from SLATE:
Details Revealed on Secret U.S. “Ragtime” Domestic Surveillance Program

By Ryan Gallagher

 Posted Thursday, Feb. 28, 2013, at 4:39 PM

Earlier this week, the Supreme Court ruled that Americans didn’t have
standing to challenge secret surveillance conducted by the National
Security Agency. Now, new details about the eavesdropping have
surfaced—which will likely fuel fresh concerns about the scale and
accountability of the agency’s spy programs.

A book published earlier this month, “Deep State: Inside the
Government Secrecy Industry,” contains revelations about the NSA’s
snooping efforts, based on information gleaned from NSA sources.
According to a detailed summary by Shane Harris at the Washingtonian
yesterday, the book discloses that a codename for a controversial NSA
surveillance program is “Ragtime”—and that as many as 50 companies
have apparently participated, by providing data as part of a domestic
collection initiative.

Deep State, which was authored by Marc Ambinder and D.B. Grady, also
offers insight into how the NSA deems individuals a potential threat.
The agency uses an automated data-mining process based on “a
computerized analysis that assigns probability scores to each
potential target,” as Harris puts it in his summary. The domestic
version of the program, dubbed “Ragtime-P,” can process as many as 50
different data sets at one time, focusing on international
communications from or to the United States. Intercepted metadata,
such as email headers showing “to” and “from” fields, is stored in a
database called “Marina,” where it generally stays for five years.

About three dozen NSA officials have access to Ragtime's intercepted
data on domestic counter-terrorism, the book claims, though outside
the agency some 1000 people “are privy to the full details of the
program." Internally, the NSA apparently only employs four or five
individuals as "compliance staff” to make sure the snooping is falling
in line with laws and regulations. Another section of the Ragtime
program, “Ragtime-A,” is said to involve U.S.-based interception of
foreign counterterrorism data, while “Ragtime-B” collects data from
foreign governments that transits through the U.S., and “Ragtime-C”
monitors counter proliferation activity.

Only very rarely do details of this nature surface, mainly due to the
extreme secrecy that shrouds the NSA. In 2006, a whistleblower from
AT&T made a sworn declaration in which he stated that the NSA was
routing AT&T communications through a secret "secure room" where they
could be intercepted. A former NSA employee said last year in his own
sworn declaration, made as part of an ongoing legal case, that the
spying described by the AT&T whistleblower involved the use of a
"Semantic Traffic Analyser," which would allow the NSA to mine
"addresses, locations, countries, and phone numbers, as well as
watch-listed names, keywords, and phrases" from within the data
flowing through communication networks. Other previously disclosed NSA
spy programs have been codenamed “ThinThread” and “Trailblazer.”

On Tuesday, a group of civil rights groups, journalists, and lawyers
lost the right to challenge the constitutionality of a so-called
“warrantless wiretapping” law that allows the NSA to conduct
eavesdropping on international communications. The plaintiffs’
argument failed largely on the grounds that they could not
conclusively prove that they had been subject to surveillance. The
Supreme Court, in a split 5-4 opinion, said that “it is highly
speculative whether the government will imminently target
communications to which respondents are parties.”


-- 
Jim Devine /  "Segui il tuo corso, e lascia dir le genti." (Go your
own way and let people talk.) -- Karl, paraphrasing Dante.
_______________________________________________
pen-l mailing list
[email protected]
https://lists.csuchico.edu/mailman/listinfo/pen-l

Reply via email to