NSA call database

From Wikipedia, the free encyclopedia
Jump to: navigation, search

The NSA call database is a database created by the United States National Security Agency (NSA) that contains hundreds of billions of records of telephone calls made by U.S. citizens from the four largest telephone carriers in the United States: AT&T, SBC, BellSouth (all three now called AT&T), and Verizon.[1]

The existence of this database and the NSA program that compiled it was unknown to the general public until USA Today broke the story on May 10, 2006.[1] It is estimated that the database contains over 1.9 trillion call-detail records.[2] According to Bloomberg News, the effort began approximately seven months before the September 11, 2001 attacks.[3]

The records include detailed call information (caller, receiver, date/time of call, length of call, etc) for use in traffic analysis and social network analysis, but do not include audio information or transcripts of the content of the phone calls.

The database's existence has prompted fierce objections from those who view it as a warrantless or illegal search and a violation of the pen register provisions of the Foreign Intelligence Surveillance Act and (in some cases) the Fourth Amendment of the United States Constitution.

The George W. Bush administration has neither confirmed nor denied the existence of the domestic call record database. This contrasts with a related NSA controversy concerning warrantless surveillance of selected telephone calls; in that case they did confirm the existence of the program of debated legality. The program's code name is Stellar wind.[4]

Similar programmens exist or are planned in other countries, including Sweden (Titan traffic database) and Great Britain (Interception Modernisation Programme)

Contents

[edit] Law suit

The Electronic Frontier Foundation filed a related suit against AT&T on 31 January 2006, alleging that the firm had given NSA access to its database, a charge reiterated in the USA Today article. [5] Verizon and BellSouth have both claimed they were never contacted by the NSA, nor did they provide any information to the agency,[6][7] though US codes of law[8] permit companies to lie about their activities when the President believes that telling the truth would compromise national security.[9]

[edit] Internet monitoring

On May 22, 2006, it was revealed by investigative reporter Seymour Hersh and Wired magazine that the program involved the NSA setting up splitters to the routing cores of many telecoms companies and to major Internet traffic hubs. These provided a direct connection via an alleged "black room" known as Room 641A. This room allows most U.S. telecoms communications and Internet traffic to be redirected to the NSA. The NSA used them to eavesdrop and order police investigations of tens of thousands of ordinary Americans without judicial warrants.

According to a security consultant who worked on the program, "What the companies are doing is worse than turning over records ... they’re providing total access to all the data", and a former senior intelligence official said, "This is not about getting a cardboard box of monthly phone bills in alphabetical order ... the N.S.A. is getting real-time actionable intelligence." [10][11]

On June 30, 2006 USA Today printed a partial retraction about its controversial article the prior month saying: "... USA TODAY also spoke again with the sources who had originally provided information about the scope and contents of the domestic calls database. All said the published report accurately reflected their knowledge and understanding of the NSA program, but none could document a contractual relationship between BellSouth or Verizon and the NSA, or that the companies turned over bulk calling records to the NSA. Based on its reporting after the May 11 article, USA TODAY has now concluded that while the NSA has built a massive domestic calls record database involving the domestic call records of telecommunications companies, the newspaper cannot confirm that BellSouth or Verizon contracted with the NSA to provide bulk calling records to that database ..." [12]

[edit] Denials

Five days after the story appeared, BellSouth officials said they could not find evidence of having handed over such records. "Based on our review to date, we have confirmed no such contract exists and we have not provided bulk customer calling records to the NSA," the officials said. USA Today replied that BellSouth officials had not denied the allegation when contacted the day before the story was published [13]. Verizon has also asserted that it has not turned over such records.[14]

Companies are permitted by US securities law (15 U.S.C. 78m(b)(3)(A)) to refrain from properly accounting for their use of assets in matters involving national security, when properly authorized by an agency or department head acting under authorization by the President. [15] This legalese essentially means that companies can falsify their accounting reports and lie about their activities when the President decides that it is in the interests of national security to do so. President Bush issued a presidential memorandum on May 5, 2006 delegating authority to make such a designation to Director of National Intelligence John Negroponte, just as the NSA call database scandal appeared in the media.[16]

[edit] Qwest Communications

The USA Today report indicated that Qwest's then CEO, Joseph Nacchio, doubted the NSA's assertion that warrants were unnecessary. In negotiations, the NSA pressured the company to turn over the records. Qwest attorneys asked the NSA to obtain approval from the United States Foreign Intelligence Surveillance Court. When the NSA indicated they would not seek this approval, Qwest's new CEO Richard Notebaert declined NSA's request for access. Later, T-Mobile explicitly stated they do not participate in warrantless surveillance.[17]

[edit] Contents of the database

According to the article, the database is "the largest database ever assembled in the world", and contains call-detail records (CDRs) for all phone calls, domestic and international. A call-detail record consists of the phone numbers of the callers and recipients along with time and duration of the call. While the database does not contain specific names or addresses, that information is widely available from non-classified sources.[1]

According to the research group TeleGeography, AT&T (including the former SBC), Verizon, and BellSouth connected nearly 500 billion telephone calls in 2005 and nearly 2 trillion calls since late 2001.[18] It is reported that all four companies were paid to provide the information to the NSA.[19][20]

[edit] Uses of the database

Although such a database of phone records would not be useful on its own as a tool for national security, it could be used as an element of broader national security analytical efforts and data mining. These efforts could involve analysts using the data to connect phone numbers with names and links to persons of interest.[21][22] Such efforts have been the focus of the NSA's recent attempts to acquire key technologies from high tech firms in Silicon Valley and elsewhere. Link analysis software, such as Link Explorer or the Analyst's Notebook, is used by law enforcement to organize and view links that are demonstrated through such information as telephone and financial records, which are imported into the program from other sources.[23] Neural network software is used to detect patterns, classify and cluster data as well as forecast future events.[24]

Using relational mathematics it is possible to find out if someone changes their telephone number by analyzing and comparing calling patterns.[citation needed]

ThinThread, a system which pre-dated this database, but was discarded for the Trailblazer Project, may have introduced some of the technology which is used to analyze the data [6]. Where ThinThread encrypted privacy data, however, no such measures have been reported with respect to the current system.

[edit] Government and public response

  • Later on Meet the Press, Gingrich stated that "everything that has been done is totally legal," and he said the NSA program was defending the indefensible, "because they refuse to come out front and talk about it."[28]

[edit] Polls

[edit] Political action

The Senate Armed Services Committee was scheduled to hold hearings with NSA whistle-blower Russell Tice the week following the revelation of the NSA call database. Tice indicated that his testimony would reveal information on additional illegal activity related to the NSA call database that has not yet been made public, and that even a number of NSA employees believe what they are doing is illegal. Tice also told the National Journal that he "will not confirm or deny" if his testimony will include information on spy satellites being used to spy on American citizens from space. [36] However, these hearings did not occur and the reason why is unknown.

[edit] Lawsuits

[edit] Claims

New Jersey

Spurred by the public disclosure of the NSA call database, a lawsuit was filed against Verizon on May 12, 2006 at the Federal District Court in Manhattan by Princeton, N.J.-based attorneys Carl Mayer and Bruce Afran. The lawsuit seeks $1,000 for each violation of the Telecommunications Act of 1996, and would total approximately $5 billion if the court certifies the suit as a class-action lawsuit.[37]

Oregon

On May 12, 2006, an Oregon man filed a lawsuit against Verizon Northwest for $1 billion.[38]

Maine

On May 13, 2006, a complaint in Maine was filed by a group of 21 Maine residents who asked the Public Utilities Commission (PUC) to demand answers from Verizon about whether it provided telephone records and information to the federal government without customers' knowledge or consent. Maine law requires the PUC to investigate complaints against a utility if a petition involves at least 10 of the utility's customers.[39]

California (E.F.F.)

Shortly after the NSA call database story surfaced, a San Francisco lawsuit, Hepting v. AT&T, was filed by the Electronic Frontier Foundation.[40][41]

[edit] Justice Department response

The Los Angeles Times reported on May 14, 2006, that the U.S. Justice Department called for an end to an eavesdropping lawsuit against AT&T Corp., citing possible damage from the litigation to national security.[40][42]

The US government indicated in an April 28 Statement of Interest in the AT&T case, that it intends to invoke the State Secrets Privilege in a bid to dismiss the action.

[edit] Legal status

The NSA call database was not approved by the Foreign Intelligence Surveillance Court (FISC) as required by the Foreign Intelligence Surveillance Act (FISA). The FISC was established in 1978 to secretly authorize access to call-identifying information and interception of communications of suspected foreign agents on U.S. soil.[40] Stanford Law School's Chip Pitts has a good overview of the relevant legal concerns in The Washington Spectator.[43]

Separate from the question of whether the database is illegal under FISA, one may ask whether the call detail records are covered by the privacy protection of the Fourth Amendment of the U.S. Constitution. This is unclear. As the U.S. has no explicit constitutional guarantee on the secrecy of correspondence, any protection on communications is an extension by litigation of the privacy provided to "houses and papers".[44] This again is dependent on the flexuous requirement of a reasonable expectation of privacy.

The most relevant U.S. Supreme Court case is Smith v. Maryland.[45] In that case, the Court addressed pen registers, which are mechanical devices that record the numbers dialed on a telephone; a pen register does not record call contents. The Court ruled that pen registers are not covered by the Fourth Amendment: "The installation and use of a pen register, [...] was not a 'search,' and no warrant was required." More generally, "This Court consistently has held that a person has no legitimate expectation of privacy in information he [...] voluntarily turns over to third parties."

The data collecting activity may however be illegal under other telecommunications privacy laws.

[edit] The Stored Communications Act

The 1986 Stored Communications Act (18 U.S.C. § 2701) forbids turnover of information to the government without a warrant or court order, the law gives consumers the right to sue for violations of the act.[46][47]

"A governmental entity may require the disclosure by a provider of electronic communication service of the contents of a wire or electronic communication...only pursuant to a warrant issued using the procedures described in the Federal Rules of Criminal Procedure"[48]

However, the Stored Communications Act also authorizes phone providers to conduct electronic surveillance if the Attorney General of the United States certifies that a court order or warrant is not required and that the surveillance is required:

[Telephone providers] are authorized to...intercept...communications or to conduct electronic surveillance...if such provider...has been provided with a certification in writing by...the Attorney General of the United States that no warrant or court order is required by law, that all statutory requirements have been met, and that the specified assistance is required.[49]

The Act provides for special penalties for violators when "the offense is committed...in violation of the Constitution or laws of the United States or any State."[48]

Finally, the act allows any customer whose telephone company provided this information to sue that company in civil court for (a) actual damages to the consumer, (b) any profits by the telephone company, (c) punitive damages, and (d) attorney fees. The minimum amount a successful customer will recover under (a) and (b) is $1,000:

"The court may assess as damages in a civil action under this section the sum of the actual damages suffered by the plaintiff and any profits made by the violator as a result of the violation, but in no case shall a person entitled to recover receive less than the sum of $1,000. If the violation is willful or intentional, the court may assess punitive damages. In the case of a successful action to enforce liability under this section, the court may assess the costs of the action, together with reasonable attorney fees determined by the court." (18 U.S.C. § 2707(c) damages)[48]

[edit] Communications Assistance for Law Enforcement Act

President Clinton signed into law the Communications Assistance for Law Enforcement Act of 1994, after it was passed in both the House and Senate by a voice vote. That law is an act "to make clear a telecommunications carrier's duty to cooperate in the interception of communications for law enforcement purposes, and for other purposes." The act states that a court order isn't the only lawful way of obtaining call information, saying, "A telecommunications carrier shall ensure that any interception of communications or access to call-identifying information effected within its switching premises can be activated only in accordance with a court order or other lawful authorization."[50]

[edit] Historical background

The FISC was inspired by the recommendations of the Church Committee, [51] which investigated a wide range of intelligence and counter-intelligence incidents and programs, including some U.S. Army programs and the FBI program COINTELPRO.

In 1971, the US media reported that COINTELPRO targeted thousands of Americans during the 1960s, after several stolen FBI dossiers were passed to news agencies.[52] The Church Committee Senate final report, which investigated COINTELPRO declared that:

Too many people have been spied upon by too many Government agencies and too much information has been collected. The Government has often undertaken the secret surveillance of citizens on the basis of their political beliefs, even when those beliefs posed no threat of violence or illegal acts on behalf of a hostile foreign power. The Government, operating primarily through secret informants, but also using other intrusive techniques such as wiretaps, microphone "bugs," surreptitious mail opening, and break-ins, has swept in vast amounts of information about the personal lives, views, and associations of American citizens. Investigations of groups deemed potentially dangerous -- and even of groups suspected of associating with potentially dangerous organizations -- have continued for decades, despite the fact that those groups did not engage in unlawful activity.[53][54]

[edit] Legality

The legality of blanket wiretapping has never been sustained in court, but on July 10, 2008 the US Congress capitulated to the administration in granting blanket immunity to the administration and telecom industry for potentially illegal domestic surveillance.

[edit] See also

[edit] Notes

  1. ^ a b c d Cauley, Leslie (2006-05-11). "NSA has massive database of Americans' phone calls". usatoday.com. http://www.usatoday.com/news/washington/2006-05-10-nsa_x.htm. Retrieved 2006-05-11. 
  2. ^ "Three Major Telecom Companies Help US Government Spy on Millions of Americans". Democracy Now!. http://www.democracynow.org/article.pl?sid=06/05/12/1353225. Retrieved 2006-05-15. 
  3. ^ Harris, Andrew (June 30, 2006). "Spy Agency Sought U.S. Call Records Before 9/11, Lawyers Say" (in English). Bloomberg News. http://www.bloomberg.com/apps/news?pid=20601087&sid=abIV0cO64zJE&refer=. Retrieved 2009-03-11. 
  4. ^ Now We Know What the Battle Was About Newsweek 13 December 2008
  5. ^ [1]
  6. ^ [2]
  7. ^ Verizon says it isn't giving call records to NSA
  8. ^ TITLE 15, CHAPTER 2B, § 78m (b)(3)(A)
  9. ^ [3]
  10. ^ Hersh, Seymour (May 22, 2006). "Listening In". The New Yorker. http://www.newyorker.com/talk/content/articles/060529ta_talk_hersh. 
  11. ^ "Whistle-Blower's Evidence, Uncut". Wired. May 22, 2006. http://www.wired.com/news/technology/0,70944-0.html?tw=wn_index_18. 
  12. ^ Editors, USA Today (June 30, 2006). "A note to our readers". USA Today. http://www.usatoday.com/printedition/news/20060630/wherenote.art.htm. 
  13. ^ [4]
  14. ^ Drinkard, Jim (2006-05-16). "Verizon says it isn't giving call records to NSA". USA Today. http://www.usatoday.com/news/washington/2006-05-16-verizon-nsa_x.htm. Retrieved 2006-05-22. 
  15. ^ [5]
  16. ^ George W. Bush (May 12, 2006). "Memorandum of May 5, 2006: Assignment of Function Relating to Granting of Authority for Issuance of Certain Directives". Federal Register 71 (92): 27941–27943. http://a257.g.akamaitech.net/7/257/2422/01jan20061800/edocket.access.gpo.gov/2006/06-4538.htm. 
  17. ^ "Callers Can't Hide". Forbes. http://www.forbes.com/technology/2006/05/11/wireless-nsa-voip_cx_df_0511security.html. Retrieved 2006-05-15. 
  18. ^ "Data on Phone Calls Monitored". Washington Post. http://www.washingtonpost.com/wp-dyn/content/article/2006/05/11/AR2006051100539.html. Retrieved 2006-05-12. [dead link]
  19. ^ "Hold the Phone". Newsweek. http://msnbc.msn.com/id/12779087/site/newsweek/page/2/. Retrieved 2006-05-22. 
  20. ^ Since the NSA request, SBC has merged with AT&T, making the number of companies now involved three, not four.
  21. ^ Michael R. Ronczkowski (2003)Terrorism and Organized Hate Crime: Intelligence Gathering, Analysis, and Investigations, CRC Press LLC, ISBN 0-8493-2012-7, pp. 101-106.
  22. ^ Robert M. Clark (2003), Intelligence Analysis: A Target-Centric Approach, CQ Press, ISBN 1-56802-830-X.
  23. ^ Taking Spying to Higher Level, Agencies Look for More Ways to Mine Data, New York Times
  24. ^ Missile Defense Agency (PDF file)
  25. ^ "Bush defends surveillance". WIS 10 TV, wistv.com. http://www.wistv.com/Global/story.asp?S=4894270. Retrieved 2006-05-11. 
  26. ^ "Specter Demands Phone Companies Testify on Database (Update1)". Bloomberg. http://www.bloomberg.com/apps/news?pid=10000103&sid=a5unahPcm.Fw&refer=us. 
  27. ^ "Gingrich on NSA Phone Records Program: Administration’s Conduct Can’t ‘Be Defended By Reasonable People’". Think Progress. http://thinkprogress.org/2006/05/12/gingrich-on-nsa/. 
  28. ^ "Immigration, NSA Wiretapping, and Iraq". Meet the Press interview, on www.newt.org. http://www.newt.org/backpage.asp?art=3051. Retrieved 2006-05-16. 
  29. ^ a b "Quotes About the NSA Collecting Data". Associated Press. http://news.yahoo.com/s/ap/20060511/ap_on_go_ca_st_pe/nsa_phone_records_quotes_1. Retrieved 2006-05-11.  May 11, 2006
  30. ^ Commissioner Copps calls for the FCC to open an inquiry into the lawfulness of the disclosure of America's phone records (FCC)
  31. ^ "Robertson speaks to teens". www.manassasjm.com. http://www.manassasjm.com/servlet/Satellite?pagename=MJM%2FMGArticle%2FWPN_BasicArticle&c=MGArticle&cid=1137836062436&path=!news. Retrieved 2006-05-15. 
  32. ^ "BellSouth denies giving records to NSA". cnn.com. http://www.cnn.com/2006/POLITICS/05/15/bellsouth.nsa/. Retrieved 2006-05-15. 
  33. ^ "Newsweek". http://www.msnbc.msn.com/id/12771821/site/newsweek/. 
  34. ^ "Washington Post-ABC News Poll". Washington Post-ABC News. http://www.washingtonpost.com/wp-srv/politics/polls/postpoll_nsa_051206.htm. Retrieved 2006-05-12.  May 12, 2006
  35. ^ "UPDATE: Early 'Wash Post' Poll on NSA Phone Spying Refuted". editorandpublisher.com. http://www.editorandpublisher.com/eandp/news/article_display.jsp?vnu_content_id=1002502415. 
  36. ^ NSA Whistleblower To Expose More Unlawful Activity: ‘People…Are Going To Be Shocked’, Think Progress
  37. ^ "Mayer, Afran, et al. v. Verizon Communications, NSA, George W. Bush" (PDF). cryptome.org. http://cryptome.org/mayer-001.pdf. Retrieved 2006-05-17. 
  38. ^ "Beaverton man sues Verizon Northwest for $1 billion". OregonLive.com. http://www.oregonlive.com/newsflash/regional/index.ssf?/base/news-15/1147550358244440.xml&storylist=orlocal. Retrieved 2006-05-15. 
