Back to News & Commentary

New Documents Shed Light on One of the NSA's Most Powerful Tools

NSA Building
NSA Building
Alex Abdo,
Former Senior Staff Attorney,
ACLU Speech, Privacy, and Technology Project
Share This Page
September 29, 2014

Today, we're releasing several key documents about that we obtained from the government in response to a Freedom of Information Act lawsuit that the ACLU filed (along with the Media Freedom and Information Access Clinic at Yale Law School) just before the first revelations of Edward Snowden. The documents are from the National Security Agency, the Defense Intelligence Agency, and others agencies. They confirm that the order, although not the focus of the public debate, actually governs most of the NSA's spying.

In some ways, this is not surprising. After all, it has been reported that some of the NSA's biggest spying programs rely on the executive order, such as the NSA's interception of internet traffic between Google's and Yahoo!'s data centers abroad, the collection of millions of email and instant-message address books, the recording of the contents of every phone call made in at least two countries, and the mass cellphone location-tracking program. In other ways, however, it is surprising. Congress's reform efforts have not addressed the executive order, and the bulk of the government's disclosures in response to the Snowden revelations have conspicuously ignored the NSA's extensive mandate under EO 12333.

The order, issued by President Ronald Reagan in 1981, imposes the sole constraints on U.S. surveillance on foreign soil that targets foreigners. There's been some , too, that the government relies directly on the order — as opposed to its statutory authority — to conduct surveillance inside the United States.

There's a key difference between EO 12333 and the two main legal authorities that have been the focus of the public debate — Section 215 of the Patriot Act and the FISA Amendments Act, which the government relies on to justify the bulk collection of Americans' phone records and the PRISM program. Because the executive branch issued and now implements the executive order all on its own, the programs operating under the order are subject to essentially no oversight from Congress or the courts. That's why uncovering the government's secret interpretations of the order is so important. We've already seen that the NSA has taken a "collect it all" mentality even with the authorities that are overseen by Congress and the courts. If that history is any lesson, we should expect — and, indeed, we have seen glimpses of — even more out-of-control spying under EO 12333.

Here are some of the most significant things these new records show:

The documents confirm our suspicions that the NSA relies heavily on EO 12333 and that the order, therefore, deserves far more scrutiny than it has received. This vindicates those about the scope of the NSA's surveillance activities under the executive order — including a former State Department official who to draw attention to its wide-ranging uses.

Here's how the NSA itself describes EO 12333 in an internal surveillance manual from 2007 (all highlighting is added):

Overview of Signals Intelligence Authorities, page 4

And here's a similar description from a "Legal Fact Sheet" on the executive order, which the NSA produced exactly two weeks after the first Snowden disclosure:

Legal Fact Sheet, page 1

In other words, EO 12333 is the main game in town for NSA surveillance. Of course, the debate about reforms to Section 215 and the FISA Amendments Act is tremendously important to Americans' privacy. But those authorities, while dramatically overbroad, pale in comparison to the executive order.

The documents make it clearer than ever that the government's vast surveillance apparatus is collecting information — including from Americans — about much more than just terrorist threats. The government generally defends its sweeping surveillance authorities by pointing to the threat of terrorism. But the truth is that its surveillance powers bear little relationship to that narrow goal. They reach far more broadly, allowing the government to monitor any international communication that contains "foreign intelligence information." That phrase is defined so nebulously that it could be read to encompass virtually every communication with one end outside the United States.

Some commentators have worried that the government could use this broad surveillance power to conduct economic espionage or to spy on Americans it hoped to convert into .

According to at least this internal Defense Department presentation, the concerns are real (N.B.: "USPs" refers to "U.S. persons," which the government defines as American citizens or organizations, as well as legal residents):

DoD HUMINT Legal Workshop Fundamentals of HUMINT Targeting, page 6

The documents openly acknowledge the word games that the government plays when describing its surveillance. Two of my colleagues have the NSA's "vocabulary of misdirection — a language that allows [it] to say one thing while meaning quite another." One of the slippery words that the NSA uses is the seemingly straightforward "collect," which the NSA has redefined to let it simultaneously acquire huge amounts of data while denying that it is "collecting" anything at all.

An "intelligence law handbook" disclosed by the Defense Intelligence Agency acknowledges this misdirection, admonishing intelligence analysts to "adjust" their surveillance vocabulary. It is a case study in Orwellian doublespeak:

Intelligence Law Handbook Defense HUMINT Service, page 22

Finally, the candid tone of the DIA handbook is striking. Its frank discussion of government surveillance authority would serve the public far better than the dissembling and obfuscation we too often see from the government in describing its powerful spying tools.

Here's a characteristic passage from the handbook:

Intelligence Law Handbook Defense HUMINT Service, page 34

The author appears to grapple with several of the weighty questions surrounding the scope of the government's surveillance authority. It's worth asking whether those policy debates had to take place in secret. Based on these documents, it's clear that they should have taken place in public.

Learn More About the Issues on This Page