Skip to main content
Part of complete coverage from

Ex-NSA chief: Safeguards exist to protect Americans' privacy

By MIchael Hayden, CNN Contributor
updated 7:36 AM EDT, Thu August 1, 2013
Former intelligence worker <a href='http://www.cnn.com/2013/06/10/politics/edward-snowden-profile/index.html'>Edward Snowden</a> revealed himself as the source of documents outlining a massive effort by the NSA to track cell phone calls and monitor the e-mail and Internet traffic of virtually all Americans. He says he just wanted the public to know what the government was doing. "Even if you're not doing anything wrong, you're being watched and recorded," he said. Snowden has been granted temporary asylum in Russia after initially fleeing to Hong Kong. He has been charged with three felony counts, including violations of the U.S. Espionage Act, over the leaks. Former intelligence worker Edward Snowden revealed himself as the source of documents outlining a massive effort by the NSA to track cell phone calls and monitor the e-mail and Internet traffic of virtually all Americans. He says he just wanted the public to know what the government was doing. "Even if you're not doing anything wrong, you're being watched and recorded," he said. Snowden has been granted temporary asylum in Russia after initially fleeing to Hong Kong. He has been charged with three felony counts, including violations of the U.S. Espionage Act, over the leaks.
HIDE CAPTION
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
<<
<
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
>
>>
STORY HIGHLIGHTS
  • Supporters of NSA metadata program only had 12-vote margin in favor
  • Ex-NSA director Hayden: PRISM program is used to target foreign threats
  • He says agency employees are trained to respect privacy
  • Hayden: NSA doesn't have access to servers of Internet service providers

Editor's note: Gen. Michael V. Hayden, a former National Security Agency director who was appointed by President George W. Bush as CIA director in 2006 and served until February 2009, is a principal with the Chertoff Group, a security consulting firm. He is on the boards of several defense firms and is a distinguished visiting professor at George Mason University.

(CNN) -- The effects of l'Affaire Snowden continued to accumulate this past week with a dramatic vote in the U.S. House of Representatives.

By a bare 12-vote margin, a bipartisan coalition of more or less centrist Republicans and Democrats defeated an equally bipartisan coalition of their more ideological brethren, the latter an incredibly improbable alliance that almost succeeded in defunding NSA's telephone metadata program.

One Hill participant described the hours before the vote as "hand to hand combat," but for now, at least, NSA will continue to acquire American telephone "business records" to help it detect terrorist activity in the United States.

Michael Hayden
Michael Hayden

Even as Americans were focused on the fate of this program, however, lines were being drawn for future debates based on other revelations by data leaker Edward Snowden.

Chief among these is PRISM, an effort probably best understood by contrasting it to the telephone metadata program. PRISM (authorized by the FISA Amendment Act of 2008) is about the content of communications, not just the fact that a communication has taken place. It deals with digital data, like e-mails, not traditional phone calls. The subjects and activities related to PRISM collection are foreign and specific, not domestic and broad as in the metadata effort. Finally, PRISM is used for a number of legitimate foreign intelligence purposes, not just counterterrorism.

There are also parallels. Both programs can only work with the court-compelled compliance of electronic communication service providers.

And both programs are responsive to the world in which America found itself after 9/11. The metadata program was designed to deal with the reality of potential terrorists already inside the United States. PRISM was designed to deal with changes in how modern communications are moved, stored and accessed.

Former CIA chief speaks with CNN
"Concrete proof" of Snowden damages

Take this example. NSA is targeting the communications of a known terrorist in Yemen. It discovers that the Yemen-based terrorist is communicating electronically with another individual; he could be in Pakistan, elsewhere in Yemen or even in the United States. They are using a U.S. hosted Internet service; they send e-mails back and forth.

Similar contours could apply to e-mail traffic detailing the invoice of a delivery of dual use chemicals to a state suspected of developing chemical weapons. Or to another communication that provides data on the timing and routing of human trafficking in the Caribbean.

In each of these cases, the only thing likely to be "American" about any of these communications is that they are physically in the United States and are being hosted by a U.S.-based Internet service, a phenomenon that the 1978 Foreign Intelligence Surveillance Act, FISA, could not have anticipated.

Recognizing this, under the prodding of then-Director of National Intelligence (and former Director of NSA) Mike McConnell, Congress amended FISA in 2008 to allow NSA more speedy and effective access to these kinds of communications.

Access is still overseen by the FISA court (which also compels firms to turn over requested data), but the process no longer requires the time consuming, cumbersome, individualized warrants of the past.

Early Snowden-based stories here and abroad made a great deal of PRISM. Rushing against deadline, some outlets reported (inaccurately) that NSA had direct and free access to the servers of American Internet service providers, or ISPs, and it was a short step from there to near libelous accusations that the agency was routinely rummaging through the e-mails of ordinary Americans.

In reality, in performing its foreign intelligence mission, NSA treats PRISM as just another SIGAD, SIGINT Activity Designator, an admittedly new and particularly valuable collection point, but still one among many designed to acquire foreign communications of foreign intelligence value.

The alleged NSA slides that some have ominously included in their accounts of PRISM look far more benign to anyone experienced in signals intelligence. Indeed, if the slides are at all accurate, they look like an orientation briefing designed to show new analysts that PRISM is one tool in a large tool kit for them to use as they work to piece together actionable intelligence out of diverse, dispersed and frequently hard to acquire foreign communications.

