Quantcast
Get breaking news alerts via email

Click here to manage your alerts
Intelligence chief defends Internet spying program
First Published Jun 08 2013 05:23 pm • Last Updated Jun 08 2013 05:29 pm

Washington • Eager to quell a domestic furor over U.S. spying, the nation’s top intelligence official stressed Saturday that a previously undisclosed program for tapping into Internet usage is authorized by Congress, falls under strict supervision of a secret court and cannot intentionally target a U.S. citizen. He decried the revelation of that and another intelligence-gathering program as reckless.

For the second time in three days, Director of National Intelligence James Clapper took the rare step of declassifying some details of an intelligence program to respond to media reports about counterterrorism techniques employed by the government.

Join the Discussion
Post a Comment

"Disclosing information about the specific methods the government uses to collect communications can obviously give our enemies a ‘playbook’ of how to avoid detection," he said in a statement.

Clapper said the data collection under the program, first unveiled by the newspapers The Washington Post and The Guardian, was with the approval of the secret Foreign Intelligence Surveillance Act Court and with the knowledge of Internet service providers. He emphasized that the government does not act unilaterally to obtain that data from the servers of those providers.

Clapper’s reaction came a day after President Barack Obama defended the counterterrorism methods and said Americans need to "make some choices" in balancing privacy and security. But the president’s response and Clapper’s unusual public stance underscore the nerve touched by the disclosures and the sensitivity of the Obama administration to any suggestion that it is trampling on the civil liberties of Americans.

Late Thursday, Clapper declassified some details of a phone records collection program employed by the National Security Agency that aims to obtain from phone companies on an "ongoing, daily basis" the records of its customers’ calls. Clapper said that under that court-supervised program, only a small fraction of the records collected ever get examined because most are unrelated to any inquiries into terrorism activities.

His statement and declassification Saturday addressed the Internet scouring program, code-named PRISM, that allowed the NSA and FBI to tap directly into the servers of major U.S. Internet companies such as Google, Apple, Microsoft, Facebook and AOL. Like the phone-records program, PRISM was approved by a judge in a secret court order. Unlike that program, however, PRISM allowed the government to seize actual conversations: emails, video chats, instant messages and more.

Clapper said the program, authorized in the USA Patriot Act, has been in place since 2008, the last year of the George W. Bush administration, and "has proven vital to keeping the nation and our allies safe.

"It continues to be one of our most important tools for the protection of the nation’s security," he said.

Among the previously classified information about the Internet data collection that Clapper revealed:


story continues below
story continues below

—It is an internal government computer system that allows the government to collect foreign intelligence information from electronic communication service providers under court supervision.

—The government does not unilaterally obtain information from the servers of U.S. electronic communication service providers. It requires approval from a FISA Court judge and is conducted with the knowledge of the provider and service providers supply information when they are legally required to do so.

—The program seeks foreign intelligence information concerning foreign targets located outside the United States under court.

—The government cannot target anyone under the program unless there is an "appropriate, and documented, foreign intelligence purpose" for the acquisition. Those purposes include prevention of terrorism, hostile cyber activities or nuclear proliferation. The foreign target must be reasonably believed to be outside the United States. It cannot intentionally target any U.S. citizen or any person known to be in the U.S.

—The dissemination of information "incidentally intercepted" about a U.S. person is prohibited unless it is "necessary to understand foreign intelligence or assess its importance, is evidence of a crime, or indicates a threat of death or serious bodily harm.

The Post and the Guardian cited confidential slides and other documents about PRISM for their reports. They named Google, Facebook, Microsoft Corp., Apple Inc., Yahoo Inc., AOL Inc. and Paltalk as companies whose data has been obtained.

All the companies have issued statements asserting that they aren’t voluntarily handing over user data. They also are emphatically rejecting newspaper reports indicating that PRISM has opened a door for the NSA to tap directly on the companies’ data centers whenever the government pleases.

In his statement, Clapper appeared to support that claim by stressing that the government did not act unilaterally, but with court authority.

The Guardian reported Saturday that it had obtained top-secret documents detailing an NSA tool, called Boundless Informant, that maps the information it collects from computer and telephone networks by country. The paper said the documents show NSA collected almost 3 billion pieces of intelligence from U.S. computer networks over a 30-day period ending in March, which the paper says calls into question NSA statements that it cannot determine how many Americans may be accidentally included in its computer surveillance.

NSA spokesperson Judith Emmel said Saturday that "current technology simply does not permit us to positively identify all of the persons or locations associated with a given communication." She said it may be possible to determine that a communication "traversed a particular path within the Internet," but added that "it is harder to know the ultimate source or destination, or more particularly the identity of the person represented by the TO:, FROM: or CC: field of an e-mail address or the abstraction of an IP address."

Next Page >


Copyright 2014 The Salt Lake Tribune. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

Top Reader Comments Read All Comments Post a Comment
Click here to read all comments   Click here to post a comment


About Reader Comments


Reader comments on sltrib.com are the opinions of the writer, not The Salt Lake Tribune. We will delete comments containing obscenities, personal attacks and inappropriate or offensive remarks. Flagrant or repeat violators will be banned. If you see an objectionable comment, please alert us by clicking the arrow on the upper right side of the comment and selecting "Flag comment as inappropriate". If you've recently registered with Disqus or aren't seeing your comments immediately, you may need to verify your email address. To do so, visit disqus.com/account.
See more about comments here.
Staying Connected
Videos
Jobs
Contests and Promotions
  • Search Obituaries
  • Place an Obituary

  • Search Cars
  • Search Homes
  • Search Jobs
  • Search Marketplace
  • Search Legal Notices

  • Other Services
  • Advertise With Us
  • Subscribe to the Newspaper
  • Login to the Electronic Edition
  • Frequently Asked Questions
  • Contact a newsroom staff member
  • Access the Trib Archives
  • Privacy Policy
  • Missing your paper? Need to place your paper on vacation hold? For this and any other subscription related needs, click here or call 801.204.6100.