The Pattern That Has Been Consistent For Twenty Years

The pattern in U.S. surveillance capability development over the trailing twenty years has been consistent enough to be predictive. The capability gets built first. The capability gets deployed second. The authorizing framework gets adjusted third, usually under the framing that the framework is updating in response to changed technological conditions, and almost always after the relevant institutions have already been using the capability for some period of time. The reform debate that follows is consistently downstream of architecture decisions that have already been made.

The code does not lie. The press release does. I helped build this. I know what it does. The pattern is not the result of any specific bad-faith decision by any specific institutional actor. The pattern is the result of the structural relationship between the technical capability development cycle, which operates on engineering timelines, and the legal authorization cycle, which operates on legislative and judicial timelines. The engineering timelines are faster. The legal timelines are slower. The gap is the architecture of the surveillance state's actual operational reach.

The Specific Examples Are Public Record

The specific examples of the pattern are in the public record for anyone willing to read the official acknowledgments. The Section 702 program was operational in form before the relevant statutory authority was passed in 2008. The bulk metadata collection program under Section 215 of the Patriot Act was operational at a scale that the public framing did not adequately describe until the Snowden disclosures forced the formal acknowledgment in 2013. The various location-tracking capabilities the federal law enforcement community has developed have, in each case, been deployed at scale before the courts have addressed the constitutional questions the deployment raises.

The pattern is not unique to any single administration. The pattern crosses administrations of both parties. The institutional logic that produces the pattern is the same institutional logic that operates regardless of which party holds the presidency. The institutional logic is that the capability development serves operational interests that the institutions are reluctant to forgo, and that the legal authorization process is treated as a downstream catch-up exercise rather than as an upstream constraint on capability development.

What The Reform Debate Misses

The reform debate, in its conventional form, misses the structural point. The reform debate focuses on the authorities, on the statutory language, on the judicial review architecture, on the inspector general reporting requirements, and on the oversight committee briefing cadence. Each of these is a real and legitimate area of reform. None of them, individually or in the aggregate, addresses the structural pattern in which the capability arrives before the framework.

Reform that would actually address the structural pattern would require the kind of capability-development gate that the U.S. national security architecture has not, in practice, been willing to operate under. The gate would require the relevant institutions to seek authorizing framework adjustments before deploying new capability categories, rather than after. The gate would slow capability development. The gate would, in some specific cases, allow adversary capability to develop in parallel without the corresponding U.S. capability being available at the same tempo. The gate would, in plain reading, produce the kind of strategic cost that the relevant institutions have, for twenty years, judged to be unacceptable relative to the constitutional cost of the current pattern.

The Section 702 Reauthorization Is The Current Test Case

The Section 702 reauthorization, which the Congress will face later this calendar year, is the current test case for the pattern. The program has, by the executive branch's own characterization, produced material intelligence value. The program has also, by the inspector general reporting and by the various civil liberties oversight reports, produced specific procedural failures and specific instances of overcollection that have, in the aggregate, raised serious questions about whether the current authorizing framework is operating as the framework was designed to operate.

The reauthorization debate will, by every prior indication, produce some marginal reforms to the program's operating parameters, will retain the program's core authorities, and will defer the more structural questions to the next reauthorization cycle. The pattern is the pattern. The deferral is the deferral. The structural questions will remain structural questions.

What The Citizen Should Do

What the citizen should do, regardless of how the reauthorization debate resolves, is operate under the working assumption that the capabilities the surveillance state has deployed are the capabilities the citizen's own privacy posture should be calibrated for. The capabilities exist. The capabilities are, in any specific instance, applied within the authorizing framework the legal architecture permits. The framework permits more than the citizen would, on reflection, want it to permit. The citizen's privacy posture is the citizen's own responsibility within the constraints the architecture leaves available.

The practical steps are the same practical steps I have written about in this column repeatedly. Audit the device permissions. Use hardware-backed multi-factor authentication. Use end-to-end encrypted messaging for communications that warrant it. Maintain awareness of the data flow architecture that the citizen's own digital footprint generates. Decentralize where decentralization is possible. The architecture is the architecture. The citizen's posture within the architecture is the variable that the citizen controls. Spoiler alert. The variable is the variable the citizen has been treating as a low-priority maintenance item. It is not.

The Honest Forward Read

The honest forward read is that the surveillance state will continue to develop capability faster than the legal authorization framework can adjust, that the reform debate will continue to operate downstream of architecture decisions, and that the citizen's effective privacy will continue to depend on the citizen's own technical and behavioral posture more than on the institutional reform debate.

The forward read is not satisfying. The forward read is also, by the available evidence, the accurate read. Your phone is a tracking device you paid for. Your laptop is a collection platform you authenticated to. Your accounts are the foothold from which the architecture reaches the rest of your digital life. The architecture is the architecture. The citizen's posture is the citizen's. The reform debate is the noise the citizen should not mistake for the signal that the citizen's own actions can still produce.