Print 122 comment(s) - last by fspikec.. on Jan 31 at 3:37 PM

Massive dragnet sweeps up communications metadata, and financial records, while targets have all of their communications recorded

In a scenario that sounds like the ramblings of a conspiracy theorist, former NSA analyst and now-whistleblower Russell Tice unveiled a massive NSA spying and wiretap program, which he claims vacuumed up an astonishing amount of communications and financial data on journalists and innocent Americans.

The program, which he claims is a remnant of the defunded 2003 “Total Information Awareness” initiative, swept up metadata (call length, envelope information, and so on) on nearly all forms of communications in the United States, as well as full communications logs for targets selected through analysis and other methods.

Tice, who previously helped shed light on the NSA’s warrantless wiretapping facilities at AT&T switching offices, said in a Wednesday interview with MSNBC’s Keith Olbermann that the NSA “had access to all Americans' communications -- faxes, phone calls, and their computer communications.”

“It didn't matter whether you were in Kansas, in the middle of the country, and you never made foreign communications at all. They monitored all communications.”

While working for the NSA, Tice says he was tasked with looking at U.S. news, reporting, and journalist organizations, specifically for the purpose of excluding them from NSA analysis. According to Tice, however, that order was just a cover story for something completely opposite. The news organizations he targeted were instead monitored by the NSA “24/7 and 365 days a year.”

“I started to investigate that. That's about the time when they came after me to fire me,” he said.

“This bait and switch idea, the ‘this is the discard pile, we’re not going to look at the media’ [where] it becomes apparent to you that the ‘discard’ pile is in fact the ‘save’ pile… how did that become apparent to you?” asked Olbermann.

“Well, as I was going for support for [a] particular organization, and it sort of was dropped to me that, you know, ‘this is done 24/7’,” replied Tice. “I would say, ‘I need collection at this time, at this point, for a window of time,’ and I would say, ‘will we have the capability at this particular point?’ in positioning assets.”

“I was ultimately told, ‘we don’t have to worry about that, because we’ve got it covered all the time.’ That’s when it clicked in my head that this was not being on a one-sy basis … this is something that’s happening all the time,” he said.

In a follow-up interview aired Thursday, Tice revealed that the communications data was then “married in” with financial records and credit card transactions.

“Throwing that information in too… your credit card records, where you spent your money … do you have any idea what this stuff was used for?” asked Olbermann.

“The obvious explanation would be, if you did have a potential terrorist, you'd want to know where they're spending money, whether they purchased an airline ticket, that sort of thing,” Tice replied.

Using criteria designed for catching terrorist-like activity – at one point, Tice speculated that if terrorists make short, 1- to 2- minute calls, then this might be a red flag applied to all such calls, such as “ordering pizza” – tens of thousands of innocent Americans were snagged into the system.

“This is garnered from algorithms that have been put together to try to just dream up scenarios that might be … associated with how a terrorist could operate,” said Tice on Thursday. “If someone just talked about the daily news and mentioned something about the Middle East, they could easily be brought to the forefront of having that little flag put by their name that says potential terrorist.”

Drawn up from anyone with a red flag, the combined communications and financial data could sit with a person for years, digitized and warehoused away. “Then all the sudden it marries up with something else 10 years from now, and they get put on a no-fly list [without having] a clue why,” explained Tice.

In most cases, spied-upon Americans didn’t do anything overtly suspicious to trigger surveillance.

Tice also elaborated on how the program was passed through Congressional oversight committees:

“The Agency would tailor some of their briefings to try to be deceptive for … someone who they really didn’t want to know exactly what was going on. There’d be a lot of bells and whistles in the briefing and, quite often, the meat of the briefing was deceptive.

“One of the things that could be done, was that you could take something that was part of the Department of Defense, make it part of the intelligence community, and put a caveat to that. [Then you could] make whatever the intelligence community is doing for support will ultimately be given a different caveat. When the defense committees on the hill come calling, you say ‘You can’t look at that because that’s an intelligence program,’ but when the intelligence program comes calling you say, ‘You can’t look at that because it’s a DoD program.’

“You’d basically have a little shell game that you’re playing back and forth.”

The NSA, when confronted with Tice’s allegations, replied it “considers the constitutional rights of U.S. citizens to be sacrosanct,” noting that it faces “immense challenges in protecting our nation,” but, “remains dedicated to performing its mission under the rule of law.”

Tice could not say whether the program was still in operation, as his access to all such information was shut off after being fired in 2005. Shortly after voicing his initial allegations, as well as serving as a source for the New York Times article that launched the Electronic Frontier Foundation’s warrantless wiretapping investigation, Tice was subpoenaed by a federal grand jury in what The Raw Story called “an apparent attempt at intimidation.”

Ars Technica notes that while communications metadata is exempt from fourth-amendment protections, a variety of U.S. laws protect this data by requiring a court order before it can be recorded.

This is not the first time the NSA has used underhanded tactics to track reporters. In April 2008, the U.S. government subpoenaed James Risen, co-author of the original New York Times article and a follow-up book called “State of War,” for phone records in order to track down his sources.

It is unclear how Tice’s allegations relate to AT&T’s infamous secure room 641A, which whistleblower Mark Klein alleged was used by the NSA to mirror all web traffic flowing through AT&T’s San Francisco switching center. Klein, who also appeared on Olbermann’s show, said he was ordered to install splitters on AT&T’s backbone that copied everything that passed through.

Klein’s allegations kicked off a massive investigation, as well as a series of lawsuits, from privacy groups such as the EFF and American Civil Liberties Unions.  While the Bush Administration successfully granted telecommunications companies amnesty for their assistance – essentially shutting down many of these lawsuits – a number of lawsuits born of these original complaints are working their way through U.S. courts today.

Comments     Threshold

This article is over a month old, voting and posting comments is disabled

RE: Kieth Olberman? Please...
By ChristopherO on 1/24/2009 3:07:14 PM , Rating: 1
I don't want to play Devil's advocate, but think about that. One million Americans. That's one in 300.

You don't think that one out of every 300 Americans might be potentially crazy enough to join a crazy cause against the country? As far as I can tell, 10% of the population are insane leftists, and another 10% are insane right-wingers. I'm pretty certain that mob-mentality could take root in at least 0.33% of the population.

And they didn't say they're actually listening to everything. They're looking for patterns.

If guy A, talks to guy B frequently, who talks to guy C a lot, who calls a satellite phone in remote parts of God-knows-where on a regular basis... You don't think it's good to know that guy A has the potential to be part of something, especially if A, B, C have absolutely no blood relationship?

The double-standard baffles me. You get that insane kid who shot up a school in Colorado in the 90s... Everyone afterward says, "We should have seen it coming!" Then, everyone actually starts watching who troubled-kids talk to, and then other crazy fools say, "You're violating their privacy rights! You have no right to know who they're friends with!"

We should just have a national vote:
a.) Check this box if you want total privacy, with the exception that more people might die since we can't monitor for potential trouble.
b.) Check this box if you're okay with the government *potentially* watching who you talk to, with the trade off that bad things are less likely to happen.

You need to remember something... *Every* single country in the world who is a routine victim of terror doesn't have our technology. If they did, perhaps they wouldn't have the problems they have.

RE: Kieth Olberman? Please...
By MisterChristopher on 1/25/2009 12:46:59 PM , Rating: 2
This is ridiculous. You are completely disregarding the fact that I personally do not want my information being recorded at any cost. I hate to sound uncaring or selfish, but I would rather that you and I face the risk of death than I give up my freedoms.

My constitutional right to privacy trumps your desire to watch me for "potential" problems.

Freedom should never be traded for security. Once it is, what is the point of living?

By William Gaatjes on 1/25/2009 6:42:42 PM , Rating: 2
Then you do not want to be protected by your army ? Or be protected by the police against criminals ?

There is no such thing as absolute freedom.
When people give up a tiny little bit of their freedom to increase the safety of their lives it is a good thing. It just works that way. However, i do have to state that some precautions used in the usa against terrorism are just insane. The NSA is not unique you know. Wire tapping and profiling happens everywhere in every technological advanced country. Most of the time it is a benefit. Sometimes when government employees( i am not meaning Russel Tice) go roque and abuse the gathered information for personal use it can be a bad thing. But seriously, a policeofficer or a soldier can go roque too. Does that mean the army is a bad thing or that the police is a bad thing ? I don't think so. Only relative freedom exists in civilized countries. Because that is what makes them civilized.

"A lot of people pay zero for the cellphone ... That's what it's worth." -- Apple Chief Operating Officer Timothy Cook
Related Articles

Most Popular ArticlesAre you ready for this ? HyperDrive Aircraft
September 24, 2016, 9:29 AM
Leaked – Samsung S8 is a Dream and a Dream 2
September 25, 2016, 8:00 AM
Yahoo Hacked - Change Your Passwords and Security Info ASAP!
September 23, 2016, 5:45 AM
A is for Apples
September 23, 2016, 5:32 AM
Walmart may get "Robot Shopping Carts?"
September 17, 2016, 6:01 AM

Copyright 2016 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki