FBI, CIA can query US communications collected by NSA
The FBI doesn't track the number of US searches it does on data collected for foreign intelligence purposes
IDG News Service - The FBI and CIA can query the content of U.S. residents' electronic communications that the National Security Agency inadvertently collects when targeting foreign terrorism suspects, an intelligence official said.
While privacy advocates have objected to a so-called "backdoor search loophole" allowing the NSA access to electronic communications by U.S. residents, it was unclear until now whether other agencies also had access to those emails, phone calls and other communications.
The information came out in a letter sent by the U.S. Office of the Director of National Intelligence to Sen. Ron Wyden, an Oregon Democrat.
While the CIA and NSA conducted thousands of searches targeting U.S. communications in 2013, the FBI does not track the number of searches it does, according to the ODNI's letter. In any case, both the CIA and FBI have access to communications accessed by the NSA, the letter said.
The CIA and FBI are allowed to search that information for "foreign intelligence information," and the FBI also to search it to "find and extract evidence of a crime," Deirdre Walsh, ODNI's director of legislative affairs, wrote in the letter.
The letter was sent in response to a question Wyden had asked, during a June 5 hearing, about the number of U.S. searches the NSA was conducting through the Foreign Intelligence Surveillance Act (FISA), a law designed to allow surveillance of foreign suspects.
"The queries in question are lawful, limited in scope, and subject to oversight as approved by the Foreign Intelligence Surveillance Court," Walsh wrote in response. "Contrary to some claims, there is no loophole in the law, nor is the Intelligence Community conducting unlawful or 'backdoor searches' of communications of U.S. persons."
Wyden, a longtime critic of NSA surveillance programs, said searches by the CIA and FBI raise serious questions.
"When the FBI says it conducts a substantial number of searches and it has no idea of what the number is, it shows how flawed this system is and the consequences of inadequate oversight," Wyden said in a statement Monday. "This huge gap in oversight is a problem now, and will only grow as global communications systems become more interconnected."
Walsh's letter, sent to Wyden last week and posted by Wyden's office Monday, said the FBI "does not track how many queries it conducts using U.S. person identifiers."
That's troubling, Wyden said. "The findings transmitted to me raise questions about whether the FBI is exercising any internal controls over the use of backdoor searches including who and how many government employees can access the personal data of individual Americans," he said.
The U.S. Foreign Intelligence Surveillance Court has said the NSA acquires more than 250 million Internet communications every year under the FISA authority, Wyden added. "Even if U.S. communications make up a small fraction of that total, the number of U.S. communications being collected is potentially quite large," he said
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- 5 Customers Deliver Virtual Desktops and Apps to Empower a Modern Workforce
- Learn how Citrix solutions helped 5 companies realize the full value of desktop virtualization through a project-by-project approach based on key business priorities.
- Top 10 Reasons to Strengthen Information Security with Desktop Virtualization
- Regain control and reduce risk without sacrificing business productivity and growth
- IDC MarketScape: Worldwide Client Virtualization Software 2013 Vendor Assessment
- IDC has placed Citrix in the 2013 IDC MarketScape Leaders Category once again noting that, "Citrix's position reflects the company's market leadership and...
- Infographic: Top Use Cases for Desktop Virtualization
- A wide range of business issues is driving IT toward desktop virtualization. One solution-Citrix XenDesktop with FlexCast technology-helps IT teams empower their entire... All Government IT White Papers
- What Does it Take to Deliver a Superior Customer Experience? The Two Top-Rated Online Retailers, B&H Photo and Crutchfield Electronics, Share Their Secrets Discuss practical CX tools and service methods such as contact center agents and the use of realtime speech analytics to help contact center...
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their...
- DevOps with PureApplication System: Reduce cost and speed delivery with an integrated IBM Cloud solution Join this webcast to hear what ING Netherlands has been able to achieve while deploying DevOps tools from IBM Rational. An ING executive...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- All Government IT Webcasts