SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Politics : Formerly About Advanced Micro Devices -- Ignore unavailable to you. Want to Upgrade?


To: Alighieri who wrote (265927)12/24/2005 8:47:22 AM
From: Road Walker  Read Replies (2) | Respond to of 1579131
 
Here is the NYT article ---

Spy Agency Mined Vast Data Trove, Officials Report
By ERIC LICHTBLAU and JAMES RISEN
WASHINGTON, Dec. 23 - The National Security Agency has traced and analyzed large volumes of telephone and Internet communications flowing into and out of the United States as part of the eavesdropping program that President Bush approved after the Sept. 11, 2001, attacks to hunt for evidence of terrorist activity, according to current and former government officials.

The volume of information harvested from telecommunication data and voice networks, without court-approved warrants, is much larger than the White House has acknowledged, the officials said. It was collected by tapping directly into some of the American telecommunication system's main arteries, they said.

As part of the program approved by President Bush for domestic surveillance without warrants, the N.S.A. has gained the cooperation of American telecommunications companies to obtain backdoor access to streams of domestic and international communications, the officials said.

The government's collection and analysis of phone and Internet traffic have raised questions among some law enforcement and judicial officials familiar with the program. One issue of concern to the Foreign Intelligence Surveillance Court, which has reviewed some separate warrant applications growing out of the N.S.A.'s surveillance program, is whether the court has legal authority over calls outside the United States that happen to pass through American-based telephonic "switches," according to officials familiar with the matter.

"There was a lot of discussion about the switches" in conversations with the court, a Justice Department official said, referring to the gateways through which much of the communications traffic flows. "You're talking about access to such a vast amount of communications, and the question was, How do you minimize something that's on a switch that's carrying such large volumes of traffic? The court was very, very concerned about that."

Since the disclosure last week of the N.S.A.'s domestic surveillance program, President Bush and his senior aides have stressed that his executive order allowing eavesdropping without warrants was limited to the monitoring of international phone and e-mail communications involving people with known links to Al Qaeda.

What has not been publicly acknowledged is that N.S.A. technicians, besides actually eavesdropping on specific conversations, have combed through large volumes of phone and Internet traffic in search of patterns that might point to terrorism suspects. Some officials describe the program as a large data-mining operation.

The current and former government officials who discussed the program were granted anonymity because it remains classified.

Bush administration officials declined to comment on Friday on the technical aspects of the operation and the N.S.A.'s use of broad searches to look for clues on terrorists. Because the program is highly classified, many details of how the N.S.A. is conducting it remain unknown, and members of Congress who have pressed for a full Congressional inquiry say they are eager to learn more about the program's operational details, as well as its legality.

Officials in the government and the telecommunications industry who have knowledge of parts of the program say the N.S.A. has sought to analyze communications patterns to glean clues from details like who is calling whom, how long a phone call lasts and what time of day it is made, and the origins and destinations of phone calls and e-mail messages. Calls to and from Afghanistan, for instance, are known to have been of particular interest to the N.S.A. since the Sept. 11 attacks, the officials said.

This so-called "pattern analysis" on calls within the United States would, in many circumstances, require a court warrant if the government wanted to trace who calls whom.

The use of similar data-mining operations by the Bush administration in other contexts has raised strong objections, most notably in connection with the Total Information Awareness system, developed by the Pentagon for tracking terror suspects, and the Department of Homeland Security's Capps program for screening airline passengers. Both programs were ultimately scrapped after public outcries over possible threats to privacy and civil liberties.

But the Bush administration regards the N.S.A.'s ability to trace and analyze large volumes of data as critical to its expanded mission to detect terrorist plots before they can be carried out, officials familiar with the program say. Administration officials maintain that the system set up by Congress in 1978 under the Foreign Intelligence Surveillance Act does not give them the speed and flexibility to respond fully to terrorist threats at home.

A former technology manager at a major telecommunications company said that since the Sept. 11 attacks, the leading companies in the industry have been storing information on calling patterns and giving it to the federal government to aid in tracking possible terrorists.

"All that data is mined with the cooperation of the government and shared with them, and since 9/11, there's been much more active involvement in that area," said the former manager, a telecommunications expert who did not want his name or that of his former company used because of concern about revealing trade secrets.

Such information often proves just as valuable to the government as eavesdropping on the calls themselves, the former manager said.

"If they get content, that's useful to them too, but the real plum is going to be the transaction data and the traffic analysis," he said. "Massive amounts of traffic analysis information - who is calling whom, who is in Osama Bin Laden's circle of family and friends - is used to identify lines of communication that are then given closer scrutiny."

Several officials said that after President Bush's order authorizing the N.S.A. program, senior government officials arranged with officials of some of the nation's largest telecommunications companies to gain access to switches that act as gateways at the borders between the United States' communications networks and international networks. The identities of the corporations involved could not be determined.

The switches are some of the main arteries for moving voice and some Internet traffic into and out of the United States, and, with the globalization of the telecommunications industry in recent years, many international-to-international calls are also routed through such American switches.

One outside expert on communications privacy who previously worked at the N.S.A. said that to exploit its technological capabilities, the American government had in the last few years been quietly encouraging the telecommunications industry to increase the amount of international traffic that is routed through American-based switches.

The growth of that transit traffic had become a major issue for the intelligence community, officials say, because it had not been fully addressed by 1970's-era laws and regulations governing the N.S.A. Now that foreign calls were being routed through switches on American soil, some judges and law enforcement officials regarded eavesdropping on those calls as a possible violation of those decades-old restrictions, including the Foreign Intelligence Surveillance Act, which requires court-approved warrants for domestic surveillance.

Historically, the American intelligence community has had close relationships with many communications and computer firms and related technical industries. But the N.S.A.'s backdoor access to major telecommunications switches on American soil with the cooperation of major corporations represents a significant expansion of the agency's operational capability, according to current and former government officials.

Phil Karn, a computer engineer and technology expert at a major West Coast telecommunications company, said access to such switches would be significant. "If the government is gaining access to the switches like this, what you're really talking about is the capability of an enormous vacuum operation to sweep up data," he said.

Copyright 2005The New York Times Company



To: Alighieri who wrote (265927)12/24/2005 1:43:29 PM
From: bentway  Respond to of 1579131
 
Note to Bush - America is not a monarchy

Joe Galloway
sltrib.com

Our forefathers created a system of government built on checks and balances that they envisioned would protect a free people from abuses of their privacy, their property and their liberty at the hands of anyone, especially anyone in public office.

They never intended for an imperial presidency to rise above the legislative and judicial branches of government, for they had their fill of kings and emperors who ruled with absolute power in the Old World. They knew that absolute power corrupts absolutely.

They wanted none of this, and wrote a Constitution and Bill of Rights to enshrine the protections they knew were needed to keep Americans free and democracy healthy.

They crafted a system of government rooted in the principle that citizens have rights and presidents violate those rights at their own peril.

Let us review the bidding as the dark year 2005 fades:

President Bush admits that he secretly ordered the government to eavesdrop on American citizens, without recourse to the established legal methods of doing that. He declares that he had and has the right to do so. Says who? Well, he says so, and Vice President Dick Cheney says so, and his attorney general, Alberto R. Gonzales, says so too.

Some legal scholars beg to differ, arguing that the president has violated federal law and has opened himself to impeachment for high crimes and misdemeanors. They contend that he trampled the Constitution in a bid to expand the powers of the executive branch and conduct the war on terrorism.

This is the same president, the same administration, that under cover of the same wartime power-grab declared their right to detain prisoners outside the court system in secret foreign prisons and the right to use inhumane and degrading measures in interrogating those prisoners in violation of the Geneva Conventions.

In ordering the National Security Agency to intercept phone and e-mail traffic of American citizens, members of the administration chose not to avail themselves of a secret federal court established nearly 30 years ago to provide the government the means to secretly investigate anyone believed to have ties to foreign governments or movements that threaten the United States.

They say it is too cumbersome and slow to seek warrants from that court - even though the court has granted such warrants in more than 17,400 cases and only rejected them four times. They say they must move more swiftly - even though the law permits them to eavesdrop for 72 hours before seeking a warrant that is routinely and quickly granted.

Some suggest that the Bush administration's real reason for cutting the secret court out of the loop is that some of the information they are basing the secret wiretaps on was gotten through torture. The court warned early on that it would not permit information gotten through extra-legal or illegal methods to pervert the American court system.

Congress passed the law creating the Foreign Intelligence Surveillance Court precisely because another president, Richard Nixon, bent the intelligence agencies and the entire government to his will in pursuing those he considered his enemies. If you made the Nixon enemies list, then your phones were tapped, your comings and goings watched, your tax returns audited.

How big a leap is it from ignoring the rule of law in pursuing foreign enemies to pursuing and punishing domestic enemies, those Americans who for political reasons or reasons of principle oppose your aims?

The president and his vice president and his attorney general are saying, essentially, trust us. We won't use our extra-legal powers against ordinary Americans. We just want to protect you from further terrorist attacks. Trust us. We are honorable men who have nothing but your well-being at heart.

Sorry. That won't cut it. They have all the legal tools any president needs already on the books for our protection. Congress makes the laws. The judiciary interprets them. The president and all the rest of us live by them.

George W. Bush is not the emperor of America or the king of the 50 states of the union. He, like us, must live by the rule of law. He is bound by the Constitution and the Bill of Rights. In the end, he works for us.

As Ben Franklin wrote more than two centuries ago: ''Those who would give up essential liberty in the pursuit of a little temporary security deserve neither liberty nor security.''

---
Joe Galloway is the senior military correspondent for Knight Ridder.