{"id":62566,"date":"2015-08-17T12:00:56","date_gmt":"2015-08-17T11:00:56","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=62566"},"modified":"2015-08-16T21:02:17","modified_gmt":"2015-08-16T20:02:17","slug":"nsa-spying-relies-on-atts-extreme-willingness-to-help","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2015\/08\/nsa-spying-relies-on-atts-extreme-willingness-to-help\/","title":{"rendered":"NSA Spying Relies on AT&#038;T\u2019s \u2018Extreme Willingness to Help\u2019"},"content":{"rendered":"<p><em>The <a target=\"_blank\" href=\"http:\/\/topics.nytimes.com\/top\/reference\/timestopics\/organizations\/n\/national_security_agency\/index.html?inline=nyt-org\" >National Security Agency<\/a>\u2019s ability to spy on vast quantities of Internet traffic passing through the United States has relied on its extraordinary, decades-long partnership with a single company: the telecom giant AT&amp;T.<\/em><\/p>\n<p><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/08\/nsa-propublica-att-usa-spying-internet.jpg\" ><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-62567\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/08\/nsa-propublica-att-usa-spying-internet.jpg\" alt=\"nsa propublica at&amp;t usa spying internet\" width=\"700\" height=\"513\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/08\/nsa-propublica-att-usa-spying-internet.jpg 1200w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/08\/nsa-propublica-att-usa-spying-internet-300x220.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/08\/nsa-propublica-att-usa-spying-internet-1024x750.jpg 1024w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/a><\/p>\n<p><em>15 Aug 2015 &#8211; <\/em>While it has been long known that American telecommunications companies worked closely with the spy agency, newly disclosed N.S.A. documents show that the relationship with AT&amp;T has been considered unique and especially productive. One document described it as \u201chighly collaborative,\u201d while another lauded the company\u2019s \u201cextreme willingness to help.\u201d<\/p>\n<p>AT&amp;T\u2019s cooperation has involved a broad range of classified activities, according to the documents, which date from 2003 to 2013. AT&amp;T has given the N.S.A. access, through several methods covered under different legal rules, to billions of emails as they have flowed across its domestic networks. It provided technical assistance in carrying out a secret court order permitting the wiretapping of all Internet communications at the United Nations headquarters, a customer of AT&amp;T.<\/p>\n<p>The N.S.A.\u2019s top-secret budget in 2013 for the AT&amp;T partnership was more than twice that of the next-largest such program, according to the documents. The company installed surveillance equipment in at least 17 of its Internet hubs on American soil, far more than its similarly sized competitor, Verizon. And its engineers were the first to try out new surveillance technologies invented by the eavesdropping agency.<\/p>\n<p>One document reminds N.S.A. officials to be polite when visiting AT&amp;T facilities, noting, \u201cThis is a partnership, not a contractual relationship.\u201d<\/p>\n<p>The documents, provided by the former agency contractor Edward J. Snowden, were jointly reviewed by The New York Times and ProPublica. The N.S.A., AT&amp;T and Verizon declined to discuss the findings from the files. \u201cWe don\u2019t comment on matters of national security,\u201d an AT&amp;T spokesman said.<\/p>\n<p>It is not clear if the programs still operate in the same way today. Since the Snowden revelations set off a global debate over surveillance two years ago, some Silicon Valley technology companies have expressed anger at what they characterize as N.S.A. intrusions and have rolled out new encryption to thwart them. The telecommunications companies have been quieter, though Verizon unsuccessfully challenged a court order for bulk phone records in 2014.<\/p>\n<p>At the same time, the government has been fighting in court to keep the identities of its telecom partners hidden. In a recent case, a group of AT&amp;T customers claimed that the N.S.A.\u2019s tapping of the Internet violated the Fourth Amendment protection against unreasonable searches. This year, a federal judge dismissed key portions of the lawsuit after the Obama administration argued that public discussion of its telecom surveillance efforts would reveal state secrets, damaging national security.