(AP)—The Obama administration gathered U.S. citizens' Internet data until 2011, continuing a spying program started under President George W. Bush that revealed whom Americans exchanged emails with and the Internet Protocol address of their computer, documents disclosed Thursday show.
The National Security Agency ended the program that collected email logs and timing, but not content, in 2011 because it decided it didn't effectively stop terrorist plots, according to the NSA's director, Gen. Keith Alexander, who also heads the U.S. Cyber Command. He said all data was purged in 2011.
Britain's Guardian newspaper on Thursday released documents detailing the collection, though the program was also described earlier this month by The Washington Post.
The latest revelation follows previous leaks from ex-NSA contractor Edward Snowden, who is presumed hiding at a Moscow airport transit area, waiting to hear whether Ecuador, Iceland or another country might grant him asylum. He fled Hong Kong over the weekend and flew to Russia after being charged with violating American espionage laws.
The collection appears similar to the gathering of U.S. phone records, and seems to overlap with the Prism surveillance program of foreigners on U.S. Internet servers, both revealed by Snowden. U.S. officials have said the phone records can only be checked for numbers dialed by a terrorist suspect overseas. According to the documents published by The Guardian on Thursday, the Internet records show whom they exchanged emails with and the specific numeric address assigned to a computer connected to the Internet, known as the IP, or Internet Protocol, address.
The program, described in a top secret draft report from the NSA inspector general, described the efforts of then-NSA Director Gen. Mike Hayden to fill gaps in intelligence gathering after the Sept. 11, 2001, attacks. One NSA officer quoted in the report described "NSA standing at the U.S. border looking outward for foreign threats" and "the FBI looking within the United States for domestic threats. But no one was looking at the foreign threats coming into the United States. That was the huge gap that NSA wanted to cover."
The draft added that the sweeping phone and Internet data-gathering programs were meant to speed up the process of surveillance of a terrorist suspect overseas, because "the average wait time was between four and six weeks" to get a court order from the Foreign Intelligence Surveillance Court. "Terrorists could have changed their telephone numbers or Internet addresses" before the NSA received permission to spy on them on U.S.-based phone or Internet systems.
Alexander said at a Baltimore conference on cybersecurity that the NSA decided to kill the Internet data gathering program because "it wasn't meeting what we needed and we thought we could better protect civil liberties and privacy by doing away with it."
He said the program was conducted under provisions of the Patriot Act, and that NSA leaders went to the Obama administration and Congress with the recommendation to shut it down.
Shawn Turner, a spokesman for the director of national intelligence, said the program has not resumed.
The Washington Post had described the Internet surveillance in an earlier report, without publishing the documents or releasing as many details. The Post described it as part of four secret surveillance programs—two aimed at phone and Internet metadata, while two more target contents of phone and Internet communications.
Alexander, who has been in Congress frequently for hearings and meetings since the NSA phone and email surveillance was made public, laid out a broad defense of the programs.
He said he worries that more leaks are coming, adding that "every time a capability is revealed we lose our ability to track those targets."
While never mentioning Snowden by name, Alexander said his irresponsible releases of classified information "will have a long term detrimental impact on the intelligence community's ability to detect future attacks."
He declined to provide more details on what the NSA is doing to prevent such leaks in the future. He has said that the agency is changing passwords and improving its ability to track what system administrators are doing.
On Thursday, he said he was looking at how the leak happened and the people involved. He said the NSA can't do its job without contractors because it doesn't have all the talent or access it needs to do the job.
Explore further:US spy chief: Plot against Wall Street foiled
© 2013 The Associated Press. All rights reserved.
More from Physics Forums - General Engineering
Jun 18, 2013
The U.S. foiled a plot to bomb the New York Stock Exchange because of the sweeping surveillance programs at the heart of a debate over national security and personal privacy, officials said Tuesday at a rare ...
Jun 16, 2013
Current and former top U.S. officials on Sunday defended the government's collection of phone and Internet data following new revelations about the secret surveillance programs, saying the operations were ...
Jun 09, 2013
A 29-year-old government contractor revealed himself on Sunday as the source of bombshell leaks of US monitoring of Internet users and phone records, as US intelligence pressed for a criminal probe.
Jun 11, 2013
The Obama administration faced fresh anger Monday at home and abroad over U.S. spy programs that track phone and Internet messages around the world in the hope of thwarting terrorist threats. But a senior ...
Jun 07, 2013
US spies are secretly tapping into servers of nine Internet giants including Apple, Facebook, Microsoft and Google in a vast anti-terror sweep targeting foreigners, explosive reports said Thursday.
Jun 09, 2013
The top U.S. intelligence official stressed Saturday that a previously undisclosed program for tapping into Internet usage is authorized by Congress, falls under strict supervision of a secret court and cannot ...
1 hour ago
(AP)—Hawaii's volcanoes will soon be visible on Google Street View.
2 hours ago
(AP)—Turkish authorities are investigating people who allegedly insulted state officials or incited riots on social media, the deputy prime minister said Thursday, in a sign the government is intent on ...
2 hours ago
The US military is reviewing its rules of engagement to deal with the growing threat of cyber crime, military chief Martin Dempsey said Thursday.
6 hours ago
The Internet has a major impact on the consumers' media habits. The market situation for magazines is changing in line with the continuing increase of online media content. Success will require a completely new business approach. ...
10 hours ago
A new website which gives consumers better access to tailored information on their credit card costs is launched today by The UK Cards Association following a research project undertaken with the Personal ...
11 hours ago
Could a computer distinguish between the moods of a mournful classical movement or an angst-ridden emo rock song? Research to be published in the International Journal of Computational Intelligence Studies, suggests that i ...
(AP)—Hawaii's volcanoes will soon be visible on Google Street View.
Tourists within Europe can use their smartphones without fear of an outrageous bill waiting at home starting from this year's summer holidays, as the European Union is cutting maximum mobile data roaming ...
The US military is reviewing its rules of engagement to deal with the growing threat of cyber crime, military chief Martin Dempsey said Thursday.
(Phys.org) —EVs might be parked in people's minds as second cars of convenience, suitable for around-town errands and small-distance commutes. Forward thinkers are hoping to see EVs do their thing on long-distance ...
(AP)—Turkish authorities are investigating people who allegedly insulted state officials or incited riots on social media, the deputy prime minister said Thursday, in a sign the government is intent on ...
Children with more genetic risks for asthma are not only more likely to develop the condition at a young age, but they are also more likely to continue to suffer with asthma into adulthood. The finding reported by Duke University ...
Gemini Observatory's Planet-Finding Campaign finds that, around many types of stars, distant gas-giant planets are rare and prefer to cling close to their parent stars. The impact on theories of planetary ...
(Phys.org) —Scientists have discovered a diverse multitude of microbes colonizing and thriving on flecks of plastic that have polluted the oceans—a vast new human-made flotilla of microbial communities ...
In stunning color, new biodiversity research from North Carolina State University maps out priority areas worldwide that hold the key to protecting vulnerable species and focusing conservation efforts.
The search for thermoelectrics, exotic materials that convert heat directly into electricity, has received a boost from researchers at the California Institute of Technology and the University of Tokyo, who have found the ...
© Phys.org™ 2003-2013
Spy program gathered Americans' Internet recordsJavascript is currently disabled in your web browser. For full site functionality, it is necessary to enable Javascript. In order to enable it, please see these instructions.1 hour ago by Kimberly Dozier(AP)—The Obama administration gathered U.S. citizens' Internet data until 2011, continuing a spying program started under President George W. Bush that revealed whom Americans exchanged emails with and the Internet Protocol address of their computer, documents disclosed Thursday show.
The National Security Agency ended the program that collected email logs and timing, but not content, in 2011 because it decided it didn't effectively stop terrorist plots, according to the NSA's director, Gen. Keith Alexander, who also heads the U.S. Cyber Command. He said all data was purged in 2011.
Britain's Guardian newspaper on Thursday released documents detailing the collection, though the program was also described earlier this month by The Washington Post.
The latest revelation follows previous leaks from ex-NSA contractor Edward Snowden, who is presumed hiding at a Moscow airport transit area, waiting to hear whether Ecuador, Iceland or another country might grant him asylum. He fled Hong Kong over the weekend and flew to Russia after being charged with violating American espionage laws.
The collection appears similar to the gathering of U.S. phone records, and seems to overlap with the Prism surveillance program of foreigners on U.S. Internet servers, both revealed by Snowden. U.S. officials have said the phone records can only be checked for numbers dialed by a terrorist suspect overseas. According to the documents published by The Guardian on Thursday, the Internet records show whom they exchanged emails with and the specific numeric address assigned to a computer connected to the Internet, known as the IP, or Internet Protocol, address.
The program, described in a top secret draft report from the NSA inspector general, described the efforts of then-NSA Director Gen. Mike Hayden to fill gaps in intelligence gathering after the Sept. 11, 2001, attacks. One NSA officer quoted in the report described "NSA standing at the U.S. border looking outward for foreign threats" and "the FBI looking within the United States for domestic threats. But no one was looking at the foreign threats coming into the United States. That was the huge gap that NSA wanted to cover."
The draft added that the sweeping phone and Internet data-gathering programs were meant to speed up the process of surveillance of a terrorist suspect overseas, because "the average wait time was between four and six weeks" to get a court order from the Foreign Intelligence Surveillance Court. "Terrorists could have changed their telephone numbers or Internet addresses" before the NSA received permission to spy on them on U.S.-based phone or Internet systems.
Alexander said at a Baltimore conference on cybersecurity that the NSA decided to kill the Internet data gathering program because "it wasn't meeting what we needed and we thought we could better protect civil liberties and privacy by doing away with it."
He said the program was conducted under provisions of the Patriot Act, and that NSA leaders went to the Obama administration and Congress with the recommendation to shut it down.
Shawn Turner, a spokesman for the director of national intelligence, said the program has not resumed.
The Washington Post had described the Internet surveillance in an earlier report, without publishing the documents or releasing as many details. The Post described it as part of four secret surveillance programs—two aimed at phone and Internet metadata, while two more target contents of phone and Internet communications.
Alexander, who has been in Congress frequently for hearings and meetings since the NSA phone and email surveillance was made public, laid out a broad defense of the programs.
He said he worries that more leaks are coming, adding that "every time a capability is revealed we lose our ability to track those targets."
While never mentioning Snowden by name, Alexander said his irresponsible releases of classified information "will have a long term detrimental impact on the intelligence community's ability to detect future attacks."
He declined to provide more details on what the NSA is doing to prevent such leaks in the future. He has said that the agency is changing passwords and improving its ability to track what system administrators are doing.
On Thursday, he said he was looking at how the leak happened and the people involved. He said the NSA can't do its job without contractors because it doesn't have all the talent or access it needs to do the job.
Explore further:US spy chief: Plot against Wall Street foiled
© 2013 The Associated Press. All rights reserved.
More from Physics Forums - General Engineering
Jun 18, 2013
The U.S. foiled a plot to bomb the New York Stock Exchange because of the sweeping surveillance programs at the heart of a debate over national security and personal privacy, officials said Tuesday at a rare ...
Jun 16, 2013
Current and former top U.S. officials on Sunday defended the government's collection of phone and Internet data following new revelations about the secret surveillance programs, saying the operations were ...
Jun 09, 2013
A 29-year-old government contractor revealed himself on Sunday as the source of bombshell leaks of US monitoring of Internet users and phone records, as US intelligence pressed for a criminal probe.
Jun 11, 2013
The Obama administration faced fresh anger Monday at home and abroad over U.S. spy programs that track phone and Internet messages around the world in the hope of thwarting terrorist threats. But a senior ...
Jun 07, 2013
US spies are secretly tapping into servers of nine Internet giants including Apple, Facebook, Microsoft and Google in a vast anti-terror sweep targeting foreigners, explosive reports said Thursday.
Jun 09, 2013
The top U.S. intelligence official stressed Saturday that a previously undisclosed program for tapping into Internet usage is authorized by Congress, falls under strict supervision of a secret court and cannot ...
1 hour ago
(AP)—Hawaii's volcanoes will soon be visible on Google Street View.
2 hours ago
(AP)—Turkish authorities are investigating people who allegedly insulted state officials or incited riots on social media, the deputy prime minister said Thursday, in a sign the government is intent on ...
2 hours ago
The US military is reviewing its rules of engagement to deal with the growing threat of cyber crime, military chief Martin Dempsey said Thursday.
6 hours ago
The Internet has a major impact on the consumers' media habits. The market situation for magazines is changing in line with the continuing increase of online media content. Success will require a completely new business approach. ...
10 hours ago
A new website which gives consumers better access to tailored information on their credit card costs is launched today by The UK Cards Association following a research project undertaken with the Personal ...
11 hours ago
Could a computer distinguish between the moods of a mournful classical movement or an angst-ridden emo rock song? Research to be published in the International Journal of Computational Intelligence Studies, suggests that i ...
(AP)—Hawaii's volcanoes will soon be visible on Google Street View.
Tourists within Europe can use their smartphones without fear of an outrageous bill waiting at home starting from this year's summer holidays, as the European Union is cutting maximum mobile data roaming ...
The US military is reviewing its rules of engagement to deal with the growing threat of cyber crime, military chief Martin Dempsey said Thursday.
(Phys.org) —EVs might be parked in people's minds as second cars of convenience, suitable for around-town errands and small-distance commutes. Forward thinkers are hoping to see EVs do their thing on long-distance ...
(AP)—Turkish authorities are investigating people who allegedly insulted state officials or incited riots on social media, the deputy prime minister said Thursday, in a sign the government is intent on ...
Children with more genetic risks for asthma are not only more likely to develop the condition at a young age, but they are also more likely to continue to suffer with asthma into adulthood. The finding reported by Duke University ...
Gemini Observatory's Planet-Finding Campaign finds that, around many types of stars, distant gas-giant planets are rare and prefer to cling close to their parent stars. The impact on theories of planetary ...
(Phys.org) —Scientists have discovered a diverse multitude of microbes colonizing and thriving on flecks of plastic that have polluted the oceans—a vast new human-made flotilla of microbial communities ...
In stunning color, new biodiversity research from North Carolina State University maps out priority areas worldwide that hold the key to protecting vulnerable species and focusing conservation efforts.
The search for thermoelectrics, exotic materials that convert heat directly into electricity, has received a boost from researchers at the California Institute of Technology and the University of Tokyo, who have found the ...
© Phys.org™ 2003-2013