Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Controls keep NSA spy programs legal, director tells Black Hat audience

Jaikumar Vijayan | Aug. 1, 2013
Fears that spy agencies are eavesdropping on all phone calls, email messages are unfounded, NSA Director Alexander insists.

LAS VEGAS -- A skeptical but mostly respectful crowd of Black Hat security attendees Wednesday listened intently as National Security Agency Director Keith Alexander defended controversial U.S. surveillance programs in a keynote address.

The nearly hour-long address was interrupted a couple of times by what appeared to be a single heckler as Alexander argued that NSA spy programs exposed by fugitive document leaker Edward Snowden were legal and vital to national security.

Alexander insisted that the widespread fears that the NSA is snooping on domestics phone calls and collecting data on innocent Americans are misplaced, contending that critics don't understand how the spy programs function.

He also said that the secret Foreign Intelligence Surveillance Court that authorizes specific NSA data collection activities is no rubber stamp, as the critics have widely alleged.

Alexander used the bulk of his keynote to describe the controls in place to ensure that NSA surveillance activities focus solely on counter-terrorism.

"What comes out is that we are collecting everything. That is not true," Alexander insisted.

"The assumption is that people are just out there wheeling and dealing. Nothing could be further from the truth," he added, citing controls in place that prevent NSA searches not specifically tied terrorism related activities or terrorist suspects.

The genesis of the NSA phone metadata records collection program, and the PRISM program under which it collects data directly from major Internet service providers, is the World Trade Center bombings of 1993, Alexander said.

Since then, U.S. intelligence agencies have been under tremendous pressure to collect data that can "connect the dots" of terrorist activity, he said. Over the years, the NSA has combined the PRISM program with the collection of phone metadata records such as the originating and dialed number, call time and duration and location data to identify potential terrorist plots in the U.S. and elsewhere.

Alexander contended that such data collection activities have helped the NSA identify and stop 54 terrorist plots including 13 in the United States, 25 in Europe and 11 in Asia in recent years.

The NSA does not as a matter of routine, listen in on phone calls, monitor email content or collect personal data, Alexander maintained. Only 22 NSA officials can authorize such searches and only 35 NSA analysts have the ability to run queries on the data collected. Every query needs to be specifically related to an anti-terror investigation and is fully auditable, he said.

Alexander also noted that U.S. spy programs are overseen by all three branches of government along with the Foreign Intelligence Surveillance Court, he said. The detailed queries that the NSA has run against the information it has collected involves only 500 or so phone numbers, Alexander said.


1  2  Next Page 

Sign up for Computerworld eNewsletters.