Provisions under which NSA can collect, retain data on U.S. residents revealed
The Guardian publishes two more secret documents on NSA spy programs
Computerworld - Two secret documents describing the procedures the National Security Agency (NSA) is required to follow when spying on foreign terror suspects reveal the provisions that allow the agency to collect, retain and use information on U.S residents without a warrant, The Guardian newspaper reported today.
The paper published two documents that it presumably obtained from Edward Snowden, the former NSA contractor who has admitted to leaking classified documents describing two top-secret government data collection programs.
Both the documents are dated July 28, 2009 and are signed by Attorney General Eric Holder. They also appear to have been approved by the Foreign Intelligence Surveillance Court, a secret court that was established specifically to oversee government data access requests filed under Foreign Intelligence Surveillance Act of 1978.
FISA was originally designed to give U.S. intelligence a tool for keeping an eye on suspects in foreign countries who were perceived to pose a threat to U.S. national security. It was amended in 2008 and now gives U.S. intelligence agencies significantly broader authority to keep an eye on the communications that foreign-based suspects have with people outside the country and inside the U.S.
One document published by The Guardian describes the procedures that NSA agents need to follow when spying on people who are reasonably believed to be outside the United States. The other describes the data minimization procedures that the NSA is required to follow when gathering, retaining and using electronic communications and other information pertaining to foreign suspects.
The documents make it clear that the NSA is not permitted to intentionally conduct surveillance or intentionally collect information on U.S residents under the authority granted to it by FISA.
They also show that several detailed procedures exist to ensure that inadvertent collection of data on U.S. residents is kept to a minimum. The secret documents describe the measures the NSA must take to ensure that targets are indeed based outside the USA and how they must destroy data that is inadvertently collected on U.S. residents.
Even so, the court-approved documents also show that the NSA is allowed to retain "inadvertently acquired" data on U.S. persons for up to five years if the data contains usable intelligence, if the data is encrypted, or contains information on criminal activity, the Guardian said.
The NSA can similarly retain inadvertently collected data on U.S. residents if the data contain information relevant to cybersecurity or evidence of a threat of harm to persons or property. It also allows the NSA to access the actual content of communications inadvertently gathered from U.S. systems to establish if the systems are indeed based in the U.S. and to eliminate them from further surveillance.
In situations where the NSA does not have any information on a person's location, they are free to assume that the person is based overseas, the report noted, citing from a 2010 court order it says it has obtained.
"If it later appears that a target is in fact located in the US, analysts are permitted to look at the content of messages, or listen to phone calls, to establish if this is indeed the case," the paper said.
Such information would appear to undercut comments made by various administration and intelligence officials about the NSA's foreign surveillance activities not impacting U.S. residents. Though officials have conceded that their surveillance activities may occasionally result in information on U.S. residents being gathered, they have tended to downplay the impact of such information gathering.
The Guardian's latest revelations comes about two weeks after it first broke the story about the NSA collecting phone call metadata records pertaining to all calls made by Verizon customers since at least April. That revelation, followed by another from The Washington Post about another secret surveillance program called PRISM have resurfaced long-held fears among privacy advocates about post 9-11 anti-terror programs being used as an excuse to conduct dragnet domestic surveillance.
Two lawsuits have already been filed against the administration, the Justice Department and the NSA over the data collection programs. Several lawmakers have also asked for more transparency and oversight over the programs.
On Thursday, two lawmakers introduced a bill in the U.S. House of Representatives that would require the Department of Justice to declassify significant decisions made by the Foreign Intelligence Surveillance Court. The goal is to give Americans a chance to understand how the court has interpreted the authorities provided to the government under FISA and the Patriot Act.
Meanwhile, Snowden, the man at the center of the story, is believed to be hiding in Hong Kong and is reportedly said to be looking for asylum in Iceland. The FBI is expected to press criminal charges against him shortly.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan or subscribe to Jaikumar's RSS feed . His e-mail address is firstname.lastname@example.org.
- Franken presses Ford on location data collection practices
- Justices let stand appeals court decision on border searches of laptops
- California lawmakers move to bar state help to NSA
- Appeals court again nixes Google's bid to overturn Street View case
- Older Mac webcams can spy without activating warning light
- Update: Judge rules NSA spy efforts may be unconstitutional
- Perspective: Privacy concerns could keep Amazon delivery drones grounded
- NSA collects data from millions of cellphones daily
- Perspective: Curbing data use is key to reining in NSA
- Lavabit-DOJ dispute zeroes in on encryption key ownership
Read more about Privacy in Computerworld's Privacy Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts