HomeLatest ThreadsGreatest ThreadsForums & GroupsMy SubscriptionsMy Posts
DU Home » Latest Threads » Forums & Groups » Main » General Discussion (Forum) » Your Permanent Record: Ho...

Thu Jun 6, 2013, 01:57 PM

Your Permanent Record: How NSA (and Others) Have Been Spying on Everyone

Until yesterday, if you had posted with a straight face, "Your phone is tapped," most people would have blinked, laughed, and the DU debunking squad would be all over you. You might have been painted with the dreaded "Conspiracy Theorist" label. That has changed with Glenn Greenwald's article in The Guardian and, most importantly, a copy of an Order issued in April by the FISA Court instructing Verizon to turn over all its records of phone calls made inside the United States, including purely local call records between US Citizens.

The fact is that this is a domestic program being conducted on an “ongoing basis,” (according to The Washington Post, the order has been renewed every 90 days since 2006) – has people asking for information. But, this isn't new, it just confirms the details of what has been known about "The Program" since massive domestic wiretapping was first revealed by The New York Times in 2004.

Now, suddely, people want information, and the topic doesn't seem so . Here's a relatively brief summary of what's publicly known about the government's key surveillance programs and how they actually work:

NSA call database
From Wikipedia, the free encyclopedia
Jump to: navigation, search

The United States' National Security Agency (NSA) maintains a database containing hundreds of billions of records of telephone calls made by U.S. citizens from the four largest telephone carriers in the United States: AT&T, SBC, BellSouth (all three now called AT&T), and Verizon.[1]

The existence of this database and the NSA program that compiled it was unknown to the general public until USA Today broke the story on May 10, 2006.[1] It is estimated that the database contains over 1.9 trillion call-detail records.[2] According to Bloomberg News, the effort began approximately seven months before the September 11, 2001 attacks.[3]

The records include detailed call information (caller, receiver, date/time of call, length of call, etc.) for use in traffic analysis and social network analysis, but do not include audio information or transcripts of the content of the phone calls.

The database's existence has prompted fierce objections. It is often viewed as an illegal warrantless search and a violation of the pen register provisions of the Foreign Intelligence Surveillance Act and (in some cases) the Fourth Amendment of the United States Constitution.

The George W. Bush administration neither confirmed nor denied the existence of the domestic call record database. This contrasts with a related NSA controversy concerning warrantless surveillance of selected telephone calls; in that case they did confirm the existence of the program of debated legality. The program's code name is Stellar Wind.*[4]


Based on what little we know of the NSA’s programs from public reports, a single “authorization” will routinely cover hundreds or thousands of phone numbers and e-mail addresses. That means that even if there’s only “one occasion” on which the NSA “circumvented the spirit of the law” or flouted the Fourth Amendment, the rights of thousands of Americans could easily have been violated.

Minimization procedures are the rules designed to limit the retention and dissemination of irrelevant information about innocent Americans that might get picked up during authorized surveillance. In ordinary criminal wiretaps, it makes sense to talk about “collection carried out pursuant to… minimization procedures” because, under the stricter rules governing such spying, someone is supposed to be monitoring the wiretap in realtime, and ensuring that innocent conversations (like a mobster’s spouse or teenage kids chatting on the house line) are not recorded.

But that’s not how FISA surveillance normally works. As a rare public ruling by the FISA Court explains, the standard procedure for FISA surveillance is that “large amounts of information are collected by automatic recording to be minimized after the fact.” The court elaborated: “Virtually all information seized, whether by electronic surveillance or physical search, is minimized hours, days, or weeks after collection.” (Emphasis mine.) In other words, minimization is something that normally happens after collection: First you intercept, then you toss out the irrelevant stuff. Intelligence officials have suggested the same in recent testimony before Congress: Communications aren’t “minimized” until they’re reviewed by human analysts—and given the incredible volume of NSA collection, it’s unlikely that more than a small fraction of what’s intercepted ever is seen by human eyes.

*"Stellar Wind" is one codename for The Program. Another that is publicly known is "Thin Thread."

Stellar Wind is the open secret code name for certain information collection activities performed by the United States National Security Agency (NSA) and revealed by Thomas Tamm to The New York Times reporters James Risen and Eric Lichtblau.[1] The operation was approved by President George W. Bush shortly after the September 11 attacks in 2001.[2]

The program's activities involve data mining of a large database of the communications of American citizens, including e-mail communications, phone conversations, financial transactions, and Internet activity.[1]

There were internal disputes within the Justice Department about the legality of the program, because data are collected for large numbers of people, not just the subjects of Foreign Intelligence Surveillance Act (FISA) warrants.[3]

For a detailed discussion of Thin Thread, see Jane Mayer's 2011 profile of NSA whistleblower Bill Binney,

Going backwards, related programs included Trailblazer, an NSA program that focused on interception and analysis of data carried on web communications networks, cell phones, VOIP, and e-mail. After receiving adverse publicity Trailblazer was shutdown but reportedly morphed into the NSA Turbulance Program. Thin Thread was a rival NSA program that went operational, resulting in massive domestic surveillance. This is described by Jane Mayer in a 2011 New Yorker article: http://www.newyorker.com/reporting/2011/05/23/110523fa_fact_mayer?currentPage=all

Code-named ThinThread, it had been developed by technological wizards in a kind of Skunk Works on the N.S.A. campus. Formally, the project was supervised by the agency’s Signals Intelligence Automation Research Center, or SARC.

While most of the N.S.A. was reeling on September 11th, inside SARC the horror unfolded “almost like an ‘I-told-you-so’ moment,” according to J. Kirk Wiebe, an intelligence analyst who worked there. “We knew we weren’t keeping up.” SARC was led by a crypto-mathematician named Bill Binney, whom Wiebe describes as “one of the best analysts in history.” Binney and a team of some twenty others believed that they had pinpointed the N.S.A.’s biggest problem—data overload—and then solved it. But the agency’s management hadn’t agreed.

Binney, who is six feet three, is a bespectacled sixty-seven-year-old man with wisps of dark hair; he has the quiet, tense air of a preoccupied intellectual. Now retired and suffering gravely from diabetes, which has already claimed his left leg, he agreed recently to speak publicly for the first time about the Drake case. When we met, at a restaurant near N.S.A. headquarters, he leaned crutches against an extra chair. “This is too serious not to talk about,” he said.

Binney expressed terrible remorse over the way some of his algorithms were used after 9/11. ThinThread, the “little program” that he invented to track enemies outside the U.S., “got twisted,” and was used for both foreign and domestic spying: “I should apologize to the American people. It’s violated everyone’s rights. It can be used to eavesdrop on the whole world.” According to Binney, Drake took his side against the N.S.A.’s management and, as a result, became a political target within the agency.

Binney described Thin Thread to Mayer, who describes The Program this way:

ThinThread would correlate data from financial transactions, travel records, Web searches, G.P.S. equipment, and any other “attributes” that an analyst might find useful in pinpointing “the bad guys.” By 2000, Binney, using fibre optics, had set up a computer network that could chart relationships among people in real time. It also turned the N.S.A.’s data-collection paradigm upside down. Instead of vacuuming up information around the world and then sending it all back to headquarters for analysis, ThinThread processed information as it was collected—discarding useless information on the spot and avoiding the overload problem that plagued centralized systems. Binney says, “The beauty of it is that it was open-ended, so it could keep expanding.”

Pilot tests of ThinThread proved almost too successful, according to a former intelligence expert who analyzed it. “It was nearly perfect,” the official says. “But it processed such a large amount of data that it picked up more Americans than the other systems.” Though ThinThread was intended to intercept foreign communications, it continued documenting signals when a trail crossed into the U.S.
< . . .>
Binney, for his part, believes that the agency now stores copies of all e-mails transmitted in America, in case the government wants to retrieve the details later. In the past few years, the N.S.A. has built enormous electronic-storage facilities in Texas and Utah. Binney says that an N.S.A. e-mail database can be searched with “dictionary selection,” in the manner of Google. After 9/11, he says, “General Hayden reassured everyone that the N.S.A. didn’t put out dragnets, and that was true. It had no need—it was getting every fish in the sea.”

In addition to NSA's Thinthread and Trailblazer programs, DIA operated its own domestic-focused pre-9/11 surveillance program. At least one of these monitored AQ cells operating inside the US. The story of the Able Danger has been well documented and fairly widely known. Able Danger was shut down by Undersecretary of Defense for Intelligence Steve Cambone in late 2000-early 2001 after it had mapped out the Al Qaeda support cell inside the US supporting Osama bin Laden and the 9/11 attack cell members. That operation built up a social network analysis focusing electronic surveillance on members of the so-called Brooklyn Cell that had remained in place after its establishment by CIA as part of Operation Cyclone, the Agency's operation that recruited and trained Jihadis for war against the Soviets in Afghanistan. Much of bin Laden's organization grew out of the US and Saudi organized covert operations against the Russia and its allies in Central Asia and the oil-rich region of the Transcaucasus that flared up again as wars in Bosnia, Kosovo, Dagestan, and Chechnya.

As early as 1997, as the US and Saudi paramilitary organized by bin Laden were cooperating in Kosovo, US intelligence officials were bragging that they had "mapped out" bin Laden's financial and donor network by human and technical means. Al Qaeda was already the focus of multiple surveillance operations inside the US, but this was gravely complicated by intelligence agencies from several countries stumbling over each other and the fatal duplicity of their network of interwoven double-agents that created the opportunity for the 9/11 attacks.

NSA and DIA technical collection and analysis, elsewhere referred as "The Program" survived the reorganization of intelligence that followed 9/11, and the closing down some legacy programs that followed a series of disclosures and scandals involving "The Program" in the middle of the decade. Part of this was described by Shane Harris in The National Journal, "TIA LIVES ON":
February 23, 2006, http://nationaljournal.com/about/njweekly/stories/2006/0223nj1.htm or http://mediachannel.org/blog/node/3509

As early as February 2003, the Pentagon planned to use Genoa II technologies at the Army's Information Awareness Center at Fort Belvoir, Va., according to an unclassified Defense budget document. The awareness center was an early tester of various TIA tools, according to former employees. A 2003 Pentagon report to Congress shows that the Army center was part of an expansive network of intelligence agencies, including the NSA, that experimented with the tools. The center was also home to the Army's Able Danger program, which has come under scrutiny after some of its members said they used data-analysis tools to discover the name and photograph of 9/11 ringleader Mohamed Atta more than a year before the attacks.

The other project has been re-designated "TopSail" (formerly Genoa II) and would provide IT tools to help anticipate and preempt terrorist attacks. SAIC has also been contracted to work on Topsail, including a US$3.7 million contract in 2005.

The Matrix Project and Your Terrorism Quotient (TQ)

Finally, we come to what may have been the most tin foilish program of all, Matrix, (yes, there really was one named that before the movie) Wish I were only kidding. But, according to this 2004 article, The Matrix program was in the works that had the potential to profile every American and assign each of us a Terrorism Quotient (TQ): http://usatoday30.usatoday.com/news/washington/2004-05-20-terror-database_x.htm?csp=34 ; see, related Cong. Research Service Study: http://www.fas.org/irp/crs/RL32536.pdf‎

'Terrorism quotient' records spark suspicions about Matrix

NEW YORK (AP) — Before helping to launch the criminal information project known as Matrix, a database contractor gave U.S. and Florida authorities the names of 120,000 people who showed a statistical likelihood of being terrorists — sparking some investigations and arrests.

The "high terrorism factor" scoring system also became a key selling point for the involvement of the database company, Seisint Inc., in the Matrix project.

Public records obtained by The Associated Press from several states show that Justice Department officials cited the scoring technology in appointing Seisint sole contractor on the federally funded, $12 million project.

Seisint and the law enforcement officials who oversee Matrix insist that the terrorism scoring system ultimately was kept out of the project, largely because of privacy concerns.

However, new details about Seisint's development of the "terrorism quotient," including the revelation that authorities apparently acted on the list of 120,000, are renewing privacy activists' suspicions about Matrix's potential power.

Now, if that early profiling program was similarly developed, your Terrorism Quotient (TQ), goes with IQ into your permanent record.

Yes, your Permanent Record.

7 replies, 1456 views

Reply to this thread

Back to top Alert abuse

Always highlight: 10 newest replies | Replies posted after I mark a forum
Replies to this discussion thread
Arrow 7 replies Author Time Post
Reply Your Permanent Record: How NSA (and Others) Have Been Spying on Everyone (Original post)
leveymg Jun 2013 OP
geek tragedy Jun 2013 #1
leveymg Jun 2013 #2
truedelphi Jun 2013 #6
LiberalEsto Jun 2013 #3
truedelphi Jun 2013 #4
truedelphi Jun 2013 #5
leveymg Jun 2013 #7

Response to leveymg (Original post)

Thu Jun 6, 2013, 01:59 PM

1. " if you had posted with a straight face, "Your phone is tapped," "


There wasn't any phone tapping here. Metadata is not the same as accessing the actual content.

Reply to this post

Back to top Alert abuse Link here Permalink

Response to geek tragedy (Reply #1)

Thu Jun 6, 2013, 02:06 PM

2. You didn't get far enough before you responded. Please go back and read the rest.

Come back and we'll discuss it like adults. There's been plenty of mass phone tapping, content analysis, relationship mapping, and terrorist profiling of innocent Americans going on in other programs.

Reply to this post

Back to top Alert abuse Link here Permalink

Response to geek tragedy (Reply #1)

Sun Jun 30, 2013, 06:23 PM

6. According to the intelligence folks over at

Boilingfrogs.com, the meta data that is gathered can indeed be re-constituted so that your phone conversation is accessible. They can do so tomorrow or next week or two decades from now.

Like I have said before, maybe that is fine and dandy with everyone who is loyal to this Administration. But the meta data will remain in the hands of the Surveillance people for decades - so will you be that sanguine should Jeb Bush is running things in 2016?

Reply to this post

Back to top Alert abuse Link here Permalink

Response to leveymg (Original post)

Thu Jun 6, 2013, 03:24 PM

3. Oh nooooooo!


First thing on my Permanent Record was my failing to write two of the six book reports required in third grade.

Now this.

I can see that I was destined to be a scoundreless.

Reply to this post

Back to top Alert abuse Link here Permalink

Response to leveymg (Original post)

Sun Jun 30, 2013, 06:04 PM

4. Thank you so very much. i have yet to wade through this - but

it looks like it will answer a lot of questions.

Reply to this post

Back to top Alert abuse Link here Permalink

Response to leveymg (Original post)

Sun Jun 30, 2013, 06:19 PM

5. Interesting to note from the article about "Matrix" that the head of

Seisint had to leave his company due to his involvement in drug smuggling.

When only the crooks at the top get to be in charge of these programs, while the rest of us must grovel and pretend we accept them, it is truly a Totalitarian State.

Pertinent part of article: Ramer, the Florida agent, said the scoring system was scrapped because it was "really specific to 9/11," and not applicable for everyday use. Also, he said, "we didn't want anybody abusing it."

Seisint Inc., is a Boca Raton, Fla., company founded by a millionaire, Hank Asher, who stepped down from its board of directors last year after revelations of past ties to drug smugglers.

Reply to this post

Back to top Alert abuse Link here Permalink

Response to truedelphi (Reply #5)

Sun Jun 30, 2013, 09:24 PM

7. There have been some interesting discussions about Mr. Asher on this board.

Here's one of them: http://www.democraticunderground.com/discuss/duboard.php?az=view_all&address=364x2280827

Glad to see they finally locked his well-cnnected, humanitarianm philanthropic and all the good things you can buy that they might say about you in the crooked corporate press ass away in jail.

Reply to this post

Back to top Alert abuse Link here Permalink

Reply to this thread