<\/p>\n<p>The N.S.A. documents do not identify AT&amp;T or other companies by name. Instead, they refer to corporate partnerships run by the agency\u2019s Special Source Operations division using code names. The division is responsible for more than 80 percent of the information the N.S.A. collects, one document states.<\/p>\n<p>Fairview is one of its oldest programs. It began in 1985, the year after antitrust regulators broke up the Ma Bell telephone monopoly and its long-distance division became AT&amp;T Communications. An analysis of the Fairview documents by The Times and ProPublica reveals a constellation of evidence that points to AT&amp;T as that program\u2019s partner. Several former intelligence officials confirmed that finding.<\/p>\n<p>A Fairview fiber-optic cable, damaged in the 2011 earthquake in Japan, was repaired on the same date as a Japanese-American cable operated by AT&amp;T. Fairview documents use technical jargon specific to AT&amp;T. And in 2012, the Fairview program carried out the court order for surveillance on the Internet line, which AT&amp;T provides, serving the United Nations headquarters. (N.S.A. spying on United Nations diplomats has <a target=\"_blank\" href=\"http:\/\/www.spiegel.de\/international\/world\/secret-nsa-documents-show-how-the-us-spies-on-europe-and-the-un-a-918625.html\" >previously<\/a> <a target=\"_blank\" href=\"http:\/\/www.lemonde.fr\/technologies\/article\/2013\/10\/22\/the-nsa-wiretapped-french-diplomats-in-the-us_3500733_651865.html\" >been<\/a> <a target=\"_blank\" href=\"http:\/\/www.nytimes.com\/2014\/05\/13\/world\/middleeast\/book-reveals-wider-net-of-us-spying-on-envoys.html\" >reported<\/a>, but not the court order or AT&amp;T\u2019s involvement. In October 2013, the United States <a target=\"_blank\" href=\"http:\/\/www.reuters.com\/article\/2013\/10\/30\/us-usa-security-un-idUSBRE99T17L20131030\" >told the United Nations<\/a> that it would not monitor its communications.)<\/p>\n<p>The documents also show that another program, code-named Stormbrew, has included Verizon and the former MCI, which Verizon purchased in 2006. One describes a Stormbrew cable landing that is identifiable as one that Verizon operates. Another names a contact person whose LinkedIn profile says he is a longtime Verizon employee with a top-secret clearance.<\/p>\n<div id=\"attachment_62568\" style=\"width: 710px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/08\/nsa-propublica-att-usa-spying-internet3.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-62568\" class=\"wp-image-62568\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/08\/nsa-propublica-att-usa-spying-internet3.jpg\" alt=\"AT&amp;T\u2019s cable station in Point Arena, California. NSA collection at this site was temporarily disrupted after the 2011 Japanese earthquake damaged the undersea cable. (Henrik Moltke for ProPublica)\" width=\"700\" height=\"467\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/08\/nsa-propublica-att-usa-spying-internet3.jpg 900w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/08\/nsa-propublica-att-usa-spying-internet3-300x200.jpg 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/a><p id=\"caption-attachment-62568\" class=\"wp-caption-text\">AT&amp;T\u2019s cable station in Point Arena, California. NSA collection at this site was temporarily disrupted after the 2011 Japanese earthquake damaged the undersea cable. (Henrik Moltke for ProPublica)<\/p><\/div>\n<p>After the terrorist attacks of Sept. 11, 2001, AT&amp;T and MCI were instrumental in the Bush administration\u2019s warrantless wiretapping programs, according to a draft report by the N.S.A.\u2019s inspector general. The report, disclosed by Mr. Snowden and previously <a target=\"_blank\" href=\"http:\/\/www.theguardian.com\/world\/interactive\/2013\/jun\/27\/nsa-inspector-general-report-document-data-collection\" >published by The Guardian<\/a>, does not identify the companies by name but describes their market share in numbers that correspond to those two businesses, according to Federal Communications Commission reports.<\/p>\n<p>AT&amp;T began turning over emails and phone calls \u201cwithin days\u201d after the warrantless surveillance began in October 2001, the report indicated. By contrast, the other company did not start until February 2002, the draft report said.