Skip to main content
Skip to content
Case File
d-20663House OversightOther

NSA surveillance expansion and counter‑measures against privacy advocates post‑9/11

The passage recaps well‑documented NSA activities, legal authorizations, and internal compliance structures. It contains no new names, transactions, or specific allegations that would generate actiona NSA built backdoors into encryption and attempted to de‑anonymize TOR traffic. Brian Hale, spokesperson for the DNI, is quoted on routine interception of cyber signatures. Section 215 of the Patriot

Date
November 11, 2025
Source
House Oversight
Reference
House Oversight #020310
Pages
1
Persons
0
Integrity
No Hash Available

Summary

The passage recaps well‑documented NSA activities, legal authorizations, and internal compliance structures. It contains no new names, transactions, or specific allegations that would generate actiona NSA built backdoors into encryption and attempted to de‑anonymize TOR traffic. Brian Hale, spokesperson for the DNI, is quoted on routine interception of cyber signatures. Section 215 of the Patriot

Tags

government-oversightfisatorhouse-oversightnsaencryptionsurveillancepatriot-act

Ask AI About This Document

0Share
PostReddit

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
158 By the first decade of the 21* century, the NSA’s surreptitious efforts to render the Internet transparent to US intelligence had earned it a new set of enemies. They were the previously- mentioned hacktavists who were attempting to shield the activities of Internet users from the intrusions of government surveillance. They employed both encryption and TOR software to defeat that surveillance. The NSA was not about to be defeated by the tactics of amateur privacy advocates. It did not conceal that it was intent on countering any attempt to interfere with its surveillance of the Internet. It built back doors into their encryption and worked to unravel the TOR scrambling of their IP addresses. It made leading hacktavists targets. Brian Hale, the spokesman for the Director of National Intelligence, disclosed that the US routinely intercepted the cyber signatures of parties suspected of hacking into US government networks. Following the 9/11 attack on the Pentagon and World Trade Center, the surveillance of the Internet also became an integral part of Bush’ administration’s war on terrorism. In October 2001, Congress expanded the NSA’s mandate by passing the USA Patriot Act. Section 215 of the act directly authorized the NSA, with the approval of the FISA court, to collect and store domestic telephone billing records. The idea was to better coordinate domestic and foreign intelligence about Al-Qaeda and other jihadist groups. The mantra in government after the 9/11 was to “connect dots.” Congress with this back essentially called for demolishing the wall by domestic and foreign intelligence when it came to foreign-directed terrorism. The act effectively made the NSA a partner with the FBI in tracking phone calls made from the phones origination outside the United States by known foreign jihadists. If these calls were made to individuals inside the NSA was now authorized to retrieve the billing records of the person called and those people who he or she called. These traces were then supplied to the FBI. When a New York Times expose in 2008 revealing that NSA surveillance has been extended to domestic telephone used, Congress passed the FISA Amendments Act of 2008 explicitly allowing the NSA to continue these practices if it obtained a FISA court order. Congress also sanctioned the NSA’s supplying the FBI with the emails and other Internet activity of foreign Jihadists if it was suspected of planning attacks in America. This put the NSA directly in the anti-terrorist business in the United States. It also necessitated the NSA vastly increasing its coverage of the Internet. The new duties also increased the NSA’s need to create new bureaucratic mechanism to monitor its compliance with FISA court orders, Rajesh De, the NSA’s General Counsel at the time of the Snowden breach, described the NSA as becoming by 2013 “one of the most regulated enterprises in the world.” Grafted onto its intelligence activities were layers of mandated reporting to oversight officials. Not only did the NSA have its own chief compliance officer, chief privacy and civil liberties officer, and independent inspector general but the NSA also had to report to a difference set of compliance officers at the Department of Defense the Office of National intelligence and the Department of Justice On top of reporting to those officials, the Department of Justice dispatched a team of lawyers every 60 days to review the results of “every

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.

Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.