Obama: Security tactics now lost
WASHINGTON — President Obama declared on Friday that America is “going to have to make some choices” balancing privacy and security, offering a vigorous defense of formerly secret programs that sweep up an estimated 3 billion phone calls a day and amass Internet data from U.S. providers in an attempt to thwart terror attacks.
He warned that it will be harder to detect threats against the United States now that the two top-secret tools to target terrorists have been so thoroughly publicized.
At times defensive and defiant, Obama stood by the spy programs revealed this week.
The National Security Agency has been collecting the phone records of hundreds of millions of Americans each day, devising a database through which it can learn whether terror suspects have been in contact with people in the United States. It was disclosed this week that the NSA has been gathering all Internet usage — audio, video, photographs, emails and searches — from nine major U.S. Internet providers, including Microsoft and Google, in hopes of detecting suspicious behavior that begins overseas.
“Nobody is listening to your telephone calls,” Obama assured the nation after two days of reports that many found unsettling. What the government is doing, he said, is digesting phone numbers and the durations of calls, seeking links that might “identify potential leads with respect to folks who might engage in terrorism.” If there's a hit, he said, “if the intelligence community then actually wants to listen to a phone call, they've got to go back to a federal judge, just like they would in a criminal investigation.”
While Obama said the aim of the programs is to make America safe, he offered no specifics about how the surveillance programs have done this. House Intelligence Committee Chairman Mike Rogers, R-Mich., on Thursday said the phone record sweeps had thwarted a domestic terror attack, but he didn't offer specifics.
Obama asserted his administration had tightened the phone records collection program since it started in the George W. Bush administration and is auditing the programs to ensure that measures to protect Americans' privacy are heeded — part of what he called efforts to resist a mindset of “you know, ‘Trust me, we're doing the right thing. We know who the bad guys are.'”
But again, he provided no details on how the program was tightened or what the audit is looking at.
The furor this week has divided Congress and led civil liberties advocates and some constitutional scholars to accuse Obama of crossing a line in the name of rooting out terror threats.
Obama, himself a constitutional lawyer, strove to calm Americans' fears but reminded them that Congress and the courts had signed off on the surveillance.
“I think the American people understand that there are some trade-offs involved,” Obama said when questioned by reporters at a health care event in San Jose, Calif.
“It's important to recognize that you can't have 100 percent security and also then have 100 percent privacy and zero inconvenience,” he said. “We're going to have to make some choices as a society. And what I can say is that in evaluating these programs, they make a difference in our capacity to anticipate and prevent possible terrorist activity.”
Obama said U.S. intelligence officials are looking at phone numbers and lengths of calls — not at people's names — and not listening in.
The two classified surveillance programs were revealed this week in newspaper reports that showed, for the first time, how deeply the National Security Agency dives into telephone and Internet data to look for security threats. The new details were first reported by The Guardian and The Washington Post, and prompted Director of National Intelligence James Clapper to take the unusual and reluctant step of acknowledging the programs' existence.
Obama echoed intelligence experts — both inside and outside the government — who predicted that potential attackers will find other, secretive ways to communicate now that they know that their phone and Internet records may be targeted.
“The bad folks' antennas go back up, and they become more cautious for a period of time,” said former Rep. Pete Hoekstra, a Republican who sat on the House Intelligence Committee for a decade, including as chairman for nearly three years. He said he approved the phone surveillance program but did not know about the online spying.
“So right now, with these organizations and individuals we're trying to track, we'll see a drop-off in the ability of these tools to get beneficial or meaningful intelligence,” Hoekstra said on Friday. “People will start putting in protocols to protect themselves from intelligence gathering. It will have a negative effect. But we'll just keep coming up with more sophisticated ways to dig into these data. It becomes a techies game, and we will try to come up with new tools to cut through the clutter.”
For example, extremists could start using online providers that do not have servers based in the United States and therefore do not have to comply with American court orders.
The NSA seizure of website and Internet provider records began only in the past few years.
Show commenting policy
TribLive commenting policy
You are solely responsible for your comments and by using TribLive.com you agree to our Terms of Service.
We moderate comments. Our goal is to provide substantive commentary for a general readership. By screening submissions, we provide a space where readers can share intelligent and informed commentary that enhances the quality of our news and information.
While most comments will be posted if they are on-topic and not abusive, moderating decisions are subjective. We will make them as carefully and consistently as we can. Because of the volume of reader comments, we cannot review individual moderation decisions with readers.
We value thoughtful comments representing a range of views that make their point quickly and politely. We make an effort to protect discussions from repeated comments either by the same reader or different readers.
We follow the same standards for taste as the daily newspaper. A few things we won't tolerate: personal attacks, obscenity, vulgarity, profanity (including expletives and letters followed by dashes), commercial promotion, impersonations, incoherence, proselytizing and SHOUTING. Don't include URLs to Web sites.
We do not edit comments. They are either approved or deleted. We reserve the right to edit a comment that is quoted or excerpted in an article. In this case, we may fix spelling and punctuation.
We welcome strong opinions and criticism of our work, but we don't want comments to become bogged down with discussions of our policies and we will moderate accordingly.
We appreciate it when readers and people quoted in articles or blog posts point out errors of fact or emphasis and will investigate all assertions. But these suggestions should be sent via e-mail. To avoid distracting other readers, we won't publish comments that suggest a correction. Instead, corrections will be made in a blog post or in an article.
- Convicted Florida felon kills his 6 grandchildren, daughter, self
- Al-Qaida cell poses as great a danger as ISIS
- British hostage in Islamic State video talks of showing ‘the truth’
- VA report sugarcoats actions, doctor says
- FBI, federal marshals join manhunt for survivalist accused of ambushing troopers
- Red tide threatens Florida economy
- Dog found in Oregon will fly to Pa.
- Again, Arizona looks to plentiful rain
- ‘Easy Rider’ bike set for auction
- Snowden: U.S. shared info about Americans
- ‘God’ made optional in Air Force oath