Skip to main content
Part of complete coverage from

Did NSA snooping stop 'dozens' of terrorist attacks?

By Peter Bergen and David Sterman
June 18, 2013 -- Updated 1044 GMT (1844 HKT)
Former intelligence worker <a href='http://www.cnn.com/2013/06/10/politics/edward-snowden-profile/index.html'>Edward Snowden</a> revealed himself as the source of documents outlining a massive effort by the NSA to track cell phone calls and monitor the e-mail and Internet traffic of virtually all Americans. He says he just wanted the public to know what the government was doing. "Even if you're not doing anything wrong, you're being watched and recorded," he said. Snowden has been granted temporary asylum in Russia after initially fleeing to Hong Kong. He has been charged with three felony counts, including violations of the U.S. Espionage Act, over the leaks. Former intelligence worker Edward Snowden revealed himself as the source of documents outlining a massive effort by the NSA to track cell phone calls and monitor the e-mail and Internet traffic of virtually all Americans. He says he just wanted the public to know what the government was doing. "Even if you're not doing anything wrong, you're being watched and recorded," he said. Snowden has been granted temporary asylum in Russia after initially fleeing to Hong Kong. He has been charged with three felony counts, including violations of the U.S. Espionage Act, over the leaks.
HIDE CAPTION
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
Notable leakers and whistle-blowers
<<
<
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
>
>>
STORY HIGHLIGHTS
  • National Security Agency chief says NSA has prevented "dozens of terrorist events"
  • Peter Bergen says publicly available information minimizes value of NSA surveillance
  • Bergen: Most effective weapons against terror are traditional law enforcement techniques

Editor's note: Peter Bergen is CNN's national security analyst and a director at the New America Foundation. David Sterman is a graduate student at Georgetown University's National Security Studies Program.

(CNN) -- Testifying before Congress on Wednesday, Gen. Keith Alexander, director of the National Security Agency, asserted that his agency's massive acquisition of U.S. phone data and the contents of overseas Internet traffic that is provided by American tech companies has helped prevent "dozens of terrorist events."

On Thursday, Sens. Ron Wyden and Mark Udall, Democrats who both serve on the Senate Select Committee on Intelligence and have access to the nation's most sensitive secrets, released a statement contradicting this assertion. "Gen. Alexander's testimony yesterday suggested that the NSA's bulk phone records collection program helped thwart 'dozens' of terrorist attacks, but all of the plots that he mentioned appear to have been identified using other collection methods," the two senators said.

Indeed, a survey of court documents and media accounts of all the jihadist terrorist plots in the United States since 9/11 by the New America Foundation shows that traditional law enforcement methods have overwhelmingly played the most significant role in foiling terrorist attacks.

Peter Bergen
Peter Bergen

This suggests that the NSA surveillance programs are wide-ranging fishing expeditions with little to show for them.

Alexander promised during his congressional testimony that during this coming week more information would be forthcoming about how the NSA surveillance programs have prevented many attacks.

A U.S. intelligence document provided to CNN by a congressional source over the weekend asserts that the dragnet of U.S. phone data and Internet information from overseas users "has contributed to the disruption of dozens of potential terrorist plots here in the homeland and in more than 20 countries around the world."

The public record, which is quite rich when it comes to jihadist terrorism cases, suggests that the NSA surveillance yielded little of major value to prevent numerous attacks in the United States, but government officials may be able to point to a number of attacks that were averted overseas.

That may not do much to dampen down the political firestorm that has gathered around the NSA surveillance programs. After all, these have been justified because they have supposedly helped to keep Americans safe at home.

NSA director: 'Dozens' of plots thwarted
Details on NSA-thwarted plots coming
Edward Snowden: Hide and seek
Is the NSA leaker a spy?

Homegrown jihadist extremists have mounted 42 plots to conduct attacks within the United States since 2001. Of those plots, nine involved an actual terrorist act that was not prevented by any type of government action, such as the failed attempt by Faisal Shahzad to blow up a car bomb in Times Square on May 1, 2010.

Of the remaining 33 plots, the public record shows that at least 29 were uncovered by traditional law enforcement methods, such as the use of informants, reliance on community tips about suspicious activity and other standard policing practices.

Informants have played a critical role in preventing more than half of the plots by homegrown jihadist extremists since the 9/11 attacks, according to New America Foundation data. For instance, a group of Muslims from the Balkans living in southern New Jersey who were virulently opposed to the Iraq War told a government informant in 2007 they were plotting to kill soldiers stationed at the nearby Fort Dix army base.

Other investigations have relied on tips to law enforcement. Saudi student Khalid Aldawsari's plot to attack a variety of targets in Texas in 2011, including President George W. Bush's home in Dallas, was foiled when a company reported his attempt to buy chemicals suitable for making explosives.

Standard police work has also stopped plots. Kevin Lamar James, a convert to Islam, formed a group dedicated to holy war while he was jailed in California's Folsom Prison during the late 1990s. James' crew planned to attack a U.S. military recruiting station in Los Angeles on the fourth anniversary of 9/11 as well as a synagogue a month later.

Members of James' group financed their activities by sticking up gas stations, and their plans only came to light during the course of a routine investigation of a gas station robbery by local police in Torrance, California, who found documents that laid out the group's plans for mayhem.

In defending the role of NSA surveillance in his congressional testimony, Alexander pointed to two plots averted by his agency's programs; the plan by Denver resident Najibullah Zazi to bomb the New York subway system in 2009 and a plot the same year by Chicago resident David Coleman Headley to attack the offices of a Danish newspaper that had printed cartoons of the Prophet Mohammed that many Muslims deemed offensive.

In the Zazi case, testimony in a Brooklyn court shows that around the eighth anniversary of 9/11, U.S. officials found an e-mail address in Pakistan, believed to be connected to al Qaeda, that was in communication with njbzaz@yahoo.com, an e-mail address in the Denver area.

Officials found that Zazi was e-mailing from njbzaz@yahoo.com to get clarification from his handlers in Pakistan about how to mix ingredients for the bombs he was building in his Denver apartment. Zazi was arrested before he could carry out his plan to attack the New York subways.

This plot could well have been detected by the NSA's PRISM program, which collects the e-mails and other records of computer users outside the United States from nine U.S. technology companies, including Yahoo. But the detection of the plot does not appear to have anything to do with the government's collection of the phone records of tens of millions of Americans.

In the case of Headley, the government hasn't clarified its claim that NSA surveillance led to his detection, but Sebastian Rotella of ProPublica, who has done the most authoritative reporting on the Headley case, says that Headley came to the attention of U.S. officials because he was in contact with al Qaeda operatives in the United Kingdom who were under surveillance by the British. In other words, Headley was not detected by NSA surveillance but because of a tip from a close ally.

Moreover, conventional law enforcement methods were available to detect Headley's ties to terrorism, but they were ignored. Headley's wife warned the FBI of his involvement with the Pakistani-based militant group Lashkar-e-Taiba years before his plot to attack the Danish newspaper.

Follow @CNNOpinion on Twitter.

Join us at Facebook/CNNOpinion.

