Skip to main content

Documents shed light on U.S. surveillance programs

By Evan Perez, CNN Justice Reporter
August 10, 2013 -- Updated 0049 GMT (0849 HKT)
STORY HIGHLIGHTS
  • Two documents describe scope of NSA data collection programs
  • Their release is part of pledge by Obama adminstration to be transparent
  • Critics have argued that the data collection violates privacy rights

Washington (CNN) -- The Obama administration released two documents on Friday describing the scope of National Security Agency data collection programs, a bid to quiet criticism they violate privacy rights.

An NSA memorandum describes the beginnings of the agency's collection of so-called telephone metadata of nearly every American under a provision of the Patriot Act, and the agency's monitoring of foreign Internet traffic.

The agency says in the memo that its systems monitor 1.6% of the world's Internet traffic, and its analysts review .00004% of global traffic.

Published accounts drawn from leaked documents provided by admitted NSA leaker Edward Snowden have portrayed a much broader eavesdropping system under section 702 of the Patriot Act.

Another document from the Justice Department describes the legal basis for collecting the telephone metadata, such as the numbers dialed, the length and time of the calls. The government says the NSA phone data collection operated under court supervision, and that the database is only accessed for specific searches in counterterrorism investigations.

Obama: Snowden was no patriot
Obama: 'Mixed success' with Putin

The document also explains why government lawyers say the program carried out under section 215 of the Patriot Act respects constitutional First and Fourth Amendment freedoms, which protect free speech rights and prohibit the government from unreasonable search and seizure.

The release of the documents came as President Barack Obama held a news conference where he addressed the Snowden leaks, and promised greater transparency about the government's surveillance programs.

See NSA document (PDF)

He defended the NSA programs which he said have been incorrectly portrayed as an invasion of privacy and said they were key to protecting national security.

Still, the president promised to consider changes to help reassure the public that the Patriot Act wasn't leading to abuses.

The NSA memo describes how the agency was monitoring conversations between one of the hijackers that carried out the September 11, 2001, terror attacks and people in an al Qaeda safe house in Yemen.

The agency says it didn't have the ability to find out that the hijacker was already in the United States living in San Diego, and therefore couldn't tell the FBI. According to the memo, the data collection programs were begun to address those shortcomings.

The NSA memo also for the first time explains some of the confusion over various agency codenames for its collection programs.

According to the NSA, the agency uses different code names for data collected from each communications company.

"Some that have been revealed in the press recently include FAIRVIEW, BLARNEY, OAKSTAR, and LITHIUM. While some have tried to characterize the involvement of such providers as separate programs, that is not accurate," the memo says.

The Justice white paper released Friday argues that "The vast majority of the telephony metadata is never seen by any person because it is not responsive to the limited queries that are authorized. But the information that is generated in response to these limited queries could be especially significant in helping the government identify and disrupt terrorist plots."

The document also says that the phone data doesn't "involve tracking locations from which telephone calls are made."

The government's three branches, including the Foreign Intelligence Surveillance Court and Congress, help oversee the programs, the Justice memo argues.

Critics have argued that the data collection violates privacy rights, and that the government should require warrants to collect such information.

The Supreme Court last year restricted the government's use of GPS trackers on cars of suspects under investigation, making it necessary to seek warrants.

The Justice Department says the phone metadata is different and that "Supreme Court precedent makes clear that participants in telephone calls lack a reasonable expectation of privacy for purposes of the Fourth Amendment in the telephone numbers used to make and receive their calls."

In any case, the Justice memo says "any arguable privacy intrusion arising from the collection of telephony metadata would be outweighed by the public interest in identifying suspected terrorist operatives and thwarting terrorist plots."

The Justice memo also argues that the government's rules "expressly prohibits the collection of records for an investigation that is being conducted solely on the basis of protected First Amendment activity, if the investigation is of a U.S. person."

ADVERTISEMENT
Part of complete coverage on
Data mining & privacy
June 23, 2013 -- Updated 1425 GMT (2225 HKT)
He's a high-school dropout who worked his way into the most secretive computers in U.S. intelligence as a defense contractor.
May 29, 2014 -- Updated 1226 GMT (2026 HKT)
Traitor or patriot? Low-level systems analyst or highly trained spy?
May 29, 2014 -- Updated 1927 GMT (0327 HKT)
What are the takeaways from Snowden's NBC interview? You might be surprised.
April 18, 2014 -- Updated 1152 GMT (1952 HKT)
Months after accepting asylum in Russia, Snowden asked Putin about Moscow's own surveillance practices.
March 12, 2014 -- Updated 1643 GMT (0043 HKT)
A federal judge has refused the Obama administration's request to extend storage of classified NSA telephone surveillance data beyond the current five-year limit.
March 10, 2014 -- Updated 0044 GMT (0844 HKT)
From his sanctuary in the Ecuadorian embassy in London, Julian Assange said that everyone in the world will be just as effectively monitored soon -- at least digitally.
March 11, 2014 -- Updated 0039 GMT (0839 HKT)
In a rare public talk via the Web, fugitive NSA leaker Edward Snowden urged a tech conference audience to help "fix" the U.S. government's surveillance of its citizens.
August 2, 2013 -- Updated 0355 GMT (1155 HKT)
The White House is "very disappointed" that National Security Agency leaker Edward Snowden has been granted temporary asylum in Russia.
December 10, 2013 -- Updated 1357 GMT (2157 HKT)
Spies with surveillance agencies in the U.S. and U.K. infiltrated video games like "World of Warcraft" in a hunt for terrorists "hiding in plain sight" online.
August 2, 2013 -- Updated 1139 GMT (1939 HKT)
Bradley Manning and Edward Snowden both held jobs that gave them access to some of their country's most secret and sensitive intelligence. They chose to share that material with the world and are now paying for it.
August 1, 2013 -- Updated 1435 GMT (2235 HKT)
The NSA's controversial intelligence-gathering programs have prevented 54 terrorist attacks around the world, including 13 in the United States.
August 1, 2013 -- Updated 1854 GMT (0254 HKT)
You've never heard of XKeyscore, but it definitely knows you. The National Security Agency's top-secret program essentially makes available everything you've ever done on the Internet.
August 18, 2013 -- Updated 1304 GMT (2104 HKT)
You may have never heard of Lavabit and Silent Circle. That's because they offered encrypted (secure) e-mail services, something most Americans have probably never thought about needing.
July 24, 2013 -- Updated 1854 GMT (0254 HKT)
"Any analyst at any time can target anyone. Any selector, anywhere ... I, sitting at my desk, certainly had the authorities to wiretap anyone."
July 2, 2013 -- Updated 1356 GMT (2156 HKT)
President Barack Obama responds to outrage by European leaders over revelations of alleged U.S. spying.
August 29, 2014 -- Updated 1954 GMT (0354 HKT)
Browse through a history of high-profile intelligence leaking cases.
July 2, 2013 -- Updated 1437 GMT (2237 HKT)
Former President George W. Bush talks Snowden, AIDS, Mandela and his legacy.
June 26, 2013 -- Updated 1304 GMT (2104 HKT)
Edward Snowden took a job with an NSA contractor in order to gather evidence about U.S. surveillance programs.
June 19, 2013 -- Updated 1047 GMT (1847 HKT)
With reports of NSA snooping, many people have started wondering about their personl internet security.
August 14, 2013 -- Updated 1352 GMT (2152 HKT)
Click through our gallery to learn about other major leaks and what happened in the aftermath.
June 9, 2013 -- Updated 2002 GMT (0402 HKT)
What really goes on inside America's most secretive agency? CNN's Chris Lawrence reports.
ADVERTISEMENT