Provisions under which NSA can collect, retain data on U.S. residents revealed
The Guardian publishes two more secret documents on NSA spy programs
Computerworld - Two secret documents describing the procedures the National Security Agency (NSA) is required to follow when spying on foreign terror suspects reveal the provisions that allow the agency to collect, retain and use information on U.S residents without a warrant, The Guardian newspaper reported today.
The paper published two documents that it presumably obtained from Edward Snowden, the former NSA contractor who has admitted to leaking classified documents describing two top-secret government data collection programs.
Both the documents are dated July 28, 2009 and are signed by Attorney General Eric Holder. They also appear to have been approved by the Foreign Intelligence Surveillance Court, a secret court that was established specifically to oversee government data access requests filed under Foreign Intelligence Surveillance Act of 1978.
FISA was originally designed to give U.S. intelligence a tool for keeping an eye on suspects in foreign countries who were perceived to pose a threat to U.S. national security. It was amended in 2008 and now gives U.S. intelligence agencies significantly broader authority to keep an eye on the communications that foreign-based suspects have with people outside the country and inside the U.S.
One document published by The Guardian describes the procedures that NSA agents need to follow when spying on people who are reasonably believed to be outside the United States. The other describes the data minimization procedures that the NSA is required to follow when gathering, retaining and using electronic communications and other information pertaining to foreign suspects.
The documents make it clear that the NSA is not permitted to intentionally conduct surveillance or intentionally collect information on U.S residents under the authority granted to it by FISA.
They also show that several detailed procedures exist to ensure that inadvertent collection of data on U.S. residents is kept to a minimum. The secret documents describe the measures the NSA must take to ensure that targets are indeed based outside the USA and how they must destroy data that is inadvertently collected on U.S. residents.
Even so, the court-approved documents also show that the NSA is allowed to retain "inadvertently acquired" data on U.S. persons for up to five years if the data contains usable intelligence, if the data is encrypted, or contains information on criminal activity, the Guardian said.
The NSA can similarly retain inadvertently collected data on U.S. residents if the data contain information relevant to cybersecurity or evidence of a threat of harm to persons or property. It also allows the NSA to access the actual content of communications inadvertently gathered from U.S. systems to establish if the systems are indeed based in the U.S. and to eliminate them from further surveillance.
In situations where the NSA does not have any information on a person's location, they are free to assume that the person is based overseas, the report noted, citing from a 2010 court order it says it has obtained.
"If it later appears that a target is in fact located in the US, analysts are permitted to look at the content of messages, or listen to phone calls, to establish if this is indeed the case," the paper said.
Such information would appear to undercut comments made by various administration and intelligence officials about the NSA's foreign surveillance activities not impacting U.S. residents. Though officials have conceded that their surveillance activities may occasionally result in information on U.S. residents being gathered, they have tended to downplay the impact of such information gathering.
The Guardian's latest revelations comes about two weeks after it first broke the story about the NSA collecting phone call metadata records pertaining to all calls made by Verizon customers since at least April. That revelation, followed by another from The Washington Post about another secret surveillance program called PRISM have resurfaced long-held fears among privacy advocates about post 9-11 anti-terror programs being used as an excuse to conduct dragnet domestic surveillance.
Two lawsuits have already been filed against the administration, the Justice Department and the NSA over the data collection programs. Several lawmakers have also asked for more transparency and oversight over the programs.
On Thursday, two lawmakers introduced a bill in the U.S. House of Representatives that would require the Department of Justice to declassify significant decisions made by the Foreign Intelligence Surveillance Court. The goal is to give Americans a chance to understand how the court has interpreted the authorities provided to the government under FISA and the Patriot Act.
Meanwhile, Snowden, the man at the center of the story, is believed to be hiding in Hong Kong and is reportedly said to be looking for asylum in Iceland. The FBI is expected to press criminal charges against him shortly.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan or subscribe to Jaikumar's RSS feed . His e-mail address is email@example.com.
- Franken presses Ford on location data collection practices
- Justices let stand appeals court decision on border searches of laptops
- California lawmakers move to bar state help to NSA
- Appeals court again nixes Google's bid to overturn Street View case
- Older Mac webcams can spy without activating warning light
- Update: Judge rules NSA spy efforts may be unconstitutional
- Perspective: Privacy concerns could keep Amazon delivery drones grounded
- NSA collects data from millions of cellphones daily
- Perspective: Curbing data use is key to reining in NSA
- Lavabit-DOJ dispute zeroes in on encryption key ownership
Read more about Privacy in Computerworld's Privacy Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Review: Box beats Dropbox - and all the rest - for business Box trumps Dropbox, Engyte, Citrix ShareFile, EMC Syncplicity, and OwnCloud with rich mix of file sync, file sharing, user management, deep reporting and...
- Analyst Report-Mixed All Flash Arrays Delivers Safer Higher Performance What is the impact of an all-flash array with enterprise features and reliability on the mainstream data center? In the mainstream environment, storage...
- Embracing Flash Storage Exec Brief Flash storage can deliver impressive performance, especially for random I/O, by eliminating rotational and seek latencies that are common in all hard disk...
- Embracing Tiered Storage Exec Brief All data is not created equal and thus all data need not be treated the same by the storage system. IT executives must...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- Four Myths of High-Productivity App Dev Debunked Debunk the main myths surrounding high-productivity application development and how both platforms have overcome them. All Privacy White Papers | Webcasts