Skip to content


NSA Spokesman Accidentally Admits that the Government Is Spying On All Americans



NSA Spokesman Accidentally Admits that the Government Is Spying On All Americans

By WashingtonsBlog
washingtonsblog.com

 

NSA Deputy Director John C. Inglis told Congress last week that the agency conducts “three-hop” analysis.

Three-hop (also known as “three degree”) analysis means:

The government can look at the phone data of a suspected terrorist, plus the data of all of the contacts, then all of those peoples contacts, and all of those peoples contacts.

This means that a lot of people could be caught up in the dragnet:

If the average person calls 40 unique people, three-hop analysis could allow the government to mine the records of 2.5 million Americans when investigating one suspected terrorist.

Given that there are now approximately 875,000 people in the government database of suspected terrorists – including many thousands of Americansevery single American living on U.S. soil could easily be caught up in the dragnet.

For example, 350 million Americans divided by 2.5 million Americans caught up in dragnet for each suspected terrorist, means that a mere 140 potential terrorists could lead to spying on all Americans. There are tens of thousands of Americans listed as suspected terrorists … including just about anyone who protests anything that the government or big banks do.

As the Electronic Frontier Foundation notes:

according to an unusually blunt Senate investigation of so-called fusion centers released last month, the TIDE [i.e. suspected terrorist] database is also full of information of innocent people that have nothing to do with terrorism. The report gave examples of: a TIDE profile of a person whom the FBI had already cleared of any connection to terrorism, a TIDE profile of a two-year old-boy, and even a TIDE profile of Ford Motor Company.

ARS Technica notes:

When the first revelations about the National Security Agencys (NSA) widespread collection of phone call metadata and Internet traffic began to surface, South Carolina Senator Lindsey Graham noted that for those not talking to terrorists on the phone, We dont have anything to worry about. Im glad that activity is going on, but it is limited to tracking people who are suspected to be terrorists and who they may be talking to.

Turns out the data collection is not so limited. In testimony yesterday before the House Judiciary Committee, National Security Agency Deputy Director Chris Inglis said that the NSAs probing of data in search of terrorist activity extended two to three hops away from suspected terrorists. Previously, NSA leaders had said surveillance was limited to only two hops from a suspect.

If you’ve ever played “Six Degrees of Kevin Bacon” or used LinkedIn to try to reach someone professionally, you know how small the world of interconnected contacts can be. When you use big data tools to mine for relationships, the world gets even smaller. That third hop in connections greatly expands the probability of innocent people worldwide being scooped up into the NSAs surveillance machine to include a good-sized share of American citizens”citizens who Senator Graham said “don’t have anything to worry about.”

***

By reading this article, you’re one hop from me”and three hops from [Afghan President] Hamid Karzai.

***

The NSAs systems sort through the data using algorithms to find connections. These can be detected in near real time from Internet data or discovered in the periodic dumps of phone metadata from carriers, building upon the systems knowledge of previous connections. The system narrows the field of potential surveillance targets through a process thats similar to playing the game Six Degrees of Kevin Bacon “only, in this case, its more like Three Degrees of Osama Bin Laden. ***

To determine how many hops you are from Osama, for example, the NSAs data analysis engine software constantly plows through information and builds a model of all the relationships between every phone number on record and every IP address. Other software robots query the graph to discover which nodes “phone numbers, IP addresses and email accounts”fall within three degrees of separation from an established suspect.

If you have a direct relationship with a suspected terrorist or target (youve called them, youve emailed them, youve visited their website) thats a one hop relationship; theres a solid line connecting you to that person in the NSAs relationship graph. If you talk with, e-mail, or visit the Facebook page or website of someone whos got a one-hop relationship, youre two hops away. Add one more person in between in the graph, and youre three hops away.

If you’re within three hops, you may get flagged for analysis, and then you could get extra special attention, such as a secret FISA warrant request to use PRISM for access to your data on cloud providers servers.

Under the NSAs FISA requests, Google, Microsoft, and other Internet services companies can be compelled to hand over relevant data from their servers on any account that falls within the three-hop range and is flagged as belonging to a person of interest. If youve won this lottery, the NSA will get access to your’e-mails on Gmail or Outlook.com as well as your chats and Web-stored contacts, your documents, your synced data from computers and mobile devices, your backups, and anything else that can be handed over”at least, so the documents Snowden leaked imply.

Your raw Internet traffic will get more attention as well. Your IP address will be watched more carefully by deep packet inspection hardware at the NSAs ‘Net taps, and what you do online will get extra scrutiny.

If your behavior is anomalous enough, and if youre a US resident, the NSA will pass the surveillance over to the FBI. Otherwise, your data will be collected and analyzed until its determined that you have nothing to do with the alleged terrorist; how long that process takes (and how long the data is retained after analysis) is unknown.

Unfortunately, it doesnt take much to hit the three-hop jackpot; without knowing it, a large percentage of the world’s population (and the US population) could easily be classified as being in a third degree of separation from a suspected terrorist.

