Skip to main content
Part of complete coverage from

Snowden -- facts, fictions and fears

By Michael Hayden, CNN Contributor
updated 2:54 PM EDT, Wed July 24, 2013
John Walker ran a father and son spy ring, passing classified material to the Soviet Union from 1967 to 1985. Walker was a Navy communication specialist with financial difficulties when he walked into the Soviet Embassy and sold a piece of cyphering equipment. Navy and Defense officials said that Walker enabled the Soviet Union to unscramble military communications and pinpoint the location of U.S. submarines at all times. As part of his plea deal, prosecutors promised leniency for Walker's son Michael Walker, a former Navy seaman. Click through the gallery to see other high-profile leak scandals the United States has seen over the years. John Walker ran a father and son spy ring, passing classified material to the Soviet Union from 1967 to 1985. Walker was a Navy communication specialist with financial difficulties when he walked into the Soviet Embassy and sold a piece of cyphering equipment. Navy and Defense officials said that Walker enabled the Soviet Union to unscramble military communications and pinpoint the location of U.S. submarines at all times. As part of his plea deal, prosecutors promised leniency for Walker's son Michael Walker, a former Navy seaman. Click through the gallery to see other high-profile leak scandals the United States has seen over the years.
HIDE CAPTION
Sharing secrets: U.S. intelligence leaks
Sharing secrets: U.S. intelligence leaks
Sharing secrets: U.S. intelligence leaks
Sharing secrets: U.S. intelligence leaks
Sharing secrets: U.S. intelligence leaks
Sharing secrets: U.S. intelligence leaks
Sharing secrets: U.S. intelligence leaks
Sharing secrets: U.S. intelligence leaks
Sharing secrets: U.S. intelligence leaks
Sharing secrets: U.S. intelligence leaks
<<
<
1
2
3
4
5
6
7
8
9
10
>
>>
STORY HIGHLIGHTS
  • Michael Hayden: Many have misconstrued NSA access to phone calls
  • He says agency has information on calls but not content of the calls
  • Hayden says agency needs metadata on calls to track terrorists
  • He says NSA was criticized in wake of 9/11 for not detecting the plot

Editor's note: Gen. Michael V. Hayden, a former National Security Agency director who was appointed by President George W. Bush as CIA director in 2006 and served until February 2009, is a principal with the Chertoff Group, a security consulting firm. He is on the boards of several defense firms and is a distinguished visiting professor at George Mason University. This is the second in a series of pieces by Hayden on the Edward Snowden case.

(CNN) -- "Any analyst at any time can target anyone. Any selector, anywhere ... I, sitting at my desk, certainly had the authorities to wiretap anyone, from you or your accountant, to a federal judge, to even the President. ..."

Thus spoke -- this time not Zarathustra, the Persian prophet -- but former National Security Agency systems administrator Edward Snowden.

To be sure, Snowden was reaching for dramatic effect, but if his words were true, he would have been violating not only the laws of the United States, he would also have been violating the laws of physics. He had neither the authority nor the ability to do what he has claimed he could do.

Michael Hayden
Michael Hayden

To determine what we think of Snowden's allegations about the NSA's activities, we should have a clear idea of what the NSA is actually doing, not what Snowden implies or alleges or what some 24/7 networks allow their commentators to proclaim.

The confusion is not entirely Snowden's fault. The story has been so badly mangled by the media that one of The Washington Post's "exposes" (on the PRISM program) has been rewritten, without benefit of announcing corrections, on the newspaper's website.

So let us begin where Snowden did -- with the "telephony metadata" or business records program.

It is clear that the NSA has access to large numbers of calling events that Americans create: who called whom, when and for how long, but neither the location of the communicants nor certainly the contents of the call.

Why in heaven's name would they want this "metadata" -- the term of art applied to the externals of a communication, somewhat like what is on an envelope as opposed to the content of a letter?

I'll tell you why. Before the attacks of 9/11, Nawaf al-Hazmi and Khalid al-Mihdhar (part of the al Qaeda "muscle" on the plane that struck the Pentagon) were living in San Diego. From there on several occasions they called an al Qaeda safe house in the Middle East whose communications were targeted by American intelligence.

The NSA intercepted a series of these calls and created intelligence reports on several of them. But nothing in the physics of these intercepts or in the contents of these calls (even looking at them in retrospect) told us that these two known terrorists were in the United States.

After the 9/11 attacks, the intelligence committees of the U.S. Congress formed a joint inquiry commission to determine what had gone wrong. One of the commission's findings was to criticize the "NSA's cautious approach to any collection of intelligence relating to activity in the United States."

Years later, in his 2008 book, "The Shadow Factory," James Bamford -- a chronicler and inveterate critic of NSA activities and, it should be added, a participant in a lawsuit against the agency for its post-9/11 activities -- wrote about al-Hazmi and al-Mihdhar that "the Agency never alerted any (emphasis his) other Agency that the terrorists were in the United States and moving across the country toward Washington."

