from NYBooks Website
He was pulling a small black travel bag and had
a number of laptop cases draped over his shoulders. Inside those cases were
four computers packed with some of his country’s most closely held secrets.
On Amazon.com, the book made the "Movers & Shakers" list and skyrocketed 6,021 percent in a single day.
Written sixty-five years ago, it described a fictitious totalitarian society where a shadowy leader known as "Big Brother" controls his population through invasive surveillance.
Today, as the Snowden documents make clear, it is the NSA that keeps track of phone calls, monitors communications, and analyzes people’s thoughts through data mining of Google searches and other online activity.
There was of course no way of knowing whether you were being watched at any given moment.
How often, or on what system, the Thought Police
plugged in on any individual wire was guesswork. It was even conceivable
that they watched everybody all the time. But at any rate they could plug in
your wire whenever they wanted to. You had to live - did live, from habit
that became instinct - in the assumption that every sound you made was
overheard, and, except in darkness, every movement scrutinized.
We know little about what uses the NSA makes of most information available to it - it claims to have exposed a number of terrorist plots - and it has yet to be shown what effects its activities may have on the lives of most American citizens.
Congressional committees and a special federal
court are charged with overseeing its work, although they are committed to
secrecy, and the court can hear appeals only from the government.
For example, James Clapper, the director of national intelligence, was asked at a Senate hearing in March whether,
Three months later, following the revelations of the phone-log program in which the NSA collects telephone data - the numbers of both callers and the length of the calls - on hundreds of millions of Americans, Clapper switched to doublethink.
He said that his previous answer was not a lie; he just chose to respond in the "least untruthful manner."
With such an
Orwellian concept of the truth now being used, it is useful to take a look
at what the government has been telling the public about its surveillance
activities over the years, and compare it with what we know now as a result
of the top secret documents and other information released by, among others,
the former NSA contract employee Edward Snowden.
This was the birth of the Black Chamber, the NSA’s earliest predecessor, and it would be hidden in the nondescript brownstone.
But its chief, Herbert O. Yardley, had a problem. To gather intelligence for Woodrow Wilson’s government, he needed access to the telegrams entering, leaving, and passing through the country, but because of an early version of the Radio Communications Act, such access was illegal.
With the shake of a hand, however, Yardley convinced Newcomb
Carlton, the president of Western Union, to grant the Black Chamber secret
access on a daily basis to the private messages passing over his wires - the
Internet of the day.
Senator Frank Church, the committee chairman, labeled the NSA program,
As a result of the decades of illegal surveillance by the NSA, in 1978 the Foreign Intelligence Surveillance Act (FISA) was signed into law and the Foreign Intelligence Surveillance Court (FISC) came into existence. Its purpose was, for the first time, to require the NSA to get judicial approval for eavesdropping on Americans.
Although the court seldom turned down a
request for a warrant, or an order as it’s called, it nevertheless served as
a reasonable safeguard, protecting the American public from an agency with a
troubling past and a tendency to push the bounds of spying unless checked.
She or her superiors did not have to get a warrant for each interception.
All during this time, however, the Bush administration was telling the American public the opposite: that a warrant was obtained whenever an American was targeted.
After exposure of the operation by
The New York Times in 2005, however, rather than strengthen the controls
governing the NSA’s spying, Congress instead voted to weaken them, largely
by codifying into the amendment to FISA what had previously been illegal.
Thus, for
nearly a century, telecom companies have been allowed to violate the privacy
of millions of Americans with impunity.
In March 2012, Wired magazine published a cover story I wrote on the new one-million-square-foot NSA data center being built in Bluffdale, Utah.
In the article, I interviewed William Binney, a former high-ranking NSA official who was largely responsible for automating the agency’s worldwide eavesdropping network. He quit the agency in 2001 in protest after he saw the system designed mainly for intelligence about foreign threats turned inward on the American public.
In the interview, he told how the agency was tapping into the country’s communications and Internet networks. He revealed that it also was secretly obtaining warrantless access to billions of phone records of Americans, including those of both AT&T and Verizon.
In the months afterward, General Alexander repeatedly denied Binney’s charges.
He added,
But the documents released by Edward Snowden show that the NSA does have a large-scale program to gather the telephone records of every Verizon customer, including local calls, and presumably a similar agreement with AT&T and other companies.
These are records of who called whom and when, not of the content of the conversations, although the NSA has, by other methods, access to the content of conversations as well. But the NSA has, on a daily basis, access to virtually everyone’s phone records, whether cell or landline, and can store, data-mine, and keep them indefinitely.
Snowden’s
documents describing
the PRISM program show that the agency is also
accessing the Internet data of the nine major Internet companies in the US,
including Google and Yahoo.
In a video interview conducted in his room in the Mira Hotel, Snowden elaborated on the extent of the NSA’s capabilities.
Where those communications will be picked up depends on the range of the sensor networks and the authorities that that analyst is empowered with.
Not
all analysts have the ability to target everything. But I sitting at my desk
certainly had the authorities to wiretap anyone, from you or your accountant
to a federal judge to even the president, if I had a personal e-mail
[address].
He seemed to be indicating - although this remains to be officially confirmed - that while under FISA, a court order would be required to enter an American on a target list, analysts have the capability to unilaterally bypass the procedure by simply listing a name or e-mail address on the target list.
To understand what Snowden is saying, it is
necessary to elaborate a bit on the way the NSA conducts its eavesdropping.
A key reason, according to the draft of a top secret NSA inspector general’s report leaked by Snowden, is that approximately one third of all international telephone calls in the world enter, leave, or transit the United States.
At the same time, according to the 2009 report, virtually all Internet communications in the world pass through the US.
For example, the
report notes that during 2002, less than one percent of worldwide Internet
bandwidth - i.e., the international link between the Internet and computers
- "was between two regions that did not include the United States."
Through the most effective of them, the NSA can gain direct access to the fiber-optic cables that now carry most kinds of communications data. According to a slide released by Snowden, the cable-tapping operation is codenamed "UPSTREAM" and it is described as the,
It also appears to be both far more secret and far more invasive than the PRISM program revealed by Snowden.
Although PRISM gives the NSA access to data
from the individual Internet companies, such as Yahoo, Google, and
Microsoft, the companies claim that they don’t give the agency direct access
to their servers. Through UPSTREAM, however, the agency does get direct
access to fiber-optic cables and the supporting infrastructure that carries
nearly all the Internet and telephone traffic in the country.
According to the leaked inspector general’s report,
the agency has secret cooperative agreements with the top three telephone
companies in the country. Although the report disguises their names, they
are likely AT&T, Verizon, and Sprint:
In 2003, the NSA built a secret room in the facility and filled it with computers and software from a company called Narus.
Established in Israel by Israelis, and now owned by Boeing, Narus
specializes in spyware, equipment that examines both the metadata - the
names and addresses of people communicating on the Internet - and the
content of digital traffic such as e-mail as it zooms past at the speed of
light.
According to William Binney, the former NSA senior
official, the NSA has established between ten and twenty of these secret
rooms at telecom company switches around the country.
The senators added,
Speaking on Meet the Press, Glenn Greenwald, a lawyer and journalist who wrote the story about the NSA’s collection of phone data for The Guardian, also mentioned a still-secret eighty-page FISA court opinion that, he said, criticized the NSA for violation of both the Fourth Amendment and the FISA statute.
According to Greenwald,
The NSA, he said,
On the same program, Representative Mike Rogers,
Republican chairman of the House Intelligence Committee, confirmed that the
FISA court had issued a critical opinion and said that the NSA had "figured
out how to correct that."
In a recent New York Review blog post, Kenneth Roth,
director of Human Rights Watch and a former federal prosecutor, commented
that "upon scrutiny" many of the plots referred to by the NSA
appear in fact to have been uncovered not because of the mass collection of
our metadata but through more traditional surveillance of particular phone
numbers or e-mail addresses - the kinds of targeted inquiries that easily
would have justified a judicial order allowing review of records kept by
communications companies or even monitoring the content of those
communications.
This is a prism-type device that produces a duplicate, mirror image of the original communications.
The original beams, containing Internet data, continue on to wherever they were originally destined. The duplicate beam goes into Room 641A, the NSA’s secret room one floor below, a discovery made by another whistleblower, AT&T technician Mark Klein.
There the
Narus equipment scans all the Internet traffic for
"selectors" - names, e-mail address, words, phrases, or other indicators
that the NSA wants to know about. Any message containing a selector is then
retransmitted in full to the NSA for further analysis, as are the contents
of phone calls selected. With regard to targeted phone numbers, the agency
supplies them to the company, which then gives the NSA access to monitor
them.
What Snowden seemed to be saying in his interview is that as long as certain analysts have an e-mail address, for example, they can simply enter that information into the system and retrieve the content of the e-mails sent from and to that address.
There are, by his account, no judicial checks and balances to
assure that the targeting of an American has been approved by a FISA court
order and not just by NSA employees. These claims by Snowden, and other
revelations from the documents he released, should be investigated by either
a select committee of Congress, such as the Church Committee, or an
independent body, like the 9/11 Commission.
That is where the PRISM program comes in. With PRISM, the NSA is able to go directly to the communications industry, including the major Internet companies, to get whatever they miss from UPSTREAM.
According to the top secret inspector general’s report, the,
According to a recent slide released by Snowden, the NSA on April 5, 2013,
had 117,675 active surveillance targets in the program and was able to
access real-time data on live voice, text, e-mail, or Internet chat
services, in addition to analyzing stored data.
Another new document released by Snowden says that on New Year’s Eve, 2012, SHELLTRUMPET, a metadata program targeting international communications, had just "processed its One Trillionth metadata record."
Started five years ago, it noted that half of that trillion was added in 2012. It also noted that two more new programs, MOONLIGHTPATH and SPINNERET,
One man who was prescient enough to see what was coming was Senator Frank Church, the first outsider to peer into the dark recesses of the NSA.
In 1975, when the NSA posed merely a fraction of the threat to privacy it poses today with UPSTREAM, PRISM, and thousands of other collection and data-mining programs, Church issued a stark warning:
Church sounds as if he had absorbed the lessons of 1984.
From the recent
evidence, they are still to be learned.
|