axis
Fair Use Notice
  Axis Mission
 About us
  Letters/Articles to Editor
Article Submissions
RSS Feed


As 'X-Keyscore' Revealed, Senators Criticize NSA Hoovering Of Phone Records Printer friendly page Print This
By News report
Forbes
Thursday, Aug 1, 2013

One presentation claims the XKeyscore program covers 'nearly everything a typical user does on the internet'


Representatives from the intelligence community defended the mass surveillance of phone records in a Senate hearing Wednesday
The “Snowden Effect” was in full force on Wednesday as, almost simultaneously, 1) The Guardian released a new report on “X-Keyscore” — the NSA’s search engine for its massive database of emails, chats and other Internet activity; 2) the Director of National Intelligence declassified documents about its bulk collection of phone and email metadata and an example of the court authorization to collect, store and query that data; and 3) the Senate Judiciary Committee questioned members of the intelligence community about the exact nature of these programs and whether they’re worth the invasion of Americans’ privacy. The change in information access since the Edward Snowden leaks is dramatic. Watchdogs who have long had their ears pressed to the ground trying to make out the secretive moves of the intel community are now instead at a festival with multiple stages.

Glenn Greenwald at the Guardian holds up a 2008 Powerpoint presentation  about the X-Keyscore program – which he published nearly in full — as proof that any NSA analyst, including Edward Snowden, could easily query a massive NSA database that holds “nearly everything a user does on the Internet.” Sample searches include looking for intel by email address, phone number, files looked at, search terms used, or even cookies on a person’s computer. A slide on “ finding targets” suggests might put a person in the NSA’s crosshairs: someone “whose language is out of place for the region they are in,” “someone using encryption,” and “someone searching the web for suspicious stuff.” (The presentation again reinforces that anyone going to extreme measures to protect their privacy becomes a target, with use of encryption and VPN mentioned as reasons to seek information on someone.) The Powerpoint looks much like one worked up by a database vendor for a Big Data conference — but with much more references to jihad, Iraq and Osama Bin Laden. It claims “300 terrorists captured” based on intel from the tool.

NSA Director Heckled At Conference As He Asks For Security Community's Understanding
The X-Keyscore program did not come up explicitly during the Senate Judiciary Committee hearing, though Sen. Patrick Leahy did make an aside about it to Sen. Diane Feinstein, noting that it “might or might not be accurate.” Instead the hearing focused on whether bulk collection of millions of people’s phone records is actually necessary to catch terrorists. In advance of the hearing, the Director of National Intelligence James Clapper released documents from 2009 and 2011 that include an all-caps note that “publicly disclosing any of this information would be expected to cause exceptionally grave damage to our nation’s intelligence capabilities and to national security” (So much for that) as well as a July 2013 FISA court order outlining how the NSA can get, store, and search business records data in an unnamed case.

“ODNI knew this hearing was coming for weeks but declassified this material minutes before it started,” complained Sen. Al Franken to the agency’s lawyer Robert Litt, who said the agency had met with the Executive Branch the night before to make the call. “You might have thought about this weeks ago instead of the day of,” replied a peeved Franken. Franken said he planned to introduce legislation that would force more transparency on how the NSA surveillance programs operate.  Last week, an amendment in the House to curb NSA surveillance of phone records was narrowly defeated.

Senator Leahy pushed hard on the witnesses to identify how often the bulk collection of phone records has been key to disrupting a terrorist plot.

“I reviewed all the classified material the NSA sent and I am far from convinced that section 215 helped to thwart or prevent 54 terrorist plots,” said Patrick Leahy, referencing a number put forth by NSA head Keith Alexander.

NSA deputy director John Inglis responded that 13 of those plots had a “homeland nexus” (i.e., were going to happen in the U.S.) and in 12 of them, Section 215 — which allows bulk collection of business records including phone calls — “made a contribution.” He said he only one was a “but for” case, pointing to a plot to bomb a New York subway station, a claim that has been challenged before. Inglis said that after hearing Najibullah Zazi talking on the phone about the plot, the NSA provided a number of a co-conspirator that investigators had been unaware of.

The senators expressed concern about how many people might be sucked into an investigation if intel analysts are doing two or three hops from their main target. As Shane Harris at Foreign Policy has written, that could easily include millions of people.

Inglis said they “try to be judicious” and that when there is a second hop or third hop, they “may only do that for a subset of numbers.” If a “pizza deliveryman” is included in one of those hops, “you don’t go after that,” he said.

In most cases, the bulk metadata like phone call records isn’t all that valuable on its own, said FBI deputy director Sean Joyce, but it “plays a crucial role in closing the seams” in investigations.

Some of the senators remained skeptical, even security hawk Leahy.

“We could have more security if we strip searched everybody entering every building. We’re not going to do that,” he said. “We’d have more security if we were to wiretap every phone and search every home. We’re not going to do that. Americans expect a certain amount of privacy.”

“If this program is not effective it has to end,” Leahy said. “So far I’m not convinced by what I’ve seen.”

Glenn Greenwald's report in The Guardian

Source: Forbes


Printer friendly page Print This
If you appreciated this article, please consider making a donation to Axis of Logic. We do not use commercial advertising or corporate funding. We depend solely upon you, the reader, to continue providing quality news and opinion on world affairs.Donate here




Featured
AxisofLogic.com© 2003-2015
Fair Use Notice  |   Axis Mission  |  About us  |   Letters/Articles to Editor  | Article Submissions |   Subscribe to Ezine   | RSS Feed  |