Why for the NSA every call matters

 
Woman using a mobile phone

The revelation that the National Security Agency (NSA), America's eavesdropping organisation, had asked mobile phone operator Verizon for phone information relating to millions of customers highlights the growing importance of "communications data" in intelligence and forensics work.

Critical to an understanding of these techniques, which have been in use by the NSA on a large scale since 2005, and which the British security authorities would like to employ on the same scale, is that these methods do not in the main relate to what is being said, simply to the details of communications such as which phone number was called by a particular subscriber and for how long.

It was in Iraq, acting in support of the secret Joint Special Operations Command, that the NSA started to record the details of every phone call made in the country. They did not have enough translators to listen to the vast majority of these calls or to assess their possible value, that was not the point.

What they found was that within months their bulk database of call details would allow them to break open terrorist networks with dramatic speed.

Landing by helicopter to raid a target, teams from Delta Force or the SAS would find telephones, sometimes prized from the hands of dead men dressed in suicide vests.

The number might never have been registered before as one of interest, but within seconds NSA experts could discover every call made on it for months before, mapping the dead bomber's connections with other individuals. This was only possible because of the blanket recording of all call details.

The use of what special operators in Iraq referred to simply as "the database" quickly grew so refined that software was developed to map networks (spotting that some numbers relevant to only one member, for example, might be family members) and that a portable, laptop-sized, terminal tapping into it started to be carried on raids.

By 2006 teams of special operators using the terminal could hit one member of an al-Qaeda cell, and hunched over the computer in a half destroyed Iraqi house, find other members through the database, fix the location of these phones and perform a "bounce on", jumping back into their helicopters to raid the next target.

Seeing the extraordinary effects of these techniques in the field, the NSA sought to apply them to domestic communications from 2006 onwards. Since the recording of this data does not include the content of the conversations, it can be extended to US citizens more easily and does not require a warrant.

It soon became apparent to people at the eavesdropping organisation that collecting information on this scale, relating to tens of millions of calls each day, and then keeping it for months or even years would require a vast new data centre to store the information.

So it began work on its $2bn Utah facility, where a ribbon cutting ceremony was held this week.

British intelligence people working in Iraq with the UK special operators (the task forces codenamed Black, Knight, and Spartan) saw these techniques and were duly impressed. They too wanted to apply them in the domestic counter-terrorist or criminal arenas.

It had in fact been the practise for many years (since the 1984 Telecommunications Act, for example) for British operators to keep customers' "billing information" for access by the government and for this to be possible without the same level of legal proof or suspicion as eavesdropping on the calls themselves.

The moves to put broad categories of "communications data" into the so called "snoopers' charter" represents an evolution of this.

 
Mark Urban Article written by Mark Urban Mark Urban Diplomatic and defence editor, BBC Newsnight

New Nato boss Jens Stoltenberg on alliance's challenges

With most Nato members intent on cutting defence spending, Mark Urban asks the alliance's new chief Jens Stoltenberg how he can stop it becoming an association of broken promises.

Read full article

Comments

This entry is now closed for comments

Jump to comments pagination
 
  • rate this
    +2

    Comment number 9.

    You do get a rich trove of useful information this way.

    Similarly, you get good effects if you quarter troops in peoples' homes.

    A very effective tool is eliminating freedom of speech, of association.

    You would do very well, too, to mandate a single church, and outlaw Muslims, Jews, and traditional Christians.

    Gosh, are there any more good ideas?

    Seal the gov. from the press?

    We'll see.

  • rate this
    +5

    Comment number 8.

    50 years ago in some U.S. states it was perfectly acceptable for a 14-year old female (like my grandmother in Virginia) to get married. Today in the U.S. if you look at a photo of a 17-year old high school senior and say she's hot, you can be jailed for years and put on a permanent public child pornographer's list. Who's to say what the government may decide to do with this data in the future?

  • rate this
    0

    Comment number 7.

    To continue: Data mining techniques can identify "strongly connected nodes" in a graph with numbers as nodes, and metadata on links pointing to other nodes. If a known bad guy is known as node in a subset, the other nodes deserve interest. Tons of harmless subsets are already pruned away. A node in a subset that is a foreign number draws more initial interest. All speculation of course.

  • rate this
    -1

    Comment number 6.

    This week it's all about NSA getting info from tphone companies as part of its security ops.
    ---The breaking "news" is yet another (illegal) leak, this time of a classified FISA court document that extends the order to Verizon for another three months.
    ---I learned of this in the press in 2006, I have no access to classified information. Why didn't everyone know?

    This low comment limit sucks.

  • rate this
    +1

    Comment number 5.

    Are they kidding? If they found numbers on some bad guy's phone or computer and they're going with that, what in the heck do they need my number for? This is an outrageous invasion of privacy in our supposedly free country.

  • rate this
    +1

    Comment number 4.

    Does Mark Urban do public relations for the NSA? The possibility that this data collection is illegal and unconstitutional seems of no interest. The usefulness of such data collection was demonstrated in Iraq.

  • rate this
    +2

    Comment number 3.

    So the justification for this Orwellian piece of legislation is 'for our own good'?

    Isn't that exactly what totalitarian dictatorships do?

    I also find the excuse of 'fighting terrorism' in Iraq a bit ironic, given that their were hardly any terrorist incidents in Iraq until after the US and it's poodles illegally invaded, occupied and attacked Iraq.

    Land of the Free?........

  • rate this
    0

    Comment number 2.

    Seems the US and British governments are not as intrusive as the Canadian government. After having government access to call information from day one Canada has been eavesdropping on calls themselves for years. The Canadian Security Establishment even has software to listen in on mass communications at once looking for key words spoken. If spoken a human operator is call to the line to eavesdrop.

  • rate this
    +1

    Comment number 1.

    Big Data, the futire. Many new appliction will be found for the use of it.

 

Page 2 of 2

 

Features

  • Man's hands putting ring on woman's fingerName changer

    Why do wives take a man's name after marriage?


  • Mobil canopies on the A6 at Red Hill, LeicestershireEnglish heritage

    Zebra crossings to bus stations: unusual listed buildings


  • Man with typewriterLove to Patrick

    The official whose over-familiar letters infuriated his boss


  • GoFig india violenceGo Figure

    The week in numbers with our Go Figure images


  • Arlene Phillips Top 10 tips

    How to be a successful choreographer


BBC © 2014 The BBC is not responsible for the content of external sites. Read more.

This page is best viewed in an up-to-date web browser with style sheets (CSS) enabled. While you will be able to view the content of this page in your current browser, you will not be able to get the full visual experience. Please consider upgrading your browser software or enabling style sheets (CSS) if you are able to do so.