Tinker, Tailor, Miner, Spy
Why the NSA's snooping is unprecedented in scale and scope.
By Shane Harris and Tim Naftali
Posted Tuesday, Jan. 3, 2006, at 6:30 AM ET
Fifty years ago, officers from the Signal Security Agency, the predecessor to the National Security Agency, visited an executive from International Telephone and Telegraph and asked for copies of all foreign government cables carried by the company. The request was a direct violation of a 1934 law that banned the interception of domestic communications, but Attorney General Tom Clark backed it. Initially reluctant, ITT relented when told that its competitor, Western Union, had already agreed to supply this information. As James Bamford relates in his book The Puzzle Palace, the government told ITT it "would not desire to be the only non-cooperative company on the project." Codenamed Shamrock, the effort to collect cables sent through U.S.-controlled telegraph lines ultimately involved all the American telecom giants of the era, captured private as well as government cables, and lasted nearly 30 years. Like other illegal Cold War domestic snooping programs —such as the FBI's wiretaps without warrants and the CIA's mail-opening operations—it collapsed under the weight of public reaction to the abuses of executive power revealed by Vietnam and Watergate. <snip>
The magnitude of the current collection effort is unprecedented and indeed marks a shift in how the NSA spies in the United States. The current program seems to involve a remarkable level of cooperation with private companies and extraordinarily expansive data-mining of questionable legality. Before Bush authorized the NSA to expand its domestic snooping program after 9/11 in the secret executive order, the agency had to stay clear of the "protected communications" of American citizens or resident aliens unless supplied by a judge with a warrant. The program President Bush authorized reportedly allows the NSA to mine huge sets of domestic data for suspicious patterns, regardless of whether the source of the data is an American citizen or resident. The NSA needs the help of private companies to do this because commercial broadband now carries so many communications. In an earlier age, the NSA could pick up the bulk of what it needed by tapping into satellite or microwave transmissions. "Now," as the agency noted in a transition document prepared for the incoming Bush administration in December 2000, "communications are mostly digital, carry billions of bits of data, and contain voice, data and multimedia. They are dynamically routed, globally networked and pass over traditional communications means such as microwave or satellite less and less."
The agency used to search the transmissions it monitors for key words, such as names and phone numbers, which are supplied by other intelligence agencies that want to track certain individuals. But now the NSA appears to be vacuuming up all data, generally without a particular phone line, name, or e-mail address as a target. Reportedly, the agency is analyzing the length of a call, the time it was placed, and the origin and destination of electronic transmissions. Those details would be crucial in mining the data for patterns—according to the officials the Times cited, the goal of the NSA's eavesdropping system.
Pattern-based searches are most useful when run against huge sets of data. Many calls and messages must be analyzed to determine which ones are benign and which deserve more attention. With large data sets, pattern-based searching can create more nuanced pictures of the connections among people, places, and messages. Deputy Director of National Intelligence Michael Hayden, who until this year was the NSA director, recently hinted that the NSA's eavesdropping program is not just looking for transmissions from specific individuals. It has a "subtly softer trigger" that initiates monitoring without exactly knowing in advance what specific transmissions to look for. Presumably, this trigger is a suspicious pattern. But officials have not actually described any triggers, raising the question of whether the NSA has been authorized to go on such fishing expeditions. <snip>
http://www.slate.com/id/2133564/