<\/p>\n<p>In September 2003, according to the previously undisclosed N.S.A. documents, AT&amp;T was the first partner to turn on a new collection capability that the N.S.A. said amounted to a \u201c\u00a0\u2018live\u2019 presence on the global net.\u201d In one of its first months of operation, the Fairview program forwarded to the agency 400 billion Internet metadata records \u2014 which include who contacted whom and other details, but not what they said \u2014 and was \u201cforwarding more than one million emails a day to the keyword selection system\u201d at the agency\u2019s headquarters in Fort Meade, Md. Stormbrew was still gearing up to use the new technology, which appeared to process foreign-to-foreign traffic separate from the post-9\/11 program.<\/p>\n<p>In 2011, AT&amp;T began handing over 1.1 billion domestic cellphone calling records a day to the N.S.A. after \u201ca push to get this flow operational prior to the 10th anniversary of 9\/11,\u201d according to an internal agency newsletter. This revelation is striking because after Mr. Snowden disclosed the program of collecting the records of Americans\u2019 phone calls, intelligence officials told reporters that, for technical reasons, it consisted mostly of landline phone records.<\/p>\n<p>That year, one slide presentation shows, the N.S.A. spent $188.9 million on the Fairview program, twice the amount spent on Stormbrew, its second-largest corporate program.<\/p>\n<p>After The Times disclosed the Bush administration\u2019s warrantless wiretapping program in December 2005, plaintiffs began trying to sue AT&amp;T and the N.S.A. In a 2006 lawsuit, a retired AT&amp;T technician named Mark Klein claimed that three years earlier, he had seen a secret room in a company building in San Francisco where the N.S.A. had installed equipment.<\/p>\n<p>Mr. Klein claimed that AT&amp;T was providing the N.S.A. with access to Internet traffic that AT&amp;T transmits for other telecom companies. Such cooperative arrangements, known in the industry as \u201cpeering,\u201d mean that communications from customers of other companies could end up on AT&amp;T\u2019s network.<\/p>\n<p>After Congress passed a 2008 law legalizing the Bush program and immunizing the telecom companies for their cooperation with it, that lawsuit was thrown out. But the newly disclosed documents show that AT&amp;T has provided access to peering traffic from other companies\u2019 networks.<\/p>\n<p>AT&amp;T\u2019s \u201ccorporate relationships provide unique accesses to other telecoms and I.S.P.s,\u201d or Internet service providers, one 2013 N.S.A. document states.<\/p>\n<p>Because of the way the Internet works, intercepting a targeted person\u2019s email requires copying pieces of many other people\u2019s emails, too, and sifting through those pieces. Plaintiffs have been trying without success to get courts to address whether copying and sifting pieces of all those emails violates the Fourth Amendment.<\/p>\n<p>Many privacy advocates have suspected that AT&amp;T was giving the N.S.A. a copy of all Internet data to sift for itself. But one 2012 presentation says the spy agency does not \u201ctypically\u201d have \u201cdirect access\u201d to telecoms\u2019 hubs. Instead, the telecoms have done the sifting and forwarded messages the government believes it may legally collect.<\/p>\n<p>\u201cCorporate sites are often controlled by the partner, who filters the communications before sending to N.S.A.,\u201d according to the presentation. This system sometimes leads to \u201cdelays\u201d when the government sends new instructions, it added.<\/p>\n<p>The companies\u2019 sorting of data has allowed the N.S.A. to bring different surveillance powers to bear. Targeting someone on American soil requires a court order under the <a target=\"_blank\" href=\"http:\/\/topics.nytimes.com\/top\/reference\/timestopics\/subjects\/f\/foreign_intelligence_surveillance_act_fisa\/index.html?inline=nyt-classifier\" >Foreign Intelligence Surveillance Act<\/a>. When a foreigner abroad is communicating with an American, that law permits\u00a0the government to target that foreigner without a warrant. When foreigners are messaging other foreigners, \u00a0that law does not apply and\u00a0the government can collect such emails in bulk without targeting anyone.