NSA cites Reagan-era executive order to justify collection of cell-phone location data
Agency insists program is legal and applies only to foreign targets
Computerworld - The National Security Agency on Friday cited a 1981 executive order signed by then-President Ronald Reagan as the authority under which it is collecting location data daily from tens of millions of cell phones around the world.
In a statement, the spy agency maintained that the data collection program, dubbed CO-TRAVELER, was solely about foreign communications and complies fully with restrictions in the Foreign Intelligence Surveillance Act (FISA).
"We are not intentionally acquiring domestic information through this capability. This collection does not violate FISA," the NSA stated.
The agency's statement is in response to a story in the Washington Post earlier this week describing one of the biggest NSA data collection programs revealed by Edward Snowden, the former NSA contractor turned document leaker.
Under the program, the NSA is collecting a staggering 5 billion location-related records from cell phones globally. Much of the data is gathered directly from the networks of major U.S. and overseas mobile service providers. Millions of those records are thought to belong to Americans who travel abroad with their cell phones.
The collected data is fed into a massive database from where it's combed with a suite of sophisticated analytic tools to help NSA analysts find cell-phone users who might be communicating or traveling with foreign intelligence targets.
The analytics suite includes tools that can map the date, time and location of individual cell phones around the world. Other tools help the NSA track the movements of large numbers of mobile devices and detect hidden relationships in the data.
News of the program has once again ignited protests from several quarters and is being seen as the most egregious example yet of the NSA's overreach in its effort to foil foreign terrorists. Groups like the Electronic Frontier Foundation and the American Civil Liberties Union have dubbed the data collection as unconstitutional and likened it to dragnet surveillance conducted without any legal authority.
In its statement Friday, the NSA however insisted that the program is fully authorized under Executive Order 12333 from 1981. The order directs U.S. intelligence agencies to develop foreign intelligence information for the president and the National Security Council. The order authorizes intelligence agencies to use "all means consistent with applicable United States law" to collect foreign intelligence information that is relevant to national security.
According to the NSA, the data collection described in the Post article falls under EO 12333 authorities.
"This is solely about foreign communications. NSA tries to avoid the acquisition of U.S. person communications during EO 12333 operations and also uses collection methodologies to comply with the restrictions in FISA," the agency said.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts