The Times West Virginian

Headline News

June 10, 2013

NSA claims know-how to ensure no illegal spying

Agency fighting back after revelations of surveillance programs raise privacy concerns

WASHINGTON — The supersecret agency with the power and legal authority to gather electronic communications worldwide to hunt U.S. adversaries says it has the technical know-how to ensure it’s not illegally spying on Americans.

But mistakes do happen in data-sifting conducted mostly by machines, not humans. Sometimes, former intelligence officials say, that means intelligence agencies destroy material they should not have seen, passed to them by the Fort Meade, Md.-based National Security Agency.

The eavesdropping, code-breaking agency is fighting back after last week’s revelations in the media of two surveillance programs that have raised privacy concerns.

One program collects hundreds of millions of U.S. phone records. The second gathers audio, video, email, photographic and Internet search usage of foreign nationals overseas, and probably some Americans in the process, who use major providers such as Microsoft, Google, Apple and Yahoo.

The programs were first reported in a series of articles published by The Guardian newspaper. On Sunday it identified Edward Snowden, a 29-year-old American who works as contract employee at the National Security Agency, as the source of the disclosures. The newspaper said it was publishing the identity of Snowden, a former technical assistant for the CIA and current employee of defense contractor Booz Allen Hamilton, at his request.

“I have no intention of hiding who I am because I know I have done nothing wrong,” he was quoted as saying.

The National Security Agency filed a criminal report with the Justice Department in relation to the leaks. The director of national intelligence, James Clapper, has stated repeatedly that the NSA’s programs do not target U.S. citizens and that the agency uses a process known as “minimization” to sift out data from “any U.S. persons whose communications might be incidentally intercepted.”

His statement Saturday said that “the dissemination of information about U.S. persons is expressly prohibited unless it is necessary to understand foreign intelligence ... is evidence of a crime or indicates a threat of death or serious bodily harm.”

While the NSA has deferred any public comment to Clapper, it did offer an internal article written by director of compliance John DeLong, who is in charge of making sure the NSA protects Americans’ privacy.

DeLong writes that privacy protections are being written into the technology that sifts the information, “which allows us to augment — not wholly replace — human safeguards.”

The NSA also uses “technology to record and review our activities. ... Sometimes, where appropriate, we even embed legal and policy guidance directly into our IT architecture.”

What that means is that the data sifting is mostly done not by humans, but by computers, following complicated algorithms telling them what to look for and who has a right to see it, according to Ronald Marks, a former CIA official.

“Through software, you can search for key words and key phrases linking a communication to a particular group or individual that would fire it off to individual agencies that have interest in it,” just like Amazon or Google scans millions of emails and purchases to track consumer preferences, explained Marks, author of “Spying in America in the Post 9/11 World.”

Detailed algorithms try to determine whether something is U.S. citizen-related or not. “It shows analysts, ‘we’ve got a U.S. citizen here, so we’ve got to be careful with it,’” he said.

But the process isn’t perfect, and sometimes what should be private information reaches agencies not authorized to see it.

In that case, there are policies in place to “destroy that kind of information not file it or keep it if an American’s name coincidentally or serendipitously comes up,” John Negroponte, the first director of national intelligence, said in an Associated Press interview Friday.

Marks said that “when information gets sent to the CIA that shouldn’t, it gets destroyed, and a note sent back to NSA saying, ‘You shouldn’t have sent that.’” He added, “Mistakes get made, but my own experience on the inside of it is, they tend to be really careful about it.”

Michael Hayden, who led both the NSA and CIA, said the government doesn’t touch the phone records unless an individual is connected to terrorism.

He described on “Fox News Sunday” how it works if a U.S. intelligence agent seized a cellphone at a terrorist hideout in Pakistan.

“It’s the first time you’ve ever had that cellphone number. You know it’s related to terrorism because of the pocket litter you’ve gotten in that operation,” Hayden said. “You simply ask that database, ‘Hey, any of you phone numbers in there ever talked to this phone number in Waziristan?’”

Hayden said the Obama administration had expanded the scope of the surveillance, but that oversight by lawmakers and the Foreign Intelligence Surveillance Court also had grown because of changes in the law.

U.S. lawmakers who appeared on the Sunday talk shows argued the pros and cons of the surveillance programs.

The head of the Senate Intelligence Committee, Democrat Dianne Feinstein of California, told ABC’s “This Week” that the phone program had helped disrupt a 2009 plot to bomb New York City’s subways and played a role in the case against an American who scouted targets in Mumbai, India, before a deadly terrorist attack there in 2008.

Democratic Sen. Mark Udall of Colorado said on CNN’s “State of the Union” that he was not “convinced that the collection of this vast trove of data has led to disruption of plots” against the U.S. He also said he expects “the government to protect my privacy, and it feels like that isn’t what’s been happening.”

