POLICE STATE / MILITARY - LOOKING GLASS NEWS
View without photos
View with photos


Phone giants mum on spying
by Jon Van    The Chicago Tribune
Entered into the database on Thursday, December 29th, 2005 @ 20:44:22 MST


 

Untitled Document

In past, industry has cooperated with U.S.

In the days following revelations that the Bush administration ordered the National Security Agency to spy on domestic telephone and Internet communications without a court order, one involved party has remained silent.

The nation's telephone giants--which control the data pipelines--have neither commented on nor denied their reported participation, nor have they reacted to the charge that they may have been complicit in violating privacy rights.

But historically the telecom companies have cooperated with the government on wholesale wiretapping, and the Bush administration's anti-terrorism programs appear to be no exception.

Without commenting directly on a classified topic, industry officials--when asked--suggested that they would not stand in the way of a request for help.

"Our members have worked for years with law enforcement with an objective to preserve lawfully authorized surveillance," said Tom Amontree, a spokesman for the US Telecom Association, the industry group representing most phone companies. "We have no comment on national security matters."

Added Eric Rabe, a spokesman for Verizon Communications Inc., one of the nation's phone giants: "We typically make law enforcement agencies get a court order. Our default is to cooperate, but we don't feel we should appropriate customer information lightly. We try to make sure what we do is in compliance with the law."

During the Cold War, telecom organizations freely cooperated with government agencies regarding national security, and there seemed to be little worry about whether the requests were accompanied by court orders, one expert said.

"In the 1960s, I worked for an international telex and telegram carrier in their Washington office," said Bob Atkinson, policy research director of the Columbia Institute for Tele-Information. "Every day a government agent stopped by to pick up copies of all telegrams that were sent overseas.

"I asked about it once and was told we'd been making copies available to the government since World War II.

"I think the practice only ended when people stopped sending telegrams."

The Bush administration has been responding to critics since Saturday's disclosure that it directed the NSA to comb through huge volumes of telephone and Internet communications without first seeking court orders. The New York Times reported that since Sept. 11, 2001, unidentified American telecom companies have helped the government gain "backdoor access" to streams of communications flowing into and out of the U.S. in the search for terrorism suspects.

A Bush spokesman, Trent Duffy, called the current use of wiretaps without the usual court authorization limited.

Rabe, of Verizon, said it's true that phone companies have always been willing to help government inquiries, though times have changed.

In the Cold War era when there was great concern about Communists, "probably a lot of things went on," Rabe said, "but today we're more circumspect."

Last year when agents of the U.S. music industry asked Verizon for information about its Internet subscribers, the phone giant refused and went to court to protect its customers' privacy.

He noted that no telecom companies have been named in disclosures about NSA eavesdropping and declined to say if Verizon cooperates with that program. Bob Dwyer, a spokesman for AT&T Inc., another phone giant, said, "We don't comment on national security issues."

The question of what the telecom companies can help find is difficult to answer because of the highly classified nature of the work. But experts say the computer technology that enables eavesdropping on a national scale may well generate enough data to overwhelm human agents.

"Their idea of finding a needle in a haystack seems to involve getting more hay," said David Isenberg, a fellow at the Berkman Center for Internet and Society at Harvard University.

Isenberg said people who wish to evade government eavesdropping probably can do so by encrypting their communications.

For example, calls made using Internet telephony from the European-based Skype service are all encrypted, Isenberg said.

While government agencies might decrypt targeted communications, it's not possible to do this with the vast amounts of information apparently targeted by the NSA, he said.

The decentralized nature of the Internet and the multiplicity of ways to communicate further complicate the task of wholesale eavesdropping, said Daniel Berninger, a communications analyst with Tier 1 Research.

By focusing on traffic that leaves the country, government agents can tap into optical fiber lines that are buried on the oceans and on radio signals bounced off satellites in space, Berninger said.

This provides some identifiable "choke points" where communications enter and leave the country, he said, providing an easier task than trying to randomly monitor domestic traffic that flows on the Internet in all directions around the country, he said.

Tapping into modern communications lines will yield billions of packets of voice and data all mixed together that is the electronic version of getting the slivers of paper that come out of a shredder, Berninger said.

While there is equipment available to put the signals back together as e-mail, voice conversations, downloaded music and the like, "once you add encryption to the mix, the game's over," said Berninger.

The technique used to monitor vast amounts of communications is data mining, and sophisticated software programs are regularly used by private businesses as well as government agencies.

Looking at data such as which phone numbers are called from which numbers can provide a lot of useful information, said Paul Bradley, a consultant with Apollo Data Technologies LLC, a Chicago-based data mining software firm.

"A lot of research has been done into social networking," said Bradley. "When you use free instant messaging, the provider looks at who chats with whom to reconstruct social networks. They collect a ton of information. I'm sure government agencies do that."

SPSS Inc., a Chicago-based software pioneer in data mining, provides programs to aid the Army in spotting hackers who are attempting to invade its computer systems and to help Homeland Security protect the nation's borders.

Such software could determine when people use aliases by comparing several different conversations and the patterns of name use within each, said Bill Haffey, technical director of SPSS' public sector products.

The system could even be programmed to send an agent an e-mail or call his cell phone to inform him once it discovers aliases that interest him, he said. Even if a security agency couldn't break an encryption used for messages, just noting the pattern of encryption could provide useful information, Haffey said.

"There's no magic in any of this," said Jack Noonan, SPSS chief executive. "Everything we do with technology, you could do with humans. But sifting through billions of records could take all the humans in the world, taking years.

"With this technology, you can do it quickly enough to make a difference."

- - -

Tapping in by land, by sea and from space

One question arising from the recent revelation that the National Security Agency monitored phone calls by U.S. citizens without court approval is whether phone companies worked with the agency to monitor calls. Some ways the NSA might have tapped into communications:

With help from phone companies:

TELEPHONE SWITCHES

One of the easiest ways to monitor phone conversations is to attach a wiretapping device to a telephone switch, which is what phone companies use to route calls. Calls can then be directly recorded and reviewed.

Without help from phone companies:

TRANSOCEANIC CABLES

Large fiber-optic cables laid across the ocean floor from the U.S. to other countries require a light signal carrying a voice message to be amplified along the way. To do this, the light signal is converted to an electronic digital signal, amplified and then converted back into a light signal. During this conversion, a U.S. ship could use special instruments to read the signal, yielding the messages within.

SATELLITES

- Many communication signals travel across land by being relayed from stations and towers. Because of the Earth's curvature, these signals may not all reach the relay station and can end up in space, where government satellites can pick them up.

- Signals from overseas, beamed toward the U.S. from communications satellites, can be intercepted by large dishes used by the government.

Sources: GlobalSecurity.org, Electronic Privacy Information Center