Related:

27 June 2013, Guardian: NSA collected US email records in bulk for more than two years under Obama

22 June 2013, NYT: 2004 Showdown Shaped Reputation of Pick for F.B.I.

15 June 2013, WP: U.S. surveillance architecture includes collection of revealing Internet, phone metadata

24 March 2009, Guardian: NSA: OIG: Review of the President's Surveillance Program (PSP) (ST-09-0002 Working Draft) (PDF)
http://www.nytimes.com/2013/06/28/us/nsa-report-says-internet-metadata-were-focus-of-visit-to-ashcroft.html

JUNE 27, 2013

New Leak Suggests Ashcroft Confrontation Was Over N.S.A. Program

By CHARLIE SAVAGE and JAMES RISEN

WASHINGTON -- The March 2004 confrontation in the hospital room [1] of Attorney General John Ashcroft -- a dramatic point in the Bush administration's internal debate over warrantless surveillance -- was apparently set off by a secret National Security Agency program that was vacuuming up "metadata" logs of Internet communications, according to a draft of a 2009 N.S.A. inspector general report [2] obtained by the British newspaper The Guardian.

The report, the latest document given to the paper [3] by the former N.S.A. contractor Edward J. Snowden, may clear up a long-running mystery over which program White House officials wanted Mr. Ashcroft and other Justice Department officials to sign off on when they went to his Washington hospital room. Because of their refusal, according to the report, the Bush administration shut down the metadata collection for several months, then re-established it under a secret order from a national-security court established by the Foreign Intelligence Surveillance Act, or FISA.

The program continued to operate for the first two years of the Obama administration but has since ended, Shawn Turner, a spokesman for the office of the director of national intelligence, said Thursday.

"The Internet metadata collection program authorized by the FISA court was discontinued in 2011 for operational and resource reasons and has not been restarted," Mr. Turner said. "The program was discontinued by the executive branch as a result of an interagency review."

A separate N.S.A. program that has been collecting domestic "telephone metadata" -- logs of all telephone calls dialed by Americans -- has continued. That program was among the first of Mr. Snowden's revelations. It is not clear whether Internet metadata collection has continued under a different program.

The N.S.A. uses the metadata to analyze links between people to try to identify networks of terrorism suspects, a process the report calls "contact chaining." The inspector general report says they typically "analyzed networks with two degrees of separation (two hops)" from the known suspect to create investigative leads submitted to the F.B.I. and the C.I.A. in reports they called tippers.

The content of the inspector general report -- a history of the Bush administration's warrantless surveillance programs, which eventually came under court oversight -- was first reported by The Washington Post. [4]

President Bush's original surveillance program, established on Oct. 4, 2001, had four components. It sucked up the contents of telephone calls and e-mails, as well as their "metadata" logs. This was done without court orders and outside statutory regulations, and was based on closely held legal memorandums; even the N.S.A.'s general counsel was not allowed to see them at first, according to the report, which invoked the president's inherent powers as commander-in-chief.

Over time, however, there was turnover at the Justice Department, including the arrival of a new head at its Office of Legal Counsel, Jack Goldsmith, and a new deputy attorney general, James B. Comey, who last week was nominated by President Obama to be director of the F.B.I. [5]

In December 2003, Mr. Goldsmith began to question the legality of some aspects of the programs, and he persuaded Mr. Comey -- who took over temporarily as attorney general when Mr. Ashcroft became ill the following March -- not to sign a document reauthorizing it.

The report says that the Justice Department's concerns were focused on the Internet metadata program, which was then based on a theory that the N.S.A. did not "acquire," for legal purposes, the bulk communications when it collected them, but instead only when human analysts selected certain data to examine because it met certain criteria.

In the hospital room confrontation of March 10, 2004, Mr. Ashcroft refused a request by senior White House aides to overrule Mr. Comey and sign off on extending the program. The report says that on March 19, after taking into account the objections of Mr. Comey and his allies, Mr. Bush rescinded his authorization to the N.S.A. to collect bulk Internet metadata and gave the agency a week to stop collecting it and to block access to its existing database.

During the same month, the report says, the Bush administration also ended the secret domestic surveillance programs against Iraq it had begun the year before under a theory that Iraqi spies were "engaged in terrorist activities and presented a threat to U.S. interests in the United States and abroad." The credibility of Bush administration claims linking Iraq to Al Qaeda and other terrorist groups was, at the time, a subject of deep controversy. It is not clear whether ending the program was a coincidence or connected to the Justice Department's rebellion against the White House over the administration's legal theories about surveillance.

After Mr. Bush's order to end the collection of Internet metadata, administration lawyers looked for a new legal basis to restart the program. Under this theory, the Foreign Intelligence Surveillance Court could authorize such bulk collection under a "pen register/trap trace" statute, which traditionally allows law enforcement officials to keep logs of communications sent and received by particular phone numbers or e-mail accounts.

The chief judge of the national-security court, Colleen Kollar-Kotelly, issued an order on July 15, 2004, authorizing the resumption of the program, according to the report. None of the other judges on the court were apparently told about the programs or the new order; this was the first time one of the N.S.A.'s secret surveillance programs had come under the court's oversight and authority.

In 2006, according to the report, the N.S.A. was faced with another legal challenge when The New York Times disclosed the existence of the warrantless surveillance program. In response to the disclosures, one of the telephone companies that was secretly providing its customers' data to the N.S.A. on a voluntary basis asked for a court order compelling it to comply to protect itself legally, forcing the Bush administration to develop new legal theories to support other surveillance.

That May, the national-security court issued its first order to the telephone companies to log metadata from phone calls, citing a provision in the Patriot Act that allowed the government to obtain business records deemed to be "relevant" to a counterterrorism investigation.

It was apparently more difficult to get the court's agreement on a legal justification for the collection of the contents of phone calls and e-mails than of Internet metadata. But the Justice Department came up with a theory that the word "facility" in the Foreign Intelligence Surveillance Act, which had traditionally been understood to mean a specific telephone number or e-mail address, could be "changed to encompass the gateway or cable head that foreign targets use for communications" -- that is, the entire line. That gave the N.S.A. access to the contents of a huge number of communications.

In January 2007, a judge on the FISA court issued two orders, one covering the collection of foreign communications and another dealing with domestic ones. After the contents were collected in that fashion, rules would be applied to screen out Americans' communications in some circumstances and set limits on when the database could be consulted, the report said.

[1] http://www.nytimes.com/2013/06/22/us/politics/obama-says-comey-will-strike-balance-on-security-and-privacy-at-fbi.html

[2] https://www.documentcloud.org/documents/718895-igreport.html

[3] http://www.guardian.co.uk/world/2013/jun/27/nsa-data-mining-authorised-obama

[4] http://www.washingtonpost.com/investigations/us-surveillance-architecture-includes-collection-of-revealing-internet-phone-metadata/2013/06/15/e9bf004a-d511-11e2-b05f-3ea3f0e7bb5a_story.html

[5] http://www.nytimes.com/2013/05/30/us/politics/obama-to-pick-james-b-comey-to-lead-fbi.html