ODNI General Counsel Robert Litt’s As Prepared Remarks on Signals Intelligence Reform at the Brookings Institute
February 4, 2015
Thanks for that nice introduction, Cam.
A year and a half ago, in July 2013, I gave a speech here about Privacy, Technology and National Security. It was just about a month after classified documents stolen by Edward Snowden began appearing in the press, at a time when people in the
United States and around the world were raising questions about the
legality and wisdom of our signals intelligence activities. My speech
had several purposes.
First, I wanted to set out the legal
framework under which we conduct signals intelligence and the extensive
oversight of that activity by all three branches of Government. Second,
I wanted to explain how we protect both privacy and national security
in a changing technology and security environment, and in particular how
we protect privacy through robust restrictions on the use we can make
of the data we collect. Third, I wanted to demystify and
correct misimpressions about the two programs that had been the subject
of the leaks, and to commit the Intelligence Community to greater
transparency going forward.
I began by noting the huge amount of
private information that we all expose today, through social media,
e-commerce, and so on. But I acknowledged that government access to the
same information worries us more – with good reason – because of what
the government could do with that information. So I suggested we should
address that problem directly.
And in fact, I said, we can and do
protect both privacy and national security by a regime that not only
puts limits on collection but also restricts access to, and use of, the
data we collect based on factors such as the sensitivity of the data,
the volume of the collection, how it was collected, and the reason for
which it was collected, and that backs up those restrictions with
technological and human controls and auditing.
This approach has
largely been effective. The information that has come out since my
speech, both licitly and illicitly, has validated my statement then:
While there have been technological challenges and human error in our
current signals intelligence activities, there has been no systematic
abuse or misuse akin to the very real illegalities and abuses of the
1960s and 1970s.
Well, you may have noticed that my speech did not entirely put the public concerns to rest. Questions have continued to be asked, and we’ve continued to address them.
In particular, just over a year ago, President Obama gave a speech about surveillance reform, and issued Presidential Policy Directive 28.
The President reaffirmed the critical importance of signals
intelligence activity to protect our national security and that of our
allies against terrorism and other threats. But he took note of the
concerns that had been raised and directed a number of reforms to “give
the American people greater confidence that their rights are being
protected, even as our intelligence and law enforcement agencies
maintain the tools they need to keep us safe,” as well as to provide
“ordinary citizens in other countries … confidence that the United
States respects their privacy too.”
The Intelligence Community
has spent the year since the President’s speech implementing the
reforms he set out, as well as many of the recommendations of the
Privacy and Civil Liberties Oversight Board (or PCLOB) and the
President’s Review Group on Intelligence and Communications
Technologies.
And I’d note in passing that the PCLOB last week issued a report
finding that we have made substantial progress towards implementing the
great majority of its recommendations. We’ve consulted with privacy
groups, industry, Congress and foreign partners.
In particular, we have
a robust ongoing dialogue with our European allies and partners about
privacy and data protection. We’ve participated in a wide variety of
public events at which reform proposals have been discussed and debated.
And yesterday the ODNI released a report detailing
the concrete steps we have taken so far, along with the actual agency
policies that implement some of those reforms.
What I want to do today is drill down on what we have done in the last year, and in particular explain how we have responded to some of the concerns that have been raised in the last year and a half.
Let me begin by laying out some premises that I think are commonly agreed upon and that should frame how we think about signals intelligence. The first is that we still need to conduct signals intelligence activities. As the President said in his speech last year, “the challenges posed by threats like terrorism and proliferation and cyber-attacks are not going away any time soon.” If anything, as recent events show, they are growing. Signals intelligence activities play an indispensable role in how we learn about and protect against these threats.
Second, to be effective, our signals intelligence activities have to take account of the changing technological and communications environment. Fifty years ago, we could more easily isolate the communications of our target: the paradigm of electronic surveillance then was two alligator clips on the target’s telephone line. Today, digital communications are all mingled together and traverse the globe. The communications of our adversaries are not separate and easily identified streams, but are part of an ocean of irrelevant conversations, and that creates new challenges for us.
