Cloudy
63°
Cloudy
Hi 73° | Lo 49°

NSA Collects Email Contact Lists

  • In this Oct. 8, 2013 photo, an Aymara Indian carries a wild vicuna to be sheared, inside the Apolobamba protected nature reserve, the animal's natural habitat near the Andean village of Ucha Ucha, Bolivia. Every two years, Aymara Indian families near Ucha Ucha organize to shear the wool of these wild vicuna, a camelid that lives in the Andes' highland areas. The vicuna are an endangered species previously hunted by poachers for their fine wool. Today Bolivia protects them in this reserve, shearing and selling the wool worldwide without killing the animal. According to the families, they sell the wool through the country's national wool organization and split the money evenly, which in 2011 was about $300 dollars per family. (AP Photo/Juan Karita)

    In this Oct. 8, 2013 photo, an Aymara Indian carries a wild vicuna to be sheared, inside the Apolobamba protected nature reserve, the animal's natural habitat near the Andean village of Ucha Ucha, Bolivia. Every two years, Aymara Indian families near Ucha Ucha organize to shear the wool of these wild vicuna, a camelid that lives in the Andes' highland areas. The vicuna are an endangered species previously hunted by poachers for their fine wool. Today Bolivia protects them in this reserve, shearing and selling the wool worldwide without killing the animal. According to the families, they sell the wool through the country's national wool organization and split the money evenly, which in 2011 was about $300 dollars per family. (AP Photo/Juan Karita)

  • This undated photo provided by Facebook shows the server room at the company's data center in Prineville, Ore. The revelations that the National Security Agency is perusing millions of U.S. customer phone records at Verizon and snooping on the digital communications stored by nine major Internet services illustrate how aggressively personal data is being collected and analyzed. (AP Photo/Facebook, Alan Brandt)

    This undated photo provided by Facebook shows the server room at the company's data center in Prineville, Ore. The revelations that the National Security Agency is perusing millions of U.S. customer phone records at Verizon and snooping on the digital communications stored by nine major Internet services illustrate how aggressively personal data is being collected and analyzed. (AP Photo/Facebook, Alan Brandt)

  • In this Oct. 8, 2013 photo, an Aymara Indian carries a wild vicuna to be sheared, inside the Apolobamba protected nature reserve, the animal's natural habitat near the Andean village of Ucha Ucha, Bolivia. Every two years, Aymara Indian families near Ucha Ucha organize to shear the wool of these wild vicuna, a camelid that lives in the Andes' highland areas. The vicuna are an endangered species previously hunted by poachers for their fine wool. Today Bolivia protects them in this reserve, shearing and selling the wool worldwide without killing the animal. According to the families, they sell the wool through the country's national wool organization and split the money evenly, which in 2011 was about $300 dollars per family. (AP Photo/Juan Karita)
  • This undated photo provided by Facebook shows the server room at the company's data center in Prineville, Ore. The revelations that the National Security Agency is perusing millions of U.S. customer phone records at Verizon and snooping on the digital communications stored by nine major Internet services illustrate how aggressively personal data is being collected and analyzed. (AP Photo/Facebook, Alan Brandt)

Washington — The National Security Agency is harvesting hundreds of millions of contact lists from personal email and instant messaging accounts around the world, many of them belonging to Americans, according to senior intelligence officials and top secret documents provided by former NSA contractor Edward Snowden.

The collection program, which has not been disclosed before, intercepts email address books and “buddy lists” from instant messaging services as they move across global data links. Online services often transmit those contacts when a user logs on, composes a message, or synchronizes a computer or mobile device with information stored on remote servers.

Rather than targeting individual users, the NSA is gathering contact lists in large numbers that amount to a sizable fraction of the world’s email and instant messaging accounts. Analysis of that data enables the agency to search for hidden connections and map relationships within a much smaller universe of foreign intelligence targets.

During a single day last year, the NSA’s Special Source Operations branch collected 444,743 email address books from Yahoo, 105,068 from Hotmail, 82,857 from Facebook, 33,697 from Gmail and 22,881 from unspecified other providers, according to an internal NSA PowerPoint presentation. Those figures, described as a typical daily intake in the document, correspond to a rate of more than 250 million per year.

