U.S. To Release Its Review of Spying Practices By Year’s End

Charles Dharapak/AP

AA Font size + Print

White House spokesman Jay Carney said the results of a review of the way the U.S. gathers intelligence will be released by the end of the year. By Matt Vasilogambros

The United States is reviewing the way it gathers intelligence. This has now become a tired and oft-repeated phrase coming from the Obama administration, as disclosures continue to reveal the far-reaching extent to which the U.S. spies on its allies.

The latest, groundbreaking leak: the U.S. has been monitoring German Chancellor Angela Merkel’s cell phone for more than 10 years.

While U.S. officials have been summoned to explain themselves to different European leaders—Spain being the latest—aides to President Obama, from press secretary Jay Carney to Secretary of State John Kerry, have said there is currently a review underway to determine where the American spying program should go in the coming years.

But finally, there’s a sense of when exactly the Obama administration will release details of this review: by the end of the year, according to Carney.

Speaking on Monday, Carney was vague about the current review and said he would not specifically address the latest disclosures from Edward Snowden. Still, Carney said there’s already been progress as the U.S. contemplates spying agreements with some of its allies, including Germany.

Even as that work is being done, some decisions have been made that reflect the president felt desire to find the proper balance,” Carney said at his daily press briefing.

There are currently two reviews ongoing. One is within the White House, run out of the National Security Council, which is what Carney is referencing. The other is an outside group, consisting of members that were appointed by President Obama—including the former acting director of the CIA, Mike Morell, and Cass Sunstein, the husband of U.N. Ambassador Samantha Power and former head of the White House Office of Information and Regulatory Affairs.

White House officials have insisted that Obama did not know about many of these intelligence-gathering practices, including the tapping of Merkel’s phone. While the president receives a daily intelligence briefing, former officials have noted that the sources of the intelligence are not normally given to the president directly, but instead to aides.

Still, this has launched a debate in Washington about whether the team that Obama surrounds himself with is being forthright enough for him to do his job properly.

For the last several weeks, as reporters have hounded the White House for details about the U.S. intelligence program, officials continue to repeat the same phrase over and over again. Here are some examples:

  • Readout of Vice President Joe Biden’s meeting with Italian Senate President Pietro Grasso on Oct. 25: “The vice president made clear that the administration is reviewing the way that we gather intelligence to ensure that we properly balance protecting the security concerns of our citizens and allies with the privacy concerns that all people share.”
  • Carney on Oct. 23: “The U.S. is reviewing the way that we gather intelligence to ensure that we properly balance the security concerns of our citizens and allies with the privacy concerns that all people share.”
  • Readout of Obama’s call with Merkel on Oct. 23: “As the president has said, the United States is reviewing the way that we gather intelligence to ensure that we properly balance the security concerns of our citizens and allies with the privacy concerns that all people share.”
  • Kerry on Oct. 21 in Paris: “As President Obama said very clearly in a recent speech that he gave at the United Nations General Assembly just a few weeks ago, he said we in the United States are currently reviewing the way that we gather intelligence.”
  • Obama on Sept. 24 before the United Nations: “And just as we reviewed how we deploy our extraordinary military capabilities in a way that lives up to our ideals, we’ve begun to review the way that we gather intelligence, so that we properly balance the legitimate security concerns of our citizens and allies with the privacy concerns that all people share.”

National Security Adviser Susan Rice even tweeted this on Monday:

Now that we know the review will come at the end of the year, will it stop the questions that bring on this tired phrase?

Absolutely not.

Journalist Glenn Greenwald, who said that there are still thousands of U.S. intelligence documents that he has not published, will continue to disclose information about NSA programs. And each time that he will publish details about these programs, journalists will press the White House to confirm the reports. And each time, Carney will again say, “The U.S. is reviewing the way that we gather intelligence.”

So, expect this tired talking point for another two months.

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.