Category Archives: Five Eyes

Edward Snowden’s fear of flying is justified

Geoffrey Robertson writes: As Edward Snowden sits in an airside hotel, awaiting confirmation of Russia’s offer of asylum, it is clear that he has already revealed enough to prove that European privacy protections are a delusion: under Prism and other programmes, the US National Security Agency and Britain’s GCHQ can, without much legal hindrance, scoop up any electronic communication whenever one of 70,000 “keywords” or “search terms” are mentioned. These revelations are of obvious public interest: even President Obama has conceded that they invite a necessary debate. But the US treats Snowden as a spy and has charged him under the Espionage Act, which has no public interest defence.

That is despite the fact that Snowden has exposed secret rulings from a secret US court, where pliant judges have turned down only 10 surveillance warrant requests between 2001 and 2012 (while granting 20,909) and have issued clandestine rulings which erode first amendment protection of freedom of speech and fourth amendment protection of privacy. Revelations about interception of European communications (many leaked through servers in the US) and the bugging of EU offices in Washington have infuriated officials in Brussels. In Germany, with its memories of the Gestapo and the Stasi, the protests are loudest, and opposition parties, gearing up for an election in September, want him to tell more.

So far Snowden has had three offers of asylum from Latin America, but to travel there means dangerous hours in the air. International law (and the Chicago Convention regulating air traffic) emphatically asserts freedom to traverse international airspace, but America tends to treat international law as binding on everyone except America (and Israel). Thus when Egypt did a deal with the Achille Lauro hijackers and sent them on a commercial flight to Tunis, US F-14 jets intercepted the plane in international airspace and forced it to land in Italy, where the hijackers were tried and jailed. President Mubarak condemned the action as “air piracy contrary to international law” and demanded an apology, to which Reagan replied: “Never.” The UK supported the action as designed to bring terrorists to trial.

In 1986 Israel forced down a Libyan commercial plane in the mistaken belief that PLO leaders were among its passengers, and the US vetoed UN security council condemnation. So there must be a real concern, particularly after Nato allies collaborated in forcing down the Bolivian president’s jet, that the US will intercept any plane believed to be carrying Snowden to asylum, either because he is tantamount to a terrorist (Vice-President Biden has described Julian Assange as a “hi-tech terrorist”) or simply because they want to put him on trial as a spy. [Continue reading…]

Facebooktwittermail

NSA says it lacks capability to search its own emails

By Justin Elliott, ProPublica, July 23, 2013

The NSA is a “supercomputing powerhouse” with machines so powerful their speed is measured in thousands of trillions of operations per second. The agency turns its giant machine brains to the task of sifting through unimaginably large troves of data its surveillance programs capture. 

But ask the NSA, as part of a freedom of information request, to do a seemingly simple search of its own employees’ email? The agency says it doesn’t have the technology.

“There’s no central method to search an email at this time with the way our records are set up, unfortunately,” NSA Freedom of Information Act officer Cindy Blacker told me last week.

The system is “a little antiquated and archaic,” she added.

I filed a request last week for emails between NSA employees and employees of the National Geographic Channel over a specific time period. The TV station had aired a friendly documentary on the NSA and I want to better understand the agency’s public-relations efforts.

A few days after filing the request, Blacker called, asking me to narrow my request since the FOIA office can search emails only “person by person,” rather than in bulk. The NSA has more than 30,000 employees.

I reached out to the NSA press office seeking more information but got no response.

It’s actually common for large corporations to do bulk searches of their employees email as part of internal investigations or legal discovery.

“It’s just baffling,” says Mark Caramanica of the Reporters Committee for Freedom of the Press. “This is an agency that’s charged with monitoring millions of communications globally and they can’t even track their own internal communications in response to a FOIA request.”

Federal agencies’ public records offices are often underfunded, according to Lucy Dalglish, dean of the journalism school at University of Maryland and a longtime observer of FOIA issues.

But, Daglish says, “If anybody is going to have the money to engage in evaluation of digital information, it’s the NSA for heaven’s sake.”

For more on the NSA, read our story on the agency’s tapping of Internet cables, our fact-check on claims about the NSA and Sept. 11, and our timeline of surveillance law.


Facebooktwittermail

Venture capitalists view electronic surveillance as attractive growth sector

The Wall Street Journal reports: The string of revelations about America’s surveillance apparatus by former National Security Agency contractor Edward Snowden has cast a spotlight on the growing number of American companies involved in electronic spycraft.

It hasn’t visibly damped enthusiasm among Silicon Valley investors and military contractors looking for ways to get into a business many see as one of the few growth areas left as U.S. military spending contracts.

Some of the country’s most influential venture capitalists and former spy chiefs are investing in companies now providing the government with the sweeping electronic spy system and evolving cyberwarfare programs exposed by Mr. Snowden.

More than 80 companies work with the NSA on cybersecurity and surveillance, according to a recent report in the German magazine Der Spiegel that was based on top secret documents provided by Mr. Snowden. They include firms like the one that employed Mr. Snowden as an infrastructure analyst in Hawaii, Booz Allen Hamilton Inc., as well as scores of new players.

Last year, venture capitalists pumped about $700 million into security startups, almost a 10th of the estimated market, according to Lawrence Pingree, research director at Gartner Inc., the U.S. information technology research company. [Continue reading…]

Facebooktwittermail

Congress may use power of purse to rein in NSA

USA Today reports: Republicans in the House of Representatives are seizing the chance to stop the National Security Agency from spying on Americans by using the power of the purse – the $598 billion defense spending bill.

The House of Representatives is expected to begin debate on the bill Tuesday and hold a series of votes on 100 amendments, including two that could put key Obama Administration programs at the mercy of House lawmakers.

One amendment sponsored by Rep. Justin Amash, R-Mich., would defund the NSA’s bulk phone metadata collection program.

“In order for funds to be used by the NSA, the court order would have to have a statement limiting the collection of records to [the] records that pertain to a person under investigation,” Amash explained during a House Rules Committee meeting Monday.

The Huffington Post reports: The National Security Agency kicked its lobbying into high gear after an amendment from Rep. Justin Amash, a libertarian Republican from Michigan, was ruled in order and will get a vote sometime this week.

NSA head Gen. Keith Alexander scheduled a last-minute, members-only briefing in response to the amendment, according to an invitation distributed to members of Congress this morning and forwarded to HuffPost. “In advance of anticipated action on amendments to the DoD Appropriations bill, Ranking Member C.A. Dutch Ruppersberger of the House Intelligence Committee invites your Member to attend a question and answer session with General Keith B. Alexander of the National Security Agency,” reads the invitation.

The invitation warned members that they could not share what they learned with their constituents or others. “The briefing will be held at the Top Secret/SCI level and will be strictly Members-Only,” reads the invite.

Facebooktwittermail

Snowden hopes to leave Moscow airport by Wednesday

NBC News: Former CIA contractor and self-declared leaker Edward Snowden hopes to end his month-long stay in a Moscow airport and move to the city’s downtown by Wednesday, his Russian lawyer told Reuters on Monday.

Attorney Anatoly Kucherena told the news agency that Snowden felt it was too dangerous to leave Russia for Latin America because of U.S. efforts to bring him home to face charges for allegedly leaking classified details about American intelligence gathering efforts.

“He should get this certificate (allowing him to leave the airport) shortly,” Kucherena, who helped Snowden apply for temporary asylum in Russia, told Reuters.

Kucherena said Snowden’s bid to obtain temporary asylum in the country may take as long as three months to process. But, based on the initial response to the request, he can pass through customs and exit the transit area of Moscow’s Sheremetyevo airport where he has been staying for nearly one month.

Snowden has also not ruled out Russian citizenship, according to his lawyer.

Facebooktwittermail

NSA can reportedly track phones even when they’re turned off

Slate: On Monday, the Washington Post published a story focusing on how massively the NSA has grown since the 9/11 attacks. Buried within it, there was a small but striking detail: By September 2004, the NSA had developed a technique that was dubbed “The Find” by special operations officers. The technique, the Post reports, was used in Iraq and “enabled the agency to find cellphones even when they were turned off.” This helped identify “thousands of new targets, including members of a burgeoning al-Qaeda-sponsored insurgency in Iraq,” according to members of the special operations unit interviewed by the Post.

It is not explained in the report exactly how this technique worked. But to spy on phones when they are turned off, agencies would usually have to infect the handset with a Trojan that would force it to continue emitting a signal if the phone is in standby mode, unless the battery is removed. In most cases, when you turn your phone off — even if you do not remove the battery — it will stop communicating with nearby cell towers and can be traced only to the location it was in when it was powered down.

