Thin Thread Exposed

 In what may have been the country’s earliest coordinated effort of, a government agency ominously named Black Chamber teamed  with Western Union after WWI to retrieve copies of telegrams in violation of the Radio Communications Act of 1912 and the 4th Amendment.

We are all aware of the cause and result – the Zimmerman telegram.

 

zimm.jpg

 

Once publicly revealed, the operation was shut down only to resurface in 1945 when the Army Signals Security Agency, predecessor to the NSA (National Security Agency) began Operation Shamrockwith the interception of millions of international communications from a ‘watch list’ of Americans.

 

Assured by government promises of legal immunity, RCA, Western Union and ITT Communications agreed to provide confidential information to the government’s Military Intelligence Division despite a violation of the Communication Act of 1934 and the Fourth Amendment.

 

nsa-presentation-7-1024

The U.S. intelligence agency within the Department of Defense that is responsible for cryptographic and communications intelligence and security is the National Security Agency (NSA), which grew out of the communications intelligence activities of U.S. military units during World War II.

The NSA was created in part out of the belief that the importance and distinct character of communications intelligence warranted an organization distinct from both the armed forces and the other intelligence agencies.

 

In 1952 by a presidential directive from Harry S. Truman.

 

sham

 While it operates within the Department of Defense, the NSA also belongs to the Intelligence Community (a coalition of 17 intelligence agencies) and as such acts under the supervision of the Director of National Intelligence.

However, not being a creation of Congress, the NSA often acts outside of congressional review;  and is the most secret of all U.S. intelligence agencies, requiring the director of the NSA to be a Military Officer of Flag Rank (i.e., a General or an Admiral) with a minimum of 3 stars.

The NSA was and is probably the most powerful organization in the intelligence community, However it was significantly weakened after the Watergate Scandal which began in 1972 and cover up in 1974

On June 17, 1972, five men were arrested for breaking into the Democratic National Committee offices in Washington, D.C.’s Watergate Hotel.

water-gate-burglers

 

Over the next 2 years, a series of investigations and bombshell media reports uncovered a web of political espionage evidence of extensive, illegal wiretapping and surveillance of thousands of U.S. citizens (including those on Richard Nixon’s infamous “enemies list”), undertaken by America’s intelligence and law enforcement agencies. 

In the wake of the Watergate scandal and Richard Nixon’s resignation, a congressional committee tasked with investigation domestic spying abuses would lead to an overhaul of U.S. intelligence gathering practices that is still with us today.

In December 1974, just 4 months after Nixon’s resignation, New York Times reporter Seymour Hersh revealed the existence of a long-running CIA intelligence program targeting U.S. citizens, a direct violation of its charter.

Hersh had, in part, sourced his information on the CIA’s own internal review, begun after it was revealed that 2 of the Watergate burglars had formerly worked for the CIA, and had been given assistance by the agency following the break-in.

nsa-presentation-8-1024

The review, informally known as the “family jewels” detailed a litany of illegal and inappropriate activities undertaken by the agency from the 1950s onwards.

While the CIA would not fully declassify most of the “family jewels” report until 2007, Congress swung into action.

January 1975, a special 11-member investigative body was established to look into abuses of power by the nation’s intelligence agencies. called the Church committee called more than 800 witnesses over the course of nine months, including several former officials from both the FBI and CIA.

Most of the hearings were held behind closed doors to protect intelligence sources, but a few, carefully selected cases of misconduct were investigated in televised sessions.

Among those were a CIA biological agents program, the FBI’s COINTELPRO (a wide-ranging counter-intelligence program targeting domestic groups as disparate as the KKK, the Communist Party and the Black Panthers) and a series of secret programs led by the National Security Agency known as Operation Shamrock and Project Minaret.

It later came to light that Nixon was not being truthful, for instance, he arranged to provide hundreds of thousands of dollars in “hush money” to the Watergate burglars.

quote-no-one-is-entitled-to-the-truth-e-howard-hunt-60-38-42

 

James Bamford’s well-researched The Shadow Factory — The Ultra-Secret NSA from 9/11 to the Eavesdropping on America describes the details of how Shamrock’sexistence was revealed in 1975 and when Rep. Bella Abzug (D-NY), opened an investigation as Chair of the House Government Information and Individual Rights subcommittee.

The 1978 Foreign Intelligence Surveillance Act (FISA) restricts the NSA mandate to the interception of foreign communications and forbids the agency from targeting a U.S. citizen unless the latter is considered an “agent of a foreign power.” In exceptional cases that are considered critical to national security, the agency can obtain a warrant to intercept domestic communications.

 

nsa-presentation-9-1024

 

Thin Thread,” was  a NSA program through the agency which could gather and analyze enormous amounts of Internet and telephone traffic and encrypt the identities of people in the U.S. so their privacy was protected.

 

thin thread

 

On September 11, 2001, 19 militants associated with the Islamic extremist group al-Qaeda hijacked four airplanes and carried out suicide attacks against targets in the United States.

Two of the planes were flown into the twin towers of the World Trade Center in New York City, a third plane hit the Pentagon just outside Washington, D.C., and the fourth plane crashed in a field in Pennsylvania.

Almost 3,000 people were killed during the 9/11 terrorist attacks, which triggered major U.S. initiatives to combat terrorism and defined the presidency of George W. Bush.

AMERICA RESPONDS

At 7 p.m., President George W. Bush, who was in Florida at the time of the attacks and had spent the day being shuttled around the country because of security concerns, returned to the White House.

At 9 p.m., he delivered a televised address from the Oval Office, declaring, “Terrorist attacks can shake the foundations of our biggest buildings, but they cannot touch the foundation of America.These acts shatter steel, but they cannot dent the steel of American resolve.”

In a reference to the eventual U.S. military response he declared, “We will make no distinction between the terrorists who committed these acts and those who harbor them.”

Image result for eric snowden on bill binney az quotes

 

Since then, when  groundbreaking documents were released by NSA whistleblower Edward Snowden, detailing a massive surveillance apparatus collecting the electronic communications of entire populations.

The proof positive spying story sparked a global discussion reevaluating state power and a groundswell of privacy advocates.

 

As a pioneer of the now-defunct ‘Thin Thread’ program, which upheld the privacy of US citizensBinney broke away from the NSA after witnessing what he saw as the erosion of privacy rights under the banner of national security.

Wiebe, equally disgusted by the NSA’s blatant disregard for the rule of law, left his post in protest against the indiscriminate violations unfolding outside the view of the American public.

AM: Bill, you were one of the creators of the pre-9/11 data collection surveillance program called ‘Thin Thread’ which actually did have privacy protections instated for American citizens.

Why was this program abandoned and what kind of system replaced it?

BB: Well it actually wasn’t abandoned. The back part of the analysis part, the part that allowed them to deal with massive amounts of data and index it was taken in to manage, that was the way that they were able to build surveillance on the entire world. That particular program was that powerful and that’s why we put in those protections.

 

stellar wind

 

So that it would be impossible for them to abuse it. That was the first thing they removed when they took it into the new program Stellar Wind.

AM: And Kirk, after you had found out what they did to ‘Thin Thread’ how did you, Bill and other intelligence insiders address these concerns within the government and how were these concerns met from officials.

KW: Well, in reality we had been trying to address what had been going on within the NSA in terms of modernization for years and it’s kind of like 9/11, the events of 9/11, were the culmination in our minds of our failure to get those at the agency to see the potential of what we were developing, what Bill had invented in the ‘Thin Thread’ project.

Within six weeks of 9/11 that we end up–Ed Loomis, myself, Bill Binney–retiring from NSA in absolute disgust because we had failed. We had been trying to tell them that they were going to fail and we lost the battle.

AM: And Bill, in 2007 the FBI raided both of your homes along with other officials who had spoken out on the false premise that you guys had leaked classified documents or information to the press. What was that experience like for your and were you surprised by the aggressiveness of the response?

BB: Well yes, you see I had been cooperating with the FBI in their investigation into the New York Times leak for months, several months, about four months before the raid and when they came at me

… it didn’t take me too long to figure out what they were really doing was trying to intimidate us because this was like the morning after the second day after Gonzales’ testimony to the Senate Judiciary Committee about the terror surveillance program that the president had talked about which was–he only talked about thewarrantless wiretaps at the time–but there were many other programs that involved CIA and also NSA that included spying on everyone in the country and building knowledge and understanding of their lives of everybody as they were living them. …

So it was clear to me at that point that that’s why they were there. To keep us quiet.

binney

So I started getting mad at these people while they were still there.

So that when I reported to the FBI the real crime why they were sent there which was Bush, Cheney, Hayden and Tenet, which was the core of individuals who decided to subvert the constitution and violate all the laws, basic laws that we had in statutes at the time and I told them what it was–Stellar Wind Program–what data they were using, how they were organizing, what it was doing and I was telling that to all the FBI agents on my back porch.

 

So the only one who was cleared for it was the one fellow who was the special agent in charge Paul Mauric [sic]. He was the only one who was cleared for that program.

The only thing he could do when I was doing that was look at the floor because what I was doing was causing him a problem, cause it was telling all these other agents (FBI agents) what crime is being committed and that they weren’t cleared for it.

They were not cleared for this program. So now we had to have a meeting outside before they left my house of all the agents round the cars. They couldn’t leave until he instructed them on what they could not say.

AM: Wow and Kirk, in the case of Thomas Drake, of course, it went a little bit farther to say the least. Talk about exactly what the FBI did to him.

drake
Originally, the government indicted Drake under the Espionage Act. If convicted, he would have faced up to 35 years in prison.

KW: Well, let me frame it a little bit for you.

In November of 2009 Bill Binney and I received a communication from our lawyer. After we were raided in 2007, we went halfsies on a lawyer rather than pay two.

The lawyer was a former US prosecutor so we thought he’d know how to deal with the government.

He told us to lay low.

In November 2009 he sends us an email that says “guys I just got an email from the Department of Justice.

They’re coming after you.”

So Bill and I made an appointment with him an we went in to Baltimore and sat down at his desk and he was completely surprised by this move.

He thought it would go away.

That was the end of that for the holidays.

It was November when we got this message.

Come January, we get another email.

There’s a new prosecutor for the government.

The other one had left government, and  we are being offered letters of immunity if we are willing to sit down with the FBI and the prosecutor for the Department of Justice and answer questions about Thomas Drake.

And so Bill and I agree we’ll do that.

We knew Tom had done nothing wrong.

We go down to the FBI facility just outside DC in Maryland and separately address questions

. The questions were mostly questions like

“Did you meet with Tom Drake?

On what occasion?”

And of course we had lunch with Tom, said hello but nothing very interesting.

“Did he talk about mulching papers, destroying evidence?”

No, no, sorry. Tom’s an honest guy.

So long story short we get letters of immunity in February saying we are under no further threat in this entire matter (Bill Binney and I).

They then threw their attention on top and we think it’s because he’s the one who went to the press. NSA was very much trying to–and the government for that matter–send the message “If you work in the intelligence community and you talk to the press you’re going to get hammered.” And so they wanted to make an example.

Whether they won the case or not was not important to the government. They wanted to send a message and that’s why they went after him.

AM: And they actually said they reclassified this document that he had specifically taken was unclassified. Extremely shady.

BB: It was also material that they had independently released publicly and Jim Bamford provided that to the judge Bennett and the court.

AM: Kirk, I wanted to–actually Bill, let’s talk about Edward Snowden. Tomorrow of course is the anniversary of the leaks. I wanted to play a quick clip from his NBC interview. Let’s check that out.

ES: They found that we had all of the information that we needed, as an intelligence community, as a classified sector, as the national defense of the United States to detect this plot. We actually had records of the phone calls from the United States and out. The CIA knew who these guys were. The problem was not that we weren’t collecting information. It wasn’t that we didn’t have enough dots. It wasn’t that we didn’t have a haystack. It was that we did not understand the haystack that we have.

 

quote-bill-binney-designed-thinthread-an-nsa-program-that-used-encryption-to-try-to-make-mass-edward-snowden-155-60-64.jpg

AM: And of course this is why you guys left in outrage. You agree with his assessment here?

BB: Yeah, I know the specifics of it. Like six or seven phone calls from San Diego back to the Yemen facility. And by the way, both ends were known. Both numbers were there.

That’s how caller ID works. And you’re talking about switches. And the switches have to know exactly how to pass or where it’s coming from, how to pass the other line back. They have to have the information to make the connection otherwise it doesn’t happen.

AM: Why expand the haystack if the haystack was already there, available and could’ve prevented the terrorism?

BB: Well the very simple reason they did that was for money. It was to build up an empire of an industrial complex around NSA and other agencies and that’s exactly what they’ve done. They spend on the order of $70 billion a year on contracts.

Image result for prism nsa

AM: Well let’s go along with the NSA apologists–Hayden, Clapper–who say that there’s no tangible evidence that the NSA is actually using this data against us so why should we worry?

KW: It’s a silly statement. NSA operates behind a wall of secrecy. You need a clearance just to enter the building. And so what goes on behimd those fences and facilities is unbeknownst to anyone except NSA. So NSA has a license to say what it wants to and no one has the  ability to challenge it..

BB: I would also add that it’s not so much NSA using the data as it is law enforcement, FBI and DEA. They’re using this data directly.

They have ways and means of interrogating directly. Director Mueller testified to this to the Senate Judiciary Committee.

He said he had access to a technology database which he put together with DOD where he could go in and get emails with one query, get all past emails and all future ones as they come in on a person. What he’s doing is he’s going into the NSA database because NSA and DOD is responsible for communications, that’s email.

Screen Shot 2013 06 07 at 2.26.46 PM

 

And so they got all these Narus devices around the network collecting all these emails.

So they’re going into the base they’re creating, interrogating all this material to get criminal activity.

AM: Yeah, as Edward Snowden has said repeatedly this is about potential for retroactive prosecution. Kind of building this whole framework around people.

AM: We’re going to take a break now and we’ll be back with the two NSA whistleblowers. You guys stick around.

Image result for Kirk Wiebe.
NSA Whistleblower Kirk Wiebe

AM: And we’re back with NSA whistleblowers Bill Binney and Kirk Wiebe. Kirk : When Obama took office he was briefed on these programs. He decided to go forward with them. Why do you think he did this given that he ran his presidency on a platform of transparency and strict constitutional adherence?

KW: I think its the result of what I call “technospeak.” When the NSA talks about what it does it tends to put them in difficult abstract terms. It also uses words to deceive.

So for example the NSA will say “we aren’t doing such and such under this program.” But what program are they doing it under? So these are correct statements in front of Congress but they’re meant to mislead, to be deceptive.

So I’m not sure that Obama ever understood or fathomed really what was going on. You’re never sure that anybody does. Congress swears they get briefing all the time but still don’t understand—

AM: Well it certainly didn’t look like Bush knew but I find it hard to believe that Obama, constitutional lawyer, wouldn’t at least want to know. “Hey, what is this mass spying grid that we have?”

KW: Exactly.

AM: Bill even before Snowden made his revelations you had said that the US had turned into a police state. I was wondering if you could expand on why you made that comment and what Snowden’s revelations .

BB: Well I said it because I knew the capacity of collecting information on everybody, mostly their focus was on the United States initially but it spread around the world so it’s really collecting the data of everybody on the planet and I knew the capacity of the systems involved. There was no limit on what you could do with them that I saw anyway when I left there.

Image result for robert mueller testifies

The point was how were they using it and that came out with Director Mueller in the FBI when he testified to the Senate Judiciary Committee on the 30th of March of 2011. It’s on the web. Where he said he got together with the DOD and created this database.

Well that told me that he was interrogating all the email collection that they were making. He also had access to the phone network. He said he talked about phone data too–not at that interview but at another one.

So they were using this data for police operations. And so it was–and Reuters published an article on it .. talking about the DEA and the SOD (the Special Operations Division) which was specifically to look at the data that NSA collected to find criminal activity and then they would use that to go arrest people.

The policy was you could not use any of this information documented in any court records and you couldn’t tell the judge or the prosecutor or defending attorneys about it. You had to do a parallel construction. That meant they knew where the data was, so you do your normal policing that you would do to find evidence and then you substitute that for the NSA data as the basis for arresting them.

Greenwald Snowden team

Well I call that basically a planned program perjury policy run by the Department of Justice of the United States. Now it’s not only the United States now because they share the–with foreign counterparts. So that goes all the way around the world. So they’re subverting the entire judicial process.

AM: Right, that’s important to point out. This is the Five Eyes. This is not just the US.

KW: It’s not just five eyes.

AM: It’s a lot more.

AM: Kirk, there’s been alot of criticism of journalist Glenn Greenwald for the way he’s distributing the leaks. I want to see if you are happy with the process of how the leaks have been distributed.

KW: You know it’s almost a moot discussion for me because we have a government subverting the constitution. That’s what we should be focused on. Not the picayune details of Greenwald’s leaks etc. I think for an unindoctrinated, non-intel person he’s probably done a pretty good job.

 

People ask me when you look at what has been leaked by the Greenwald Snowden team. I tell people “well what does it mean to you when you see PRISM?”

They say “nothing, it means there’s a word. I don’t know what it means.” Well that’s right. You don’t. And so most of what’s on these slides are a bunch of names shown in relationship to each other but it’s difficult to interpret what’s going on because the words are few and if you’re not part of this system it’s difficult to know.

Acronyms_002

You have to infer. Now Bill and I have an advantage. We’ve dealt with this kind of speak before so we can infer things from it. But I think they’ve done a pretty good job.

What alternative do people in the world have? If you don’t want to use the phone that’s a choice you can make, but you can’t use any phone. So you have no choice. Just because we’re monitoring phones–if you have to communicate you have to use a phone or email or something–so you have no choice. That’s like all the Verizon people know there information is being transferred to the government but they haven’t changed companies. Why? Well it’s their choice.

AM: Another good point made in the United States of Secrets was that this is not just about government surveillance. This is about corporate surveillance but people don’t seem to care as much because it’s used for advertising collection instead of intelligence gathering but it’s very scary you have an apparatus working in conjunction with each other.

KW: That’s exactly the point.

BB: You see the industry can’t come and arrest you and put you in jail. The government can. But when they cooperate they can add extra dimensions to what the government has knowledge–in terms of knowledge–what the government has against you.

AM: Bill, you brought up a really good point about a minute ago when you said there’s people that knew about this for ten years.

You guys had been saying this. You’ve been yelling from the rooftops as well as other people like Thomas Drake.

What is your response to people who say “Snowden hasn’t brought us anything new. We already knew about this. The documents don’t tell us anything”?

 

Image result for thomas drake

 

BB: The response is pretty simple. This is irrefutable evidence. Up until then they could’ve denied it and said “no, that’s not what really true,” but now with the evidence–that’s why he took all that data out–because that was the only way to convince people. Now he has the evidence which is the government’s data. So the government–there’s no way they can deny it.

AM: Exactly. We have the documents. Finally. You brought up a good point as well when you said that people were focusing on character assassinations and the way that all of this is being done. Why? Why are people focusing so much on Snowden and Greenwald and not the leaks.

KW: That’s a good question. You know, over Europe right now there’s a greater debate about this entire matter. They seem to appreciate the threat more than the typical American does. We’re spoiled. We’ve now enjoyed this country for two to three hundred years but we’ve never lived under a dictatorship. We’ve never lived under the Nazis. We’ve never lived under the Stasi, the secret police. The Germans and many of the Europeans have and they remember those harsh conditions and they don’t want that to return. So I think that’s why they understand it and get it a little bit better. But I think most of the polling I’ve seen, pretty much the majority side with Snowden on this one which is encouraging because it is all about the constitution. It really is.

AM: Yeah, no matter how much they try to frame it “hero-traitor,” it really is about the content of the documents.

AM: Bill, I wanted to play another clip from the Snowden interview where he talks about what it means to be a patriot.

ES: Being a patriot doesn’t mean prioritizing service to government above all else. Being a patriot means knowing when to protect your country, knowing when to protect your constitution, knowing when to protect, your countrymen, from the violations of and encroachments of adversaries. And those adversaries don’t have to be foreign countries.

AM: That clip really resonated with me. Do you agree that you sometimes have to break the law to stand up for what’s right Bill?

BB:Well let’s put it this way. There’s several things that are involved here.

images (20).jpg

The oath of office that everyone takes in government, including the Congress and the President and everybody else, is to protect and defend the constitution, not the government, not defend an agency, not defend a president. So that’s the first thing.

Secondly, the point that he was making in terms of standing up is really what their responsibility of citizens is. You have to stand up to defend the constitution. You cannot sit by and be quiet.

If you acquiesce to it, you know, if nobody speaks up you get a state like the Nazis developed.

That’s fundamentally what it is and we’re on that path now with section 1021 of the NDAA where it talked about giving the president the power to declare someone a terrorist threat, to take them off the street with the US military, to incarcerate them indefinitely, give them no due process.

That’s–that’s not the Nazi order at 48 issued in 1933. That’s exactly what they did. If you go on the web you can read it. It says basically the same thing.

USA Freedom.png

 Right, at what point are they going to stop following orders and stand up for what’s right. Kirk, what’s your opinion on the USA Freedom Act. Of course it’s been transformed quite a bit. Passed in the House now, waiting passage in the Senate.

KW: Disappointment. Much disappointment. While it narrows metadata collection using counts of tops from a known or suspected “bad person,” when you do the math the numbers are still huge numbers of innocent people who get swept up into this vacuum cleaner.

All along Bill and I and others have tried to build a system (the Thin Thread that we talked about earlier) that was focused on–very closely on known bad people and there relationships with others yet to be determined but collecting all the metadata but encrypting it to protect of all those innocent people out there.

That gave you the best chance to find things you didn’t know about and also focus analysis on the things you do know about and do your job and make sure you cover that well. With that kind of technique we don’t think we would’ve had a Boston Marathon, for example, explosion and so forth. So NSA is not operating at optimal, what we would call optimal levels of analysis.

So when I look at the Freedom Act narrowing metadata it sounds good in the protection of privacy but it really doesn’t afford that much and I hear nothing about it encrypting the innocent, the identities of innocent people. So NSA can still look at those people illegally as far as I’m concerned.

102729233-96a1de352cca8514224bd1270fcbd5c1c52e016e.600x337.jpg

AM: We have about a minute left but for people like me and the audience who’s watching , I feel like we really want to get our hands on encryption and  figure out how we can protect our data online and I feel it’s not as user friendly as I guess it should be. What’s your advice to people who want to protect their data?

BB: I think if they are after you there’s no way virtually that you can do that. Unfortunately, that true. Because look at it this way. There’s so much capability even if you have encryption once you decrypt it’s in your system–

AM: That’s a reason for them to look at you.

Image result for Bill Binney

BB: Yeah, and then once you put it in your system in a decrypted form they can come through and break into your computer and take it off that way so it doesn’t make any difference what you do.

My point all along is that’s why I called it a police state is that Ronald Reagan said that we are a country with a government. Well now we’re a government with a country. That’s what we’re turning in to.

AM: 10 seconds.

KW: Well I would just simply say if you encrypt all the metadata they can’t get to your content because they don’t know to who it belongs.

AM: Amazing to have both of you on. Bill Binney. Kirk Wiebe. Really appreciate it you guys. 

Transcript by Xavier Best, Photo by Wikimedia Commons

More than a decade into the “War on Terror”,and the digital age where telecommunications continue to play a more central role in our everyday lives, the NSA’s expanding net of surveillance poses a grave threat to free and open societies worldwide.

In 2008, amendments to FISA relaxed those restrictions and allowed the agency to monitor domestic communications without a warrant as long as one party is reasonably believed to be outside the United States.

SAN FRANCISCO–In July 2011, Thomas Drake was sentenced to a year of probation on a misdemeanor charge for giving The Baltimore Sun information related to mismanagement of Trailblazer, a data-analysis project within the super-secret National Security Agency (NSA) that ended up costing more than $1 billion and was cancelled 2006.

He had been charged by the Department of Justice with felony espionage, which could have carried a life sentence. Drake, who worked at the NSA beginning in 2001, steadfastly denied that he gave up any classified information to the newspaper. . He allowed that he only “betrayed” NSA mismanagement, which wasted time and money in Trailblazer, effectively undermining national security.

At the Web 2.0 Summit, Drake gave a presentation called, “The ‘Dark Side’ of Data: The NSA ThinThread Tale,” reprising his time as an NSA executive. He said the NSA is the “equal of a foreign nation electronically,” and then contended that the U.S. is falling behind in making sense of the massive amounts of data flowing into NSA server farms.

trailblzer

He further indicted, his former employer and the national security complex as a direct threat to freedom. “Data is very much who we are….having the power to collect and analyze data, especially on people, is seductively powerful, especially if done without permission and done in secret, which is the ultimate power,” Drake said.

Drake claimed that the NSA and the Trailblazer project was the result of the military industrial complex wanting to make a lot of money, “selling out to big business” with inferior technology and “selling out the Constitution.” He said that Trailblazer, which came of age after 9/11, was designed to bypass the Constitution in terms of protecting U.S. citizens right to privacy and adhering to the Foreign Intelligence Surveillance Act.

He believes that another NSA project, Thin Thread, was a better bet than Trailblazer for large-scale data analysis to identify threats, and if implemented could have detected the 9/11 plot. “It’s one of the great tragedies in the history of NSA what could’ve been.”

PRISM

Thin Thread was build in-house for $3 million in the 1990s, according to Drake. “The NSA wanted to go evolution, and it needed to go revolution,” he said, describing Trailblazer as a “set of PowerPoint slides,”  while Thin Thread was the solution for data mining that would also protect privacy. For example, Thin Thread could identify U.S. phone numbers and encrypt them to allow for caller privacy.

Drake warned the audience of Internet elites at the summit, “Orwell’s ‘1984’ is real and now screamingly relevant.”  The statement didn’t elicit a response from the crowd. Many of them are trying to figure out how they can mine user data to increase their bottom lines, without crossing the blurry line over to the dark side.

In 2013 NSA activities were put in the limelight after a former computer security contractor, Edward Snowden, leaked classified information about two surveillance programs—one collecting information from U.S. Internet service providers (PRISM) and the second collecting so-called metadata on cell phone calls (information including phone numbers and length of the calls but not their content).

Csd-VOTW8AESdOs

Those programs were designed to target non-Americans, but they also collected a massive amount of information from Americans with whom those individuals had communicated

. Other NSA programs included the extensive, worldwide, and allegedly untargeted collection of text messages (Dishfire) and of the locations of cell phones.

NSA’s Reach: 75% of U.S. Internet Traffic

The NSA’s surveillance network reaches  roughly 75 percent of all U.S. internet traffic.

While less known to the American public than the Central Intelligence Agency, the NSA is believed to be far larger in size in terms of workforce and budget. According to Michael Hayden, a former director (1999–2005) of the NSA, it is also the world’s largest collector of foreign signals intelligence.

Translate »