Gen. Keith Alexander, National Security Agency director, testifying Thursday before the Senate Intelligence Committee.
James Risen and Laura Poitras, two journalists who have experienced first-hand the consequences of pissing off the federal government in the course of performing uncompromising investigative journalism, have a story in today's New York Times
revealing a new layer of the NSA's domestic surveillance activities. Edward Snowden's leaked documents are the source of the report, which shows that since November 2010, NSA has been mining its vast data collections to "create sophisticated graphs of some Americans’ social connections that can identify their associates, their locations at certain times, their traveling companions and other personal information."
The policy shift was intended to help the agency “discover and track” connections between intelligence targets overseas and people in the United States, according to an N.S.A. memorandum from January 2011. The agency was authorized to conduct “large-scale graph analysis on very large sets of communications metadata without having to check foreignness” of every e-mail address, phone number or other identifier, the document said. Because of concerns about infringing on the privacy of American citizens, the computer analysis of such data had previously been permitted only for foreigners.
The agency can augment the communications data with material from public, commercial and other sources, including bank codes, insurance information, Facebook profiles, passenger manifests, voter registration rolls and GPS location information, as well as property records and unspecified tax data, according to the documents. They do not indicate any restrictions on the use of such “enrichment” data, and several former senior Obama administration officials said the agency drew on it for both Americans and foreigners.
N.S.A. officials declined to say how many Americans have been caught up in the effort, including people involved in no wrongdoing. The documents do not describe what has resulted from the scrutiny, which links phone numbers and e-mails in a “contact chain” tied directly or indirectly to a person or organization overseas that is of foreign intelligence interest.
"N.S.A. Gathers Data on Social Connections of U.S. Citizens" [nytimes.com]
It’s the end of an era, sort of: Fraunhofer IIS, the developers of the MP3 audio compression format, announced that they are ceasing their licensing program. In a blog post, spokesman Matthias Rose says that it’s had a good 20-year run and is obsolete. But it’s also true that the decoding patents expired last year, […]
Freddy deBoer writes that he’s been telling the same joke for years about Silicon Valley’s only product, which might be universalized as “At last, a way to verb with nouns on the internet!” But the social-media techopoly is stable, now, and so the venture capitalists have moved on to the three terrible trends that will […]
Alex Wood is an addict but won’t give up his smartphone. But he has five strategies for limiting its control over him: “I used to wake up tired. My body would ache and my head felt sore, like waking up with a hangover. Finally, I took control, like attending an AA class for addicts, I […]
If you are camping during rainy season, or just want a TSA-approved lighter, these plasma torches make perfect travel companions. These gas-free lighters create a small plasma beam that’s safer than butane to use and more environmentally friendly. It creates a super-hot, splashproof flame so you can get a campfire going, or have a smoke […]
If you don’t want to get stuck footing the bill for a hit and run, this dashboard-mounted camera offers up to 2K resolution to make sure you always have a reliable witness, and it’s available in the Boing Boing Store for 30% off it’s usual price.The PapaGo mounts unobtrusively to your windshield to see everything […]
While some people still maintain that everything in Apple’s walled garden “just works” and is immune to the rampant malware of the Windows world, the reality is different. The Mac’s growing market share has made it a much more viable target for malicious actors, and its built-in tools aren’t always enough to fix things. Drive […]