NSA supposedly cancels bulk collection of phone call records

By: (plus.google.com) +David Herron; Date: March 4, 2019

Tags: Big Brother » NSA

Since the Terrorism Scare of 2001-2006ish the NSA has been collecting telephone records of every phone call made in the USA. The theory was to find the needle-in-the-haystack the NSA first needed the haystack, and that by having records of all phone calls the NSA could build a map of all associations and therefore find The Terrorists. The program became widely known with the Edward Snowden revelations, and was 'shut down' with a 2015 law, The Freedom Act. That act preserved parts of the program, and is due to expire at the end of the year unless the Trump Administration or Congress acts.

Under this program the NSA collects records of which phone number called what other phone number, the time of the call, and for how long. They do not collect recordings of the phone calls, only the fact that calls were made.

Today the NY Times reported that as just said, the current program is due to expire at the end of 2019.

With such data a map of who-associates-with-who can be built. The more often that phone A calls phone B, the more likely it is that two people know each other and are communicating with a reason. If either is a Known Terrorist, then it's possible both are Terrorists.

Origin of the NSA phone call records collection project - Terrorist Information Awareness System

The program started in 2001 when the Bush Administration started what was originally called the Total Information Awareness System, and was renamed after Sept 11, 2001, to the Terrorist Information Awareness System. I collected a bunch of information about this back in 2002 posting it to another blog - (politics.7gen.com) http://politics.7gen.com/2002/02/darpa-information-awareness-office.html

The Terrorist Information Awareness System was a wide-ranging project headed by Admiral Poindexter. The Adm. Poindexter who was convicted of lying to Congress over the Iran/Contra controversy. As a wide-ranging Defense Department project, it had many aspects. For example automated translation of speech to text from any foreign language so that the spy agencies did not have to hire language experts in every language. Another part collected credit card transaction records, so the government could detect patterns of suspicious purchases.

The known programs in TIA did not include one for collecting phone call records. But such a program is not at all far from the sorts of programs run under the TIA umbrella.

In (politics.7gen.com) May 2006 is the first piece I wrote about wide-ranging phone call tracking. At the time it was "revealed" the NSA had a massive database of "envelope" data -- meaning records of every phone call made as described earlier.

The word "envelope" was used in the sense of a letter going through the postal mail system. The "envelope" is the information written on the container of the letter, and not the contents inside the envelope. I remember reading somewhere at the time that the Post Office routinely records envelop information for use in investigations. Indeed, the USPS today offers a service to its customers, called Informed Delivery, sending e-mails scanned images of the envelopes of mail arriving on a given day. Since the USPS is collecting such scanned images, where else are they going?

The expiration of the Freedom Act of 2015

According to the (www.nytimes.com) NY Times piece saying the current program is due to expire, phone call data collection began "in the weeks after the 2001 terrorist attacks". Starting in 2006, the Foreign Intelligence Surveillance Court began issuing orders that the phone companies must participate in this data collection. The rationale was:

based on a secret, novel and later-disputed interpretation of Section 215 of the Patriot Act, which said the F.B.I. may obtain business records “relevant” to a terrorism investigation.

The program was not publicly disclosed until June 2013 when Edward Snowden turned whistleblower while going on the lam and ending up living in Russia.

The first disclosure was a Guardian piece: (www.theguardian.com) https://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order

In the furor over the Snowden Revelations a law was passed, The Freedom Act of 2015, with one of the provisions being to change the process of collecting phone call records. Instead of bulk downloading of the phone call records, the NSA could gather data from phone company servers when needed. The data collection was supposed to be targeted rather than sweeping.

In actual practice the NSA still collected LOTS of phone call records.

The NY Times notes that problems crept in. The data was corrupted in part on purpose by one of the phone companies that supplied false data along with the accurate data.

The NY Times claims that nobody has used the system in many months - that the sky hasn't fallen in because of this - and therefore the Government is due to let this program expire at the end of the year.

Did collecting phone call records ever result in a stopped terrorist attack?

According to the NY Times they never succeeded in stopping anything through collecting all this data.

We should all stop and give that a think or two. The NSA collected records of all phone calls from 2001 to 2015, maybe longer. That violated the privacy of every American, and they did it for 15 years or so. It's possible the NSA is still violating our privacy even though they claim they aren't. AND NOTHING NEVER CAME OF IT.

All that effort, all that data collected, all those violations of privacy, AND NOTHING EVER CAME OF IT.

We were told again and again this wholesale violation of privacy was necessary to secure our freedom, and to stop Terrorist attacks.

But they're telling us now, that no such result occurred.


Let me say that I do not believe that the program will actually expire.

There is a rationale to my saying that. Back in 2003ish when the TIA program garnered some public attention, a big show was made of canceling the Terrorist Information Awareness project.

What actually happened is that a couple small projects were canceled, and the rest of the system transitioned to being a top secret program that of course nobody knows about.

What if this current show of canceling bulk phone call records collection is just a show? What if the collection program has already moved into top secret secrecy, and they never stopped the bulk collection of phone call records? How would we know?

« Apple 2009 Mac Pro back to the future for 2019 Modular Mac Pro, one hopes How to know when ChromeOS support is ending on your ChromeBook »
2016 Election 2018 Elections Acer C720 Ad block Affiliate marketing Air Filters Air Quality Air Quality Monitoring AkashaCMS Amazon Amazon Kindle Amazon Web Services America Amiga and Jon Pertwee Android Anti-Fascism AntiVirus Software Apple Apple Flexgate Apple Hardware History Apple Hardware Mistakes Apple iPhone Apple iPhone Hardware April 1st Arduino ARM Compilation Artificial Intelligence Astronomy Astrophotography Asynchronous Programming Authoritarianism Automated Social Posting AWS DynamoDB AWS Lambda Ayo.JS Bells Law Big Brother Big Data Big Finish Big Science Bitcoin Mining Black Holes Blade Runner Blockchain Blogger Blogging Books Botnets Cassette Tapes Cellphones China China Manufacturing Christopher Eccleston Chrome Chrome Apps Chromebook Chromebox ChromeOS CIA CitiCards Citizen Journalism Civil Liberties Climate Change Clinton Cluster Computing Command Line Tools Comment Systems Computer Accessories Computer Hardware Computer Repair Computers Conservatives Cross Compilation Crouton Cryptocurrency Curiosity Rover Currencies Cyber Security Cybermen Cybersecurity Daleks Darth Vader Data backup Data Formats Data Storage Database Database Backup Databases David Tenant DDoS Botnet Department of Defense Department of Justice Detect Adblocker Developers Editors Digital audio Digital Nomad Digital Photography Direct Attach Storage Diskless Booting Disqus DIY DIY Repair DNP3 Do it yourself Docker Docker MAMP Docker Swarm Doctor Who Doctor Who Paradox Doctor Who Review Drobo Drupal Drupal Themes DuckDuckGo DVD E-Books E-Readers Early Computers eGPU Election Hacks Electric Bicycles Electric Vehicles Electron Eliminating Jobs for Human Emdebian Encabulators Energy Efficiency Enterprise Node EPUB ESP8266 Ethical Curation Eurovision Event Driven Asynchronous Express Face Recognition Facebook Fake Advertising Fake News Fedora VirtualBox Fifth Doctor File transfer without iTunes FireFly Flash Flickr Fraud Freedom of Speech Front-end Development G Suite Gallifrey Gig Economy git Github GitKraken Gitlab GMAIL Google Google Adsense Google Chrome Google Gnome Google+ Government Spying Great Britain Green Transportation Hate Speech Heat Loss Hibernate High Technology Hoax Science Home Automation HTTP Security HTTPS Human ID I2C Protocol Image Analysis Image Conversion Image Processing ImageMagick In-memory Computing Incognito Mode InfluxDB Infrared Thermometers Insulation Internet Internet Advertising Internet Law Internet of Things Internet Policy Internet Privacy iOS iOS Devices iPad iPhone iPhone hacking Iron Man iShowU Audio Capture iTunes Janet Fielding Java JavaFX JavaScript JavaScript Injection JDBC John Simms Journalism Joyent jQuery Kaspersky Labs Kext Kindle Kindle Marketplace Large Hadron Collider Lets Encrypt LibreOffice Linux Linux Hints Linux Single Board Computers Logging Mac Mini Mac OS Mac OS X Mac Pro MacBook Pro Machine Learning Machine Readable ID Macintosh macOS macOS High Sierra macOS Kext MacOS X setup Make Money Online Make Money with Gigs March For Our Lives MariaDB Mars Mass Violence Matt Lucas MEADS Anti-Missile Mercurial MERN Stack Michele Gomez Micro Apartments Microsoft Military AI Military Hardware Minification Minimized CSS Minimized HTML Minimized JavaScript Missy Mobile Applications Mobile Computers MODBUS Mondas Monetary System MongoDB Mongoose Monty Python MQTT Music Player Music Streaming MySQL NanoPi Nardole NASA Net Neutrality Network Attached Storage Node Web Development Node.js Node.js Database Node.js Performance Node.js Testing Node.JS Web Development Node.x North Korea npm NSA NVIDIA NY Times Online advertising Online Community Online Fraud Online Journalism Online News Online Photography Online Video Open Media Vault Open Source Open Source and Patents Open Source Governance Open Source Licenses Open Source Software OpenAPI OpenJDK OpenVPN Palmtop PDA Patrick Troughton PayPal Paywalls Personal Flight Peter Capaldi Peter Davison Phishing Photography PHP Plex Plex Media Server Political Protest Politics Postal Service Power Control President Trump Privacy Private E-mail server Production use Public Violence Raspberry Pi Raspberry Pi 3 Raspberry Pi Zero ReactJS Recaptcha Recycling Refurbished Computers Remote Desktop Removable Storage Renewable Energy Republicans Retro Computing Retro-Technology Reviews RFID Rich Internet Applications Right to Repair River Song Robotics Robots Rocket Ships RSS News Readers rsync Russia Russia Troll Factory Russian Hacking Rust SCADA Scheme Science Fiction SD Cards Search Engine Ranking Search Engines Season 1 Season 10 Season 11 Security Security Cameras Server-side JavaScript Serverless Framework Servers Shell Scripts Silence Simsimi Skype SmugMug Social Media Social Media Networks Social Media Warfare Social Network Management Social Networks Software Development Software Patents Space Flight Space Ship Reuse Space Ships SpaceX Spear Phishing Spring Spring Boot Spy Satellites SQLite3 SSD Drives SSD upgrade SSH SSH Key SSL Stand For Truth Strange Parts Swagger Synchronizing Files Tegan Jovanka Telescopes Terrorism The Cybermen The Daleks The Master Time-Series Database Tom Baker Torchwood Total Information Awareness Trump Trump Administration Trump Campaign Twitter Ubuntu Udemy UDOO US Department of Defense Video editing Virtual Private Networks VirtualBox VLC VNC VOIP Vue.js Walmart Weapons Systems Web Applications Web Developer Resources Web Development Web Development Tools Web Marketing Webpack Website Advertising Website Business Models Weeping Angels WhatsApp William Hartnell Window Insulation Windows Windows Alternatives Wordpress World Wide Web Yahoo YouTube YouTube Adpocalypse YouTube Monetization