Each day, the presentation said, the NSA collects contacts from an estimated 500,000 buddy lists on live-chat services as well as from the “in-box” displays of Web-based email accounts.

The collection depends on secret arrangements with foreign telecommunications companies or allied intelligence services in control of facilities that direct traffic along the Internet’s main data routes.

Although the collection takes place overseas, two senior U.S. intelligence officials acknowledged that it sweeps in the contacts of many Americans. They declined to offer an estimate but did not dispute that the number is likely to be in the millions or tens of millions.

A spokesman for the Office of the Director of National Intelligence, which oversees the NSA, said the agency “is focused on discovering and developing intelligence about valid foreign intelligence targets like terrorists, human traffickers and drug smugglers. We are not interested in personal information about ordinary Americans.”

The spokesman, Shawn Turner, added that rules approved by the attorney general require the NSA to “minimize the acquisition, use, and dissemination” of information that identifies a U.S. citizen or permanent resident.

The NSA’s collection of nearly all U.S. call records, under a separate program, has generated significant controversy since it was revealed in June. The NSA’s director, Gen. Keith Alexander, has defended “bulk” collection as an essential counterterrorism and foreign intelligence tool, saying “you need the haystack to find the needle.”

Contact lists stored online provide the NSA with far richer sources of data than call records alone. Address books commonly include not only names and email addresses but also telephone numbers, street addresses, and business and family information. In-box listings of email accounts stored in the “cloud” sometimes contain content such as the first few lines of a message.

Taken together, the data would enable the NSA, if permitted, to draw detailed maps of a person’s life, as told by personal, professional, political and religious connections. The picture can also be misleading, creating false “associations” with ex-spouses or people with whom an account holder has had no contact in many years.

The NSA has not been authorized by Congress or the special intelligence court that oversees foreign surveillance to collect contact lists in bulk, and senior intelligence officials said it would be illegal to do so from facilities in the United States. The agency avoids the restrictions in the Foreign Intelligence Surveillance Act by intercepting contact lists from access points “all over the world,” one official said, speaking on the condition of anonymity to discuss a classified program. “None of those are on U.S. territory.”

Because of the method employed, the agency is not legally required or technically able to restrict its intake to contact lists belonging to specified foreign intelligence targets, he said.

When information passes through “the overseas collection apparatus,” the official added, “the assumption is you’re not a U.S. person.”

In practice, data from Americans is collected in large volumes — in part because they live and work overseas, but also because data crosses international boundaries even when its American owners stay at home. Large technology companies, including Google and Facebook, maintain data centers around the world to balance loads on their servers and work around outages.

A senior U.S. intelligence official said that the privacy of Americans is protected, despite mass collection, because “we have checks and balances built into our tools.”

NSA analysts, he said, may not search or distribute information from the contacts database unless they can “make the case that something in there is a valid foreign intelligence target in and of itself.”

In this program, the NSA is obliged to make that case only to itself or others in the executive branch. With few exceptions, intelligence operations overseas fall solely within the president’s legal purview. The Foreign Intelligence Surveillance Act, enacted in 1978, imposes restrictions only on electronic surveillance that targets Americans or takes place on U.S. territory.

By contrast, the NSA draws on authority in the Patriot Act for its bulk collection of domestic phone records, and it gathers online records from U.S. Internet companies, in a program known as PRISM, under powers granted by Congress in the FISA Amendments Act. Those operations are overseen by the Foreign Intelligence Surveillance Court.

Sen. Dianne Feinstein, D-Calif., chairman of the Senate Intelligence Committee, said in August that the committee has less information about, and conducts less oversight of, intelligence-gathering that relies solely on presidential authority. She said she planned to ask for more briefings on those programs.

“In general, the committee is far less aware of operations conducted under 12333,” said a senior committee staff member, referring to Executive Order 12333, which defines the basic powers and responsibilities of the intelligence agencies. “I believe the NSA would answer questions if we asked them, and if we knew to ask them, but it would not routinely report these things, and in general they would not fall within the focus of the committee.”