NSA cites Reagan-era executive order to justify collection of cellphone location data

Insists program is legal and purely outward-facing

The National Security Agency on Friday cited a 1981 executive order signed by then-President Ronald Reagan as the authority under which it is collecting location data daily from tens of millions of cell phones around the world.

In a statement, the spy agency maintained that the data collection program, dubbed CO-TRAVELER, was solely about foreign communications and complies fully with restrictions in the Foreign Intelligence Surveillance Act (FISA).

"We are not intentionally acquiring domestic information through this capability. This collection does not violate FISA," the NSA stated.

The agency's statement is in response to a story in the Washington Post earlier this week describing one of the biggest NSA data collection programs revealed by Edward Snowden, the former NSA contractor turned document leaker.

Under the program, the NSA is collecting a staggering 5 billion location-related records from cell phones globally. Much of the data is gathered directly from the networks of major U.S. and overseas mobile service providers. Millions of those records are thought to belong to Americans who travel abroad with their cell phones.

The collected data is fed into a massive database from where it's combed with a suite of sophisticated analytic tools to help NSA analysts find cell-phone users who might be communicating or traveling with foreign intelligence targets.

The analytics suite includes tools that can map the date, time and location of individual cell phones around the world. Other tools help the NSA track the movements of large numbers of mobile devices and detect hidden relationships in the data.

News of the program has once again ignited protests from several quarters and is being seen as the most egregious example yet of the NSA's overreach in its effort to foil foreign terrorists. Groups like the Electronic Frontier Foundation and the American Civil Liberties Union have dubbed the data collection as unconstitutional and likened it to dragnet surveillance conducted without any legal authority.

In its statement Friday, the NSA however insisted that the program is fully authorized under Executive Order 12333 from 1981. The order directs U.S. intelligence agencies to develop foreign intelligence information for the president and the National Security Council. The order authorizes intelligence agencies to use "all means consistent with applicable United States law" to collect foreign intelligence information that is relevant to national security.

According to the NSA, the data collection described in the Post article falls under EO 12333 authorities.

"This is solely about foreign communications. NSA tries to avoid the acquisition of U.S. person communications during EO 12333 operations and also uses collection methodologies to comply with the restrictions in FISA," the agency said.

If the data collection results in the "incidental acquisition" of communications pertaining to a U.S. resident, the NSA applies data minimization procedures and, depending on the specific circumstances, destroy the data. Any data collected on U.S. residents has to be reported to the appropriate authorities, the agency noted.

"Again, the Agency's EO 12333 collection is outward-facing. FISA authorization would be required for the intentional collection of domestic metadata," the agency said.

The NSA also denied suggestions in the Post article that the agency has the capabilities to track the location of every cell phone in the world. The capability to track cell phones is not ubiquitous, the NSA noted.

"This capability has been used in some of the most dangerous parts of the world, including war zones, where terrorists are actively planning to do harm to the nation, " the NSA said. The only domestic intelligence program that involves bulk collection of data by the NSA falls under the purview of Section 215 of the USA Patriot Act pertaining to the collection of phone metadata records, the agency said.

This article, NSA cites Reagan-era executive order to justify collection of cellphone location data, was originally published at Computerworld.com.

Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan or subscribe to Jaikumar's RSS feed. His e-mail address is jvijayan@computerworld.com.

See more by Jaikumar Vijayan on Computerworld.com.

Read more about security in Computerworld's Security Topic Center.

Join the CSO newsletter!

Error: Please check your email address.

Tags Government ITGov't Legislation/RegulationNational Security Agencyregulationsecuritynsawashington postgovernmentintelprivacy

More about Electronic Frontier FoundationNational Security AgencyNSATopic

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Jaikumar Vijayan

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts