{"id":142983,"date":"2015-01-12T18:57:57","date_gmt":"2015-01-12T18:57:57","guid":{"rendered":"http:\/\/rinf.com\/alt-news\/?p=142983"},"modified":"2015-01-12T18:57:57","modified_gmt":"2015-01-12T18:57:57","slug":"new-document-reveals-fbis-role-nsa-surveillance-program","status":"publish","type":"post","link":"http:\/\/rinf.com\/alt-news\/breaking-news\/new-document-reveals-fbis-role-nsa-surveillance-program\/","title":{"rendered":"New document reveals FBI\u2019s role in NSA surveillance program"},"content":{"rendered":"<p>Documents provided by the Federal Bureau of Investigation suggest that the FBI has played a part in the National Security Agency\u2019s surveillance operations to a much greater extent than previously acknowledged.<\/p>\n<p>A <a href=\"https:\/\/www.documentcloud.org\/documents\/1393385-savage-nyt-foia-doj-ig-reports-complaint.html\" target=\"_blank\">Freedom of Information Act request<\/a> filed last year by New York Times journalist Charlie Savage prompted the FBI to release a <a href=\"https:\/\/s3.amazonaws.com\/s3.documentcloud.org\/documents\/1393145\/savage-nyt-foia-doj-ig-report-fbi-702.pdf\" target=\"_blank\">redacted version<\/a> of an inspector general report from September 2012 in which the Department of Justice\u2019s internal watchdog weighed in on the bureau\u2019s use of a federal provision that permits the collection of foreign communications.<\/p>\n<p>It\u2019s no secret the NSA relies greatly on the rule called Section 702, which comes from the amendments tacked on to the US Foreign Intelligence Surveillance Act in 2008, to collect internet and phone data from non-Americans reasonably believed to be located outside of the country. <a href=\"http:\/\/www.nytimes.com\/2015\/01\/12\/us\/politics\/beyond-nsa-fbi-is-assuming-a-larger-surveillance-role-report-shows.html\" target=\"_blank\">According<\/a> to Savage, the FBI \u201chas gradually become a significant player\u201d with regards to administering the sweeping-up of signals intelligence, as indicated by the DOJ Inspector General report published by the Times on Monday.<\/p>\n<p>The 231-page report, Savage noted, contains a single, unredacted reference to \u201cPrism,\u201d the internet surveillance program used by the NSA to gather intelligence from major web firms, including Facebook, Yahoo and Skype, which was revealed publically for the first time in June 2013 by former government contractor Edward Snowden. It also contains details confirming the US spy agency has for more than five years shared its signals intelligence with law enforcement investigators within the FBI.<\/p>\n<p>Although much of the report has been blacked-out ahead of being sent to the newspaper, it provides a thorough account nonetheless of the FBI\u2019s part in SIGINT collection that had previously been kept from public review. Savage <a href=\"http:\/\/www.nytimes.com\/interactive\/2015\/01\/12\/us\/12-doj-ig-fbi-702-foia.html\" target=\"_blank\">wrote<\/a> this week that the DOJ\u2019s Office of the Inspector General released only a <a href=\"http:\/\/www.justice.gov\/oig\/press\/2012\/2012_09_25.pdf\" target=\"_blank\">two-paragraph statement<\/a> in 2012 acknowledging that a report \u201cOn Activities Under Section 702\u201d exists and had been sent to Congress but, \u201c<em>because the report is classified, its contents cannot be disclosed to the public.\u201d<\/em><\/p>\n<p>Within the report are comments from the DOJ\u2019s Inspector General in which the FBI\u2019s \u201c702 Team\u201d is hailed for its <em>\u201ccommendable deliberation, thoroughness and professionalism,<\/em>\u201d and elsewhere its content indicates that the bureau began back in October 2009 to receive \u201craw 702-acquired data\u201d that had been \u201c<em>dual rooted<\/em>\u201d during the NSA\u2019s collection, \u201c<em>so that it could retain this data for analysis and dissemination in intelligence reports<\/em>.\u201d<\/p>\n<p>That month, Savage explained, \u201c<em>the FBI started retaining copies of unprocessed communications gathered without a warrant to analyze for its own purposes.<\/em>\u201d And by April 2012, the report reveals, the FBI began \u201cnominating\u201d selectors, or certain search terms, queried within the NSA-collected database to aid with its own intelligence reporting.<\/p>\n<p>Previously, leaked documents provided by Snowden to The Guardian newspaper revealed that, although the NSA and other American agencies are barred from collecting intelligence on US citizens, the spy agency has since 2011 been authorized to search SIGINT data for details on specific individuals, American citizens included, once those records are whittled down from data unearthed during queries concerning non-US persons of interest.<\/p>\n<p>US President Barack Obama said in 2013 that a panel put together by the White House would review the intelligence community\u2019s surveillance programs, and the committee\u2019s subsequent report determined that particular aspects push the programs <em>&#8220;close to the line of constitutional reasonableness.&#8221;<\/em><\/p>\n<p><em>\u201cAlthough US persons may not be targeted under Section 702, communications of or concerning US persons may be acquired in a variety of ways,\u201d<\/em> a portion of the report reads. <em>\u201cAn example is when a US person communicates with a non-US person who has been targeted, resulting in what is termed \u2018incidental\u2019 collection. Another example is when two non-US persons discuss a US person. Communications of or concerning US persons that are acquired in these ways may be retained and used by the government, subject to applicable rules and requirements. The communications of US persons may also be collected by mistake, as when a US person is erroneously targeted or in the event of a technological malfunction, resulting in \u2018inadvertent\u2019 collection. In such cases, however, the applicable rules generally require the communications to be destroyed.\u201d<\/em><\/p>\n<p>Privacy advocates and digital rights proponents have raised concerns about the program nevertheless, however, with Cindy Cohn, the legal director of the Electronic Frontier Foundation, <a href=\"http:\/\/rt.com\/usa\/169980-fisa-702-privacy-review\/\" target=\"_blank\">writing last year<\/a>that the review group\u2019s recommendations for the White House still fell short of what could be accomplished to ensure proper protections are put in place for the communications by Americans.<\/p>\n<p>\u201c<em>The board skips over the essential privacy problem with the 702 upstream program: that the government has access to or is acquiring nearly all communications that travel over the internet,\u201d<\/em> she wrote. \u201c<em>The government&#8217;s collection and search of Americans&#8217; communications without a warrant or individually approved court order is barred by the Constitution and must be stopped.&#8221;<\/em><\/p>\n<p>According to Savage, the Times\u2019 legal team may choose to challenge the 2012 inspector general report in court in the hope of having some of the redactions reversed before its release is reconsidered.<\/p>\n<p><em><a href=\"http:\/\/rt.com\/usa\/221843-fbi-fisa-faa-savage\/\" target=\"_blank\">This piece<\/a> was reprinted by <a href=\"http:\/\/rinf.com\" target=\"_blank\">RINF Alternative News<\/a> with permission or license.\u00a0<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Documents provided by the Federal Bureau of Investigation suggest that the FBI has played a part in the National Security Agency\u2019s surveillance operations to a much greater extent than previously acknowledged. A Freedom of Information Act request filed last year by New York Times journalist Charlie Savage prompted the FBI to release a redacted version [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":132356,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[487,1614],"tags":[],"class_list":{"0":"post-142983","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-breaking-news","8":"category-surveillance-big-brother"},"_links":{"self":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts\/142983","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/comments?post=142983"}],"version-history":[{"count":0,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts\/142983\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/media\/132356"}],"wp:attachment":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/media?parent=142983"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/categories?post=142983"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/tags?post=142983"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}