Skip to main content

Officials cite thwarted plots, oversight in defending surveillance

By Dana Bash and Tom Cohen, CNN
updated 6:38 AM EDT, Wed June 19, 2013
STORY HIGHLIGHTS
  • Officials disclose details of plots to bomb New York's subway system, stock exchange
  • Secret surveillance programs helped uncover more than 50 terrorist acts, officials say
  • The NSA chief says intelligence leaks about the surveillance programs harmed security
  • NEW: Official: "If you're looking for the needle in a haystack, you have to have the haystack"

Washington (CNN) -- Bomb plots targeting the New York Stock Exchange and the city's subway were among more than 50 terrorist acts worldwide thwarted by top-secret surveillance programs since the 2001 al Qaeda attacks on the United States, security officials said Tuesday.

The startling details disclosed at a House intelligence committee hearing reflected a unified effort by the Obama administration and legislators to defend the telephone and e-mail surveillance made public this month by classified leaks to newspapers.

Testimony by Gen. Keith Alexander, the National Security Agency director, as well as officials from the FBI, Department of Justice and the Director of National Intelligence office called the programs created under the Patriot Act in the aftermath of the 9/11 attacks a vital tool against terrorist plots.

NSA: 50 plots prevented since 9/11
Thwarted terror plot details revealed
Analysis of Obama on NSA policies

Joined by panel Chairman Rep. Mike Rogers and other legislators, they condemned the document leaks by former government contractor Edward Snowden as harmful to the United States and its allies.

The leaks also led to what officials called widespread public misinformation about the surveillance programs that necessitated the relatively rare open hearing by the intelligence panel, where they detailed previously classified information in order to set the record straight.

It was the most comprehensive and specific defense of the surveillance methods that have come under ferocious criticism from civil liberties groups, some members of Congress and others concerned about the reach of government into the private lives of citizens.

National security and law enforcement officials repeated that the programs are tightly run with significant regulation and oversight by federal judges and Congress.

Addressing the most basic questions that have emerged, Rogers asked Alexander if intelligence workers have the ability to simply "flip a switch" in order to listen to phone calls or read the emails of Americans.

When Alexander replied "no," Rogers asked again to reinforce the message for anyone listening.

"So the technology does not exist for any individual or group of individuals at the NSA to flip a switch to listen to Americans' phone calls or read their e-mails?" he repeated.

"That is correct," Alexander answered.

He and others also asserted that the leaks were egregious and carry huge consequences for national security.

"I think it was irreversible and significant damage to this nation," Alexander said when questioned by Rep. Michele Bachmann.

"Has this helped America's enemies?" the conservative Minnesota Republican asked.

"I believe it has and I believe it will hurt us and our allies," Alexander said.

President Barack Obama has defended the programs as necessary in an era of terror.

In an interview with PBS' Charlie Rose broadcast on Monday night, Obama said the situation requires a national debate on the balance between security and privacy.

Obama bristles at suggestion he's shifted on snooping

Alexander told a Senate committee last week that the surveillance programs helped stop dozens of terror plots, but he was unable then to provide classified details.

Under pressure from Rogers and other legislators, Alexander joined law enforcement officials Tuesday in making public some declassified details of the Patriot Act provisions.

In recent years, Alexander said, information "gathered from these programs provided government with critical leads to prevent over 50 potential terrorist events in more than 20 countries around the world."

Details of most of the thwarted terrorism acts remain secret, but national security officials said they were working on declassifying more information and could have a report to Congress as early as this week.

Sean Joyce, the deputy FBI director, detailed how email surveillance of foreigners under one program helped authorities discover the two New York City plots.

In the fall of 2009, Joyce said, the NSA intercepted an e-mail from a suspected terrorist in Pakistan. That person was talking with someone in the United States "about perfecting a recipe for explosives," he said.

Authorities identified Afghan-born Najibullah Zazi of Denver. The FBI followed him to New York and eventually broke up planning to attack the city's subway system. Zazi pleaded guilty and is currently in prison.

Snowden claims online Obama expanded 'abusive' security

In the other New York case, the NSA was monitoring a "known extremist" in Yemen who was in contact with a person in the United States, Joyce said. The FBI detected "nascent plotting" to bomb the stock exchange, long considered a target of terrorists, and the plotters were later convicted, according to Joyce.

He also said e-mail surveillance disrupted an effort to attack the office of a Danish newspaper that was threatened for publishing a cartoon of the Prophet Mohammed in 2006.

The plot involved David Headley, a U.S citizen living in Chicago. The FBI received intelligence at the time regarding his possible involvement in the 2008 Mumbai terror attack that killed 164 people, Joyce said.

The NSA, through surveillance of an al Qaeda-affiliated terrorist, found that Headley was working on a plot to bomb the newspaper.

Headley later confessed to conducting surveillance and was convicted. He also pleaded guilty to conducting surveillance in the Mumbai case.

In a fourth case, secret surveillance "tipped us off" to a person who had indirect contacts with a known terrorist group overseas, Joyce said.

"We were able to reopen this investigation, identify additional individuals through the legal process and were able to disrupt this terrorist activity," Joyce said.

In an exchange with Joyce, Rep. Mac Thornberry of Texas said the case involved someone financing a designated terrorist group in Somalia.

Rogers, who scheduled the hearing in recent days after Alexander pledged to declassify information on terror plots thwarted by the secret programs, said it was necessary to clear up public confusion caused by misinformation.

"If half the things I read in blog and other places were true, I wouldn't support it," the Michigan Republican said, later adding that skeptics "have no understanding" of what is going on.

In particular, he said Snowden disclosed only a sliver of information about the programs without knowing the full extent of what they did and the strict regulation and oversight of them.

"None of the things he talked about were accurate," Rogers said of Snowden.

The hearing came one day after Snowden defended his actions in leaking classified documents to Britain's Guardian newpaper and the Washington Post.

In a series of blog posts on the Guardian website, the 29-year-old Snowden said he disclosed the information because Obama worsened "abusive" surveillance practices instead of curtailing them as he promised as a presidential candidate.

The former NSA contractor insisted that U.S. authorities have access to phone calls, e-mails and other communications far beyond constitutional bounds. While he said legal restrictions can be easily skirted by analysts at the NSA, FBI and CIA, Snowden stopped short of accusing authorities of violating specific laws.

Instead, he said toothless regulations and policies were to blame for what he called "suspicionless surveillance," and he warned that policies can be changed to allow further abuses.

At Tuesday's hearing, officials detailed how the programs operate and the judicial and legislative oversight involved, repeating several times how access to the content of e-mails or telephone calls -- or even the names of people involved -- required authorization.

Deputy Attorney General James Cole noted that basic phone records collected under Section 215 of the Patriot Act were not protected by Fourth Amendment rights to privacy, citing a 1979 Supreme Court ruling.

In the case, Smith v. Maryland, the justices ruled that information about telephone calls -- such as their time and duration -- was different from the content of the calls and therefore not protected under the Fourth Amendment.

Cole also provided a detailed description of the legal framework of the programs, noting that the anti-terrorism surveillance effort is not "off the books" or "hidden away."

"This is part of what government puts together and discusses," he said. "Statutes are passed. It is overseen by three branches of our government -- the Legislature, the Judiciary, and the Executive Branch."

He described the U.S. phone records collected under Section 215 as basic information "just like what you would get in your own phone bill."

"It is the number that was dialed from, the number that was dialed to, the date and the length of time. That's all we get," he said. "We do not get the identity of any of the parties to this phone call. We don't get any cell site or location information as to where any of these phones were located. And, most importantly, and you're probably going to hear this about 100 times today, we don't get any content under this. We don't listen in on anybody's calls under this program at all."

Tech companies jockey to seem the most transparent

Instead, it takes permission from a special court to get access to further information, based on a verifiable link to a terrorism investigation, Cole explained. Such links have mostly come from another surveillance program that collects communications information of foreign terrorism suspects living overseas.

Critics question the need to store the vast amount of U.S. phone records, saying it creates a database prone to abuses and provides little return for the risk and privacy concerns.

Alexander said Tuesday the phone database played a role in stopping 10 terrorist acts since the 9/11 attacks. At the same time, he and other officials said there were no cases they knew of in which anyone willfully misused the system to access information.

"If you're looking for the needle in a haystack," Cole said, "you have to have the haystack."

ADVERTISEMENT
Part of complete coverage on
Data mining & privacy
updated 10:25 AM EDT, Sun June 23, 2013
He's a high-school dropout who worked his way into the most secretive computers in U.S. intelligence as a defense contractor.
updated 8:26 AM EDT, Thu May 29, 2014
Traitor or patriot? Low-level systems analyst or highly trained spy?
updated 3:27 PM EDT, Thu May 29, 2014
What are the takeaways from Snowden's NBC interview? You might be surprised.
updated 7:52 AM EDT, Fri April 18, 2014
Months after accepting asylum in Russia, Snowden asked Putin about Moscow's own surveillance practices.
updated 12:43 PM EDT, Wed March 12, 2014
A federal judge has refused the Obama administration's request to extend storage of classified NSA telephone surveillance data beyond the current five-year limit.
updated 8:44 PM EDT, Sun March 9, 2014
From his sanctuary in the Ecuadorian embassy in London, Julian Assange said that everyone in the world will be just as effectively monitored soon -- at least digitally.
updated 8:39 PM EDT, Mon March 10, 2014
In a rare public talk via the Web, fugitive NSA leaker Edward Snowden urged a tech conference audience to help "fix" the U.S. government's surveillance of its citizens.
updated 11:55 PM EDT, Thu August 1, 2013
The White House is "very disappointed" that National Security Agency leaker Edward Snowden has been granted temporary asylum in Russia.
updated 8:57 AM EST, Tue December 10, 2013
Spies with surveillance agencies in the U.S. and U.K. infiltrated video games like "World of Warcraft" in a hunt for terrorists "hiding in plain sight" online.
updated 7:39 AM EDT, Fri August 2, 2013
Bradley Manning and Edward Snowden both held jobs that gave them access to some of their country's most secret and sensitive intelligence. They chose to share that material with the world and are now paying for it.
updated 10:35 AM EDT, Thu August 1, 2013
The NSA's controversial intelligence-gathering programs have prevented 54 terrorist attacks around the world, including 13 in the United States.
updated 2:54 PM EDT, Thu August 1, 2013
You've never heard of XKeyscore, but it definitely knows you. The National Security Agency's top-secret program essentially makes available everything you've ever done on the Internet.
updated 9:04 AM EDT, Sun August 18, 2013
You may have never heard of Lavabit and Silent Circle. That's because they offered encrypted (secure) e-mail services, something most Americans have probably never thought about needing.
updated 2:54 PM EDT, Wed July 24, 2013
"Any analyst at any time can target anyone. Any selector, anywhere ... I, sitting at my desk, certainly had the authorities to wiretap anyone."
updated 9:56 AM EDT, Tue July 2, 2013
President Barack Obama responds to outrage by European leaders over revelations of alleged U.S. spying.
updated 10:48 AM EDT, Tue April 1, 2014
Browse through a history of high-profile intelligence leaking cases.
updated 10:37 AM EDT, Tue July 2, 2013
Former President George W. Bush talks Snowden, AIDS, Mandela and his legacy.
updated 9:04 AM EDT, Wed June 26, 2013
Edward Snowden took a job with an NSA contractor in order to gather evidence about U.S. surveillance programs.
updated 6:47 AM EDT, Wed June 19, 2013
With reports of NSA snooping, many people have started wondering about their personl internet security.
updated 9:52 AM EDT, Wed August 14, 2013
Click through our gallery to learn about other major leaks and what happened in the aftermath.
updated 4:02 PM EDT, Sun June 9, 2013
What really goes on inside America's most secretive agency? CNN's Chris Lawrence reports.
ADVERTISEMENT