{"id":80394,"date":"2016-10-03T12:00:57","date_gmt":"2016-10-03T11:00:57","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=80394"},"modified":"2016-09-27T14:12:29","modified_gmt":"2016-09-27T13:12:29","slug":"every-move-you-make","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2016\/10\/every-move-you-make\/","title":{"rendered":"Every Move You Make"},"content":{"rendered":"<p><em>Over eight years, President Barack Obama has created the most intrusive surveillance apparatus in the world. To what end? <\/em><\/p>\n<p><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa.jpg\" ><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-80395\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa-1024x384.jpg\" alt=\"surveillance-spying-big-brother-nsa-usa\" width=\"700\" height=\"263\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa-1024x384.jpg 1024w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa-300x113.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa-768x288.jpg 768w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa.jpg 1920w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/a><\/p>\n<p><em>7 Sep 2016 &#8211; <\/em>This summer, at 1:51 p.m. on Saturday, June 11, an unearthly roar shattered the afternoon quiet along the Florida coast. On Cape Canaveral, liquid fuel surged through the thick aluminum veins of a Delta IV Heavy rocket nearly as tall as the U.S. Capitol. Two million pounds of thrust in three symmetrical boosters fired the engines, sending the craft hurtling over the Atlantic Ocean into the heavens. Eighty seconds after takeoff, it hit Mach 1, the speed of sound.<\/p>\n<p>The Delta IV Heavy, introduced in 2004, is America\u2019s most powerful rocket, and this was only the ninth time it had launched. Even more exclusive, however, was its top-secret cargo: Inside its nearly seven-story-high nose cone was an Advanced Orion, the world\u2019s largest satellite. About eight hours after launch, when the most advanced spy craft ever built went into geosynchronous orbit, it unfurled its gigantic mesh antenna, larger than a football field, and began eavesdropping on the Earth below.<\/p>\n<p>The mission\u2019s patch, dubbed \u201cepic\/terrifying\u201d by the <em>Verge<\/em>, depicted a masked, armored knight standing defensively before an American flag. A sword strapped to his back bore a cross-guard resembling a set of claws. According to the National Reconnaissance Office (NRO), the intelligence agency responsible for the satellite, the image delivered \u201ca message of tenacious, fierce focus \u2026 representing extreme reach with global coverage.\u201d<\/p>\n<p>In a sense, this was a fitting tribute to President Barack Obama as his administration entered its last six months in the White House. Over his two terms, Obama has created the most powerful surveillance state the world has ever seen. Although other leaders may have created more oppressive spying regimes, none has come close to constructing one of equivalent size, breadth, cost, and intrusiveness. From 22,300 miles in space, where seven Advanced Orion crafts now orbit; to a 1-million-square-foot building in the Utah desert that stores data intercepted from personal phones, emails, and social media accounts; to taps along the millions of miles of undersea cables that encircle the Earth like yarn, U.S. surveillance has expanded exponentially since Obama\u2019s inauguration on Jan. 20, 2009.<\/p>\n<p>The effort to wire the world \u2014 or to achieve \u201cextreme reach,\u201d in the NRO\u2019s parlance \u2014 has cost American taxpayers more than $100 billion. Obama has justified the gargantuan expense by arguing that \u201cthere are some trade-offs involved\u201d in keeping the country safe. \u201cI think it\u2019s important to recognize that you can\u2019t have 100 percent security and also then have 100 percent privacy and zero inconvenience,\u201d he said in June 2013, shortly after Edward Snowden, a former contractor with the National Security Agency (NSA), revealed widespread government spying on Americans\u2019 phone calls.<\/p>\n<p>Since Snowden\u2019s leaks, pundits and experts (myself included) have debated the legality and ethics of the U.S. surveillance apparatus. Yet has the president\u2019s blueprint for spying succeeded on its own terms? An examination of the unprecedented architecture reveals that the Obama administration may only have drowned itself in data. What\u2019s more, in trying to right the ship, America\u2019s intelligence culture has grown frenzied. Agencies are ever seeking to get bigger, move faster, and pry deeper to keep pace with the enormous quantity of information being generated the world over and with the new tactics and technologies intended to shield it from spies.<\/p>\n<p>This race is a defining feature of Obama\u2019s legacy \u2014 and one that threatens to become never-ending, even after he\u2019s left the White House.<\/p>\n<p><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa2.jpg\" ><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-80396\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa2-1024x437.jpg\" alt=\"surveillance-spying-big-brother-nsa-usa2\" width=\"700\" height=\"299\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa2-1024x437.jpg 1024w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa2-300x128.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa2-768x328.jpg 768w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa2.jpg 1920w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/a><\/p>\n<p>The foundations of Obama\u2019s shadow state date back to the immediate post-9\/11 period. Six weeks after the attacks, the Patriot Act, which greatly expanded the government\u2019s surveillance powers, was rushed through Congress and signed by President George W. Bush. A few months later, the Bush administration created the Information Awareness Office, part of the Defense Advanced Research Projects Agency (DARPA). That led to the development of the Total Information Awareness program, designed to vacuum up vast amounts of private electronic data \u2014 banking transactions, travel documents, medical files, and more \u2014 from citizens. After the media exposed and criticized the program, which didn\u2019t use warrants, Congress shut it down in late 2003. Much of the operation, though, was simply transferred to the NSA.<\/p>\n<p>In 2005, the <em>New York Times<\/em> revealed that Bush had authorized the NSA to monitor the international electronic communications \u201cof hundreds, perhaps thousands, of people in the United States.\u201d Code-named Stellar Wind, the program intercepted telephone conversations, emails, and metadata from taps inside AT&amp;T facilities and from satellites. Each day, millions of communications were scanned for addresses and keywords associated with al Qaeda. Any leads were sent to the FBI. (A secret internal analysis conducted by the bureau in 2006 indicated that no information from Stellar Wind had proved useful.)<\/p>\n<p>The same week the <em>Times<\/em> investigation was published, Obama, then a senator, gave a speech defending civil liberties and asking the Senate to hold off on voting to reauthorize the Patriot Act. \u201cIf someone wants to know why their own government has decided to go on a fishing expedition through every personal record or private document \u2026 this legislation gives people no rights to appeal the need for such a search in a court of law,\u201d the former constitutional law professor declared. \u201cThis is just plain wrong.\u201d<\/p>\n<p>Obama rode a wave of negative public opinion on mass surveillance. In January 2006, a Zogby Analytics poll showed that, by a margin of 52 to 43 percent, Americans wanted Congress to consider impeaching Bush if he wiretapped citizens without a judge\u2019s approval. Obama then carried the opposition narrative into his White House bid. In late 2007, he publicly promised, \u201cNo more secrecy. That\u2019s a commitment that I make to you as president\u2026. That means no more illegal wiretapping of American citizens.\u201d He even vowed to support a filibuster of any bill that gave retroactive immunity to companies providing assistance to government spies. (PRISM, a secretive program to gather data from major internet companies that was later revealed in Snowden\u2019s leaks, was launched in 2007.)<\/p>\n<p>Yet as his campaign progressed, Obama\u2019s stance hardened. Overseas, scores of people were being killed in Iraq by suicide bombings; at home, opponents were hammering Obama for being weak on terrorism. Amid this shifting political climate, he brought in John Brennan, a former CIA deputy director, as his top intelligence advisor. During the Bush years, Brennan had supported the very policies Obama campaigned against. Within months, his influence on the candidate was evident. In July 2008, Obama reversed his earlier promises, announcing support for a sweeping surveillance law that largely legalized the NSA\u2019s warrantless eavesdropping program and granted immunity to telecom companies that aided in spying.<\/p>\n<p>Many of Obama\u2019s supporters were horrified. \u201cI am disgusted,\u201d one wrote on the candidate\u2019s website. \u201cObama will NOT receive my vote in November.\u201d But the Democratic nominee justified his switch by pointing to violent threats in places such as Iraq, Afghanistan, and Pakistan. \u201cIn a dangerous world,\u201d he wrote on a campaign blog, \u201cgovernment must have the authority to collect the intelligence we need to protect the American people.\u201d From a pragmatic perspective, Obama was also heading into the last push for the presidency and needed to appeal to the broader electorate, which viewed terrorism as a bigger threat than his liberal base did.<\/p>\n<p>After being elected, Obama staffed up with intelligence officials who supported mass surveillance. Brennan became his chief counterterrorism advisor (and, a few years later, director of the CIA). Maureen Baginski, the NSA\u2019s former director of signals intelligence, a job that had placed her in charge of wiretapping, joined the transition team that helped establish policy for the NSA and other spy agencies.<\/p>\n<p>Most notable, though, was Obama\u2019s decision to keep the NSA\u2019s chief in place. Keith Alexander, a three-star general who\u2019d led the agency since 2005, was a force to be reckoned with. \u201cWe jokingly referred to him as Emperor Alexander \u2014 with good cause, because whatever Keith wants, Keith gets,\u201d a former senior CIA official told me. \u201cWe would sit back literally in awe of what he was able to get from Congress, from the White House, and at the expense of everybody else.\u201d Alexander\u2019s preferred spying method was blunt. According to a document leaked by Snowden, while visiting Menwith Hill station, the NSA\u2019s giant listening post in England, in June 2008, Alexander asked, \u201cWhy can\u2019t we collect all the signals all the time?\u201d He applied this approach in Iraq, pulling intelligence from phone interceptions, planes, drones, satellites, and other sensors into a powerful computer analysis system known as the Real Time Regional Gateway. He also ran the NSA\u2019s massive metadata surveillance program, which involved secretly keeping track of every phone in the United States: what numbers were called, from where, and exactly when \u2014 billions of communications each year.<\/p>\n<p>One of the few people with the security clearance to witness Alexander in action was Judge Reggie Walton of the Foreign Intelligence Surveillance Court (FISC). He didn\u2019t like what he saw, particularly that the NSA did not have \u201creasonable and articulable suspicion\u201d to justify monitoring some 90 percent of targets in its metadata program. In a January 2009 opinion, Walton wrote that he was \u201cexceptionally concerned\u201d that the agency was operating in \u201cflagrant violation\u201d of the FISC\u2019s orders regarding privacy. Two months later, he accused the NSA of making \u201cmaterial misrepresentations\u201d to the court, which in less polite language is known as lying. He pointed the finger at Alexander, writing that the general\u2019s explanation for why his agency had been eavesdropping illegally on tens of thousands of Americans \u2014 essentially, that he thought privacy restrictions applied only to certain archived data \u2014 \u201cstrains credulity.\u201d Walton concluded that oversight of metadata gathering \u201chas never functioned effectively.\u201d<\/p>\n<p>Yet Obama didn\u2019t dismiss Alexander. In fact, the following year, the general was awarded a fourth star and tapped to lead the newly minted, top-secret U.S. Cyber Command. And rather than limit the NSA chief\u2019s collect-it-all regime, the president authorized its expansion.<\/p>\n<p><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa3.jpg\" ><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-80397\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa3-1024x437.jpg\" alt=\"surveillance-spying-big-brother-nsa-usa3\" width=\"700\" height=\"299\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa3-1024x437.jpg 1024w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa3-300x128.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa3-768x328.jpg 768w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa3.jpg 1920w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/a><\/p>\n<p>For the Obama administration, the next frontier in spying was being able to eavesdrop on every single person in a country by obtaining \u201cfull-take audio\u201d of all cell-phone conversations. For this new program, code-named SOMALGET, it needed a testing ground. The Bahamas \u2014 small, contained, peaceful, 50 miles from the Florida coast \u2014 fit the bill.<\/p>\n<p>In 2009, not long after Obama had taken office, the NSA gained access to Bahamian communications networks by subterfuge. The U.S. Drug Enforcement Administration got legal permission to plant monitoring equipment in the nation\u2019s telecom systems by convincing the islands\u2019 government that the operation would help catch drug dealers. Really, though, it opened a backdoor for the NSA so that it could tap, record, and store cellular data. \u201c[O]ur covert mission is the provision of SIGINT [signals intelligence],\u201d a document leaked by Snowden stated. The host country was \u201cnot aware.\u201d<\/p>\n<p>Within two years, SOMALGET would achieve its goal of 100 percent surveillance in the Bahamas \u2014 all without legal warrants. This included spying on the cell phones of some 6 million U.S. citizens who visit or reside in the country each year; notable celebrities with homes there are Bill Gates, John Travolta, and Tiger Woods.