!! History Commons Alert, Exciting News

Context of 'May 17, 2006: Online News Site Publishes Whistleblower’s AT&T Memo'

This is a scalable context timeline. It contains events related to the event May 17, 2006: Online News Site Publishes Whistleblower’s AT&T Memo. You can narrow or broaden the context of this timeline by adjusting the zoom level. The lower the scale, the more relevant the items on average will be, while the higher the scale, the less relevant the items, on average, will be.

Following the revelations of the Church Committee’s investigation into the excesses of the CIA (see April, 1976), and the equally revealing New York Times article documenting the CIA’s history of domestic surveillance against US citizens for political purposes (see December 21, 1974), Congress passes the Foreign Intelligence Surveillance Act (FISA). In essence, FISA prohibits physical and electronic surveillance against US citizens except in certain circumstances affecting national security, under certain guidelines and restrictions, with court warrants issued by the Foreign Intelligence Surveillance Court (FISC), operating within the Department of Justice as well as with criminal warrants. FISA restricts any surveillance of US citizens (including US corporations and permanent foreign residents) to those suspected of having contact with “foreign powers” and terrorist organizations. FISA gives a certain amount of leeway for such surveillance operations, requiring that the administration submit its evidence for warrantless surveillance to FISC within 24 hours of its onset and keeping the procedures and decisions of FISC secret from the public. [Electronic Frontier Foundation, 9/27/2001; Legal Information Institute, 11/30/2004] On September 14, 2001, Congress will pass a revision of FISA that extends the time period for warrantless surveillance to 72 hours. The revision, part of the Intelligence Authorization Act of 2002, will also lower the standard for the issuance of wiretap warrants and make legal “John Doe,” or generic, warrants that can be used without naming a particular target. FISA revisions will also expand the bounds of the technologies available to the government for electronic and physical surveillance, and broaden the definitions of who can legally be monitored. [US Senate, 9/14/2001; Senator Jane Harman, 2/1/2006]

Entity Tags: Foreign Intelligence Surveillance Court, New York Times, Foreign Intelligence Surveillance Act, US Department of Justice, Church Committee

Timeline Tags: Civil Liberties

Verizon gives the NSA access from within its facilities.Verizon gives the NSA access from within its facilities. [Source: ReallyNews.com]AT&T, Verizon, and BellSouth all cooperate with the NSA in monitoring US citizens’ phone and Internet communications (see October 2001). Qwest, however, refuses to cooperate (see February 27, 2001). Qwest officials are unsure that it is legal to hand over customer information to the government without court warrants. The firm’s refusal to participate in the program leaves a gaping hole in the NSA’s database, with the NSA only getting partial coverage of US citizens in the West and Northwest. Until recently, AT&T and other phone companies have routinely insisted on court warrants before turning over call data to government agencies, protocols growing out of the historical concerns of the Bell Telephone system for customer service and privacy. Gene Kimmelman of the Consumers Union will say in 2006 that such insistence on court warrants was a bedrock principle of the Bell systems. “No court order, no customer information—period.” he says. “That’s how it was for decades.” The Bell system was also concerned with following the law, specifically the Communications Act of 1934, which prohibits telephone companies from giving out such information without court orders. President Bush and other government officials will later say that his 2002 executive order allowing the NSA to wiretap American phones without warrants (see Early 2002) gives the telephone companies legal cover, but many legal experts and civil liberties groups disagree. After 9/11, the NSA approaches the four companies with offers to pay for US citizens’ call histories and for updates, which would allow the agency to track citizens’ phone habits. Three of the four agree to the NSA proposal, but again Qwest does not. An AT&T spokesman will say in May 2006, “We do not comment on matters of national security, except to say that we only assist law enforcement and government agencies charged with protecting national security in strict accordance with the law.” BellSouth will say that the company “does not provide any confidential customer information to the NSA or any governmental agency without proper legal authority.” Verizon will add that the company acts “in full compliance with the law and we are committed to safeguarding our customers’ privacy.” Neither AT&T nor Qwest will comment at all. [USA Today, 5/11/2006] The NSA asks Qwest to install monitoring equipment on its “Class 5” switching facilities, which monitor the most localized calls as well as some international traffic. The NSA claims it will only single out foreigners on Qwest’s network. In 2006, a government official will say that the CEO of Qwest, Joe Nacchio, misunderstood what the agency was asking. [New York Times, 12/16/2007]
Qwest Refuses to Cooperate - In 2006, sources will recall that at the time of the NSA requests, Nacchio is so disturbed by the idea of the NSA wiretapping phones without warrants, and is so unsure of what information would be collected and how it might be used, that he decides the company will not cooperate. The NSA tells Qwest and the other companies that not only would it compile and maintain data on US citizens’ phone habits, but it may well share that information with other US government agencies, including the CIA, the Drug Enforcement Administration, and the FBI. Indeed, the NSA shares what it calls “product” with other intelligence agencies, and perhaps with other governmental agencies. After Nacchio decides not to comply with the NSA’s request, the agency begins pressuring the firm, accusing it of threatening national security and implying that Qwest might not be eligible for future governmental contracts. When Qwest asks the NSA to take its proposal to the FISA Court (FISC), the agency refuses, making Qwest that much more dubious about the NSA operation, especially when NSA lawyers say they won’t take the proposal to FISC because that court “might not agree with them.” The NSA also refuses to ask for authorization from the attorney general’s office. Nacchio will leave Qwest under fire for allegedly misleading shareholders about the company’s financial prospects, but his successor, Richard Notebaert, continues to refuse to cooperate with the NSA. [USA Today, 5/11/2006; USA Today, 5/11/2006] Interestingly, by 2004 the Federal Communications Commission will list Qwest and Verizon as essentially the same company. [Federal Communications Commission, 12/10/2004]
Other Firms Deny Participation - In May 2006, after USA Today reports on the telecom firms’ participation in the surveillance (see May 11, 2006), both Verizon and BellSouth will deny providing the NSA with data on their customers, though they have previously acknowledged their cooperation (see February 5, 2006). A BellSouth spokesman will say, somewhat ingenuously, “We’re not aware of any database that NSA has, so we’re not aware of our customer information being there at all.” And Verizon conspicuously fails to mention possible data from MCI, the long-distance provider it has recently bought. Senator Patrick Leahy (D-VT) will say of the various companies’ participations, “The thing that concerns me is some [companies] said yes and some said no” when asked to participate. “If the government really thought this was legal and necessary, why let some say yes and some say no? It’s either legal and necessary, or it’s not.” [USA Today, 5/16/2006]

Entity Tags: Patrick J. Leahy, Qwest, Richard Notebaert, Verizon Communications, National Security Agency, USA Today, George W. Bush, Joe Nacchio, Foreign Intelligence Surveillance Court, BellSouth, Central Intelligence Agency, AT&T, Consumers Union, Federal Bureau of Investigation, Drug Enforcement Administration, Gene Kimmelman, Federal Communications Commission

Timeline Tags: Civil Liberties

An illustration of the NIMD dataflow.An illustration of the NIMD dataflow. [Source: LibertyThink.com] (click image to enlarge)Shortly after the 9/11 attacks, the NSA awards $64 million in research contracts for a program called Novel Intelligence from Massive Data (NIMD). [New York Times, 5/21/2003; National Journal, 1/20/2006] NIMD is one of several cutting-edge data mining technologies that not only has the capability of finding keywords among millions of electronically monitored communications, but can find hidden relationships among data points, and even critique the thinking and biases of a particular analyst and suggest alternative hypotheses differing from the human analysts’ conclusion. Like other data-mining technologies, the NSA will steadfastly refuse to discuss whether NIMD is used to analyze data from domestic surveillance operations. NIMD is designed as an preliminary sort program, to keep human analysts from becoming overwhelmed by raw data. In essence, NIMD is an early-warning system. “NIMD funds research to…help analysts deal with information-overload, detect early indicators of strategic surprise, and avoid analytic errors,” according to the “Call for 2005 Challenge Workshop Proposals” released by the Advanced Research and Development Activity (ARDA). ARDA was founded in 1998 to create, design, and field new technologies for US intelligence agencies, particularly the NSA. A selected few Congressional lawmakers (see January 18, 2006) were informed that the warrantless surveillance program authorized by President George W. Bush (see Early 2002) was designed to be an early-warning system for possible terrorist attacks or plans. Assistant Attorney General William Moschella will inform the top Democrats and Republicans on the House and Senate Intelligence committees in December 2002 that the “president determined that it was necessary following September 11 to create an early-warning detection system” to prevent more attacks. He will justify the use of programs such as NIMD by claiming, as NSA director Michael Hayden and other administration officials have repeatedly claimed, that the Foreign Intelligence Surveillance Act (FISA), which allows the government to obtain warrants to conduct domestic eavesdropping or wiretapping, “could not have provided the speed and agility required for the early-warning detection system.” Many experts outside of the Bush administration feel that NIMD and other programs do not have to operate outside of the Foreign Intelligence Surveillance Act (FISA) because of limitations in the law, but because of the fact that the programs cannot meet the law’s minimum requirements for surveillance. FISA requires that any such surveillance must have a probable cause that the target is a terrorist. NIMD has no such threshold. Steven Aftergood, an expert on intelligence and government secrecy with the Federation of American Scientists, will say in 2006, “Logistically speaking, the early-warning approach may involve a significant increase in the number of surveillance actions. It may be that neither the Justice Department nor the [Foreign Intelligence Surveillance Court, which approves wiretapping warrants] is prepared to prepare and process several thousand additional FISA applications per year, beyond the 1,700 or so approved in 2004.” [National Journal, 1/20/2006] Some experts will later express the opinion that NIMD is the controversial Total Information Awareness program in a slightly different form (see February 2003 and September 2002).

Entity Tags: Senate Intelligence Committee, US Department of Justice, Total Information Awareness, William E. Moschella, Tom Armour, Novel Intelligence from Massive Data, Steven Aftergood, Michael Hayden, National Security Agency, Advanced Capabilities for Intelligence Analysis, Advanced Research and Development Activity, John Poindexter, Foreign Intelligence Surveillance Act, George W. Bush, Federation of American Scientists (FAS), House Intelligence Committee

Timeline Tags: Civil Liberties

Former AT&T employee Mark Klein.Former AT&T employee Mark Klein. [Source: PBS]The National Security Agency, as part of its huge, covert, and possibly illegal wiretapping program directed at US citizens (see Spring 2001 and After September 11, 2001), begins collecting telephone records of tens of millions of Americans, using data provided by telecommunications firms such as AT&T, Verizon, and BellSouth (see February 5, 2006). The media will not report on this database until May 2006 (see May 11, 2006). The program collects information on US citizens not suspected of any crime or any terrorist connections. Although informed sources say the NSA is not listening to or recording actual conversations, the agency is using the data to analyze calling patterns in an effort to detect terrorist activity. “It’s the largest database ever assembled in the world,” says one anonymous source. The NSA intends “to create a database of every call ever made.” As a result, the NSA has detailed records of the phone activities of tens of millions of US citizens, from local calls to family and friends to international calls. The three telecommunications companies are working with the NSA in part under the Communications Assistance Act for Law Enforcement (CALEA) (see January 1, 1995 and June 13, 2006) and in part under contract to the agency.
Surveillance Much More Extensive Than Acknowledged - The wiretapping program, which features electronic surveillance of US citizens without court warrants or judicial oversight, is far more extensive than anything the White House or the NSA has ever publicly acknowledged. President Bush will repeatedly insist that the NSA focuses exclusively on monitoring international calls where one of the call participants is a known terrorist suspect or has a connection to terrorist groups (see December 17, 2005 and May 11, 2006), and he and other officials always insist that domestic calls are not monitored. This will be proven false. The NSA has become expert at “data mining,” sifting through reams of information in search of patterns. The warrantless wiretapping database is one source of information for the NSA’s data mining. As long as the NSA does not collect “personal identifiers”—names, Social Security numbers, street addresses, and the like—such data mining is legal. But the actual efficacy of the wiretapping program in learning about terrorists and possibly preventing terrorist attacks is unclear at best. And many wonder if the NSA is not repeating its activities from the 1950s and 1960s, when it conducted “Operation Shamrock” (see 1945-1975), a 20-year program of warrantless wiretaps of international phone calls at the behest of the CIA and other intelligence agencies. Operation Shamrock, among other things, led to the 1978 passage of the Foreign Intelligence Surveillance Act (see 1978). [USA Today, 5/11/2006] In May 2006, former NSA director Bobby Ray Inman will say, “[T]his activity is not authorized” (see May 12, 2006). [Democracy Now!, 5/12/2006]
Secret Data Mining Center - In May 2006, retired AT&T technician Mark Klein, a 22-year veteran of the firm, will file a court affidavit saying that he saw the firm construct a secret data-mining center in its San Francisco switching center that would let the NSA monitor domestic and international communications (see January 2003). And former AT&T workers say that, as early as 2002, AT&T has maintained a secret area in its Bridgeton, Missouri, facility that is likely being used for NSA surveillance (see Late 2002-Early 2003).
Domestic Surveillance Possibly Began Before 9/11 - Though Bush officials admit to beginning surveillance of US citizens only after the 9/11 attacks, some evidence indicates that the domestic surveillance program began some time before 9/11 (see Late 1999, February 27, 2000, December 2000, February 2001, February 2001, Spring 2001, and July 2001).

Entity Tags: Terrorist Surveillance Program, Verizon Communications, Mark Klein, George W. Bush, AT&T, BellSouth, Central Intelligence Agency, Communications Assistance for Law Enforcement Act (CALEA), Foreign Intelligence Surveillance Act, Qwest, National Security Agency

Timeline Tags: Civil Liberties

The NSA’s enormous data mining program, Novel Intelligence from Massive Data (NIMD—see After September 11, 2001), closely resembles another data mining program, the Defense Department’s Total Information Awareness program (see March 2002). TIA, which will be suspended in 2003 after outcries from citizens and legal experts concerned over that program’s refusal to comply with fundamental Constitutional guarantees of privacy, was also designed as an early-warning system that not only compiled intelligence data, but mined through private financial databases for credit-card and other financial transactions. Six of the corporations and research institutions who win NIMD contracts also held contracts for the earlier TIA project. Much of their work with TIA duplicated the same aspects and protocols to be used by NIMD, including challenging analytic assumptions and building prototype data-mining devices. Both TIA and NIMD attempt to second-guess human analysts’ conclusions over a particular data schema by creating a database of what TIA creator John Poindexter once called “plausible futures,” or likely terrorism scenarios. NIMD is a creation of the Advanced Research and Development Activity agency (ARDA); another ARDA project, the Advanced Capabilities for Intelligence Analysis (ACIA) also envisions a similar database (see 2005). Though TIA focused more on counterterrorism than the more sweeping NIMD, the two projects coordinated closely with one another, according to former program manager Tom Armour, who worked in Poindexter’s office.
NIMD Survives In Other Agencies - Congress will eliminate funding for TIA and other Poindexter projects, but many of those projects, and related projects such as NIMD, do not disappear. Many are instead transferred to intelligence agencies such as the NSA. Although information about these projects is strictly classified, a former Army intelligence analyst familiar with the programs will confirm in 2006 that large elements of TIA were transferred to other agencies, where they will continue to be researched and implemented. It is highly likely that NIMD is an offshoot and outgrowth of TIA. Armour will say the two programs are specifically designed to analyze large amounts of phone and e-mail traffic: “That’s, in fact, what the interest is.” [National Journal, 1/20/2006]
Government 'Shell Game' - Steven Aftergood of the Federation of American Scientists says in 2004, “The whole congressional action looks like a shell game. There may be enough of a difference for them to claim TIA was terminated while for all practical purposes the identical work is continuing.” [Associated Press, 2/23/2004] Aftergood will note that NIMD has thrived in the shadows where TIA died of exposure: “Pursued with a minimal public profile and lacking a polarizing figure like Admiral Poindexter to galvanize opposition, NIMD has proceeded quietly even as TIA imploded.” [Defense Tech, 9/26/2003]

Entity Tags: Tom Armour, Total Information Awareness, Steven Aftergood, Novel Intelligence from Massive Data, John Poindexter, National Security Agency, Advanced Research and Development Activity, Federation of American Scientists (FAS), George W. Bush, Advanced Capabilities for Intelligence Analysis

Timeline Tags: Civil Liberties

An aerial view of the AT&T Easylink Service building in Bridgeton, Missouri, where the NSA allegedly has secret facilities.An aerial view of the AT&T Easylink Service building in Bridgeton, Missouri, where the NSA allegedly has secret facilities. [Source: USGS via Microsoft]On behalf of the National Security Agency (NSA), AT&T constructs a secret, highly secured room in its network operations center in Bridgeton, Missouri, used to conduct secret government wiretapping operations. This is a larger and more elaborate “data mining” center than the one AT&T has constructed in San Francisco (see January 2003). Salon’s Kim Zetter will later write that the Bridgeton facility “had the earmarks of a National Security Agency operation,” including a sophisticated “mantrap” entrance using retinal and fingerprint scanners. Sometime in early 2003, AT&T technician Mark Klein (see July 7, 2009) discusses the Bridgeton facility with a senior AT&T manager, whom he will only identify as “Morgan.” The manager tells Klein that he considers the Bridgeton facility “creepy,” very secretive and with access restricted to only a few personnel. Morgan tells Klein that the secure room at Bridgeton features a logo on the door, which Klein will describe as “the eye-on-the-pyramid logo which is on the back of the dollar bill—and that got my attention because I knew that was for awhile the logo of the Total Awareness Program” (TIA-see Mid-January 2002, March 2002 and November 9, 2002). Klein notes that the logo “became such a laughingstock that they [the US government] withdrew it.” However, neither Klein nor Morgan find the NSA secure room at Bridgeton amusing. In June 2006, two AT&T workers will tell Zetter that the 100 or so employees who work in the room are “monitoring network traffic” for “a government agency,” later determined to be the NSA. Only government officials or AT&T employees with top-secret security clearance are admitted to the room, which is secured with a biometric “mantrap” or highly sophisticated double door, secured with retinal and fingerprint scanners. The few AT&T employees allowed into the room have undergone exhaustive security clearance procedures. “It was very hush-hush,” one of the AT&T workers will recall. “We were told there was going to be some government personnel working in that room. We were told: ‘Do not try to speak to them. Do not hamper their work. Do not impede anything that they’re doing.’” (Neither of Zetter’s sources is Klein, who by the time Zetter’s article is published in 2006, will have made his concerns about the NSA and AT&T public.) The Bridgeton facility is the central “command center” for AT&T’s management of all routers and circuits carrying domestic and international Internet traffic. Hence, it is the ideal location for conducting surveillance or collecting data. AT&T controls about a third of all bandwidth carrying Internet traffic to and from homes and businesses throughout the US. The two employees, who both will leave AT&T to work with other telecommunications firms, will say they cannot be sure what kinds of activities actually take place within the secret room. The allegations follow those made by Klein, who after his retirement (see May 2004) will submit an affidavit stating his knowledge of other, similar facilities in San Francisco and other West Coast switching centers, whose construction and operations were overseen by the NSA (see January 16, 2004 and January 2003); the two AT&T employees say that the orders for the San Francisco facility came from Bridgeton. NSA expert Matthew Aid will say of the Bridgeton facility, “I’m not a betting man, but if I had to plunk $100 down, I’d say it’s safe that it’s NSA.” Aid will say the Bridgeton facility is most likely part of “what is obviously a much larger operation, or series of interrelated operations” combining foreign intelligence gathering with domestic eavesdropping and data collection. Former high-level NSA intelligence officer Russell Tice will say bluntly: “You’re talking about a backbone for computer communications, and that’s NSA.… Whatever is happening there with the security you’re talking about is a whole lot more closely held than what’s going on with the Klein case.” The kind of vetting that the Bridgeton AT&T employees underwent points to the NSA, both Aid and Tice will say; one of the two AT&T employees who will reveal the existence of the Bridgeton facility will add, “Although they work for AT&T, they’re actually doing a job for the government.” Aid will add that, while it is possible that the Bridgeton facility is actually a center for legal FBI operations, it is unlikely due to the stringent security safeguards in place: “The FBI, which is probably the least technical agency in the US government, doesn’t use mantraps. But virtually every area of the NSA’s buildings that contain sensitive operations require you to go through a mantrap with retinal and fingerprint scanners. All of the sensitive offices in NSA buildings have them.” The American Civil Liberties Union’s Jameel Jaffer will add that when the FBI wants information from a telecom such as AT&T, it would merely show up at the firm with a warrant and have a wiretap placed. And both the NSA and FBI can legally, with warrants, tap into communications data using existing technological infrastructure, without the need for such sophisticated surveillance and data-mining facilities as the ones in Bridgeton and San Francisco. Both AT&T and the NSA will refuse to comment on the facilities in Bridgeton, citing national security concerns. [Salon, 6/21/2006; Klein, 2009, pp. 28-30]

Entity Tags: Terrorist Surveillance Program, National Security Agency, Russell Tice, Matthew Aid, Federal Bureau of Investigation, Kim Zetter, Mark Klein, AT&T, Jameel Jaffer, “Morgan” (senior AT&T manager), American Civil Liberties Union

Timeline Tags: Civil Liberties

Senior AT&T technician Mark Klein (see July 7, 2009), working near the National Security Agency (NSA)‘s “secret room” in the firm’s Folsom Street, San Francisco facility (see October 2003), receives two documents pertaining to the equipment in that secret room. (In a 2007 interview with PBS, Klein will cite a third document as well, that he found lying on top of a router.) The two documents are entitled “SIMS Splitter Cut-In and Test Procedure Issue 2, 01/12/03” and “SIMS Splitter Cut-In and Test Procedure OSWF Training Issue 2 January 24, 2002.” “OSWF” stands for “On-Site Work Force.” As for “SIMS,” all Klein knows is that it is an acronym associated with the secret room. Reading over the documents, Klein realizes that they indicate the secret room contains a “splitter cabinet,” installed in February 2003 (see February 2003), containing “optical splitters” that “cut in” to signals sent through 16 “Peering Links” between AT&T and 16 other major carriers and Internet exchange points. He later recalls: “I brought them back to my desk, and when I started looking at it, I looked at it more, and I looked at it more, and finally it dawned on me sort of all at once, and I almost fell out of my chair, because this showed, first of all, what they had done, that they had taken working circuits, which had nothing to do with a splitter cabinet, and they had taken in particular what are called peering links which connect AT&T’s network with the other networks. It’s how you get the Internet, right? One network connects with another. So they took 16 high-speed peering links which go to places like Qwest [Communications] and Palo Alto Internet Exchange and places like that.… These circuits were working at one point, and the documents indicated in February 2003 they had cut into these circuits so that they could insert the splitter so that they can get the data flow from these circuits to go to the secret room. So this data flow meant that they were getting not only AT&T customers’ data flow; they were getting everybody else’s data flow, whoever else might happen to be communicating into the AT&T network from other networks. So it was turning out to be like a large chunk of the network, of the Internet.” The documents, he later says, name “the circuit IDs… the companies they belong to… [and] the cut date. And they were all in February [2003], when they were cut into the splitter” (see February 2003). The 16 carriers include ConXion, Verio, XO, Genuity, Qwest, PAIX (Palo Alto Internet Exchange), Allegiance, Abovenet, Global Crossing, C&W, UUNET, Level 3, Sprint, Telia, PSINet, and MAE West (the Metropolitan Area Exchange for AT&T’s Western region). In plain English, the splitter in the NSA room is duplicating the electronic data being sent through AT&T’s equipment, and sending the duplicated signals somewhere else, presumably to NSA computers for later processing. Klein is given the documents by a veteran AT&T technician who is preparing to retire. Klein, in a casual conversation with the colleague who gave him the documents, remarks, “It seems obvious to me, given that the secret room is next to the 4ESS (see January 2003), that they’re listening to phone calls.” Klein’s colleague shakes his head and says: “No, Internet.… I’ll show you.” (In 2007 Klein will learn from a telecommunications expert that since AT&T was transferring its long-distance telephone traffic onto Internet fiber cables, the splitter was most likely picking up both telephone and Internet traffic.) Klein’s colleague shows him the cabinet containing the splitters. Klein later tells a reporter: “[T]here were optical splitters, which basically were connected by fiber-optic cable down to the secret room on the sixth floor.… The analogy I can give you, which most people are familiar with is, say you get cable TV in your living room and then want to watch all the channels you get in the living room, you want to get all those same channels in your bedroom. So they install on the cable what they call a splitter, which splits off all the signals, duplicates of the same signals which go to the bedroom.… What the splitter does is make a duplicate copy of all the signals going across the fiber-optic cables.… We’re talking about billions and billions of bits of data going across every second, right? And it’s going into the router, and it’s coming back from the routers in that office. So what they do with the splitter is they intercept that data stream and make copies of all the data, and those copies go down on the cable to the secret room.” Klein confirms from his colleague and from the documents that show the splitters are connected directly to the equipment in the secret room. [PBS Frontline, 5/15/2007; Klein, 2009, pp. 34-35]

Entity Tags: Genuity, UUNET, XO, Allegiance, Abovenet, AT&T, ConXion, Sprint/Nextel, Telia, Palo Alto Internet Exchange, MAE West, Level 3, Global Crossing, Mark Klein, National Security Agency, C&W, PSINet, Qwest

Timeline Tags: Civil Liberties

A portion of the outer door of AT&T’s Folsom Street facility.A portion of the outer door of AT&T’s Folsom Street facility. [Source: Wired News]Senior AT&T technician Mark Klein (see July 7, 2009), newly assigned to the company’s Folsom Street facility in San Francisco, is tasked to work at the seventh floor “Internet room,” where AT&T manages much of its domestic Internet traffic. Klein is intensely curious about the National Security Agency’s “secret room” on the sixth floor (see January 2003). The NSA room has two doors, both labeled “641A,” and is in reality what Klein will later term “a room within a room,” with the outer room filled with ordinary “computer equipment for mundane corporate uses.” He does not know what is in the inner “secret” room. Klein will later write, “While working in the outer room, you could walk around three sides of the secret room, which I measured to be about 24 by 48 feet.” An outer door leads from Room 641A to the 4ESS switchroom, which AT&T uses to manage its long-distance telephone communications. The rooms are connected by “row after row of equipment and a tangle of cabling going up and across the ceiling.” Klein learns that the NSA room is sometimes called “the SIMS room,” an acronym of which no one seems to know the meaning. [PBS Frontline, 5/15/2007; Klein, 2009, pp. 32-34] Klein will later describe his job at the Folsom Street facility as working with the phone switch equipment on the sixth floor, “which handled the public’s telephone calls and was the workhorse of the phone system.… My main assignment was to oversee the Internet room, and that meant keeping it going. If there were any trouble calls, I had to answer them. If there’s any upgrading work to do, I had to either do it or arrange for others to do it in off hours. Just oversee the flow of work in the Internet room and watch things.” He also spends a tremendous amount of time on the seventh floor, “where the Internet room was.… That’s where there are a lot of Cisco routers, a lot of fiber-optic lines coming in and going out.” The Folsom Street facility serves the Bay Area as well as much of Western America. According to Klein: “There’s lots of Internet traffic, as you can imagine, that goes in and out of this office, probably hundreds of fiber-optic lines that go out, carrying billions—that’s billions with a ‘B’—billions of bits of data going in and out every second every day. So all the Web surfing you’re doing, whatever you’re doing on the Internet—the pictures, the video, the Voice over Internet—all that stuff’s going in and out of there. And then of course there’s also the traditional phone switch, which is doing what it’s been doing since before the Internet.… Handling millions and millions of phone calls, right. That’s its job.” [PBS Frontline, 5/15/2007]

Entity Tags: Mark Klein, AT&T, National Security Agency

Timeline Tags: Civil Liberties

Narus logo.Narus logo. [Source: Endace (.com)]Narus, a firm which manufactures telecommunications hardware, co-sponsors a technical conference in McLean, Virginia, titled “Intelligence Support Systems for Lawful Interception and Internet Surveillance.” As AT&T engineer Mark Klein (see July 7, 2009) will later write: “Police officials, FBI and DEA agents, and major telecommunications companies eager to cash in on the ‘war on terror’ had gathered in the hometown of the CIA to discuss their special problems. Among the attendees were AT&T, BellSouth, MCI, Sprint, and Verizon. Narus founder Dr. Ori Cohen gave a keynote speech.” Also speaking at the conference is William Crowley, the former deputy director of the National Security Agency (NSA). Narus is providing some of the key hardware components used in the NSA’s domestic surveillance program (see January 16, 2004). [PBS Frontline, 5/15/2007; Klein, 2009, pp. 39]

Entity Tags: Narus, AT&T, BellSouth, Mark Klein, Ori Cohen, Verizon Wireless, National Security Agency, MCI, Sprint/Nextel, William Crowley

Timeline Tags: Civil Liberties

Senior AT&T technician Mark Klein (see July 7, 2009), who is considering “blowing the whistle” on the National Security Agency’s secret data-mining operation being conducted with the complicity and participation of AT&T (see January 16, 2004), is troubleshooting a problem of “signal loss” caused by AT&T’s signals being routed through the NSA’s “splitter cabinet,” which “splits” part of the optical data flow from its normal route into the NSA’s computers, enabling the agency to monitor all of the Internet traffic going through Klein’s Folsom Street, San Francisco, facility (see October 2003). Klein learns from a fellow technician that AT&T is “getting the same problem in the other offices where splitters are going in.” Klein is stunned to learn that other AT&T facilities have NSA splitters. He learns from the other technician that the “other offices” are in, among other places, Atlanta, San Diego, San Jose, and Seattle. (Apparently neither Klein nor the other technician are aware of the NSA splitter at the central AT&T facility in Bridgeton, Missouri—see Late 2002-Early 2003). Klein will later write, “This thing was getting bigger and bigger.” Klein determines that the NSA splitter is causing the signal loss: “The company was degrading the signal quality of its network for the sake of the NSA.”
Visiting the Secret Room - Klein accompanies an AT&T field support specialist named Rick into the NSA’s “secret room” at the Folsom Street building, with the intention of repairing the splitter problem. Rick is one of the few AT&T technicians authorized to work in the room; he invites Klein to join him and Klein agrees. Klein watches Rick punch the entry code into the lock of Room 641A and follows him inside. Klein observes a large amount of hardware, most installed in what he will later call “standard cabinets used by the telecommunications industry,” along with a computer workstation and a set of storage lockers. Klein later says he spends no more than two minutes inside the secret room. He will recall: “[I]f I didn’t know that the NSA was involved, it would look like any other work space where telecom people work, with rows of cabinets with equipment inside them, humming.… [T]he odd thing about the whole room, of course, was that I couldn’t normally get in there, nor could any of the other union technicians. Only this one guy who had clearance from the NSA could get in there, so that changed the whole context of what this is about.” Shortly thereafter, Rick tells Klein and a group of employees that he has keys allowing him access to the other NSA secret rooms in AT&T’s offices in San Diego, San Jose, and Seattle. [PBS Frontline, 5/15/2007; Klein, 2009, pp. 42-44]

Entity Tags: AT&T, “Rick” (AT&T field support specialist), Mark Klein, National Security Agency

Timeline Tags: Civil Liberties

A sample page from Mark Klein’s AT&T documentation.A sample page from Mark Klein’s AT&T documentation. [Source: Mark Klein / Seattle Times]Senior AT&T technician Mark Klein (see July 7, 2009), gravely concerned by the National Security Agency (NSA) spying operation going on in AT&T’s San Francisco facility (see October 2003) and now in possession of documents which prove the nature and scope of the telecommunications surveillance activities (see Fall 2003 and Late 2003), writes a memo summarizing his findings and conclusions. He appends eight pages of the unclassified documents he has in his possession, along with two photographs and some material from the Internet which documents the sophisticated surveillance equipment being used to gather data from AT&T’s electronic transmissions. The NSA and AT&T were, he later says, “basically sweeping up, vacuum-cleaning the Internet through all the data, sweeping it all into this secret room.… It’s the sort of thing that very intrusive, repressive governments would do, finding out about everybody’s personal data without a warrant. I knew right away that this was illegal and unconstitutional, and yet they were doing it.… I think I’m looking at something Orwellian. It’s a government, many-tentacled operation to gather daily information on what everybody in the country is doing. Your daily transactions on the Internet can be monitored with this kind of system, not just your Web surfing. All kinds of business that people do on the Internet these days—your bank transactions, your email, everything—it sort of opens a window into your entire private life, and that’s why I thought of the term ‘Orwellian.’ As you know, in [George] Orwell’s story [1984], they have cameras in your house, watching you. Well, this is the next best thing.… So I was not only angry about it; I was also scared, because I knew this authorization came from very high up—not only high up in AT&T, but high up in the government. So I was in a bit of a quandary as to what to do about it, but I thought this should be halted.”
Gathering 'the Entire Data Stream' - In his memo, Klein concludes that the NSA is using “splitter” equipment to copy “the entire data stream [emphasis in the original] and sent it to the [NSA’s] secret room for further analysis.” Klein writes that the splitters actually “split off a percentage of the light signal [from the fiber optic circuits] so it can be examined. This is the purpose of the special cabinet… circuits are connected into it, the light signal is split into two signals, one of which is diverted to the ‘secret room.’ The cabinet is totally unnecessary for the circuit to perform—in fact, it introduces problems since the signal level is reduced by the splitter—its only purpose is to enable a third party [the NSA] to examine the data flowing between sender and recipient on the Internet.” (Emphasis in the original.) In his book, Klein will explain that “each separate signal,” after being split, “contains all the information, nothing is lost, so in effect the entire data stream has been copied.” He will continue: “What screams out at you when examining this physical arrangement is that the NSA was vacuuming up everything flowing in the Internet stream: email, Web browsing, voice-over-Internet phone calls, pictures, streaming video, you name it. The splitter has no intelligence at all, it just makes a blind copy.” Klein later explains to a reporter: “The signals that go across fiber optics are laser light signals. It’s light basically that runs through a fiber optic, which is a clear glass fiber, and it has to be at a certain level for the routers to see the light and interpret the data correctly. If the light gets too low, just as if you get a weak flashlight with bad batteries, at a certain point it doesn’t work. If the light level drops too low, the router starts dropping bits and getting errors, and eventually you get loss of signal, and it just doesn’t work at all.… The effect of the splitter is to reduce the strength of the signal, and that may or may not cause a problem, depending on how much the signal is reduced.” A telecommunications company would not, as a rule, use such a splitter on its backbone Internet traffic because of the risk of degraded signal quality. “You want to have as few connections on your main data lines as possible,” Klein will say, “because each connection reduces the signal strength, and a splitter is a connection, and if you can avoid that, all the better.”
Inherently Illegal - Klein will explain that there is no way these activities are legal: “There could not possibly be a legal warrant for this, since according to the Fourth Amendment, warrants have to be specific, ‘particularly describing the place to be searched and the persons or things to be seized.’ It was also a blatant violation of the 1978 Foreign Intelligence Surveillance Act [FISA—see 1978], which calls for specific warrants as required by the Fourth Amendment. This was a massive blind copying of the communications of millions of people, foreign and domestic, randomly mixed together. From a legal standpoint, it does not matter what they claim to throw away later in their secret rooms, the violation has already occurred at the splitter.” [AT&T, 12/10/2002; AT&T, 1/13/2003; AT&T, 1/24/2003; Wired News, 5/22/2006; PBS Frontline, 5/15/2007; Klein, 2009, pp. 37, 119-133]
The Narus STA 6400 - Klein discusses one key piece of equipment in the NSA’s secret room, the Narus STA 6400 (see Late 2003). Narus is a firm that routinely sells its equipment not only to telecom firms such as AT&T, “but also to police, military, and intelligence officials” (see November 13-14, 2003). Quoting an April 2000 article in Telecommunications magazine, Klein writes that the STA 6400 is a group of signal “traffic analyzers that collect network and customer usage information in real time directly from the message.… These analyzers sit on the message pipe into the ISP [Internet Service Provider] cloud rather than tap into each router or ISP device.” Klein quotes a 1999 Narus press release that says its Semantic Traffic Analysis (STA) technology “captures comprehensive customer usage data… and transforms it into actionable information… [it] is the only technology that provides complete visibility for all Internet applications.” The Narus hardware allows the NSA “to look at the content of every data packet going by, not just the addressing information,” Klein will later write.
A 'Dream Machine for a Police State' - Klein later writes of the Narus STA 6400: “It is the dream machine of a police state, one that even George Orwell could not imagine. Not only does it enable the government to see what millions of people are saying and doing every day, but it can build up a database which reveals the connections among social groups—who’s calling and emailing whom. Such a device can easily be turned against all dissident protest groups, and even the Democratic and Republican parties, with devastating effect. And it’s in the hands of the executive power, in total secrecy.” [AT&T, 12/10/2002; AT&T, 1/13/2003; AT&T, 1/24/2003; Wired News, 5/22/2006; Klein, 2009, pp. 37-40] In support of the memo and an ensuing lawsuit against AT&T (see January 31, 2006), Klein will later write: “Despite what we are hearing, and considering the public track record of this administration, I simply do not believe their claims that the NSA’s spying program is really limited to foreign communications or is otherwise consistent with the NSA’s charter or with FISA. And unlike the controversy over targeted wiretaps of individuals’ phone calls, this potential spying appears to be applied wholesale to all sorts of Internet communications of countless citizens.” [Wired News, 4/7/2006]

Entity Tags: National Security Agency, Narus, Mark Klein, Foreign Intelligence Surveillance Act, AT&T

Timeline Tags: Civil Liberties

At a speech in Hershey, Pennsylvania, supporting the USA Patriot Act (see October 26, 2001), President Bush tells listeners that all US surveillance efforts are done with warrants from the Foreign Intelligence Surveillance Act (FISA) Court: “For years, law enforcement used so-called roving wire taps to investigate organized crime. You see, what that meant is if you got a wire tap by court order—and, by the way, everything you hear about requires court order, requires there to be permission from a FISA court, for example.… See, with court approval, we have long used roving wire taps to lock up monsters—mobsters. Now [with the Patriot Act in effect] we have a chance to lock up monsters, terrorist monsters.” [White House, 4/19/2004] The next day, Bush makes a similar claim during another pro-Patriot Act speech in Buffalo. He tells listeners: “[T]here are such things as roving wiretaps. Now, by the way, any time you hear the United States government talking about wiretap, it requires—a wiretap requires a court order. Nothing has changed, by the way. When we’re talking about chasing down terrorists, we’re talking about getting a court order before we do so. It’s important for our fellow citizens to understand, when you think Patriot Act, constitutional guarantees are in place when it comes to doing what is necessary to protect our homeland, because we value the Constitution. But a roving wiretap means—it was primarily used for drug lords. A guy, a pretty intelligence drug lord would have a phone, and in old days they could just get a tap on that phone. So guess what he’d do? He’d get him another phone, particularly with the advent of the cell phones. And so he’d start changing cell phones, which made it hard for our DEA types to listen, to run down these guys polluting our streets. And that changed, the law changed on—roving wiretaps were available for chasing down drug lords. They weren’t available for chasing down terrorists, see? And that didn’t make any sense in the post-9/11 era. If we couldn’t use a tool that we’re using against mobsters on terrorists, something needed to happen. The Patriot Act changed that. So with court order, law enforcement officials can now use what’s called roving wiretaps, which will prevent a terrorist from switching cell phones in order to get a message out to one of his buddies.” [White House, 4/20/2004] Former AT&T senior technician Mark Klein (see July 7, 2009 and May 2004), who helped install the equipment used by the National Security Agency (NSA) and his firm to intercept foreign and domestic Internet communications (see January 16, 2004), will later say that Bush’s insistence that the administration gets court orders before wiretapping communications is false. AT&T, on behalf of the NSA, was monitoring “billions of messages a second,” Klein will write, all without court orders. [Klein, 2009, pp. 47-48] Klein will call Bush’s description of the surveillance program “disingenuous,” and continue: “They present it as about phone calls. They’re just watching a few bad people who make phone calls to al-Qaeda and the Middle East, and you notice they don’t talk about the Internet hardly at all. That part of it hasn’t been revealed, because if they did, Americans would realize it’s not just a few people; it’s everybody, because the data they’re handing over is not selected out. When you run fiber optics through a splitter and you send all that data to a secret room, there’s no selecting going on there at all.… They have no way of sifting it out unless they look through it later. Now they can claim, ‘Oh, we are right as rain; we’re only doing the legal thing and selecting out a few people that we’re legally entitled to,’ but that’s only after they get all the data. The analogy I use: If the government claims: ‘Well, when you do your taxes, why don’t you just write me a blank check and we’ll fill in the amount? Don’t worry. We’ll do it legal. We’ll fill in the right amount,’ would you do that? Nobody would trust the government by writing a blank check to them. It’s the same thing with the data we’re giving them.… [T]he Fourth Amendment specifically bans general warrants. It calls for specific warrants in which the things to be seized and the persons to be seized are specifically named. There’s a reason for that. It’s to protect against arbitrary government power. And what they’ve done is to trample over the Fourth Amendment by basically instituting a general warrant on the Internet.” [PBS Frontline, 5/15/2007]