Third, it’s critical to keep in mind that signals intelligence – like all foreign intelligence – is fundamentally different from electronic surveillance for law enforcement purposes. In the typical law enforcement context, a crime has been or is being committed, and the goal is to gather evidence about that particular crime. Intelligence, on the other hand, is often an effort to find out what is going to happen, so that we can prevent it from happening, or to keep policy-makers informed. This means that we cannot limit our signals intelligence activities only to targeted collection against specific individuals whom we have already identified. We have to try to uncover threats or adversaries of which we may as yet be unaware, such as hackers seeking to penetrate our systems, or potential terrorists, or people supplying nuclear materials to proliferators. Or we may simply be seeking information to support the nation’s leadership in the service of other important foreign policy interests.
Fourth, we can also agree that – in part because of these considerations – signals intelligence activities can present special challenges to privacy and civil liberties. The capacity to listen in on private conversations or read online communications, if not properly limited and constrained, could impinge upon legitimate privacy interests, and could be misused for improper purposes.
Finally, as the President also said, “for our intelligence community to be effective over the long haul, we must maintain the trust of the American people, and people around the world.” So although we must continue to conduct signals intelligence activities to protect our national security, we need to do so in a way that is consistent with our values, that treats all people with dignity and respect, that takes account of the concerns that people have with the potential intrusiveness of these activities, and that provides reassurance to the public that they are conducted within appropriate limits and oversight.
So with these premises, let me address some of the concerns that people have raised about our signals intelligence activities.
Transparency
I want to start with the issue of transparency, both because it is something I care about deeply and because our commitment to transparency is what enables me to explain the other changes we have made. One of the biggest challenges that we have faced in responding to the events of the past year and a half is that to a great extent our intelligence activities have to be kept secret.
The public does not know
everything that is done in its name – and that has to be so. If we
reveal too much about our intelligence activities we will compromise the
capability of those activities to protect the nation. And I want to
reiterate what I have said before – while there have been significant
benefits from the recent public debate, the leaks have unquestionably
caused damage to our national security, damage whose full extent we will
not know for years. We have seen public postings clearly referencing
the disclosures, such as an extremist who advised others to stop using a
particular communications platform because the company that provided
it, which had been discussed in the leaked documents, was “part of NSA.”
And yet the Intelligence Community, from the Director of
National Intelligence on down, recognizes that with secrecy inevitably
come both suspicion and the possibility of abuse. I and many others in
the Intelligence Community firmly believe that there would have been
less public outcry from the leaks of the last year and a half if we had
been more transparent about our activities beforehand. Indeed, as we
have been able to release more information, it has helped to allay some
of the mistaken impressions people have had about our intelligence
activities.
And so we have committed ourselves to disclosing
more information about our signals intelligence activities, when the
public interest in disclosure outweighs the risk to national security
from disclosure:
- We have declassified thousands of pages
of court filings, opinions, procedures, compliance reports,
congressional notifications and other documents.
- We have
released summary statistics about our use of surveillance authorities,
and have authorized providers to release aggregate information as well.
- Representatives of the Intelligence Community have appeared in numerous public forums – such as this one.
- We’ve also changed the way we disclose information to enable greater public access, by establishing IContheRecord, a tumblr account where we post declassified documents, official statements, and other materials.
- Finally, we have developed and issued principles of transparency to apply to our intelligence activities going forward.
The
transparency process will never move as quickly as we would like.
Public interest declassification requires a meticulous review to ensure
that we don’t inadvertently release information that needs to remain
classified, and we have limited resources to devote to the task. The
same people who review documents for discretionary declassification also
have to review thousands of documents implicated by FOIA requests with
judicial deadlines – and all this on top of their “day job” of actually
working to keep us safe. But we recognize the importance of this task
and are committed to continued greater transparency.
In
general, our transparency efforts have focused, and will continue to
focus, on enhancing the public’s overall understanding of the
Intelligence Community’s mission and how we accomplish that mission,
while continuing to protect specific targets of surveillance, specific
means by which we conduct surveillance, specific partnerships and
specific intelligence we gather. It’s particularly important that we
give the public greater insight into the laws and policies we operate
under and how we interpret those authorities, into the limits we impose
upon our activities, and into our oversight and compliance regime. I
hope that our efforts at transparency will continue to demonstrate to
the American people and the rest of the world that our signals
intelligence activities are not arbitrary and are conducted responsibly
and pursuant to law.
Limitations on Surveillance
One
persistent but mistaken charge in the wake of the leaks has been that
our signals intelligence activity is overly broad, that it is not
adequately overseen and is subject to abuse – in short, that NSA
“collects whatever it wants.” This is and always has been a myth, but
in addition to greater transparency we have taken a number of concrete
steps to reassure the public that we conduct signals intelligence
activity only within the scope of our legal authorities and applicable
policy limits.