In 2006, it was reported that the FBI had deployed spyware to infect suspects’ mobile phones and record data even when they were turned off. The NSA may have resorted to a similar method in Iraq, albeit on a much larger scale by infecting thousands of users at one time. Though difficult, the mass targeting of populations with Trojan spyware is possible — and not unheard of. [Continue reading…]

Facebooktwittermail

Former NSA chief sees open government as a threat to the system

In an interview with The Australian Financial Review, former NSA chief Michael Hayden was asked:

Is Edward Snowden a hero or a traitor?

Gen. Hayden: He’s certainly not a hero. The word traitor has a very narrowly defined legal meaning that he may not in the end quite meet. I personally think Snowden is a very troubled, narcissistic young man who has done a very, very bad thing.

I don’t think Snowden spied for the money, and he probably did not spy for the power. He seems to have revealed this information because of his ideological embrace of transparency as a virtue.

It is a little like the Boston bombers. The issue is at what point does Islamic fundamentalism flip-over and become a genuine national security threat? Likewise, at what point does a cultural tendency towards transparency flip-over to become a deep threat inside your system? They are similar issues. [Continue reading…]

These spooks — and retired spooks — are shameless propagandists!

If there’s one legitimate reason to associate Snowden with the Boston bombers it is that the bombings themselves perfectly illustrated that the NSA’s mass surveillance program as the means find that proverbial needle in a haystack, doesn’t work.

But instead of acknowledge that fact, Hayden just wants to get Snowden and bombers into the same breath and thereby promote the idea that President Obama seems to favor: that whistleblowers should be viewed as terrorists.

Facebooktwittermail

Mood shifting, Congress may move to limit NSA spying

McClatchy reports: Congress is growing increasingly wary of controversial National Security Agency domestic surveillance programs, a concern likely to erupt during legislative debate _ and perhaps prod legislative action _ as early as next week.

Skepticism has been slowly building since last month’s disclosures that the super-secret NSA conducted programs that collected Americans’ telephone data. Dozens of lawmakers are introducing measures to make those programs less secret, and there’s talk of denying funding and refusing to continue authority for the snooping.

The anxiety is a sharp contrast to June’s wait-and-see attitude after Edward Snowden, a government contract worker, leaked highly classified data to the media. The Guardian newspaper of Britain reported one program involved cellphone records. The Guardian, along with The Washington Post, also said another program allowed the government access to the online activity of users at nine Internet companies.

Obama administration officials quickly provided briefings about the programs, and they continue to have strong defenders at the Capitol. “People at the NSA in particular have heard a constant public drumbeat about a laundry list of nefarious things they are alleged to be doing to spy on Americans _ all of them wrong,” House Intelligence Committee Chairman Mike Rogers, R-Mich., said last month. “The misperceptions have been great, yet they keep their heads down and keep working every day to keep us safe.”

Most in Congress remain reluctant to tinker with any program that could compromise security, but lawmakers are growing frustrated. “I think the administration and the NSA has had six weeks to answer questions and haven’t done a good job at it. They’ve been given their chances, but they have not taken those chances,” said Rep. Rick Larsen, D-Wash. [Continue reading…]

Facebooktwittermail

How big is the NSA’s haystack?

Sounding like a logic-defying Zen master, NSA chief Keith Alexander this week claimed: “You need a haystack to find a needle.” I pity any foreign journalist who took on the challenge of attempting to translate that into an intelligible statement.

Alexander’s staff, on the other hand, seem less inclined to speak in riddles — though just as eager to portray the operations of a police state in terms more appropriate for a kindergarten.

Anyone who might have previously been wondering whether the NSA is really watching everyone, should no longer be in any doubt — once they’ve grasped the humans-like-rabbits metaphor that we each stand a certain number of “hops” apart.

Following National Security Agency Deputy Director Chris Inglis’s revelation that the agency conducts surveillance as many as “three hops” away from a suspected terrorist, Sean Gallagher digs into the numbers:

A great deal of research has been done into the interconnectedness of people in the Internet age. Social scientists, mathematicians, and computer scientists have explored the “small world” phenomenon with studies and experiments for over 50 years, and their findings show that the “small world” keeps getting smaller as technology advances. In 1979, chair and founder of MIT’s political science department Ithiel de Sola Pool and the University of Michigan’s Manfred Kochen published a paper titled “Contacts and Influence,” which draws on a decade of research into social networks. De Sola Pool and Kochen posited that “in a country the size of the United States, if acquaintanceship were random and the mean acquaintance volume were 1,000, the mean length of minimum chain between pairs of persons would be well under two intermediaries.”

In other words, if the average person in the US has contact with and is acquainted with 1,000 others (through brief interactions, such as an e-mail or a phone call, or through stronger associations), then we’re at most two hops from anyone else in the US. Ergo, if any one person in the US is one hop from a terrorist, chances are good that you are three hops away.

The actual degrees of separation between people may be somewhat larger because the population of the US has grown significantly since 1979; our interconnectedness with the world at large has grown as well, widening the potential links between people. Live in a major metropolitan center in the US and you’re bound to be two degrees of separation away from someone in a country that’s of interest to the NSA. For example: I have been a regular customer of restaurants owned by Baltimore’s Karzai family, which is headed by a brother of Afghan President Hamid Karzai—two hops. I’m also, according to LinkedIn, two degrees of separation away from President Obama. Am I a good guy or a bad guy?

The Internet has blown the level of interconnectedness though the proverbial roof—we now have e-mail, social media, and instant message interactions with people we’ll never meet in real life and in places we’ll never go. A 2007 study by Carnegie Mellon University machine learning researcher Jure Leskovec and Microsoft Research’s Eric Horvitz found that the average number of hops between any two arbitrary Microsoft Messenger users, based on interaction, was 6.6. And a study of Twitter feeds published in 2011 found the average degree of separation between random Twitter users to be only 3.43.

So even if the NSA limited its surveillance activities—and by “surveillance” I mean active probing of the content of communications of an individual—to people within two hops of suspected terrorists, that’s a sizable population. Three ratchets it up to hundreds of millions or potentially billions of people, especially when the definition of a hop is based on relationships so casual we could create them by accidentally clicking on a link in a spam e-mail. So far, we know that there have been about 20,000 requests for FISA warrants to surveil domestic targets since 2001, but if those warrants covered three hops from the suspects at the center of the requests—depending on how tightly or loosely the NSA defines a relationship—three hops could encompass as much as 50 percent of the Internet-using population of the world. [Continue reading…]

Facebooktwittermail

German intelligence ‘prolific partner’ in NSA spy program

Der Spiegel reports: Germany’s foreign intelligence service, the BND, and its domestic intelligence agency, the Federal Office for the Protection of the Constitution (BfV), used a spying program of the American National Security Agency (NSA). This is evident in secret documents from the US intelligence service that have been seen by SPIEGEL journalists. The documents show that the Office for the Protection of the Constitution was equipped with a program called XKeyScore intended to “expand their ability to support NSA as we jointly prosecute CT (counterterrorism) targets.” The BND is tasked with instructing the domestic intelligence agency on how to use the program, the documents say.

According to an internal NSA presentation from 2008, the program is a productive espionage tool. Starting with the metadata — or information about which data connections were made and when — it is able, for instance, to retroactively reveal any terms the target person has typed into a search engine, the documents show. In addition, the system is able to receive a “full take” of all unfiltered data over a period of several days — including, at least in part, the content of communications.

This is relevant from a German perspective, because the documents show that of the up to 500 million data connections from Germany accessed monthly by the NSA, a major part is collected with XKeyScore (for instance, around 180 million in December 2012). The BND and BfV, when contacted by SPIEGEL, would not discuss the espionage tool. The NSA, as well, declined to comment, referring instead to the words of US President Barack Obama during his visit to Berlin and saying there was nothing to add.

Furthermore, the documents show that the cooperation of the German intelligence agencies with the NSA has recently intensified. Reference is made to the “eagerness and desire” of BND head Gerhard Schindler. “The BND has been working to influence the German government to relax interpretation of the privacy laws to provide greater opportunities of intelligence sharing,” the NSA noted in January. Over the course of 2012, German partners had shown a “willingness to take risks and to pursue new opportunities for cooperation with the US.” [Continue reading…]

Facebooktwittermail

What happens when the U.S. government wants to hack your network?

Pete Ashdown, CEO of an internet service provider in Utah, received a Foreign Intelligence Service Act (FISA) warrant in 2010 mandating he let the feds monitor one of his customers: The first thing I do when I get a law enforcement request is look for a court signature on it. Then I pass it to my attorneys and say, “Is this legitimate? Does this qualify as a warrant?” If it does, then we will respond to it. We are very up front that we respond to warrants.

