Just another Reality-based bubble in the foam of the multiverse.

Sunday, December 25, 2005

Farming out the data mining

U.S. Spying Is Much Wider, Some Suspect
By Josh Meyer and Joseph Menn, Times Staff Writers
WASHINGTON — President Bush has acknowledged that several hundred targeted Americans were wiretapped without warrants under the National Security Agency's domestic spying program, and now some U.S. officials and outside experts say they suspect that the government is engaged in a far broader U.S. surveillance operation.

Although these experts have no specific evidence, they say that the NSA has a vast array of satellites and other high-tech tools that it could be using to eavesdrop on a much larger cross-section of people in the United States without permission from a court.

The suspicion is quietly gaining currency among current and former U.S. intelligence officials and among outside experts familiar with how the NSA operates.

The NSA conducts such "wholesale" surveillance continuously almost everywhere else in the world. It does so by using a sprawling network of land-based satellite transponder stations and friendly foreign intelligence agencies and telecommunication companies to collect millions of phone calls, e-mails and other communications.

Powerful NSA supercomputers search this "sigint" — short for signals intelligence — for words that might suggest terrorist plots, such as "bomb," then pass the information to intelligence and law enforcement agencies...

But some officials and other experts believe the top-secret program may be doing more than that.

"It's really obvious to me that it's a look-at-everything type program," said cryptography expert Bruce Schneier, who has written several books about security.

Schneier and others suspect that the NSA may be turning its satellites toward the United States and gathering vast streams of raw data from many more people than disclosed — potentially including all e-mails and phone calls from the United States to certain other countries.

These experts were chiefly talking about satellite surveillance, but the NSA can use other means to eavesdrop. The New York Times reported Saturday that the NSA has collected large volumes of telephone and Internet communications since the Sept. 11 attacks by "tapping directly into some of the American telecommunication system's main arteries."

Leading telecommunication companies have been saving information on calling patterns and passing it along to the government, the newspaper said. The companies have also given the NSA access to electronic switches that connect U.S. and overseas communications networks, a "significant expansion" of NSA capabilities, it said.

Phone companies and others have cooperated with U.S. agencies including the NSA for years. In the early 1990s, AT&T agreed to use an NSA-designed chip to ensure that law enforcement had access to phone calls.

And AT&T has a database code-named Daytona that keeps track of phone numbers on both ends of calls as well as the duration of all land-line calls, according to a business executive who has been briefed on the system.

"This started as a way for phone companies to dig out fraud," the executive said Saturday. After Sept. 11, intelligence agencies began to view it as a potential investigative tool, and the NSA has had a direct hookup into the database, he said.

After such massive volumes of information are collected, they are searched for suspicious language. The administration could thus argue that only hundreds of people were monitored because those conversations were the ones that were flagged because they contained suspicious words, Schneier said.

"If a computer looks at all e-mail and says 'bing' once, is that monitoring one person or millions?" Schneier asked. "The Bush numbers are depending on that subterfuge."

One former senior Pentagon official who has overseen such "data mining" said he also believed the NSA was probably conducting such wholesale surveillance...

Foreign Intelligence Surveillance Court members have also demanded an explanation, saying they are concerned that warrantless surveillance is producing illegally gathered evidence that is then used to seek warrants. One member resigned, reportedly because of the domestic spying program.

For some, the program recalls John M. Poindexter's ill-fated Total Information Awareness program, which he was developing for the Pentagon after the Sept. 11 attacks to use electronic transactions performed by millions of people daily to hunt for patterns and flag suspicious activity.

After being briefed on the domestic spying program in summer 2003, Sen. John D. Rockefeller IV (D-W.Va.) wrote to Vice President Dick Cheney: "As I reflected on the meeting today, and the future we face, John Poindexter's TIA project sprung to mind, exacerbating my concern regarding the direction the administration is moving with regard to security, technology and surveillance."

Total Information Awareness was essentially killed by Congress in February 2003 over privacy concerns. But parts of it were quietly moved elsewhere and continue to receive classified funding, according to Poindexter.

In the business world, where customer information and other records are used to look for unexpected patterns and trends in people's buying habits, data mining is not particularly controversial.

But in the hands of a powerful government, critics say, data mining raises serious concern about privacy and civil liberties, and the Bush administration has used the practice aggressively...


A likely solution: the NSA has farmed out TIA to private contractors, who now have access to your credit card numbers. Among other things.

Thanks to Lambert for the tip.

No comments: