15

The latest on phone spying, data mining and the Obama administration

Our Washington correspondent on emerging details about U.S. surveillance


 

(Charles Dharapak, AP Photo)

 

Glenn Greenwald, a constitutional lawyer turned civil libertarian journalist/author who now writes for the UK newspaper, The Guardian, was leaked documents detailing two massive U.S. government data-mining programs that collect data on the phone calls of U.S. citizens and Internet communications of foreigners.

1. Greenwald obtained a copy of a top-secret court order from April authorizing the National Security Agency to collect on a “daily, ongoing basis” bulk information on all calls made from a subsidiary of the U.S. phone company Verizon. U.S. senators briefed on the program said it is one of many such orders that have been in place at telecommunications providers for seven years. The contents of the calls are not eavesdropped upon through the program, but the government has been collecting phone numbers, call-duration information and other identifying information, using it to look for networks of suspected terrorists.

2. Greenwald separately obtained documents that outline a secret NSA program that for the past six years has allowed the U.S. government to gather user data about non-U.S. citizens abroad from Internet companies Microsoft, Yahoo,  Google, Facebook, Paltalk, AOL, Skype, YouTube, Apple. (The Guardian and, separately, the Washington Post also portrayed this effort as involving direct tapping of the companies’ servers, but the companies’ executives denied giving the government a backdoor to their raw data.) The access allows officials to collect material “including search history, the content of emails, file transfers and live chats” from non-U.S. citizens outside the U.S.

In a statement Thursday evening, the Director of National Intelligence, James Clapper, strongly condemned the unauthorized leak of the court order as harmful to national security. He stressed the court order did not give the NSA access to the contents of telephone conversations or identifying information about the callers. Clapper wrote that there are strict rules around accessing the information, which he described as “meta-data.” It can only be queried when there is “reasonable suspicion, based on specific facts” that a query has to do with a foreign terrorist organization. Handling of the information is overseen by the Justice Department and a special court.

In a separate statement about the “PRISM” program, Clapper did not deny its existence, but emphasized, “it cannot be used to intentionally target any U.S. citizen, any other U.S. person, or anyone located within the United States.” He also wrote, “information collected under this program is among the most important and valuable foreign intelligence information we collect, and is used to protect our nation from a wide variety of threats.”

Coming on the heels of disclosures that the Obama administration had used subpoenas to demand telephone-calling logs for reporters at the Associated Press as part of a national security leak investigation, the new documents highlight the extent to which the Obama administration has embraced the ever-growing surveillance state as a counter-terrorism and national security tool.

Obama is now being accused by civil libertarians of using the same policies he criticized as a candidate who ran on a platform of “change” from the policies of George W. Bush. However, defenders of Obama have responded that while  Bush claimed a broad power as commander-in-chief to carry out his policies — including warrantless eavesdropping on U.S. citizens in the course of terrorism investigations — the Obama-era policies have been approved by courts and authorized by Congress. As has been observed earlier in his presidency, Obama turned out not to be a civil libertarian — and his critique of Bush had more to do with the lack of court and congressional authorization of early Bush policies, than with their content.

This excellent New York Times timeline details the evolution of surveillance policy under the Bush and Obama administrations.

The leaks, coming one after another, also suggest there is a new, high-level Deep Throat within the U.S. security establishment with access to high-level secrets. As the Times noted in a comprehensive take on the disclosures:

The dual revelations, in rapid succession, also suggested that someone with access to high-level intelligence secrets had decided to unveil them in the midst of furor over leak investigations.

Whatever the identity and motives of the individual, there is likely more to come.


 

The latest on phone spying, data mining and the Obama administration

  1. it cannot be used to intentionally target any U.S. citizen, any other U.S. person, or anyone located within the United States.

    Sure. Just like the IRS.

  2. US Democracy like Harper Democracy is an oxymoron.

      • Ha ha still pouting after being caught in a lie hey?

          • Mr Digital analysis there’s no need to get all defensive now, you overreached and were called on it.

          • I wouldn’t expect an unemployed bum to understand why I’m not going to voluntarily do hours of work for someone I dislike.

          • See now you’re over reaching again.
            The reason why I’m posting this late is because I worked today. My small business is affected by the weather, but today was sry enough to get a lot done.
            And there was me thinking Cons were the friends and supporters of small business owners… ha ha sometimes I make me laugh; if it’s not a corporation you can suck up to, you don’t want to know.

  3. Obama’s continued the very worst of Bush’s policy, and introducing a whole bunch of his damaging policies.

    • Bush never went as far as Obama. For instance, Bush ruled out the possibility of monitoring reporters. Obama’s targeted both the AP and Fox news.

  4. it cannot be used to intentionally target any U.S. citizen, any other U.S. person, or anyone located within the United States

    Unless we hold a grudge against someone. Then yeah, we’ll use it.

  5. Maybe this is not entirely the right place for this comment as this is just an accounting of what is known so far (and thanks for this) but I’ll leave it all the same:

    What of the Canadian angle? It seems that US government officials are saying that US citizens data is supposedly protected, but in doing so it also seems they’re explicitly saying that the data of foreign citizens (IE Canadians and everyone else) is open to search via PRISM.

    In other words, the US government is explicitly saying that they have tools that search my (and every other Canadian’s) Gmail and Facebook account for hits every time they run a query while looking for a terrorist or whatever.

    This is my understanding of what is being said, and yet I have seen nothing yet from any Canadian media about this. Even the British press appears focused on how it is an issue of domestic spying as a British agency has access to PRISM, which leaves them able to acquire information on British citizens rather than only foreigners.

    Am I misunderstanding this? This seems like it would be something of interest to the Canadian public if it is correct, so where’s the story?

    • That story violates Journalism’s Hippocratic Oath; Do No Harm to Obama. So you won’t see it here.

  6. Obama originally made me long for the restraint of the Bush administration, then for the foreign policy expertise of the Carter administration and now he makes me long for the transparency, ethics and morals of the Nixon administration. He’s rapidly descending to the worst president in US history.

Sign in to comment.