value of the program while at the same time reducing its risks to personal privacy and individual freedom.
To strike a better balance, the Review Group recommends several important changes in the program as it currently exists.
First, and perhaps most important, the Review Group recommends that the government should not be permitted to store the telephony meta-data. The Review Group reasoned that taking the meta-data out of the hands of government would substantially reduce the potential for government abuse. The Review Group therefore recommends that the telephony meta-data should be held by private entities. That is, the meta-data should be held either by the various telephone service providers themselves or, upon a showing that that solution would make effective use of the meta-data impossible, by a private organization created specifically for that purpose. This approach would both prevent the government from having direct access to the database and ensure that an independent set of eyes could monitor the government's access to the information.