Sunday, February 05, 2006

Some Numbers (and Other Revealing Details) About NSA Warrantless Spying

As most of us have been aware, the extra-legal NSA warrantless eavesdropping program has spied upon many innocent Americans.

We are beginning to get a picture of how egregious the intrusion upon the rights of our citizens in terms of numbers.

Fewer than 10 U.S. citizens or residents a year, according to an authoritative account, have aroused enough suspicion during warrantless eavesdropping to justify interception of their domestic calls, as well. That step still requires a warrant from a federal judge, for which the government must supply evidence of probable cause.

The Bush administration refuses to say -- in public or in closed session of Congress -- how many Americans in the past four years have had their conversations recorded or their e-mails read by intelligence analysts without court authority. Two knowledgeable sources placed that number in the thousands; one of them, more specific, said about 5,000.

We now get to the real reason that the Bush administration could not go to FISA to get authorization for legal spying. The sheer number of wiretaps wanted was so massive that the government would never be able to establish probable cause that these people were doing anything wrong.

We also find here some very interesting facts about the SIGINT and COMINT business.

The program has touched many more Americans than that. Surveillance takes place in several stages, officials said, the earliest by machine. Computer-controlled systems collect and sift basic information about hundreds of thousands of faxes, e-mails and telephone calls into and out of the United States before selecting the ones for scrutiny by human eyes and ears.

Successive stages of filtering grow more intrusive as artificial intelligence systems rank voice and data traffic in order of likeliest interest to human analysts. But intelligence officers, who test the computer judgments by listening initially to brief fragments of conversation, "wash out" most of the leads within days or weeks.

The scale of warrantless surveillance, and the high proportion of bystanders swept in, sheds new light on Bush's circumvention of the courts. National security lawyers, in and out of government, said the washout rate raised fresh doubts about the program's lawfulness under the Fourth Amendment, because a search cannot be judged "reasonable" if it is based on evidence that experience shows to be unreliable. Other officials said the disclosures might shift the terms of public debate, altering perceptions about the balance between privacy lost and security gained...

The Bush administration declined to address the washout rate or answer any other question for this article about the policies and operations of its warrantless eavesdropping.

The washout rate is so high due to the huge net that is being cast.

Valuable information remains valuable even if it comes from one in a thousand intercepts. But government officials and lawyers said the ratio of success to failure matters greatly when eavesdropping subjects are Americans or U.S. visitors with constitutional protection. The minimum legal definition of probable cause, said a government official who has studied the program closely, is that evidence used to support eavesdropping ought to turn out to be "right for one out of every two guys at least." Those who devised the surveillance plan, the official said, "knew they could never meet that standard -- that's why they didn't go through" the court that supervises the Foreign Intelligence Surveillance Act, or FISA.

Michael J. Woods, who was chief of the FBI's national security law unit until 2002, said in an e-mail interview that even using the lesser standard of a "reasonable basis" requires evidence "that would lead a prudent, appropriately experienced person" to believe the American is a terrorist agent. If a factor returned "a large number of false positives, I would have to conclude that the factor is not a sufficiently reliable indicator and thus would carry less (or no) weight."

At this point we get into technical details that will form the basis of the defense argument should any of these matters get seriously investigated or prosecuted. The meme of "mechanical surveillance", as opposed to actual people getting into the dirty details of the intelligence yield, will become of paramount importance.

The NSA ... commonly looks for... clues in the "terabytes of speech, text, and image data" that its global operations collect each day, according to an unclassified report by the National Science Foundation soliciting research on behalf of U.S. intelligence.

NSA Inspector General Joel F. Brenner said in 2004 that the agency's intelligence officers have no choice but to rely on "electronic filtering, sorting and dissemination systems of amazing sophistication but that are imperfect."

One method in use, the NSF report said, is "link analysis." It takes an established starting point -- such as a terrorist just captured or killed -- and looks for associated people, places, things and events... A major problem for analysts is that a given suspect may have hundreds of links to others with one degree of separation, including high school classmates and former neighbors in a high-rise building who never knew his name. Most people are linked to thousands or tens of thousands of people by two degrees of separation, and hundreds of thousands or millions by three degrees...

Pattern analysis, also described in the NSF and DeRosa reports, does not depend on ties to a known suspect. It begins with places terrorists go, such as the Pakistani province of Waziristan, and things they do, such as using disposable cell phones and changing them frequently, which U.S. officials have publicly cited as a challenge for counterterrorism.

Analysts build a model of hypothetical terrorist behavior, and computers look for people who fit the model. Among the drawbacks of this method is that nearly all its selection criteria are innocent on their own. There is little precedent, lawyers said, for using such a model as probable cause to get a court-issued warrant for electronic surveillance.

Jeff Jonas, now chief scientist at IBM Entity Analytics, invented a data-mining technology used widely in the private sector and by the government. He sympathizes, he said, with an analyst facing an unknown threat who gathers enormous volumes of data "and says, 'There must be a secret in there.' "

But pattern matching, he argued, will not find it. Techniques that "look at people's behavior to predict terrorist intent," he said, "are so far from reaching the level of accuracy that's necessary that I see them as nothing but civil liberty infringement engines."

We are down to the fulcrum of the NSA's defense here, debating the meaning of the deceptively innocuous sounding word "acquisition."

Even with 38,000 employees, the NSA is incapable of translating, transcribing and analyzing more than a fraction of the conversations it intercepts. For years, including in public testimony by Hayden, the agency has acknowledged use of automated equipment to analyze the contents and guide analysts to the most important ones.

According to one knowledgeable source, the warrantless program also uses those methods. That is significant to the public debate because this kind of filtering intrudes into content, and machines "listen" to more Americans than humans do. NSA rules since the late 1970s, when machine filtering was far less capable, have said "acquisition" of content does not take place until a conversation is intercepted and processed "into an intelligible form intended for human inspection."

Something tells me that we haven't heard the last of some of these concepts.

Tomorrow, the Senate Judiciary Committee will begin hearings on the matter. Sen. Spector is currently talking a good game, but he doesn't have the best record in important investigations.

We will have to see if Mr. "magic bullet" (see JFK assassination, Warren Commission staff attorney) comes through again for the malefactors.


4 Comments:

Blogger DrewL said...

Of course, even if the Bush administration can justify the need for the "wide net" - which I truly doubt they can - there's no way they logically can justify the secrecy surrounding it. After all, the secrecy didn't fool the terrorists but it did fool us, the American people. If they thought the program would withstand legal scrutiny, then there was no legitimate reason to conceal it.

I suspect that more details will be forthcoming, and those details may shed additional light on why it was kept so secret. And we may begin to see just how diabolical our own government can be.

2/05/2006 7:35 PM  
Blogger Effwit said...

Drew L:

Good point about them simultaneously saying that it can be justified and refusing to justify it.

They can't have their cake and eat it too.

I agree that we haven't seen how low these scum will go. The stakes involved here are way too high for them to fail.

I wouldn't be surprised to see more mysterious deaths a la David Rosenbaum.

2/05/2006 8:21 PM  
Blogger DrewL said...

Speaking of Rosenbaum, has there been any more in the DC media about that? Is it pretty much, "perp caught, case closed"?

2/05/2006 9:57 PM  
Blogger Effwit said...

Drew L:

A second suspect turned himself in to a police station (like the first guy) and admitted being involved in the murder. He described it as a simple street crime.

Very odd.

Aside from a few screwballs on the internet ;-) everyone considers it, as you put it, "case closed."

2/05/2006 10:39 PM  

Post a Comment

<< Home