Entity Tags: Foreign Intelligence Surveillance Court, Mark Klein, National Security Agency, George W. Bush

Timeline Tags: Civil Liberties

Senior AT&T technician Mark Klein (see July 7, 2009) accepts a buyout package from his firm and retires. Klein, disheartened by the illegal AT&T/NSA wiretapping operation he has documented (see January 16, 2004), decides to keep the documents he has collected over the years (see Fall 2003 and Late 2003), the “hard proof” of the operation, he will later write, “in case there was some change in the political winds that would enable me to come forward and expose… the crimes which I knew were being committed.” [Klein, 2009, pp. 44]

Entity Tags: Mark Klein, AT&T

Timeline Tags: Civil Liberties

In a Columbus, Ohio, speech praising the USA Patriot Act (see October 26, 2001), President Bush claims that when US government agencies wiretap anyone’s phones or email communications, they do so with a court order. Bush says: “Before the Patriot Act, agents could use wiretaps to investigate a person committing mail fraud, but not to investigate a foreign terrorist. The Patriot Act corrected all these pointless double standards—and America is safer as a result. One tool that has been especially important to law enforcement is called a roving wiretap. Roving wiretaps allow investigators to follow suspects who frequently change their means of communications. These wiretaps must be approved by a judge, and they have been used for years to catch drug dealers and other criminals. Yet, before the Patriot Act, agents investigating terrorists had to get a separate authorization for each phone they wanted to tap. That means terrorists could elude law enforcement by simply purchasing a new cell phone. The Patriot Act fixed the problem by allowing terrorism investigators to use the same wiretaps that were already being using against drug kingpins and mob bosses. The theory here is straightforward: If we have good tools to fight street crime and fraud, law enforcement should have the same tools to fight terrorism.” [White House, 6/9/2005] Bush made almost identical claims a year ago (see April 19-20, 2004). The same day as Bush makes his speech, the White House issues a fact sheet making the same claims (see June 9, 2005). Former AT&T senior technician Mark Klein (see July 7, 2009 and May 2004), who helped install the equipment used by the National Security Agency (NSA) and his firm to intercept foreign and domestic Internet communications (see January 16, 2004), will later say that Bush’s insistence that the administration gets court orders before wiretapping communications is false. AT&T, on behalf of the NSA, was monitoring “billions of messages a second,” Klein will write, all without court orders. [Klein, 2009, pp. 47-48]

Entity Tags: Mark Klein, George W. Bush, National Security Agency, USA Patriot Act

Timeline Tags: Civil Liberties

In his weekly radio address, President Bush claims that the US always obtains court warrants before launching electronic surveillance efforts. “The Patriot Act is helping America defeat our enemies while safeguarding civil liberties for all our people,” he says. “The judicial branch has a strong oversight role in the application of the Patriot Act. Under the act, law enforcement officers need a federal judge’s permission to wiretap a foreign terrorist’s phone or search his property. Congress also oversees our use of the Patriot Act. Attorney General Gonzales delivers regular reports on the Patriot Act to the House and the Senate.” [White House, 12/10/2005] Bush has made similar claims in the recent past (see April 19-20, 2004, June 9, 2005, and April 19-20, 2004). Former AT&T senior technician Mark Klein (see July 7, 2009 and May 2004), who helped install the equipment used by the National Security Agency (NSA) and his firm to intercept foreign and domestic Internet communications (see January 16, 2004), will later say that Bush’s insistence that the administration gets court orders before wiretapping communications is false. AT&T, on behalf of the NSA, was monitoring “billions of messages a second,” Klein will write, all without court orders. [Klein, 2009, pp. 47-48]

Entity Tags: Mark Klein, AT&T, George W. Bush, USA Patriot Act, National Security Agency

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see July 7, 2009 and May 2004) is gladdened to see the New York Times’s reports on the Bush administration’s warrantless wiretapping program (see December 15, 2005 and December 24, 2005). Klein has known since 2002 that the National Security Agency (NSA) has been using AT&T facilities to illegally eavesdrop on American citizens’ telephone and Internet communications (see Late 2002, January 2003, October 2003, Fall 2003, Late 2003, Late 2003, and January 16, 2004). He has considered going public with his knowledge, but has so far refrained because, he will later explain, “[t]he atmosphere was still kind of scary.” He will later say of the Times report, “They seemed to be talking mainly about phone calls, but anyway, it was revealed that there was an illegal spying program going on, and I thought, ‘Ah, this would probably blow the whole thing,’ and I thought it would all come out, and I don’t need to do anything.” However, Klein is horrified to see the government’s response. He will say: “[W]hat came out was the government turned around and went on the offensive against anybody who would dare to criticize them.… They’re issuing threats: Anyone who has a security clearance and spills any beans here is in for prosecution. That was deliberately said by them several times on TV to intimidate anybody in, say, the NSA who knew the truth, intimidate them so they would not come forward. So that silenced anybody in the intelligence community” (see December 17, 2005, December 19, 2005, December 21, 2005, December 30, 2005, and January 25-26, 2006). In his 2009 book Wiring Up the Big Brother Machine… and Fighting It, Klein will write that the Justice Department’s December 2005 investigation into the leak of classified information that led to the Times reports (see December 30, 2005) “was obviously intended to silence Congress, the media, and any potential whistleblowers inside the NSA who might have been tempted to come forward. The administration was manipulating the secrecy oath which people had taken to get security clearances, turning it into a weapon to silence anyone who had knowledge of wrongdoing.” Klein decides that he must come forward. He never received a security clearance, so he cannot be threatened with legal action over violating such clearance. He will explain: “All I had and still have are some company documents and some knowledge of some illicit NSA installation at AT&T’s network. And if anybody—say, Congress—was willing to follow the trail, I can give them all the names they want, and they can go up the hierarchy of AT&T all the way up to Dave Dorman, who was the president back then, and they can go even higher, and they can find out who is responsible for this, and they can ask them under oath and subpoena what the heck is going on here, if they had the will to do it.” Klein later admits to some hesitation and trepidation at undertaking such an effort, and will cite the “McCarthyite” atmosphere he says the government has created in which “dissidents become the target of a lynch mob searching for ‘terrorists.’” But, he will write, he believes the Times stories are “a political indication of a shift at the top of government, a split of some kind which could provide an opening.… Maybe they would publish my material, I thought, and that would provide some protection.” By December 31, Klein writes a preface to his memo from almost two years before (see January 16, 2004 and December 31, 2005). [PBS Frontline, 5/15/2007; Klein, 2009, pp. 52-53]

Entity Tags: New York Times, AT&T, Bush administration (43), National Security Agency, US Department of Justice, Mark Klein

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see July 7, 2009 and May 2004), angered by the Bush administration’s counterattack against government and media members who have helped to expose its warrantless wiretapping operation (see December 15-31, 2005), decides to go public with a memo he wrote about his own knowledge of the collusion between AT&T and the National Security Agency (NSA) in eavesdropping on American citizens’ communications (see January 16, 2004). He updates the memo with a brief preface, selects eight pages of the 121 pages of AT&T documentation he possesses which he believes gives a good overview of the NSA’s surveillance equipment installation, and includes the two photographs he has taken of the NSA’s “secret room” at the AT&T facility in San Francisco and the Internet research he has done on the Narus STA 6400 equipment the NSA is using to sort the communications being captured and recorded (see Late 2003). Instead of entrusting his newly refurbished memo to the Internet, he uses the PGP (Pretty Good Privacy) security protocol for anticipated dissemination, burns the data onto a CD, and begins searching online for civil liberties groups that might be interested in his work. [Wired News, 5/17/2006; Klein, 2009, pp. 53-55]

Entity Tags: AT&T, National Security Agency, Mark Klein

Timeline Tags: Civil Liberties

Washington Post reporter William Arkin reveals that the National Security Agency (NSA) is “building a new warning hub and data warehouse” in Aurora, Colorado, just outside of Denver, on the grounds of Buckley Air Force Base. The agency is transferring many key personnel from its Fort Meade, Maryland, headquarters to Aurora. Arkin calls the new NSA facility, named the Aerospace Data Facility (ADF), “massive,” and says he believes it is the hub of the NSA’s data mining operation (see January 16, 2004). According to Government Executive magazine, the NSA’s new data storage facility “will be able to hold the electronic equivalent of the Library of Congress every two days.” While the NSA explains that the new facility is a cost-cutting measure and part of the agency’s post-9/11 decentralization—“This strategy better aligns support to national decision makers and combatant commanders,” an NSA spokesman tells one reporter—Arkin says that the “NSA is aligning its growing domestic eavesdropping operations—what the administration calls ‘terrorist warning’ in its current PR campaign—with military homeland defense organizations, as well as the CIA’s new domestic operations [in] Colorado.… Colorado is now the American epicenter for national domestic spying.” Arkin notes that previous news reports have said that the CIA is planning to move much of its domestic National Resources Division to Aurora as well. He also notes that Colorado is the home of the US military’s Northern Command (NORTHCOM), the military arm responsible for homeland defense. The move also allows the NSA to better coordinate its efforts with private contractors such as Lockheed Martin, Northrup Grumman Mission Systems, and Raytheon, all of which have presences in Colorado. Arkin names all three firms as partners with the NSA in building the ADF. Former senior AT&T technician Mark Klein (see July 7, 2009 and May 2004) will later write, “Over months and years, the database would be huge, ready for data mining whenever the government wants to go after someone.” [Washington Post, 1/31/2006; Klein, 2009, pp. 40-41]

Entity Tags: National Security Agency, Aerospace Data Facility, Government Executive Magazine, Mark Klein, Northrup Grumman Mission Systems, William Arkin, Lockheed Martin Corporation, Raytheon, US Northern Command

Timeline Tags: Civil Liberties

Electronic Frontier Foundation logo.Electronic Frontier Foundation logo. [Source: Flickr.com]The Electronic Frontier Foundation (EFF), a civil liberties and privacy-advocacy organization, files a lawsuit against telecommunications giant AT&T for allegedly violating the law and the privacy of its citizens by cooperating with the National Security Agency in the NSA’s construction of what the EFF calls a “massive, illegal program to wiretap and data-mine Americans’ communications.” EFF lawyer Kevin Bankston says: “Our goal is to go after the people who are making the government’s illegal surveillance possible. They could not do what they are doing without the help of companies like AT&T. We want to make it clear to AT&T that it is not in their legal or economic interests to violate the law whenever the president asks them to.”
Unprecedented Access to Communications System - EFF alleges that as part of the NSA’s domestic spying program, AT&T has allowed the NSA direct access to the phone and Internet communications passing over its network, and has given the government “unfettered access to its over 300 terabyte ‘Daytona’ database of caller information—one of the largest databases in the world.” One of AT&T’s databases, nicknamed “Hawkeye,” contains 312 terabytes of data detailing nearly every telephone communication on AT&T’s domestic network since 2001, the lawsuit alleges. The suit goes on to claim that AT&T allowed the NSA to use the company’s powerful Daytona database management software to quickly search this and other communication databases. AT&T, the suit claims, is in violation of the First and Fourth Amendments, federal wiretapping statutes, telecommunications laws, and the Electronic Communications Privacy Act. The suit requests fines up to $22,000 for each AT&T customer, and punitive fines—damages that could potentially reach into the billions of dollars. The EFF lawsuit is one of over 30 lawsuits filed for similar reasons (see June 26, 2006). The lawsuit will survive a number of initial legal challenges by the Justice Department and AT&T, including AT&T’s contention that “whatever we did, the government told us to do” and therefore it should be immune from such lawsuits, and the Justice Department’s invocation of “national security” and the possibility of the revelation of “state secrets” (see March 9, 1953). EFF retorts, “In this country we follow the law, we don’t just follow orders.” Bankston tells a reporter, “If state secrecy can prevent us from preserving the rights of millions upon millions of people, then there is a profound problem with the law.”
Suit Alleges Criminal Actions, Does Not Challenge Government's Right to Wiretap - The lawsuit does not challenge the government’s right to electronically monitor legitimate terrorism suspects, nor does it challenge the judicial right to issue warrants for such surveillance. Rather, EFF writes: “Wiretaps on terrorists are allowed under the law, and this lawsuit is not challenging the wiretap laws. We have sued AT&T for breaking those laws—the telecommunications giant gave the government access to its communications switches and its huge databases of information on millions of ordinary Americans. These are AT&T customers who have not even been accused of affiliations with terrorists. Americans can be both safe and free: if the government truly believes it has cause to wiretap a suspect, it can order AT&T to provide information under FISA [the Foreign Intelligence Surveillance Act]—for up to 72 hours before going to the court. But AT&T has no business providing direct access to the communications of millions of ordinary Americans, without the checks and balances of Congress or the courts.” [Electronic Frontier Foundation, 1/31/2006; Wired News, 1/31/2006]

Entity Tags: Electronic Frontier Foundation, Foreign Intelligence Surveillance Act, National Security Agency, AT&T, US Department of Justice, Kevin Bankston

Timeline Tags: Civil Liberties

A Washington Post article repeats assertions by the National Security Agency (NSA) and the Bush administration that even if the NSA is automatically intercepting and storing millions of domestic phone calls and emails (see January 16, 2004), such computerized surveillance does not legally “count” unless it is examined—i.e. read or listened to—by human analysts. As the Post reports, NSA rules state that “‘acquisition’ of content does not take place until a conversation is interrupted and processed ‘into an intelligible form intended for human inspection.’” The Post article says that “nearly all” of the intercepted “overseas” communications from American citizens have been “dismissed” by intelligence officers who found nothing of interest in them. The Post observes: “Fewer than 10 US citizens or residents a year, according to an authoritative account, have aroused enough suspicion during warrantless eavesdropping to justify interception of their domestic calls, as well. That step still requires a warrant from a federal judge, for which the government must supply evidence of probable cause.” And, according to the Post’s “knowledgeable sources,” no more than 5,000 Americans have had their conversations recorded or their emails examined by intelligence analysts. According to Bush administration officials, the Post reports, “[s]urveillance takes place in several stages… the earliest by machine. Computer-controlled systems collect and sift basic information about hundreds of thousands of faxes, emails, and telephone calls into and out of the United States before selecting the ones for scrutiny by human eyes and ears. Successive stages of filtering grow more intrusive as artificial intelligence systems rank voice and data traffic in order of likeliest interest to human analysts. But intelligence officers, who test the computer judgments by listening initially to brief fragments of conversation, ‘wash out’ most of the leads within days or weeks.” People who have helped develop the computer analysis technology say that “it is a triumph for artificial intelligence if a fraction of one percent of the computer-flagged conversations guide human analysts to meaningful leads.”
Controversy over Legality, Usefulness of Surveillance - National security lawyers say that the high proportion of false leads and innocent bystanders being wiretapped contravenes the “reasonable” search provisions of the Fourth Amendment. One government official says the success rate should be closer to 50 percent—one out of every two persons surveilled—and not less than one percent. “Those who devised the surveillance plan, the official says, “knew they could never meet that standard—that’s why they didn’t go through” the court that supervises the Foreign Intelligence Surveillance Act, or FISA. Bush officials refuse to say whether the NSA is discarding the more than 99 percent of communications that it intercepts and deems useless for further analysis. Jeff Jonas, an IBM scientist who invented a data-mining system now in use by both private and governmental entities, says that the kind of pattern-matching data analysis used by the NSA in its surveillance program is neither useful nor accurate. Those analysis techniques that “look at people’s behavior to predict terrorist intent,” he says, “are so far from reaching the level of accuracy that’s necessary that I see them as nothing but civil liberty infringement engines.” Psychology professor James W. Pennebaker disagrees. “Frankly, we’ll probably be wrong 99 percent of the time,” he says, “but one percent is far better than one in 100 million times if you were just guessing at random. And this is where the culture has to make some decisions.” [Washington Post, 2/5/2006]
Former AT&T Technician: AT&T, NSA Violating Fourth Amendment - Former AT&T senior technician Mark Klein (see July 7, 2009 and May 2004) will later take a different view of the issue. In 2009, he will write: “[T]he illegal act happens at the point of seizure by the government, i.e. the splitter—not later, whether or not a medium is involved (see January 16, 2004). That is the whole part of the Fourth Amendment, which demands the government get a warrant to show ‘probable cause’ for seizing things, whatever the government does with it afterwards. What they do later is unknown, and at any rate, their word on anything has proven to be an exercise in prevarication.” [Klein, 2009, pp. 48-49]

Entity Tags: Jeff Jonas, Foreign Intelligence Surveillance Act, Bush administration (43), James W. Pennebaker, Mark Klein, National Security Agency, Washington Post

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), working with a civil liberties group about his knowledge of governmental illegality in eavesdropping on Americans’ telephone and Internet communications (see Early January 2006), has contacted Los Angeles Times reporter Joseph Menn about publishing an article expising AT&T’s collusion with the National Security Agency (NSA) to illegally conduct surveillance against American citizens (see January 23, 2006 and After). Klein believed Menn was enthusiastic about exposing AT&T and the NSA in his newspaper. Instead, Klein is shocked to hear from Menn that the Times’s “top guy” is preparing to meet with Director of National Intelligence John Negroponte to discuss any such publication. “I nearly fell down in shock,” Klein will later write. “[T]hey were actually negotiating with the government on whether to publish!” Menn describes himself to Klein as “demoralized,” and says the chances of getting the story published are “grim.” In his seven years at the Times, Menn tells Klein, he has never seen a story “spiked” for “nefarious reasons,” implying that the reason behind the story’s non-publication are “nefarious.” Klein is also dismayed that the Times has now revealed his existence as a whistleblower to Negroponte, and by extension to the US intelligence apparatus. Two days ago, Klein began emailing a New York Times reporter, James Risen, the co-author of a 2005 expose about the NSA’s surveillance program (see December 15, 2005). After hearing from Menn, Klein emails Risen to inform him of the Los Angeles Times’s decision to “consult” with Negroponte, and also of the lack of interest he has received from Senator Dianne Feinstein’s office (see February 1-6, 2006). Risen calls in fellow reporter Eric Lichtblau, his co-author on the 2005 story, and the two begin working on their own story. Klein remains worried about his personal and professional safety, since, as he will write, “[t]he government was on to me, but I did not yet have a published article and the protection that comes with publicity. I had visions, perhaps paranoid in hindsight, of being disappeared in the night, like [nuclear industry whistleblower] Karen Silkwood.” The Los Angeles Times story will drag on until March 29, when Menn will inform Klein that it is officially dead, blocked by Times editor Dean Baquet. Klein will later learn that Baquet had not only been in contact with Negroponte, but with NSA Director Michael Hayden. In 2007, Baquet will tell ABC News reporters that “government pressure played no part in my decision not to run with the story,” and will say that he and managing editor Doug Frantz decided “we did not have a story, that we could not figure out what was going on” with Klein’s documentation (see March 26, 2007). Klein will call Baquet’s explanation an “absurd and flimsy excuse,” and will say it is obvious that the Los Angeles Times “capitulated to government pressure.” [PBS Frontline, 5/15/2007; Klein, 2009, pp. 59-62]

Entity Tags: James Risen, Dean Baquet, AT&T, Dianne Feinstein, Eric Lichtblau, Joseph Menn, Michael Hayden, John Negroponte, Douglas Frantz, National Security Agency, Los Angeles Times, Mark Klein

Timeline Tags: Civil Liberties

Retired AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), working with a civil liberties group about his knowledge of governmental illegality in eavesdropping on Americans’ telephone and Internet communications (see Early January 2006), is concerned that the New York Times will not publish a story featuring his allegations and evidence against AT&T and the National Security Agency (NSA). Klein was “outed” by Los Angeles Times editor Dean Baquet to the US intelligence apparatus after Klein approached a Los Angeles Times reporter about his story, and Klein is concerned that he lacks the protection that publicity would afford him (see February 11, 2006 and After). New York Times reporters James Risen and Eric Lichtblau fail to contact Klein for weeks during this time period, leaving Klein to wonder if the New York Times, like the Los Angeles Times before it, will fail to publish his story. Klein emails Risen and Lichtblau his full set of AT&T documents proving his allegations in mid-February (see December 31, 2005). Meanwhile, he sends emails containing selected documents to a number of Congressional members. Only one, House Representative Pete Stark (D-CA), responds, promising that he will present Klein’s information to the House Judiciary Committee, but, as Klein will write, “I never heard anything from the Judiciary Committee, or any other committee for that matter.” [PBS Frontline, 5/15/2007; Klein, 2009, pp. 63]

Entity Tags: James Risen, Dean Baquet, AT&T, Eric Lichtblau, House Judiciary Committee, Los Angeles Times, Mark Klein, New York Times, National Security Agency, Fortney Hillman (“Pete”) Stark, Jr

Timeline Tags: Civil Liberties

Electronic Frontier Foundation (EFF) lawyer Kevin Bankston asks AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009) to submit a legal declaration as to his knowledge of AT&T’s collusion with the National Security Agency (NSA) in its illegal domestic wiretapping program. Klein is working with the EFF in that organization’s lawsuit against AT&T (see Early January 2006 and January 31, 2006). Five days later, Klein submits his evidence of AT&T’s actions (see December 31, 2005) to Bankston to be used in the lawsuit. Klein will work with his lawyers to craft the declaration, and will have it in final form by late March. [Klein, 2009, pp. 63-64]

Entity Tags: National Security Agency, AT&T, Electronic Frontier Foundation, Mark Klein, Kevin Bankston

Timeline Tags: Civil Liberties

Expert witness J. Scott Marcus, in an analysis submitted on behalf of the Electronic Frontier Foundation’s lawsuit against AT&T (see January 31, 2006), notes that if the NSA had wanted to intercept only international electronic communications in its surveillance operations facilited by AT&T (see January 16, 2004), it would have placed “splitters” only at entry points such as ocean cable-head stations rather than in AT&T offices (see October 2003) in locations such as Atlanta and San Francisco (see Late 2003), where they would inevitably pick up huge amounts of domestic communications. Marcus, a former AT&T employee who held a top secret clearance when he was a consultant for the Federal Communications Commission (FCC), writes: “The majority of international IP [Internet Protocol] traffic enters the United States at a limited number of locations, many of them in the areas of northern Virginia, Silicon Valley, New York, and (for Latin America) south Florida. This deployment, however, is neither modest nor limited, and it apparently involves considerably more locations that would be required to catch the majority of international traffic.” (Emphasis in original.) Marcus continues: “I conclude that the designers of the SG3 Configuration (see Late 2003) made no attempt, in terms of the location or position of the fiber split, to exclude data sources primarily comprised of domestic data.… Once the data has been diverted, there is nothing in the data that reliably and unambiguously distinguishes whether the destination is domestic or foreign.” Marcus estimates that the NSA has 15 to 20 sites in AT&T facilities around the country, and says, “a substantial fraction, probably well over half, of AT&T’s purely domestic traffic was diverted.” Former senior AT&T technician Mark Klein (see July 7, 2009 and May 2004) will later write, “Though Marcus refrained from drawing the obvious conclusion, the facts strongly suggest that this entire apparatus was designed for domestic spying.” (Emphasis in original). [Klein, 2009, pp. 49-50, 71] Klein will also write that Marcus’s expertise “was at a much higher level than mine.” Klein will later write that he is pleased that Marcus’s statement validates and supports his own documentation and conclusions. [Klein, 2009, pp. 71]

Entity Tags: National Security Agency, AT&T, Electronic Frontier Foundation, Mark Klein, J. Scott Marcus

Timeline Tags: Civil Liberties

The Justice Department demands that it be allowed to review evidence obtained by the Electronic Frontier Foundation (EFF) from retired AT&T technician Mark Klein (see February 23-28, 2006). The EFF is preparing to submit the evidence under regular court seal to presiding Judge Vaughn Walker. Neither the Justice Department nor any other government agency is a named defendant in the EFF’s lawsuit against AT&T for its allegedly illegal behavior in working with the National Security Agency (NSA) to conduct warrantless surveillance against American citizens (see January 31, 2006). Even so, lawyers from the Justice Department say they want to see if Klein’s documentation contains classified information (it does not—see Late 2003), and if so, they intend to place Klein’s documentation into a “sensitive compartmented information facility,” which would mean it would not be kept at the courthouse but in the possession of government agents at a secure location. Such classification would make the legal proceedings more difficult for both Judge Walker and the EFF lawyers. However, the request piques the interest of the national media, and reporters begin “flooding” Klein and the EFF with requests for information and interviews. [Klein, 2009, pp. 65-66] Ironically, two news outlets, the Los Angeles Times and New York Times, have all but shunned Klein before now (see February 11, 2006 and After and Mid-February - Late March, 2006). On April 4, after perusing the documents, the government lawyers return them to Walker with approval from senior Justice Department lawyer Anthony J. Coppolino to file them under ordinary court seal. Klein will later write that Coppolino’s acquiescence will undermine the government’s later efforts to have the lawsuit dismissed under the “state secrets” provision (see Late May, 2006). [Klein, 2009, pp. 66] In June 2007, the online technical news site Wired News will publish the documents after they are released by the Electronic Frontier Foundation (see June 13, 2007) under the headline “AT&T ‘Spy Room’ Documents Unsealed; You’ve Already Seen Them.” Wired previously published them in May 2006 (see May 17, 2006), and PBS’s Frontline also published them as part of a televised documentary on Klein and the eavesdropping program. [Wired News, 6/13/2007]

