The Surveillance State of America

Shane Harris writes: March 2002, John M. Poindexter, a former national security adviser to President Ronald Reagan, sat down with Gen. Michael V. Hayden, the director of the National Security Agency. Mr. Poindexter sketched out a new Pentagon program called Total Information Awareness, that proposed to scan the world’s electronic information — including phone calls, e-mails and financial and travel records — looking for transactions associated with terrorist plots. The N.S.A., the government’s chief eavesdropper, routinely collected and analyzed such signals, so Mr. Poindexter thought the agency was an obvious place to test his ideas.

He never had much of a chance. When T.I.A.’s existence became public, it was denounced as the height of post-9/11 excess and ridiculed for its creepy name. Mr. Poindexter’s notorious role in the Iran-contra affair became a central focus of the debate. He resigned from government, and T.I.A. was dismantled in 2003.

But what Mr. Poindexter didn’t know was that the N.S.A. was already pursuing its own version of the program, and on a scale that he had only imagined. A decade later, the legacy of T.I.A. is quietly thriving at the N.S.A. It is more pervasive than most people think, and it operates with little accountability or restraint.

The foundations of this surveillance apparatus were laid soon after 9/11, when President George W. Bush authorized the N.S.A. to monitor the communications records of Americans who analysts suspected had a “nexus to terrorism.” Acting on dubious legal authority, and without warrants, the N.S.A. began intercepting huge amounts of information.

But the N.S.A. came up with more dead ends than viable leads and put a premium on collecting information rather than making sense of it. The N.S.A. created what one senior Bush administration official later described as a “mirror” of AT&T’s databases, which allowed ready access to the personal communications moving over much of the country’s telecom infrastructure. The N.S.A. fed its bounty into software that created a dizzying social-network diagram of interconnected points and lines. The agency’s software geeks called it “the BAG,” which stood for “big ass graph.”

Today, this global surveillance system continues to grow. It now collects so much digital detritus — e-mails, calls, text messages, cellphone location data and a catalog of computer viruses — that the N.S.A. is building a 1-million-square-foot facility in the Utah desert to store and process it. [Continue reading…]

Facebooktwittermail