{"id":41171,"date":"2014-03-24T12:00:00","date_gmt":"2014-03-24T12:00:00","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=41171"},"modified":"2015-05-05T22:10:56","modified_gmt":"2015-05-05T21:10:56","slug":"nsa-surveillance-program-reaches-into-the-past-to-retrieve-replay-phone-calls","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2014\/03\/nsa-surveillance-program-reaches-into-the-past-to-retrieve-replay-phone-calls\/","title":{"rendered":"NSA Surveillance Program Reaches \u2018Into the Past\u2019 to Retrieve, Replay Phone Calls"},"content":{"rendered":"<p>The National Security Agency has built a surveillance system capable of recording \u201c100 percent\u201d of a foreign country\u2019s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden.<\/p>\n<p>A senior manager for the program compares it to a time machine \u2014 one that can replay the voices from any call without requiring that a person be identified in advance for surveillance.<\/p>\n<p>The voice interception program, called MYSTIC, began in 2009. Its RETRO tool, short for \u201cretrospective retrieval,\u201d and related projects reached full capacity against the first target nation in 2011. Planning documents two years later anticipated similar operations elsewhere.<\/p>\n<p>In the initial deployment, collection systems are recording \u201cevery single\u201d conversation nationwide, storing billions of them in a 30-day rolling buffer that clears the oldest calls as new ones arrive, according to a classified summary.<\/p>\n<p>The call buffer opens a door \u201cinto the past,\u201d the summary says, enabling users to \u201cretrieve audio of interest that was not tasked at the time of the original call.\u201d Analysts listen to only a fraction of 1 percent of the calls, but the absolute numbers are high. Each month, they send millions of voice clippings, or \u201ccuts,\u201d for processing and long-term storage.<\/p>\n<p>At the request of U.S. officials, The Washington Post is withholding details that could be used to identify the country where the system is being employed or other countries where its use was envisioned.<\/p>\n<p>No other NSA program <a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/nsa-secrets\/\" >disclosed to date<\/a> has swallowed a nation\u2019s telephone network whole. Outside experts have sometimes described that prospect as disquieting but remote, with notable implications for a growing debate over the NSA\u2019s practice of \u201cbulk collection\u201d abroad.<\/p>\n<p>Bulk methods capture massive data flows \u201cwithout the use of discriminants,\u201d as President Obama <a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/obamas-restrictions-on-nsa-surveillance-rely-on-narrow-definition-of-spying\/2014\/01\/17\/2478cc02-7fcb-11e3-93c1-0e888170b723_story.html\" >put it<\/a> in January. By design, they vacuum up all the data they touch \u2014 meaning that most of the conversations collected by RETRO would be irrelevant to U.S. national security interests.<\/p>\n<p>In the view of U.S. officials, however, the capability is highly valuable.<\/p>\n<p>In a statement, Caitlin Hayden, spokeswoman for the National Security Council, declined to comment on \u201cspecific alleged intelligence activities.\u201d Speaking generally, she said \u201cnew or emerging threats\u201d are \u201coften hidden within the large and complex system of modern global communications, and the United States must consequently collect signals intelligence in bulk in certain circumstances in order to identify these threats.\u201d<\/p>\n<p>NSA spokeswoman Vanee Vines, in an e-mailed statement, said that \u201ccontinuous and selective reporting of specific techniques and tools used for legitimate U.S. foreign intelligence activities is highly detrimental to the national security of the United States and of our allies, and places at risk those we are sworn to protect.\u201d<\/p>\n<p>Some of the documents provided by Snowden suggest that high-volume eavesdropping may soon be extended to other countries, if it has not been already. The RETRO tool was built three years ago as a \u201cunique one-off capability,\u201d but <a target=\"_blank\" href=\"http:\/\/apps.washingtonpost.com\/g\/page\/world\/adding-a-country-to-mystic-efforts-mentioned\/881\/\" >last year\u2019s secret intelligence budget<\/a> named five more countries for which the MYSTIC program provides \u201ccomprehensive metadata access and content,\u201d with a sixth expected to be in place by last October.<\/p>\n<p>The budget did not say whether the NSA now records calls in quantity in those countries, or expects to do so. A separate document placed high priority on planning \u201cfor MYSTIC accesses against projected new mission requirements,\u201d including \u201cvoice.\u201d<\/p>\n<p>Ubiquitous voice surveillance, even overseas, pulls in a great deal of content from Americans who telephone, visit and work in the target country. It may also be seen as inconsistent with Obama\u2019s Jan. 17 pledge \u201cthat the United States is not spying on ordinary people who don\u2019t threaten our national security,\u201d regardless of nationality, \u201cand that we take their privacy concerns into account.\u201d<\/p>\n<p>In a <a href=\"http:\/\/www.whitehouse.gov\/sites\/default\/files\/docs\/2014sigint_mem_ppd_rel.pdf\"  target=\"_blank\">presidential policy directive<\/a>, Obama instructed the NSA and other agencies that bulk acquisition may be used only to gather intelligence on one of six specified threats, including nuclear proliferation and terrorism. The directive, however, also noted that limits on bulk collection \u201cdo not apply to signals intelligence data that is temporarily acquired to facilitate targeted collection.\u201d<\/p>\n<p>The emblem of the MYSTIC program <a target=\"_blank\" href=\"http:\/\/apps.washingtonpost.com\/g\/page\/world\/nsa-symbolizes-data-collection-program-with-wizard\/880\/\" >depicts a cartoon wizard with a telephone-headed staff<\/a>. Among the agency\u2019s bulk collection programs disclosed over the past year, its focus on the spoken word is unique. Most of the programs have involved the bulk collection of either <a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show\/2013\/12\/04\/5492873a-5cf2-11e3-bc56-c6ca94801fac_story.html\" >metadata<\/a> \u2014 which does not include content \u2014 or text, such as <a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/nsa-collects-millions-of-e-mail-address-books-globally\/2013\/10\/14\/8e58b5be-34f9-11e3-80c6-7e6dd8d22d8f_story.html\" >e-mail address books<\/a>.<\/p>\n<p>Telephone calls are often thought to be more ephemeral and less suited than text for processing, storage and search. Indeed, there are indications that the call-recording program has been hindered by the NSA\u2019s limited capacity to store and transmit bulky voice files.<\/p>\n<p>In the first year of its deployment, a program officer wrote that the project \u201chas long since reached the point where it was collecting and sending home far more than the bandwidth could handle.\u201d<\/p>\n<p>Because of similar capacity limits across a range of collection programs, the NSA is leaping forward with cloud-based collection systems and a gargantuan new \u201cmission data repository\u201d in Utah. According to its overview briefing, the Utah facility is designed \u201cto cope with the vast increases in digital data that have accompanied the rise of the global network.\u201d<\/p>\n<p>Christopher Soghoian, the principal technologist for the American Civil Liberties Union, said history suggests that \u201cover the next couple of years they will expand to more countries, retain data longer and expand the secondary uses.\u201d<\/p>\n<p>Spokesmen for the NSA and the Office of Director of National Intelligence James R. Clapper Jr. declined to confirm or deny expansion plans or discuss the criteria for any change.<\/p>\n<p>Based on RETRO\u2019s internal reviews, the NSA has strong motive to deploy it elsewhere. In the documents and interviews, U.S. officials said RETRO is uniquely valuable when an analyst first uncovers a new name or telephone number of interest.<\/p>\n<p>With up to 30 days of recorded conversations in hand, the NSA can pull an instant history of the subject\u2019s movements, associates and plans. Some other U.S. intelligence agencies also have access to RETRO.<\/p>\n<p>Highly classified briefings cite examples in which the tool offered high-stakes intelligence that would not have existed under traditional surveillance programs in which subjects were identified for targeting in advance. Unlike most of the government\u2019s public claims about the value of controversial programs, the briefings supply names, dates, locations and fragments of intercepted calls in convincing detail.<\/p>\n<p>Present and former U.S. officials, speaking on the condition of anonymity to provide context for a classified program, acknowledged that large numbers of conversations involving Americans would be gathered from the country where RETRO operates.<\/p>\n<p>The NSA does not attempt to filter out their calls, defining them as communications \u201cacquired incidentally as a result of collection directed against appropriate foreign intelligence targets.\u201d<\/p>\n<p>Until about 20 years ago, such incidental collection was unusual unless an American was communicating directly with a foreign intelligence target. In bulk collection systems, which are exponentially more capable than the ones in use throughout the Cold War, calls and other data from U.S. citizens and permanent residents are regularly ingested by the millions.