ADVERTISEMENT
Part of complete coverage on
December 29, 2014 -- Updated 0430 GMT (1230 HKT)
Les Abend: Before we reach a conclusion on the outcome of AirAsia Flight QZ8501, it's important to understand that the details are far too limited to draw a parallel to Flight 370
December 27, 2014 -- Updated 0127 GMT (0927 HKT)
The ability to manipulate media and technology has increasingly become a critical strategic resource, says Jeff Yang.
December 26, 2014 -- Updated 1617 GMT (0017 HKT)
Today's politicians should follow Ronald Reagan's advice and invest in science, research and development, Fareed Zakaria says.
December 26, 2014 -- Updated 1319 GMT (2119 HKT)
Artificial intelligence does not need to be malevolent to be catastrophically dangerous to humanity, writes Greg Scoblete.
December 26, 2014 -- Updated 1505 GMT (2305 HKT)
Historian Douglas Brinkley says a showing of Sony's film in Austin helped keep the city weird -- and spotlighted the heroes who stood up for free expression
December 26, 2014 -- Updated 1303 GMT (2103 HKT)
Tanya Odom that by calling only on women at his press conference, the President made clear why women and people of color should be more visible in boardrooms and conferences
December 27, 2014 -- Updated 2327 GMT (0727 HKT)
When oil spills happen, researchers are faced with the difficult choice of whether to use chemical dispersants, authors say
December 25, 2014 -- Updated 0633 GMT (1433 HKT)
Danny Cevallos says the legislature didn't have to get involved in regulating how people greet each other
December 23, 2014 -- Updated 2312 GMT (0712 HKT)
Marc Harrold suggests a way to move forward after the deaths of NYPD officers Wenjian Liu and Rafael Ramos.
December 24, 2014 -- Updated 1336 GMT (2136 HKT)
Simon Moya-Smith says Mah-hi-vist Goodblanket, who was killed by law enforcement officers, deserves justice.
December 24, 2014 -- Updated 1914 GMT (0314 HKT)
Val Lauder says that for 1,700 years, people have been debating when, and how, to celebrate Christmas
December 23, 2014 -- Updated 2027 GMT (0427 HKT)
Raphael Sperry says architects should change their ethics code to ban involvement in designing torture chambers
December 24, 2014 -- Updated 0335 GMT (1135 HKT)
Paul Callan says Sony is right to call for blocking the tweeting of private emails stolen by hackers
December 23, 2014 -- Updated 1257 GMT (2057 HKT)
As Christmas arrives, eyes turn naturally toward Bethlehem. But have we got our history of Christmas right? Jay Parini explores.
December 23, 2014 -- Updated 0429 GMT (1229 HKT)
The late Joe Cocker somehow found himself among the rock 'n' roll aristocracy who showed up in Woodstock to help administer a collective blessing upon a generation.
December 23, 2014 -- Updated 2115 GMT (0515 HKT)
History may not judge Obama kindly on Syria or even Iraq. But for a lame duck president, he seems to have quacking left to do, says Aaron Miller.
December 23, 2014 -- Updated 1811 GMT (0211 HKT)
Terrorism and WMD -- it's easy to understand why these consistently make the headlines. But small arms can be devastating too, says Rachel Stohl.
December 22, 2014 -- Updated 1808 GMT (0208 HKT)
Ever since "Bridge-gate" threatened to derail Chris Christie's chances for 2016, Jeb Bush has been hinting he might run. Julian Zelizer looks at why he could win.
December 20, 2014 -- Updated 1853 GMT (0253 HKT)
New York's decision to ban hydraulic fracturing was more about politics than good environmental policy, argues Jeremy Carl.
December 20, 2014 -- Updated 2019 GMT (0419 HKT)
On perhaps this year's most compelling drama, the credits have yet to roll. But we still need to learn some cyber lessons to protect America, suggest John McCain.
December 22, 2014 -- Updated 2239 GMT (0639 HKT)
Conservatives know easing the trade embargo with Cuba is good for America. They should just admit it, says Fareed Zakaria.
December 20, 2014 -- Updated 0112 GMT (0912 HKT)
We're a world away from Pakistan in geography, but not in sentiment, writes Donna Brazile.
December 19, 2014 -- Updated 1709 GMT (0109 HKT)
How about a world where we have murderers but no murders? The police still chase down criminals who commit murder, we have trials and justice is handed out...but no one dies.
December 18, 2014 -- Updated 2345 GMT (0745 HKT)
The U.S. must respond to North Korea's alleged hacking of Sony, says Christian Whiton. Failing to do so will only embolden it.
December 19, 2014 -- Updated 2134 GMT (0534 HKT)
President Obama has been flexing his executive muscles lately despite Democrat's losses, writes Gloria Borger
ADVERTISEMENT