{"id":2124,"date":"2013-11-12T17:41:59","date_gmt":"2013-11-12T17:41:59","guid":{"rendered":"http:\/\/ncjolt.org\/?p=2124"},"modified":"2020-06-04T20:53:58","modified_gmt":"2020-06-04T20:53:58","slug":"att-sells-phone-records-to-the-cia-insisting-its-lawful","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/att-sells-phone-records-to-the-cia-insisting-its-lawful\/","title":{"rendered":"AT&amp;T Sells Phone Records to the CIA, Insisting it\u2019s Lawful"},"content":{"rendered":"<p>Tuesday, November 12, 2013, by Kelly Morris<br \/>\nThe Central Intelligence Agency (CIA) is to pay AT&amp;T more than $10 million a year for call data. The deal was brokered in order to assist the CIA with foreign counterterrorism investigation, according to a report last week in the <a href=\"http:\/\/www.nytimes.com\/2013\/11\/07\/us\/cia-is-said-to-pay-att-for-call-data.html?_r=0\">New York Times<\/a>, and will give the CIA access to international phone records placed through AT&amp;T\u2019s system, which includes information on Americans.<br \/>\nAT&amp;T has a huge archive of phone calls, both foreign and domestic, that go through its network. AT&amp;T\u2019s archive includes records beyond those of just its own customers. Per the agreement, the CIA is to provide AT&amp;T with phone numbers of suspected overseas terrorists, and the company will search its database and supply any records of calls that may help identify foreign associates. Most of the calls will be foreign-to-foreign calls, but some may include information on domestic numbers.<br \/>\nThe disclosures by AT&amp;T are said to be voluntary, rather than under subpoenas or court orders compelling them to participate. AT&amp;T stated that such payments from governments are routine for lawful data, but insisted that it \u201cdo[es] not <a href=\"http:\/\/www.tripwire.com\/state-of-security\/top-security-stories\/att-selling-call-records-cia-tidy-sum\/\">comment<\/a> on questions concerning national security.\u201d<br \/>\nThis report comes on the heels of the former intelligence contractor Edward Snowden\u2019s explosive <a href=\"http:\/\/www.theguardian.com\/world\/2013\/jun\/06\/nsa-phone-records-verizon-court-order\">data collection leaks<\/a> regarding the National Security Agency (NSA)\u2019s digital spying. According to the initial report in <i>The Guardian<\/i>, under a court order issued in April, Verizon is required to give the NSA information on all telephone calls in its systems, including the numbers of both parties on the call, the location data, and the time and duration of the calls. This data was supposedly collected in bulk and failed to discriminate between innocent and guilty parties.<\/p>\n<blockquote><p>\u201cThat need to act without delay is often best met when the CIA has developed its own capabilities to lawfully acquire necessary foreign intelligence information. . . .\u201d<\/p><\/blockquote>\n<p>The CIA\u2019s deal with AT&amp;T will likely duplicate some of the NSA\u2019s data-collection programs, and while neither the CIA nor AT&amp;T would confirm the program, an anonymous intelligence official provided a possible explanation that mirrors the reasoning behind NSA\u2019s data collection efforts. The official told the <i>Times<\/i>, \u201cThat need to act without delay is often best met when the CIA has developed its own capabilities to lawfully acquire necessary foreign intelligence information,\u201d suggesting that the agency\u2019s functionality would be impaired by a requirement that it wait for a third party or legal order in order to obtain this information.<br \/>\nBecause the CIA is not allowed to <a href=\"https:\/\/www.cia.gov\/library\/publications\/additional-publications\/the-work-of-a-nation\/items-of-interest\/frequently-asked-questions.html#Spy\">conduct domestic surveillance<\/a> to spy on Americans, per <a href=\"http:\/\/www.archives.gov\/federal-register\/codification\/executive-order\/12333.html\">Executive Order 12333<\/a>, the numbers of American callers who place calls overseas will be masked.\u00a0Lawyers reviewing the program concluded that the partial censoring satisfied the restrictions on CIA domestic surveillance activities, citing a <a href=\"http:\/\/www.law.cornell.edu\/uscode\/text\/18\/2511\">statutory exception to privacy laws<\/a> covering \u201cthe acquisition by the United States government of foreign intelligence information from international or foreign communications.\u201d However, the CIA may coordinate with the FBI to use an administrative subpoena to have AT&amp;T remove the initial censoring.<br \/>\nThe CIA\u2019s spokesman insists that the agency\u2019s intelligence collection activities are \u201csubject to extensive oversight\u201d from multiple areas of government. Considering that AT&amp;T has a <a href=\"http:\/\/www.nytimes.com\/2013\/11\/07\/us\/cia-is-said-to-pay-att-for-call-data.html?pagewanted=2&amp;_r=0\">history<\/a> of aiding the government in surveillance, using methods just shy of lawful, its statements of legitimacy (while declining to confirm the deal with the CIA) fail to inspire confidence in telephone-using Americans.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tuesday, November 12, 2013, by Kelly Morris The Central Intelligence Agency (CIA) is to pay AT&amp;T more than $10 million a year for call data. The deal was brokered in order to assist the CIA with foreign counterterrorism investigation, according to a report last week in the New York Times, and will give the CIA <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/att-sells-phone-records-to-the-cia-insisting-its-lawful\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[51],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/2124"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=2124"}],"version-history":[{"count":1,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/2124\/revisions"}],"predecessor-version":[{"id":7544,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/2124\/revisions\/7544"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=2124"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=2124"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=2124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}