Digital age expanded the NSA's mission

Jul 08, 2013 by Ken Dilanian

It wasn't long ago that the National Security Agency, the intelligence agency responsible for intercepting global communications, seemed overwhelmed by the Internet.

"We in the NSA are encountering problems with the flood of information," Eric Haseltine, then the NSA director of research, said in a 2004 speech. "We can either be drowned by it, or we can get on our surfboard and let it propel us."

NSA chose the surfboard. Or rather, many of them.

Determined to identify and track al-Qaida terrorists and to prevent another attack after Sept. 11, 2001, the NSA set about vastly enlarging its ability to capture, store and exploit the ocean of texts, emails, videos and other .

"They took on a new mission that required sifting vast amounts of data to find a few important signals," said Stewart Baker, who was the NSA's general counsel from 1992 to 1994 and held top Homeland Security Department jobs in the George W. Bush administration.

Today the NSA secretly siphons an almost unimaginable number of foreign government, corporate and private communications from the World Wide Web, according to the trove of classified material disclosed by Edward Snowden, the fugitive former NSA contractor. One document leaked last week revealed that NSA computers take in 500 million "communications connections" per month in Germany alone.

That has made the NSA, already the largest U.S. in terms of personnel, even more important for policymakers.

About 60 percent of the president's daily brief, the highly classified intelligence summary delivered to the White House each morning, was based as of 2000 on "signals intelligence," or intercepted communications, according to a declassified NSA document from December of that year.

The NSA portion has increased since then, former officials say.

"Over the last 10 years, because of the Internet gold mine, signals intelligence has become the primary vehicle for U.S. intelligence collection," said James Lewis, director of the technology and public policy program at the nonpartisan Center for Strategic and International Studies in Washington.

The Snowden disclosures have revealed that the NSA intercepts foreign Internet traffic that passes through digital pipelines or servers in the U.S., both by directly tapping high-capacity fiber-optic cables that much of the world uses and by using secret court warrants to obtain material from Google, Yahoo, Apple, Microsoft and other U.S. technology, online storage and social media companies.

Two unidentified U.S. companies in particular "enable NSA to access large volumes of foreign-to-foreign communications transiting the United States through fiber-optic cables, gateway switches, and data networks," according to a 2009 draft report from the NSA inspector general that was among the Snowden documents.

The NSA also targets computer systems, fiber-optic companies and telecom providers in other countries, officials said.

Modern spying "isn't just the passive collection of signals someone else decides to transmit," former NSA Director Michael Hayden said in an email. "With the modern Web we're often able to 'commute' to the target. And frankly, I think we're the best in the world at it."

American emails and other communications inevitably are swept into the Internet, current and former intelligence officials say.

Unless a court specifically authorizes eavesdropping, communications that are inadvertently captured from "U.S. persons" must by federal policy be discarded or subject to special handling known as "minimization" to restrict who can learn the American's identity.

The Guardian recently disclosed another secret NSA program, code named EvilOlive, that collects Internet metadata - not content, but email headers showing the "to" and "from" fields, and computer addresses when one end of the communication was in the U.S.

"This milestone ... allowed the possibility for more traffic to be identified, selected and forwarded to NSA repositories," the NSA reported in December, according to The Guardian.

Joel Brenner, former NSA senior counsel, suggests such surveillance is far from foolproof. "What makes anybody think that the NSA can get it all, and secondly, that they can look at it all?" he asked.

According to the Snowden disclosures, the agency also collects and stores toll records of nearly all telephone calls by Americans. NSA officials say they only use the metadata - phone numbers, length of a call and other details, but not the callers' names or recordings of any conversations - in investigations of terrorism or foreign espionage.

Gen. Keith Alexander, head of the NSA, recently testified that the classified collection systems had helped avert or disrupt more than 50 potential terrorist incidents around the globe, including about 10 in the U.S.

Getting the data has always been easier than making sense of it. So the NSA developed its own tools to tap the vast pools of information.

In 2008, agency engineers created Accumulo, a data storage and retrieval system based on Google's Big Table system. Sqrrl Data, a start-up company in Cambridge, Mass., this month began a commercial version of Accumulo for real-time data mining. Most of the founders are former NSA employees.

Accumulo allowed the NSA to examine disparate data sets and find connections, said a former NSA operator who worked with it.

"You got better answers immediately," he said.

But the NSA suffers from "stovepiping" of operations, said the former operator, who was not authorized to discuss the operations publicly.

Phone intercepts are a separate program from email metadata, which is distinct from analysis of cyber threats. Like any large bureaucracy, he said, the NSA is not as nimble as a start-up.

"It's like turning an aircraft carrier," he said.

Explore further: Google to help boost Greece's tourism industry

3 /5 (2 votes)
add to favorites email to friend print save as pdf

Related Stories

Spy program gathered Americans' Internet records

Jun 27, 2013

(AP)—The Obama administration gathered U.S. citizens' Internet data until 2011, continuing a spying program started under President George W. Bush that revealed whom Americans exchanged emails with and the Internet Protocol ...

NSA seeks recruits via Twitter

Jun 07, 2013

The National Security Agency (NSA) is looking for a few good cybersnoops. This week's furor over top-secret collection of phone records and online data isn't deterring the US government's electronic intelligence-gathering ...

Brazil expresses concern at report of NSA spying

Jul 07, 2013

Brazil's foreign minister said Sunday his government is worried by a report that the United States has collected data on millions of telephone and email conversations in his country and promised an effort for international ...

Germany wants 'trust restored' after US spy report

Jul 01, 2013

The German government wants "trust restored" with the United States following reports that American intelligence agencies bugged European Union offices, and has invited the U.S. ambassador in Berlin to the ...

Recommended for you

Google to help boost Greece's tourism industry

1 hour ago

Internet giant Google will offer management courses to 3,000 tourism businesses on the island of Crete as part of an initiative to promote the sector in Greece, industry union Sete said on Thursday.

Music site SoundCloud to start paying artists

8 hours ago

SoundCloud said Thursday that it will start paying artists and record companies whose music is played on the popular streaming site, a move that will bring it in line with competitors such as YouTube and Spotify.

Facebook awards 'Internet Defense Prize'

16 hours ago

Facebook awarded a $50,000 Internet Defense Prize to a pair of German researchers with a seemingly viable approach to detecting vulnerabilities in Web applications.

Twitter tries to block images of Foley killing

Aug 20, 2014

Twitter and some other social media outlets are trying to block the spread of gruesome images of the beheading of journalist James Foley by Islamic State militants, while a movement to deny his killers publicity ...

User comments : 2

Adjust slider to filter visible comments by rank

Display comments: newest first

baudrunner
2 / 5 (4) Jul 08, 2013
"With the modern Web we're often able to 'commute' to the target. And frankly, I think we're the best in the world at it."
So when he's not outright slowing your computer down, he's actually sending you a flood of popups or maybe even a blue screen for your amusement. Tell the NSA to mind its own business? They'll tell you that you're their business! Isn't that one the nightmare of all annoyances?
VENDItardE
1 / 5 (5) Jul 08, 2013
fkn aho's