[Infowarrior] - Matt Blaze on NSA surveillance

Richard Forno rforno at infowarrior.org
Mon Dec 29 04:20:17 UTC 2008


The Metadata is the Message
Did the NSA's Warrantless Wiretap Program include large-scale domestic  
surveillance?

http://www.crypto.com/blog/metatapping/

Bell System Secrecy of Communications poster Warrantless wiretapping  
is back in the news, thanks largely to Michael Isikoff's cover piece  
in the December 22 issue of Newsweek. We now know that the principal  
source for James Risen and Eric Lichtblau's Pulitzer Prize winning  
article that broke the story three years ago in the New York Times was  
a Justice department official named Thomas M. Tamm. Most of the  
current attention, naturally, has focused on Tamm and on whether, as  
Newsweek's tagline put it, he's "a hero or a criminal". Having never  
in my life faced an ethical dilemma on the magnitude of Tamm's --  
weighing betrayal of one trust against the service of another -- I  
can't help but wonder what I'd have done in his shoes. Whistleblowing  
is inherently difficult, morally ambiguous territory. At best there  
are murky shades of gray, inevitably viewed through the myopic lenses  
of individual loyalties, fears, and ambitions, to say nothing of the  
prospect of life-altering consequences that might accompany exposure.  
Coupled with the high stakes of national security and civil liberties,  
it's hard not to think about Tamm in the context of another famously  
anonymous source, the late Mark Felt (known to a generation only as  
Watergate's "Deep Throat").

But an even more interesting revelation -- one ultimately far more  
troubling -- can be found in a regrettably less prominent sidebar to  
the main Newsweek story, entitled "Now we know what the battle was  
about", by Daniel Klaidman. Put together with other reports about the  
program, it lends considerable credence to claims that telephone  
companies (including my alma matter AT&T) provided the NSA with  
wholesale access to purely domestic calling records, on a scale beyond  
what has been previously acknowledged.

The sidebar casts new light on one of the more dramatic episodes to  
leak out of Washington in recent memory; quoting Newsweek:

     It is one of the darkly iconic scenes of the Bush Administration.  
In March 2004, two of the president's most senior advisers rushed to a  
Washington hospital room where they confronted a bedridden John  
Ashcroft. White House chief of staff Andy Card and counsel Alberto  
Gonzales pressured the attorney general to renew a massive domestic- 
spying program that would lapse in a matter of days. But others  
hurried to the hospital room, too. Ashcroft's deputy, James Comey,  
later joined by FBI Director Robert Mueller, stood over Ashcroft's bed  
to make sure the White House aides didn't coax their drugged and  
bleary colleague into signing something unwittingly. The attorney  
general, sick and pain-racked from a rare pancreatic disease, rose up  
from his bed, gathering what little strength he had, and firmly told  
the president's emissaries that he would not sign their papers.

     White House hard-liners would make one more effort -- getting the  
president to recertify the program on his own, relying on his powers  
as commander in chief. But in the end, with an election looming and  
the entire political leadership of the Justice Department poised to  
resign rather than carry out orders they thought to be illegal, Bush  
backed down. The rebels prevailed.

Like most people, I had assumed that the incident concerned the NSA's  
interception (without the benefit of court warrants) of the contents  
of telephone and Internet traffic between the US and foreign targets.  
That program is at best a legal gray area, the subject of several  
lawsuits, and the impetus behind Congress' recent (and I think quite  
ill-advised) retroactive grant of immunity to telephone companies that  
provided the government with access without proper legal authority.

But that, apparently, wasn't was this was about at all. Instead, again  
quoting Newsweek:

     Two knowledgeable sources tell NEWSWEEK that the clash erupted  
over a part of Bush's espionage program that had nothing to do with  
the wiretapping of individual suspects. Rather, Comey and others  
threatened to resign because of the vast and indiscriminate collection  
of communications data. These sources, who asked not to be named  
discussing intelligence matters, describe a system in which the  
National Security Agency, with cooperation from some of the country's  
largest telecommunications companies, was able to vacuum up the  
records of calls and e-mails of tens of millions of average Americans  
between September 2001 and March 2004. The program's classified code  
name was "Stellar Wind," though when officials needed to refer to it  
on the phone, they called it "SW." (The NSA says it has "no  
information or comment"; a Justice Department spokesman also declined  
to comment.)

While it may seem on the surface to involve little more than arcane  
and legalistic hairsplitting, that the battle was about records rather  
than content is actually quite surprising. And it raises new -- and  
rather disturbing -- questions about the nature of the wiretapping  
program, and especially about the extent of its reach into the  
domestic communications of innocent Americans.


The issue has to do with a peculiarity of US surveillance law. There  
are generally stricter requirements for wiretaps that intercept call  
content than for those that record only transactional data (who called  
whom and when). The legal rationale for this distinction is complex  
but has its origins in how wireline telephones worked and were used in  
the last century. There is a theory that while a telephone call's  
audio is intended only for other party, the numbers dialed have  
already been given voluntarily to a third party -- the phone company  
-- and thus are legally less "private". And there is a basic  
assumption about the kinds of privacy we value most. Being listened in  
on has been thought to be inherently more invasive than having one's  
calling records examined. So the government can obtain transactional  
records relatively easily, under a lower legal standard than what is  
required for a full content tap.