To begin with, in PPD-28 the President set out a
number of important general principles that govern our signals
intelligence activity:
- The collection of signals
intelligence must be authorized by statute or Presidential
authorization, and must be conducted in accordance with the Constitution
and law.
- Privacy and civil liberties must be integral considerations in planning signals intelligence activities.
- Signals intelligence will be collected only when there is a valid foreign intelligence or counterintelligence purpose.
- We will not conduct signals intelligence activities for the purpose of suppressing criticism or dissent.
- We
will not use signals intelligence to disadvantage people based on their
ethnicity, race, gender, sexual orientation or religion.
- We will not use signals intelligence to afford a competitive commercial advantage to U.S. companies and business sectors.
- Our signals intelligence activity must always be as tailored as feasible, taking into account the availability of other sources of information.
The President also directed that we set up processes to ensure that we adhere to these restrictions, and that we have appropriate policy review of our signals intelligence collection. I want to spend a little time now talking about what these processes are – how we try to ensure that signals intelligence is only collected in appropriate circumstances. And you’ll forgive me if I get a bit down into the weeds on this, but I think this is important for people to understand.
To begin with, neither NSA nor any other intelligence agency decides on its own what to collect. Each year the President sets the nation’s highest priorities for foreign intelligence collection after an extensive, formal interagency process. Moreover, as a result of PPD-28, the rest of our intelligence priorities are now also reviewed and approved through a high-level interagency policy process. Overall, this process ensures that all of our intelligence priorities are set by senior policy-makers who are in the best position to identify our foreign intelligence requirements, and that those policy-makers take into account not only the potential value of the intelligence collection but also the risks of that collection, including the risks to privacy, national economic interests and foreign relations.
The DNI then
translates these priorities into the National Intelligence Priorities
Framework, or NIPF. Our Intelligence Community Directive about the
NIPF, ICD 204, which incorporates the requirements of PPD-28, is
publicly available on our web site. And while the NIPF itself is
classified, much of it is reflected annually in the DNI’s unclassified
Worldwide Threat Assessment.
But the priorities in the NIPF are at a
fairly high level of generality. They include topics such as the
pursuit of nuclear and ballistic missile capabilities by particular
foreign adversaries, the effects of drug cartel corruption in Mexico,
and human rights abuses in specific countries. And they apply not just
to signals intelligence, but to all intelligence activities. So how do
the priorities in the NIPF get translated into actual signals
intelligence collection?
The organization that is responsible for
doing this is called the National Signals Intelligence Committee, or
SIGCOM. (We have acronyms for everything). It operates under the
auspices of the Director of the NSA, who is designated by Executive
Order 12333 as what we call the functional manager for signals
intelligence, responsible for overseeing and coordinating signals
intelligence across the Intelligence Community under the oversight of
the Secretary of Defense and the DNI. The SIGCOM has representatives
from all elements of the community and, as we fully implement PPD-28,
also will have full representation from other departments and agencies
with a policy interest in signals intelligence.
All departments
and agencies that are consumers of intelligence submit their requests
for collection to the SIGCOM. The SIGCOM reviews those requests,
ensures that they are consistent with the NIPF, and assigns them
priorities using criteria such as:
- Can SIGINT provide useful
information in this case? Perhaps imagery or human sources are better
or more cost-effective sources of information to address the
requirement.
- How critical is this information need? If it is a high priority in the NIPF, it will most often be a high SIGINT priority.
- What
type of SIGINT could be used? NSA collects three types of signals
intelligence: collection against foreign weapons systems (known as
FISINT), foreign communications (known as COMINT), and other foreign
electronic signals such as radar (known as ELINT).
- Is the collection as tailored as feasible? Should there be time, focus, or other limitations?
- And our signals intelligence requirements process also requires explicit consideration of other factors, namely:
- Is
the target of the collection, or the methodology used to collect,
particularly sensitive? If so, it will require review by senior policy
makers.
- Will the collection present an unwarranted risk to privacy and civil liberties, regardless of nationality? And…
- Are additional dissemination and retention safeguards necessary to protect privacy or national security interests?
Finally, at the end of the process, a limited number of trained NSA personnel take the priorities validated by the SIGCOM and research and identify specific selection terms, such as telephone numbers or email addresses, that are expected to collect foreign intelligence responsive to these priorities. Any selector must be reviewed and approved by two persons before it is entered into NSA’s collection systems. Even then, however, whether and when actual collection takes place will depend in part on additional considerations such as the availability of appropriate collection resources. And, of course, when collection is conducted pursuant to the Foreign Intelligence Surveillance Act, NSA and other agencies must follow additional restrictions approved by the court.
So that’s how we ensure that signals intelligence collection targets reflect valid and important foreign intelligence needs. But, as is typically the case with our signals intelligence activities, we don’t just set rules and processes at the front end; we also have mechanisms to ensure that we are complying with those rules and processes.
- Cabinet officials are required to validate their SIGINT requirements each year.
- NSA
checks signals intelligence targets throughout the collection process
to determine if they are actually providing valuable foreign
intelligence responsive to the priorities, and will stop collection
against targets that are not. In addition, all selection terms are
reviewed by supervisors annually.
- Based on a
recommendation from the President’s Review Group, the DNI has
established a new mechanism to monitor the collection and dissemination
of signals intelligence that is particularly sensitive because of the
nature of the target or the means of collection, to ensure that it is
consistent with the determinations of policy-makers.
- Finally, ODNI annually reviews the IC’s allocation of resources against the NIPF priorities and the intelligence mission as a whole. This review includes assessments of the value of all types of intelligence collection, including SIGINT, and looks both backward – how successful have we been in achieving our goals? – and forward – what will we need in the future? – and helps ensure that our SIGINT resources are applied to the most important national priorities.
The point I want to make with this perhaps excessively detailed description is that the Intelligence Community does not decide on its own which conversations to listen to, nor does it try to collect everything. Its activities are focused on priorities set by policymakers, through a process that involves input from across the government, and that is overseen both within NSA and by the ODNI and Department of Defense. The processes put in place by PPD-28, which are described in the report we issued yesterday, have further strengthened this oversight to ensure that our signals intelligence activities are conducted for appropriate foreign intelligence purposes and with full consideration of the risks of collection as well as the benefits.
Bulk Collection
One of the principal concerns that has been raised both here and abroad
is with bulk collection. Bulk collection is not the same thing as
bulky collection; even a narrowly targeted collection program can
collect a great deal of data. Rather, bulk collection generally refers
to collection that is not targeted by the use of terms such as a
person’s phone number or email address.
We do bulk collection for a
number of reasons, although like all of our intelligence activities it
must always be for a valid foreign intelligence or counterintelligence
purpose. In some circumstances, it may not be technically possible to
target a specific person or selector. In other circumstances, we need
to have a pool of relevant data to review as circumstances arise, data
which might not otherwise be available because, for example, it would
have been deleted or overwritten. In particular, we can use metadata
that we collect in bulk to help identify targets for more intrusive
surveillance. But because bulk collection is not targeted, it often
involves the collection of information that is ultimately not of foreign
intelligence value along with information that is, and it is therefore
important that we regulate it appropriately.
We’ve taken a number of steps to provide appropriate and transparent limits on our bulk collection activities. First, agency procedures governing signals intelligence now explicitly provide that collection should be targeted, rather than bulk, whenever practicable. Second, the President in PPD-28 required that when we do collect signals intelligence in bulk we can only use it for one of six enumerated purposes, which I can paraphrase as countering espionage and other threats from foreign powers, counterterrorism, counter-proliferation, cybersecurity, protecting our forces, and combating transnational criminal threats. We can’t take information collected in bulk and trawl through it for any reason we please; we have to be able to confirm that we are using it for one of the six specified purposes. Agencies that have access to signals intelligence collected in bulk have incorporated these limitations in procedures governing their use of signals intelligence, which we released yesterday. This is not a meaningless step; it means that violations of those restrictions are subject to oversight and significant violations must be reported to the DNI.
Third, in PPD-28 the President directed my boss, the Director of National Intelligence, to study whether there were software-based solutions that could eliminate the need for bulk collection. The DNI commissioned a study from the National Academy of Sciences, which was conducted by a team of independent experts. They issued their report a few weeks ago, and it is publicly available. To summarize, they concluded that to the extent the goal of bulk collection is, as I said a moment ago, to enable us to look backwards when we discover new facts – for example to see if a terrorist arrested overseas has ever been in contact with people in the US – there are no software-based solutions available today that could accomplish that goal, but that we could explore ways to use technology to provide more effective limits and controls on the uses we make of bulk data and to more effectively target collection. I’ll return to technology a bit later in my remarks. To be clear, this report doesn’t purport to settle whether bulk collection is a good idea, or whether it is valuable; it simply concludes that present technology doesn’t allow other, less intrusive ways of accomplishing the same goals we can achieve with bulk collection.
Finally, the President directed specific steps to address concerns about the bulk collection of telephone metadata pursuant to FISA Court order under Section 215 of the USA PATRIOT Act. You’ll recall that this was the program set up to fix a gap identified in the wake of 9/11, to provide a tool that can identify potential domestic confederates of foreign terrorists. I won’t explain in detail this program and the extensive controls it operates under, because by now most of you are familiar with it, but there is a wealth of information about it available at IContheRecord.
Some have claimed that this program is illegal or unconstitutional, though the vast majority of judges who have considered it to date have determined that it is lawful. People have also claimed that the program is useless because they say it’s never stopped a terrorist plot. While we have provided examples where the program has proved valuable, I don’t happen to think that the number of plots foiled is the only metric to assess it; it’s more like an insurance policy, which provides valuable protection even though you may never have to file a claim. And because the program involves only metadata about communications and is subject to strict limitations and controls, the privacy concerns that it raises, while not non-existent, are far less substantial than if we were collecting the full content of those communications.
Even so, the President recognized the public concerns about this program and ordered that several steps be taken immediately to limit it. In particular, except in emergency situations NSA must now obtain the FISA court’s advance agreement that there is a reasonable articulable suspicion that a number being used to query the database is associated with specific foreign terrorist organizations. And the results that an analyst actually gets back from a query are now limited to numbers in direct contact with the query number and numbers in contact with those numbers – what we call “two hops” instead of three, as it used to be.
Longer term, the President directed us to find a way to preserve the essential capabilities of this program without having the government hold the metadata in bulk. In furtherance of this direction, we worked extensively with Congress, on a bipartisan basis, and with privacy and civil liberties groups, on the USA FREEDOM Act. This was not a perfect bill. It went further than some proponents of national security would wish, and it did not go as far as some advocacy groups would wish. But it was the product of a series of compromises, and if enacted it would have accomplished the President’s goal: it would have prohibited bulk collection under Section 215 and several other authorities, while authorizing a new mechanism that – based on telecommunications providers’ current practice in retaining telephone metadata – would have preserved the essential capabilities of the existing program. Having invested a great deal of time in those negotiations, I was personally disappointed that the Senate failed by two votes to advance this bill, and with Section 215 sunsetting on June 1 of this year, I hope that the Congress acts expeditiously to pass the USA FREEDOM Act or another bill that accomplishes the President’s goal.
Incidental Collection
A second set of concerns centered around the other program that was leaked, collection under Section 702 of the Foreign Intelligence Surveillance Act. Section 702 enables us to target non-U.S. persons located outside of the United States for foreign intelligence purposes with the compelled assistance of domestic communications service providers. Contrary to some claims, this is not bulk collection; all of the collection is based on identifiers, such as telephone numbers or email addresses, that we have reason to believe are being used by non-U.S. persons abroad to communicate or receive foreign intelligence information. Again, there is ample information about this program and how it operates on IContheRecord.
Unlike
the bulk telephone metadata program, no one really disagrees that
Section 702 is an effective and important source of foreign intelligence
information. Rather, the concerns about this statute, at least within
the United States, have to do with the fact that even when we are
targeting non-U.S. persons we are inevitably going to collect the
communications of U.S. persons, either because U.S. persons are talking
to the foreign targets, or, in some limited circumstances, because we
cannot technically separate the communications we are looking for from
others. This is called “incidental” collection because we aren’t
targeting the U.S. persons, and I want to emphasize that when Congress
passed Section 702 it fully understood that incidental collection would
occur.
Some of this incidental collection may be important
foreign intelligence information. To pick the most obvious example, if a
foreign terrorist who we are targeting under Section 702 is giving
instructions to a confederate in the U.S., we need to be able to
identify that communication and follow up – even if we weren’t targeting
the U.S. person herself. But people have asked: What are we allowed to
do with communications that aren’t of foreign intelligence value but
may be, for example, evidence of a crime? And to what extent should we
be allowed to rummage through the database of communications we collect
to look for communications of U.S. persons?