As recently as this past Sunday, however, Snowden chronicler-supporter-spokesman Glenn Greenwald was working to revive the meme of an unchecked NSA. Appearing on ABC's "This Week," Greenwald described tools that allow analysts "to listen to whatever e-mails they want, whatever telephone calls, browsing histories, Microsoft word documents."

Greenwald's accusations were sufficiently broad and breathless (even though he did at one point concede that there were "legal constraints for how you can spy on Americans") that the stunningly misleading lead of ABC's follow-on story was that these tools "allowed even low-level analysts to search the private e-mails and phone calls of Americans."

Actually, if Greenwald's description of the tools themselves is correct, they are the product of a decade-plus effort at NSA to improve the analytic and collection means available to its work force, to allow NSA analysts at all levels--analysts trained annually in how to protect American privacy--to make a single query to access all relevant information across agency databases and to assign tasking across various SIGADs.

Put another way, NSA can more readily connect dots (dots comprised of lawfully collected foreign intelligence) and coordinate tasking (of legitimately targeted foreign communications) than at any other time in the agency's history.

And if that is true, it is something we should celebrate rather than condemn. But it remains to be seen if the coming national discussion will be based on facts like these or on something else altogether.

And what of that debate, both overseas and at home? More to follow.

Follow us on Twitter @CNNOpinion.

Join us on Facebook/CNNOpinion.

The opinions expressed in this commentary are solely those of Michael Hayden.

ADVERTISEMENT
Part of complete coverage on
updated 5:22 AM EST, Fri December 19, 2014
President Obama has been flexing his executive muscles lately despite Democrat's losses, writes Gloria Borger
updated 2:51 PM EST, Thu December 18, 2014
Jeff Yang says the film industry's surrender will have lasting implications.
updated 4:13 PM EST, Thu December 18, 2014
Newt Gingrich: No one should underestimate the historic importance of the collapse of American defenses in the Sony Pictures attack.
updated 7:55 AM EST, Wed December 10, 2014
Dean Obeidallah asks how the genuine Stephen Colbert will do, compared to "Stephen Colbert"
updated 12:34 PM EST, Thu December 18, 2014
Some GOP politicians want drug tests for welfare recipients; Eric Liu says bailed-out execs should get equal treatment
updated 8:42 AM EST, Thu December 18, 2014
Louis Perez: Obama introduced a long-absent element of lucidity into U.S. policy on Cuba.
updated 12:40 PM EST, Tue December 16, 2014
The slaughter of more than 130 children by the Pakistani Taliban may prove as pivotal to Pakistan's security policy as the 9/11 attacks were for the U.S., says Peter Bergen.
updated 11:00 AM EST, Wed December 17, 2014
The Internet is an online extension of our own neighborhoods. It's time for us to take their protection just as seriously, says Arun Vishwanath.
updated 4:54 PM EST, Tue December 16, 2014
Gayle Lemmon says we must speak out for the right of children to education -- and peace
updated 5:23 AM EST, Wed December 17, 2014
Russia's economic woes just seem to be getting worse. How will President Vladimir Putin respond? Frida Ghitis gives her take.
updated 1:39 AM EST, Wed December 17, 2014
Australia has generally seen itself as detached from the threat of terrorism. The hostage incident this week may change that, writes Max Barry.
updated 3:20 PM EST, Fri December 12, 2014
Thomas Maier says the trove of letters the Kennedy family has tried to guard from public view gives insight into the Kennedy legacy and the history of era.
updated 9:56 AM EST, Mon December 15, 2014
Will Congress reform the CIA? It's probably best not to expect much from Washington. This is not the 1970s, and the chances for substantive reform are not good.
updated 4:01 PM EST, Mon December 15, 2014
From superstorms to droughts, not a week goes by without a major disruption somewhere in the U.S. But with the right planning, natural disasters don't have to be devastating.
updated 9:53 AM EST, Mon December 15, 2014
Would you rather be sexy or smart? Carol Costello says she hates this dumb question.
updated 5:53 PM EST, Sun December 14, 2014
A story about Pope Francis allegedly saying animals can go to heaven went viral late last week. The problem is that it wasn't true. Heidi Schlumpf looks at the discussion.
updated 10:50 AM EST, Sun December 14, 2014
Democratic leaders should wake up to the reality that the party's path to electoral power runs through the streets, where part of the party's base has been marching for months, says Errol Louis
updated 4:23 PM EST, Sat December 13, 2014
David Gergen: John Brennan deserves a national salute for his efforts to put the report about the CIA in perspective
updated 9:26 AM EST, Fri December 12, 2014
Anwar Sanders says that in some ways, cops and protesters are on the same side
updated 9:39 AM EST, Thu December 11, 2014
A view by Samir Naji, a Yemeni who was accused of serving in Osama bin Laden's security detail and imprisoned for nearly 13 years without charge in Guantanamo Bay
updated 12:38 PM EST, Sun December 14, 2014
S.E. Cupp asks: How much reality do you really want in your escapist TV fare?
updated 1:28 PM EST, Thu December 11, 2014
Rip Rapson says the city's 'Grand Bargain' saved pensions and a world class art collection by pulling varied stakeholders together, setting civic priorities and thinking outside the box
updated 6:10 PM EST, Sat December 13, 2014
Glenn Schwartz says the airing of the company's embarrassing emails might wake us up to the usefulness of talking in-person instead of electronically
updated 5:33 PM EST, Fri December 12, 2014
The computer glitch that disrupted air traffic over the U.K. on Friday was a nuisance, but not dangerous, says Les Abend
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT