U.S. collected email logs, but not content, until 2011, report says
By The Associated Press
Published: Friday, June 28, 2013, 12:01 a.m.
WASHINGTON — The Obama administration gathered citizens' online data until 2011, continuing a spying program started under President George W. Bush that revealed with whom Americans exchanged emails and the Internet Protocol address of their computer, documents disclosed Thursday show.
The National Security Agency ended the program that collected email logs and timing, but not content, in 2011 because it decided it didn't effectively stop terrorist plots, according to the NSA's director, Gen. Keith Alexander, who also heads the U.S. Cyber Command. He said all data was purged in 2011.
Britain's Guardian newspaper on Thursday released documents detailing the collection, some details of which was described this month by The Washington Post.
The collection appears similar to the gathering of phone records, and seems to overlap with the Prism surveillance program of foreigners on U.S. Internet servers, both revealed by Edward Snowden. The ex-NSA contractor is presumed to be holed up in a Moscow airport transit area, waiting to hear whether Ecuador, Iceland or another country might grant him asylum. He fled Hong Kong over the weekend and flew to Russia after being charged with violating American espionage laws.
U.S. officials have said the phone records can only be checked for numbers dialed by a terrorist suspect overseas.
According to the documents published by The Guardian, the Internet records show with whom they exchanged emails and the specific numeric address assigned to a computer connected to the Internet, known as the IP address.
The program, described in a top secret draft report from the NSA inspector general, disclosed the efforts of then-NSA Director Gen. Mike Hayden to fill gaps in intelligence gathering after the Sept. 11, 2001, attacks. One NSA officer quoted in the report described the NSA as “standing at the U.S. border looking outward for foreign threats” and “the FBI looking within the United States for domestic threats. But no one was looking at the foreign threats coming into the United States. That was the huge gap that NSA wanted to cover.”
The sweeping phone and Internet data-gathering programs were meant to speed up the process of surveillance of a terrorist suspect overseas, because “the average wait time was between four and six weeks” to get a court order from the Foreign Intelligence Surveillance Court. “Terrorists could have changed their telephone numbers or Internet addresses” before the NSA received permission to spy on them on U.S.-based phone or Internet systems.
Alexander said at a Baltimore conference on cybersecurity that the NSA decided to kill the Internet data gathering program because “it wasn't meeting what we needed and we thought we could better protect civil liberties and privacy by doing away with it.”
He said the program was conducted under provisions of the Patriot Act, and that NSA leaders went to the Obama administration and Congress with the recommendation to shut it down.
Shawn Turner, a spokesman for the director of national intelligence, said the program has not resumed.
Alexander laid out a broad defense of the programs.
He said he worries that more leaks are coming, adding that “every time a capability is revealed we lose our ability to track those targets.”
Show commenting policy
TribLive commenting policy
You are solely responsible for your comments and by using TribLive.com you agree to our Terms of Service.
We moderate comments. Our goal is to provide substantive commentary for a general readership. By screening submissions, we provide a space where readers can share intelligent and informed commentary that enhances the quality of our news and information.
While most comments will be posted if they are on-topic and not abusive, moderating decisions are subjective. We will make them as carefully and consistently as we can. Because of the volume of reader comments, we cannot review individual moderation decisions with readers.
We value thoughtful comments representing a range of views that make their point quickly and politely. We make an effort to protect discussions from repeated comments either by the same reader or different readers.
We follow the same standards for taste as the daily newspaper. A few things we won't tolerate: personal attacks, obscenity, vulgarity, profanity (including expletives and letters followed by dashes), commercial promotion, impersonations, incoherence, proselytizing and SHOUTING. Don't include URLs to Web sites.
We do not edit comments. They are either approved or deleted. We reserve the right to edit a comment that is quoted or excerpted in an article. In this case, we may fix spelling and punctuation.
We welcome strong opinions and criticism of our work, but we don't want comments to become bogged down with discussions of our policies and we will moderate accordingly.
We appreciate it when readers and people quoted in articles or blog posts point out errors of fact or emphasis and will investigate all assertions. But these suggestions should be sent via e-mail. To avoid distracting other readers, we won't publish comments that suggest a correction. Instead, corrections will be made in a blog post or in an article.
- Obama administration delays decision on Keystone XL pipeline
- Denver wife killed 12 minutes into 911 call, sparking inquiry
- Drought uncovers fatal crash scene
- Social Security drops debts older than 10 years
- Scientists achieve cloning advance for use in treating diseases
- Tax refund scam nearly impossible to stop
- Energy Department solicits research into methane hydrates, or ‘frozen gas,’ as energy source
- Hillside keeps moving, but not accelerating, near Wyoming resort town; 60 forced out
- Judge set to rule on drug firm’s suit against Massachusetts for painkiller ban
- Kansas shooting now labeled a hate crime
- Mom admits killing 6 babies, but reason why remains unclear