http://www.sacurrent.com/news/story.asp?id=69607 The panopticon economy The NSAbs new data-mining facility is one component of a growing local surveillance industry Greg M. Schwartz It looks innocent enough, but no loitering, please: The NSAbs Texas Cryptology Center, under construction at 410 and West Military. By Greg M. Schwartz Surrounded by barbwire fencing, the anonymous yet massive building on West Military Drive near San Antoniobs Loop 410 freeway looms mysteriously with no identifying signs of any kind. Surveillance is tight, with security cameras surrounding the under-construction building. Readers are advised not to take any photos unless you care to be detained for at least a 45-minute interrogation by the National Security Agency, as this reporter was. Therebs a strangely blurry line during such an interrogation. After viewing the five photos Ibd taken of the NSAbs new Texas Cryptology Center, the NSA officer asked if I would delete them. When I asked if he was ordering me to do so, he said no; he was asking as a personal favor. I declined and was eventually released. Americabs top spy agency has taken over the former Sony microchip plant and is transforming it into a new data-mining headquarters b oddly positioned directly across the street from a 24-hour Walmart b where billions of electronic communications will be sifted in the agencybs mission to identify terrorist threats. b No longer able to store all the intercepted phone calls and e-mail in its secret city, the agency has now built a new data warehouse in San Antonio, Texas,b writes author James Bamford in the Shadow Factory, his third book about the NSA. b Costing, with renovations, upwards of $130 million, the 470,000-square-foot facility will be almost the size of the Alamodome. Considering how much data can now be squeezed onto a small flash drive, the new NSA building may eventually be able to hold all the information in the world.b Bamfordbs book focuses on the NSAbs transformation since 9/11, with the impetus for the new facility being a direct ramification of those attacks. At the time, the NSA had only about 7 percent of its facilities outside the Washington D.C./Baltimore area. But the realization that additional attacks could virtually wipe out the agency catalyzed a regional expansion. [See b Secret Agency Man,b November 5, 2008.] The new facility is a potential boon to the local economy since itbs reportedly going to employ around 1,500 people, but questions remain about whether there will be adequate oversight to prevent civil-rights violations like Uncle Sambs recent notorious warrantless wiretapping program. The NSA would suggest the facilitybs ability to sort through surveillance data is one of Americabs top defenses against terrorist threats, but the NSAbs presence comes with concerns that abuse of its secretive power could see the agency become akin to the b Thought Policeb of 1984, George Orwellbs classic novel depicting the nightmare of a total surveillance society b and all for nothing. Even as the facility is completed, a new government-backed report has concluded that data surveillance is an ineffective method for identifying potential terrorists or preventing attacks. So just what will be going on inside the NSAbs new San Antonio facility? Bamford describes former NSA Director Mike Haydenbs goals for the data-mining center as knowing b exactly what Americans were doing day by day, hour by hour, and second by second. He wanted to know where they shopped, what they bought, what movies they saw, what books they read, the toll booths they went through, the plane tickets they purchased, the hotels they stayed inb& In other words, Total Information Awareness, the same Orwellian concept that John Poindexter had tried to develop while working for the Pentagonbs [Defense Advanced Research Projects Agency].b Bamford details how Hayden, now head of the CIA, had originally leaned toward being overprotective of civil rights, not wanting to see the NSA revisit the scandal-ridden era of the 1970s and the violations of b Project Shamrock.b But 9/11 altered Haydenbs philosophical direction 180 degrees. The Total Information Awareness project supposedly died when the plan was exposed, Poindexter resigned, and Congress cut off further funding. But Bamford and others have reported that the project simply migrated to the NSA, b an agency with a far better track record than DARPA for keeping secrets.b The NSA remembers the Alamo The NSA was waffling on selection of a home for its new facility when the City of San Antonio sent a mission to NSA headquarters in January 2007 to lobby for it, part of a continuing effort to woo the agency. On January 18, Microsoft announced its selection of San Antonio for a new data center. The NSA followed suit three months later. Bexar County Judge Nelson Wolff was part of the effort to entice the NSA to choose San Antonio. He says talks centered on economic factors and what the city could do to facilitate the NSAbs plans. b Theybre pretty tight on what they do; they donbt share that information with you,b says Wolff. b I hope that the administration will be addressing [civil-rights violations], and I hope theybre correcting those concerns.b Bamford writes about how NSA and Microsoft had both been eyeing San Antonio for years because it has the cheapest electricity in Texas, and the state has its own power grid, making it less vulnerable to power outages on the national grid. He notes that it seemed the NSA wanted assurance Microsoft would be here, too, before making a final commitment, due to the advantages of b having their miners virtually next door to the mother lode of data centers.b The new NSA facility is just a few miles from Microsoftbs data center of the same size. Bamford says that under current law, NSA could gain access to Microsoftbs stored data without even a warrant, but merely a fiber-optic cable. b What the Microsoft people will have will be just storage of a lot of the email that is being sent. They keep this email b I donbt know why b and there should be some legislation saying how long it should be kept,b said Bamford in a phone interview last week. b The post office doesnbt keep copies of our letters when we mail letters; why should the telecom companies or the internet providers keep copies of our email? It doesnbt make sense to me. But therebs no legislation. So they need a place to store it, and thatbs where theybre storing all this stuff.b (Microsoft did not return a call for comment before press deadline.) The new NSA facility boosts the agencybs already formidable presence in South Texas, where they have 2,000 employees on the Medina Annex of the Lackland Air Force Base b mostly Signals Intelligence, or Sigint, specialists, who use cutting-edge technology to intercept anything from faxes to emails and satellite communications. NSAbs new facility also gives the agency easy access to UTSAbs Institute for Cyber Security and the schoolbs Center for Infrastructure Assurance and Security. The ICS was founded in 2007 with a $3.5-million grant from the Texas Emerging Technology Fund to continue efforts to protect American communities against cyber-attacks, with the CIAS b a think tank launched in 2001 b being rolled into the ICS. All of this led U.S. Representative Ciro Rodriguez (D-San Antonio) to declare San Antonio b the center of cybersecurity, in the country and the world.b ICS Founding Executive Director Ravi Sandhu acknowledges some synergy between the NSA presence in San Antonio and UTSAbs cybersecurity work. b Cybersecurity in the public domain has largely been about defense, but therebs certainly an attack component to it. To some degree, the U.S. Department of Defense and intelligence agencies are now starting to talk about the attack component in the public domain,b says Sandhu. Sandhu says UTSAbs cybersecurity students are recruited by many of San Antoniobs local employers and doesnbt doubt that NSA is one of them. b Recruiting is one end b& but itbs an attractive thing for NSA employees [too]. They can further their education b they can do degrees part-time, they can do advanced degrees b& so there are advantages beyond direct recruitment of NSA students.b Does automated data mining even work? While the opening of the NSAbs massive new data center heightens existing civil-rights concerns, a new report from the National Research Council questions whether such data-mining is even effective. Sponsored by the Department of Homeland Security and the National Science Foundation and released in October of this year, the report suggests that pattern-based data-mining is not even a viable way to identify terrorists. The 352-page study bb Protecting Individual Privacy in the Struggle Against Terroristsb b concludes that identification of terrorists through automated data-mining b is neither feasible as an objective nor desirable as a goal of technology development efforts.b It also says inevitable false positives will result in b ordinary, law-abiding citizens and businessesb being erroneously flagged as suspects. b Actions such as arrest, search, or denial of rights should never be taken solely on the basis of an automated data-mining result,b says the report. The question, then, is how rigorously will human analysts vet such information before alleged leads are pursued, and who has oversight of the process? b Part of the problem is b& jurisdiction over national-security issues is very divided in Congress. You have the Homeland Security committee, the Justice committee, but, of course, you also have some basic issues b government oversight, appropriations,b says Professor Fred Cate, the NRC committee member who wrote most of the report and who serves as director of Indiana