Until yesterday, if you had posted with a straight face, "Everyone's phone is tapped," most people would have blinked, laughed, and the DKos debunking squad would be all over you. You might have been painted with the dreaded "Conspiracy Theorist" label. That has, of course, changed with Glenn Greenwald's article in The Guardian and, most importantly, a leaked copy of an Order issued in April by the FISA Court instructing Verizon to turn over all its records of phone calls made inside the United States, including purely local call records between US Citizens.
The disclosure that this is a domestic program being conducted on an “ongoing basis,” (according to The Washington Post, the order has been renewed every 90 days since 2006) – has people asking for information. But, this isn't new, it just confirms the details of what has been known about "The Program" since massive domestic wiretapping was first revealed by The New York Times in 2004.
Now, suddenly, people want information, and the topic doesn't seem so . . . tin foil hat. Here's a relatively brief summary of what's publicly known about the government's key surveillance programs and how they actually work, and how this becomes part of your Permanent Record.
- MORE -
Here are the building blocks of the universal surveillance state:
"Stellar Wind", NSA call database
The United States' National Security Agency (NSA) maintains a database containing hundreds of billions of records of telephone calls made by U.S. citizens from the four largest telephone carriers in the United States: AT&T, SBC, BellSouth (all three now called AT&T), and Verizon.
The existence of this database and the NSA program that compiled it was unknown to the general public until USA Today broke the story on May 10, 2006. It is estimated that the database contains over 1.9 trillion call-detail records. According to Bloomberg News, the effort began approximately seven months before the September 11, 2001 attacks.
The records include detailed call information (caller, receiver, date/time of call, length of call, etc.) for use in traffic analysis and social network analysis, but do not include audio information or transcripts of the content of the phone calls.
The database's existence has prompted fierce objections. It is often viewed as an illegal warrantless search and a violation of the pen register provisions of the Foreign Intelligence Surveillance Act and (in some cases) the Fourth Amendment of the United States Constitution.
The George W. Bush administration neither confirmed nor denied the existence of the domestic call record database. This contrasts with a related NSA controversy concerning warrantless surveillance of selected telephone calls; in that case they did confirm the existence of the program of debated legality. The program's code name is Stellar Wind.
FISA Court Driftnet Warrants, NSA Collection, Long-term Storage of US Person Data
http://www.cato.org/...
Based on what little we know of the NSA’s programs from public reports, a single “authorization” will routinely cover hundreds or thousands of phone numbers and e-mail addresses. That means that even if there’s only “one occasion” on which the NSA “circumvented the spirit of the law” or flouted the Fourth Amendment, the rights of thousands of Americans could easily have been violated.
”Minimization procedures are the rules designed to limit the retention and dissemination of irrelevant information about innocent Americans that might get picked up during authorized surveillance. In ordinary criminal wiretaps, it makes sense to talk about “collection carried out pursuant to… minimization procedures” because, under the stricter rules governing such spying, someone is supposed to be monitoring the wiretap in realtime, and ensuring that innocent conversations (like a mobster’s spouse or teenage kids chatting on the house line) are not recorded.
But that’s not how FISA surveillance normally works. As a rare public ruling by the FISA Court explains, the standard procedure for FISA surveillance is that “large amounts of information are collected by automatic recording to be minimized after the fact.” The court elaborated: “Virtually all information seized, whether by electronic surveillance or physical search, is minimized hours, days, or weeks after collection.” (Emphasis mine.) In other words, minimization is something that normally happens after collection: First you intercept, then you toss out the irrelevant stuff. Intelligence officials have suggested the same in recent testimony before Congress: Communications aren’t “minimized” until they’re reviewed by human analysts—and given the incredible volume of NSA collection, it’s unlikely that more than a small fraction of what’s intercepted ever is seen by human eyes.
"Stellar Wind" is one codename for The Program. Another that is publicly known is "Thin Thread."
Stellar Wind is the open secret code name for certain information collection activities performed by the United States National Security Agency (NSA) and revealed by Thomas Tamm to The New York Times reporters James Risen and Eric Lichtblau. The operation was approved by President George W. Bush shortly after the September 11 attacks in 2001.
The program's activities involve data mining of a large database of the communications of American citizens, including e-mail communications, phone conversations, financial transactions, and Internet activity.
There were internal disputes within the Justice Department about the legality of the program, because data are collected for large numbers of people, not just the subjects of Foreign Intelligence Surveillance Act (FISA) warrants.
For a detailed discussion of Thin Thread, see Jane Mayer's 2011 profile of NSA whistleblower Bill Binney.
The Trailblazer and Turbulence Programs Absorbed Billions, But Thin Thread was the One That Went Operational
Going backwards, related NSA programs included Trailblazer, a multibillion dollar program that focused on interception and analysis of data carried on web communications networks, cell phones, VOIP, and e-mail. After receiving adverse publicity Trailblazer was shutdown but reportedly morphed into the NSA Turbulance Program. Thin Thread was a rival NSA program that went operational, resulting in massive warrantless domestic surveillance. This is described by Jane Mayer in a 2011 New Yorker article: http://www.newyorker.com/...
Code-named ThinThread, it had been developed by technological wizards in a kind of Skunk Works on the N.S.A. campus. Formally, the project was supervised by the agency’s Signals Intelligence Automation Research Center, or SARC.
While most of the N.S.A. was reeling on September 11th, inside SARC the horror unfolded “almost like an ‘I-told-you-so’ moment,” according to J. Kirk Wiebe, an intelligence analyst who worked there. “We knew we weren’t keeping up.” SARC was led by a crypto-mathematician named Bill Binney, whom Wiebe describes as “one of the best analysts in history.” Binney and a team of some twenty others believed that they had pinpointed the N.S.A.’s biggest problem—data overload—and then solved it. But the agency’s management hadn’t agreed.
Binney, who is six feet three, is a bespectacled sixty-seven-year-old man with wisps of dark hair; he has the quiet, tense air of a preoccupied intellectual. Now retired and suffering gravely from diabetes, which has already claimed his left leg, he agreed recently to speak publicly for the first time about the Drake case. When we met, at a restaurant near N.S.A. headquarters, he leaned crutches against an extra chair. “This is too serious not to talk about,” he said.
Binney expressed terrible remorse over the way some of his algorithms were used after 9/11. ThinThread, the “little program” that he invented to track enemies outside the U.S., “got twisted,” and was used for both foreign and domestic spying: “I should apologize to the American people. It’s violated everyone’s rights. It can be used to eavesdrop on the whole world.” According to Binney, Drake took his side against the N.S.A.’s management and, as a result, became a political target within the agency.
Binney described Thin Thread to Mayer, who describes The Program this way:
ThinThread would correlate data from financial transactions, travel records, Web searches, G.P.S. equipment, and any other “attributes” that an analyst might find useful in pinpointing “the bad guys.” By 2000, Binney, using fibre optics, had set up a computer network that could chart relationships among people in real time. It also turned the N.S.A.’s data-collection paradigm upside down. Instead of vacuuming up information around the world and then sending it all back to headquarters for analysis, ThinThread processed information as it was collected—discarding useless information on the spot and avoiding the overload problem that plagued centralized systems. Binney says, “The beauty of it is that it was open-ended, so it could keep expanding.”
Pilot tests of ThinThread proved almost too successful, according to a former intelligence expert who analyzed it. “It was nearly perfect,” the official says. “But it processed such a large amount of data that it picked up more Americans than the other systems.” Though ThinThread was intended to intercept foreign communications, it continued documenting signals when a trail crossed into the U.S.
< . . .>
Binney, for his part, believes that the agency now stores copies of all e-mails transmitted in America, in case the government wants to retrieve the details later. In the past few years, the N.S.A. has built enormous electronic-storage facilities in Texas and Utah. Binney says that an N.S.A. e-mail database can be searched with “dictionary selection,” in the manner of Google. After 9/11, he says, “General Hayden reassured everyone that the N.S.A. didn’t put out dragnets, and that was true. It had no need—it was getting every fish in the sea.”
In addition to NSA's Thinthread and Trailblazer programs, DIA operated its own domestic-focused pre-9/11 surveillance program. At least one of these monitored AQ cells operating inside the US. The story of the Able Danger has been well documented and fairly widely known.
Able Danger was shut down by Undersecretary of Defense for Intelligence Steve Cambone in late 2000-early 2001 after it had mapped out the Al Qaeda support cell inside the US supporting Osama bin Laden and the 9/11 attack cell members.
The Able Danger program built upon social network analysis focusing electronic surveillance on members of the so-called Brooklyn Cell that had remained in place after its establishment by CIA as part of Operation Cyclone, the Agency's operation that recruited and trained Jihadis for war against the Soviets in Afghanistan. Much of bin Laden's organization grew out of the US and Saudi organized covert operations against the Russia and its allies in Central Asia and the oil-rich region of the Transcaucasus that flared up again as wars in Bosnia, Kosovo, Dagestan, and Chechnya.
As early as 1997, as the US and Saudi paramilitary organized by bin Laden were cooperating in Kosovo, US intelligence officials were bragging that they had "mapped out" bin Laden's global financial and donor network by human and technical means.
Al Qaeda was already the focus of multiple surveillance operations inside the US, but this was gravely complicated by intelligence agencies from several countries stumbling over each other and the fatal duplicity of their network of interwoven double-agents that created the opportunity for the 9/11 attacks. Able Danger was perhaps too successful as it plugged into the international morass of intelligence services surveilling and operating al Qaeda agents and double-agents inside the US before 9/11. After it had acquired the AQ support network inside the US, including the identity of Mohamed Atta, Able Danger was unplugged, and some ten terabytes of data were ordered destroyed.
Other NSA and DIA technical collection and analysis programs, elsewhere referred as "The Program" survived the reorganization of intelligence that followed 9/11, and the closing down of some legacy programs that followed a series of disclosures and scandals involving "The Program" in the middle of the decade. Part of this was described by Shane Harris in The National Journal, "TIA LIVES ON":
February 23, 2006, http://nationaljournal.com/... or http://mediachannel.org/...
As early as February 2003, the Pentagon planned to use Genoa II technologies at the Army's Information Awareness Center at Fort Belvoir, Va., according to an unclassified Defense budget document. The awareness center was an early tester of various TIA tools, according to former employees. A 2003 Pentagon report to Congress shows that the Army center was part of an expansive network of intelligence agencies, including the NSA, that experimented with the tools. The center was also home to the Army's Able Danger program, which has come under scrutiny after some of its members said they used data-analysis tools to discover the name and photograph of 9/11 ringleader Mohamed Atta more than a year before the attacks.
The other project has been re-designated "TopSail" (formerly Genoa II) and would provide IT tools to help anticipate and preempt terrorist attacks. SAIC has also been contracted to work on Topsail, including a US$3.7 million contract in 2005.
The Matrix Project and Your Terrorism Quotient (TQ)
Finally, we come to what may have been the most tin foilish program of all, Matrix, (yes, there really was one named that before the movie) Wish I were only kidding. But, according to this 2004 article, The Matrix program was in the works that had the potential to profile every American and assign each of us a Terrorism Quotient (TQ): http://usatoday30.usatoday.com/... ; see, related Cong. Research Service Study: http://www.fas.org/...
'Terrorism quotient' records spark suspicions about Matrix
NEW YORK (AP) — Before helping to launch the criminal information project known as Matrix, a database contractor gave U.S. and Florida authorities the names of 120,000 people who showed a statistical likelihood of being terrorists — sparking some investigations and arrests.
The "high terrorism factor" scoring system also became a key selling point for the involvement of the database company, Seisint Inc., in the Matrix project.
Public records obtained by The Associated Press from several states show that Justice Department officials cited the scoring technology in appointing Seisint sole contractor on the federally funded, $12 million project.
Seisint and the law enforcement officials who oversee Matrix insist that the terrorism scoring system ultimately was kept out of the project, largely because of privacy concerns.
However, new details about Seisint's development of the "terrorism quotient," including the revelation that authorities apparently acted on the list of 120,000, are renewing privacy activists' suspicions about Matrix's potential power.
Now, if that early profiling program was similarly developed, your Terrorism Quotient (TQ), goes with IQ into your permanent record.
Yes, your Permanent Record.