Entity Tags: Mark Klein, AT&T, Anthony J. Coppolino, Los Angeles Times, US Department of Justice, New York Times, Electronic Frontier Foundation, Vaughn Walker, Wired News, National Security Agency

Timeline Tags: Civil Liberties

Retired AT&T technician and incipient whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009) issues his first press release, summarizing his knowledge of AT&T’s complicity with the National Security Agency (NSA) in that agency’s illegal domestic wiretapping program (see December 31, 2005). Klein has given documentation supporting his claims to the Electronic Frontier Foundation (EFF) in support of that organization’s lawsuit against AT&T (see January 31, 2006). Klein’s press release tells of the NSA’s “secret room” in AT&T’s Folsom Street, San Francisco, facility (see January 2003) and reveals for the first time the NSA’s use of the Narus STA 6400 to comb through the wiretapped data (see January 16, 2004). The release reads in part: “Based on my understanding of the connections and equipment at issue, it appears the NSA is capable of conducting what amounts to vacuum-cleaner surveillance of all the data crossing the Internet—whether that be people’s email, Web surfing, or any other data. Given the public debate about the constitutionality of the Bush administration’s spying on US citizens without obtaining a FISA warrant (see December 18, 2005, December 20, 2005, December 21, 2005, December 21, 2005, December 25, 2005, January 5, 2006, January 10, 2006, January 18, 2006, January 18, 2006, and January 31, 2006), I think it is critical that this information be brought out into the open, and that the American people be told the truth about the extent of the administration’s warrantless surveillance practices, particularly as it relates to the Internet. Despite what we are hearing (see December 19, 2005, December 19, 2005, December 21-22, 2005, and January 19, 2006), and considering the public track record of this administration (see December 24, 2005, Early 2006, January 23, 2006, January 25-26, 2006, and February 2, 2006), I simply do not believe their claims that the NSA’s spying program is really limited to foreign communications or otherwise consistent with the NSA’s charter or with FISA. And unlike the controversy over targeted wiretaps of individuals’ phone calls, this potential spying appears to be applied wholesale to all sorts of Internet communications of countless citizens.” Klein issues the press release in part to give himself some publicity, and the protection from government harassment such publicity might entail (see February 11, 2006 and After). [Wired News, 4/7/2006; Wired News, 4/7/2006; Klein, 2009, pp. 66-67]

Entity Tags: Electronic Frontier Foundation, AT&T, Bush administration (43), National Security Agency, Mark Klein

Timeline Tags: Civil Liberties

The New York Times does a more in-depth report on the allegations advanced by former AT&T technician Mark Klein (see December 15-31, 2005 and July 7, 2009), who is providing evidence and documentation to the Electronic Frontier Foundation (EFF) for that organization’s lawsuit against AT&T (see December 31, 2005 and January 31, 2006). The Times published a far briefer report five days earlier (see April 7, 2006). The article provides a brief synopsis of Klein’s allegations—that AT&T worked with the National Security Agency (NSA) to illegally monitor and record millions of Americans’ telephone and Internet communications and thus illegally invaded its customers’ privacy. It also notes, as did the first article, that Klein had provided some of his documentation “to reporters,” though neither article admits that the Times received the documents months beforehand (see Mid-February - Late March, 2006). The new information in the article is the conclusion of “four independent telecommunications and computer security experts” who examined Klein’s documents “at the request of The New York Times.” According to the four experts, the documents “describe equipment capable of monitoring a large quantity of email messages, Internet phone calls, and other Internet traffic. The equipment… was able to select messages that could be identified by keywords, Internet or email addresses, or country of origin and divert copies to another location for further analysis.” All four experts agreed that the documents proved “AT&T had an agreement with the federal government to systematically gather information flowing on the Internet through the company’s network. The gathering of such information, known as data mining, involves the use of sophisticated computer programs to detect patterns or glean useful intelligence from masses of information.” Brian Reid, the director of engineering at the Internet Systems Consortium, says of the AT&T/NSA project: “This took expert planning and hundreds of millions of dollars to build. This is the correct way to do high volume Internet snooping.” An expert who refuses to be named says the documents are “consistent” with Bush administration claims that the NSA only monitored foreign communications and communications between foreign and US locations, in part because of the location of the monitoring sites. (An expert witness, former AT&T and FCC employee J. Scott Marcus, has given testimony for EFF that flatly contradicts this expert’s assertions—see March 29, 2006). The article notes the Justice Department’s objections to Klein’s documents being filed with the court in the EFF lawsuit, and notes that the department withdrew its objections (see Late March - April 4, 2006). It also notes AT&T’s request for the court to order the EFF to return the documents because they are, the firm claimed, “proprietary” (see April 6-8, 2006). AT&T spokesman Walt Sharp says of Klein and the EFF lawsuit: “AT&T does follow all laws with respect to assistance offered to government agencies. However, we are not in a position to comment on matters of national security.” NSA spokesman Don Weber makes a similar statement: “It would be irresponsible of us to discuss actual or alleged operational issues as it would give those wishing to do harm to the United States the ability to adjust and potentially inflict harm.” [New York Times, 4/12/2006] Klein will write of the story, “Finally it was out there in a major newspaper, though I noticed that the New York Times did not show any images of the actual documents, and never called me back for an in-depth followup story.” [Klein, 2009, pp. 71]

Entity Tags: J. Scott Marcus, Brian Reid, AT&T, Bush administration (43), Electronic Frontier Foundation, National Security Agency, Walter Sharp, Mark Klein, Don Weber, New York Times, US Department of Justice

Timeline Tags: Civil Liberties

The Justice Department announces that it is invoking the “state secrets” clause to prevent a lawsuit by the Electronic Frontier Foundation (EFF) against AT&T from going forward (see March 9, 1953 and January 31, 2006). The EFF is suing AT&T for compromising its customers’ privacy by colluding with the National Security Agency (NSA) in that agency’s domestic surveillance program. The government alleges that the lawsuit would reveal “state secrets” critical to “national security” if it continues. The Justice Department makes its initial filing in mid-May (see May 13, 2006). [US District Court, Northern District of California, 4/28/2006 pdf file; Klein, 2009, pp. 71]

Entity Tags: Electronic Frontier Foundation, AT&T, National Security Agency, US Department of Justice

Timeline Tags: Civil Liberties

USA Today headline.USA Today headline. [Source: CBS News]USA Today reports that “[t]he National Security Agency (NSA) has been secretly collecting the phone call records of tens of millions of Americans, using data provided by the nation’s three biggest telecommunications providers, AT&T, Verizon, and BellSouth,” according to “people with direct knowledge of the arrangement.” None of the sources would allow USA Today to identify them by name, job, or affiliation. The USA Today story claims that the NSA program “does not involve the NSA listening to or recording conversations,” but does use “the data to analyze calling patterns in an effort to detect terrorist activity,” according to their sources. One source says that the NSA program is compiling “the largest database ever assembled in the world,” with the goal of creating “a database of every call ever made” within US borders. President Bush has said that the NSA program is focused exclusively on international calls, and for the calls to be recorded, “one end of the communication must be outside the United States.” However, this is now shown not to be the case (see January 16, 2004). A US intelligence official says that the NSA program is not recording the actual phone calls themselves, but is collecting what he calls “external” data about the communications to allow the agency to emply “social network analysis” for insight into how terrorist networks are connected with one another. Another large telecommunications company, Qwest, has refused to help the NSA eavesdrop on customer calls (see February 2001, February 2001 and Beyond, and February 27, 2001). USA Today’s sources say that the NSA eavesdropping program began after the 9/11 attacks, a claim that is not bolstered by the facts (see 1997, February 27, 2000, February 27, 2000, December 2000, February 2001, February 2001, February 2001 and Beyond, February 2001, Spring 2001, April 2001, April 4, 2001, July 2001, Before September 11, 2001, and Early 2002). The sources say that the three companies agreed to provide “call-detail records,” lists of their customers’ calling histories, and updates, which would allow the agency to track citizens’ calling habits. In return, the sources say, the NSA offered to pay the firms for their cooperation. After the three firms agreed to help the agency, USA Today writes, “the NSA’s domestic program began in earnest” (see After September 11, 2001, After September 11, 2001, October 2001, September 2002, and Spring 2004). NSA spokesman Don Weber says the agency is operating strictly “within the law,” but otherwise refuses to comment. Former US prosecutor Paul Butler says that the Foreign Intelligence Surveillance Act (FISA), which governs surveillance operations by US intelligence agencies, “does not prohibit the government from doing data mining” (see 1978). White House press spokesman Dana Perino says, “There is no domestic surveillance without court approval,” and all surveillance activities undertaken by government agencies “are lawful, necessary, and required for the pursuit of al-Qaeda and affiliated terrorists.” All government-sponsored intelligence activities “are carefully reviewed and monitored,” she adds, and says that “all appropriate members of Congress have been briefed on the intelligence efforts of the United States” (see October 11, 2001 and October 25, 2001 and November 14, 2001). Don Weber, a senior spokesman for the NSA, refuses to discuss the agency’s operations, saying: “Given the nature of the work we do, it would be irresponsible to comment on actual or alleged operational issues; therefore, we have no information to provide. However, it is important to note that NSA takes its legal responsibilities seriously and operates within the law.” All three firms released similar comments saying that they would not discuss “matters of national security,” but were complying with the law in their alleged cooperation with the NSA. The Electronic Frontier Foundation (EFF) is suing AT&T for what it calls its complicity in the NSA’s “illegal” domestic surveillance program (see January 31, 2006). [USA Today, 5/11/2006]

Entity Tags: Verizon Communications, USA Today, Qwest, Paul Butler, Foreign Intelligence Surveillance Act, Jane Harman, AT&T, BellSouth, National Security Agency, Dana Perino, Don Weber

Timeline Tags: Civil Liberties

The Justice Department files a brief with the US District Court of Northern California asking that the Electronic Frontier Foundation (EFF)‘s lawsuit against AT&T (see January 31, 2006) be dismissed on the grounds that it would breach “state secrets” vital to “national security.” The Justice Department publicly announced its intentions of asking that the lawsuit be dismissed on those grounds two weeks ago (see April 28, 2006). EFF is suing AT&T for compromising its customers’ privacy by colluding with the National Security Agency (NSA) in that agency’s domestic surveillance program. The lawsuit is Hepting, et al v. AT&T, often shortened in the media to Hepting v. AT&T. The government submits a number of secret documents to Judge Vaughn Walker as evidence, along with a heavily redacted document submitted for public perusal. Other documents include affidavits from the Director of National Intelligence, John Negroponte, and the head of the NSA, Lieutenant General Keith Alexander. Some observers believe that Walker, a conservative appointed to the bench by President George H.W. Bush, will quickly comply with the government’s request. However, as AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009), who is working with EFF on the lawsuit (see Early January 2006), will later write, Vaughn is independent-minded and possessed of a “strong libertarian bent,” and will not be so prone to do the government’s bidding as some believe. [Klein, 2009, pp. 72-73] Walker’s first hearing on the brief will be held four days later (see May 17, 2006).