Universitybs Center for Applied Cybersecurity Research. b So I think in some ways one of the issues is the need for a more streamlined oversight system so that somebody takes responsibility for it.b Cate says the migration of the TIA project to the NSA is part of the problem. b Because so many different agencies are involved and because there are no consistent oversight mechanisms, itbs very hard [to monitor]. And Congress created a Privacy and Civil Liberties Oversight Board, and then it didnbt like the way it created it initially, so then it recreated it with more powers, but it never confirmed any members to it,b says Cate. b So for the past year, therebs been nobody in that critical position. So I think one immediate step for Congress and the new president will be to nominate members and get them confirmed.b The lack of clearly delineated oversight remains a vital yet unsolved issue. Senator Jay Rockefeller (D-W.Virginia), Chairman of the Senate Intelligence Committee, would appear to be the Congressman with the most power to pursue such oversight. b Eisenhower warned of the military-industrial complex, but now itbs mostly the security, industrial complex; itbs these people that build all the hardware and software for Homeland Security and Intelligence and all that,b says Bamford. b As far as I can see, nobody has a handle on how many contractors are out there, what theybre doing, how much moneybs going to them, how much is useful, how much is wasted money.b Cate says the NRC committee is not necessarily opposed to data-mining in principal, but is concerned about how itbs carried out. b The question is can you do it and make it work so that you donbt intrude unnecessarily into privacy and so that you reach reliable conclusions.b Bamford writes in the Shadow Factory of how the NSAbs Georgia listening post has eavesdropped on Americans during the Iraq War, including journalists, without a warrant or any indication of terrorism. He also reports on NSA eavesdropping on undecided members of the United Nations Security Council in the run-up to the vote on the Iraq War resolution, with the Bush regime seeking information with which to twist the arms of voting countries. The spying was only revealed due to British Parliament whistleblower Claire Short, who admitted shebd read secret transcripts of UN Secretary-General Kofi Annanbs confidential conversations. b The UN people have been aware of [NSA eavesdropping] for a long time, but therebs not much they can do about it,b says Bamford. A common response to concerns about data surveillance is that those who keep their noses clean have nothing to worry about. But the reach of the NSAbs surveillance net combined with lack of oversight and the political paranoia escalated by the 9/11 attacks means that almost anyone could wind up on the terrorist watch list. b The principal end product of all that data and all that processing is a list of names b the watch list b of people, both American and foreign, thought to pose a danger to the country,b writes Bamford. b Once containing just twenty names, today it is made up of an astonishing half a million b and it grows rapidly every day. Most on the list are neither terrorists nor a danger to the country, and many are there simply by mistake.b Bamford reports that consequences of being on the list could include having an application for a Small Business Administration loan turned down; having a childbs application to one of the military academies rejected; or, because the names are shared with foreign governments, being turned away after landing in Europe for a vacation or business trip. All without ever being told why. A senior intelligence official concerned about the situation told Bamford b the system is a disaster,b adding that the list at the National Counterterrorism Center isnbt even compatible with the NSA and CIA systems. b They could be snooping on just about anything right now and not be accountable and be able to hold their hands up and go, bOur system doesnbt track that,b when in many cases the system does, but the code is so convoluted you could never know it,b says the official. Bamford also reports on Uncle Sambs skyrocketing use of b national security lettersb for obtaining personal information. The NSLs, which do not require probable cause or court approval, jumped from 8,500 in 2000 to 143,074 between 2003 and 2005, according to a 2007 Justice Department inspector generalbs report. Under the revised version of the 1994 Communications Assistance for Law Enforcement Act, itbs not only a crime for any company to refuse to cooperate, itbs also become a crime for company officials to even disclose their cooperation. b There was a lot of pressure by the FBI in b94 to have CALEA enacted b& but the Clinton Administration was in favor of doing all that,b says Bamford. The question for us then becomes who, if