Sunday, December 25, 2005

Vast US effort seen on eavesdropping


The Boston Globe
Wiretaps said to sift all overseas contacts

By Charlie Savage, Globe Staff | December 23, 2005

WASHINGTON -- The National Security Agency, in carrying out President Bush's order to intercept the international phone calls and e-mails of Americans suspected of links to Al Qaeda, has probably been using computers to monitor all other Americans' international communications as well, according to specialists familiar with the workings of the NSA.

The Bush administration and the NSA have declined to provide details about the program the president authorized in 2001, but specialists said the agency serves as a vast data collection and sorting operation. It captures reams of data from satellites, fiberoptic lines, and Internet switching stations, and then uses a computer to check for names, numbers, and words that have been identified as suspicious.

''The whole idea of the NSA is intercepting huge streams of communications, taking in 2 million pieces of communications an hour," said James Bamford, the author of two books on the NSA, who was the first to reveal the inner workings of the secret agency.

''They have a capacity to listen to every overseas phone call," said Tom Blanton, director of the National Security Archive at George Washington University, which has obtained documents about the NSA using Freedom of Information Act requests.

The NSA's system of monitoring e-mails and phone calls to check for search terms has been used for decades overseas, where the Constitution's prohibition on unreasonable searches does not apply, declassified records have shown.

But since Bush's order in 2001, Bamford and other specialists said, the same process has probably been used to sort through international messages to and from the United States, though humans have never seen the vast majority of the data.

''The collection of this data by automated means creates new privacy risks," said Marc Rotenberg, executive director of the Electronic Privacy Information Center, a watchdog group that has studied computer-filtered surveillance technology through Freedom of Information Act lawsuits.

Among the risks, he said, is that the spy agency's computers will collect personal information that has no bearing on national security, and that intelligence agents programming those computers will be tempted to abuse their power to eavesdrop for personal or political gain.

But even when no personal information intercepted by the NSA's computers make it to human eyes and ears, Rotenberg said, the mere fact that spy computers are monitoring the calls and e-mails may also violate the Fourth Amendment. The Supreme Court has never ruled on whether automated surveillance of phone calls and e-mails, without a warrant, is constitutional.

The closest comparisons, legal specialists said, are cases challenging the use of dogs and infrared detectors to look for drugs without a warrant. The Supreme Court approved the use of drug-sniffing dogs to examine luggage in an airport, but said police could not use infrared scanners to check houses for heat patterns that could signal an illegal drug operation.

''This is very much a developing field, and a lot of the law is not clear," said Harvard Law School professor Bill Stuntz.

President Bush and his aides have refused to answer questions about the domestic spying program, other than to insist that it was legal. Attorney General Alberto Gonzales this week said the program only targeted messages ''where we have a reasonable basis to conclude" that one of the parties is affiliated with Al Qaeda.

And some legal scholars have maintained that a computer cannot violate other Americans' Fourth Amendment rights simply by sorting through their messages, as long as no human being ever looks at them.

Alane Kochems, a lawyer and a national security analyst at the conservative Heritage Foundation, said, ''I don't think your privacy is violated when you have a computer doing it as opposed to a human. It isn't a sentient being. It's a machine running a program."

But Yale Law School professor Jack Balkin said that Fourth Amendment privacy rights can still be violated without human contact if the NSA stores copies of everyone's messages, raising the possibility that a human could access them later. The administration has not revealed how long the NSA stores messages, and the agency has refused to comment on the program.

Balkin added that as technology becomes ever more sophisticated, any legal distinction between human agents and their tools is losing meaning. Under the theory that only human beings can invade people's privacy, he said, the police ''could simply use robots to do their dirty work."

In 1978, following revelations that President Nixon had used the NSA to spy on his domestic enemies, Congress enacted a law making it illegal to wiretap a US citizen without permission from a secret national security court. The court requires the government to show evidence that the target is a suspected spy or terrorist.

Under the 1978 law, NSA officials have had to obtain a warrant from the secret court before putting an American's information into their computers' search terms.

The restrictions largely limited NSA to collecting messages from overseas communications networks, but some Americans' messages were intercepted before the 2001 terrorist attacks.

Occasionally, the interception was deliberate. In April 2000, the NSA's then-director, General Michael Hayden, told Congress that since 1978 ''there have been no more than a very few instances of NSA seeking [court] authorization to target a US person in the United States."

More often, the interception was accidental. Because American international calls travel through foreign networks, some of which are monitored by the NSA, the agency's computers have sifted through some American international messages all along.

''Long before 9/11, the NSA gathered from the ether mountains of [overseas] phone calls and e-mail messages on a daily basis," said Columbia Law School professor Deborah Livingston. ''If you have such an extensive foreign operation, you'll gather a large amount of phone traffic and e-mails involving Americans. That's something we've lived with for a long time."

But Bush's order cleared the way for the NSA computers to sift through Americans' phone calls and e-mails.

According to a New York Times report last week, Bush authorized the NSA's human analysts to look at the international messages of up to 500 Americans at a time, with a changing list of targets.

Hayden, now the deputy director of national intelligence, told reporters this week that under Bush's order, a ''shift supervisor" instead of a judge signs off on deciding whether or not to search for an American's messages.

The general conceded that without the burden of obtaining warrants, the NSA has used ''a quicker trigger" and ''a subtly softer trigger" when deciding to track someone.

Bamford said that Hayden's ''subtly softer trigger" probably means that the NSA is monitoring a wider circle of contacts around suspects than what a judge would approve.
© Copyright 2005 The New York Times Company

No comments:

Blog Archive