Giving In to the Surveillance State

Author: 
Coverage Type: 

[Commentary] The legacy of a Pentagon program called Total Information Awareness (that proposed to scan the world’s electronic information — including phone calls, e-mails and financial and travel records — looking for transactions associated with terrorist plots) is quietly thriving at the National Security Agency. It is more pervasive than most people think, and it operates with little accountability or restraint.

The foundations of this surveillance apparatus were laid soon after 9/11, when President George W. Bush authorized the N.S.A. to monitor the communications records of Americans who analysts suspected had a “nexus to terrorism.” Acting on dubious legal authority, and without warrants, the N.S.A. began intercepting huge amounts of information. But the N.S.A. came up with more dead ends than viable leads and put a premium on collecting information rather than making sense of it. The N.S.A. created what one senior Bush administration official later described as a “mirror” of AT&T’s databases, which allowed ready access to the personal communications moving over much of the country’s telecom infrastructure. The N.S.A. fed its bounty into software that created a dizzying social-network diagram of interconnected points and lines. The agency’s software geeks called it “the BAG,” which stood for “big ass graph.” Today, this global surveillance system continues to grow.


Giving In to the Surveillance State