anyone, is watching the watchdogs? One organization devoted to such duty is the Electronic Frontier Foundation, a San Francisco-based non-profit whose mission is to protect electronic civil liberties. Reducing the use of NSLs to gag and acquire data from online service providers is one of the planks in EFFbs proposed privacy agenda for the new Obama administration. b The issue here is that when people are gagged, you canbt talk about it and [people] donbt know what kind of abuses there are,b says EFF media-relations coordinator Rebecca Jeschke. The EFF privacy agenda also includes repealing or repairing the FISA Amendments Act, reforming the Electronic Communications Privacy Act, and reform of the State Secrets Privilege, the latter which has been used by the Bush regime to shield its electronic surveillance activity from judicial review. The EFF filed a lawsuit against the NSA in September on behalf of AT&T customers who were victims of warrantless wiretapping, with defendants including President Bush, Vice President Cheney, and NSA Director Keith Alexander. The EFF also filed suit against AT&T b until this summer headquartered in San Antonio, the telecom giant still maintains a sizable presence here b for participating in the illegal surveillance program, and is challenging the FISA Amendments Act passed by Congress in July b which gave retroactive immunity to the telecom companies b as being unconstitutional. b Where I disagreed was the immunity to telecommunications entities b& and thatbs why I couldnbt support something that provided for the immunity provision,b says U.S. Representative Charlie Gonzalez (D-San Antonio) of the FISA Amendments Act. b We had something that we thought in the House was good, and then the Senate did their own thing. But I was never happy with the inclusion of the blanket-immunity provision to telecommunications entities, because I thought it relieved them of a responsibility and duty that they owe as corporate citizens.b Gonzalez added that he thinks b therebs still tremendous shortcomings in the law when it comes to making sure that you donbt have abuses of the authority of eavesdropping.b The Electronic Privacy Information Center in Washington, D.C., a public interest research group whose mission is similar to EFFbs, is suing the Department of Justice for access to documents authored by government lawyers regarding President Bushbs warrantless wiretapping program. These opinions, prepared by the Office of Legal Counsel, provided the legal rationale for Uncle Sam to wiretap American citizens in the United States without court approval. On October 31, a federal judge ordered the DOJ to provide for independent judicial inspection of documents relating to the program. The latest news in Uncle Sambs ongoing surveillance scandal happens to come from the FBIbs involvement with the NSA. The Washington Times reported in November that Supervisory Special Agent Bassem Youssef, who oversees the FBIbs role in the NSAbs warrantless surveillance program, says the FBI engaged in unlawful acts while carrying out that surveillance. Youssef, who now fears career retaliation for stepping up as a whisteblower, is due to testify with the Justice Department. Whether or not the new Obama administration will enact any demonstrable change in the personnel and policies that created the civil-rights violations of recent years remains a question mark. b Everything Ibve seen so far with Obama has not been focused on change. Itbs been focused on bringing back the old Clinton Administration or continuing the same,b says Bamford, noting the President-electbs decisions to nominate Hillary Clinton as Secretary of State and keep Robert Gates as Secretary of Defense. Bamford mentions Wisconsin Senator Russ Feingold as someone he feels would fight for greater accountability. b Thatbs a person I would like to see rewarded for making the right decision, instead of people being rewarded for making the wrong decisions,b says Bamford of Feingoldbs record in voting against the revised FISA Amendments Act and being the only senator to vote against the Patriot Act. Bamford ends The Shadow Factory by quoting Senator Frank Church, the first chairman of the Senate Intelligence Committee, during the original hearings on the NSA in the 1970s. b If a dictator ever took charge in this country, the technological capacity that the intelligence community has given the government could enable it to impose total tyranny, and there would be no way to fight back, because the most careful effort to combine together in resistance to the government, no matter how privately it was done, is within the reach of the government to know. Such is the capability of this technology,b said Church more than three decades ago. That technology now sees its latest evolution occurring at the shadowy building on San Antoniobs West Military Drive. b"