<\/p>\n<p>The NSA didn\u2019t stop with the Bahamas, however. It eventually deployed SOMALGET in Afghanistan, which brought the total number of conversations recorded and stored by the program to \u201cover 100 million call events per day,\u201d according to leaked agency files. It also began collecting metadata from phones in the Philippines, Mexico, and Kenya. NSA planning documents in 2013 anticipated further uses in other countries.<\/p>\n<p>In some cases, the Obama administration cooperated with foreign governments to expand its reconnaissance capabilities. This included members of the Five Eyes, a clandestine alliance of intelligence agencies in the United States, the United Kingdom, Australia, Canada, and New Zealand that dates back to the Cold War. During Obama\u2019s first three years in office, the U.S. government paid the British equivalent of the NSA, the Government Communications Headquarters (GCHQ), at least $150 million to enhance surveillance. Because undersea fiber-optic cables from North and South America transit the United Kingdom on their way to Europe and the Middle East, the GCHQ was in an ideal position to place taps on them. It did just that, on cables that could transfer upwards of 21 petabytes of information daily; this included a large slice of the internet, which could be stored for three days before being replaced by new data, and some 600 million \u201ctelephone events\u201d every 24 hours. In 2010, not long after becoming operational, the program grew to be so successful that the GCHQ boasted it had the \u201cbiggest internet access\u201d of any Five Eyes member. \u201cThis is a massive amount of data!\u201d acknowledged an agency PowerPoint later made public by Snowden. Another leaked document declared, \u201cWe are in the golden age.\u201d<\/p>\n<p>To sift through everything, 250 NSA analysts joined forces with about 300 from the GCHQ. Using computer systems, they searched for data containing any of 71,000 \u201cselectors,\u201d such as keywords, email addresses, or phone numbers. Internally, this work was dubbed Mastering of The Internet (MTI). A leaked 2010 GCHQ document stated, \u201cMTI delivered the next big step in the access, processing and storage journey.\u201d In a single day, the file continued, a GCHQ surveillance operation known as Tempora had captured, stored, and analyzed some 39 billion pieces of information.<\/p>\n<p><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa4.jpg\" ><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-80398\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa4-1024x437.jpg\" alt=\"surveillance-spying-big-brother-nsa-usa4\" width=\"700\" height=\"299\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa4-1024x437.jpg 1024w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa4-300x128.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa4-768x328.jpg 768w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa4.jpg 1920w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/a><\/p>\n<p><strong>The acceleration of surveillance<\/strong> required a construction boom of a scale unprecedented in the history of U.S. intelligence. On March 5, 2012, Alexander opened what is likely the world\u2019s largest listening post, about 130 miles north of Savannah, Georgia; members of the press were warned not to bring cameras within two miles. The $286 million, 604,000-square-foot facility has more than 2,500 workstations and 47 conference rooms, and it employs more than 4,000 eavesdroppers and other personnel who focus on the Middle East. Earphones on, facing their computers, employees sit in cubicles and listen to \u201ccuts,\u201d or intercepted conversations. \u201cIt\u2019s very near real time,\u201d Adrienne Kinne, a former intercept operator at the complex, told me a few years ago. \u201cWe would just get these thousands of cuts dumped on us \u2026 [from] Iraq, Afghanistan, and a whole swath of area. We would get [calls in] Tajik, Uzbek, Russian, Chinese.\u201d<\/p>\n<p>As of 2013, the NSA had spent upwards of $300 million to expand a former Sony chip-fabrication plant near San Antonio and turn it into the agency\u2019s principal listening post for the Caribbean and Central and South America. About 900 miles northwest, it was also constructing a new operations building at Buckley Air Force Base near Denver. The mission was to collect intercepted communications from spy satellites, including Advanced Orions, and ground stations like Menwith Hill, then transmit the data through fiber-optic cables to analysts at their desks near Savannah, San Antonio, and at other NSA outposts. Meanwhile, in January 2012, the NSA opened a $358 million listening post on the island of Oahu targeting Asian and Pacific countries. Upon its debut, Alexander said in a news release that the facility\u2019s goal \u201cis to produce foreign signals intelligence for decision-makers as global terrorism now jeopardizes the lives of our citizens, military forces, and international allies.\u201d<\/p>\n<p>Not to be left out, Menwith Hill also underwent a multimillion-dollar expansion. Like a moon base hidden in the rolling Yorkshire hills, the station\u2019s 33 giant golf-ball-like radomes house parabolic antennas capable of 2 million intercepts an hour from communications satellites. To better analyze data at the post, in 2012, the NSA added powerful supercomputers and boosted personnel from 1,800 to 2,500.<\/p>\n<p>That November, Obama was re-elected following a campaign that centered almost exclusively on domestic and economic issues; little attention was paid to surveillance and privacy. (The Snowden leaks were still more than six months down the road.) Beyond the campaign trail, however, on high ground in Bluffdale, Utah, construction was in progress on the pi\u00e8ce de r\u00e9sistance of Obama\u2019s shadow empire. The $2 billion, 1-million-square-foot complex was set to function as the centerpiece of the NSA\u2019s global eavesdropping operations. Into it would flow streams of emails, text messages, tweets, Google searches, financial records, Facebook posts, YouTube videos, metadata, and telephone chatter picked up by the constellation of satellites, cable taps, and listening posts by then in operation.<\/p>\n<p>For intelligence analysts, the Bluffdale facility serves as a sort of \u201ccloud,\u201d or external hard drive, for intercepted data. About 200 people tend to some 10,000 racks of humming, blinking servers containing trillions of words and thoughts sucked up from unsuspecting people. Some areas of the complex contain data considered critical, such as calls and emails to and from key members of al Qaeda and the Islamic State; other information is eventually erased to make room for more on the servers.<\/p>\n<p>Outside the facility, there\u2019s been the occasional protest. In June 2014, a bulbous, 135-foot-long blimp appeared in the sky bearing a giant sign that read, \u201cNSA Illegal Spying Below.\u201d Inside were representatives from a coalition of grassroots groups dedicated to privacy. \u201cWe\u2019re flying an airship over the Utah data center,\u201d a written statement from one participating organization, the Electronic Frontier Foundation, proclaimed, \u201cwhich has come to symbolize the NSA\u2019s collect-it-all approach to surveillance.\u201d<\/p>\n<p><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa5.jpg\" ><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-80399\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa5-1024x437.jpg\" alt=\"surveillance-spying-big-brother-nsa-usa5\" width=\"700\" height=\"299\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa5-1024x437.jpg 1024w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa5-300x128.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa5-768x328.jpg 768w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa5.jpg 1920w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/a><\/p>\n<p><strong>Although the effort<\/strong> to gather every possible bit of information follows a certain logic \u2014 the more you have, the more likely you are to find what you\u2019re looking for \u2014 it is complicated by what NSA officials refer to as the three V\u2019s. \u201cInside [the] NSA, we often say that\u2019s the volume, velocity, variety issue,\u201d Alexander\u2019s deputy, Chris Inglis, told an audience of intelligence officials in 2010, \u201can enormous quantity of information moving ever faster and coming at us in very complex forms.\u201d<\/p>\n<p>Obama\u2019s surveillance architecture, it seems, has done little to address this multifaceted problem. In fact, it may have made it worse. Privacy hasn\u2019t been traded for security, but for the government hoarding more data than it knows how to handle. Kinne, the former intercept operator, described her work as \u201cjust like searching blindly through all these cuts to see what the hell was what.\u201d<\/p>\n<p>In the wake of the Snowden leaks, administration officials tried hard to justify the secret collection of Americans\u2019 telephone records. \u201cWe know of at least 50 threats that have been averted because of this information,\u201d Obama said during a visit to Berlin in 2013. He offered no specific examples. Alexander, meanwhile, claimed numerous times to the media and in public speeches that \u201c54 different terrorist-related activities\u201d had been thwarted. But he, too, offered no examples.<\/p>\n<p>On Oct. 2, 2013, when called to testify before the Senate Judiciary Committee, the general backtracked. Alexander cited only one instance when an intercept detected a potential threat: a Somali taxi driver living in San Diego who sent $8,500 to al-Shabab, his home country\u2019s notorious terrorist group. That winter, a panel set up by Obama to review the NSA\u2019s operations concluded that the agency had stopped no terrorist attacks. \u201cWe found none,\u201d Geoffrey Stone, a University of Chicago law professor and one of five panel members, bluntly told NBC News in December 2013. Since then, despite mass surveillance both at home and abroad, shootings or bombings have occurred in San Bernardino, California; Orlando, Florida; Paris; Brussels; and Istanbul \u2014 to name just a few places.<\/p>\n<p>Beyond failures to create security, there is the matter of misuse or abuse of U.S. spying, the effects of which extend well beyond violations of Americans\u2019 constitutional liberties. In 2014, I met with Snowden in Moscow for a magazine assignment. Over pizza in a hotel room not far from Red Square, he told me that the NSA puts innocent people in danger. In his experience, for instance, the agency routinely had passed raw, unredacted intercepts of millions of phone calls and emails from Arab- and Palestinian-Americans to its Israeli counterpart, Unit 8200. Once in Israeli hands, Snowden feared, this information might be used to extort information or otherwise harm relatives of the individuals being spied upon.<\/p>\n<p>That September, after my interview with Snowden was published, 43 members of Unit 8200 quit their posts in moral protest. They charged publicly that Israel used intercepted communications, like those sent to it by the NSA, to inflict \u201cpolitical persecution\u201d on Palestinians. They said data were gathered on sexual orientations, infidelities, money problems, family medical conditions, and other private matters and then used as tools of coercion \u2014 to force targets into becoming Israeli collaborators, for example. \u201c[T]he intelligence is used to apply pressure to people, to make them cooperate with Israel,\u201d one member of the dissenting group, who asked that his name not be used, told the <em>Guardian<\/em>.<\/p>\n<p>The NSA has at least considered employing similar tactics in the United States. In a top-secret memo dated Oct. 3, 2012, Alexander raised the possibility of using vulnerabilities discovered in mass data \u2014 \u201cviewing sexually explicit material online,\u201d for instance \u2014 to damage reputations. The agency could, say, smear individuals it believed were radicalizing others in an effort to diminish their influence.<\/p>\n<p>Obama, meanwhile, has taken virtually no steps to fix what ails his spying apparatus. After the Snowden revelations, the president called for ending the NSA\u2019s collection of metadata from phone calls by U.S. citizens. But this represents a rare tremor in the surveillance state. More consistently, Obama has limited oversight. In his first year as president, he threatened to veto a bill from his own party that would have required him to brief all members of congressional intelligence committees about covert operations, as opposed to the much smaller \u201cGang of Eight,\u201d made up of top-ranking party and committee leaders and created in the Bush era to shield illegal activities from scrutiny. Gang briefings, former White House counterterrorism czar Richard Clarke told Rachel Maddow in 2009, were often a \u201cfarce.\u201d<\/p>\n<p>While keeping critics at bay, the Obama administration has gone after people blowing the whistle on intelligence abuses. The Justice Department has charged eight leakers \u2014 more than double the number under all previous presidents combined. \u201c[T]his trend line should be going in the opposite direction,\u201d an ACLU lawyer argued in a 2014 blog post. \u201cThe modern national security state is more powerful than ever \u2014 more powerful even than during the Cold War. It demands democratic accountability.\u201d<\/p>\n<p><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa6.jpg\" ><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-80400\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa6-1024x437.jpg\" alt=\"surveillance-spying-big-brother-nsa-usa6\" width=\"700\" height=\"299\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa6-1024x437.jpg 1024w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa6-300x128.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa6-768x328.jpg 768w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa6.jpg 1920w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/a><\/p>\n<p><strong>The National Geospatial-Intelligence Agency (NGA)<\/strong> released a report in June detailing what it calls a \u201cdata tsunami.\u201d By the end of this decade, there will be anywhere from 50 billion to 200 billion networked devices on a planet of some 8 billion people. \u201cFor the intelligence community, this equates to 40 zettabytes of data, or 1 sextillion bytes,\u201d the NGA states. \u201cDescribed in more familiar terms, this is the equivalent of every person on the planet having 174 newspapers delivered daily.\u201d Viewed another way, that\u2019s more data than 7 billion Libraries of Congress could hold.<\/p>\n<p>In the surveillance state Obama has built, this deluge threatens to bury the few needles that might exist \u2014 warnings of attacks, signals of radicalizing groups, rallying cries of extremist recruiters \u2014 even deeper in the proverbial haystack. So, too, does encryption: Once a tool used mostly by spy agencies and militaries, encryption is becoming commonplace in everyday digital chatter to keep government eyes and ears out. Gmail offers it. WhatsApp began providing its billion-plus users with automatic encryption in April. In July, Facebook announced that it would soon give the option of end-to-end encryption on its Messenger app. More services will surely follow.<\/p>\n<p>Speed is a critical component in breaking encryption because most codes are based on factoring extremely large prime numbers. Conducting what\u2019s known as a \u201cbrute force\u201d attack \u2014 trying every possible combination of digits \u2014 using even the most powerful computers in operation would take centuries or longer to succeed.<\/p>\n<p>Obama, though, signed an executive order in July 2015 urging the creation of an exaflop supercomputer \u2014 a machine about 30 times faster than anything in existence. It would be capable of conducting more than a quintillion (1,000,000,000,000,000,000) operations per second. The president\u2019s charge to build was mostly targeted at the scientific community; behind the scenes, however, the NSA has been preparing to breach the exaflop barrier since 2011.<\/p>\n<p>That year, the agency secretly built a 260,000-square-foot facility at the Oak Ridge National Laboratory in Tennessee, the same place where the Manhattan Project developed the atomic bomb. Its research focuses on hitting the computing speed that would not only give the agency an edge over encryption, but also provide it with better cataloging capabilities to tackle the ocean of data already arriving daily at complexes like the one in Bluffdale, Utah.<\/p>\n<p>The government is also finding ways to cheat, most notably through Bullrun, a code-named program run jointly by the NSA and the GCHQ. The agencies clandestinely collaborate with technology companies and internet service providers to \u201cinsert vulnerabilities into commercial encryption systems,\u201d as reported by the <em>Guardian<\/em>. As of 2010, according to a top-secret GCHQ PowerPoint, the NSA had already achieved a breakthrough: \u201cVast amounts of encrypted Internet data which have up till now been discarded are now exploitable,\u201d the leaked slides state. By 2015, the British agency hoped to have cracked the encryption of 15 major internet companies.<\/p>\n<p>Looking further into the future, Obama\u2019s NSA has also explored quantum computing \u2014 technology that, theoretically, could defeat encryption for good. Its science breaks all the rules. Today, data are stored in binary bits \u2014 either ones or zeros \u2014 but in quantum computing, so-called qubits could be both one and zero at the same time. This would allow for almost incomprehensible operating speeds. According to documents released by Snowden, the NSA has been working to build \u201ca cryptologically useful quantum computer\u201d as part of a research program broadly called Penetrating Hard Targets.<\/p>\n<p>Ultrafast computing could be a game-changer in U.S. intelligence. It would break the last line of defense against government intrusion. Though this wouldn\u2019t necessarily \u2014 or even likely \u2014 guarantee that security threats could be identified, it would allow the surveillance state to seize every bit of power that its backers, including Obama, have sought to give it.<\/p>\n<p>After the White House panel set up to review NSA surveillance in 2013 suggested halting efforts to undermine commercial encryption, the president demurred. In a speech \u2014 one of the few he\u2019s given on surveillance in his second term \u2014 Obama kept to the middle of the political road. \u201cWe have to make some important decisions about how to protect ourselves and sustain our leadership in the world, while upholding the civil liberties and privacy protections that our ideals and our Constitution require,\u201d he said. \u201cWe need to do so not only because it is right, but because the challenges posed by threats like terrorism, and proliferation, and cyberattacks are not going away anytime soon.\u201d<\/p>\n<p>Zack Whittaker, the security editor for <em>ZDNet<\/em>, summed up Obama\u2019s remarks in a headline: \u201cKeep calm and carry on spying.\u201d<\/p>\n<p><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa7.jpg\" ><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-80401\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa7-1024x437.jpg\" alt=\"surveillance-spying-big-brother-nsa-usa7\" width=\"700\" height=\"299\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa7-1024x437.jpg 1024w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa7-300x128.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa7-768x328.jpg 768w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/09\/surveillance-spying-big-brother-nsa-usa7.jpg 1920w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/a><\/p>\n<p><strong>Whoever wins the<\/strong> upcoming presidential election will probably do just that. In response to the Orlando shooting in June, Hillary Clinton said, \u201cI have proposed an intelligence surge to bolster our capabilities across the board with appropriate safeguards here at home\u201d \u2014 but offered no details on what that would entail. She has called for Snowden to return from Russia and face trial, and while supporting the end of the NSA\u2019s metadata program, she\u2019s suggested that the agency never broke the law. \u201cI think it\u2019s fair to say the government, the NSA, didn\u2019t, so far as we know, cross legal lines, but they came right up and sat on them,\u201d she told an audience at a San Francisco technology summit in August 2014.<\/p>\n<p>Donald Trump\u2019s rhetoric, meanwhile, suggests that he would prioritize making America\u2019s surveillance empire as powerful as possible. \u201cI think security has to preside, and it has to be preeminent,\u201d he told Fox News in June 2015. Trump has also said NSA reconnaissance is just a fact of modern American life. \u201cI assume that when I pick up my telephone, people are listening to my conversations,\u201d he told radio host Hugh Hewitt last December, implying that Americans should just get used to being spied on.<\/p>\n<p>Whistleblowers, it seems, would not fare well under a Trump administration. \u201cIf I were president, [Russian President Vladimir] Putin would give him over,\u201d Trump said of Snowden in a July 2015 appearance on CNN. In 2013, speaking on <em>Fox &amp; Friends<\/em>, he was even tougher. \u201cI think Snowden is a terrible threat. I think he\u2019s a terrible traitor, and you know what we used to do in the good old days when we were a strong country?\u201d Trump asked. \u201cYou know what we used to do to traitors, right?\u201d One of the hosts interjected, \u201cWell, you killed them, Donald.\u201d Trump agreed.<\/p>\n<p>This is Obama\u2019s legacy on surveillance: a shadow state of brick and mortar, hardware and software, satellites and eavesdroppers, that is ready to grow on the next president\u2019s command. How big is too big, though, is a question the outgoing president has never answered fully. At what point does gathering data become an end in itself, rather than a means to an end? Is the U.S. government already there or approaching it?<\/p>\n<p>Unless answers come, 50 years from now, the world may look back at Obama\u2019s architecture of surveillance \u2014 full of radomes, windowless walls, phone taps, and double-ringed fences \u2014 with the same puzzled astonishment that 1950s bomb shelters elicit today.<\/p>\n<p>________________________________<\/p>\n<p><em>Correction, Sept. 12, 2016: The Delta IV Heavy is the most powerful American rocket in use today. A previous version of this article misstated that it was the most powerful rocket in the country\u2019s history. \u00a0<\/em><\/p>\n<p><em>James Bamford is a columnist for <\/em>Foreign Policy<em> and the author of <\/em><a target=\"_blank\" href=\"http:\/\/www.amazon.com\/The-Shadow-Factory-Eavesdropping-America\/dp\/0307279391\" >The Shadow Factory: The Ultra-Secret NSA From 9\/11 to the Eavesdropping on America<\/a><em>. He also writes and produces documentaries for <\/em>PBS<em>. (<a target=\"_blank\" href=\"http:\/\/www.twitter.com\/WashAuthor\" >@WashAuthor<\/a>) <\/em><\/p>\n<p><em>Illustrations by Raymond Biesinger<\/em><\/p>\n<p><em>A version of this article originally appeared in the September\/October 2016 issue of<\/em> FP <em>magazine. \u00a0<\/em><\/p>\n<p><a target=\"_blank\" href=\"https:\/\/foreignpolicy.com\/2016\/09\/07\/every-move-you-make-obama-nsa-security-surveillance-spying-intelligence-snowden\/\" >Go to Original \u2013 foreignpolicy.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over eight years, President Barack Obama has created the most intrusive surveillance apparatus in the world. To what end?<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-80394","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/80394","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=80394"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/80394\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=80394"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=80394"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=80394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}