DNI

Latest

  • WASHINGTON, DC - MAY 05: Rep. John Ratcliffe, (R-TX), testifies before a Senate Intelligence Committee nomination hearing on Capitol Hill in Washington, Tuesday, May. 5, 2020. The panel is considering Ratcliffe's nomination for director of national intelligence. (Photo by Andrew Harnik-Pool/Getty Images)

    Feds blame Russia, Iran for election misinformation and threatening emails

    by 
    Richard Lawler
    Richard Lawler
    10.21.2020

    At a press conference on Wednesday evening, Director of National Intelligence John Ratcliffe told reporters that two foreign actors, Iran and Russia, have been identified as taking actions to interfere in the US elections. Ratcliffe claimed the two have obtained voter data (which the Florida Secretary of State notes is publicly available), and specifically blamed Iran for emails sent to Florida Democrats that claimed to be from “Proud Boys” and contained threats goading them to vote for Donald Trump.

  • Reuters/Eddie Keogh

    CIA and NSA doubled their searches for Americans' data in 2 years

    by 
    Jon Fingas
    Jon Fingas
    05.04.2016

    So much for US intelligence scaling back its curiosity in the wake of Edward Snowden's leaks. An Office of the Director of National Intelligence transparency report has revealed that the CIA and NSA doubled the number of searches for the content of Americans' communications in an NSA database between 2013 and 2015. Where the two agencies made about 2,100 such requests three years ago, they searched 4,672 times last year. Just what triggered the spike isn't clear. There's a chance that some of the increase comes from repetitive searches (that is, running similar queries more than once), but they were also factors in 2013 -- the odds are that activity went up.

  • The NSA's 2013 transparency report is more opaque

    by 
    Ben Gilbert
    Ben Gilbert
    06.27.2014

    In an attempt to offer transparency to United States surveillance tactics, the Office of the Director of National Intelligence released a report today offering numbers for National Security Agency actions in 2013. The report notes thousands of orders placed for use of surveillance tactics (FISA requests: 1,899 in total), but fails to mention who or what was being targeted, not to mention exactly how. It recounts thousands of requests to the Foreign Intelligence Surveillance Court -- the court that decides which surveillance tactics are considered legal by the US government -- and thousands of "targets" (90,601). However, issues arise immediately. The word "target" is defined as such: "[It] has multiple meanings. For example, 'target' could be an individual person, a group, or an organization composed of multiple individuals or a foreign power that possesses or is likely to communicate foreign intelligence information that the U.S. government is authorized to acquire."

  • NSA violated privacy protections from 2006 to 2009, pins blame on confusion

    by 
    Alexis Santos
    Alexis Santos
    09.10.2013

    By now, it's no secret that the NSA has courted privacy violations, but new documents divulge just how long such incidents have occurred. Director of National Intelligence James Clapper released approximately 1,800 pages of declassified files, which reveal that the NSA's phone record program violations happened between 2006 (when it first came under court supervision) and 2009, when the Foreign Intelligence Surveillance Court ordered changes to the operation. During that period, a total of 17,835 phone numbers were listed for checking against Uncle Sam's database, and only about 1,800 were based on the standard of reasonable suspicion. According to Clapper, congress received the papers we're seeing now at the time of the incidents, and corrective measures have been put in place. Among the preventative actions are a complete "end-to-end" review of telephony metadata handling, the creation of the Director of Compliance position and a fourfold increase of the compliance department's personnel. As it turns out, the missteps are (again) said to have been accidents. "There was nobody at the NSA who had a full understanding of how the program worked," an intelligence official claims. Sure, the increased transparency is certainly welcome, but a recently-leaked NSA audit from May of 2012 suggests that collection of protected data is still occurring from a combination of human error and technical limits. To pore through the National Security Agency's fresh load of documents, hit the second source link below.

  • Director of National Intelligence declassifies PRISM info to clear up 'inaccuracies'

    by 
    Richard Lawler
    Richard Lawler
    06.08.2013

    After details of a government program called PRISM with alleged hooks into the servers of major internet companies became public this week, Director of National Intelligence James Clapper decided it was necessary to reveal even more information. According to his statement, clearing up the "significant misimpressions" and "inaccuracies" requires the release of further classified info, included in a fact sheet listed after the break. So what is PRISM, according to the "Facts on Collection of Information Pursuant to Section 702"? It is an internal government computer system used to facilitate the government's statutorily authorized collection of foreign intelligence information from electronic communication service providers under court supervision...This authority was created by the Congress and has been widely known and publicly discussed since its inception in 2008. In short, Section 702 facilitates the targeted acquisition of foreign intelligence information concerning foreign targets located outside the United States under court oversight. Service providers supply information to the Government when they are lawfully required to do so. The document claims PRISM is not an "undisclosed collection or data mining program." The above passages seemingly align with statements (including one today from Yahoo) from the companies listed claiming that they only respond to inquiries when required to by law. It goes on to offer some details on the process used to identify foreign targets ("Section 702 cannot be used to intentionally target any U.S. citizen, or any other U.S. person, or to intentionally target any person known to be in the United States") and the oversight involved. Specifically mentioned is the involvement of the Executive, Legislative and Judicial branches of the federal government. Additionally, another report from The Guardian exposes more internal documents that contradict the theory that PRISM involves access to "cable intercepts," although that can occur under a different process.