• Home
  • News
  • Fortune 500
  • Tech
  • Finance
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
Hackers

NSA quietly expanded Internet snooping powers, leaked documents show

Robert Hackett
By
Robert Hackett
Robert Hackett
Robert Hackett
By
Robert Hackett
Robert Hackett
June 5, 2015, 9:27 AM ET
Nat'l Security Agency Director Attends AEI Discussion On Cybersecurity
WASHINGTON, DC - JULY 09: National Security Agency Director Gen. Keith Alexander speaks about cybersecurity and the new threats posed to the U.S. economy and military at the American Enterprise Institute July 9, 2012 in Washington, DC. Alexander is also the commander of the U.S. Cyber Command and chief at the Central Security Service, with responsibility for national foreign intelligence, combat support and U.S. national security information system protection. Alexander said that in cyberspace "the probability for crisis is mounting," and that now is the time for putting into place strong policies and rules for operations and defense. (Photo by Chip Somodevilla/Getty Images)Chip Somodevilla Getty Images

A new jointreport from the New York Times and ProPublica that cites classified documents reveals that the Obama administration secretly granted the National Security Agency additional authorities to spy on the international Internet communications of Americans in order to seek out hacking attacks from abroad. The expanded powers, which aimed to help the agency seek out and squelch foreign-born cyber intrusions, had not been previously disclosed to the public.

The latest news comes from the trove of documents provided by NSA contractor-turned-leaker Edward Snowden. As this set divulges: In May 2012, the Justice Department approved the NSA to target Internet traffic bearing “certain signatures,” or activity correlating to cyber attacks. Two months later, the department allowed the agency to target communications based on IP addresses.

Those permissions boosted the agency’s collection capabilities. The NSA had already been able to use email addresses and phone numbers to conduct its surveillance activities, the pair of news outlets points out. But by mid-2012, executive branch had “started allowing the agency to search its communications streams for less-identifying Internet protocol addresses or strings of harmful computer code.”

The report also reveals that the NSA desired to sidestep the thorny problem of cyber attack attribution, which tended to impede its surveillance. An NSA newsletter dated late March 2012 describes a proposal that would allow the NSA to collect data indiscriminately at the nation’s digital borders, without requiring attribution to terrorist groups or foreign governments. Instead, the updated provision would require only “that a selector be tied to malicious cyber activity.”

The augmented authority “will fill a huge collection gap against cyber threats to the nation,” the newsletter declared, noting that its approval was one of then-NSA director General Keith B. Alexander’s “highest priorities.”

That approval didn’t exactly pan out. While the NSA did not, apparently, win the right to target communications in the absence of evidence associating them with other nations and radical organizations, it still was able to greatly broaden its collection schemes through “targeting cyber signatures,” such as IP address and strings of code, as aforementioned.

This quiet expansion of powers was not isolated to the NSA either. The Federal Bureau of Investigation benefitted, too.

As the two agencies’ relationship has grown tighter over the years, the FBI was, also starting in 2012, able to tap into the NSA’s electronic surveillance program at international communications “chokepoints operated by U.S. providers,” another document reveals. While all of the collected information would be intended to combat foreign threats, it could easily ensnare Americans. Plus, any of the collected data could then be used by prosecutors in criminal cases, the Times notes.

When the Times asked the FBI for comment, the bureau directed the paper “to its existing procedures for protecting victims’ data acquired during investigations,” says the Times. The bureau added that it has “continually reviewed its policies ‘to adapt to these changing threats while protecting civil liberties and the interests of victims of cybercrimes.’”

Still, the NSA’s methodology for selecting targets remains unclear. And, as the Times notes, through this program the NSA almost certainly would have been scooping up oodles of sensitive American data as a result, since monitoring cyber thieves necessarily involves tracking and copying the information they’re looting.

An NSA lawyer, acknowledging this point in another leaked document, had recommended separating that information out from the rest of the NSA’s data collection programs—making it “available only to those who have the mission to collect/report on these types of foreign intrusions”—since it can contain “so much” information on U.S. persons.

Knowledge of the agency’s boosted warrantless snooping privileges comes just as the ink on the USA Freedom Act—a partial replacement of the USA Patriot Act, which largely authorized the NSA’s bulk data collection program—is barely dry. As more such revelations come to light, expect the debate over Internet surveillance between national security-minded government officials and privacy advocates to continue to play out.

Subscribe to Data Sheet, Fortune’s daily newsletter on the business of technology.

About the Author
Robert Hackett
By Robert Hackett
Instagram iconLinkedIn iconTwitter icon
See full bioRight Arrow Button Icon
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Fortune Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.