How did secret phone program help foil NYC plot?
Published: June 7, 2013 Updated 1 hour ago
By KIMBERLY DOZIER - Associated Press
WASHINGTON - As the Obama administration defended its widespread collection of phone records, a senior U.S. intelligence official said Friday that the program helped disrupt a 2009 plot to bomb the New York City subways.
But the assertion raises as many questions as it answers because court testimony indicated the subway plot investigation began with an email.
Over the past two days, The Guardian newspaper and The Washington Post have revealed classified documents showing how the National Security Agency sweeps up phone records and Internet data in its hunt for terrorists. Those programs have come under criticism from civil libertarians and some in Congress who say they were too broad and collected too much about innocent Americans.
In one of those programs, the NSA's collected daily records of millions of phone calls made and received by U.S. citizens not suspected of any wrongdoing.
On Thursday, Rep. Mike Rogers, the Republican chairman of the House Intelligence Committee, credited that effort with thwarting a terrorism plot. But he did not elaborate.
The senior U.S. intelligence official who asserted Friday that the phone records program thwarted the subway plot would not provide other details.
The official was not authorized to discuss the plot publicly and requested anonymity.
Afghan-American Najibullah Zazi pleaded guilty in the 2009 plot, saying he had been recruited by al-Qaida in Pakistan.
The break in that case came, according to court documents and testimony, when Zazi emailed a Yahoo address seeking help with his bomb recipe.
At that time, British intelligence officials knew the Yahoo address was associated with an al-Qaida leader in Pakistan. That's because, according to British government documents released in 2010, officials had discovered it on the computer of a terror suspect there months earlier.
Because the NSA and British intelligence work so closely together and so little is known about how the NSA monitors email traffic, it's possible that both agencies were monitoring the Yahoo address at the time Zazi sent the critical email in 2009.
What's unclear, though, is how the phone program aided the investigation, which utilized court-authorized wiretaps of Zazi and his friends.
Based on what's known about the phone-records program, the NSA might have had an archive of all the phone calls Zazi had made, which might have helped authorities look for possible co-conspirators.
Because the phone program remains classified, however, it's impossible to say with certainty how the program benefited the investigation.
Read more here:
(F)AIR USE NOTICE: All original content and/or articles and graphics in this message are copyrighted, unless specifically noted otherwise. All rights to these copyrighted items are reserved. Articles and graphics have been placed within for educational and discussion purposes only, in compliance with "Fair Use" criteria established in Section 107 of the Copyright Act of 1976.
The principle of "Fair Use" was established as law by Section 107 of The Copyright Act of 1976. "Fair Use" legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of display include "criticism, comment, news reporting, teaching, scholarship, and research." Section 107 establishes four criteria for determining whether the use of a work in any particular case qualifies as a "fair use". A work used does not necessarily have to satisfy all four criteria to qualify as an instance of "fair use". Rather, "fair use" is determined by the overall extent to which the cited work does or does not substantially satisfy the criteria in their totality. If you wish to use copyrighted material for purposes of your own that go beyond 'fair use,' you must obtain permission from the copyright owner. For more information go to:
THIS DOCUMENT MAY CONTAIN COPYRIGHTED MATERIAL. COPYING AND DISSEMINATION IS PROHIBITED WITHOUT PERMISSION OF THE COPYRIGHT OWNERS.