Despite promises from a few federal lawmakers to hold the Obama administration and the National Security Agency (NSA) accountable for the recently revealed practice of wholesale surveillance of millions of Americans, to date, nothing has been done.
In fact, as The New American reported last week, congressional impotence is likely to let Director of National Intelligence James Clapper escape any accountability for the lies he told under oath while testifying about the scope of the domestic spying program.
Of course, as the mainstream media maintains its attention laser-locked on Edward Snowden — the former NSA contractor who leaked the documents last month — Americans recognize that neither Snowden’s whereabouts nor his love life are of the slightest importance.
What matters is that one branch of the federal government (the executive) is unconstitutionally spying on Americans, another branch of the federal government (the legislative) is refusing to check that exercise of power, and a third branch (the judicial) is rubber-stamping all requests to keep the data pipeline open.
And, as the Atlantic reports, in many cases, a pipeline is exactly what is being tapped by the NSA. Writing for the Atlantic, Olga Khazan reports:
In addition to gaining access to web companies’ servers and asking for phone metadata, we’ve now learned that both the U.S. and the U.K. spy agencies are tapping directly into the Internet’s backbone — the undersea fiber optic cables that shuttle online communications between countries and servers. For some privacy activists, this process is even more worrisome than monitoring call metadata because it allows governments to make copies of everything that transverses these cables, if they wanted to.
The amount of data being grabbed by British and American snoops is astounding. The information provided by Snowden reveals that the taps on the undersea fiber-optic cables collect around “21 million gigabytes per day.” The bulk data is then sent on to 550 NSA and British intelligence agents who will comb through and collate the material collected from the “at least 200 fiber optic cables so far.”
As noted in the Washington Post, “more than 550,000 miles of flexible undersea cables about the size of garden watering hoses carry all the world’s emails, searches, and tweets. Together, they shoot the equivalent of several hundred Libraries of Congress worth of information back and forth every day.”
What kind of communication is flowing from this global fountain of information? The Guardian (U.K.) reports that the collection “includes recordings of phone calls, the content of email messages, entries on Facebook and the history of any internet user’s access to websites — all of which is deemed legal, even though the warrant system was supposed to limit interception to a specified range of targets.”
The takeaway: There is not a single phone call, a single text message, a single social media post, or a single e-mail sent by a single American that is not collected, collated, and cataloged by the federal government.
While tapping undersea cables sounds a bit James Bond-esque, the truth is more impressive than fiction. Again, from the Atlantic:
The easiest place to get into the cables is at the regeneration points — spots where their signals are amplified and pushed forward on their long, circuitous journeys. “At these spots, the fiber optics can be more easily tapped, because they are no longer bundled together, rather laid out individually,” Deutsche Welle reported.
But such aquatic endeavors may no longer even be necessary. The cables make landfall at coastal stations in various countries, where their data is sent on to domestic networks, and it’s easier to tap them on land than underwater.
The next step in the process is almost unbelievable given the name of the NSA’s Internet surveillance program: PRISM. According to the story in the Atlantic, the snoops use an actual prism to collect the data and keep those on the look out for interception off the agency’s trail. Olga Khazan reports:
The tapping process apparently involves using so-called “intercept probes.” According to two analysts I spoke to, the intelligence agencies likely gain access to the landing stations, usually with the permission of the host countries or operating companies, and use these small devices to capture the light being sent across the cable. The probe bounces the light through a prism, makes a copy of it, and turns it into binary data without disrupting the flow of the original Internet traffic.
Capture the light, but keep it all in darkness.
As the data comes in, it is scoured by agents on both sides of the Atlantic Ocean who are looking for any occurrence of one of the more than 40,000 search terms that the intelligence community has determined are evidence of evil intent.
Terrorism, as legally defined, is a tactic, not a crime. Since the attacks of September 11, 2001, however, everyone is a potential suspect, regardless of the reason for the use of the words that trigger the alarms.