Modern computing and communications technology may make these  
assumptions less valid than they were when the legal theories of  
wiretapping were developed. As electronic communication pervades more  
of our daily lives, transaction records -- metadata -- can reveal  
quite a bit about us, indeed often much more than a few out-of-context  
conversations might. Aggregated into databases with other people's  
records (or perhaps everyone's records) and analyzed by powerful  
software, metadata by itself can paint a remarkably detailed picture  
of connections, relationships, and other patterns that could never be  
recovered simply from listening to the conversations themselves.  
Metadata can also be analyzed retrospectively, since calling records  
are now kept by phone companies for every customer, not just the  
suspects. And the very distinction between content and metadata defies  
easy translation into the Internet, where whether something is content  
or not can depend entirely on where in the network the question is  
being asked.

But that's beside the point here. Rightly or wrongly, current law  
treats metadata differently from content. In particular, it's legally  
simpler under the Foreign Intelligence Surveillance Act (FISA) for the  
government to obtain telephone records than it is to intercept actual  
telephone call audio. All that is required, in general, is an  
assertion that the specific records involved are likely to be germane  
to a investigation, a relatively undemanding standard to meet. Content  
taps, on the other hand, require evidence of probable cause and are  
subject to more judicial scrutiny.

So how could it have been on that night in 2004 that these officials  
were comfortable with the legality of intercepting trans-border call  
content without a FISA warrant -- something apparently expressly  
forbidden under the law -- and yet drew the line when it came to  
collecting call records? That would seem, based on longstanding  
principles of surveillance law, to get it backwards. What kind of  
records could have provoked such a reaction, and did their collection  
and use violate the privacy of ordinary Americans in ways that go  
beyond what is already known about the program?

The Newsweek sidebar raises more questions than it answers here, but  
piecing together various details from previous reports about the  
program suggests likely possibilities.

NSA mining of traffic metadata obtained directly from US telephone  
switches appears to have first been reported by the New York Times in  
December, 2005 (two weeks after they broke the story of the wiretap  
program itself). However, that article focused primarily on trans- 
border traffic on switches at the edge of the US, the very same  
traffic from which call audio was also being intercepted. So it seems  
unlikely that collecting call records exclusively from those switches  
would raise special concerns for officials who believed that they were  
permitted to collect the content without warrants.

Two years later, in 2007, the Times reported that the FBI had been  
asking US telephone companies for extended "community of interest"  
data about various terrorism suspects. That is, the FBI obtained not  
just calling records of their suspects, but also the calling patters  
of everyone they communicated with, even those not suspected of  
wrongdoing. However, there are several differences between the kind of  
large-scale metadata collection suggested by Newsweek and the FBI  
program described by the Times. In the Times article, the FBI used  
secret "National Security Letters" to obtain data from telephone  
companies about the communities of specific targets, which implies a  
more limited scope, involving far fewer people's records, than an NSA  
program of the kind described by Newsweek would have had.

However, still another Times piece, written by John Markoff in 2006,  
reported that law enforcement officers with subpoenas were sometimes  
been given restricted access to data mining software on AT&T's Daytona  
database of domestic and international call records. And an article by  
Leslie Cauley in USA Today later that year suggested that the NSA was  
mining domestic call detail records provided by several carriers. More  
specifically, the Electronic Frontier Foundation has alleged in a  
lawsuit that the NSA had been given relatively unrestricted access,  
without subpoenas, to all or most of the AT&T Daytona database as part  
of the warrantless wiretap program,

Notably, the large-scale domestic metadata collection that made Comey  
and Mueller so uneasy is strikingly consistent with the 2006 news  
reports and the EFF lawsuit's claims about NSA access to Daytona,  
since AT&T's call database captures a substantial fraction of US  
citizens' domestic, and not just international, traffic. If the NSA  
made use of unrestricted access to this database (and perhaps of  
analogous databases maintained by other carriers), this would be cause  
for precisely the kinds of legal concerns described by Newsweek. While  
the law puts fewer restrictions on metadata collection than on content  
tapping, it still requires that records requests be focused on  
specific targets, and definitely does not allow the NSA to have  
wholesale access to databases of every telephone user's domestic calls.

If this was indeed what was going on -- and the recent Newsweek  
sidebar seems to corroborate it -- it would represent a much more  
invasive reach into the private lives of innocent Americans by the NSA  
than previous reports about the program have been able to confirm. And  
if AT&T really provided the government with sweeping access to the  
calling records of all its customers, that would be a huge personal  
disappointment -- not only a violation of the law, but a betrayal of  
the fundamental privacy values instilled into me from my very first  
day at Bell Labs, and that, I had genuinely believed, were embedded in  
the core of the company's culture.

So I hope I'm wrong. But the very least, the Newsweek piece  
underscores the importance of investigating just what happened. We all  
deserve to know.


More information about the Infowarrior mailing list