US intel program targets email addresses, not keywords

Mar 19, 2014
A protestor wearing a Guy-Fawkes-mask holds a banner with a picture of US President Barack Obama to protest against the NSA internet surveillance programme "PRISM" on June 29, 2013 in Hannover, Germany

The US government's clandestine PRISM Internet program exposed by Edward Snowden targets suspect email addresses and phone numbers but does not search for keywords like terrorism, officials said Wednesday.

Top lawyers of the country's intelligence apparatus including the National Security Agency and Federal Bureau of Investigation participated Wednesday in a public hearing on the controversial US data-mining operations that intercept emails and other Internet communications including on social media networks like Facebook, Google or Skype.

They told the hearing hosted by the Privacy and Civil Liberties Oversight Board (PCLOB) that the NSA did not aim to scoop up all web transmissions, but that the surveillance was narrowly tailored to track or uncover terror suspects and other threats.

"We figure out what we want and we get that specifically, that's why it's targeted collection rather than bulk collection," Robert Litt, general counsel at the Office of the Director of National Intelligence, told the hearing.

PRISM, which focuses on foreign suspects outside the United States, is subject to less virulent criticism than the other main clandestine operation disclosed by Snowden last year, the NSA's huge telephone metadata program that gathers information on phone calls by most Americans.

In a damning report in January, the PCLOB, an independent body set up under the executive branch to create safeguards for privacy and , concluded that the phone metadata program provides little or no value to the fight against terrorism and should be halted.

The board is conducting a similar review of PRISM and other NSA programs, which can draw "upstream" information directly off the Internet's backbone.

The NSA argued that such programs come under a "compulsory legal" umbrella and that untargeted data is not kept.

"Any time there is not foreign intelligence value to collection, by definition it will be purged," said NSA general counsel Rajesh De.

Under authority of the Foreign Intelligence Surveillance Act, the NSA asks Internet service providers to hand over messages sent from or received by certain accounts such as "terrorist@.com, the Justice Department's Brad Wiegmann said, using a hypothetical example.

The terms used in targeting, known as "selectors" in intelligence jargon, "are things like phone numbers and email addresses" and not generic terminology, De said.

The default retention period for PRISM data collected from Internet firms is five years. Upstream data is stored for two years, De said.

The data collection from Internet companies like Apple, Google and Microsoft is done with the companies' knowledge, according to James Baker, general counsel for the FBI.

Explore further: Clapper calls on Snowden to return NSA documents

add to favorites email to friend print save as pdf

Related Stories

NSA defends global cellphone tracking as legal (Update)

Dec 06, 2013

The National Security Agency on Friday said its tracking of cellphones overseas is legally authorized under a sweeping U.S. presidential order. The distinction means the extraordinary surveillance program is not overseen ...

NSA has 'industrial scale' malware for spying

Mar 12, 2014

The National Security Agency has developed malware that allows it to collect data automatically from millions of computers worldwide, a report based on leaked documents showed Wednesday.

Spy program gathered Americans' Internet records

Jun 27, 2013

(AP)—The Obama administration gathered U.S. citizens' Internet data until 2011, continuing a spying program started under President George W. Bush that revealed whom Americans exchanged emails with and the Internet Protocol ...

Report: NSA collecting millions of contact listss

Oct 15, 2013

The National Security Agency has been sifting through millions of contact lists from personal email and instant messaging accounts around the world—including those of Americans—in its effort to find possible ...

Recommended for you

Automakers aim to drive away car computer hackers

54 minutes ago

Against the team of hackers, the poor car stood no chance. Meticulously overwhelming its computer networks, the hackers showed that—given time—they would be able to pop the trunk and start the windshield ...

Advanced cyberspying tool dates from 2008

6 hours ago

A highly sophisticated cyberspying tool has been used since 2008 to steal information from governments, businesses and others, security researchers said Monday.

Man pleads guilty in New York cybercrime case

Nov 22, 2014

A California man has pleaded guilty in New York City for his role marketing malware that federal authorities say infected more than a half-million computers worldwide.

How to keep the world's eyes out of your webcam

Nov 21, 2014

There are concerns that thousands of private webcams around the world could be streaming live images to anybody who wishes to view them – without their owner knowing – thanks to a Russian website provi ...

Britain urges Russia to shut down webcam spying site

Nov 20, 2014

A Russian website offering thousands of live feeds peering into bedrooms and offices around the world by accessing poorly secured webcams should be taken down immediately, British officials said on Thursday.

NSA Director: China can damage US power grid

Nov 20, 2014

China and "one or two" other countries are capable of mounting cyberattacks to shut down the electric grid in parts of the United States. That's according to Admiral Michael Rogers, the director of the National Security Agency ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.