Entity Tags: John Negroponte, AT&T, Electronic Frontier Foundation, Keith Alexander, Mark Klein, US Department of Justice, Vaughn Walker, National Security Agency

Timeline Tags: Civil Liberties

Wired News, the online technical news site, publishes a copy of AT&T whistleblower Mark Klein’s unclassified memo written in 2004 (see January 16, 2004). Klein has joined the Electronic Frontier Foundation (EFF) in its lawsuit against AT&T. Klein has evidence that AT&T colluded with the National Security Agency (NSA) to illegally wiretap Americans’ domestic telephone and Internet communications. [Wired News, 5/17/2006]

Entity Tags: Electronic Frontier Foundation, AT&T, National Security Agency, Mark Klein, Wired News

Timeline Tags: Civil Liberties

Wired News logo.Wired News logo. [Source: Delve Networks]Evan Hansen, the editor in chief of Wired News, an online technical news site, explains why the site published a set of documents from AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009). Klein is working with the Electronic Frontier Foundation (EFF) in that organization’s lawsuit against AT&T for invading its customers’ privacy by taking part in the National Security Agency’s warrantless domestic wiretap operation (see January 31, 2006). The presiding judge, Vaughn Walker, has denied requests from the EFF and a number of news organizations to unseal the documents and make them public. For its part, AT&T wants the documents to remain sealed, claiming they are proprietary and that it would suffer harm if they were disclosed (see April 6-8, 2006). Hansen and the Wired News senior staff disagree. “In addition,” Hansen writes, “we believe the public’s right to know the full facts in this case outweighs AT&T’s claims to secrecy.” Hansen erroneously says that the documents seem “to be excerpted from material that was later filed in the lawsuit under seal,” though “we can’t be entirely sure, because the protective order prevents us from comparing the two sets of documents.” Klein later writes that the Wired News staff “confused my 2004 memo (see January 16, 2004) with my court-sealed legal declaration” (see February 23-28, 2006); even so, Klein will write, “it was true that all of the AT&T documents were still under court seal.” Hansen says Wired News reporter Ryan Singel received the Klein documents from “an anonymous source close to the litigation.” Hansen also writes: “We are filing a motion to intervene in the case in order to request that the court unseal the evidence, joining other news and civil rights organizations that have already done so, including the EFF, the San Francisco Chronicle, the Los Angeles Times, the San Jose Mercury News, the Associated Press, and Bloomberg. Before publishing these documents we showed them to independent security experts, who agreed they pose no significant danger to AT&T. For example, they do not reveal information that hackers might use to easily attack the company’s systems.” Hansen writes that Wired’s publication of the documents does not violate Walker’s gag order concerning the documents’ publication, as the order specifically bars the EFF and its representatives—and no one else—from publishing or discussing them. “The court explicitly rejected AT&T’s motion to include Klein in the gag order and declined AT&T’s request to force the EFF to return the documents,” he notes (see May 17, 2006). [Wired News, 5/22/2006; Klein, 2009, pp. 75]

Entity Tags: Vaughn Walker, AT&T, Electronic Frontier Foundation, Evan Hansen, Mark Klein, Ryan Singel, Wired News, National Security Agency

Timeline Tags: Civil Liberties

AT&T lawyers accidentally release sensitive information in their defense of a lawsuit accusing AT&T and two other telecommunications firms of illegally cooperating with an NSA wiretapping program (see January 31, 2006). They release a 25-page legal brief, heavily redacted with thick black lines intended to obscure portions of three pages, in PDF (Portable Data File) format. But some software programs can read the text. The redacted information offers alternative reasons why AT&T has a secret room in its downtown San Francisco switching center designed to monitor Internet and telephone traffic (see February 2001). The Electronic Frontier Foundation, who filed the lawsuit, says the room is used by the NSA surveillance program. The redacted sections argue that the room could be used for “legitimate Internet monitoring systems, such as those used to detect viruses and stop hackers.” Another argument reads, “Although the plaintiffs ominously refer to the equipment as the ‘Surveillance Configuration,’ the same physical equipment could be utilized exclusively for other surveillance in full compliance with” the Foreign Intelligence Surveillance Act (FISA). The court filing is not classified, and no information relating to the actual operations of the NSA’s surveillance program is disclosed. [US District Court, Northern District of California, San Francisco Division, 5/24/2006 pdf file; US District Court, Northern District of California, San Francisco Division, 5/24/2006; CNET News, 5/26/2006]

Entity Tags: National Security Agency, Electronic Frontier Foundation, AT&T

Timeline Tags: Civil Liberties

The Bush administration submits a legal brief arguing that the Electronic Frontier Foundation’s lawsuit against AT&T, alleging that firm cooperated with the NSA’s domestic surveillance program (see January 31, 2006), should be thrown out of court because of the government’s “state secrets” privilege (see March 9, 1953). Justice Department lawyers want Judge Vaughn Walker to examine classified documents that they say will convince him to dismiss the lawsuit. However, the government does not want the defense lawyers to see that material. “No aspect of this case can be litigated without disclosing state secrets,” the government argues. “The United States has not lightly invoked the state secrets privilege, and the weighty reasons for asserting the privilege are apparent from the classified material submitted in support of its assertion.” [CNET News, 5/26/2006]

Entity Tags: US Department of Justice, Electronic Frontier Foundation, AT&T, Vaughn Walker, Bush administration (43)

Timeline Tags: Civil Liberties

In a follow-up hearing, Judge Vaughn Walker of the US District Court of Northern California hears arguments by AT&T and the Justice Department as to whether he should dismiss a lawsuit against AT&T by the Electronic Frontier Foundation (EFF—see January 31, 2006). The EFF argues that AT&T violated its customers’ privacy by colluding with the National Security Agency (NSA) in that agency’s allegedly illegal domestic wiretapping project. The government asserts that the lawsuit would jeopardize “state secrets” if permitted to go forward (see May 22, 2006). In today’s hearing, Justice Department lawyer Peter Keisler admits to Walker that the documents presented on behalf of the EFF by AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009) and others are not classified. “None of the documents they (EFF) have submitted… implicate any privileged [classified] matters,” Keisler tells Walker. The judge says, “Including the Klein documents.” Keisler agrees, saying: “We have not asserted any privilege over the information that is in the Klein and Marcus (see March 29, 2006) documents.… Mr. Klein and Marcus never had access to any of the relevant classified information here, and with all respect to them, through no fault or failure of their own, they don’t know anything.” Klein will later write that Keisler’s admission is a crippling blow to the government’s assertion that the EFF documentation would compromise national security if made public or submitted in open court. [Klein, 2009, pp. 77]

Entity Tags: US Department of Justice, AT&T, Electronic Frontier Foundation, Mark Klein, Vaughn Walker, National Security Agency, Peter Keisler

Timeline Tags: Civil Liberties

Judge Vaughn Walker of the US District Court of Northern California rejects a request by the Justice Department to dismiss a lawsuit by the Electronic Frontier Foundation (EFF—see January 31, 2006) against AT&T. The EFF argues that AT&T violated its customers’ privacy by colluding with the National Security Agency (NSA) in that agency’s allegedly illegal domestic wiretapping project. The government has asserted that the lawsuit would jeopardize “state secrets” if permitted to go forward (see May 22, 2006 and June 23, 2006). According to AT&T whistleblower Mark Klein, working with the EFF in the lawsuit, Walker “ridicule[s]” the government’s request for dismissal on state secrets grounds, finding that “[t]he government has opened the door for judicial inquiry by publicly confirming and denying material information about its monitoring of communications content.… AT&T and the government have for all practical purposes already disclosed that AT&T assists the government in monitoring communication content. [T]he government has publicly admitted the existence of a ‘terrorist surveillance program’ (see After September 11, 2001, After September 11, 2001, October 2001, and September 2002).… Considering the ubiquity of AT&T telecommunications services, it is unclear whether this program could even exist without AT&T’s acquiescence and cooperation.” EFF had given Walker the ammunition for his finding by providing him with a raft of media stories about AT&T’s involvement in the NSA surveillance program, as well as media coverage of Klein’s assertions (see April 12, 2006 and May 17, 2006). “The very subject matter of this action is hardly a secret” any longer, Walker finds (see May 24, 2006). “[D]ismissing this case at the outset would sacrifice liberty for no apparent enhancement of security.” Walker also rejects a separate motion to dismiss by AT&T, which had argued that its relationship with the government made it immune from prosecution. Marc Rotenberg of the Electronic Privacy Information Center (EPIC) says: “This cases arises against the backdrop of the accountability of the government as it pursues its surveillance program. This is a significant victory for the principle of government accountability.” AT&T spokesman Walt Sharp refuses to give a direct comment about the ruling, but says that AT&T has always protected its customers’ privacy (see February 2001 and Beyond, February 2001, and Late 2002-Early 2003). The government will obtain a stay of Walker’s ruling while it files an appeal, preventing the EFF documents from being publicly disseminated. [New York Times, 7/21/2006; Klein, 2009, pp. 78-79]

Entity Tags: Mark Klein, AT&T, Electronic Frontier Foundation, Marc Rotenberg, US Department of Justice, Walter Sharp, Vaughn Walker, National Security Agency

Timeline Tags: Civil Liberties

The Electronic Frontier Foundation (EFF) publishes a set of three non-classified documents secured from telecommunications giant AT&T by former AT&T technician and current whistleblower Mark Klein. Klein has used the documents to prove his assertions that AT&T colluded with the National Security Agency to illegally eavesdrop on Americans’ telephone and Internet communications (see December 15-31, 2005 and July 7, 2009). The EFF has sued AT&T for violating its customers’ privacy, and Klein and the documents are key elements of its case (see February 23-28, 2006). After years of opposing their public disclosure and attempting to force their return (see April 6-8, 2006), AT&T acquiesced to the documents’ disclosure earlier this week after the EFF threatened to take the corporation to a federal appeals court. The documents were released in part by Wired News over a year ago against AT&T’s wishes (see May 17, 2006), and PBS also made them public as a part of a Frontline documentary. The Justice Department considered classifying the documents, then rejected the idea (see Late March - April 4, 2006). According to EFF’s Cindy Cohn, AT&T agreed to the disclosure of those portions to escape the embarrassment of arguing that documents available on the Internet for more than a year were secret. Wired’s Ryan Singel writes: “There are no surprises in the AT&T documentation… which consist of a subset of the pages already published by Wired News. They include AT&T wiring diagrams, equipment lists, and task orders that appear to show the company tapping into fiber-optic cables at the point where its backbone network connects to other ISPs at a San Francisco switching office. The documents appear to show the company siphoning off the traffic to a room packed with Internet-monitoring gear.” The EFF also releases a formerly sealed, signed declaration by Klein (see February 23-28, 2006) and a written analysis of the documentation by Internet expert J. Scott Marcus (see March 29, 2006). Marcus’s analysis, which had previously remained largely under court-ordered seal, is “the most interesting” of the releases, Singel writes. Marcus said the AT&T technical configuration allowed the NSA to conduct “surveillance and analysis of Internet content on a massive scale, including both overseas and purely domestic traffic,” and found it probable that AT&T had “15 or 20” secret facilities around the country, not just the few facilities of which Klein was aware. AT&T, with the Justice Department, is trying to prevent EFF’s lawsuit from continuing, insisting that such a trial would expose “state secrets” (see April 28, 2006 and May 13, 2006). Judge Vaughn Walker has already considered and dismissed that claim (see July 20, 2006); AT&T and the government hope an appeals court will find in their favor. Cohn tells Singel she hopes the documents will show the public that their case is based in fact and not speculation, and that the government’s claim of a national security risk is overblown: “It really paints them into a corner, how unreasonable their claims of state secrets are. I’m hoping [the document release] demonstrates we are right and know what we are talking about and that we don’t need much more to win our case. We are much closer than people think.” [Wired News, 6/13/2007]

Entity Tags: J. Scott Marcus, Cindy Cohn, AT&T, Electronic Frontier Foundation, Mark Klein, National Security Agency, Wired News, Ryan Singel, US Department of Justice, Vaughn Walker

Timeline Tags: Civil Liberties

AT&T attorney Michael Kellogg enters the courtroom.AT&T attorney Michael Kellogg enters the courtroom. [Source: Wired News]The Ninth Circuit Court of Appeals in San Francisco hears two related cases: one a government appeal to dismiss a case brought against AT&T for its involvement in the National Security Agency (NSA)‘s domestic wiretapping program (see July 20, 2006), and the other a challenge to the government’s authority to wiretap overseas phone calls brought on behalf of a now-defunct Islamic charity, Al Haramain (see February 28, 2006). The AT&T lawsuit is brought by the Electronic Frontier Foundation (see January 31, 2006). Among the onlookers is AT&T whistleblower Mark Klein (see December 15-31, 2005 and July 7, 2009), who has provided key documentation for the EFF lawsuit (see Early January 2006).
Government Lawyer: Court Should Grant 'Utmost Deference' to Bush Administration - Deputy Solicitor General Gregory Garre, arguing on behalf of the US government, tells Judge Harry Pregerson, one of the three judges presiding over the court, that allowing the EFF lawsuit against AT&T to go forward would result in “exceptionally grave harm to national security in the United States,” even though a previous judge has ruled otherwise (see July 20, 2006) and the government itself has admitted that none of the material to be used by EFF is classified as any sort of state secret (see June 23, 2006). Pregerson says that granting such a request would essentially make his court a “rubber stamp” for the government, to which Garre argues that Pregerson should grant the “utmost deference” to the Bush administration. Pregerson retorts: “What does utmost deference mean? Bow to it?” [Wired News, 8/15/2007] Klein will later accuse Garre of using “scare tactics” to attempt to intimidate the judges into finding in favor of AT&T and the government. [Klein, 2009, pp. 79]
Government Refuses to Swear that Domestic Surveillance Program Operates under Warrant - Garre says that the goverment’s domestic surveillance program operates entirely under judicial warrant; he says the government is not willing to sign a sworn affidavit to that effect. Reporter Kevin Poulsen, writing for Wired News, says that Garre’s admission of the government’s reluctance to swear that its domestic surveillance program operates with warrants troubles all three judges. AT&T attorney Michael Kellogg argues that AT&T customers have no proof that their communications are being given over to the government without warrants, and therefore the EFF lawsuit should be dismissed. “The government has said that whatever AT&T is doing with the government is a state secret,” Kellogg says. “As a consequence, no evidence can come in whether the individuals’ communications were ever accepted or whether we played any role in it.” EFF attorney Robert Fram argues that the Foreign Intelligence Surveillance Act (FISA) allows citizens to challenge electronic surveillance by permitting courts to hear government evidence in chambers. He is careful, Poulsen writes, to note that EFF does not want specific information on the NSA’s sources and methods, and says that EFF already has enough evidence to prove its assertion that AT&T compromised its customers’ privacy by colluding with the NSA’s domestic surveillance program.
Government Mocks Whistleblower's AT&T Documentation - Garre mocks Klein’s AT&T documents, saying that all they prove is that the NSA’s secret room in AT&T’s San Francisco facility (see Late 2002-Early 2003, January 2003, and October 2003) “has a leaky air conditioner and some loose cables in the room.” Fram counters that Klein’s documentation is specific and damning. It proves that the NSA housed a splitter cabinet in that secret room that “split” data signals, allowing the NSA to wiretap literally millions of domestic communications without the knowledge of AT&T customers (see February 2003, Fall 2003, Late 2003, and Late 2003). Fram says Klein’s documents, along with other non-classified documentation EFF has presented, proves “the privacy violation on the handover of the Internet traffic at the splitter into the secret room, which room has limited access to NSA-cleared employees. What is not part of our claim is what happens inside that room.” Klein’s documentation proves the collusion between AT&T and the NSA, Fram states, but Judge M. Margaret McKeown questions this conclusion. According to Poulsen, McKeown seems more willing to grant the government the argument that it must protect “state secrets” than Pregerson.
Government Argues for Dismissal of Al Haramain Case - As in the AT&T portion of the appeal hearing, the government, represented by Assistant US Attorney General Thomas Brody, argues for the Al Haramain lawsuit’s dismissal, saying, “The state secrets privilege requires dismissal of this case.” Even the determination as to whether Al Haramain was spied upon, he argues, “is itself a state secret.” The Top Secret government document that Al Haramain is using as the foundation of its case is too secret to be used in court, Brody argues, even though the government itself accidentally provided the charity with the document. Even the plaintiff’s memories of the document constitute “state secrets” and should be disallowed, Brody continues. “This document is totally non-redactable and non-segregable and cannot even be meaningfully described,” he says. A disconcerted Judge McKeown says, “I feel like I’m in Alice and Wonderland.” Brody concludes that it is possible the Al Haramain attorneys “think or believe or claim they were surveilled. It’s entirely possible that everything they think they know is entirely false.” [Wired News, 8/15/2007]
No Rulings Issued - The appeals court declines to rule on either case at this time. Klein will later write, “It was clear to everyone that this panel would, if they ever issued a ruling, deny the ‘state secrets’ claim and give the green light for the EFF lawsuit to go forward.” [Klein, 2009, pp. 79-81] Wired News’s Ryan Singel writes that the panel seems far more sympathetic to the EFF case than the Al Haramain case. The judges seem dismayed that the government fails to prove that no domestic surveillance program actually exists in the EFF matter. However, they seem far more willing to listen to the government’s case in the Al Haramain matter, even though McKeown says that the government’s argument has an “Alice in Wonderland” feel to it. Singel believes the government is likely to throw out the secret document Al Haramain uses as the foundation of its case. However, he writes, “all three judges seemed to believe that the government could confirm or deny a secret intelligence relationship with the nation’s largest telecom, without disclosing secrets to the world.… So seemingly, in the eyes of today’s panel of judges, in the collision between secret documents and the state secrets privilege, ‘totally secret’ documents are not allowed to play, but sort-of-secret documents—the AT&T documents—may be able to trump the power of kings to do as they will.” [Wired News, 8/15/2007] Wired News’s David Kravets notes that whichever way the court eventually rules, the losing side will continue the appeals process, probably all the way to the US Supreme Court. The biggest question, he says, is whether the NSA is still spying on millions of Americans. [Wired News, 8/15/2007]

Entity Tags: Foreign Intelligence Surveillance Act, US Supreme Court, Electronic Frontier Foundation, Bush administration (43), Al Haramain Islamic Foundation, AT&T, David Kravets, Ryan Singel, Thomas Brody, National Security Agency, Mark Klein, Kevin Poulsen, M. Margaret McKeown, Gregory Garre, Harry Pregerson, Robert Fram, Michael Kellogg

Timeline Tags: Civil Liberties

Room 641A, the NSA’s secret room at AT&T’s Folsom Street facility.Room 641A, the NSA’s secret room at AT&T’s Folsom Street facility. [Source: Wired]Former AT&T network technician Mark Klein (see December 15-31, 2005 and July 7, 2009) gives a press conference with the Electronic Frontier Foundation (EFF) in Washington, DC, in an effort to lobby Congress and prevent an immunity bill for the telecoms from passing. The next day, Klein appears in the audience during a Senate Judiciary Committee meeting as part of his lobbying effort in Washington to reveal his knowledge of a secret NSA electronic surveillance operation at AT&T’s San Francisco operations center (see January 2003). The NSA has monitored an enormous volume of telephone and Internet traffic through this secret operation. “I have first-hand knowledge of the clandestine collaboration between one giant telecommunications company, AT&T, and the National Security Agency to facilitate the most comprehensive illegal domestic spying program in history,” Klein tells reporters. “I think they committed a massive violation not only of the law but of the Constitution. That’s not the way the Fourth Amendment is supposed to work.” [New York Times, 11/6/2007; BetaNews, 11/8/2007; Democracy Now!, 7/7/2008] Klein states his four main points of information: that AT&T provided the NSA with all varieties of electronic communications, from telephone conversations to emails, text messages, Web browsing activities, and more; AT&T provided the NSA with billions of purely domestic communications; the program involved everyone using the Internet and not just AT&T customers, because of the interconnected nature of the Internet; and AT&T had 15 to 20 NSA “spy rooms” in facilities across the nation. Brian Reid, a telecommunications and data networking expert who served as one of the New York Times’s experts on the NSA allegations (see April 12, 2006), appears with Klein at the press conference. Reid told Klein in the days before the conference, “My job is to make people believe you.” Reid tells reporters, “The most likely use of this [AT&T/NSA] infrastructure is wholesale, untargeted surveillance of ordinary Americans at the behest of the NSA.” Hours after the press conference, Klein appears as a guest on MSNBC’s political talk show Countdown, where host Keith Olbermann asks him if his experience “felt like finding yourself in a scene from the sci-fi flick Invasion of the Body Snatchers—did it have that sort of horror quality to it?” Klein replies, “My thought was George Orwell’s 1984 and here I am being forced to connect the Big Brother machine.” [Klein, 2009, pp. 93-100]
Key Witness - Klein is a key witness in the lawsuit against AT&T by the EFF (see January 31, 2006 and Early January 2006). He is offering to testify against efforts by the Bush administration and its Congressional Republican allies to amend the Foreign Intelligence Surveillance Act to grant immunity to telecom companies like AT&T from prosecution for surveillance acts. Such an immunity grant would likely result in the dismissal of such lawsuits. But no committee of Congress invites him to testify. [New York Times, 11/6/2007; BetaNews, 11/8/2007; Democracy Now!, 7/7/2008]
NSA Secure Room - Part of Klein’s information is from a deposition that was entered into evidence in the lawsuit, and is now made available to individual members of Congress (see February 23-28, 2006, June 26, 2006, and June 13, 2007). Klein relates that during a tour of the AT&T-controlled floors of the Folsom Street facility of what was then SBC Communications, he saw Room 641A, categorized as the “SG3Secure Room” (see October 2003 and Late 2003). That fall, when he was hired to work at the facility, he saw an NSA agent who came to interview a field support specialist for clearance to be able to work in the Secure Room. “To my knowledge, only employees cleared by the NSA were permitted to enter the SG3 Secure Room,” Klein says. “To gain entry to the SG3 Secure Room required both a physical key for the cylinder lock and a combination code number to be entered into an electronic keypad on the door. To my knowledge, only [two field support specialists] had both the key and the combination code.” Klein installed new circuits to a fiber-optic “splitter cabinet” that had only one purpose: to duplicate Internet traffic from WorldNet’s service into SG3, thereby allowing the NSA access to all traffic on that circuit. “What I saw is that everything’s flowing across the Internet to this government-controlled room,” he now says. [New York Times, 11/6/2007; BetaNews, 11/8/2007]
EFF Lobbyists - The EFF secures the services of two professional lobbyists, Adam Eisgrau and former Congressman Thomas Downey (D-NY), who escort Klein and EFF officials Cindy Cohn and Kevin Bankston around Capitol Hill during the two-day period. EFF also works with a professional media company to prepare the media for the November 7 press conference. After the conference, Klein is introduced to a number of Democratic lawmakers, though he says only a few are truly interested in his evidence; he names Senator Barbara Boxer (D-CA) and Representative Rush Holt (D-NJ), a former physicist who had actually worked with some of the technology Klein cites in his statements, as two of those willing to give him more than a handshake and a quick photo opportunity. Klein later regrets being unable to meet with Senator Christopher Dodd (D-CT), whom he considers to be one of the few real champions of civil liberties in Congress. Dodd cited Klein’s evidence, and Klein by name, in his unsuccessful filibuster of the FISA amendment bill (see July 10, 2008). [Klein, 2009, pp. 91-95] The lobbyists are able to gain access for Klein to the Congressional hearings. Some media outlets later report, mistakenly, that Klein actually testifies before the panel. [Klein, 2009, pp. 100-101]

Entity Tags: Foreign Intelligence Surveillance Act, Electronic Frontier Foundation, AT&T, Mark Klein, Bush administration (43), Senate Judiciary Committee

Timeline Tags: Civil Liberties

The Electronic Frontier Foundation (EFF) files a lawsuit against the National Security Agency (NSA), President Bush, Vice President Dick Cheney, former Attorney General and White House counsel Alberto Gonzales, former Cheney chief of staff David Addington, and other members of the Bush administration. The EFF claims the lawsuit is “on behalf of AT&T customers to stop the illegal unconstitutional and ongoing dragnet surveillance of their communications and communications records.” The EFF is referring to its ongoing lawsuit against AT&T and other telecommunications firms, which it accuses of colluding with the NSA to illegally monitor American citizens’ domestic communications (see December 15, 2005). The case, the EFF writes, “is aimed at ending the NSA’s dragnet surveillance of millions of ordinary Americans and holding accountable the government officials who illegally authorized it.” After January 2009, the newly elected Obama administration will challenge the lawsuit, Jewel v. NSA, on the grounds that to defend itself against the lawsuit, the government would be required to disclose “state secrets” (see Late May, 2006). The government used similar arguments to quash the EFF’s lawsuit against AT&T (see April 28, 2006), arguments which were rejected by a judge (see July 20, 2006). [Electronic Frontier Foundation, 2009] The suit will be dismissed (see January 21, 2010).

Entity Tags: George W. Bush, Alberto R. Gonzales, AT&T, Bush administration (43), David S. Addington, Electronic Frontier Foundation, Obama administration, Richard (“Dick”) Cheney, National Security Agency

Timeline Tags: Civil Liberties

The cover of Mark Klein’s ‘Wiring Up the Big Brother Machine… and Fighting It.’The cover of Mark Klein’s ‘Wiring Up the Big Brother Machine… and Fighting It.’ [Source: BookSurge / aLibris (.com)]Former AT&T technician Mark Klein self-publishes his book, Wiring Up the Big Brother Machine… and Fighting It. In his acknowledgements, Klein writes that he chose to self-publish (through BookSurge, a pay-to-publish venue) because “[t]he big publishers never called me,” and the single small publishing house that offered to publish his book added “an unacceptable requirement to cut core material.” Klein based his book on his experiences as an AT&T engineer at the telecom giant’s San Francisco facility, where he primarily worked with AT&T’s Internet service. In 2002 and 2003, Klein witnessed the construction of of a “secret room,” a facility within the facility that was used by the National Security Agency (NSA) to gather billions of email, telephone, VoIP (voice over Internet Protocol), and text messages, most of which were sent by ordinary Americans. The NSA did its electronic surveillance, Klein writes, secretly and without court warrants. Klein describes himself as “wiring up the Big Brother machine,” and was so concerned about the potential illegality and constitutional violations of the NSA’s actions (with AT&T’s active complicity) that he retained a number of non-classified documents proving the extent of the communications “vacuuming” being done. Klein later used those documents to warn a number of reporters, Congressional members, and judges of what he considered a horrific breach of Americans’ right to privacy. [Klein, 2009, pp. 9-11, 21-24, 33, 35, 38, 40] In 2007, Klein described his job with the firm as “basically to keep the systems going. I worked at AT&T for 22 and a half years. My job was basically to keep the systems going. They were computer systems, network communication systems, Internet equipment, Voice over Internet [Protocol (VoIP)] equipment. I tested circuits long distance across the country. That was my job: to keep the network up.” He explained why he chose to become a “whistleblower:” “Because I remember the last time this happened.… I did my share of anti-war marches when that was an active thing back in the ‘60s, and I remember the violations and traffic transgressions that the government pulled back then for a war that turned out to be wrong, and a lot of innocent people got killed over it. And I’m seeing all this happening again, only worse. When the [NSA] got caught in the ‘70s doing domestic spying, it was a big scandal, and that’s why Congress passed the FISA [Foreign Intelligence Surveillance Act] law, as you know, to supposedly take care of that (see 1978). So I remember all that. And the only way any law is worth anything is if there’s a memory so that people can say: ‘Wait a minute. This happened before.’ And you’ve got to step forward and say: ‘I remember this. This is the same bad thing happening again, and there should be a halt to it.’ And I’m a little bit of that institutional memory in the country; that’s all.” [PBS Frontline, 5/15/2007]

Entity Tags: National Security Agency, AT&T, BookSurge, Mark Klein

Timeline Tags: Civil Liberties

Ordering 

Time period


Email Updates

Receive weekly email updates summarizing what contributors have added to the History Commons database

 
Donate

Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.
Donate Now

Volunteer

If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.
Contact Us

Creative Commons License Except where otherwise noted, the textual content of each timeline is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike