icon bookmark-bicon bookmarkicon cameraicon checkicon chevron downicon chevron lefticon chevron righticon chevron upicon closeicon v-compressicon downloadicon editicon v-expandicon fbicon fileicon filtericon flag ruicon full chevron downicon full chevron lefticon full chevron righticon full chevron upicon gpicon insicon mailicon moveicon-musicicon mutedicon nomutedicon okicon v-pauseicon v-playicon searchicon shareicon sign inicon sign upicon stepbackicon stepforicon swipe downicon tagicon tagsicon tgicon trashicon twicon vkicon yticon wticon fm
4 Jun, 2015 19:11

Snowden leak: NSA uses warrantless web surveillance to watch cyberattacks

Snowden leak: NSA uses warrantless web surveillance to watch cyberattacks

Classified documents from the trove of former intelligence contractor Edward Snowden now reveal that the United States National Security Agency secretly had its powers expanded under Pres. Obama to go after hackers.

A report published on Thursday this week by journalists with the New York Times and ProPublica shows that sensitive NSA documents disclosed by Snowden detail how the Department of Justice agreed in 2012 to give the spy agency new authorities with regards to monitoring cyberattacks unfolding on US-linked networks.

That year, the joint report reveals, two previously secret memos authored by the DoJ lawyers gave NSA analysts the go ahead “to begin hunting on internet cables, without a warrant and on American soil, for data linked to computer intrusions originating abroad,” according to the journalists.

Although the Justice Dept. ultimately agreed only to let the NSA monitor attacks believed to be stemming from foreign government involvement, the documents show that the agency wanted to have the power to target hackers even in instances where a link couldn’t be established.

“It should come as no surprise that the US government gathers intelligence on foreign powers that attempt to penetrate US networks and steal the private information of US citizens and companies,” Brian Hale, the spokesman for the Office of the Director of National Intelligence, told the reporters, adding that “targeting overseas individuals engaging in hostile cyber activities on behalf of a foreign power is a lawful foreign intelligence purpose.”

It’s not just the Patriot Act. The NSA has another secret legal interpretation of surveillance law. http://t.co/iPOdzQGUql#SnowdenDocs

— Julia Angwin (@JuliaAngwin) June 4, 2015


Two years ago this week, the first news articles to make use of pilfered NSA documents from the Snowden trove surfaced in the press, paving the way for a discussion on the US intelligence community’s use of previously unpublicized surveillance tools and tactics. Yet while the first spy program exposed through those leaks – the bulk collection of millions of phone records on a regular basis by the NSA – was reined in to a degree as recently as this week, other endeavors revealed through the Snowden leak concerning the agency’s operations remain well in effect.

US law authorizing the NSA’s activities prohibits the agency from targeting American citizens. As with past programs unveiled through the Snowden disclosures, though, critics say the broad powers provided to the government nevertheless raise questions about whether or not the privacy of innocent Americans is being compromised.

According to this week’s report, the Justice Dept. gave the NSA approval in 2012 to query unique “cybersignatures” and internet addresses linked to attacks against American computer networks. The Snowden documents show that the DoJ interpreted a previous secret surveillance court ruling involving the monitoring of foreign governments to justify the decision, yet ensured restrictions were in place to rule out the collection of US-specific information.

“That rule, the NSA soon complained, left a ‘huge collection gap against cyber threats to the nation’ because it is often hard to know exactly who is behind an intrusion,” the journalists wrote. “So the NSA, in 2012, began pressing to go back to the surveillance court and seek permission to use the program explicitly for cybersecurity purposes. That way, it could monitor international communications for any ‘malicious cyber activity,’ even if it did not yet know who was behind the attack.”

The FBI has access to the NSA's wiretaps of the fiber optic cables that make up the Internet backbone pic.twitter.com/EnsFt2t2BM

— Trevor Timm (@trevortimm) June 4, 2015


At the same time, their report continues, the FBI began to benefit from an arrangement that allowed them to use the NSA’s system to monitor traffic going through internet “chokepoints operated by US providers through which international communications enter and leave the United States.”

Jonathan Mayer, a cybersecurity scholar at Stanford Law School, told the Times and ProPublica reporters that the revelations put the activities of NSA, an organization tasked with international intelligence gathering, “smack into law enforcement land.”

“That’s a major policy decision about how to structure cybersecurity in the US and not a conversation that has been had in public,” he said.

In the aftermath of one of the biggest single acts of intelligence gathering reform in modern American history, Rep. Zoe Lofgren (D-California), a critic of the NSA’s surveillance operations, told the Guardian that the revelations suggest further changes are still needed, and needed urgently.

Contrary to those who hailed the USA Freedom Act, the NSA reform bill passed earlier this week, Lofgren said the Times and ProPublica report exemplifies the fact that passage “did not end bulk collection of communications and data.”

“To add insult to injury, under this program victims of cybercrime are doubly harmed when their government collects and searches their private stolen communications and data,” she said.

Podcasts
0:00
28:26
0:00
25:13