NSA Domestic Spying Grows: Agency Sweeps Up Data  

Posted by Big Gav

Today's tinfoil comes from the Wall Street Journal (who needs conspiracy sites) - looking at the spread of mass surveillance in the US.

Five years ago, Congress killed an experimental Pentagon antiterrorism program meant to vacuum up electronic data about people in the U.S. to search for suspicious patterns. Opponents called it too broad an intrusion on Americans' privacy, even after the Sept. 11 terrorist attacks.

But the data-sifting effort didn't disappear. The National Security Agency, once confined to foreign surveillance, has been building essentially the same system.

The central role the NSA has come to occupy in domestic intelligence gathering has never been publicly disclosed. But an inquiry reveals that its efforts have evolved to reach more broadly into data about people's communications, travel and finances in the U.S. than the domestic surveillance programs brought to light since the 2001 terrorist attacks.

Congress now is hotly debating domestic spying powers under the main law governing U.S. surveillance aimed at foreign threats. An expansion of those powers expired last month and awaits renewal, which could be voted on in the House of Representatives this week. The biggest point of contention over the law, the Foreign Intelligence Surveillance Act, is whether telecommunications and other companies should be made immune from liability for assisting government surveillance.

Largely missing from the public discussion is the role of the highly secretive NSA in analyzing that data, collected through little-known arrangements that can blur the lines between domestic and foreign intelligence gathering. Supporters say the NSA is serving as a key bulwark against foreign terrorists and that it would be reckless to constrain the agency's mission. The NSA says it is scrupulously following all applicable laws and that it keeps Congress fully informed of its activities.

According to current and former intelligence officials, the spy agency now monitors huge volumes of records of domestic emails and Internet searches as well as bank transfers, credit-card transactions, travel and telephone records. The NSA receives this so-called "transactional" data from other agencies or private companies, and its sophisticated software programs analyze the various transactions for suspicious patterns. Then they spit out leads to be explored by counterterrorism programs across the U.S. government, such as the NSA's own Terrorist Surveillance Program, formed to intercept phone calls and emails between the U.S. and overseas without a judge's approval when a link to al Qaeda is suspected.

The NSA's enterprise involves a cluster of powerful intelligence-gathering programs, all of which sparked civil-liberties complaints when they came to light. They include a Federal Bureau of Investigation program to track telecommunications data once known as Carnivore, now called the Digital Collection System, and a U.S. arrangement with the world's main international banking clearinghouse to track money movements.

The effort also ties into data from an ad-hoc collection of so-called "black programs" whose existence is undisclosed, the current and former officials say. Many of the programs in various agencies began years before the 9/11 attacks but have since been given greater reach. Among them, current and former intelligence officials say, is a longstanding Treasury Department program to collect individual financial data including wire transfers and credit-card transactions.

It isn't clear how many of the different kinds of data are combined and analyzed together in one database by the NSA. An intelligence official said the agency's work links to about a dozen antiterror programs in all.

A number of NSA employees have expressed concerns that the agency may be overstepping its authority by veering into domestic surveillance. And the constitutional question of whether the government can examine such a large array of information without violating an individual's reasonable expectation of privacy "has never really been resolved," said Suzanne Spaulding, a national-security lawyer who has worked for both parties on Capitol Hill.

NSA officials say the agency's own investigations remain focused only on foreign threats, but it's increasingly difficult to distinguish between domestic and international communications in a digital era, so they need to sweep up more information. ...

The White House wants to give companies that assist government surveillance immunity from lawsuits alleging an invasion of privacy, but Democrats in Congress have been blocking it. The Terrorist Surveillance Program has spurred 38 lawsuits against companies. Current and former intelligence officials say telecom companies' concern comes chiefly because they are giving the government unlimited access to a copy of the flow of communications, through a network of switches at U.S. telecommunications hubs that duplicate all the data running through it. It isn't clear whether the government or telecom companies control the switches, but companies process some of the data for the NSA, the current and former officials say.

On Friday, the House Energy and Commerce Committee released a letter warning colleagues to look more deeply into how telecommunications data are being accessed, citing an allegation by the head of a New York-based computer security firm that a wireless carrier that hired him was giving unfettered access to data to an entity called "Quantico Circuit." Quantico is a Marine base that houses the FBI Academy; senior FBI official Anthony DiClemente said the bureau "does not have 'unfettered access' to any communication provider's network."

The political debate over the telecom information comes as intelligence agencies seek to change traditional definitions of how to balance privacy rights against investigative needs. Donald Kerr, the deputy director of national intelligence, told a conference of intelligence officials in October that the government needs new rules. Since many people routinely post details of their lives on social-networking sites such as MySpace, he said, their identity shouldn't need the same protection as in the past. Instead, only their "essential privacy," or "what they would wish to protect about their lives and affairs," should be veiled, he said, without providing examples.

Social-Network Analysis

The NSA uses its own high-powered version of social-network analysis to search for possible new patterns and links to terrorism. The Pentagon's experimental Total Information Awareness program, later renamed Terrorism Information Awareness, was an early research effort on the same concept, designed to bring together and analyze as much and as many varied kinds of data as possible. Congress eliminated funding for the program in 2003 before it began operating. But it permitted some of the research to continue and TIA technology to be used for foreign surveillance.

Some of it was shifted to the NSA -- which also is funded by the Pentagon -- and put in the so-called black budget, where it would receive less scrutiny and bolster other data-sifting efforts, current and former intelligence officials said. "When it got taken apart, it didn't get thrown away," says a former top government official familiar with the TIA program.

Two current officials also said the NSA's current combination of programs now largely mirrors the former TIA project. But the NSA offers less privacy protection. TIA developers researched ways to limit the use of the system for broad searches of individuals' data, such as requiring intelligence officers to get leads from other sources first. The NSA effort lacks those controls, as well as controls that it developed in the 1990s for an earlier data-sweeping attempt.

Sen. Ron Wyden, an Oregon Democrat and member of the Senate Intelligence Committee who led the charge to kill TIA, says "the administration is trying to bring as much of the philosophy of operation Total Information Awareness as it can into the programs they're using today." The issue has been overshadowed by the fight over telecoms' immunity, he said. "There's not been as much discussion in the Congress as there ought to be." ...

The NSA, which President Truman created in 1952 through a classified presidential order to be America's ears abroad, has for decades been the country's largest and most secretive intelligence agency. The order confined NSA spying to "foreign governments," and during the Cold War the NSA developed a reputation as the world's premier code-breaking operation. But in the 1970s, the NSA and other intelligence agencies were found to be using their spy tools to monitor Americans for political purposes. That led to the original FISA legislation in 1978, which included an explicit ban on the NSA eavesdropping in the U.S. without a warrant.

Big advances in telecommunications and database technology led to unprecedented data-collection efforts in the 1990s. One was the FBI's Carnivore program, which raised fears when it was in disclosed in 2000 that it might collect telecommunications information about law-abiding individuals. But the ground shifted after 9/11. Requests for analysis of any data that might hint at terrorist activity flooded from the White House and other agencies into NSA's Fort Meade, Md., headquarters outside Washington, D.C., one former NSA official recalls. At the time, "We're scrambling, trying to find any piece of data we can to find the answers," the official said. ...

It isn't known how many Americans' data have been swept into the NSA's systems. The Treasury, for instance, built its database "to look at all the world's financial transactions" and gave the NSA access to it about 15 years ago, said a former NSA official. The data include domestic and international money flows between bank accounts and credit-card information, according to current and former intelligence officials.

The NSA receives from Treasury weekly batches of this data and adds it to a database at its headquarters. Prior to 9/11, the database was used to pursue specific leads, but afterward, the effort was expanded to hunt for suspicious patterns.

Through the Treasury, the NSA also can access the database of the Society for Worldwide Interbank Financial Telecommunication, or Swift, the Belgium-based clearinghouse for records of international transactions between financial institutions, current and former officials said. The U.S. acknowledged in 2006 that the CIA and Treasury had access to Swift's database, but said the NSA's Terrorism Surveillance Program was separate and that the NSA provided only "technical assistance." A Treasury spokesman said the agency had no comment.

Through the Department of Homeland Security, airline passenger data also are accessed and analyzed for suspicious patterns, such as five unrelated people who repeatedly fly together, current and former intelligence officials said. Homeland Security shares information with other agencies only "on a limited basis," spokesman Russ Knocke said.

