The Times West Virginian

Headline News

June 10, 2013

NSA claims know-how to ensure no illegal spying

Agency fighting back after revelations of surveillance programs raise privacy concerns

WASHINGTON — The supersecret agency with the power and legal authority to gather electronic communications worldwide to hunt U.S. adversaries says it has the technical know-how to ensure it’s not illegally spying on Americans.

But mistakes do happen in data-sifting conducted mostly by machines, not humans. Sometimes, former intelligence officials say, that means intelligence agencies destroy material they should not have seen, passed to them by the Fort Meade, Md.-based National Security Agency.

The eavesdropping, code-breaking agency is fighting back after last week’s revelations in the media of two surveillance programs that have raised privacy concerns.

One program collects hundreds of millions of U.S. phone records. The second gathers audio, video, email, photographic and Internet search usage of foreign nationals overseas, and probably some Americans in the process, who use major providers such as Microsoft, Google, Apple and Yahoo.

The programs were first reported in a series of articles published by The Guardian newspaper. On Sunday it identified Edward Snowden, a 29-year-old American who works as contract employee at the National Security Agency, as the source of the disclosures. The newspaper said it was publishing the identity of Snowden, a former technical assistant for the CIA and current employee of defense contractor Booz Allen Hamilton, at his request.

“I have no intention of hiding who I am because I know I have done nothing wrong,” he was quoted as saying.

The National Security Agency filed a criminal report with the Justice Department in relation to the leaks. The director of national intelligence, James Clapper, has stated repeatedly that the NSA’s programs do not target U.S. citizens and that the agency uses a process known as “minimization” to sift out data from “any U.S. persons whose communications might be incidentally intercepted.”

His statement Saturday said that “the dissemination of information about U.S. persons is expressly prohibited unless it is necessary to understand foreign intelligence ... is evidence of a crime or indicates a threat of death or serious bodily harm.”

While the NSA has deferred any public comment to Clapper, it did offer an internal article written by director of compliance John DeLong, who is in charge of making sure the NSA protects Americans’ privacy.

DeLong writes that privacy protections are being written into the technology that sifts the information, “which allows us to augment — not wholly replace — human safeguards.”

The NSA also uses “technology to record and review our activities. ... Sometimes, where appropriate, we even embed legal and policy guidance directly into our IT architecture.”

What that means is that the data sifting is mostly done not by humans, but by computers, following complicated algorithms telling them what to look for and who has a right to see it, according to Ronald Marks, a former CIA official.

“Through software, you can search for key words and key phrases linking a communication to a particular group or individual that would fire it off to individual agencies that have interest in it,” just like Amazon or Google scans millions of emails and purchases to track consumer preferences, explained Marks, author of “Spying in America in the Post 9/11 World.”

Detailed algorithms try to determine whether something is U.S. citizen-related or not. “It shows analysts, ‘we’ve got a U.S. citizen here, so we’ve got to be careful with it,’” he said.

But the process isn’t perfect, and sometimes what should be private information reaches agencies not authorized to see it.

In that case, there are policies in place to “destroy that kind of information not file it or keep it if an American’s name coincidentally or serendipitously comes up,” John Negroponte, the first director of national intelligence, said in an Associated Press interview Friday.

Marks said that “when information gets sent to the CIA that shouldn’t, it gets destroyed, and a note sent back to NSA saying, ‘You shouldn’t have sent that.’” He added, “Mistakes get made, but my own experience on the inside of it is, they tend to be really careful about it.”

Michael Hayden, who led both the NSA and CIA, said the government doesn’t touch the phone records unless an individual is connected to terrorism.

He described on “Fox News Sunday” how it works if a U.S. intelligence agent seized a cellphone at a terrorist hideout in Pakistan.

“It’s the first time you’ve ever had that cellphone number. You know it’s related to terrorism because of the pocket litter you’ve gotten in that operation,” Hayden said. “You simply ask that database, ‘Hey, any of you phone numbers in there ever talked to this phone number in Waziristan?’”

Hayden said the Obama administration had expanded the scope of the surveillance, but that oversight by lawmakers and the Foreign Intelligence Surveillance Court also had grown because of changes in the law.

U.S. lawmakers who appeared on the Sunday talk shows argued the pros and cons of the surveillance programs.

The head of the Senate Intelligence Committee, Democrat Dianne Feinstein of California, told ABC’s “This Week” that the phone program had helped disrupt a 2009 plot to bomb New York City’s subways and played a role in the case against an American who scouted targets in Mumbai, India, before a deadly terrorist attack there in 2008.

Democratic Sen. Mark Udall of Colorado said on CNN’s “State of the Union” that he was not “convinced that the collection of this vast trove of data has led to disruption of plots” against the U.S. He also said he expects “the government to protect my privacy, and it feels like that isn’t what’s been happening.”

The NSA was founded in 1952, but only years later was it publicly acknowledged, which explains the nickname, “No Such Agency.”

The agency also includes the Central Security Service, the military arm of code-breakers who work jointly with the agency. The two services have their headquarters on a compound that’s technically part of Fort Meade, though it’s slightly set apart from the 5,000-acre Army base.

Visible from a main highway, the tightly guarded compound requires the highest of clearances to enter and is equipped with electronic means to ward off an attack by hackers.

Other NSA facilities in Georgia, Texas, Colorado and Hawaii duplicate much of the headquarters’ brain and computer power in case a terrorist attack takes out the main location, though each focuses on a different part of the globe.

A new million-square-foot storage facility in Salt Lake City will give the agency untold additional capacity to store the massive amounts of data it collects, as well as adding to its analytical capability.

“NSA is the elephant of the U.S. intelligence community, the biggest organization by far with the most capability and (literally) the most memory,” said former senior CIA official Bruce Riedel, who now runs the Brookings Intelligence Project.

NSA’s experts include mathematicians and cryptologists, a term that means everything from breaking codes to learning and translating multiple foreign languages. There also are computer hackers who engage in offensive attacks like the one the U.S. and Israel are widely believed to have been part of, planting the Stuxnet virus into Iranian nuclear hardware, damaging Iran’s nuclear development program in 2010.

NSA workers are notoriously secretive. They’re known for keeping their families in the dark about what they do, including their hunt for terror mastermind Osama bin Laden. NSA code-breakers were an essential part of the team that tracked down bin Laden at a compound in Pakistan in 2011.

Their mission tracking al-Qaida and related terrorist groups continues, with NSA analysts and operators sent out to every conflict zone and overseas U.S. post, in addition to surveillance and analysis conducted at headquarters outside Washington.

1
Text Only
Headline News
  • U.S. outlines case against Russia on downed plane

    Video of a rocket launcher, one surface-to-air missile missing, leaving the likely launch site. Imagery showing the firing. Calls claiming credit for the strike. Recordings said to reveal a cover-up at the crash site.

    July 21, 2014

  • James Garner Obit.jpg 'Maverick' star James Garner, 86, dies in California

     Actor James Garner, whose whimsical style in the 1950s TV Western "Maverick" led to a stellar career in TV and films such as "The Rockford Files" and his Oscar-nominated "Murphy's Romance," has died, police said. He was 86.

    July 20, 2014 1 Photo

  • Given life term, drug offender hopes for clemency

    From the very start, Scott Walker refused to believe he would die in prison.
    Arrested and jailed at 25, then sent to prison more than two years later, Walker couldn’t imagine spending his life behind bars for dealing drugs. He told himself this wasn’t the end, that someday he’d be released. But the years passed, his appeals failed and nothing changed.

    July 20, 2014

  • Teen’s death puts focus on caffeine powder dangers

    A few weeks before their prom king’s death, students at an Ohio high school had attended an assembly on narcotics that warned about the dangers of heroin and prescription painkillers.
    But it was one of the world’s most widely accepted drugs that killed Logan Stiner — a powdered form of caffeine so potent that as little as a single teaspoon can be fatal.

    July 20, 2014

  • Monitors try to secure Ukraine plane crash site

    International monitors moved gingerly Saturday through fields reeking of the decomposing corpses that fell from a Malaysian airliner shot down over rebel-held eastern Ukraine, trying to secure the sprawling site in hopes that a credible investigation can be conducted.
    But before inspectors ever reach the scene, doubts arose about whether evidence was being compromised.

    July 20, 2014

  • Without radar, missile may not have identified jet

    If Ukrainian rebels shot down the Malaysian jetliner, killing 298 people, it may have been because they didn’t have the right systems in place to distinguish between military and civilian aircraft, experts said Saturday.
    American officials said Friday that they believe the Boeing 777 was brought down by an SA-11 missile fired from an area of eastern Ukraine controlled by pro-Russian separatists.

    July 20, 2014

  • For Obama, foreign crises grow more challenging

    Surveying a dizzying array of international crises, President Barack Obama stated the obvious: “We live in a complex world and at a challenging time.”
    And then suddenly, only a day later, the world had grown much more troubling, the challenges even more confounding.

    July 20, 2014

  • U.S.: Can’t rule out Russian role in plane downing

    U.S. Ambassador Samantha Power told an emergency meeting of the U.N. Security Council on Friday that the United States cannot rule out that Russia helped in the launch of the surface-to-air missile that shot down a Malaysia Airlines jet over eastern Ukraine, killing all 298 people on board.

    July 19, 2014

  • Clinton papers: Of Iraq, bin Laden and Supreme Court

    President Bill Clinton’s advisers carefully considered how to explain the president’s military action against Iraq in 1998 as the House was debating his impeachment, according to records from the Clinton White House that were released Friday. The documents also touch upon Osama bin Laden, consideration of military action in Haiti in 1994 and preparationsfor Supreme Court nomination hearings.

    July 19, 2014

  • Panel supports early release for 46K drug felons

    Tens of thousands of federal inmates serving time for drug crimes may be eligible for early release under a cost-cutting proposal adopted Friday that would dramatically reduce the nation’s prison population over time.

    July 19, 2014

House Ads
Featured Ads