<\/p>\n<p>Under the NSA\u2019s internal \u201c<a href=\"http:\/\/www.dni.gov\/files\/documents\/1118\/CLEANEDFinal%20USSID%20SP0018.pdf\"  target=\"_blank\">minimization rules<\/a>,\u201d those intercepted communications \u201cmay be retained and processed\u201d and included in intelligence reports. The agency generally removes the names of U.S. callers, but there are several broadly worded exceptions.<\/p>\n<p>An independent group <a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/nsa-shouldnt-keep-phone-database-review-board-recommends\/2013\/12\/18\/f44fe7c0-67fd-11e3-a0b9-249bbb34602c_story.html\" >tasked by the White House to review U.S. surveillance policies<\/a> recommended that incidentally collected U.S. calls and e-mails \u2014 including those obtained overseas \u2014 should nearly always \u201cbe purged upon detection.\u201d Obama did not accept that recommendation.<\/p>\n<p>Vines, in her statement, said the NSA\u2019s work is \u201cstrictly conducted under the rule of law.\u201d<\/p>\n<p>RETRO and MYSTIC are carried out under <a target=\"_blank\" href=\"http:\/\/www.archives.gov\/federal-register\/codification\/executive-order\/12333.html\" >Executive Order 12333<\/a>, the traditional grant of presidential authority to intelligence agencies for operations outside the United States.<\/p>\n<p>Since August, Sen. Dianne Feinstein (D-Calif.), the chairman of the Senate Intelligence Committee, and others on that panel have been working on plans to <a target=\"_blank\" href=\"http:\/\/www.feinstein.senate.gov\/public\/index.cfm\/2013\/8\/feinstein-statement-on-nsa-compliance\" >assert a greater oversight role<\/a> for intelligence gathering abroad. Some legislators are now considering whether Congress should also draft new laws to govern those operations.<\/p>\n<p>Experts say there is not much legislation that governs overseas intelligence work.<\/p>\n<p>\u201cMuch of the U.S. government\u2019s intelligence collection is not regulated by any statute passed by Congress,\u201d said Timothy H. Edgar, the former director of privacy and civil liberties on Obama\u2019s national security staff. \u201cThere\u2019s a lot of focus on the Foreign Intelligence Surveillance Act, which is understandable, but that\u2019s only a slice of what the intelligence community does.\u201d<\/p>\n<p>All surveillance must be properly authorized for a legitimate intelligence purpose, he said, but that \u201cstill leaves a gap for activities that otherwise basically aren\u2019t regulated by law because they\u2019re not covered by FISA.\u201d<\/p>\n<p>Beginning in 2007, Congress loosened 40-year-old restrictions on domestic surveillance because so much foreign data crossed U.S. territory. There were no comparable changes to protect the privacy of U.S. citizens and residents whose calls and e-mails now routinely cross international borders.<\/p>\n<p>Vines noted that the NSA\u2019s job is to \u201cidentify threats within the large and complex system of modern global communications,\u201d where ordinary people share fiber-optic cables with legitimate intelligence targets.<\/p>\n<p>For Peter Swire, a member of the president\u2019s review group, the fact that Americans and foreigners use the same devices, software and networks calls for greater care to safeguard Americans\u2019 privacy.<\/p>\n<p>\u201cIt\u2019s important to have institutional protections so that advanced capabilities used overseas don\u2019t get turned against our democracy at home,\u201d he said.<\/p>\n<p>_______________________________<\/p>\n<p><i>Soltani is an independent security researcher and consultant.<\/i><\/p>\n<p><i>\u00a0Julie Tate contributed to this report.<\/i><\/p>\n<p><i>\u00a9 The Washington Post Company<\/i><\/p>\n<p><a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/nsa-surveillance-program-reaches-into-the-past-to-retrieve-replay-phone-calls\/2014\/03\/18\/226d2646-ade9-11e3-a49e-76adc9210f19_story.html\" >Go to Original \u2013 washingtonpost.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The NSA has built a surveillance system capable of recording \u201c100 percent\u201d of a foreign country\u2019s telephone calls according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-41171","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/41171","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=41171"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/41171\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=41171"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=41171"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=41171"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}