Quick read: The latest NSA revelation summarized
The New York Times' first fruits from its collaboration with the Edward Snowden archive shows us how the National Security Agency figures out whether people who associate with terrorists are part of a plot or conspiracy.
Headline: "N.S.A Gathers Data on Social Connections Of U.S. Citizens"
Significance: This is the "how" of "contact chaining." Our apocryphal terrorist bad guy in Yemen calls my number, 310-555-3939 in California. The NSA and the FBI then use the database of phone records to see who I've called recently, and who the people that I've called have called. If the numbers match those on a watch list, then the FBI will open an investigation. This article tells us what happens to the OTHER numbers that the NSA has run through its system.
Subscribe to The Week
Escape your echo chamber. Get the facts behind the news, plus analysis from multiple perspectives.
Sign up for The Week's Free Newsletters
From our morning news briefing to a weekly Good News Newsletter, get the best of The Week delivered directly to your inbox.
From our morning news briefing to a weekly Good News Newsletter, get the best of The Week delivered directly to your inbox.
Key point: The NSA can utilize its contact chaining database and perform subsequent analysis on phone numbers "directly or indirectly" connected to a foreign intelligence purpose. Counter-terrorism is one. There are others, like counter-proliferation, counter-narcotics and counter-espionage.
Explanation: The point of having the American telephone number database is to figure out whether people unknown to the government are communicating through intermediates with terrorists. In other to do that, the NSA matches the phone numbers against all of the information it has access to, which consists of the digital network information and content they've legally collected under the FISA law as well as public sources, like Google, or Lexus-Nexis, or Facebook. It "enriches" the number.
I've explained how this process (likely) worked before, not having access to the documents that Snowden provided other journalists. The Times story confirms what one would assume the NSA would have to do with the data it collects in order to assess it for relevance.
What we still don't know: The scope of the domestic email metadata that is obtained through proprietary and legal authorities, and not simply by searching Google.
Sign up for Today's Best Articles in your inbox
A free daily email with the biggest news stories of the day – and the best features from TheWeek.com
Harm to national security from publication: None. In my opinion, which is of limited relevance, this article does not damage U.S. national security interests.
Marc Ambinder is TheWeek.com's editor-at-large. He is the author, with D.B. Grady, of The Command and Deep State: Inside the Government Secrecy Industry. Marc is also a contributing editor for The Atlantic and GQ. Formerly, he served as White House correspondent for National Journal, chief political consultant for CBS News, and politics editor at The Atlantic. Marc is a 2001 graduate of Harvard. He is married to Michael Park, a corporate strategy consultant, and lives in Los Angeles.
-
Today's political cartoons - January 19, 2025
Cartoons Sunday's cartoons - moving to Canada, billionaire bootlickers, and more
By The Week US Published
-
5 inflammatory cartoons on the L.A. wildfires
Cartoons Artists take on climate change denial, the blame game, and more
By The Week US Published
-
The problems with the current social care system
The Explainer The question of how to pay for adult social care is perhaps the greatest unresolved policy issue of our time
By The Week UK Published