In a scenario that sounds like the ramblings of a conspiracy theorist, former NSA analyst and now-whistleblower Russell Tice unveiled a massive NSA spying and wiretap program, which he claims vacuumed up an astonishing amount of communications and financial data on journalists and innocent Americans.
The program, which he claims is a remnant of the defunded 2003 “Total Information Awareness” initiative, swept up metadata (call length, envelope information, and so on) on nearly all forms of communications in the United States, as well as full communications logs for targets selected through analysis and other methods.
Tice, who previously helped shed light on the NSA’s warrantless wiretapping facilities at AT&T switching offices, said in a Wednesday interview with MSNBC’s Keith Olbermann that the NSA “had access to all Americans' communications -- faxes, phone calls, and their computer communications.”
“It didn't matter whether you were in Kansas, in the middle of the country, and you never made foreign communications at all. They monitored all communications.”
While working for the NSA, Tice says he was tasked with looking at U.S. news, reporting, and journalist organizations, specifically for the purpose of excluding them from NSA analysis. According to Tice, however, that order was just a cover story for something completely opposite. The news organizations he targeted were instead monitored by the NSA “24/7 and 365 days a year.”
“I started to investigate that. That's about the time when they came after me to fire me,” he said.
“This bait and switch idea, the ‘this is the discard pile, we’re not going to look at the media’ [where] it becomes apparent to you that the ‘discard’ pile is in fact the ‘save’ pile… how did that become apparent to you?” asked Olbermann.
“Well, as I was going for support for [a] particular organization, and it sort of was dropped to me that, you know, ‘this is done 24/7’,” replied Tice. “I would say, ‘I need collection at this time, at this point, for a window of time,’ and I would say, ‘will we have the capability at this particular point?’ in positioning assets.”
“I was ultimately told, ‘we don’t have to worry about that, because we’ve got it covered all the time.’ That’s when it clicked in my head that this was not being on a one-sy basis … this is something that’s happening all the time,” he said.
In a follow-up interview aired Thursday, Tice revealed that the communications data was then “married in” with financial records and credit card transactions.
“Throwing that information in too… your credit card records, where you spent your money … do you have any idea what this stuff was used for?” asked Olbermann.
“The obvious explanation would be, if you did have a potential terrorist, you'd want to know where they're spending money, whether they purchased an airline ticket, that sort of thing,” Tice replied.
Using criteria designed for catching terrorist-like activity – at one point, Tice speculated that if terrorists make short, 1- to 2- minute calls, then this might be a red flag applied to all such calls, such as “ordering pizza” – tens of thousands of innocent Americans were snagged into the system.
“This is garnered from algorithms that have been put together to try to just dream up scenarios that might be … associated with how a terrorist could operate,” said Tice on Thursday. “If someone just talked about the daily news and mentioned something about the Middle East, they could easily be brought to the forefront of having that little flag put by their name that says potential terrorist.”
Drawn up from anyone with a red flag, the combined communications and financial data could sit with a person for years, digitized and warehoused away. “Then all the sudden it marries up with something else 10 years from now, and they get put on a no-fly list [without having] a clue why,” explained Tice.
In most cases, spied-upon Americans didn’t do anything overtly suspicious to trigger surveillance.
Tice also elaborated on how the program was passed through Congressional oversight committees:
“The Agency would tailor some of their briefings to try to be deceptive for … someone who they really didn’t want to know exactly what was going on. There’d be a lot of bells and whistles in the briefing and, quite often, the meat of the briefing was deceptive.
“One of the things that could be done, was that you could take something that was part of the Department of Defense, make it part of the intelligence community, and put a caveat to that. [Then you could] make whatever the intelligence community is doing for support will ultimately be given a different caveat. When the defense committees on the hill come calling, you say ‘You can’t look at that because that’s an intelligence program,’ but when the intelligence program comes calling you say, ‘You can’t look at that because it’s a DoD program.’
“You’d basically have a little shell game that you’re playing back and forth.”
The NSA, when confronted with Tice’s allegations, replied it “considers the constitutional rights of U.S. citizens to be sacrosanct,” noting that it faces “immense challenges in protecting our nation,” but, “remains dedicated to performing its mission under the rule of law.”
Tice could not say whether the program was still in operation, as his access to all such information was shut off after being fired in 2005. Shortly after voicing his initial allegations, as well as serving as a source for the New York Times article that launched the Electronic Frontier Foundation’s warrantless wiretapping investigation, Tice was subpoenaed by a federal grand jury in what The Raw Story called “an apparent attempt at intimidation.”
Ars Technica notes that while communications metadata is exempt from fourth-amendment protections, a variety of U.S. laws protect this data by requiring a court order before it can be recorded.
This is not the first time the NSA has used underhanded tactics to track reporters. In April 2008, the U.S. government subpoenaed James Risen, co-author of the original New York Times article and a follow-up book called “State of War,” for phone records in order to track down his sources.
It is unclear how Tice’s allegations relate to AT&T’s infamous secure room 641A, which whistleblower Mark Klein alleged was used by the NSA to mirror all web traffic flowing through AT&T’s San Francisco switching center. Klein, who also appeared on Olbermann’s show, said he was ordered to install splitters on AT&T’s backbone that copied everything that passed through.
Klein’s allegations kicked off a massive investigation, as well as a series of lawsuits, from privacy groups such as the EFF and American Civil Liberties Unions. While the Bush Administration successfully granted telecommunications companies amnesty for their assistance – essentially shutting down many of these lawsuits – a number of lawsuits born of these original complaints are working their way through U.S. courts today.
quote: “It didn't matter whether you were in Kansas, in the middle of the country, and you never made foreign communications at all. They monitored all communications.”
quote: Being a generally conservative libertarian... I would rather have an occasional bombing than a loss of freedom.
quote: Instead of trying to stop the unstoppable we should be putting up reasonable safeguards and go about our lives with our privacy and freedom intact.
quote: That's why you Libertarians are a bunch of wackos that will never take the White House. You fail to see freedom and rights mean nothing without safety.