NSA trove shows 9:1 ratio of innocents to suspicious people in "targeted surveillance"
NSA data shows that 90 percent of people surveilled are innocent Americans whom the agency is legally prohibited from spying upon. Cory Doctorow looks at what the NSA means when it says "targeted." The review was undertaken by Barton Gellman, Julie Tate and Ashkan Soltani for the Washington Post, working from a cache of previously undisclosed primary surveillance data that Edward Snowden took with him when he left the NSA.
In many cases, it's clear that the NSA has good reason to be concerned about its surveillance targets, but it's also clear that the collateral targets -- who far outnumber the first group -- have intimate, totally irrelevant information about their lives collected and retained by the spies, where it is routinely accessed by spies, analysts, and private-sector contractors.
Almost everything in the NSA cache is haystack, in other words, with just a few needles. And the hay is deliberately collected and retained, even though it consists of things like love notes, baby pictures, medical records, and other intimate data belonging to people who are under no suspicion at all.
And while foreigners -- myself included -- are justifiably anxious about the possibility that the NSA faces no legal hurdles to collection of our data, it's significant that the NSA deliberately targets Americans in the USA and abroad. That's because the NSA is legally enjoined from spying on Americans, and the proof that the agency is flouting this prohibition is evidence of illegal activity and strengthens the case for more oversight, reform and intervention from the US Congress.
The NSA uses laughably sloppy tools for deciding whether a target is a "US person" (a person in the USA, or an American citizen abroad). For example, people whose address books contain foreign persons are presumed by some analysts to be foreign. Likewise, people who post in "foreign" languages (the US has no official state language) are presumed by some analysts to be non-US persons.
When the NSA does determine that it is intercepting US persons' communications, it is required to take "minimization" steps on any data it retains. However, many of these minimization steps are likewise laughably inadequate -- for example, in early 2009, the files refer to "minimized U.S. president-elect," rather than Barack Obama, but you hardly need be a surveillance mastermind to make sense of this.
The documents reveal how the controversial "section 702" of the Foreign Intelligence Surveillance Act has become the go-to basis for surveillance, 702 further lowers the bar for conducting surveillance from the already generous height at which it had been previously set. In the cache, the Post reporters see evidence that analysts whose judicial surveillance authorization warrants have expired then switch to 702 as their basis for continuing spying, rather than demonstrating to a judge that their cause is good.
Snowden says he released this cache to the Washington Post to better inform the debate about 702. The NSA's allies in Congress talk about 702 as something used in special cases and with due care. But it's clear from these documents that 702 is a legal back-door that lets spies avoid the very generous and casual oversight of the FISA court, a veritable rubberstamp factory that grants virtually every NSA request.
Last week's revelations about the NSA's "targeted" surveillance program showed us that NSA wordsmithing has distorted the word "targeted" beyond all recognition, but that was about a largely automated system that spied on people based on stupid, automated rules (albeit rules that a human being had created and put in place).
In this story, we see that even when a trained NSA analyst is making individual, case-by-case decisions about which people to target, s/he can be expected to get it wrong nine times out of ten.
Nice shooting, Tex.
In NSA-intercepted data, those not targeted far outnumber the foreigners who are [Barton Gellman, Julie Tate and Ashkan Soltani/Washington Post]
(Image: Archery, Vassilis, CC-BY-SA)
China’s nightmarish “citizen scores” system uses your online activity, purchases, messages, and social graph to rate your creditworthiness and entitlement to services. One way your score can be plunged into negative territory is for a judge to declare you to be a bad person (mostly this happens to people said to have refused to pay […]
Scottish court: your neighbours owe you for the distress of pointing a CCTV at your back yard and recording your conversations
Edinburgh’s Nahid Akram installed a CCTV system that let him record his downstairs neighbours Debbie and Tony Woolley in their back garden, capturing both images and audio of their private conversations, with a system that had the capacity to record continuously for five days.
Internet traffic nowadays is mostly encrypted (“HTTPS”). Thus, for a few years now, Law Enforcement Agencies (LEA) have been facing far more challenges at gathering data through the interception of connections than they used to.
Python is immensely popular in the data science world for the same reason it is in most other areas of computing—it has highly readable syntax and is suitable for anything from short scripts to massive web services. One of its most exciting, newest applications, however, is in machine learning. You can dive into this booming […]
Learning new skills is a great way to improve your resume and stand out from other candidates. Especially in a workforce in which many job-seekers have a wide variety of qualifications. With lifetime access to Virtual Training Company, you won’t have to choose a specific focus. You can pick up new expertise whenever you deem it […]
Instead of throwing out all the empties after your next party, why not transform them into some new DIY glassware? Cut back on waste and add some home ambiance with the Kinkajou Bottle Cutter and Candle Making Kit.The Kinkajou is designed as a clamp-on scoring blade to make precise cuts. Just slide a bottle in, tighten […]