By Lance Koonce
It seems like a new revelation about mass surveillance by the U.S. government and our allies occurs on an almost daily basis, each one more astounding than the last. Don’t be surprised if those jingling bells you hear on your roof next week are not St. Nick, but instead someone installing a covert listening device on your fiberoptic phone line.
So, just in time for holidays, here’s a musical summary of some of the most stunning surveillance disclosures, with citations to background material on each. Break out the eggnog and join us as we count down the Twelve Days of Surveillance.
On the first day of surveillance, my government took from me…the assurance my speech will be free.
We’re starting with this because it’s a little bit counterintuitive: what does free speech have to do with government surveillance? Well, the knowledge (or even suspicion) that you are being monitored may have a direct impact on your willingness to speak freely, especially on matters that might be controversial. It also impacts the freedom of association – that is, not just what you say, but to whom you say it. A recent survey of writers by the PEN American Center found that writers are already changing their behavior in disturbing ways based on their knowledge of the NSA’s bulk surveillance program. Similarly, the Electronic Freedom Foundation, in a filing in the First Unitarian Church of Los Angeles v. NSA case, presented numerous personal accounts of chilling effects of the NSA surveillance on the freedom of association.
On the second day of surveillance, my government took from me…a slew of metadata.
So far, this is the big one: The NSA has collected and stored data about virtually every telephone call made in the United States (and elsewhere) since late 2001. The story began to unfold publicly in 2005 with a report in the New York Times, followed by a report by USA Today the following year with more details. Confirmation of many details came with the release of classified documents by NSA whistleblower Edward J. Snowden. In June 2013, The Guardian released a document that demonstrated that the NSA is collecting “communication records of millions of US citizens . . . indiscriminately and in bulk”, and that this information includes “the numbers of both parties on a call” as well as “location data, call duration, unique identifiers, and the time and duration of all calls.” The scope of the data collection is staggering, and as the former general counsel of the NSA has said, “Metadata absolutely tells you everything about somebody’s life. If you have enough metadata you don’t really need content…. [It’s] sort of embarrassing how predictable we are as human beings.” (Probably also true of turtledoves, but the extent of avian surveillance remains unclear.)
On the third day of surveillance, my government took from me…addresses of my friends.
The Washington Post has reported that the NSA is collecting “millions of contact lists from personal e-mail and instant messaging accounts around the world, many of them belonging to Americans.” This means that “the NSA is gathering contact lists in large numbers that amount to a sizable fraction of the world’s e-mail and instant messaging accounts.” And it’s not just addresses – the New York Times has also revealed that the NSA has been “exploiting its huge collections of data to create sophisticated graphs of some Americans’ social connections that can identify their associates, their locations at certain times, their traveling companions and other personal information.” So, whether your buddies include French Hens, German Hens, or Turkish Hens…it doesn’t really matter, the NSA knows.
On the fourth day of surveillance, my government took from me…scores of calling locations.
Well, not really “scores” – that just rhymes better with “four” calling birds (or is it colly birds?). Actually, the NSA collects five billion records per day on the location of cell phones worldwide, meaning that it is tracking the location of “hundreds of millions” of phones. The Washington Post reports that “The NSA does not target Americans’ location data by design, but the agency acquires a substantial amount of information on the whereabouts of domestic cellphones ‘incidentally’”. That word hasn’t been so fraught with meaning since a famous person once said: “Justice is incidental to law and order.” Who said that? J. Edgar Hoover.
On the fifth day of surveillance, my government took from me…my privacy.
On the sixth day of surveillance, my government took from me…linked gamers playing.
On December 9 of this year, based on documents disclosed by Snowden, The New York Times, ProPublica and the Guardian reported that the NSA has conducted extensive surveillance within the massive multiplayer online role-playing games Second Life and World of Warcraft. In addition to collecting data and contents of communications between players, NSA employees also have created characters within the games to surveil other players.
On the seventh day of surveillance, my government took from me…upstream Internet traffic.
Wikipedia defines the Internet “backbone” as “principal data routes between large, strategically interconnected networks and core routers on the Internet” – in other words, just as it sounds, the backbone is the structure upon which our interconnected world is built. In 2006, an AT&T technician disclosed the existence of a “secure room” interception facility in San Francisco that the NSA was using to collect large amounts of telecommunications data, and there were suggestions that similar interception points existed elsewhere that allowed the collection of “upstream” Internet traffic. The NSA program called PRISM, revealed by Snowden documents in June 2013, allows the agency to collect stored Internet communications by making demands to Internet providers (e.g., Google, Yahoo!) for data matching FISA court-sanctioned search terms (individual warrants are not required), but in addition to this judicially-supervised process, the Washington Post has reported that NSA also has worked with providers to “install equipment that copies, scans and filters large amounts of the traffic that passes through” the backbone “[a]t key points along the U.S. Internet infrastructure”. And that’s not all. In the most striking revelation, despite the programs just mentioned, in October it was revealed that the NSA has secretly tapped into the communications networks linking the companies’ respective data clouds: according to the report, the NSA “sends millions of records every day from internal Yahoo and Google networks to data warehouses at the agency’s headquarters at Fort Meade. . . including ‘metadata,’ which would indicate who sent or received e-mails and when, as well as content such as text, audio and video.”
On the eighth day of surveillance, my government took from me…an economy a growing.
The daily drumbeat of news about NSA surveillance has not been lost on the United States’ foreign trading partners. As the Wall Street Journal has reported, US telecom providers may face significant resistance to expansion in Europe because of the NSA fall-out. Concern over how they are viewed by foreign markets likely also played a role in the recent effort by Apple, Google, Microsoft, Facebook, Yahoo, LinkedIn, Twitter and AOL to challenge President Obama to rein in the NSA’s surveillance programs.
On the ninth day of surveillance, my government gave to me…adult activity shaming.
Shades of J. Edgar Hoover, again: On November 27, 2013, it was revealed that the NSA has been collecting “records of online sexual activity and evidence of visits to pornographic websites”, for use in “discrediting” people the NSA believes are “radicalizing others through incendiary speeches”. This apparently includes individuals other than those with clear ties to terrorist organizations, and might include American citizens (although all six examples in the leaked Snowden document that led to this revelation were outside the US).
On the tenth day of surveillance, my government took from me…security that is balanced.
A “necessary” evil? On December 11, 2013, NSA Director Keith Alexander told the Senate Judiciary Committee “there isn’t a better way” than conducting mass surveillance of telephone records, when the question is defense of the US against terror threats. Even assuming this is true, it is hardly the point: While collecting data every call made by every person in the US may contribute to security of our country, this is no different than saying that by lowering the speed limit to 1 mph you could eliminate almost all traffic fatalities, or by outlawing all knives including kitchen cutlery you can reduce the number of stabbings. Is wholesale monitoring of our telephone and online behavior a price we are willing to pay for increased safety?
On the eleventh day of surveillance, my government gave to me…Google cookies tracking.
Well, it wouldn’t be Christmas without something about cookies, but in this case it’s a Naughty Santa Agency that is gobbling them up. Recent reports say that NSA is able to use Google ad tracking cookies to “single out an individual’s communications among the sea of Internet data in order to send out software that can hack that person’s computer.” Ho Ho Ho!
On the twelfth day of surveillance, my government gave to me…hints that more is coming.
It’s not just the NSA that collects bulk data under the Patriot Act. Recently, the New York Time reported that the CIA uses the statute as its authorization to collect bulk data about foreign financial transactions, including those into and out of the United States. Ominously, the Times cited anonymous officials who indicated that other bulk collection program have yet to come to light.
But let’s end on a positive note. The recent pivot by major technology companies to begin putting public pressure on the US government to change its surveillance programs, the holding by a federal judge the bulk collection of telephone metadata is likely unconstitutional, and the recommendations by a presidential task force to substantially curtail the NSA surveillance programs, may indicate that the tide is turning. Let’s see what the New Year brings.