Part of the problem
was that the general public didn’t know what the rules governing our
activities under Section 702 were. And so we have declassified and
released the CIA, FBI and NSA procedures for minimizing the collection,
retention and dissemination of information about U.S. persons under
Section 702.
But to address these concerns further, the
President in his speech directed the Attorney General and the DNI to
“institute reforms that place additional restrictions on government’s
ability to retain, search, and use in criminal cases, communications
between Americans and foreign citizens incidentally collected under
Section 702.” We are doing so. First, as the PCLOB recommended,
agencies have new restrictions on their ability to look through 702
collection for information about U.S. persons. The agencies’ various
rules are described in the report we issued yesterday. It’s important
to note that different agencies in the Intelligence Community have been
charged by Congress and the President with focusing on different
intelligence activities. For example, NSA focuses on signals
intelligence; CIA collects primarily human intelligence; and FBI has a
domestic law enforcement focus. Because these agencies’ missions are
different, their internal governance and their IT systems have developed
differently from one another, and so the specifics of their procedures
differ somewhat. But they will all ensure that information about U.S.
persons incidentally collected pursuant to Section 702 is only made
available to analysts and agents when appropriate.
Second, we
have reaffirmed that intelligence agencies must delete communications
acquired pursuant to Section 702 that are to, from or about U.S. persons
if the communications are determined to be of no foreign intelligence
value, and we have strengthened oversight of this requirement. Third,
the Government will use information acquired under Section 702 as
evidence against a person in a criminal case only in cases related to
national security or for certain other enumerated serious crimes, and
only when the Attorney General approves. In short, we have taken
concrete steps to ensure that there are limits on our ability to
identify and use information about U.S. persons that we incidentally
collect under Section 702.
In his as delivered remarks, Mr. Litt went on to describe the “enumerated serious crimes" for which the Government will use information acquired under Section 702 as evidence against a person:
Under the new policy, in addition to any other limitations imposed by applicable law, including FISA, any communication to or from, or information about, a U.S. person acquired under Section 702 of FISA shall not be introduced as evidence against that U.S. person in any criminal proceeding except (1) with the prior approval of the Attorney General and (2) in (A) criminal proceedings related to national security (such as terrorism, proliferation, espionage, or cybersecurity) or (B) other prosecutions of crimes involving (i) death; (ii) kidnapping; (iii) substantial bodily harm; (iv) conduct that constitutes a criminal offense that is a specified offense against a minor as defined in 42 USC 16911; (v) incapacitation or destruction of critical infrastructure as defined in 42 USC 5195c(e); (vi) cybersecurity; (vii) transnational crimes; (or (vii) human trafficking.
Protection for Non-U.S. Persons
But
one refrain that we often hear from some of our foreign partners is
that our rules are focused only on protecting Americans, and that we
ignore the legitimate privacy interests of other persons around the
world. The fact that we have strong protections for the rights of our
citizens is hardly surprising, and I’m not going to apologize for it. Indeed, the legal regimes of most if not all nations afford greater
protection to their own citizens or residents than to foreigners abroad.
Nonetheless, it was never true that the Intelligence Community had a
sort of “open season” to spy on foreigners around the world; we have
always been required to limit our activities to valid intelligence
purposes, as I outlined above.
However, the President recognized
that, given the power and scope of our signals intelligence activities,
we need to do more to reassure the world that we treat “all persons …
with dignity and respect, regardless of their nationality and where they
might reside,” and that we provide appropriate protection for the
“legitimate privacy interests [of all persons] in the handling of their
personal information.” And so Section 4 of PPD-28, which I think is an
extraordinarily significant step, requires that we have express limits
on the retention and dissemination of personal information about
non-U.S. persons collected by signals intelligence, comparable to the
limits we have for U.S. persons. These rules are incorporated into the
agency procedures that we released yesterday, and into another publicly
available Intelligence Community Directive, ICD 203, governing analytic
standards in reporting.
With respect to retention, we now have
explicit rules that require that personal information about non-U.S.
persons that we collect through SIGINT must generally be deleted after
five years unless comparable information about a U.S. person could be
retained. And we have likewise prohibited the dissemination of personal
information about non-U.S. persons unless comparable information about
U.S. persons could be disseminated. In particular, “SIGINT information
about the routine activities of a foreign person” would not be
considered foreign intelligence that could be disseminated by virtue of
that fact alone unless it is otherwise responsive to an authorized
foreign intelligence requirement.
This last point in particular
is, in my opinion, a big deal. Over the last year and a half, in
defending our signals intelligence activity, we have repeatedly said
that we protect personal information because we only disseminate valid
foreign intelligence information. But many have expressed concerns that
our limitations on dissemination are neither transparent nor
enforceable. Moreover, people have noted that the definition of
“foreign intelligence” includes information about “the capabilities,
intentions, or activities of … foreign persons,” and have therefore
questioned whether the foreign intelligence requirement imposed any
meaningful limits to protect the privacy of foreign persons. The new
procedures address this concern, by making clear that just because an IC
officer has signals intelligence information about a foreign person
doesn’t mean she can disseminate it as foreign intelligence, unless
there is some other basis to consider it foreign intelligence
information.
In short, for the first time, we have instituted
express and transparent requirements to take account of the privacy of
people outside our nation in how we conduct some of our intelligence
activities. These new protections are, I think, a demonstration of our
nation’s enduring commitment to respecting the personal privacy and
human dignity of citizens of all countries.
Other Activities/Going Forward
There
is much more that we have done but I am running short of time. The
Administration has endorsed changes to the operation of the Foreign
Intelligence Surveillance Court that were contained in the USA FREEDOM
Act, not because the court is a rubber stamp as some charged – the
documents we have released make clear that it is not – but in order to
reassure the public. These include creation of a panel of lawyers who
can advocate for privacy interests in appropriate cases, and continued
declassification and release of significant court opinions. We are
taking steps to limit the length of time that secrecy that can be
imposed on recipients of National Security letters. We are continuing
to implement rules to protect Intelligence Community whistleblowers who
report through proper channels. These steps are discussed more fully in
the materials we released yesterday.
So where do we go from
here? The President has directed that we report again in one year. In
the interim, we will continue to implement the reforms that the
President directed in PPD-28 and his speech. We will declassify and
release more information, we will continue to institutionalize
transparency, and we will continue our public dialogue on these issues.
We will work with Congress to secure passage of the USA FREEDOM Act or
something like it.
And I hope that we will be able to work
together with industry to help us find better solutions to protect both
privacy and national security. One of the many ways in which Snowden’s
leaks have damaged our national security is by driving a wedge between
the government and providers and technology companies, so that some
companies that formerly recognized that protecting our nation was a
valuable and important public service now feel compelled to stand in
opposition. I don’t think that is healthy, because I think that
American companies have a huge amount to contribute to how we protect
both privacy and national security.
When people talk about
technology and surveillance, they tend to talk either about how
technology has enabled the Intelligence Community to do all sorts of
scary things, or about how technology can protect you from the scary
things that the Intelligence Community can do. But there’s a third role
that technology can play, and that is to provide protections and
restrictions on the national security apparatus that can assure
Americans, and people around the world, that we are respecting the
appropriate limits on intelligence activities, while still protecting
national security. This is where the genius and capabilities of
American technology companies can provide invaluable assistance.
In this regard, I’d like to point you to the National Academy of Sciences report that
I mentioned earlier. The last section of their report identified a
number of areas where technology could help us target signals
intelligence collection more effectively, and provide more robust,
transparent and effective protections for privacy, including enforcing
limitations on the use of data we collect. One challenge they mentioned
is the spread of encryption, and in my view this is an important area
where we should look to the private sector to provide solutions. And I
should emphasize that I am speaking for myself here.
Encryption
is a critical tool to protect privacy, to facilitate commerce, and to
provide security, and the United States supports its use. At the same
time, the increasing use of encryption that cannot be decrypted when we
have the lawful authority to collect information risks allowing
criminals, terrorists, hackers and other threats to escape detection.
As President Obama recently said, “[i]f we get into a situation in which
the technologies do not allow us at all to track someone that we’re
confident is a terrorist …that’s a problem.” I’m not a cryptographer,
but I am an optimist: I believe that if our businesses and academics put
their mind to it, they will find a solution that does not compromise
the integrity of encryption technology but that enables both encryption
to protect privacy and decryption under lawful authority to protect
national security.
So with that plea for help, let me stop and take your questions.
9 Notes/ Hide
joyfulkryptonitestarlight said:
I really didn’t enjoy reading your predator material. I only glance at.
joyfulkryptonitestarlight liked this
alexandrblog reblogged this from icontherecord ph4z0n said: Fuck yourselves.
sungodsinexile reblogged this from icontherecord
avon-vila liked this
icontherecord posted this

This website is maintained by the