The NSA was founded in 1952, but only years later was it publicly acknowledged, which explains the nickname, “No Such Agency.”

The agency also includes the Central Security Service, the military arm of code-breakers who work jointly with the agency. The two services have their headquarters on a compound that’s technically part of Fort Meade, though it’s slightly set apart from the 5,000-acre Army base.

Visible from a main highway, the tightly guarded compound requires the highest of clearances to enter and is equipped with electronic means to ward off an attack by hackers.

Other NSA facilities in Georgia, Texas, Colorado and Hawaii duplicate much of the headquarters’ brain and computer power in case a terrorist attack takes out the main location, though each focuses on a different part of the globe.

A new million-square-foot storage facility in Salt Lake City will give the agency untold additional capacity to store the massive amounts of data it collects, as well as adding to its analytical capability.

“NSA is the elephant of the U.S. intelligence community, the biggest organization by far with the most capability and (literally) the most memory,” said former senior CIA official Bruce Riedel, who now runs the Brookings Intelligence Project.

NSA’s experts include mathematicians and cryptologists, a term that means everything from breaking codes to learning and translating multiple foreign languages. There also are computer hackers who engage in offensive attacks like the one the U.S. and Israel are widely believed to have been part of, planting the Stuxnet virus into Iranian nuclear hardware, damaging Iran’s nuclear development program in 2010.

NSA workers are notoriously secretive. They’re known for keeping their families in the dark about what they do, including their hunt for terror mastermind Osama bin Laden. NSA code-breakers were an essential part of the team that tracked down bin Laden at a compound in Pakistan in 2011.

Their mission tracking al-Qaida and related terrorist groups continues, with NSA analysts and operators sent out to every conflict zone and overseas U.S. post, in addition to surveillance and analysis conducted at headquarters outside Washington.

1
Text Only
Headline News
  • Colorado deaths stoke worries about pot edibles

    A college student eats more than the recommended dose of a marijuana-laced cookie and jumps to his death from a hotel balcony. A husband with no history of violence is accused of shooting his wife in the head, possibly after eating pot-infused candy.

    April 19, 2014

  • Everest avalanche kills at least 12

    An avalanche swept down a climbing route on Mount Everest early Friday, killing at least 12 Nepalese guides and leaving four missing in the deadliest disaster on the world’s highest peak. Several more were injured.

    April 19, 2014

  • Diplomacy doesn’t move insurgents in Ukraine

    Pro-Russian insurgents defiantly refused Friday to surrender their weapons or give up government buildings in eastern Ukraine, despite a diplomatic accord reached in Geneva and overtures from the government in Kiev.

    April 19, 2014

  • Clinton to Obama: Many parallels

    Thousands of pages of documents from President Bill Clinton’s White House affirm a longtime adage: The more things change, the more they stay the same.
    As Clinton prepared for an August 1994 news conference in which he hoped to build public support for his struggling — and ultimately unsuccessful — health care overhaul, he told his advisers: “A lot of them want to know they can keep their own plan if they like it.”

    April 19, 2014

  • Obama voices skepticism on Russia in Ukraine

    President Barack Obama conveyed skepticism Thursday about Russian promises to de-escalate a volatile situation in Ukraine, and said the United State and its allies are ready to impose fresh sanctions if Moscow doesn’t make good on its commitments.

    April 18, 2014

  • President defending health-care law good for some Democrats

    President Barack Obama’s full-throated defense of his health-care overhaul seems perfectly timed for Democrats who want their party to embrace the law more enthusiastically.
    At a White House news conference Thursday, Obama noted that health insurance enrollments under the new law are higher than expected, and costs are lower.

    April 18, 2014

  • Deal reached on calming Ukraine tensions — for now

    In a surprise accord, Ukraine and Russia agreed Thursday on tentative steps to halt violence and calm tensions along their shared border after more than a month of Cold War-style military posturing triggered by Moscow’s annexation of Crimea.

    April 18, 2014

  • Boston Marathon organizers confident of safe race

    The arrest of a man with a rice cooker in his backpack near the Boston Marathon finish line led police to step up patrols Wednesday, while organizers sought to assure the city and runners of a safe race next week.
    The actions of the man, whose mother said he had a mental disorder, rattled nerves as Boston prepared for the annual race, but authorities said they did not consider it a security breach.

    April 17, 2014

  • Screen Shot 2014-04-16 at 12.51.22 PM.png VIDEO: Toddler climbs into vending machine

    A child is safe after climbing into and getting stuck inside a claw crane machine at a Lincoln, Neb., bowling alley Monday.

    April 16, 2014 1 Photo

  • Solemn tributes mark Boston Marathon bombing anniversary

    Survivors, first responders and relatives of those killed in the Boston Marathon bombing marked the anniversary Tuesday with tributes that combined sorrow over the loss of innocent victims with pride over the city’s resilience in the face of a terror attack.

    April 16, 2014

House Ads
Featured Ads