Skip to main content
Part of complete coverage from

Ex-NSA chief: Safeguards exist to protect Americans' privacy

By MIchael Hayden, CNN Contributor
August 1, 2013 -- Updated 1136 GMT (1936 HKT)
Former intelligence worker <a href='http://www.cnn.com/2013/06/10/politics/edward-snowden-profile/index.html'>Edward Snowden</a> revealed himself as the source of documents outlining a massive effort by the NSA to track cell phone calls and monitor the e-mail and Internet traffic of virtually all Americans. He says he just wanted the public to know what the government was doing. "Even if you're not doing anything wrong, you're being watched and recorded," he said. Snowden has been granted temporary asylum in Russia after initially fleeing to Hong Kong. He has been charged with three felony counts, including violations of the U.S. Espionage Act, over the leaks. Former intelligence worker Edward Snowden revealed himself as the source of documents outlining a massive effort by the NSA to track cell phone calls and monitor the e-mail and Internet traffic of virtually all Americans. He says he just wanted the public to know what the government was doing. "Even if you're not doing anything wrong, you're being watched and recorded," he said. Snowden has been granted temporary asylum in Russia after initially fleeing to Hong Kong. He has been charged with three felony counts, including violations of the U.S. Espionage Act, over the leaks.
HIDE CAPTION
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
<<
<
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
>
>>
STORY HIGHLIGHTS
  • Supporters of NSA metadata program only had 12-vote margin in favor
  • Ex-NSA director Hayden: PRISM program is used to target foreign threats
  • He says agency employees are trained to respect privacy
  • Hayden: NSA doesn't have access to servers of Internet service providers

Editor's note: Gen. Michael V. Hayden, a former National Security Agency director who was appointed by President George W. Bush as CIA director in 2006 and served until February 2009, is a principal with the Chertoff Group, a security consulting firm. He is on the boards of several defense firms and is a distinguished visiting professor at George Mason University.

(CNN) -- The effects of l'Affaire Snowden continued to accumulate this past week with a dramatic vote in the U.S. House of Representatives.

By a bare 12-vote margin, a bipartisan coalition of more or less centrist Republicans and Democrats defeated an equally bipartisan coalition of their more ideological brethren, the latter an incredibly improbable alliance that almost succeeded in defunding NSA's telephone metadata program.

One Hill participant described the hours before the vote as "hand to hand combat," but for now, at least, NSA will continue to acquire American telephone "business records" to help it detect terrorist activity in the United States.

Michael Hayden
Michael Hayden

Even as Americans were focused on the fate of this program, however, lines were being drawn for future debates based on other revelations by data leaker Edward Snowden.

Chief among these is PRISM, an effort probably best understood by contrasting it to the telephone metadata program. PRISM (authorized by the FISA Amendment Act of 2008) is about the content of communications, not just the fact that a communication has taken place. It deals with digital data, like e-mails, not traditional phone calls. The subjects and activities related to PRISM collection are foreign and specific, not domestic and broad as in the metadata effort. Finally, PRISM is used for a number of legitimate foreign intelligence purposes, not just counterterrorism.

There are also parallels. Both programs can only work with the court-compelled compliance of electronic communication service providers.

And both programs are responsive to the world in which America found itself after 9/11. The metadata program was designed to deal with the reality of potential terrorists already inside the United States. PRISM was designed to deal with changes in how modern communications are moved, stored and accessed.

Former CIA chief speaks with CNN
"Concrete proof" of Snowden damages

Take this example. NSA is targeting the communications of a known terrorist in Yemen. It discovers that the Yemen-based terrorist is communicating electronically with another individual; he could be in Pakistan, elsewhere in Yemen or even in the United States. They are using a U.S. hosted Internet service; they send e-mails back and forth.

Similar contours could apply to e-mail traffic detailing the invoice of a delivery of dual use chemicals to a state suspected of developing chemical weapons. Or to another communication that provides data on the timing and routing of human trafficking in the Caribbean.

In each of these cases, the only thing likely to be "American" about any of these communications is that they are physically in the United States and are being hosted by a U.S.-based Internet service, a phenomenon that the 1978 Foreign Intelligence Surveillance Act, FISA, could not have anticipated.

Recognizing this, under the prodding of then-Director of National Intelligence (and former Director of NSA) Mike McConnell, Congress amended FISA in 2008 to allow NSA more speedy and effective access to these kinds of communications.

Access is still overseen by the FISA court (which also compels firms to turn over requested data), but the process no longer requires the time consuming, cumbersome, individualized warrants of the past.

Early Snowden-based stories here and abroad made a great deal of PRISM. Rushing against deadline, some outlets reported (inaccurately) that NSA had direct and free access to the servers of American Internet service providers, or ISPs, and it was a short step from there to near libelous accusations that the agency was routinely rummaging through the e-mails of ordinary Americans.

In reality, in performing its foreign intelligence mission, NSA treats PRISM as just another SIGAD, SIGINT Activity Designator, an admittedly new and particularly valuable collection point, but still one among many designed to acquire foreign communications of foreign intelligence value.

The alleged NSA slides that some have ominously included in their accounts of PRISM look far more benign to anyone experienced in signals intelligence. Indeed, if the slides are at all accurate, they look like an orientation briefing designed to show new analysts that PRISM is one tool in a large tool kit for them to use as they work to piece together actionable intelligence out of diverse, dispersed and frequently hard to acquire foreign communications.

As recently as this past Sunday, however, Snowden chronicler-supporter-spokesman Glenn Greenwald was working to revive the meme of an unchecked NSA. Appearing on ABC's "This Week," Greenwald described tools that allow analysts "to listen to whatever e-mails they want, whatever telephone calls, browsing histories, Microsoft word documents."

