Saletan: The NSA’s Phone-Call Database: A Defense of Mass Surveillance

But they have to tell us more
Politics • Views: 21,341

YouTube

Here’s an excellent piece by William Saletan: The NSA’s Phone-Call Database: A Defense of Mass Surveillance.

Some facts to counter the raging paranoia and fear-mongering of the libertarian left:

It sounds as though NSA goblins have been studying everyone’s phone calls. But that isn’t how the program works. It’s a two-stage process. The first stage—collection—is massive and indiscriminate. The second stage—examination of particular records—is restricted. We can argue over whether this two-tiered policy is too intrusive. But either way, our debate about it has focused on the wrong stage. The problem isn’t the data collection. It’s how the data are used.

The first document published by the Guardian, an order from the Foreign Intelligence Surveillance Court, instructs Verizon to “produce” to the NSA electronic copies of “all call detail records” related to phone calls within, to, or from the United States. Although the order pertains only to the date, length, and phone numbers involved in each call—not to what was said—it’s still a colossal demand. But what happens to the data once the NSA gets it? James Clapper, the director of national intelligence, gives this account:

“The collection is broad in scope because more narrow collection would limit our ability to screen for and identify terrorism-related communications. Acquiring this information allows us to make connections related to terrorist activities over time. … By order of the FISC, the Government is prohibited from indiscriminately sifting through the telephony metadata acquired under the program. … The court only allows the data to be queried when there is a reasonable suspicion, based on specific facts, that the particular basis for the query is associated with a foreign terrorist organization. … Only a very small fraction of the records are ever reviewed because the vast majority of the data is not responsive to any terrorism-related query.”

In other words, the rules that most of us would apply at the collection stage—reasonable suspicion, specific facts, court approval—are applied instead at the query stage. Michael Hayden, the former head of the NSA, CIA, and national intelligence office under President Bush (no, he didn’t hold all three of those jobs at once), describes how the program operates. “The government acquires records … from the telecom providers, but then doesn’t go into that database without an arguable reason connected to terrorism to ask that database a question,” Hayden explained on Fox News Sunday. For instance, “You roll up something in Waziristan. You get a cell phone. It’s the first time you’ve ever had that cell phone number. You know it’s related to terrorism because of the pocket litter you’ve gotten in that operation. Here’s how it works: You simply ask that database, ‘Hey, any of you phone numbers in there ever talked to this phone number in Waziristan?’ “

Note the indefinite past tense. The analyst asks whether any of the numbers in the database has ever talked to the number in Waziristan. That’s why the database is colossal: Its aspiration is to capture and preserve records of every call so that no potential lead is missed. Big Brother isn’t watching you. But he does want your records in the database so that if any number you called later surfaces in a plot, he can look back through history, spot the connection, and check you out.

Note that Saletan is not blindly supporting this massive data collection, either. He concludes by making the point I’ve tried to make all along — that there needs to be more transparency about what is being collected and how it’s being used. That would go a long way toward counteracting the hysterical accusations made by demagogues like Glenn Greenwald.

Jump to bottom

32 comments
1 Sol Berdinowitz  Tue, Jun 11, 2013 10:58:57am

just take out the “le” and what do you have?

SATAN!

2 erik_t  Tue, Jun 11, 2013 11:00:02am

So the idea is to make non-persistent potential data into persistent potential data. A stenographer in a courtroom.

Presented in that vein, it does not feel objectionable to me.

3 Kragar  Tue, Jun 11, 2013 11:01:37am

Maybe it just come from being in computer security and involved with the military for so long, but I don’t really see a problem with the program.

4 Lidane  Tue, Jun 11, 2013 11:01:38am
5 Sol Berdinowitz  Tue, Jun 11, 2013 11:02:44am

re: #3 Kragar

Maybe it just come from being in computer security and involved with the military for so long, but I don’t really see a problem with the program.

Nor did any of the senators and representatives who voted for it, nor the President who signed it into law…

6 Charles Johnson  Tue, Jun 11, 2013 11:03:13am

re: #2 erik_t

So the idea is to make non-persistent potential data into persistent potential data. A stenographer in a courtroom.

Presented in that vein, it does not feel objectionable to me.

Notice that Saletan confirms what I’ve been saying - the phone metadata is only being collected. The only analysis that takes place is when there’s a reasonable suspicion and legal procedures have been followed to request that analysis.

7 Kragar  Tue, Jun 11, 2013 11:03:57am

The same folks who feel the government is tracking their every movement are the ones screaming loudest on Facebook and Twitter.

Please proceed.

8 erik_t  Tue, Jun 11, 2013 11:06:15am

re: #6 Charles Johnson

Notice that Saletan confirms what I’ve been saying - the phone metadata is only being collected. The only analysis that takes place is when there’s a reasonable suspicion and legal procedures have been followed to request that analysis.

Well, obviously, right? Only an idiot would spend the time and money on human analysis of such a broad net.

The NSA does not care how often you call your grandmother, TGDN (although really, she spent a lot of time and effort helping your folks raise you and it really wouldn’t kill you to give her a ring every now and then, would it?).

9 Targetpractice  Tue, Jun 11, 2013 11:06:18am

re: #6 Charles Johnson

Notice that Saletan confirms what I’ve been saying - the phone metadata is only being collected. The only analysis that takes place is when there’s a reasonable suspicion and legal procedures have been followed to request that analysis.

The argument I’ve heard, and can somewhat see, is that the collection and storing of that data provides opportunities for abuse that go unreported and unacknowledged to the public in the name of secrecy. There’s no real means of accountability because the NSA plays its cards so close to its chest that admitting somebody under its aegis was engaged in illegal behavior calls into question its ability to keep people’s data under wraps.

10 Kragar  Tue, Jun 11, 2013 11:06:48am

re: #6 Charles Johnson

Notice that Saletan confirms what I’ve been saying - the phone metadata is only being collected. The only analysis that takes place is when there’s a reasonable suspicion and legal procedures have been followed to request that analysis.

No different than firewall logs collecting data, and then querying them if you find a suspicious IP address, only on a vastly larger scale with additional security and privacy laws in place.

Again, it seems like the only criminal activity that Greenwald uncovered was his own and Snowden’s.

11 iossarian  Tue, Jun 11, 2013 11:07:50am

I’m still not sure exactly where I come down on this. Tentatively, though, I do think that the initial leak of data could be viewed as (unfortunately) necessary in order to get people (especially on the right) to actually take seriously the idea of increasing transparency.

I’ve said similar things in the past I think. It would be nice if we had a robust ongoing discussion about where to draw the line between privacy and security. Unfortunately we don’t, largely due to the hysteria around patriotism that the right wing has whipped up since 9/11.

As a result, we rely on episodes such as this to enable such a debate.

12 Kragar  Tue, Jun 11, 2013 11:07:59am

re: #9 Targetpractice

The argument I’ve heard, and can somewhat see, is that the collection and storing of that data provides opportunities for abuse that go unreported and unacknowledged to the public in the name of secrecy. There’s no real means of accountability because the NSA plays its cards so close to its chest that admitting somebody under its aegis was engaged in illegal behavior calls into question its ability to keep people’s data under wraps.

You mean like the chance that some 29 year old schmuck can lie and get his hands on the data and exploit it for his own purposes?

I can’t see that happening.
/

13 Decatur Deb  Tue, Jun 11, 2013 11:08:42am

re: #7 Kragar

The same folks who feel the government is tracking their every movement are the ones screaming loudest on Facebook and Twitter.

Please proceed.

Big Brother Is Bored With You.

14 erik_t  Tue, Jun 11, 2013 11:09:24am

re: #12 Kragar

You mean like the chance that some 29 year old schmuck can lie and get his hands on the data and exploit it for his own purposes?

I honestly haven’t been following this story all that closely. Do we know that some 29 year old schmuck can get his hands on anything but a shitty powerpoint?

15 Randall Gross  Tue, Jun 11, 2013 11:09:25am

It’s a giant game of “Go Fish” — do you have any numbers that called Bin Laden’s burner?

16 Targetpractice  Tue, Jun 11, 2013 11:09:40am

re: #12 Kragar

You mean like the chance that some 29 year old schmuck can lie and get his hands on the data and exploit it for his own purposes?

I can’t see that happening.
/

That’s rather the point, the NSA has put too much power and access into the hands of guys like Edward Snowden, private contractors whose loyalty extends as far as their next paycheck. We’re not talking an analyst in the depths of Langley who spent years quietly making copies of documents, one by one, and leaving them in dead drops. We’re talking a desk jockey who grabbed up a shitload of data and was out the door on a plane to HK before anybody thought to send the cops by his house.

17 Absalom, Absalom, Obdicut  Tue, Jun 11, 2013 11:10:01am

re: #9 Targetpractice

The argument I’ve heard, and can somewhat see, is that the collection and storing of that data provides opportunities for abuse that go unreported and unacknowledged to the public in the name of secrecy. There’s no real means of accountability because the NSA plays its cards so close to its chest that admitting somebody under its aegis was engaged in illegal behavior calls into question its ability to keep people’s data under wraps.