NSA gets access to the flow of data from telecommunications switches through the FBI, according to current and former officials. It also has a partnership with FBI's Digital Collection system, providing access to Internet providers and other companies. The existence of a shadow hub to copy information about AT&T Corp. telecommunications in San Francisco is alleged in a lawsuit against AT&T filed by the civil-liberties group Electronic Frontier Foundation, based on documents provided by a former AT&T official. In that lawsuit, a former technology adviser to the Federal Communications Commission says in a sworn declaration that there could be 15 to 20 such operations around the country. Current and former intelligence officials confirmed a domestic network of hubs, but didn't know the number. "As a matter of policy and law, we can not discuss matters that are classified," said FBI spokesman John Miller.

0 comments

Post a Comment

Statistics

Locations of visitors to this page

blogspot visitor
Stat Counter

Total Pageviews

Ads

Books

Followers

Blog Archive

Labels

australia (619) global warming (423) solar power (397) peak oil (355) renewable energy (302) electric vehicles (250) wind power (194) ocean energy (165) csp (159) solar thermal power (145) geothermal energy (144) energy storage (142) smart grids (140) oil (139) solar pv (138) tidal power (137) coal seam gas (131) nuclear power (129) china (120) lng (117) iraq (113) geothermal power (112) green buildings (110) natural gas (110) agriculture (91) oil price (80) biofuel (78) wave power (73) smart meters (72) coal (70) uk (69) electricity grid (67) energy efficiency (64) google (58) internet (50) surveillance (50) bicycle (49) big brother (49) shale gas (49) food prices (48) tesla (46) thin film solar (42) biomimicry (40) canada (40) scotland (38) ocean power (37) politics (37) shale oil (37) new zealand (35) air transport (34) algae (34) water (34) arctic ice (33) concentrating solar power (33) saudi arabia (33) queensland (32) california (31) credit crunch (31) bioplastic (30) offshore wind power (30) population (30) cogeneration (28) geoengineering (28) batteries (26) drought (26) resource wars (26) woodside (26) censorship (25) cleantech (25) bruce sterling (24) ctl (23) limits to growth (23) carbon tax (22) economics (22) exxon (22) lithium (22) buckminster fuller (21) distributed manufacturing (21) iraq oil law (21) coal to liquids (20) indonesia (20) origin energy (20) brightsource (19) rail transport (19) ultracapacitor (19) santos (18) ausra (17) collapse (17) electric bikes (17) michael klare (17) atlantis (16) cellulosic ethanol (16) iceland (16) lithium ion batteries (16) mapping (16) ucg (16) bees (15) concentrating solar thermal power (15) ethanol (15) geodynamics (15) psychology (15) al gore (14) brazil (14) bucky fuller (14) carbon emissions (14) fertiliser (14) matthew simmons (14) ambient energy (13) biodiesel (13) investment (13) kenya (13) public transport (13) big oil (12) biochar (12) chile (12) cities (12) desertec (12) internet of things (12) otec (12) texas (12) victoria (12) antarctica (11) cradle to cradle (11) energy policy (11) hybrid car (11) terra preta (11) tinfoil (11) toyota (11) amory lovins (10) fabber (10) gazprom (10) goldman sachs (10) gtl (10) severn estuary (10) volt (10) afghanistan (9) alaska (9) biomass (9) carbon trading (9) distributed generation (9) esolar (9) four day week (9) fuel cells (9) jeremy leggett (9) methane hydrates (9) pge (9) sweden (9) arrow energy (8) bolivia (8) eroei (8) fish (8) floating offshore wind power (8) guerilla gardening (8) linc energy (8) methane (8) nanosolar (8) natural gas pipelines (8) pentland firth (8) saul griffith (8) stirling engine (8) us elections (8) western australia (8) airborne wind turbines (7) bloom energy (7) boeing (7) chp (7) climategate (7) copenhagen (7) scenario planning (7) vinod khosla (7) apocaphilia (6) ceramic fuel cells (6) cigs (6) futurism (6) jatropha (6) nigeria (6) ocean acidification (6) relocalisation (6) somalia (6) t boone pickens (6) local currencies (5) space based solar power (5) varanus island (5) garbage (4) global energy grid (4) kevin kelly (4) low temperature geothermal power (4) oled (4) tim flannery (4) v2g (4) club of rome (3) norman borlaug (2) peak oil portfolio (1)