Greenwald's accusations were sufficiently broad and breathless (even though he did at one point concede that there were "legal constraints for how you can spy on Americans") that the stunningly misleading lead of ABC's follow-on story was that these tools "allowed even low-level analysts to search the private e-mails and phone calls of Americans."

Actually, if Greenwald's description of the tools themselves is correct, they are the product of a decade-plus effort at NSA to improve the analytic and collection means available to its work force, to allow NSA analysts at all levels--analysts trained annually in how to protect American privacy--to make a single query to access all relevant information across agency databases and to assign tasking across various SIGADs.

Put another way, NSA can more readily connect dots (dots comprised of lawfully collected foreign intelligence) and coordinate tasking (of legitimately targeted foreign communications) than at any other time in the agency's history.

And if that is true, it is something we should celebrate rather than condemn. But it remains to be seen if the coming national discussion will be based on facts like these or on something else altogether.

And what of that debate, both overseas and at home? More to follow.

Follow us on Twitter @CNNOpinion.

Join us on Facebook/CNNOpinion.

The opinions expressed in this commentary are solely those of Michael Hayden.

ADVERTISEMENT
Part of complete coverage on
December 13, 2014 -- Updated 2108 GMT (0508 HKT)
The NFL's new Player Conduct Policy was a missed chance to get serious about domestic violence, says Mel Robbins.
December 16, 2014 -- Updated 1740 GMT (0140 HKT)
The slaughter of more than 130 children by the Pakistani Taliban may prove as pivotal to Pakistan's security policy as the 9/11 attacks were for the U.S., says Peter Bergen.
December 17, 2014 -- Updated 1600 GMT (0000 HKT)
The Internet is an online extension of our own neighborhoods. It's time for us to take their protection just as seriously, says Arun Vishwanath.
December 16, 2014 -- Updated 2154 GMT (0554 HKT)
Gayle Lemmon says we must speak out for the right of children to education -- and peace
December 17, 2014 -- Updated 1023 GMT (1823 HKT)
Russia's economic woes just seem to be getting worse. How will President Vladimir Putin respond? Frida Ghitis gives her take.
December 17, 2014 -- Updated 0639 GMT (1439 HKT)
Australia has generally seen itself as detached from the threat of terrorism. The hostage incident this week may change that, writes Max Barry.
December 12, 2014 -- Updated 2020 GMT (0420 HKT)
Thomas Maier says the trove of letters the Kennedy family has tried to guard from public view gives insight into the Kennedy legacy and the history of era.
December 15, 2014 -- Updated 1456 GMT (2256 HKT)
Will Congress reform the CIA? It's probably best not to expect much from Washington. This is not the 1970s, and the chances for substantive reform are not good.
December 15, 2014 -- Updated 2101 GMT (0501 HKT)
From superstorms to droughts, not a week goes by without a major disruption somewhere in the U.S. But with the right planning, natural disasters don't have to be devastating.
December 15, 2014 -- Updated 1453 GMT (2253 HKT)
Would you rather be sexy or smart? Carol Costello says she hates this dumb question.
December 14, 2014 -- Updated 2253 GMT (0653 HKT)
A story about Pope Francis allegedly saying animals can go to heaven went viral late last week. The problem is that it wasn't true. Heidi Schlumpf looks at the discussion.
December 14, 2014 -- Updated 1550 GMT (2350 HKT)
Democratic leaders should wake up to the reality that the party's path to electoral power runs through the streets, where part of the party's base has been marching for months, says Errol Louis
December 13, 2014 -- Updated 2123 GMT (0523 HKT)
David Gergen: John Brennan deserves a national salute for his efforts to put the report about the CIA in perspective
December 12, 2014 -- Updated 1426 GMT (2226 HKT)
Anwar Sanders says that in some ways, cops and protesters are on the same side
December 11, 2014 -- Updated 1439 GMT (2239 HKT)
A view by Samir Naji, a Yemeni who was accused of serving in Osama bin Laden's security detail and imprisoned for nearly 13 years without charge in Guantanamo Bay
December 14, 2014 -- Updated 1738 GMT (0138 HKT)
S.E. Cupp asks: How much reality do you really want in your escapist TV fare?
December 11, 2014 -- Updated 1828 GMT (0228 HKT)
Rip Rapson says the city's 'Grand Bargain' saved pensions and a world class art collection by pulling varied stakeholders together, setting civic priorities and thinking outside the box
December 13, 2014 -- Updated 2310 GMT (0710 HKT)
Glenn Schwartz says the airing of the company's embarrassing emails might wake us up to the usefulness of talking in-person instead of electronically
December 12, 2014 -- Updated 2233 GMT (0633 HKT)
The computer glitch that disrupted air traffic over the U.K. on Friday was a nuisance, but not dangerous, says Les Abend
December 12, 2014 -- Updated 1740 GMT (0140 HKT)
Newt Gingrich says the CBO didn't provide an accurate picture of Obamacare's impact, so why rehire its boss?
December 13, 2014 -- Updated 0040 GMT (0840 HKT)
Russian aggression has made it clear Ukraine must rethink its security plans, says Olexander Motsyk, Ukrainian ambassador to the U.S.
December 12, 2014 -- Updated 0046 GMT (0846 HKT)
The Senate committee report on torture has highlighted partisan divisions on CIA methods, says Will Marshall. Republicans and Democrats are to blame.
December 11, 2014 -- Updated 1833 GMT (0233 HKT)
It would be dishonest to say that 2014 has been a good year for women. But that hasn't stopped some standing out, says Frida Ghitis.
ADVERTISEMENT