Quick read: The latest NSA revelation summarized
The New York Times' first fruits from its collaboration with the Edward Snowden archive shows us how the National Security Agency figures out whether people who associate with terrorists are part of a plot or conspiracy.
Headline: "N.S.A Gathers Data on Social Connections Of U.S. Citizens"
Significance: This is the "how" of "contact chaining." Our apocryphal terrorist bad guy in Yemen calls my number, 310-555-3939 in California. The NSA and the FBI then use the database of phone records to see who I've called recently, and who the people that I've called have called. If the numbers match those on a watch list, then the FBI will open an investigation. This article tells us what happens to the OTHER numbers that the NSA has run through its system.
Subscribe to The Week
Escape your echo chamber. Get the facts behind the news, plus analysis from multiple perspectives.
Sign up for The Week's Free Newsletters
From our morning news briefing to a weekly Good News Newsletter, get the best of The Week delivered directly to your inbox.
From our morning news briefing to a weekly Good News Newsletter, get the best of The Week delivered directly to your inbox.
Key point: The NSA can utilize its contact chaining database and perform subsequent analysis on phone numbers "directly or indirectly" connected to a foreign intelligence purpose. Counter-terrorism is one. There are others, like counter-proliferation, counter-narcotics and counter-espionage.
Explanation: The point of having the American telephone number database is to figure out whether people unknown to the government are communicating through intermediates with terrorists. In other to do that, the NSA matches the phone numbers against all of the information it has access to, which consists of the digital network information and content they've legally collected under the FISA law as well as public sources, like Google, or Lexus-Nexis, or Facebook. It "enriches" the number.
I've explained how this process (likely) worked before, not having access to the documents that Snowden provided other journalists. The Times story confirms what one would assume the NSA would have to do with the data it collects in order to assess it for relevance.
What we still don't know: The scope of the domestic email metadata that is obtained through proprietary and legal authorities, and not simply by searching Google.
Sign up for Today's Best Articles in your inbox
A free daily email with the biggest news stories of the day – and the best features from TheWeek.com
Harm to national security from publication: None. In my opinion, which is of limited relevance, this article does not damage U.S. national security interests.
Marc Ambinder is TheWeek.com's editor-at-large. He is the author, with D.B. Grady, of The Command and Deep State: Inside the Government Secrecy Industry. Marc is also a contributing editor for The Atlantic and GQ. Formerly, he served as White House correspondent for National Journal, chief political consultant for CBS News, and politics editor at The Atlantic. Marc is a 2001 graduate of Harvard. He is married to Michael Park, a corporate strategy consultant, and lives in Los Angeles.
-
Assad's fall upends the Captagon drug empire
Multi-billion-dollar drug network sustained former Syrian regime
By Richard Windsor, The Week UK Published
-
The key financial dates to prepare for in 2025
The Explainer Discover the main money milestones that may affect you in the new year
By Marc Shoffman, The Week UK Published
-
Sudoku medium: December 19, 2024
The Week's daily medium sudoku puzzle
By The Week Staff Published