A great deal of research has been done into the interconnectedness of people in the Internet age. Social scientists, mathematicians, and computer scientists have explored the small world phenomenon with studies and experiments for over 50 years, and their findings show that the “small world” keeps getting smaller as technology advances. In 1979, chair and founder of MITs political science department Ithiel de Sola Pool and the University of Michigans Manfred Kochen published a paper titled “Contacts and Influence,” which draws on a decade of research into social networks. De Sola Pool and Kochen posited that in a country the size of the United States, if acquaintanceship were random and the mean acquaintance volume were 1,000, the mean length of minimum chain between pairs of persons would be well under two intermediaries.

In other words, if the average person in the US has contact with and is acquainted with 1,000 others (through brief interactions, such as an’e-mail or a phone call, or through stronger associations), then were at most two hops from anyone else in the US. Ergo, if any one person in the US is one hop from a terrorist, chances are good that you are three hops away.

***

Live in a major metropolitan center in the US and youre bound to be two degrees of separation away from someone in a country thats of interest to the NSA. For example: I have been a regular customer of restaurants owned by Baltimores Karzai family, which is headed by a brother of Afghan President Hamid Karzai”two hops. Im also, according to LinkedIn, two degrees of separation away from President Obama. Am I a good guy or a bad guy?

The Internet has blown the level of interconnectedness though the proverbial roof“we now have’e-mail, social media, and instant message interactions with people well never meet in real life and in places well never go. A 2007 study by Carnegie Mellon University machine learning researcher Jure Leskovec and Microsoft Researchs Eric Horvitz found that the average number of hops between any two arbitrary Microsoft Messenger users, based on interaction, was 6.6. And a study of Twitter feeds published in 2011 found the average degree of separation between random Twitter users to be only 3.43.

So even if the NSA limited its surveillance activities”and by surveillance I mean active probing of the content of communications of an individual”to people within two hops of suspected terrorists, thats a sizable population. Three ratchets it up to hundreds of millions or potentially billions of people, especially when the definition of a hop is based on relationships so casual we could create them by accidentally clicking on a link in a spam’e-mail. So far, we know that there have been about 20,000 requests for FISA warrants to surveil domestic targets since 2001, but if those warrants covered three hops from the suspects at the center of the requests”depending on how tightly or loosely the NSA defines a relationship”three hops could encompass as much as 50 percent of the Internet-using population of the world.

Whats the likelihood that youve managed to fall into that 50 percent? Well, if you live outside the US or ever talk to anyone outside the US, your odds go up. If you have contacts in parts of the world that the US government has interest in as sources of terrorism, it goes up much more. That places people like me (journalists), social activists, academics, and a large chunk of the business world in a zone of high risk for NSA surveillance.

***

You’d be a fool not to at least consider the possibility that the NSA is already reading your’e-mail.

 

View the original article at Washingtons Blog

Related Posts with Thumbnails

Posted in Civil Rights and Privacy, Internet, Police State, Politics, War on terror.

Tagged with academics, Americans, classified, FISA, Internet, IP, NSA, population, surveillance, tracking, United States.

Support #altnews & keep Dark Politricks alive

Any support to keep this site running would be much appreciated! If you see any adverts that interest you then please visit them as it helps me without you even needing to give me any money. A few clicks is all it takes to help keep the servers running and #altnews alive!

Please remember I have written hundreds of articles for this site and I host numerous amounts of material that has been taken offline by their original hosters which would be unavailable for viewing if it wasn't for this site. Therefore I would kindly ask you to help support me so that the site can continue doing what I think is an important job as well as reporting on stories the mainstream media would rather you didn't know about. I personally think it is important to host material such as removed reports that show that even FOX News once repoted on Israeli spy rings following the 9.11 hijackers before September 11th Or publishing the original Liberal Democrats Freedom Bill which was removed from their site once they enacted some watered down rubbish instead once they got into power.

However if you don't want to use the very obvious and cost free ways (to you) to help the site and keep me writing for it then please consider making a small donation, especially if you have a few quid sitting in your PayPal account doing nothing useful!


2 Responses

Stay in touch with the conversation, subscribe to the RSS feed for comments on this post.

  1. David Leppik says

    It’s far worse than the analysis assuming 40 contacts implies. Social relationships are what mathematicians call a “scale-free network,” in which there are a small number of individuals that connect huge numbers of people. For a phone network, think about Pizza Hut, which gets calls from thousands of people. Or think of a political campaign’s robo-dialer, which may call everyone in a whole state. They may not be human, but they count as a “hop.”

  2. lambert326.wikispaces.com says

    In some cases radio has been used to summon help, in others it has simply been a means of
    contact, of sending back scientific and other information which might otherwise be lost if the expedition were to fail.
    A spot is a slot of airtime for a commercial
    ” 15, 30, or 60 seconds worth. This becomes handy during long business hours and in busy festive seasons.



Some HTML is OK

or, reply to this post via trackback.



css.php