If it isn’t, then the attorneys write back: “We don’t believe it is in jurisdiction or is constitutional. We are happy to respond if you do get an FBI request in jurisdiction or you get a court order to do so.”

The FISA request was a tricky one, because it was a warrant through the FISA court — whether you believe that is legitimate or not. I have a hard time with secret courts. I ran it past my attorney and asked, “Is there anyway we can fight this?” and he said “No. It is legitimate.”

It was also different [from other warrants] because it was for monitoring. They wanted to come in and put in equipment on my network to monitor a single customer. The customer they were monitoring was a particular website that was very benign. It seems ridiculous to me. It was beyond absurd. It wasn’t like a guns and ammo website. [Continue reading…]

Facebooktwittermail

Secret court lets NSA extend its trawl of Verizon customers’ phone records

The Guardian reports: The National Security Agency has been allowed to extend its dragnet of the telephone records of millions of US customers of Verizon through a court order issued by the secret court that oversees surveillance.

In an unprecedented move prompted by the Guardian’s disclosure in June of the NSA’s indiscriminate collection of Verizon metadata, the Office of the Director of National Intelligence (ODNI) has publicly revealed that the scheme has been extended yet again.

The statement does not mention Verizon by name, nor make clear how long the extension lasts for, but it is likely to span a further three months in line with previous routine orders from the secret Foreign Intelligence Surveillance Court (Fisa).

The announcement flowed, the statement said, from the decision to declassify aspects of the metadata grab “in order to provide the public with a more thorough and balanced understanding of the program”. [Continue reading…]

Facebooktwittermail

Intelligence chiefs would consider NSA data collection changes – top DNI lawyer

The Guardian reports: The top lawyer for the US director of national intelligence suggested Friday that the intelligence community would consider changes to its controversial bulk surveillance of telephone records.

The apparent openness to modifying the surveillance efforts comes after a week of increasing criticism on Capitol Hill by Republican and Democratic legislators.

Robert S Litt, speaking at the Brookings Institution in Washington on Friday, strongly defended the legality and propriety of the National Security Agency collecting telephone records on millions of Americans prior to specific national-security investigations.

“It is, however, not the only way that we could regulate intelligence collection,” Litt said. “We’re currently working to declassify more information about our activities to inform that discussion,” particularly concerning the bulk collection of Americans’ telephone records. [Continue reading…]

Facebooktwittermail

White House stays silent on renewal of NSA data collection order

The Guardian reports: The Obama administration is refusing to say whether it will seek to renew a court order that permits the National Security Agency’s bulk collection of phone records on millions of Verizon customers when it expires at the end of this week.

Officials declined to discuss what action they intend to take about the order at the center of the current surveillance scandal, which formally expires at 5pm Friday.

The looming expiration of the order, issued by the secretive Fisa court, provides an early test of Barack Obama’s claim to welcome debate over “how to strike this balance” between liberty and security. Beyond the question of the phone records collection, the court order authorizing it is a state secret.

On Thursday, the administration would not answer a question first posed by the Guardian six days ago about its intentions to continue, modify or discontinue the Verizon bulk-collection order. The White House referred queries to the Justice Department. “We have no announcement at this time,” said Justice Department spokesman Brian Fallon. The NSA and office of the Director of National Intelligence did not respond to questions. [Continue reading…]

Facebooktwittermail

NSA’s massive data center coming online ahead of schedule — it’s more powerful than you thought

BuzzFeed reports: The National Security Agency’s massive Utah Data Center, designed for communications storage and processing is already up and running, despite agency claims the center won’t open until September. Opening the facility — the largest of its kind in history — is the key final step that will allow the agency to collect and store massive amounts of data on United States citizens. The NSA has numerous other data centers, but the Utah facility will be the central repository, enabling data collection on an unprecedented scale.

And according to Russ Tice, a former NSA intelligence analyst who still maintains close ties with numerous colleagues at the agency, it’s not just metadata — which has been a key distinction in the administration’s defense of its intelligence gathering programs. The agency, according to Tice, is currently able to collect the full contents of digital communications. That includes the contents of emails, text messages, Skype communications, and phone calls, as well as financial information, health records, legal documents, and travel documents. This comports with statements given this week by a former senior intelligence official, claiming that NSA Director Keith Alexander’s ethos was to “collect it all, tag it, store it … And whatever it is you want, you go searching for it.”

The NSA’s ability to collect and store such vast quantities of information is difficult to grasp. But so is the enormous footprint of the data center in Bluffdale, Utah, 25 miles south of Salt Lake City. The facility, which cost the government $2 billion, covers 1 million square feet, 100,000 of which is purely for computer servers and storage hardware. According to James Bamford’s Wired magazine article published last year, “The Pentagon is attempting to expand its worldwide communications network, known as the Global Information Grid, to handle yottabytes (10^24 bytes) of data. (A yottabyte is a septillion bytes—so large that no one has yet coined a term for the next higher magnitude.)” [Continue reading…]

Facebooktwittermail

Former GOP Senator wishes Snowden well and encourages him to persevere

Glenn Greenwald was able to confirm the authenticity of the letter below, written by the former two-term GOP Senator Gordon Humphrey of New Hampshire. Greenwald’s post also includes Snowden’s reply.

Mr. Snowden,

Provided you have not leaked information that would put in harms way any intelligence agent, I believe you have done the right thing in exposing what I regard as massive violation of the United States Constitution.

Having served in the United States Senate for twelve years as a member of the Foreign Relations Committee, the Armed Services Committee and the Judiciary Committee, I think I have a good grounding to reach my conclusion.

I wish you well in your efforts to secure asylum and encourage you to persevere.

Kindly acknowledge this message, so that I will know it reached you.

Regards,
Gordon J. Humphrey
Former United States Senator
New Hampshire

Facebooktwittermail

The U.S. practice of training and harboring terrorists

Blake Fleetwood writes: For more than 50 years the U.S. has harbored and trained Cuban exile terrorists who have blown up civilian planes and mounted raids killing innocent civilians and tourists in Havana and other South American countries.

The most famous example of this is Luis Posada Carriles, who Venezuela and Cuba have been seeking for more than three decades for blowing up a Cuban airliner in 1976, killing 73 innocent civilians. It was then the deadliest terrorist airline attack in the Western Hemisphere — before 9/11.

The reason Venezuela has been offering Snowden asylum is directly linked to the asylum the U.S. has provided to exiled Cuban terrorists. President Nicolas Maduro of Venezuela contrasted Snowden’s action with those of Luis Posada Carriles, who is living freely and openly in Miami despite the fact that he is wanted for blowing up Cubana de Aviación Flight 55.

“Who is the terrorist? A government like ours that seeks to serve the young Snowden fight humanitarian asylum against persecution of the American Empire, or the U.S. government that protects political asylum to Luis Posada Carriles, murderer and confessed and convicted terrorist who is requested by Venezuela”, Nicolas Maduro said.

I interviewed Posada years ago after I snuck into a Venezuelan prison, against all the rules, and he was quite proud of his terrorist activities throughout Latin American.

Posada told me he was trained by the U.S. Army in the art of bomb-making and was on their, as well as the CIA’s, payroll for a number of years. People think the reason that Posada has avoided prosecution is because the U.S. is protecting the secrets he might spill — tying the CIA and the Bush family to illegal terrorist activities. [Continue reading…]

Facebooktwittermail

The NSA admits it analyzes way more people’s data than previously revealed

Atlantic Wire: As an aside during testimony on Capitol Hill today, a National Security Agency representative rather casually indicated that the government looks at data from a universe of far, far more people than previously indicated.

Chris Inglis, the agency’s deputy director, was one of several government representatives — including from the FBI and the office of the Director of National Intelligence — testifying before the House Judiciary Committee this morning. Most of the testimony largely echoed previous testimony by the agencies on the topic of the government’s surveillance, including a retread of the same offered examples for how the Patriot Act and Foreign Intelligence Surveillance Act had stopped terror events.

But Inglis’ statement was new. Analysts look “two or three hops” from terror suspects when evaluating terror activity, Inglis revealed. Previously, the limit of how surveillance was extended had been described as two hops. This meant that if the NSA were following a phone metadata or web trail from a terror suspect, it could also look at the calls from the people that suspect has spoken with — one hop. And then, the calls that second person had also spoken with — two hops. Terror suspect to person two to person three. Two hops. And now: A third hop. [Continue reading…]

Let’s put that into numbers. Let’s suppose the suspect has a small circle of 25 contacts but each of them has a more commonplace network of 100 contacts and each of them also has 100 contacts.

That means when the NSA identifies one suspect it will then actively engage in surveillance on as many and perhaps more than 250,000 people!

Facebooktwittermail