LISTSERV mailing list manager LISTSERV 16.0

Help for SOCNET Archives


SOCNET Archives

SOCNET Archives


SOCNET@LISTS.UFL.EDU


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

SOCNET Home

SOCNET Home

SOCNET  December 2005

SOCNET December 2005

Subject:

NSA = SNA ?

From:

Valdis Krebs <[log in to unmask]>

Reply-To:

Valdis Krebs <[log in to unmask]>

Date:

Sat, 24 Dec 2005 08:14:23 -0500

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (180 lines)

*****  To join INSNA, visit http://www.insna.org  *****

Switch the first two letters of NSA and you get SNA!

The best data source in the world...  notice the discussion of  
increasing the "betweenness" of phone switches in America.  From the  
Dec 24, 2005 NY Times...  http://www.nytimes.com/2005/12/24/politics/ 
24spy.htm

Happy Holidays to All!

Valdis


> Spy Agency Mined Vast Data Trove, Officials Report
>
> By ERIC LICHTBLAU and JAMES RISEN
> WASHINGTON, Dec. 23 - The National Security Agency has traced and  
> analyzed large volumes of telephone and Internet communications  
> flowing into and out of the United States as part of the  
> eavesdropping program that President Bush approved after the Sept.  
> 11, 2001, attacks to hunt for evidence of terrorist activity,  
> according to current and former government officials.
>
> The volume of information harvested from telecommunication data and  
> voice networks, without court-approved warrants, is much larger  
> than the White House has acknowledged, the officials said. It was  
> collected by tapping directly into some of the American  
> telecommunication system's main arteries, they said.
>
> As part of the program approved by President Bush for domestic  
> surveillance without warrants, the N.S.A. has gained the  
> cooperation of American telecommunications companies to obtain  
> backdoor access to streams of domestic and international  
> communications, the officials said.
>
> The government's collection and analysis of phone and Internet  
> traffic have raised questions among some law enforcement and  
> judicial officials familiar with the program. One issue of concern  
> to the Foreign Intelligence Surveillance Court, which has reviewed  
> some separate warrant applications growing out of the N.S.A.'s  
> surveillance program, is whether the court has legal authority over  
> calls outside the United States that happen to pass through  
> American-based telephonic "switches," according to officials  
> familiar with the matter.
>
> "There was a lot of discussion about the switches" in conversations  
> with the court, a Justice Department official said, referring to  
> the gateways through which much of the communications traffic  
> flows. "You're talking about access to such a vast amount of  
> communications, and the question was, How do you minimize something  
> that's on a switch that's carrying such large volumes of traffic?  
> The court was very, very concerned about that."
>
> Since the disclosure last week of the N.S.A.'s domestic  
> surveillance program, President Bush and his senior aides have  
> stressed that his executive order allowing eavesdropping without  
> warrants was limited to the monitoring of international phone and e- 
> mail communications involving people with known links to Al Qaeda.
>
> What has not been publicly acknowledged is that N.S.A. technicians,  
> besides actually eavesdropping on specific conversations, have  
> combed through large volumes of phone and Internet traffic in  
> search of patterns that might point to terrorism suspects. Some  
> officials describe the program as a large data-mining operation.
>
> The current and former government officials who discussed the  
> program were granted anonymity because it remains classified.
>
> Bush administration officials declined to comment on Friday on the  
> technical aspects of the operation and the N.S.A.'s use of broad  
> searches to look for clues on terrorists. Because the program is  
> highly classified, many details of how the N.S.A. is conducting it  
> remain unknown, and members of Congress who have pressed for a full  
> Congressional inquiry say they are eager to learn more about the  
> program's operational details, as well as its legality.
>
> Officials in the government and the telecommunications industry who  
> have knowledge of parts of the program say the N.S.A. has sought to  
> analyze communications patterns to glean clues from details like  
> who is calling whom, how long a phone call lasts and what time of  
> day it is made, and the origins and destinations of phone calls and  
> e-mail messages. Calls to and from Afghanistan, for instance, are  
> known to have been of particular interest to the N.S.A. since the  
> Sept. 11 attacks, the officials said.
>
> This so-called "pattern analysis" on calls within the United States  
> would, in many circumstances, require a court warrant if the  
> government wanted to trace who calls whom.
>
> The use of similar data-mining operations by the Bush  
> administration in other contexts has raised strong objections, most  
> notably in connection with the Total Information Awareness system,  
> developed by the Pentagon for tracking terror suspects, and the  
> Department of Homeland Security's Capps program for screening  
> airline passengers. Both programs were ultimately scrapped after  
> public outcries over possible threats to privacy and civil liberties.
>
> But the Bush administration regards the N.S.A.'s ability to trace  
> and analyze large volumes of data as critical to its expanded  
> mission to detect terrorist plots before they can be carried out,  
> officials familiar with the program say. Administration officials  
> maintain that the system set up by Congress in 1978 under the  
> Foreign Intelligence Surveillance Act does not give them the speed  
> and flexibility to respond fully to terrorist threats at home.
>
> A former technology manager at a major telecommunications company  
> said that since the Sept. 11 attacks, the leading companies in the  
> industry have been storing information on calling patterns and  
> giving it to the federal government to aid in tracking possible  
> terrorists.
>
> "All that data is mined with the cooperation of the government and  
> shared with them, and since 9/11, there's been much more active  
> involvement in that area," said the former manager, a  
> telecommunications expert who did not want his name or that of his  
> former company used because of concern about revealing trade secrets.
>
> Such information often proves just as valuable to the government as  
> eavesdropping on the calls themselves, the former manager said.
>
> "If they get content, that's useful to them too, but the real plum  
> is going to be the transaction data and the traffic analysis," he  
> said. "Massive amounts of traffic analysis information - who is  
> calling whom, who is in Osama Bin Laden's circle of family and  
> friends - is used to identify lines of communication that are then  
> given closer scrutiny."
>
> Several officials said that after President Bush's order  
> authorizing the N.S.A. program, senior government officials  
> arranged with officials of some of the nation's largest  
> telecommunications companies to gain access to switches that act as  
> gateways at the borders between the United States' communications  
> networks and international networks. The identities of the  
> corporations involved could not be determined.
>
> The switches are some of the main arteries for moving voice and  
> some Internet traffic into and out of the United States, and, with  
> the globalization of the telecommunications industry in recent  
> years, many international-to-international calls are also routed  
> through such American switches.
>
> One outside expert on communications privacy who previously worked  
> at the N.S.A. said that to exploit its technological capabilities,  
> the American government had in the last few years been quietly  
> encouraging the telecommunications industry to increase the amount  
> of international traffic that is routed through American-based  
> switches.
>
> The growth of that transit traffic had become a major issue for the  
> intelligence community, officials say, because it had not been  
> fully addressed by 1970's-era laws and regulations governing the  
> N.S.A. Now that foreign calls were being routed through switches on  
> American soil, some judges and law enforcement officials regarded  
> eavesdropping on those calls as a possible violation of those  
> decades-old restrictions, including the Foreign Intelligence  
> Surveillance Act, which requires court-approved warrants for  
> domestic surveillance.
>
> Historically, the American intelligence community has had close  
> relationships with many communications and computer firms and  
> related technical industries. But the N.S.A.'s backdoor access to  
> major telecommunications switches on American soil with the  
> cooperation of major corporations represents a significant  
> expansion of the agency's operational capability, according to  
> current and former government officials.
>
> Phil Karn, a computer engineer and technology expert at a major  
> West Coast telecommunications company, said access to such switches  
> would be significant. "If the government is gaining access to the  
> switches like this, what you're really talking about is the  
> capability of an enormous vacuum operation to sweep up data," he said.
>
> Copyright 2005  The New York Times Company

_____________________________________________________________________
SOCNET is a service of INSNA, the professional association for social
network researchers (http://www.insna.org). To unsubscribe, send
an email message to [log in to unmask] containing the line
UNSUBSCRIBE SOCNET in the body of the message.

Top of Message | Previous Page | Permalink

Advanced Options


Options

Log In

Log In

Get Password

Get Password


Search Archives

Search Archives


Subscribe or Unsubscribe

Subscribe or Unsubscribe


Archives

October 2020
September 2020
August 2020
July 2020
June 2020
May 2020
April 2020
March 2020
February 2020
January 2020
December 2019
November 2019
October 2019
September 2019
August 2019
July 2019
June 2019
May 2019
April 2019
March 2019
February 2019
January 2019
December 2018
November 2018
October 2018
September 2018
August 2018
July 2018
June 2018
May 2018
April 2018
March 2018
February 2018
January 2018
December 2017
November 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
April 2017
March 2017
February 2017
January 2017
December 2016
November 2016
October 2016
September 2016
August 2016
July 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
January 2015
December 2014
November 2014
October 2014
September 2014
August 2014
July 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
December 2012
November 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
August 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
May 2010
April 2010
March 2010
February 2010
January 2010
December 2009
November 2009
October 2009
September 2009
August 2009
July 2009
June 2009
May 2009
April 2009
March 2009
February 2009
January 2009
December 2008
November 2008
October 2008
September 2008
August 2008
July 2008, Week 62
July 2008
June 2008
May 2008
April 2008
March 2008
February 2008
January 2008
December 2007
November 2007
October 2007
September 2007
August 2007
July 2007
June 2007
May 2007
April 2007
March 2007
February 2007
January 2007
December 2006
November 2006
October 2006
September 2006
August 2006
July 2006
June 2006
May 2006
April 2006
March 2006
February 2006
January 2006
December 2005
November 2005
October 2005
September 2005
August 2005
July 2005
June 2005
May 2005
April 2005
March 2005
February 2005
January 2005
December 2004
November 2004
October 2004
September 2004
August 2004
July 2004
June 2004
May 2004
April 2004
March 2004
February 2004
January 2004
December 2003
November 2003
October 2003
September 2003
August 2003
July 2003
June 2003
May 2003
April 2003
March 2003
February 2003
January 2003
December 2002
November 2002
October 2002
September 2002
August 2002
July 2002
June 2002
May 2002
April 2002
March 2002
February 2002
January 2002
December 2001
November 2001
October 2001
September 2001
August 2001
July 2001
June 2001
May 2001

ATOM RSS1 RSS2



LISTS.UFL.EDU

CataList Email List Search Powered by the LISTSERV Email List Manager