  39. ^ "Complaint over phone records filed with PUC". Boston.com. http://www.boston.com/news/local/maine/articles/2006/05/13/complaint_over_phone_records_filed_with_puc/. Retrieved 2006-05-15. [dead link]
  40. ^ a b c "U.S. Justice Department urges end to AT&T suit". xinhuanet.com, quoting Los Angeles Times. http://news.xinhuanet.com/english/2006-05/15/content_4545544.htm. Retrieved 2006-05-15. 
  41. ^ Lazarus, David (2006-05-12). "AT&T, Verizon readily break their own rules". sfgate.com. http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2006/05/12/BUGICIQA461.DTL. Retrieved 2006-05-11. 
  42. ^ In 1970, when stolen COINTELPRO documents were released to members of Congress, journalists, and organizations who were named in the files, the administration's response to the disclosures was to warn that any further disclosures "could endanger the lives or cause other serious harm to persons engaged in investigation activities on behalf of the United States." Stone, Geoffrey R., Perilous Times: Free Speech in Wartime from the Sedition Act of 1798 to the War on Terrorism, p. 495
  43. ^ Chip Pitts (March 15, 2007). "The End of Illegal Domestic Spying? Don't Count on It". Wash. Spec.. http://www.washingtonspectator.com/articles/20070315surveillance_1.cfm. .
  44. ^ "EX PARTE JACKSON, 96 U.S. 727 (1877)". U.S. Supreme Court. http://caselaw.lp.findlaw.com/cgi-bin/getcase.pl?court=us&vol=96&invol=727. Retrieved 2006-05-17. 
  45. ^ "SMITH v. MARYLAND, 442 U.S. 735 (1979)". U.S. Supreme Court. http://caselaw.lp.findlaw.com/scripts/getcase.pl?court=us&vol=442&invol=735. Retrieved 2006-05-26. 
  46. ^ "Lawyer says Qwest refused data request". The Olympian. http://159.54.227.3/apps/pbcs.dll/article?AID=/20060513/NEWS/60513019. Retrieved 2006-05-11. 
  47. ^ "Telecoms face billion dollar wiretap lawsuits: report". marketwatch.com. http://custom.marketwatch.com/custom/iwon-com/news-story.asp?guid=%7B501DBACD-B34C-4246-9EDB-604BB4FAADD9%7D. Retrieved 2006-05-11. 
  48. ^ a b c "United States Code Annotated Title 18. Crimes and Criminal Procedure Part I—Crimes Chapter 121--Stored Wire And Electronic Communications And Transactional Records Access". www.cybercrime.gov. http://www.cybercrime.gov/ECPA2701_2712.htm. Retrieved 2006-05-11. 
  49. ^ "18 U.S.C. § 2511(2)(a)(ii)". www4.law.cornell.edu. http://www4.law.cornell.edu/uscode/html/uscode18/usc_sec_18_00002511----000-.html#2_a_ii. Retrieved 2006-05-16. 
  50. ^ "47 USC 1004 CALEA 105". US Code. http://www4.law.cornell.edu/uscode/html/uscode47/usc_sec_47_00001004----000-.html. Retrieved 2006-05-17. 
  51. ^ Cohen, David; John Wells (17 April 2004). American National Security and Civil Liberties in an Era of Terrorism. Palgrave. ISBN 1-4039-6199-9.  p. 34
  52. ^ "COINTELPRO Rides Again". zmag.org. http://www.zmag.org/Sustainers/content/2002-06/04hutchinson.cfm. Retrieved 2006-05-11. 
  53. ^ "Intelligence Activities and the Rights of Americans book II". United States Senate. http://www.icdc.com/~paulwolf/cointelpro/churchfinalreportIIa.htm. Retrieved 2006-05-11. 
  54. ^ "Tapped Out Why Congress won't get through to the NSA.". Slate.com. http://www.slate.com/id/2135325/. Retrieved 2006-05-11. 

[edit] External links

Personal tools
Namespaces
Variants
Actions
Navigation
Interaction
Toolbox
Print/export
Languages