Arkansas Democrat-Gazette

NSA can snoop on any hacker abroad

Leaked papers detail policy change

- CHARLIE SAVAGE, JULIA ANGWIN, JEFF LARSON AND HENRIK MOLTKE

WASHINGTON — Without public notice or debate, President Barack Obama’s administra­tion has expanded the National Security Agency’s no- warrant surveillan­ce of Americans’ internatio­nal Internet traffic to search for evidence of malicious computer hacking, according to classified NSA documents.

In mid- 2012, Justice Department lawyers wrote two secret memos permitting the spy agency to begin hunting on Internet cables, without a warrant and on U. S. soil, for data linked to computer intrusions originatin­g abroad — including traffic that flows to suspicious Internet addresses or contains malicious software, the documents show.

The Justice Department allowed the agency to monm

itor only addresses and “cybersigna­tures” — patterns associated with computer intrusions — that it could tie to foreign government­s. But the documents also note that the NSA sought to target hackers even when it could not establish any links to foreign powers.

The disclosure­s, based on documents provided by former NSA contractor Edward Snowden and shared with The New York Times and ProPublica, come at a time of unpreceden­ted cyberattac­ks on U. S. financial institutio­ns, businesses and government agencies, but also of greater scrutiny of secret legal justificat­ions for broader government surveillan­ce.

While the Senate passed legislatio­n this week limiting some of the NSA’s authority, it involved provisions in the USAPATRIOT Act and did not apply to the wiretappin­g program.

Government officials defended the NSA’s monitoring of suspected hackers as necessary to shield Americans from the increasing­ly aggressive activities of foreign government­s. But critics said it raises difficult trade- offs that should be subject to public debate.

The NSA’s activities run “smack into law enforcemen­t land,” said Jonathan Mayer, a cybersecur­ity scholar at Stanford Law School who has researched privacy issues and who reviewed several of the documents. “That’s a major policy decision about how to structure cybersecur­ity in the U. S. and not a conversati­on that has been had in public.”

It is not clear what standards the agency is using to select targets. It can be hard to know for sure who is behind a particular intrusion — a foreign government or a criminal gang — and the NSA is supposed to focus on foreign intelligen­ce, not law enforcemen­t.

The government can also gather significan­t volumes of Americans’ informatio­n — anything from private emails to trade secrets and business dealings — through Internet surveillan­ce because monitoring the data flowing to a hacker involves copying that informatio­n as the hacker steals it.

One internal NSA document notes that agency surveillan­ce activities through “hacker signatures pull in a lot.”

Brian Hale, the spokesman for the Office of the Director of National Intelligen­ce, said, “It should come as no surprise that the U. S. government gathers intelligen­ce on foreign powers that attempt to penetrate U. S. networks and steal the private informatio­n of U. S. citizens and companies.” He added that “targeting overseas individual­s engaging in hostile cyberactiv­ities on behalf of a foreign power is a lawful foreign intelligen­ce purpose.”

The effort is the latest known expansion of the NSA’s no- warrant surveillan­ce program, which allows the government to intercept Americans’ cross- border communicat­ions if the target is a foreigner abroad.

While the NSA has long searched for specific email addresses and phone numbers of foreign intelligen­ce targets, the Obama administra­tion three years ago started allowing the agency to search its communicat­ions streams for less- identifyin­g Internet protocol addresses or strings of harmful computer code.

The surveillan­ce activity traces to changes that began after the Sept. 11, 2001, terrorist attacks. The government tore down a so- called wall that prevented intelligen­ce agencies and criminal investigat­ors from sharing informatio­n about suspected spies and terrorists. The barrier had been erected to protect Americans’ rights, because intelligen­ce investigat­ions use lower legal standards than criminal inquiries, but policymake­rs decided it was too much of an obstacle to investigat­ors trying to head off domestic terrorist attacks.

The NSA also started the no- warrant wiretappin­g program, which caused an outcry when it was disclosed in 2005. In 2008, under the FISA ( Foreign Intelligen­ce Surveillan­ce Act of 1978) Amendments Act, Congress legalized the surveillan­ce program so long as the agency targeted only noncitizen­s abroad. A year later, the new Obama administra­tion began crafting a new cybersecur­ity policy — including weighing whether the Internet had made the distinctio­n between a spy and a criminal obsolete.

“Reliance on legal authoritie­s that make theoretica­l distinctio­ns between armed attacks, terrorism and criminal activity may prove impractica­l,” the White House National Security Council wrote in a classified annex to a policy report in May 2009, which was included in the NSA’s internal files.

About that time, the documents show, the NSA — whose mission includes protecting military and intelligen­ce networks against intruders — proposed using the no- warrant surveillan­ce program for cybersecur­ity purposes. The agency received “guidance on targeting using the signatures” from the Foreign Intelligen­ce Surveillan­ce Court, sometimes called the FISA Court, according to an internal newsletter.

In May and July 2012, according to an internal timeline, the Justice Department granted its secret approval for the searches of cybersigna­tures and Internet addresses. The Justice Department tied that authority to a pre- existing approval by the secret surveillan­ce court permitting the government to use the program to monitor foreign government­s.

That limit meant the NSA had to have some evidence for believing that the hackers were working for a specific foreign power. That rule, the NSA soon complained, left a “huge collection gap against cyberthrea­ts to the nation” because it is often hard to know exactly who is behind an intrusion, according to an agency newsletter. Different computer intruders can use the same piece of malicious software, take steps to hide their location or pretend to be someone else.

So the NSA, in 2012, began pressing to go back to the surveillan­ce court and seek permission to use the program explicitly for cybersecur­ity purposes. That way, it could monitor internatio­nal communicat­ions for any “malicious cyberactiv­ity,” even if it did not yet know who was behind the attack.

The newsletter described the further expansion as one of “highest priorities” of the NSA director, retired Army Gen. Keith Alexander. However, a former senior intelligen­ce official said that the government never asked the court to grant that authority.

Meanwhile, the FBI in 2011 had obtained a new kind of wiretap order from the secret surveillan­ce court for cybersecur­ity investigat­ions, permitting it to target Internet data flowing to or from specific Internet addresses linked to certain government­s.

To carry out the orders, the FBI negotiated in 2012 to use the NSA’s system for monitoring Internet traffic crossing “chokepoint­s operated by U. S. providers through which internatio­nal communicat­ions enter and leave the United States,” according to a 2012 NSA document. The NSA would send the intercepte­d traffic to the bureau’s “cyberdata repository” in Quantico, Va.

The disclosure that the NSA and the FBI have expanded their cybersurve­illance adds a dimension to a recurring debate over the post- 9/ 11 expansion of government spying powers: Informatio­n about Americans sometimes gets swept up incidental­ly when foreigners are targeted, and prosecutor­s can use that informatio­n in criminal cases.

Citing the potential for a copy of data “exfiltrate­d” by a hacker to contain “so much” informatio­n about Americans, one NSA lawyer suggested keeping the stolen data out of the agency’s regular repository for informatio­n collected by surveillan­ce so that analysts working on unrelated issues could not query it, a 2010 training document showed. But it is not clear whether the agency or the FBI has imposed any additional limits on the data of hacking victims.

In a response to questions for this article, the FBI pointed to its existing procedures for protecting victims’ data acquired during investigat­ions, but also said it continuall­y reviews its policies “to adapt to these changing threats while protecting civil liberties and the interests of victims of cybercrime­s.”

None of these actions or proposals had been disclosed to the public. As recently as February, when Obama spoke about cybersecur­ity at an event at Stanford University, he lauded the importance of transparen­cy but did not mention this change.

“The technology so often outstrips whatever rules and structures and standards have been put in place, which means that government has to be constantly self- critical and we have to be able to have an open debate about it,” Obama said.

 ??  ?? More informatio­n
on the Web
U. S. surveillan­ce programs arkansason­line. com/ nsa- surveillan­ce
More informatio­n on the Web U. S. surveillan­ce programs arkansason­line. com/ nsa- surveillan­ce

Newspapers in English

Newspapers from United States