To be sure, the NSA never knew they were in the United States, but a career critic of alleged NSA privacy violations (Bamford) thought the agency did and should have known these two terrorists were in (that's my emphasis) this country and the Congress of the United States believed the NSA too "cautious" about intelligence in (my emphasis again) America.

The metadata program was an attempt to deal with this challenge with the lightest possible impact on American privacy. After all, the Supreme Court had determined decades earlier (Smith v. Maryland, 1979) that metadata carried no expectations of privacy.

Thus, it seemed the perfect approach. Properly used, metadata collection was not about targeting Americans. It was about determining who in America deserved (in all meanings of the word: legally, morally, operationally) to be targeted.

And, as Steve Bradbury, the acting head of the Office of Legal Counsel at the Justice Department during this period, has pointed out, "At least 14 federal judges have approved the NSA's acquisition of this data every 90 days since 2006 under the business records provision of the Foreign Intelligence Surveillance Act (FISA)."

Billions of records are retained by the NSA under this program, but these records are accessed only under strict controls. No data mining engines or complex logarithmic tools are launched to scour the data for abstract patterns.

Instead, the data lies fallow until the NSA can put a question to it based on a predicate related to terrorism and only terrorism. A little more than 20 people at the NSA get to do this, under close supervision, and the agency reports that this happens about 300 times a year.

Let me describe a possible example of a "terrorist predicate." Let's say that somewhere in the world American intelligence comes across an individual it has good reason to believe is an al Qaeda operative, and he has a cell phone in his possession.

Under this authority, the NSA could take the cell phone number and use a computer simply to ask that ocean of metadata, "Is there any activity in here related to what we now believe to be a terrorist telephone?" And if a number in the Bronx timidly raises its hand (so to speak) and answers, "Why, yes, I routinely communicate with it," the agency gets to ask, "And who do you and your friends talk to?"

That's it! If there is anything more to be done, the agency (actually, far more likely, the FBI) has to go back to court to dig any deeper into American information.

This is hardly the East German Stasi, but there may be some in America who are still discomfited by it.

Fair enough. But folks should object based on facts rather than on the oft heard and amazingly misinformed commentary in some of the media that claims the NSA can then go back and listen to these calls in its database -- listen to calls that have never been recorded and which, incidentally, are protected by the U.S. Constitution.

And for those who still object, please keep in mind that, if the metadata program had been in effect in the summer of 2001, al-Hazmi and al-Mihdhar would likely have been rolled up, the plane that hit the Pentagon would not have had these jihadists available for the hijacking and the entire 9/11 enterprise might have been scrapped by al Qaeda.

In my next column, I'll tackle: What of the PRISM program, the collection of Internet content with the compelled cooperation of American firms? And how is that enterprise viewed here and abroad?

Follow us on Twitter @CNNOpinion.

Join us on Facebook/CNNOpinion.

The opinions expressed in this commentary are solely those of Michael Hayden.

ADVERTISEMENT
Part of complete coverage on
updated 12:11 PM EDT, Fri August 29, 2014
Leon Aron says the U.S. and Europe can help get Russia out of Ukraine by helping Ukraine win its just war, sharing defense technologies and intelligence
updated 1:24 PM EDT, Fri August 29, 2014
Timothy Stanley the report on widespread child abuse in a British town reveals an institutional betrayal by police, social services and politicians. Negligent officials must face justice
updated 9:06 PM EDT, Fri August 29, 2014
Peter Bergen and David Sterman say a new video of an American suicide bomber shows how Turkey's militant networks are key to jihadists' movement into Syria and Iraq. Turkey must stem the flow
updated 11:16 AM EDT, Thu August 28, 2014
Whitney Barkley says many for-profit colleges deceive students, charge exorbitant tuitions and make false promises
updated 10:34 AM EDT, Fri August 29, 2014
Mark O'Mara says the time has come to decide whether we really want police empowered to shoot those they believe are 'fleeing felons'
updated 10:32 AM EDT, Thu August 28, 2014
Bill Frelick says a tool of rights workers is 'naming and shaming,' ensuring accountability for human rights crimes in conflicts. But what if wrongdoers know no shame?
updated 10:43 PM EDT, Thu August 28, 2014
Jay Parini says, no, a little girl shouldn't fire an Uzi, but none of should have easy access to guns: The Second Amendment was not written to give us such a 'right,' no matter what the NRA says
updated 9:40 AM EDT, Thu August 28, 2014
Terra Ziporyn Snider says many adolescents suffer chronic sleep deprivation, which can indeed lead to safety problems. Would starting school an hour later be so wrong?
updated 9:30 AM EDT, Fri August 29, 2014
Peggy Drexler says after all the celebrity divorces, it's tempting to ask the question. But there are still considerable benefits to getting hitched
updated 2:49 PM EDT, Fri August 29, 2014
The death of Douglas McAuthur McCain, the first American killed fighting for ISIS, highlights the pull of Syria's war for Western jihadists, writes Peter Bergen.
updated 6:42 PM EDT, Tue August 26, 2014
Former ambassador to Syria Robert Ford says the West should be helping moderates in the Syrian armed opposition end the al-Assad regime and form a government to focus on driving ISIS out
updated 9:21 AM EDT, Wed August 27, 2014
Ruben Navarrette says a great country does not deport thousands of vulnerable, unaccompanied minors who fled in fear for their lives
updated 9:19 AM EDT, Wed August 27, 2014
Robert McIntyre says Congress is the culprit for letting Burger King pay lower taxes after merging with Tim Hortons.
updated 7:35 PM EDT, Tue August 26, 2014
Wesley Clark says the U.S. can offer support to its Islamic friends in the region most threatened by ISIS, but it can't fight their war
updated 7:26 AM EDT, Wed August 27, 2014
Jeff Yang says the tech sector's diversity numbers are embarrassing and the big players need to do more.
updated 4:53 PM EDT, Tue August 26, 2014
America's painful struggle with racism has often brought great satisfaction to the country's rivals, critics, and foes. The killing of Michael Brown and its tumultuous aftermath has been a bonanza.
updated 4:19 PM EDT, Tue August 26, 2014
Ed Bark says in this Emmy year, broadcasters CBS, ABC and PBS can all say they matched or exceeded HBO. These days that's no small feat
updated 3:19 PM EDT, Tue August 26, 2014
Rick Martin says the death of Robin Williams brought back memories of his own battle facing down depression as a young man
updated 11:58 AM EDT, Tue August 26, 2014
David Perry asks: What's the best way for police officers to handle people with psychiatric disabilities?
updated 3:50 PM EDT, Mon August 25, 2014
Julian Zelizer says it's not crazy to think Mitt Romney would be able to end up at the top of the GOP ticket in 2016
updated 4:52 PM EDT, Mon August 25, 2014
Roxanne Jones and her girlfriends would cheer from the sidelines for the boys playing Little League. But they really wanted to play. Now Mo'ne Davis shows the world that girls really can throw.
updated 12:29 PM EDT, Mon August 25, 2014
Peter Bergen and Emily Schneider say a YouTube video apparently posted by ISIS seems to show that the group has a surveillance drone, highlighting a new reality: Terrorist groups have technology once only used by states
updated 5:04 PM EDT, Mon August 25, 2014
Kimberly Norwood is a black mom who lives in an affluent neighborhood not far from Ferguson, but she has the same fears for her children as people in that troubled town do
updated 5:45 PM EDT, Fri August 22, 2014
It apparently has worked for France, say Peter Bergen and Emily Schneider, but carries uncomfortable risks. When it comes to kidnappings, nations face grim options.
updated 1:27 PM EDT, Tue August 26, 2014
John Bare says the Ice Bucket Challenge signals a new kind of activism and peer-to-peer fund-raising.
updated 8:31 AM EDT, Fri August 22, 2014
James Dawes says calling ISIS evil over and over again could very well make it harder to stop them.
updated 9:05 PM EDT, Sat August 23, 2014
As the inquiry into the shooting of Michael Brown continues, critics question the prosecutor's impartiality.
updated 6:47 PM EDT, Fri August 22, 2014
Newt Gingrich says it's troubling that a vicious group like ISIS can recruit so many young men from Britain.
updated 10:50 AM EDT, Thu August 21, 2014
David Weinberger says Twitter and other social networks have been vested with a responsibility, and a trust, they did not ask for.
updated 7:03 AM EDT, Fri August 22, 2014
John Inazu says the slogan "We are Ferguson" is meant to express empathy and solidarity. It's not true: Not all of us live in those circumstances. But we all made them.
updated 8:23 AM EDT, Fri August 22, 2014
Retired Lt. Gen. Mark Hertling says he learned that the territory ISIS wants to control is amazingly complex.
updated 3:51 PM EDT, Wed August 20, 2014
Cerue Garlo says Liberia is desperate for help amid a Ebola outbreak that has touched every aspect of life.
updated 1:42 PM EDT, Thu August 21, 2014
Eric Liu says Republicans who want to restrict voting may win now, but the party will suffer in the long term.
updated 11:38 AM EDT, Thu August 21, 2014
Jay Parini: Jesus, Pope and now researchers agree: Wealth decreases our ability to sympathize with the poor.
updated 8:00 AM EDT, Thu August 21, 2014
Judy Melinek offers a medical examiner's perspective on what happens when police kill people like Michael Brown.
updated 6:03 PM EDT, Tue August 19, 2014
It used to be billy clubs, fire hoses and snarling German shepherds. Now it's armored personnel carriers and flash-bang grenades, writes Kara Dansky.
updated 1:27 PM EDT, Wed August 20, 2014
Maria Haberfeld: People who are unfamiliar with police work can reasonably ask, why was an unarmed man shot so many times, and why was deadly force used at all?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT