Homeland Security Watch

News and analysis of critical issues in homeland security

May 22, 2006

Hersh on the latest NSA revelations

Filed under: Intelligence and Info-Sharing — by Christian Beckner on May 22, 2006

Seymour Hersh offers his thoughts in this week’s New Yorker on the latest revelations about the NSA. The key paragraphs:

….A security consultant working with a major telecommunications carrier told me that his client set up a top-secret high-speed circuit between its main computer complex and Quantico, Virginia, the site of a government-intelligence computer center. This link provided direct access to the carrier’s network core—the critical area of its system, where all its data are stored. “What the companies are doing is worse than turning over records,” the consultant said. “They’re providing total access to all the data.”

This could explain BellSouth’s denial of USA Today’s NSA story. The story continues:

“This is not about getting a cardboard box of monthly phone bills in alphabetical order,” a former senior intelligence official said. The Administration’s goal after September 11th was to find suspected terrorists and target them for capture or, in some cases, air strikes. “The N.S.A. is getting real-time actionable intelligence,” the former official said.

The N.S.A. also programmed computers to map the connections between telephone numbers in the United States and suspect numbers abroad, sometimes focussing on a geographic area, rather than on a specific person—for example, a region of Pakistan. Such calls often triggered a process, known as “chaining,” in which subsequent calls to and from the American number were monitored and linked. The way it worked, one high-level Bush Administration intelligence official told me, was for the agency “to take the first number out to two, three, or more levels of separation, and see if one of them comes back”—if, say, someone down the chain was also calling the original, suspect number. As the chain grew longer, more and more Americans inevitably were drawn in.

If “chaining,” as described above, is what the NSA is doing with the telco databases, then that is somewhat different than the broad “social network analysis” that was described by USA Today. And it could be moderately useful as a tool going out 1 or 2 degrees of separation, especially if the data is updated in real-time. But I am still very troubled by the way that all of these NSA activities have been implemented, absent any real concern for the rule of law and Constitutional checks and balances.

Share and Enjoy:
  • Digg
  • Reddit
  • Facebook
  • Yahoo! Buzz
  • Google Bookmarks
  • email
  • Print
  • LinkedIn

No Comments »

No comments yet.

RSS feed for comments on this post. TrackBack URI

Leave a comment

XHTML: You can use these tags: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>