Contributors
Links
Sunday, December 25, 2005
Vast US effort seen on eavesdropping
The Boston Globe
Wiretaps said to sift all overseas contacts
By Charlie Savage, Globe Staff | December 23, 2005
WASHINGTON -- The National Security Agency, in carrying out President Bush's order to intercept the international phone calls and e-mails of Americans suspected of links to Al Qaeda, has probably been using computers to monitor all other Americans' international communications as well, according to specialists familiar with the workings of the NSA.
The Bush administration and the NSA have declined to provide details about the program the president authorized in 2001, but specialists said the agency serves as a vast data collection and sorting operation. It captures reams of data from satellites, fiberoptic lines, and Internet switching stations, and then uses a computer to check for names, numbers, and words that have been identified as suspicious.
''The whole idea of the NSA is intercepting huge streams of communications, taking in 2 million pieces of communications an hour," said James Bamford, the author of two books on the NSA, who was the first to reveal the inner workings of the secret agency.
''They have a capacity to listen to every overseas phone call," said Tom Blanton, director of the National Security Archive at George Washington University, which has obtained documents about the NSA using Freedom of Information Act requests.
The NSA's system of monitoring e-mails and phone calls to check for search terms has been used for decades overseas, where the Constitution's prohibition on unreasonable searches does not apply, declassified records have shown.
But since Bush's order in 2001, Bamford and other specialists said, the same process has probably been used to sort through international messages to and from the United States, though humans have never seen the vast majority of the data.
''The collection of this data by automated means creates new privacy risks," said Marc Rotenberg, executive director of the Electronic Privacy Information Center, a watchdog group that has studied computer-filtered surveillance technology through Freedom of Information Act lawsuits.
Among the risks, he said, is that the spy agency's computers will collect personal information that has no bearing on national security, and that intelligence agents programming those computers will be tempted to abuse their power to eavesdrop for personal or political gain.
But even when no personal information intercepted by the NSA's computers make it to human eyes and ears, Rotenberg said, the mere fact that spy computers are monitoring the calls and e-mails may also violate the Fourth Amendment. The Supreme Court has never ruled on whether automated surveillance of phone calls and e-mails, without a warrant, is constitutional.
The closest comparisons, legal specialists said, are cases challenging the use of dogs and infrared detectors to look for drugs without a warrant. The Supreme Court approved the use of drug-sniffing dogs to examine luggage in an airport, but said police could not use infrared scanners to check houses for heat patterns that could signal an illegal drug operation.
''This is very much a developing field, and a lot of the law is not clear," said Harvard Law School professor Bill Stuntz.
President Bush and his aides have refused to answer questions about the domestic spying program, other than to insist that it was legal. Attorney General Alberto Gonzales this week said the program only targeted messages ''where we have a reasonable basis to conclude" that one of the parties is affiliated with Al Qaeda.
And some legal scholars have maintained that a computer cannot violate other Americans' Fourth Amendment rights simply by sorting through their messages, as long as no human being ever looks at them.
Alane Kochems, a lawyer and a national security analyst at the conservative Heritage Foundation, said, ''I don't think your privacy is violated when you have a computer doing it as opposed to a human. It isn't a sentient being. It's a machine running a program."
But Yale Law School professor Jack Balkin said that Fourth Amendment privacy rights can still be violated without human contact if the NSA stores copies of everyone's messages, raising the possibility that a human could access them later. The administration has not revealed how long the NSA stores messages, and the agency has refused to comment on the program.
Balkin added that as technology becomes ever more sophisticated, any legal distinction between human agents and their tools is losing meaning. Under the theory that only human beings can invade people's privacy, he said, the police ''could simply use robots to do their dirty work."
In 1978, following revelations that President Nixon had used the NSA to spy on his domestic enemies, Congress enacted a law making it illegal to wiretap a US citizen without permission from a secret national security court. The court requires the government to show evidence that the target is a suspected spy or terrorist.
Under the 1978 law, NSA officials have had to obtain a warrant from the secret court before putting an American's information into their computers' search terms.
The restrictions largely limited NSA to collecting messages from overseas communications networks, but some Americans' messages were intercepted before the 2001 terrorist attacks.
Occasionally, the interception was deliberate. In April 2000, the NSA's then-director, General Michael Hayden, told Congress that since 1978 ''there have been no more than a very few instances of NSA seeking [court] authorization to target a US person in the United States."
More often, the interception was accidental. Because American international calls travel through foreign networks, some of which are monitored by the NSA, the agency's computers have sifted through some American international messages all along.
''Long before 9/11, the NSA gathered from the ether mountains of [overseas] phone calls and e-mail messages on a daily basis," said Columbia Law School professor Deborah Livingston. ''If you have such an extensive foreign operation, you'll gather a large amount of phone traffic and e-mails involving Americans. That's something we've lived with for a long time."
But Bush's order cleared the way for the NSA computers to sift through Americans' phone calls and e-mails.
According to a New York Times report last week, Bush authorized the NSA's human analysts to look at the international messages of up to 500 Americans at a time, with a changing list of targets.
Hayden, now the deputy director of national intelligence, told reporters this week that under Bush's order, a ''shift supervisor" instead of a judge signs off on deciding whether or not to search for an American's messages.
The general conceded that without the burden of obtaining warrants, the NSA has used ''a quicker trigger" and ''a subtly softer trigger" when deciding to track someone.
Bamford said that Hayden's ''subtly softer trigger" probably means that the NSA is monitoring a wider circle of contacts around suspects than what a judge would approve.
© Copyright 2005 The New York Times Company
Subscribe to:
Post Comments (Atom)
Blog Archive
-
▼
2005
(896)
-
▼
December
(68)
- The New Year in Taxes - New York TimesThe New York...
- Willie Nelson Markets 'BioWillie' Fuel
- Crooks at the Trough
- Top Ten Myths about Iraq in 2005
- Beyond the imperial presidency
- Bush Hands Bin Laden A Victory
- Power That Bush Can't Just Take
- Bush Causes Whiplash By Saying Bad Intel Made Good...
- Silent Nights on the Gulf Coast - New York TimesTh...
- Vast US effort seen on eavesdropping
- Bush Impeachment Not Out of the Question
- Infidel Non-Christians Will Not Go To Heaven!!!
- I Saw Jackie Mason Kissing Santa Claus
- The Coup is Almost Complete
- Power We Didn't Grant
- Excuses, excuses
- How Far Will Bush Supporters Go?
- Republican Holiday Gift
- And You Say You’re not a Union Man
- Bush's impeachable offense
- Iraq Vote Moves Baghdad Closer to Tehran
- Spy Court Judge Quits In Protest
- Judge Rules Against Pa. Biology Curriculum By
- Even Right Wingers Want Him Impeached For Spying o...
- Present at the Disintegration
- Bush’s Snoopgate
- Impeach the Bastards
- George W. Bush: Emperor or Military Dictator?
- Republicans: FUCK THE POOR
- The President's Men
- Spying on Americans: Did Bush break the law?
- U.S. Plays 'I Spy'
- A Ten-Step Program
- On Hill, Anger and Calls for Hearings Greet News o...
- Everyone had the same intelligence on Iraq? Not ex...
- Dingell's Holiday Jingle
- The Rock Star's Burden - New York TimesThe New Yor...
- Does 30,000 Mean Anything to Bush
- Terminator In Deed
- Dope, dope, dope.....
- Tookie Dies, So Arnold Can Live
- Which is why she's a FOX news regular
- Dictionary of Republicanisms
- a Potemkin Village - New York TimesThe New York Ti...
- Bush Meets St. Peter - New York TimesThe New York ...
- Conspiracy to Torture
- Can Mommy Know Best? - New York TimesThe New York ...
- Republican Values: Train Robbery by Crooks for Cro...
- VERY SAD NEWSThere will be no Nativity Scene in Wa...
- A New Low for Lieberman
- Rumsfeld's Handshake Deal with Saddam
- Mission to be decided
- Playwright Takes a Prize and a Jab at U.S.
- Iceberg? What Iceberg?
- Push the Pedal To the Metal or Get the Hell Out.
- Torturing the Facts - New York TimesThe New York T...
- Fw: Torture: What are the U.S. Obligations to Pre...
- Dick and Don Chew the Fat
- Open and Shut
- The Iraq Index
- Ho Ho Hokum
- Paging Frank Rich! GAO confirms - 2004 Election Wa...
- Bushwhacking the Constitution
- The only way out
- Check out this turn of events....
- The president's season of hope and happiness
- Let's Quit Complaining and Join The Republican Party.
- Embedded TIME Reporter: Bush Lied In Speech Yester...
-
▼
December
(68)
No comments:
Post a Comment