Dir. of National Intelligence James Clapper Condemns “Rush to Publish,” “Reckless Disclosures”

Irresponsible click-bait journalism driven by egomaniacs
Media • Views: 25,540

Director of National Intelligence James Clapper had some very strong words today on the subject of those leaks published by the Washington Post and the Guardian’s Glenn Greenwald:

Clapper said the programs are both longstanding and well-known to Congress, which he said is briefed twice a year about the surveillance activities approved by the Foreign Intelligence Surveillance Act court. Despite that routine disclosure, Clapper blasted the past week’s release of information on the data-gathering programs.

“Over the last week we have seen reckless disclosures of intelligence community measures used to keep Americans safe,” Clapper said in a statement. “In a rush to publish, media outlets have not given the full context - including the extent to which these programs are overseen by all three branches of government - to these effective tools.”

Clapper said the classified nature of the electronic surveillance programs prevents him from being able to correct specific errors in stories published about them.

“There are significant misimpressions that have resulted from the recent articles,” he said. “Not all the inaccuracies can be corrected without further revealing classified information.

Instead, Clapper said he declassified a 2 1/2-page document with some new details about the program to “help dispel some of the myths and add necessary context to what has been published.”

The document said that PRISM “is not an undisclosed collection or data mining program” but rather “an internal government computer system” for gathering foreign intelligence under the act, and that the government “does not unilaterally obtain information from the servers of U.S. electronic communication service providers” since Section 702, which was reauthorized by Congress in December 2012, cannot be used to intentionally target any U.S. citizen.

No information gathered from technology companies that participate in the PRISM program is collected “unilaterally” or without the company’s knowledge, according to the document.

Clapper also said that the information gathered through these NSA programs has been very valuable in protecting the US against terrorist plots:

The bullet points on intelligence-gathering under Section 702 of the Foreign Intelligence Surveillance Act released Saturday do not provide specifics about what information it has uncovered through its widespread electronic surveillance.

But they do state that communications that have been intercepted “have provided the intelligence community insight into terrorist networks and plans. For example, the Intelligence Community acquired information on a terrorist organization’s strategic planning efforts.”

The information gathered has “yielded intelligence regarding proliferation networks and have directly and significantly contributed to successful operations to impede the proliferation of weapons of mass destruction and related technologies,” according to the DNI fact sheet, and allowed the intelligence community to thwart “specific potential computer network attacks.”

UPDATE at 6/8/13 6:20:06 pm

Here’s the fact sheet released by the DNI today:

Facts on the Collection of Intelligence Pursuant to Section 702 of the Foreign Intelligence Surveillance Act

· PRISM is not an undisclosed collection or data mining program. It is an internal government computer system used to facilitate the government’s statutorily authorized collection of foreign intelligence information from electronic communication service providers under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. § 1881a). This authority was created by the Congress and has been widely known and publicly discussed since its inception in 2008.

· Under Section 702 of FISA, the United States Government does not unilaterally obtain information from the servers of U.S. electronic communication service providers. All such information is obtained with FISA Court approval and with the knowledge of the provider based upon a written directive from the Attorney General and the Director of National Intelligence. In short, Section 702 facilitates the targeted acquisition of foreign intelligence information concerning foreign targets located outside the United States under court oversight. Service providers supply information to the Government when they are lawfully required to do so.

· The Government cannot target anyone under the court-approved procedures for Section 702 collection unless there is an appropriate, and documented, foreign intelligence purpose for the acquisition (such as for the prevention of terrorism, hostile cyber activities, or nuclear proliferation) and the foreign target is reasonably believed to be outside the United States.

We cannot target even foreign persons overseas without a valid foreign intelligence purpose.

· In addition, Section 702 cannot be used to intentionally target any U.S. citizen, or any other U.S. person, or to intentionally target any person known to be in the United States. Likewise, Section 702 cannot be used to target a person outside the United States if the purpose is to acquire information from a person inside the United States.

· Finally, the notion that Section 702 activities are not subject to internal and external oversight is similarly incorrect. Collection of intelligence information under Section 702 is subject to an extensive oversight regime, incorporating reviews by the Executive, Legislative and Judicial branches.

· The Courts. All FISA collection, including collection under Section 702, is overseen and monitored by the FISA Court, a specially established Federal court comprised of 11 Federal judges appointed by the Chief Justice of the United States.

o The FISC must approve targeting and minimization procedures under Section 702 prior to the acquisition of any surveillance information.

§ Targeting procedures are designed to ensure that an acquisition targets non- U.S. persons reasonably believed to be outside the United States for specific purposes, and also that it does not intentionally acquire a communication when all the parties are known to be inside the US.

§ Minimization procedures govern how the Intelligence Community (IC) treats the information concerning any U.S. persons whose communications might be incidentally intercepted and regulate the handling of any nonpublic information concerning U.S. persons that is acquired, including whether

information concerning a U.S. person can be disseminated. Significantly, the dissemination of information about U.S. persons is expressly prohibited unless it is necessary to understand foreign intelligence or assess its importance, is evidence of a crime, or indicates a threat of death or serious bodily harm.

· The Congress. After extensive public debate, the Congress reauthorized Section 702 in December 2012.

o The law specifically requires a variety of reports about Section 702 to the Congress.

§ The DNI and AG provide exhaustive semiannual reports assessing compliance with the targeting and minimization procedures.

§ These reports, along with FISA Court opinions, and a semi-annual report by the Attorney General are provided to Congress. In short, the information provided to Congress by the Executive Branch with respect to these activities provides an unprecedented degree of accountability and transparency.

o In addition, the Congressional Intelligence and Judiciary Committees are regularly briefed on the operation of Section 702.

· The Executive. The Executive Branch, including through its independent Inspectors General, carries out extensive oversight of the use of Section 702 authorities, which includes regular on-site reviews of how Section 702 authorities are being implemented. These regular reviews are documented in reports produced to Congress. Targeting decisions are reviewed by ODNI and DOJ.

o Communications collected under Section 702 have provided the Intelligence Community insight into terrorist networks and plans. For example, the Intelligence Community acquired information on a terrorist organization’s strategic planning efforts.

o Communications collected under Section 702 have yielded intelligence regarding proliferation networks and have directly and significantly contributed to successful operations to impede the proliferation of weapons of mass destruction and related technologies.

o Communications collected under Section 702 have provided significant and unique intelligence regarding potential cyber threats to the United States including specific potential computer network attacks. This insight has led to successful efforts to mitigate these threats.

UPDATE at 6/8/13 6:23:22 pm

Jump to top

Create a PageThis is the LGF Pages posting bookmarklet. To use it, drag this button to your browser's bookmark bar, and title it 'LGF Pages' (or whatever you like). Then browse to a site you want to post, select some text on the page to use for a quote, click the bookmarklet, and the Pages posting window will appear with the title, text, and any embedded video or audio files already filled in, ready to go.
Or... you can just click this button to open the Pages posting window right away.
Last updated: 2023-04-04 11:11 am PDT
LGF User's Guide RSS Feeds

Help support Little Green Footballs!

Subscribe now for ad-free access!Register and sign in to a free LGF account before subscribing, and your ad-free access will be automatically enabled.

Donate with
PayPal
Cash.app
Recent PagesClick to refresh
The Pandemic Cost 7 Million Lives, but Talks to Prevent a Repeat Stall In late 2021, as the world reeled from the arrival of the highly contagious omicron variant of the coronavirus, representatives of almost 200 countries met - some online, some in-person in Geneva - hoping to forestall a future worldwide ...
Cheechako
4 days ago
Views: 130 • Comments: 0 • Rating: 1
Texas County at Center of Border Fight Is Overwhelmed by Migrant Deaths EAGLE PASS, Tex. - The undertaker lighted a cigarette and held it between his latex-gloved fingers as he stood over the bloated body bag lying in the bed of his battered pickup truck. The woman had been fished out ...
Cheechako
2 weeks ago
Views: 294 • Comments: 0 • Rating: 1