Get PJ Media on your Apple

The PJ Tatler

by
Rick Moran

Bio

June 9, 2013 - 6:27 am

Pretty soon, we’re going to start wondering whose data isn’t being vacuumed up by the spooks.

Marc Ambinder:

Analysts at the National Security Agency can now secretly access real-time user data provided by as many as 50 American companies, ranging from credit rating agencies to internet service providers, two government officials familiar with the arrangements said.

Several of the companies have provided records continuously since 2006, while others have given the agency sporadic access, these officials said. These officials disclosed the number of participating companies in order to provide context for a series of disclosures about the NSA’s domestic collection policies. The officials, contacted independently, repeatedly said that “domestic collection” does not mean that the target is based in the U.S. or is a U.S. citizen; rather, it refers only to the origin of the data.

The Wall Street Journal reported today that U.S. credit card companies had also provided customer information. The officials would not disclose the names of the companies because, they said, doing so would provide U.S. enemies with a list of companies to avoid. They declined to confirm the list of participants in an internet monitoring program revealed by the Washington Post and the Guardian, but both confirmed that the program existed.

“The idea is to create a mosaic. We get a tip. We vet it. Then we mine the data for intelligence,” one of the officials said.

In a statement, Director of National Intelligence James Clapper said that programs collect communications “pursuant to section 702 of the Foreign Intelligence Surveillance Act, ” and “cannot be used to intentionally target any U.S. citizen, any other U.S person, or anyone within the United States.”

He called the leaks “reprehensible” and said the program “is among the most important” sources of “valuable” intelligence information the government takes in.

The program may, indeed, be valuable but at what cost? Nobody I have read is disputing the idea that the kinds of data collection in which the NSA is engaged doesn’t yield vital intelligence that helps keep us safe. But there are still questions about how the surveillance is conducted and how the privacy of Americans is protected.

One of the officials who spoke to me said that because data types are not standardized, the NSA needs several different collection tools, of which PRISM, disclosed today by the Guardian and the Washington Post, is one. PRISM works well because it is able to handle several different types of data streams using different basic encryption methods, the person said. It is a “front end” system, or software, that allows an NSA analyst to search through the data and pull out items of significance, which are then stored in any number of databases. PRISM works with another NSA program to encrypt and remove from the analysts’ screen data that a computer or the analyst deems to be from a U.S. person who is not the subject of the investigation, the person said. A FISA order is required to continue monitoring and analyzing these datasets, although the monitoring can start before an application package is submitted to the Foreign Intelligence Surveillance Court.

It sounds like reasonable safeguards are in place, but, as with the Bush surveillance program, mistakes can happen and innocent Americans end up being surveiled. And the potential for abuse is frightening. That’s the real problem with these NSA programs. Someone in power with an appetite for gathering information on political enemies, might subvert the whole process. It isn’t likely, but neither were a lot of Nixon’s domestic spying scandals either.

We can’t blame the companies since they have very little room to refuse a request from our intelligence agencies. But perhaps we should raise our expectations that companies involved in this program will resist a little harder when the government comes calling and asking for their data.

Rick Moran is PJ Media's Chicago editor and Blog editor at The American Thinker. He is also host of the"RINO Hour of Power" on Blog Talk Radio. His own blog is Right Wing Nut House.

Comments are closed.

All Comments   (6)
All Comments   (6)
Sort: Newest Oldest Top Rated
"We can’t blame the companies since they have very little room to refuse a request from our intelligence agencies."

I do not accept this premise. I think the problem with this premise is that it is so widely held, but I do not think it is true. I think the companies only cooperate, because it is no skin off their own noses. Why should they fight it, when it only hurts their customers, and often, the customers won't ever know, anyway? I think they could fight, but it is easier to just give the government what it wants.
44 weeks ago
44 weeks ago Link To Comment
Come on now, who, seriously, is surprised that there's gambling going on in this establishment? What next, drinking?

Are you surprised that the phone company keeps track of who you called? Are you surprised that the credit card company keeps track of what you buy? This is the twenty-first century where people voluntarily post pictures of themselves with all their known associates on Facetube.

Are you shocked, shocked, that the NSA is gathering all this data and running barefoot through it? It's their job. So, is it an invasion of your privacy? Arguably, it's just tracking you through the public spaces, the public cyberspaces.

It's not just the NSA who knows this stuff, if you're a typical computer user you've got 9,000 cookies on your system tracking everything you do, the info is gathered, sold, and resold over and over again, thousands of marketing companies know more about you than any of your neighbors do.

It's just modern life. Like it? Well no, I don't *like* it, as such, but it is what it is. George Will had a good one this morning, saying, "well, I guess we can trust the government with this data, unless we had a government that might, like, turn the IRS loose against political opponents. Oops."
44 weeks ago
44 weeks ago Link To Comment
i'm waiting to hear that credit card transactions are merely metadata, too.

i also suspect that soon it will be revealed that all banks provide photocopies of all checks to the feds. remember when the banks stopped returning your checks because photocopies were cheaper? right.
44 weeks ago
44 weeks ago Link To Comment
My bet is some of those companies now include cable/satellite tv, just so the NSA can finally figure out why Americans who watch NCIS re-runs channel flip to House Hunters International.
Trying to keep my cynical sense of humor here, knowing every keystroke is going to be saved on a server forever...
44 weeks ago
44 weeks ago Link To Comment
>It sounds like reasonable safeguards are in place,.....<

NO. It most certainly does NOT sound like "reasonable" safeguards are in place. What safeguards have been mentioned are fragmentary, haphazard, and after-the-fact. The secret "oversight" supposedly being practiced relies on government employees subject to pressure from their superiors and their is no protection for potential whistle blowers.

We simply cannot trust a government that has already demonstrated that it is all too willing to abuse an individual's personal data, not for national security, or the welfare of the populace, but solely to perpetrate it's own power.
44 weeks ago
44 weeks ago Link To Comment
"You may fire when you are ready Gridley."

Excellent shot, Gridley, here and back in 1898!
44 weeks ago
44 weeks ago Link To Comment
View All