This is my problem as well. The possibilities of blackmail alone are massive.

I object to the collection, I object to Obama doing it. I think that it is part of a broad discussion on privacy, and while it’s a negative against Obama it’s also a negative against the majority of politicians in this country.

18 Decatur Deb  Tue, Jun 11, 2013 11:10:25am

re: #14 erik_t

I honestly haven’t been following this story all that closely. Do we know that some 29 year old schmuck can get his hands on anything but a shitty powerpoint?

We have Greenwald’s word on it.

19 jaunte  Tue, Jun 11, 2013 11:10:38am

re: #9 Targetpractice

The argument I’ve heard, and can somewhat see, is that the collection and storing of that data provides opportunities for abuse that go unreported and unacknowledged to the public in the name of secrecy. There’s no real means of accountability because the NSA plays its cards so close to its chest that admitting somebody under its aegis was engaged in illegal behavior calls into question its ability to keep people’s data under wraps.

I’ve read worries about the potential for blackmail, but this seems like an extremely cumbersome method for a blackmailer to attempt.

20 Kragar  Tue, Jun 11, 2013 11:10:45am

re: #13 Decatur Deb

Big Brother Is Bored With You.

Conspiracy theories are very comforting. It means someone out there thinks you’re important enough to plot against.

21 Kragar  Tue, Jun 11, 2013 11:13:08am

re: #16 Targetpractice

That’s rather the point, the NSA has put too much power and access into the hands of guys like Edward Snowden, private contractors whose loyalty extends as far as their next paycheck. We’re not talking an analyst in the depths of Langley who spent years quietly making copies of documents, one by one, and leaving them in dead drops. We’re talking a desk jockey who grabbed up a shitload of data and was out the door on a plane to HK before anybody thought to send the cops by his house.

Except I haven’t seen him expose any of the actual data yet. He’s handed out some powerpoint slides giving an overview of operations, but nothing that shows he ever actually saw any of the data in question.

22 Ace-o-aces  Tue, Jun 11, 2013 11:13:54am

Herere: #12 Kragar

You mean like the chance that some 29 year old schmuck can lie and get his hands on the data and exploit it for his own purposes?
/

Well, yeah, exactly. There’s no way to know if your data has been accessed. Maybe some guy at the NSA decides to see if his wife is cheating on him. Maybe a political appointee wants to see if a candidate has been calling phone sex lines. What are the procedures to protect against this? Is there any way you can ever see if your data has been looked at?

23 Political Atheist  Tue, Jun 11, 2013 11:14:07am

re: #6 Charles Johnson

One thing that would make me more comfortable with the use of the data would be if these anti terror tools remained strictly anti terror tools.

An oft quoted stat is that anti terror (as of a year or so ago) was about 15% of usage. 85% for other kinds of crimes. The FBI has been seen as abusing even the expanded powers, just ask the ACLU.

There have been plenty of Inspector General reports published about the act. Some point to government abuse of it, and others highlight that the Patriot Act is often invoked for reasons unrelated to terrorism.

One report shows that of the 143,000 national security letters issued between 2003-2005, the FBI said it referred 53 cases for prosecution. (.pdf) None were for terrorism.

The law also grants so-called “black bag” or “sneak and peek” searches in which the authorities may delay notifying a property owner that an area has been searched. In 2010, less than 1 percent of the 3,970 such searches were terror-related. About 76 percent were drug-related.

wired.com

Mission creep or quick jog?

24 Absalom, Absalom, Obdicut  Tue, Jun 11, 2013 11:15:08am

re: #21 Kragar

Except I haven’t seen him expose any of the actual data yet. He’s handed out some powerpoint slides giving an overview of operations, but nothing that shows he ever actually saw any of the data in question.

That is the really pivotal point. Are his claims about unregulated capability true?

Those are really dubious to me. They’re self-aggrandizing.

25 Targetpractice  Tue, Jun 11, 2013 11:16:06am

re: #21 Kragar

Except I haven’t seen him expose any of the actual data yet. He’s handed out some powerpoint slides giving an overview of operations, but nothing that shows he ever actually saw any of the data in question.

Which is what makes this case simultaneously frustrating and infuriating. How does one have a serious debate when we can’t even be sure what’s really going on? I understand the need for this data and the need to be able to connect the dots via calls, but I understand also the argument that the collection and storing of months worth of metadata from millions of users presents an opportunity for abuse in a system where accountability is subject to secrecy.

26 Decatur Deb  Tue, Jun 11, 2013 11:16:50am

re: #23 Political Atheist

One thing that would make me more comfortable with the use of the data would be if these anti terror tools remained strictly anti terror tools.

An oft quoted stat is that anti terror (as of a year or so ago) was about 15% of usage. 85% for other kinds of crimes. The FBI has been seen as abusing even the expanded powers, just ask the ACLU.

wired.com

Mission creep or quick jog?

Drugs are terrorism.
Prostitution is terrorism.
Video piracy is terrorism.
Money laundering is terrorism.

If you own the dictionary.

27 StephenMeansMe  Tue, Jun 11, 2013 11:21:49am

re: #23 Political Atheist

Abuse of precedent is also, coincidentally, at the root of the IRS scandal. The IRS wasn’t always a political blunt instrument, but…

Re: metadata, some strong privacy advocates balk at even that, but I think that’s a bit silly. Better to increase transparency… this stuff shouldn’t really be secret, since they’re “just collecting metadata.” Better that we know (maybe not immediately, but very soon after) when that metadata gets probed, and why.

28 Backwoods_Sleuth  Tue, Jun 11, 2013 11:27:09am

re: #8 erik_t


upding for considerate thoughts about grandma

29 Political Atheist  Tue, Jun 11, 2013 11:35:24am

re: #26 Decatur Deb

Drugs are terrorism.
Prostitution is terrorism.
Video piracy is terrorism.
Money laundering is terrorism.

If you own the dictionary.

Even more fun-On what a weapon of mass destruction is. FBI=Any explosive. United Nations-Nuclear/Bio/Chem weapons at scale.

A kid is in huge federal trouble after putting dry ice in a water bottle and putting that in the trash. It just blew the cap off. But this was at Disneyland and the all seeing mouse is officially frightened.

Christian Barnes, 22, was booked on suspicion of possession of a destructive device and is being held in lieu of $1-million bail. The explosion Tuesday forced the evacuation of Toontown.

Expert: Dry-ice bomb like Disneyland blast unlikely to do harm

Next up-Pop your finger out of your mouth and watch the first responders show up.

30 Absalom, Absalom, Obdicut  Tue, Jun 11, 2013 11:36:47am

re: #27 StephenMeansMe

I don’t think you’re up to date on the IRS ‘scandal’.

31 Feline Fearless Leader  Tue, Jun 11, 2013 11:37:43am

re: #29 Political Atheist

Even more fun-On what a weapon of mass destruction is. FBI=Any explosive. United Nations-Nuclear/Bio/Chem weapons at scale.

A kid is in huge federal trouble after putting dry ice in a water bottle and putting that in the trash. It just blew the cap off. But this was at Disneyland and the all seeing mouse is officially frightened.

Next up-Pop your finger out of your mouth and watch the first responders show up.

But how much business and income does Disney lose for have to evac and close the place*. And does that also damage future business as well?

* - Plus I’m sure they will see a couple of nuisance “you ruined my vacation, waaah!” civil suits.

32 Decatur Deb  Tue, Jun 11, 2013 11:39:22am

re: #31 Feline Fearless Leader

But how much business and income does Disney lose for have to evac and close the place*. And does that also damage future business as well?

* - Plus I’m sure they will see a couple of nuisance “you ruined my vacation, waaah!” civil suits.

Don’t care if they screw the dimwit over. It’s the language that’s being tortured.


This article has been archived.
Comments are closed.

Jump to top

Create a PageThis is the LGF Pages posting bookmarklet. To use it, drag this button to your browser's bookmark bar, and title it 'LGF Pages' (or whatever you like). Then browse to a site you want to post, select some text on the page to use for a quote, click the bookmarklet, and the Pages posting window will appear with the title, text, and any embedded video or audio files already filled in, ready to go.
Or... you can just click this button to open the Pages posting window right away.
Last updated: 2023-04-04 11:11 am PDT
LGF User's Guide RSS Feeds

Help support Little Green Footballs!

Subscribe now for ad-free access!Register and sign in to a free LGF account before subscribing, and your ad-free access will be automatically enabled.

Donate with
PayPal
Cash.app
Recent PagesClick to refresh
Texas County at Center of Border Fight Is Overwhelmed by Migrant Deaths EAGLE PASS, Tex. - The undertaker lighted a cigarette and held it between his latex-gloved fingers as he stood over the bloated body bag lying in the bed of his battered pickup truck. The woman had been fished out ...
Cheechako
2 days ago
Views: 134 • Comments: 0 • Rating: 1