[Home] [Headlines] [Latest Articles] [Latest Comments] [Post] [Sign-in] [Mail] [Setup] [Help]
Status: Not Logged In; Sign In
Dead Constitution See other Dead Constitution Articles Title: NSA has massive database of Americans' phone calls The National Security Agency has been secretly collecting the phone call records of tens of millions of Americans, using data provided by AT&T, Verizon and BellSouth, people with direct knowledge of the arrangement told USA TODAY. The NSA program reaches into homes and businesses across the nation by amassing information about the calls of ordinary Americans - most of whom aren't suspected of any crime. This program does not involve the NSA listening to or recording conversations. But the spy agency is using the data to analyze calling patterns in an effort to detect terrorist activity, sources said in separate interviews. QUESTIONS AND ANSWERS: The NSA record collection program "It's the largest database ever assembled in the world," said one person, who, like the others who agreed to talk about the NSA's activities, declined to be identified by name or affiliation. The agency's goal is "to create a database of every call ever made" within the nation's borders, this person added. For the customers of these companies, it means that the government has detailed records of calls they made - across town or across the country - to family members, co-workers, business contacts and others. The three telecommunications companies are working under contract with the NSA, which launched the program in 2001 shortly after the Sept. 11 terrorist attacks, the sources said. The program is aimed at identifying and tracking suspected terrorists, they said. The sources would talk only under a guarantee of anonymity because the NSA program is secret. Air Force Gen. Michael Hayden, nominated Monday by President Bush to become the director of the CIA, headed the NSA from March 1999 to April 2005. In that post, Hayden would have overseen the agency's domestic call-tracking program. Hayden declined to comment about the program. The NSA's domestic program, as described by sources, is far more expansive than what the White House has acknowledged. Last year, Bush said he had authorized the NSA to eavesdrop - without warrants - on international calls and international e-mails of people suspected of having links to terrorists when one party to the communication is in the USA. Warrants have also not been used in the NSA's efforts to create a national call database. In defending the previously disclosed program, Bush insisted that the NSA was focused exclusively on international calls. "In other words," Bush explained, "one end of the communication must be outside the United States." As a result, domestic call records - those of calls that originate and terminate within U.S. borders - were believed to be private. Sources, however, say that is not the case. With access to records of billions of domestic calls, the NSA has gained a secret window into the communications habits of millions of Americans. Customers' names, street addresses and other personal information are not being handed over as part of NSA's domestic program, the sources said. But the phone numbers the NSA collects can easily be cross-checked with other databases to obtain that information. Don Weber, a senior spokesman for the NSA, declined to discuss the agency's operations. "Given the nature of the work we do, it would be irresponsible to comment on actual or alleged operational issues; therefore, we have no information to provide," he said. "However, it is important to note that NSA takes its legal responsibilities seriously and operates within the law." The White House would not discuss the domestic call-tracking program. "There is no domestic surveillance without court approval," said Dana Perino, deputy press secretary, referring to actual eavesdropping. She added that all national intelligence activities undertaken by the federal government "are lawful, necessary and required for the pursuit of al-Qaeda and affiliated terrorists." All government-sponsored intelligence activities "are carefully reviewed and monitored," Perino said. She also noted that "all appropriate members of Congress have been briefed on the intelligence efforts of the United States." The government is collecting "external" data on domestic phone calls but is not intercepting "internals," a term for the actual content of the communication, according to a U.S. intelligence official familiar with the program. This kind of data collection from phone companies is not uncommon; it's been done before, though never on this large a scale, the official said. The data are used for "social network analysis," the official said, meaning to study how terrorist networks contact each other and how they are tied together. Carriers uniquely positioned AT&T recently merged with SBC and kept the AT&T name. Verizon, BellSouth and AT&T are the nation's three biggest telecommunications companies; they provide local and wireless phone service to more than 200 million customers. The three carriers control vast networks with the latest communications technologies. They provide an array of services: local and long-distance calling, wireless and high-speed broadband, including video. Their direct access to millions of homes and businesses has them uniquely positioned to help the government keep tabs on the calling habits of Americans. Among the big telecommunications companies, only Qwest has refused to help the NSA, the sources said. According to multiple sources, Qwest declined to participate because it was uneasy about the legal implications of handing over customer information to the government without warrants. Qwest's refusal to participate has left the NSA with a hole in its database. Based in Denver, Qwest provides local phone service to 14 million customers in 14 states in the West and Northwest. But AT&T and Verizon also provide some services - primarily long-distance and wireless - to people who live in Qwest's region. Therefore, they can provide the NSA with at least some access in that area. Created by President Truman in 1952, during the Korean War, the NSA is charged with protecting the United States from foreign security threats. The agency was considered so secret that for years the government refused to even confirm its existence. Government insiders used to joke that NSA stood for "No Such Agency." In 1975, a congressional investigation revealed that the NSA had been intercepting, without warrants, international communications for more than 20 years at the behest of the CIA and other agencies. The spy campaign, code-named "Shamrock," led to the Foreign Intelligence Surveillance Act (FISA), which was designed to protect Americans from illegal eavesdropping. Enacted in 1978, FISA lays out procedures that the U.S. government must follow to conduct electronic surveillance and physical searches of people believed to be engaged in espionage or international terrorism against the United States. A special court, which has 11 members, is responsible for adjudicating requests under FISA. Over the years, NSA code-cracking techniques have continued to improve along with technology. The agency today is considered expert in the practice of "data mining" - sifting through reams of information in search of patterns. Data mining is just one of many tools NSA analysts and mathematicians use to crack codes and track international communications. Paul Butler, a former U.S. prosecutor who specialized in terrorism crimes, said FISA approval generally isn't necessary for government data-mining operations. "FISA does not prohibit the government from doing data mining," said Butler, now a partner with the law firm Akin Gump Strauss Hauer & Feld in Washington, D.C. The caveat, he said, is that "personal identifiers" - such as names, Social Security numbers and street addresses - can't be included as part of the search. "That requires an additional level of probable cause," he said. The usefulness of the NSA's domestic phone-call database as a counterterrorism tool is unclear. Also unclear is whether the database has been used for other purposes. The NSA's domestic program raises legal questions. Historically, AT&T and the regional phone companies have required law enforcement agencies to present a court order before they would even consider turning over a customer's calling data. Part of that owed to the personality of the old Bell Telephone System, out of which those companies grew. Ma Bell's bedrock principle - protection of the customer - guided the company for decades, said Gene Kimmelman, senior public policy director of Consumers Union. "No court order, no customer information - period. That's how it was for decades," he said. The concern for the customer was also based on law: Under Section 222 of the Communications Act, first passed in 1934, telephone companies are prohibited from giving out information regarding their customers' calling habits: whom a person calls, how often and what routes those calls take to reach their final destination. Inbound calls, as well as wireless calls, also are covered. The financial penalties for violating Section 222, one of many privacy reinforcements that have been added to the law over the years, can be stiff. The Federal Communications Commission, the nation's top telecommunications regulatory agency, can levy fines of up to $130,000 per day per violation, with a cap of $1.325 million per violation. The FCC has no hard definition of "violation." In practice, that means a single "violation" could cover one customer or 1 million. In the case of the NSA's international call-tracking program, Bush signed an executive order allowing the NSA to engage in eavesdropping without a warrant. The president and his representatives have since argued that an executive order was sufficient for the agency to proceed. Some civil liberties groups, including the American Civil Liberties Union, disagree. Companies approached The NSA's domestic program began soon after the Sept. 11 attacks, according to the sources. Right around that time, they said, NSA representatives approached the nation's biggest telecommunications companies. The agency made an urgent pitch: National security is at risk, and we need your help to protect the country from attacks. The agency told the companies that it wanted them to turn over their "call-detail records," a complete listing of the calling histories of their millions of customers. In addition, the NSA wanted the carriers to provide updates, which would enable the agency to keep tabs on the nation's calling habits. The sources said the NSA made clear that it was willing to pay for the cooperation. AT&T, which at the time was headed by C. Michael Armstrong, agreed to help the NSA. So did BellSouth, headed by F. Duane Ackerman; SBC, headed by Ed Whitacre; and Verizon, headed by Ivan Seidenberg. With that, the NSA's domestic program began in earnest. AT&T, when asked about the program, replied with a comment prepared for USA TODAY: "We do not comment on matters of national security, except to say that we only assist law enforcement and government agencies charged with protecting national security in strict accordance with the law." In another prepared comment, BellSouth said: "BellSouth does not provide any confidential customer information to the NSA or any governmental agency without proper legal authority." Verizon, the USA's No. 2 telecommunications company behind AT&T, gave this statement: "We do not comment on national security matters, we act in full compliance with the law and we are committed to safeguarding our customers' privacy." Qwest spokesman Robert Charlton said: "We can't talk about this. It's a classified situation." In December, The New York Times revealed that Bush had authorized the NSA to wiretap, without warrants, international phone calls and e-mails that travel to or from the USA. The following month, the Electronic Frontier Foundation, a civil liberties group, filed a class-action lawsuit against AT&T. The lawsuit accuses the company of helping the NSA spy on U.S. phone customers. Last month, U.S. Attorney General Alberto Gonzales alluded to that possibility. Appearing at a House Judiciary Committee hearing, Gonzales was asked whether he thought the White House has the legal authority to monitor domestic traffic without a warrant. Gonzales' reply: "I wouldn't rule it out." His comment marked the first time a Bush appointee publicly asserted that the White House might have that authority. Similarities in programs The domestic and international call-tracking programs have things in common, according to the sources. Both are being conducted without warrants and without the approval of the FISA court. The Bush administration has argued that FISA's procedures are too slow in some cases. Officials, including Gonzales, also make the case that the USA Patriot Act gives them broad authority to protect the safety of the nation's citizens. The chairman of the Senate Intelligence Committee, Sen. Pat Roberts (news, bio, voting record), R-Kan., would not confirm the existence of the program. In a statement, he said, "I can say generally, however, that our subcommittee has been fully briefed on all aspects of the Terrorist Surveillance Program. ... I remain convinced that the program authorized by the president is lawful and absolutely necessary to protect this nation from future attacks." The chairman of the House Intelligence Committee, Rep. Pete Hoekstra, R-Mich., declined to comment. One company differs One major telecommunications company declined to participate in the program: Qwest. According to sources familiar with the events, Qwest's CEO at the time, Joe Nacchio, was deeply troubled by the NSA's assertion that Qwest didn't need a court order - or approval under FISA - to proceed. Adding to the tension, Qwest was unclear about who, exactly, would have access to its customers' information and how that information might be used. Financial implications were also a concern, the sources said. Carriers that illegally divulge calling information can be subjected to heavy fines. The NSA was asking Qwest to turn over millions of records. The fines, in the aggregate, could have been substantial. The NSA told Qwest that other government agencies, including the FBI, CIA and DEA, also might have access to the database, the sources said. As a matter of practice, the NSA regularly shares its information - known as "product" in intelligence circles - with other intelligence groups. Even so, Qwest's lawyers were troubled by the expansiveness of the NSA request, the sources said. The NSA, which needed Qwest's participation to completely cover the country, pushed back hard. Trying to put pressure on Qwest, NSA representatives pointedly told Qwest that it was the lone holdout among the big telecommunications companies. It also tried appealing to Qwest's patriotic side: In one meeting, an NSA representative suggested that Qwest's refusal to contribute to the database could compromise national security, one person recalled. In addition, the agency suggested that Qwest's foot-dragging might affect its ability to get future classified work with the government. Like other big telecommunications companies, Qwest already had classified contracts and hoped to get more. Unable to get comfortable with what NSA was proposing, Qwest's lawyers asked NSA to take its proposal to the FISA court. According to the sources, the agency refused. The NSA's explanation did little to satisfy Qwest's lawyers. "They told (Qwest) they didn't want to do that because FISA might not agree with them," one person recalled. For similar reasons, this person said, NSA rejected Qwest's suggestion of getting a letter of authorization from the U.S. attorney general's office. A second person confirmed this version of events. In June 2002, Nacchio resigned amid allegations that he had misled investors about Qwest's financial health. But Qwest's legal questions about the NSA request remained. Unable to reach agreement, Nacchio's successor, Richard Notebaert, finally pulled the plug on the NSA talks in late 2004, the sources said.
Post Comment Private Reply Ignore Thread Top Page Up Full Thread Page Down Bottom/Latest Begin Trace Mode for Comment # 83.
#1. To: Eoghan (#0)
That is it. We're officially, Nazi Germany.
This has been around for a while. It hasn't exactly been secret either. Lawyers have been supeonaing phone records for a long time now. Not saying it's a good thing, just not a big shiny new surprise.
I was in military signals intelligence for nearly 20 years. Some of the time I worked at NSA Headquarters itself. The whole SIGINT community took the limitations of FISA and USSID 18 extremely seriously. We had yearly indoctrination in USSID 18. We had to sign off that we had read the booklet on it, every year. There were very strict limitations on intercepting communications involving United States persons.
There were very strict limitations on intercepting communications involving United States persons. Wondering who exactly took the decision that this was no longer policy? And exactly when.. 9/11 was a watershed event not because of terrorists but because i was the end of civil liberties and Constitutional protection...
No. The end came before 9-11. 9-11 was just a consequence of doing so. Think about it. If even 1/10th of the people on each of those planes had been allowed the full force of their Second Amendment Rights, none of those planes would have been successfully flown to their intended targets.
Think about it. If even 1/10th of the people on each of those planes had been allowed the full force of their Second Amendment Rights, none of those planes would have been successfully flown to their intended targets. True.. if in fact there were terrorists aboard those planes and the controls werent being remotely controlled as has been theorized..
X-Files conspiracy meme. Completely contraverted by the fact that the Fourth plane ended up in a field instead of the White House.
The fourth plane was shot down, if indeed there was a plane that went down in PA. BTW, all Bowing aircraft have had electronics installed in them for many years to allow remote control of them, supposedly to take over the controls when a hijacking occurs. Germany cancelled a big contract with Boeing and went with Airbus of France when they found out about this, and the fact that the electronics which allow this remote control cannot be removed after-market. Here is a story which explains this in detail. BTW, this is the same technology used by AWACS aircraft and Global Hawks.
Remote Control Aircraft: An assault that military pilots stated on the record couldn't have been done by crack fighter pilots. Col. Donn de Grand Pre - former top US Pentagon arms salesman under the Ford and Carter administrations A group of military and civilian US pilots, under the chairmanship of Colonel Donn de Grand, after deliberating non-stop for 72 hours, has concluded that the flight crews of the four passenger airliners, involved in the September 11th tragedy, had no control over their aircraft. In a detailed press communiqué the inquiry stated: The so-called terrorist attack was in fact a superbly executed military operation carried out against the USA, requiring the utmost professional military skill in command, communications and control. It was flawless in timing, in the choice of selected aircraft to be used as guided missiles and in the coordinated delivery of those missiles to their pre-selected targets. The report seriously questions whether or not the suspect hijackers, supposedly trained on Cessna light aircraft, could have located a target dead-on 200 miles from take off point. It further throws into doubt their ability to master the intricacies of the instrument flight rules (IFR) in the 45 minutes from take off to the point of impact. Colonel de Grand said that it would be impossible for novices to have taken control of the four aircraft and orchestrated such a terrible act requiring military precision of the highest order. A member of the inquiry team, a US Air Force officer who flew over 100 sorties during the Vietnam war, told the press conference: Those birds (commercial airliners) either had a crack fighter pilot in the left seat, or they were being manoeuvred by remote control. Link Further pilot comments: "I seriously question whether these novices could have located a target dead-on 200 miles removed from takeoff point...-- much less controlled the flight and mastered the intricacies of 11FR (instrument flight rules) -- and all accomplished in 45 minutes." "If there was an AWACS on station over the targeted area, did it have a Global Hawk capability? I mean, could it convert the commercial jets to robotic flying missiles? "The fact is, all the transponders were turned off on the doomed flights virtually at the same time." Look at their departure times -- two from Logan (Boston), one from Newark, another from Dulles (Washington DC) -- all between 8 am and 8:15." "We were totally trained on the old type of hijack where you treat the hijacker cordially, punch a 4-digit code into your transponder to alert ground control you're being hijacked, and then get him where he wants to go, set the plane safely on the ground and let them deal with it on the ground. However, this is a totally new situation... Not one of the planes alerted ground control that they were being hijacked." Why? "I became more convinced that the four commercial jets were choreographed by a "conductor" from a central source, namely an airborne warning and control system (AWACS). They have the electronic capability to engage several aircraft simultaneously, knock out their on-board flight controls by EMP (electro- magnetic pulsing) and assume command and remote control of these targeted aircraft" Stan Goff former Special Forces officer: American Airlines Flight 77 - 9/11 -- "At 9:35, this plane conducts another turn, 360 degrees over the Pentagon, all the while being tracked by radar, and the Pentagon is not evacuated, and there are still no fast-movers from the Air Force in the sky over Alexandria and DC. Now, the real kicker. A pilot they want us to believe was trained at a Florida puddle-jumper school for Piper Cubs and Cessnas, conducts a well-controlled downward spiral, descending the last 7,000 feet in two-and-a-half minutes, brings the plane in so low and flat that it clips the electrical wires across the street from the Pentagon, and flies it with pinpoint accuracy into the side of this building at 460 nauts." [this is a landing by hijackers whose only interest was how to fly, NOT how to land an aircraft] Live Film Footage of United Airlines Flight 175's Long Range Approach to World Trade Center As any airline pilot will confirm independently, the 'reverse feel' on a Boeing 767 travelling at 575 mph is so high that the controls feel like lead, and simply cannot be moved as quickly as you see in the film without overwhelming hydraulic assistance, which can be provided only by the automatic flight director. The pilots themselves cannot disengage the 'reverse feel' placed on the controls, because it is an integrated feature designed to stop the pilots accidentally injuring passengers by imposing extreme "G" forces at high speeds. In turn this reveals the obvious: If qualified airline captains are incapable of flying a Boeing 767 in this manner, then it is completely out of the question for a bunch of "Arab Terrorist Hijackers", who failed their basic Cessna training courses in Florida. Put bluntly, this is the only known footage of United Airlines Flight 175 that completely destroys the government myth about 'Muslim fanatics' allegedly taking over American commercial jets. The [permissable] short clips showing Flight 175 just before impact do not allow time for such detailed analysis, but this long attack profile certainly does. Link Planes of 911 Exceeded Their Software Limits The Boeing 757 and 767 are equipped with fully autonomous flight capability, they are the only two Boeing commuter aircraft capable of fully autonomous flight. They can be programmed to take off, fly to a destination and land, completely without a pilot at the controls. They are intelligent planes, and have software limits pre set so that pilot error cannot cause passenger injury. Though they are physically capable of high g maneuvers, the software in their flight control systems prevents high g maneuvers from being performed via the cockpit controls. They are limited to approximately 1.5 g's, I repeat, one and one half g's. This is so that a pilot mistake cannot end up breaking grandma's neck. No matter what the pilot wants, he cannot override this feature. The plane that hit the Pentagon approached or reached its actual physical limits, military personnel have calculated that the Pentagon plane pulled between five and seven g's in its final turn. The same is true for the second aircraft to impact the WTC. There is only one way this can happen. As well as fully autonomous flight capability, the 767 and 757 are the ONLY COMMUTER PLANES MADE BY BOEING THAT CAN BE FLOWN VIA REMOTE CONTROL. It is a feature that is standard to all of them, all 757's and 767's can do it. The purpose for this is if there is a problem with the pilots, Norad can fly the planes to safe destinations via remote. Only in this flight mode can those craft exceed their software limits and perform to their actual physical limits because a pre existing emergency situation is assumed if this mode of flight is used. Terrorists in fact did not fly those planes, it is totally and completely impossible for those planes to have been flown in such a manner from the cockpit. Those are commuter aircraft, not F-16's and their software knows it. Link
Yeah... I suppose we didn't set foot on the moon either? There is a stunning level of ignorance in all this conspiracy crap that is almost frightening. I was a jet engine machanic for six years. I worked at Northwest airlines for another 2. All they needed to know for the Towers was the beacon freq, plug that into their Autopilot, and make one last minute course change to aim down a couple floors. Occamz Razor. There was no conspiracy by our Government. Not one that wouldn't involve so many people that there would have been massive leaks of info by now. All you get is nut case flim-flam and every one with a video or book to sell for only $19.95 if you order now...
How would you know that if you haven't done the research or investigation? You haven't read the books or seen the films, so you're not even examining the evidence. It's one thing to reject something after reviewing the issues that others raise, it's another to just reject them out of hand without even considering whether they might be true.
Correction. I haven't read all of the conspiracy crap. Nor do I intend to. I don't need to eat a spoonful of sh*t to know that I'm not going to enjoy the taste.
I don't read that conspiracy crap put out by the government either. Any one with half a brain can see 9/11 was an inside job.
Sorry to hear about your hemispherectomy, but that doesn't mean it was an "inside job".
There are no replies to Comment # 83. End Trace Mode for Comment # 83.
Top Page Up Full Thread Page Down Bottom/Latest |
||
[Home]
[Headlines]
[Latest Articles]
[Latest Comments]
[Post]
[Sign-in]
[Mail]
[Setup]
[Help]
|