<\/p>\n<p>AT&amp;T\u2019s provision of foreign-to-foreign traffic has been particularly important to the N.S.A. because large amounts of the world\u2019s Internet communications travel across American cables. AT&amp;T provided access to the contents of transiting email traffic for years before Verizon began doing so in March 2013, the documents show. They say AT&amp;T gave the N.S.A. access to \u201cmassive amounts of data,\u201d and by 2013 the program was processing 60 million foreign-to-foreign emails a day.<\/p>\n<p>Because domestic wiretapping laws do not cover foreign-to-foreign emails, the companies have provided them voluntarily, not in response to court orders, intelligence officials said. But it is not clear whether that remains the case after the post-Snowden upheavals.<\/p>\n<p>\u201cWe do not voluntarily provide information to any investigating authorities other than if a person\u2019s life is in danger and time is of the essence,\u201d Brad Burns, an AT&amp;T spokesman, said. He declined to elaborate.<\/p>\n<p>***************<\/p>\n<h3><em>Timeline: NSA and AT&amp;T\u2019s Close Relationship through the\u00a0Years<\/em><\/h3>\n<h4><em>1984<\/em><\/h4>\n<p><em>The \u201cMa Bell\u201d phone monopoly breaks up into regional \u201cBaby Bells\u201d and a long-distance company that retains the AT&amp;T name and enters the computer business.<\/em><\/p>\n<h4><em>1985<\/em><\/h4>\n<p><em>NSA launches Fairview program partnership with a single partner, AT&amp;T, <a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/2274319-fairviews2dbriefings11march2013.html\" >according to internal documents<\/a>.<\/em><\/p>\n<h4><em>1985<\/em><\/h4>\n<p><em>AT&amp;T\u2019s first big contract as a standalone company is a nearly $1 billion agreement to provide computers and services to the National Security Agency, according to <a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/2280795-at-amp-t-dod-article.html\" >news reports<\/a> at the time.<\/em><\/p>\n<h4><em>2001<\/em><\/h4>\n<p><em>In the days after the 9\/11 terrorist attacks, Congress passes the Patriot Act. President Geroge W. Bush also secretly authorizes a warrantless wiretapping program known as Stellar Wind. AT&amp;T is the first company to start turning over records under both programs, <a target=\"_blank\" href=\"http:\/\/www.theguardian.com\/world\/interactive\/2013\/jun\/27\/nsa-inspector-general-report-document-data-collection\" >according to internal documents<\/a>.<\/em><\/p>\n<h4><em>2003<\/em><\/h4>\n<p><em>AT&amp;T is forwarding more than 1 million emails per day and 400 million Internet metadata records a month to the NSA, <a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/2274320-sidtoday-fairview-and-stormbrew-live-on-the-net.html\" >according to internal documents<\/a>.<\/em><\/p>\n<h4><em>2003\u20132006<\/em><\/h4>\n<p><em>For three years, AT&amp;T provides the FBI with illegal \u2018sneak peeks\u2019 at the calling records for communities of hundreds of people without legally valid requests for the information, according to <a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/2273896-march2007-caproni-testimony-1.html\" >congressional testimony<\/a> by FBI General Counsel Valerie Caproni. Verizon <a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/2273897-verizon-wiretaping-response-101207.html\" >told Congress<\/a> it did not provide similar community information.<\/em><\/p>\n<h4><em>2005<\/em><\/h4>\n<p><em>The New York Times <a target=\"_blank\" href=\"http:\/\/www.nytimes.com\/2005\/12\/16\/politics\/bush-lets-us-spy-on-callers-without-courts.html?_r=0\" >reveals<\/a> President Bush\u2019s warrantless wiretapping program.<\/em><\/p>\n<h4><em>2006<\/em><\/h4>\n<p><em>Former AT&amp;T engineer Mark Klein <a target=\"_blank\" href=\"https:\/\/www.eff.org\/node\/55051\" >publicly reveals<\/a> in a lawsuit a secret room in AT&amp;T\u2019s San Francisco office that he says siphons traffic to the NSA. <\/em><\/p>\n<h4><em>2008<\/em><\/h4>\n<p><em>Congress passes the <a target=\"_blank\" href=\"https:\/\/www.govtrack.us\/congress\/bills\/110\/hr6304\" >FISA Amendments Act<\/a>, legalizing portions of warrantless wiretapping and granting legal immunity to AT&amp;T and other telecommunications companyies for their participation in it.<\/em><\/p>\n<h4><em>2009<\/em><\/h4>\n<p><em>9th Circuit Court of Appeals <a target=\"_blank\" href=\"https:\/\/www.eff.org\/node\/68082\" >dismisses<\/a> the case based on Klein\u2019s allegations, citing the immunity granted to telecommunications companies by Congress.<\/em><\/p>\n<h4><em>2011<\/em><\/h4>\n<p><em>AT&amp;T starts delivering 1.1 billion of its customers\u2019 cellphone calling records per day to the NSA, under the Patriot Act business records provision, <a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/2274327-sso-news-mobility-business-records-flow.html\" >according to internal documents<\/a>.<\/em><\/p>\n<h4><em>2013<\/em><\/h4>\n<p><em>Edward Snowden passes journalists a trove of NSA documents that reveal the vast scope of NSA spying.<\/em><\/p>\n<h4><em>2015<\/em><\/h4>\n<p><em>U.S. District Court for the Northern District of California dismisses key portions of another <a target=\"_blank\" href=\"https:\/\/www.eff.org\/cases\/jewel\" >constitutional challenge<\/a> to AT&amp;T\u2019s fiber taps, after the government argued that any discussion of its collaborations with telecom companies was a state secret.<\/em><\/p>\n<p><em>*****************<\/em><\/p>\n<p><em><a target=\"_blank\" href=\"http:\/\/www.nytimes.com\/interactive\/2015\/08\/15\/us\/documents.html\" >Newly Disclosed N.S.A. Files Detail Partnerships with AT&amp;T and Verizon<\/a> &#8211; <\/em><em>Aug 15, 2015<\/em><\/p>\n<p><em>\u00a0These National Security Agency documents shed new light on the agency\u2019s relationship through the years with American telecommunications companies. They show how the agency\u2019s partnership with AT&amp;T has been particularly important, enabling it to conduct surveillance, under several different legal rules, of international and foreign-to-foreign Internet communications that passed through network hubs on American soil. The documents come from the archive provided by the former intelligence contractor Edward J. Snowden. The files do not identify the firms by name, but instead refer to the Fairview and Stormbrew programs, An analysis by The New York Times and ProPublica found a constellation of evidence that AT&amp;T was the Fairview partner and Verizon was part of the Stormbrew program. The documents range from 2003 to 2013; it is not clear whether the arrangements are the same today.<\/em><\/p>\n<p><strong>Key\u00a0Documents:<a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/08\/nsa-propublica-att-usa-spying-internet2.jpg\" ><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-62569\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/08\/nsa-propublica-att-usa-spying-internet2.jpg\" alt=\"nsa propublica at&amp;t usa spying internet2\" width=\"360\" height=\"437\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/08\/nsa-propublica-att-usa-spying-internet2.jpg 360w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/08\/nsa-propublica-att-usa-spying-internet2-247x300.jpg 247w\" sizes=\"auto, (max-width: 360px) 100vw, 360px\" \/><\/a><\/strong><\/p>\n<ul>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/2275165-tssinfcorporateoverview.html\" >Special Source Operations: Corporate Partner Access<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/2274329-tssinfssooverviewforntoc25march2013.html\" >Cyber Threats and Special Source Operations<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/2274322-sso-dictionary.html\" >Excerpts from the Spy Dictionary<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/2274321-sso-corpteambrief20mar2012-s2d.html\" >NSA\u2019s Corporate Portfolio<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/2274320-sidtoday-fairview-and-stormbrew-live-on-the-net.html\" >One Million Emails a Day From AT&amp;T<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/2274319-fairviews2dbriefings11march2013.html\" >Fairview Defined<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/2274318-fairviewdataflowchartsapril2012.html\" >Fairview Data Schematics<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/2281502-u14mar2013-sso-weeklybrief-v1-0-redacted-1.html\" >AT&amp;T Confirms &#8220;Foreignness&#8221; for Stormbrew<\/a><\/li>\n<\/ul>\n<h4>NSA\u2019s Special Source Operations Newsletter Excerpts<\/h4>\n<ul>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/2274328-sso-news-united-nations-dni-collection-enabled.html\" >Spying on the United Nations<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/2274327-sso-news-mobility-business-records-flow.html\" >Billions of AT&amp;T Cellphone Records<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/2274326-sso-news-fairview-cliffside-site-collection.html\" >The Cable Break Due to the Japanese Earthquake<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/2274325-sso-news-fairview-tour-for-director-research.html\" >AT&amp;T\u2019s \u2018Extreme Willingness to Help\u2019<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/2274324-sso-news-fairview-tour.html\" >AT&amp;T\u2019s \u2018Highly Collaborative Nature\u2019<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/2274323-sso-news-breckenridge-for-stormbrew-collection.html\" >Verizon&#8217;s Cable Station Installs NSA Collection Systems<\/a><\/li>\n<\/ul>\n<p><em>_____________________________________<\/em><\/p>\n<p><em>\u00a0This story was co-published with <\/em><em><a target=\"_blank\" href=\"http:\/\/www.nytimes.com\/\" ><em>The New York Times<\/em><\/a><\/em><em>.<\/em><\/p>\n<p><em>Julia Angwin <\/em><em>is a senior reporter at<\/em> ProPublica. <em>From 2000 to 2013, she was a reporter at <\/em>The Wall Street Journal<em>, where she led a privacy investigative team that was a finalist for a Pulitzer Prize in Explanatory Reporting in 2011 and won a Gerald Loeb Award in 2010.<\/em><\/p>\n<p><em>Jeff Larson <\/em><em>is the Data Editor at<\/em> ProPublica. <em>He is a winner of the Livingston Award for the 2011 series <\/em><a target=\"_blank\" href=\"http:\/\/www.propublica.org\/series\/redistricting\" >Redistricting: How Powerful Interests are Drawing You Out of a Vote<\/a>.<\/p>\n<p><em>James Risen is an author, reporter and investigative journalist who has exposed various illegal activities by the US government and who is facing imprisonment for refusing to reveal the identity of one of his sources. In his book, <\/em><em>State of War: The Secret History of the CIA and the Bush Administration<\/em><em>, Risen cites information from an unnamed intelligence agent about a CIA operation, Operation Merlin, which sought to disrupt Iran\u2019s nuclear program. On 2 June, 2014 the US Supreme Court decided not to intervene. Risen has categorically insisted that he will accept imprisonment before violating the confidentiality of his source.<\/em><\/p>\n<p><em>Laura Poitras is a documentary filmmaker, journalist, and artist. \u00a0She is currently finishing a trilogy of films about post-9\/11 America. The first film on the Iraq war, <\/em><em>My Country, My Country<\/em><em>, was nominated for an Academy Award. The second film on Guantanamo, <\/em><em>The Oath<\/em><em>, received the Sundance award for cinematography. She is now editing the final film about NSA mass surveillance. In May 2013, she traveled to Hong Kong with Glenn Greenwald to interview Edward Snowden.\u00a0 She has been reporting on Snowden\u2019s disclosures about the NSA for a variety of news outlets, including <\/em><em>The Guardian<\/em><em>, <\/em><em>Der Spiegel<\/em><em>, and <\/em><em>The New York Times<\/em><em>.\u00a0She has taught filmmaking at Duke and Yale Universities. \u00a0Laura is the recipient of a 2012 MacArthur Fellowship, and\u00a0currently lives in Berlin.<\/em><\/p>\n<p><a target=\"_blank\" href=\"https:\/\/www.propublica.org\/article\/nsa-spying-relies-on-atts-extreme-willingness-to-help?utm_source=et&amp;utm_medium=email&amp;utm_campaign=dailynewsletter&amp;utm_content=&amp;utm_name=\" >Go to Original \u2013 propublica.org<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>15 Aug 2015 &#8211; The National Security Agency\u2019s ability to spy on vast quantities of Internet traffic has relied on a single company: the telecom giant AT&#038;T. It has given the N.S.A. access, through several methods covered under different legal rules, to billions of emails as they have flowed across its domestic networks.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-62566","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/62566","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=62566"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/62566\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=62566"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=62566"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=62566"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}