Feeds

NSA admits slurping thousands of domestic emails with no terror connection

Turns out, the innocent have everything to fear

Application security programs and practises

The analysts at the NSA spent years gathering tens of thousands of emails between US citizens in violation of the US constitution, as a component of a single (discontinued) data slurping program, the agency has revealed.

These emails were from people with no direct connection to terrorism, according to a secret opinion from the Foreign Intelligence Surveillance Act (FISC) court that was declassified by the NSA on Wednesday. The court found that this data gathering violated the Fourth Amendment of the constitution, which enshrines the right of people to be free of "unreasonable searches and seizures".

"Each year, NSA's upstream collection likely results in the acquisition of roughly two to ten thousand discrete wholly domestic communications that are neither to, from, nor about a targeted selector, as well as tens of thousands of other communications that are to or from a United States person or a person in the United States but that are neither to, from, nor about a targeted selector," according to the FISC court 2011 opinion.

The document was declassified after legal action by privacy activists the Electronic Frontier Foundation.

The opinion ultimately saw the court not authorize the continued data slurp due to worries over violation of the US constitution's Fourth Amendment, and makes for an interesting read. The document states that the NSA told the government in a letter that "NSA's "upstream collection" of Internet communications includes the acquisition of entire "transaction[s]"."

"Such transactions may contain data that is wholly unrelated to the tasked selector, including the full content of discrete communications that are not to, from, or about the facility tasked for collection."

The opinion stresses that the NSA performs this data slurp of US communications due to technical limitations in how it hoovers up the data.

"The court now understands, however, that NSA has acquired, is acquiring, and, if the certifications and procedures now before the Court are approved, will continue to acquire, "tens of thousands of wholly domestic communications", the court writes.

Although in this case the FISC application was not authorized, this will prove of little reassurance, as the verdict concludes that the government had not been truthful with the secret court.

"The government's submissions make clear not only that the NSA has been acquiring Internet transactions since before the Court's approval of the section 702 certification in 2008, but also that NSA seeks to continue the collection of Internet transactions."

In the past NSA bigwig Keith Alexander has sought to reassure the privacy-paranoid that "our people have to take courses and pass exams to use this data". ®

HP ProLiant Gen8: Integrated lifecycle automation

More from The Register

next story
Adam Afriyie MP: Smart meters are NOT so smart
Mega-costly gas 'n' 'leccy totting-up tech not worth it - Tory MP
Just TWO climate committee MPs contradict IPCC: The two with SCIENCE degrees
'Greenhouse effect is real, but as for the rest of it ...'
'Blow it up': Plods pop round for chat with Commonwealth Games tweeter
You'd better not be talking about the council's housing plans
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.