Report: Yahoo customized surveillance software for NSA

Yahoo! logo

Yahoo built custom software for U.S. intelligence agencies last year so the agencies could scan customers' incoming email for specific information.

According to an Oct. 4 report from Reuters, two former employees of the company and a third person familiar with the activity said Yahoo built the program in response to a request from either the FBI or the National Security Agency to comply with a classified U.S. government directive sent to the company's legal team.

The report states that the software scanned "hundreds of millions of emails" in what it called the first known case of a U.S. internet provider agreeing to conduct surveillance on all arriving email instead of looking at bulk stored messages or a handful of messages in real time.

The former Yahoo employees told Reuters that CEO Marissa Mayer's decision to obey the government directive split its top management and led to Chief Information Security Officer Alex Stamos' departure from the company in June 2015.

The object of the surveillance is not clear. The Reuters report states that intelligence agencies were seeking a "set of characters," which could mean a word or phrase but also an encryption key or some other piece of code. The same request was probably sent to other Internet providers, according to the report.

"If true, the government's directive to Yahoo to write a software program and search all of its customers' incoming emails for certain content is a gross abuse of federal power," said Rep. Ted Lieu (D-Calif.) in a statement. "Private-sector companies and private citizens are not an arm of law enforcement or an extension of our intelligence agencies."

A June 14, 2015, report in the New York Times based on documents provided by Edward Snowden offers the clue that cybersecurity might be an issue. That article revealed that a 2012 directive by the Obama administration expanded warrantless monitoring on international internet lines with to the goal of identifying suspicious internet addresses and malware with signatures traceable to foreign governments.

The surveillance described in the Reuters report took place before passage of the Cybersecurity Act of 2015, which was included in the fiscal 2016 appropriations package. That law provides for the sharing of classified cybersecurity threat indicators between government and industry and could facilitate the scanning of commercial network traffic for malware.

About the Author

Mark Rockwell is a senior staff writer at FCW, whose beat focuses on acquisition, the Department of Homeland Security and the Department of Energy.

Before joining FCW, Rockwell was Washington correspondent for Government Security News, where he covered all aspects of homeland security from IT to detection dogs and border security. Over the last 25 years in Washington as a reporter, editor and correspondent, he has covered an increasingly wide array of high-tech issues for publications like Communications Week, Internet Week, Fiber Optics News, magazine and Wireless Week.

Rockwell received a Jesse H. Neal Award for his work covering telecommunications issues, and is a graduate of James Madison University.

Click here for previous articles by Rockwell. Contact him at [email protected] or follow him on Twitter at @MRockwell4.


  • IT Modernization
    shutterstock image By enzozo; photo ID: 319763930

    OMB provides key guidance for TMF proposals amid surge in submissions

    Deputy Federal CIO Maria Roat details what makes for a winning Technology Modernization Fund proposal as agencies continue to submit major IT projects for potential funding.

  • gears and money (zaozaa19/

    Worries from a Democrat about the Biden administration and federal procurement

    Steve Kelman is concerned that the push for more spending with small disadvantaged businesses will detract from the goal of getting the best deal for agencies and taxpayers.

Stay Connected