By Contributor on January 13, 2014

By Marcy Wheeler

One claim the NSA has made just about every time one of its representatives has talked about the phone dragnet is that, because the dragnet contains only phone numbers, analysts don’t know who they’re chaining on. They have to give a number to the FBI, NSA people claim, where they use “additional legal process” to find the identity (more on that later).

And that may be true … up to a point.

But the claim goes far beyond even what the NSA (with an assist from friendly media partners) depicts.

Consider 60 Minutes depiction of of contact chaining (at 2:36).

 

Analyst Stephen Benitez showed us a technique known as “call chaining” used to develop targets for electronic surveillance in a pirate network based in Somalia.

Stephen Benitez: As you see here, I’m only allowed to chain on anything that I’ve been trained on and that I have access to. Add our known pirate. And we chain him out.

John Miller: Chain him out, for the audience, means what?

Stephen Benitez: People he’s been in contact to for those 18 days.

Stephen Benitez: One that stands out to me first would be this one here. He’s communicated with our target 12 times.

Stephen Benitez: Now we’re looking at Target B’s contacts.

John Miller: So he’s talking to three or four known pirates?

Stephen Benitez: Correct. These three here. We have direct connection to both Target A and Target B. So we’ll look at him, too, we’ll chain him out. And you see, he’s in communication with lots of known pirates. He might be the missing link that tells us everything.

John Miller: What happens in this space when a number comes up that’s in Dallas?

Stephen Benitez: So If it does come up, normally, you’ll see it as a protected number– and if you don’t have access to it, you won’t be able to look.

If a terrorist is suspected of having contacts inside the United States, the NSA can query a database that contains the metadata of every phone call made in the U.S. going back five years.

Working solely at the level of identifier, the software alerts him whether the first and second-degree contacts are “known pirates.” Given that the analyst is working on EO 12333 collected data, these targets do not have to have been reviewed for Reasonable Articulable Suspicion that they are pirates. But the system identifies them as such.

And, while this is more subtle, Benitez at least portrays the chaining process to move immediately onto “known Target B,” suggesting he may recognize precisely who that pirate is upon seeing the identifier.

I mocked the 60 Minutes piece for — among other things — showing us EO 12333 contact chaining to allay our concerns about the Section 215 phone dragnet.

But even with Section 215 dragnet, the NSA itself admits analysts might immediately recognize the identity of those they are contact chaining. This passage appears in one of their training programs on the process (see page 20).

So, for example, if you run a BR or PR/TT query on a particular RAS-approved e-mail identifier and it returns information that depicts identifier A, the RAS-approved see, was in direct contact with identifier B and the source of the metadata is BR or PR/TT, then just the fact that identifier A is communicating with identifier B is considered a BR or PR/TT query result.

[snip]

So if you knew that identifier A belonged to Joe and Identifier B belonged to Sam, and the fact of that contact was derived from BR or PR/TT metadata, if you communicate orally or in writing that Joe talked to Sam, even if you don’t include the actual e-mail account or telephone numbers that were used to communicate, this is still a BR or PR/TT query result.

To guard against an analyst immediately telling colleagues who aren’t phone dragnet cleared, the NSA makes it clear she shouldn’t just call them and say Joe and Sam have been chatting.

That risk exists because the analyst “knew that identifier A belonged to Joe and Identifier B belonged to Sam” — she knew who she was chaining off of.

This is not all that surprising. If you work with a phone number or email address enough, you’re going to recognize it as the identity of the person who uses it.

Yet it does suggest analysts get enough context — either through the target identifiers they use to target someone in the first place, or from accessing the content of the communications they chain off of — to “know” the identities of some the people that come up in contact chains.

We would expect them to have this context. It surely makes their analysis better informed.

But given that they do have this context, it is completely misleading for the NSA to claim they don’t know the identity of the people they’re contact chaining.

------

Photo: Rena Schild / Shutterstock.com.

Get more Emptywheel...

6th Circuit: You Can Still Represent Yourself if Solitary Confinement Has Made You Incompetent

Robert Litt and Mike Rogers KNOW Congress Hasn’t Ratified the Phone Dragnet

Implementation of Interim Agreement With Iran Begins January 20, Paving Way for Further Negotiations

Section: 

Add new comment

By submitting this form, you accept the Mollom privacy policy.

More

Argentina has been pushed into a crisis that reveals the might of global debt holders.

I’m at my third American Exchange Legislative Council (ALEC) conference, this time in Dallas, and on my first day,...

By Wendell Berry

Manifesto: The Mad Farmer Liberation Front

Love the quick profit, the annual raise,
vacation with pay. Want more 
of everything ready made. Be afraid 
to know your neighbors and to die.
And you will have a window in your head.
Not even your future will be a mystery 
any more. Your mind will be punched in a card 
and shut away in a little drawer.
When they want you to buy something 
they will call you. When they want you
to die for profit they will let you know. 
So, friends, every day do something
that won’t compute. Love the Lord. 
Love the world. Work for nothing. 
Take all that you have and be poor.
Love someone who does not deserve it. 
Denounce the government and embrace 
the flag. Hope to live in that free 
republic for which it stands. 
Give your approval to all you cannot
understand. Praise ignorance, for what man 
has not encountered he has not destroyed.
Ask the questions that have no answers. 
Invest in the millennium. Plant sequoias.
Say that your main crop is the forest
that you did not plant,
that you will not live to harvest.


Say that the leaves are harvested 
when they have rotted into the mold.
Call that profit. Prophesy such returns.
Put your faith in the two inches of humus 
that will build under the trees
every thousand years.
Listen to carrion—put your ear
close, and hear the faint chattering
of the songs that are to come. 
Expect the end of the world. Laugh. 
Laughter is immeasurable. Be joyful
though you have considered all the facts. 
So long as women do not go cheap 
for power, please women more than men.
Ask yourself: Will this satisfy 
a woman satisfied to bear a child?
Will this disturb the sleep 
of a woman near to giving birth? 
Go with your love to the fields.
Lie easy in the shade. Rest your head 
in her lap. Swear allegiance 
to what is nighest your thoughts.
As soon as the generals and the politicos 
can predict the motions of your mind, 
lose it. Leave it as a sign 
to mark the false trail, the way 
you didn’t go. Be like the fox 
who makes more tracks than necessary, 
some in the wrong direction.
Practice resurrection.

Wendell Berry is a poet, farmer, and environmentalist in Kentucky. This poem, first published in 1973, is reprinted by permission of the author and appears in his “New Collected Poems” (Counterpoint).

Public School Shakedown

Progressive Media Project

Newsletter

Get Breaking News and Alerts!