by Amy Goodman
April 2012
from DemocracyNow Website
NSA Storage and Analyze your Communications.
The chiller plant will keep the suped-up system from overheating.
Part 1National Security Agency Whistleblower William Binney
…on Growing State Surveillance
April 20, 2012
In his first television interview since he resigned from the National Security Agency over its domestic surveillance program, William Binney discusses the NSA’s massive power to spy on Americans and why the FBI raided his home after he became a whistleblower.
Binney was a key source for investigative journalist James Bamford’s recent exposé in Wired Magazine about how the NSA is quietly building the largest spy center in the country in Bluffdale, Utah.
The Utah spy center will contain near-bottomless databases to store all forms of communication collected by the agency, including private emails, cell phone calls, Google searches and other personal data.
Binney served in the NSA for over 30 years, including a time as technical director of the NSA’s World Geopolitical and Military Analysis Reporting Group. Since retiring from the NSA in 2001, he has warned that the NSA’s data-mining program has become so vast that it could “create an Orwellian state.”
Today marks the first time Binney has spoken on national television about NSA surveillance.
Transcript
JUAN GONZALEZ: Today we bring you a Democracy Now! special on the growing domestic surveillance state and the Department of Homeland Security’s efforts to spy on dissident journalists and activists. In a national broadcast exclusive, we’re joined by National Security Agency whistleblower William Binney. He was a key source for James Bamford’s recent [exposé] in Wired Magazine about the NSA – how the NSA is quietly building the largest spy center in the country in Bluffdale, Utah. The Utah spy center will contain nearly bottomless databases to store all forms of communication collected by the agency, including private emails, cell phone calls and Google searches and other personal data.
Binney served in the NSA for over 30 years, including a time as director of the NSA’s World Geopolitical and Military Analysis Reporting Group. Since retiring from the NSA in 2001, he has warned that the agency’s data-mining program has become so vast that it could, quote, “create an Orwellian state.” Today marks the first time Binney has spoken on national television about surveillance by the National Security Agency.
AMY GOODMAN: We’re also joined by two individuals who have been frequent targets of government surveillance: Laura Poitras, the Academy Award-nominated filmmaker, and Jacob Appelbaum, a computer security researcher who has volunteered with WikiLeaks. Poitras is the director of the documentary films My Country, My Country and The Oath. Both Poitras and Appelbaum have been repeatedly detained and interrogated by federal agents when entering the United States. Their laptops, cameras and cell phones have been seized, and presumably their data has been copied.
The Justice Department has also targeted Applebaum’s online communications. In November, a federal judge ordered Twitter to hand over information about his account. In October, the Wall Street Journal revealed the Justice Department had obtained a secret court order to force Google and the internet provider Sonic.net to turn over information about Appelbaum’s email accounts.
William Binney, Laura Poitras and Jacob Appelbaum will be speaking tonight at the Whitney Museum here in New York for a teach-in on surveillance. The three of them join us here in our studio together in a broadcast for the first time. We’re going to begin with William Binney.
You worked for the National Security Agency for more than three decades.
WILLIAM BINNEY: Almost four.
AMY GOODMAN: Almost four decades.
WILLIAM BINNEY: Yeah.
AMY GOODMAN: You, for a time, directed the NSA’s World Geopolitical and Military Analysis Reporting Group. Tell us what you did and then why you left and what happened to you afterwards.
WILLIAM BINNEY: Well, I was the technical director of that group, that basically looked at the world, so we looked at all the technical problems of – in the world, and see how we could solve collection, analysis and reporting on military and geopolitical issues all around the world, every country in the world. So, it was a rather large technical problem to tackle, but it – and one of the largest problems we thought we had was looking at the World Wide Web and all the ballooning and mushrooming communications in the world. And our ability to deal with that was diminishing over time, so I kind of referred to it as our inability to keep up with the rate of change. So, we were falling behind the rate of change.
So we – I had a very small group of people in a lab, and we decided to attack that problem. And we did it by looking at how we could graph the network of communications and all the communications in the world, and then – and then focus in on that graph and use the graph to limit what we wanted to attack. And we basically succeeded at that, but in the process, of course, we scooped up Americans from different places, so we had to protect their identities, according to our laws and privacy rights of U.S. citizens. So, under USSID 18, we built in protections to anonymize their identities, so you couldn’t really tell who you were looking at.
JUAN GONZALEZ: And that’s because the NSA could do surveillance from abroad, but not of U.S. citizens.
WILLIAM BINNEY: Well, and, you see, the World Wide Web routes things all over, so you never really know where U.S. citizens’ communications are going to be routed. So, you – if you were collecting somewhere else on another continent, you could still get U.S. citizens. That’s – see, that was a universal problem. So we devised how to do that and protect U.S. citizens. So – and this was all before 9/11. And we devised how to do that, made that effective and operating. So we were actually prepared to deploy about eight months before 9/11 and actually have a system that would run and manage the – what I call 20 terabytes a minute of activity.
So – but after 9/11, all the wraps came off for NSA, and they decided to – between the White House and NSA and CIA, they decided to eliminate the protections on U.S. citizens and collect on domestically. So they started collecting from a commercial – the one commercial company that I know of that participated provided over 300 – probably, on the average, about 320 million records of communication of a U.S. citizen to a U.S. citizen inside this country.
AMY GOODMAN: What company?
WILLIAM BINNEY: AT&T. It was long-distance communications. So they were providing billing data. At that point, I knew I could not stay, because it was a direct violation of the constitutional rights of everybody in the country. Plus it violated the pen register law and Stored Communications Act, the Electronic Privacy Act, the intelligence acts of 1947 and 1978. I mean, it was just this whole series of – plus all the laws covering federal communications governing telecoms. I mean, all those laws were being violated, including the Constitution. And that was a decision made that wasn’t going to be reversed, so I could not stay there. I had to leave.
JUAN GONZALEZ: And I wanted to get back to, for a moment, when you say that you were developing a way to cope with the fact that the agency was falling behind, just because the sheer volume of the material that they were sweeping up was so great, that it was impossible, at times, to find the important intelligence material.
WILLIAM BINNEY: Yes.
JUAN GONZALEZ: So you, in essence, were creating a program that filtered out the valuable stuff.
WILLIAM BINNEY: Right. That’s right.
JUAN GONZALEZ: What – did it have a name, the program?
WILLIAM BINNEY: Well, it was called Thin Thread. I mean, Thin Thread was our – a test program that we set up to do that. By the way, I viewed it as we never had enough data, OK? We never got enough. It was never enough for us to work at, because I looked at velocity, variety and volume as all positive things. Volume meant you got more about your target. Velocity meant you got it faster. Variety meant you got more aspects. These were all positive things. All we had to do was to devise a way to use and utilize all of those inputs and be able to make sense of them, which is what we did.
JUAN GONZALEZ: And when they didn’t use your system, they – the NSA developed another or attempted to develop another system to do the same?
WILLIAM BINNEY: Well, that one failed. They didn’t produce anything with that one.
AMY GOODMAN: And that one was called?
WILLIAM BINNEY: Trailblazer, yeah.
AMY GOODMAN: Trailblazer, and –
WILLIAM BINNEY: I called it – I called it five-year plan number one. Five-year plan number two was Turbulence. Five-year plan number three is –
AMY GOODMAN: And Trailblazer cost how much money?
WILLIAM BINNEY: That was, I think, in my – my sense, was a little over $4 billion.
AMY GOODMAN: Four billion dollars.
WILLIAM BINNEY: Right.
AMY GOODMAN: But it was scuttled. It was done away with in 2006?
WILLIAM BINNEY: Yes, ’05, I think it was. But yes, that’s right. And we developed our program with $3 million, roughly.
JUAN GONZALEZ: And Trailblazer was largely developed by SAIC, the –
WILLIAM BINNEY: Well, they were contributing contractors, yeah. But they – I think they had the lead – they were the lead contractors in some of contracts, yeah.
AMY GOODMAN: And why did they go with this one, though, ultimately, they did not use it? This is under Michael Hayden at the time?
WILLIAM BINNEY: Yes. Well –
AMY GOODMAN: Under the Bush administration?
WILLIAM BINNEY: Well, I thought – my sense was it was a good employment program. And it was a large budget program. It would spend money, a lot of money, so it would build the budget and –
AMY GOODMAN: Go to a major weapons manufacturer.
WILLIAM BINNEY: Right.
AMY GOODMAN: And heads of the agency, National Security Agency, would go back and forth working at NSA, working at SAIC.
WILLIAM BINNEY: It was – we called it an incestuous relationship, yeah.
AMY GOODMAN: What happened to you after you quit? You quit within a month of the 9/11 attacks.
WILLIAM BINNEY: Thirty-first of October of 2001, yeah.
AMY GOODMAN: And then what happened?
WILLIAM BINNEY: Well, we tried to form out the company to at least help the government to deal with some of the massive data problems they had, like in – even in the FBI, and also Customs and Border Protection and NRO and various other agencies. And every time we went somewhere to try to develop something, why, we got canceled, our contract got canceled, for – basically because, we have heard, anyway, that they were told that certain agencies didn’t want them hiring us, so they didn’t want us working for them, so…
JUAN GONZALEZ: And before you left, in that short period when it became obvious to you the direction that the NSA was going to, did you – when you raised objections or raised concerns, what was the response?
WILLIAM BINNEY: Well, I went directly to the Intelligence Committee, because it was their job to – because, first of all, when that happened, I mean, the people they had to use to set it up – since they used part of the program we developed to set it up, they had to use our people to set it up, initially, because no one else knew the code, and no one else knew how to get it operating. So, when they did that, they came – those people came to me and said, “You know, they’re doing this,” you know, and they told me what they were doing. And so I immediately went to the Intelligence Committee, because they were – the intelligence committees were formed to have oversight over the intelligence community to make sure they didn’t monitor U.S. citizens. This was a fallout of
the Church Committeeback in the ’70s. And the member of the staff that I went to went to Porter Goss, who was chairman of that committee at the time, and he referred her to General Hayden for any further. When it was the job of that committee to do the oversight on all this domestic spying, they weren’t doing it, OK? Basically, the – at the time, according to Dick Cheney’s interview on the 10th anniversary of 9/11, he said the – at that time, only the majority or minority leaders, the HPSCI and the SSCI, were involved in having knowledge about this program, Stellar Wind, which you had talked with Tom Drake about.
AMY GOODMAN: The former NSA –
WILLIAM BINNEY: Right, right.
AMY GOODMAN: – employee who was also a whistleblower.
WILLIAM BINNEY: And that was the program, of course, that Director Mueller reported was the issue that – with the hospital visit with Ashcroft. So –
AMY GOODMAN: And explain that, very briefly, for – to remind people.
WILLIAM BINNEY: Well, the whole program, I guess, had to be reauthorized every 45 days, and they had to have the director of NSA, director of CIA and the attorney general sign an affidavit that they still needed the program and that it was legal. And when Comey and Goldsmith in the DOJ decided that this really was a violation of the Constitution and was illegal, then that issue came up. And that’s what – that’s what got everybody kind of disturbed and ready to – ready, actually, to resign in 2004, early 2004, I believe that was. And as a part of it was coming up for reauthorization, and so Gonzales left the White House, along with one other person I can’t remember, and went to the hospital where Ashcroft was, because he was – had pancreatitis, I believe, and was in the hospital, and Comey was the acting attorney general. And so, at that point, they went to Ashcroft to see if he would overrule Comey, who had denied reauthorization and declared it basically illegal. And so, they tried to get Ashcroft to overrule that and went to the hospital to do that. And Director Mueller, I think, also quickly got to the hospital to help ensure that Ashcroft was not taken advantage of, I guess. So…
AMY GOODMAN: When was your home raided?
WILLIAM BINNEY: Twenty-sixth of July of 2007.
AMY GOODMAN: What happened? Where did you
WILLIAM BINNEY: I should – I should say that it was the morning of the second day after Gonzales’s testimony, the then-Attorney General Gonzales’s testimony, to the Senate Judiciary Committee on the TSP, the – what was called the TSP, which I refer to as a fabricated plan. It was created to cover a number of plans, one of which was Stellar Wind, and the others – which they didn’t want to discuss. And the others were wiretapping.
And so, they picked on the wiretapping ones, because the public would generally say,
“Yes, anybody that was potentially a terrorist, a foreign terrorist, communicating with anybody in the United States, we want you to monitor their communications.”
So that was the acceptable part of it. But it was grouped with Stellar Wind and some other programs, so that they could give cover to it, talk about some programs, say they’re talking about the Terrorist Surveillance Program, but it was basically a group of programs, some of which they did not want to talk about. And he did not testify to that at the – and I believe some of the – Whitehouse and Feingold, I think, were the two who were on the Senate Intelligence Committee that did challenge him at the time, saying he wasn’t being truthful, and that was – he wasn’t being completely honest. So…
AMY GOODMAN: You live where?
WILLIAM BINNEY: I live in Maryland, actually four miles from NSA.
AMY GOODMAN: And what happened?
WILLIAM BINNEY: They came busting in.
AMY GOODMAN: Who’s “they”?
WILLIAM BINNEY: The FBI. About 12 of them, I think, 10 to 12. They came in with the guns drawn, on my house.
AMY GOODMAN: Where were you?
WILLIAM BINNEY: I was in the shower. I was taking a shower, so my son answered the door. And they of course pushed him out of the way at gunpoint and came running upstairs and found me in the shower, and came in and pointed the gun at me while I was, you know –
AMY GOODMAN: Pointed a gun at your head?
WILLIAM BINNEY: Oh, yeah. Yes. Wanted to make sure I saw it and that I was duly intimidated, I guess.
JUAN GONZALEZ: And what did they – what did they do at that point? Did they begin questioning you? Or they just took you to headquarters? Or –
WILLIAM BINNEY: No, no. Yeah, they basically separated us from – I was separated from my family. Took me on the back porch, and they started asking me questions about it. They were basically wanting me to tell them something that would implicate someone in a crime. And so, I told them that I didn’t really know – they wanted to know about certain people, that was – they were the ones that were being raided at the same time, people who – we all signed – those who were raided that day, all of us signed the DOD-IG complaint. We were the ones who filed that complaint.
AMY GOODMAN: The Pentagon –
WILLIAM BINNEY: The Pentagon DOD-IG, against –
AMY GOODMAN: – inspector general complaint.
WILLIAM BINNEY: Against NSA, yes, talking about fraud – basically corruption, fraud, waste and abuse. And then –
AMY GOODMAN: Tom Drake was raided at the same time?
WILLIAM BINNEY: No, he was raided in November of that year. We were just the ones who signed it, were raided.
JUAN GONZALEZ: So, and who were the other people that were raided that same day?
WILLIAM BINNEY: Diane Roark, Kirk Wiebe and Ed Loomis.
AMY GOODMAN: Diane Roark worked for the Senate committee?
WILLIAM BINNEY: Diane was the senior staffer. She had the NSA account on the HPSCI side, on the House side. So she was monitoring. She was doing oversight. She was doing real oversight; the others weren’t. Basically, the others were simply taking what the NSA said verbatim and taking them at their word. So, basically, that was not oversight. But Diane would probe and be prying into what they were saying to find out really clearly what was going on. And –
JUAN GONZALEZ: And ostensibly, they were searching for who was leaking information to the – who had leaked information to the New York Times.
WILLIAM BINNEY: That was the pretext, yes. But I accused them of being sent there by someone outside the FBI. And that – their body language told me that I hit it right on the head. So – and I also – after a while, they were questioning me, and I couldn’t tell them anything, because I didn’t know anything that would implicate any of the four of us, so –
AMY GOODMAN: They were looking for leaks.
WILLIAM BINNEY: Well, that was the pretext, the leak on the – to give the New York Times thing. The real thing – what they were really doing was retribution and intimidation so we didn’t go to the Judiciary Committee in the Senate and tell them, “Well, here’s what Gonzales didn’t tell you, OK.” That was what it was really all about. And also, it was retribution for that DOD-IG complaint, because it was a rather embarrassing report that they gave, so…
JUAN GONZALEZ: And what is it that Gonzales didn’t tell them, in your perspective, in terms of what is happening to our national security surveillance situation?
WILLIAM BINNEY: Well, it was about – it was about Stellar Wind and all of the domestic spying.
AMY GOODMAN: We’re going to break and come back to this conversation. William Binney was the technical director of the National Security Agency, which, by the way, is a number of times larger than the CIA, the National Security Agency’s World Geopolitical and Military Analysis Reporting Group. When we come back, we’ll also speak with a well-known hacker, Jacob Appelbaum, who has volunteered for WikiLeaks – he’s a computer security researcher – and Laura Poitras, whose films, My Country, My Country and The Oath, are well known. She’s been nominated for an Oscar.
This is Democracy Now! Back in a minute.
Part 2Detained in The U.S.
– Filmmaker Laura Poitras Held and Questioned Some 40 Times at U.S. Airports –
April 20, 2012
The Academy Award-nominated filmmaker Laura Poitras discusses how she has been repeatedly detained and questioned by federal agents whenever she enters the United States.
Poitras said the interrogations began after she began working on her documentary, “My Country, My Country,” about post-invasion Iraq. Her most recent film, “The Oath,” was about Yemen and Guantánamo and follows the lives of two past associates of Osama bin Laden.
She estimates she has been detained approximately 40 times and has had her laptop, cell phone and personal belongings repeatedly searched. Tonight she is leading a surveillance teach-in at the Whitney Museum in New York City with our other guests, computer security researcher and government target Jacob Appelbaum and National Security Agency whistleblower William Binney.
Poiras is currently at work on a film about post-9/11 America.
Transcript
AMY GOODMAN: Our guests are William Binney, who was technical director of the NSA’s World Geopolitical and Military Analysis Reporting Group. He worked with the NSA for almost 40 years, National Security Agency. We’re also joined by Laura Poitras, the Oscar-nominated filmmaker, and Jacob Appelbaum, a computer security researcher.
You two have something in common with each other. You – every time you come into the United States by plane, you are stopped, you are searched, you are interrogated. Laura Poitras, tell us about your experience. Your latest one?
LAURA POITRAS: Right. Well, I mean, I’ve been stopped at the border since 2006, since I started working on a series of films looking at U.S. post-9/11. And so, I’ve been – I’ve actually lost count of how many times I’ve been detained at the border, but it’s, I think, around 40 times. And –
AMY GOODMAN: Four-zero.
LAURA POITRAS: Four-zero, right. And on this particular trip, lately they’ve been actually sending someone from the Department of Homeland Security to question me in the departing city, so I was questioned in London about what I was doing. I told them I was a journalist and that, you know, my work is protected, and I wasn’t going to discuss it. And then, on this particular occasion, I landed at Newark Airport, and they – what they do when I’m flying, they do passport control inspection at the gate. So they make everyone who’s deplaning show their passport. And so, that’s how they –
JUAN GONZALEZ: So they don’t even wait for you to get to Immigration.
LAURA POITRAS: No, I don’t get – I don’t get into Immigration. I get the escorted treatment from –
AMY GOODMAN: So they make everyone show the passport, until they get to you.
LAURA POITRAS: Right.
AMY GOODMAN: And then they take you off the plane.
LAURA POITRAS: And then they take me away. And then I’m escorted, first through Immigration. And so, this has been going on – you know, I’ve been through this several times and kind of know how it goes. But what happened on this particular trip, which was very disturbing, so –
AMY GOODMAN: Just a few weeks ago.
LAURA POITRAS: Yeah. So I was met by two agents at Newark. One of them is Agent Wassum. And I – when they met me, I took out my pen and paper to note their names and the time and – because I’ve always taken notes, so I have a record of the questions that I’m asked and how long I’m detained for, what’s the focus of the interrogation, what they are doing to me. And on this occasion, I took out my pen, and I was ordered to put away my pen. And I didn’t, and I continued to take notes. And I was ordered again to put away the pen, and I didn’t. And then he threatened to handcuff me for not putting away my pen. And at that point, I put away my pen and then walked to Immigration and took out my pen again to take notes, was ordered again to put away my pen, and then was taken into secondary screening. And I asked to speak to a supervisor, explained I was a journalist, explained that legal counsel has told me that I should be taking notes of my detention and interrogation. And then I was told that I couldn’t take notes, that I was free to take notes after I was finished being questioned. And then –
JUAN GONZALEZ: Under the theory that what? The pen was a weapon?
LAURA POITRAS: Oh, yeah, that’s right. They said that my pen was a dangerous weapon. So that’s what – that’s Agent Wassum who said that, that my pen was a threat to them. And, you know, I mean, in terms of the context, you have to understand that I’m surrounded by border agents who are all carrying guns, and I’m taking out, you know, a pen that they find threatening. And so, this was, you know, profoundly upsetting. And then I was taken into – I was taken directly into an interrogation room and questioned. I took out my pen again. I was ordered by another agent to put it away. And this went on for quite some time. And I was told during this interrogation – I mean, I’m always asserting my rights as a journalist to not reveal my work, my sources.
AMY GOODMAN: You did a film on Yemen. You did a film on Iraq.
LAURA POITRAS: Yeah, yeah, yeah. And so, this detention started after I finished the first film in 2006, and which was about the occupation of Iraq. And I was told that I was refusing to cooperate with an investigation.
And then he said,
“Well, it wasn’t an investigation; it was questioning,” but that I was refusing to cooperate.
And then I asserted my rights, that actually asserting one’s rights is not refusing to cooperate.
And so, this went on for quite some time. And, I mean, it’s something that’s been happening for a while, and I’ve talked about it publicly, but also have been hesitant to, because I don’t want to jeopardize the work that I do.
AMY GOODMAN: They took your computer? They took –
LAURA POITRAS: Not on this trip, no. In the past, yeah.
AMY GOODMAN: They’ve taken your computer?
LAURA POITRAS: On one occasion, they took my computer.
AMY GOODMAN: They’ve taken your phone?
LAURA POITRAS: Yeah. Yeah, on one occasion. I was actually – it was right after, a few days after they – it was actually maybe a week after Jacob’s computer was detained.
AMY GOODMAN: Democracy Now! contacted the Department of Homeland Security for an explanation of why you were detained and interrogated at the airport on April 5th. We received a reply from Anthony Bucci, the public affairs specialist – that’s B-U-C-C-I – in New York City for U.S. Customs and Borders Protection.
He emailed, quote:
“Due to privacy laws, U.S. Customs and Border Protection is prohibited from discussing specific cases.”
He went on to write, quote:
“Our dual mission is to facilitate travel in the United States while we secure our borders, our people and our visitors from those that would do us harm like terrorists and terrorist weapons, criminals, and contraband.”
He did not answer our additional questions.
LAURA POITRAS: Well, I guess they should add “journalist” to that list.
Part 3“We Don’t Live in a Free Country”
– Jacob Appelbaum on Being Target of Widespread Gov’t Surveillance –
April 20, 2012
We speak with Jacob Appelbaum, a computer researcher who has faced a stream of interrogations and electronic surveillance since he volunteered with the whistleblowing website, WikiLeaks.
He describes being detained more than a dozen times at the airport and interrogated by federal agents who asked about his political views and confiscated his cell phone and laptop.
When asked why he cannot talk about what happened after he was questioned, Appelbaum says,
“Because we don’t live in a free country. And if I did, I guess I could tell you about it.”
A federal judge ordered Twitter to hand over information about Appelbaum’s account.
Meanwhile, he continues to work on the Tor Project, an anonymity network that ensures every person has the right to browse the internet without restriction and the right to speak freely.
Transcript
JUAN GONZALEZ: Jacob, your experiences entering the United States at various times?
JACOB APPELBAUM: Well, after the summer of 2010, my life became a little hectic with regard to flying. I do a lot of traveling, working with the Tor Project. And after the summer of 2010, where I gave a speech at Hackers on Planet Earth in place of Julian Assange, I was targeted by the U.S. government and essentially, until the last four times that I’ve flown, I was detained basically every time. Sometimes men would meet me at the jetway, similarly, with guns.
AMY GOODMAN: Let us play that moment when you went to the HOPE conference.
JACOB APPELBAUM: Oh, dear.
AMY GOODMAN: Hackers on Planet Earth. Julian Assange was supposed to be there. He wasn’t. You stood up. This is the beginning of what you said.
JACOB APPELBAUM: Hello to all my friends and fans in domestic and international surveillance. I’m here today because I believe that we can make a better world.
AMY GOODMAN: And what did you go on to say?
JACOB APPELBAUM: Basically, I went on to talk about how I feel that people like Bill need to come forward to talk about what the U.S. government is doing, so that we can make informed choices as a democracy. And I went on to talk about how WikiLeaks is a part of making that happen. And as long as we have excessive classification and secrecy, that we need a WikiLeaks, and we need to stand in solidarity together, so that people will have the information that they need to understand what’s actually happening in their names.
JUAN GONZALEZ: You mentioned the Tor Project that you work with. What is it?
JACOB APPELBAUM: The Tor Project is an anonymity network, which ensures that each person has the right to read, without restriction, and the right to speak freely, with no exception.
AMY GOODMAN: T-O-R?
JACOB APPELBAUM:
TorProject.org. And the basic idea is that every person in the world has the right to read and the right to speak freely. And using their software, using principles of mutual aid and solidarity – something familiar to Democracy Now! viewers, I imagine – it’s possible for everybody to use this anonymity network, spread out across the planet. It’s a thing that’s useful for resisting so-called lawful interception. So, for example, when Mubarak in Egypt wants to wiretap someone, they only see an activist talking to the Tor network; they don’t see that person connecting to Twitter. And that is something that can be used by everybody everywhere to resist so-called lawful interception.
JUAN GONZALEZ: And you use a program that was actually developed by the U.S. government?
JACOB APPELBAUM: Well, yeah. So, originally, the Tor Project is born from ideas that come from the anonymity community, of which the U.S. military has actually contributed quite heavily to. But since the times of the original onion routing patents, it has become a free software project, where, as far as I know, the U.S. Navy has contributed zero lines of code to it, but certainly lots of good ideas, because they understand, as many other people do, that if everyone has anonymous communication, that means everyone does, and if only special people do, it means that you can tell that those are special people that have special privileges, and you can basically see who they are.
So, for example, the Riseup Collective, which you mentioned earlier on the show, they run a number of tor nodes. And I run some, and many other people do. And as long as you get one good one, you have some of the properties that you need. And this helps people to resist not just so-called lawful interception, but also to resist censorship. So if you can’t see inside of the communications, you can’t selectively discriminate based on the content.
AMY GOODMAN: Just to say that in our news headlines today, we said the FBI has just seized a computer server at the New York facility shared by the internet organization Riseup Networks and May First/People Link. But I want to go back to your experience at the airport. If you could just briefly say – I mean, it’s been dozens and dozens of times that you have –
JACOB APPELBAUM: I don’t fly as much as Laura, and Laura has been at it for a lot longer than I have. But in the period of time since they’ve started detaining me, around a dozen-plus times. I’ve been detained a number of times. The first time I was actually detained by the Immigration and Customs Enforcement, I was put into a special room, where they frisked me, put me up against the wall. One guy cupped me in a particularly uncomfortable way. Another one held my wrists. They took my cell phones. I’m not really actually able to talk about what happened to those next.
AMY GOODMAN: Why?
JACOB APPELBAUM: Because we don’t live in a free country. And if I did, I guess I could tell you about it, right? And they took my laptop, but they gave it back. They were a little surprised it didn’t have a hard drive. I guess that threw them for a loop. And, you know, then they interrogated me, denied me access to a lawyer. And when they did the interrogation, they has a member of the U.S. Army, on American soil. And they refused to let me go. They tried – you know, they tried their usual scare tactics. So they sort of implied that if I didn’t make a deal with them, that I’d be sexually assaulted in prison, you know, which is the thing that they do these days as a method of punitive punishment, and they of course suggested that would happen.
AMY GOODMAN: How did they imply this?
JACOB APPELBAUM: Well, you know, they say, “You know, computer hackers like to think they’re all tough. But really, when it comes down to it, you don’t look like you’re going to do so good in prison.” You know, that kind of stuff.
JUAN GONZALEZ: And what was the main thrust of the questions they were asking you?
JACOB APPELBAUM: Well, they wanted to know about my political views. They wanted to know about my work in any capacity as a journalist, actually, the notion that I could be in some way associated with Julian. They wanted, basically, to know any –
AMY GOODMAN: Julian Assange.
JACOB APPELBAUM: Julian Assange, the one and only. And they wanted – they wanted, essentially, to ask me questions about the Iraq war, the Afghan war, what I thought politically. They didn’t ask me anything about terrorism. They didn’t ask me anything about smuggling or drugs or any of the customs things that you would expect customs to be doing. They didn’t ask me if I had anything to declare about taxes, for example, or about importing things. They did it purely for political reasons and to intimidate me, denied me a lawyer. They gave me water, but refused me a bathroom, to give you an idea about what they were doing.
AMY GOODMAN: What happened to your Twitter account?
JACOB APPELBAUM: Well, the U.S. government, as I learned while I was in Iceland, actually, sent what’s called an administrative subpoena, or a 2703(d) order. And this is, essentially, less than a search warrant, and it asserts that you can get just the metadata and that the third party really doesn’t have a standing to challenge it, although in our case we were very lucky, in that we got to have – Twitter actually did challenge it, which was really wonderful. And we have been fighting this in court.
And without going into too much detail about the current court proceedings, we lost a stay recently, which says that Twitter has to give the data to the government. Twitter did, as I understand it, produce that data, I was told. And that metadata actually paints – you know, metadata and aggregate is content, and it paints a picture. So that’s all the IP addresses I logged in from.
It’s all of the, you know, communications that are about my communications, which is Bill’s specialty, and he can, I’m sure, talk about how dangerous that metadata is.
Part 4Whistleblower:
The NSA is Lying-U.S. Government Has Copies of Most of Your Emails
April 20, 2012
National Security Agency whistleblower William Binney reveals he believes domestic surveillance has become more expansive under President Obama than President George W. Bush.
He estimates the NSA has assembled 20 trillion “transactions” – phone calls, emails and other forms of data – from Americans. This likely includes copies of almost all of the emails sent and received from most people living in the United States.
Binney talks about Section 215 of the USA PATRIOT Act and challenges NSA Director Keith Alexander’s assertion that the NSA is not intercepting information about U.S. citizens.
Transcript
JUAN GONZALEZ: Well, I wanted to ask William Binney about this issue. When it comes to snail mail, the old postal system, it’s very tough for the government to intercept mail, except in times of war, particular situations. When it comes to phone conversations, land phone conversations, you need a warrant to be able to intercept phone conversations. But what about email, and what about the communication now that is really the dominant form that not only Americans, but many people around the world communicate? What are the restrictions on the government in terms of email?
WILLIAM BINNEY: Well, after some of the laws they passed, like the PATRIOT Act and their secret interpretation of Section 215, which is – my view, of course, is same as Tom Drake’s, is that that gives them license to take all the commercially held data about us, which is exceedingly dangerous, because if you take that and put it into forms of graphing, which is building relationships or social networks for everybody, and then you watch it over time, you can build up knowledge about everyone in the country. And having that knowledge then allows them the ability to concoct all kinds of charges, if they want to target you. Like in my case, they fabricated several charges and attempted to indict us on them. Fortunately, we were able to produce evidence that would make them look very silly in court, so they didn’t do it. In fact, it was – I was basically assembling evidence of malicious prosecution, which was a countercharge to them. So…
AMY GOODMAN: Do you believe all emails, the government has copies of, in the United States?
WILLIAM BINNEY: I would think – I believe they have most of them, yes.
AMY GOODMAN: And you’re speaking from a position where you would know, considering your position in the National Security Agency.
WILLIAM BINNEY: Right. All they would have to do is put various
Narusdevices at various points along the network, at choke points or convergent points, where the network converges, and they could basically take down and have copies of most everything on the network.
AMY GOODMAN: Jacob, your email?
JACOB APPELBAUM: Well, I selectively chose to use certain public services, like Sonic.net and Gmail, and I specifically did that so as to serve as a warning to other people. I didn’t use it for anything interesting, never once emailed Julian, for example, from those accounts. But the U.S. government again asserted in those cases, according to the Wall Street Journal, which is one way to find out about what’s going on with you – they asserted that they have the right to all that metadata. And it is possible – on Monday, I had a little interaction with the FBI, where they sort of hinted that maybe there might be a national security letter for one of my email accounts, which is also hosted by Google, specifically because I want to serve as a canary in a coal mine for other people.
AMY GOODMAN: A national security letter – it’s believed the government has given out hundreds of thousands of those.
JACOB APPELBAUM: Yeah.
AMY GOODMAN: I have also written about NSLs. But if you get one, you are not allowed to talk about it, on pain of something like up to five years in prison, even to mention that you were handed a national security letter that said turn something over.
JACOB APPELBAUM: Yeah. That was the case of Nick Merrill, for example, who’s a brave American, who essentially fought and won the NSL that was handed down to him.
AMY GOODMAN: And the librarians of Connecticut –
JACOB APPELBAUM: Yes.
AMY GOODMAN: – who were taking on the USA PATRIOT Act and didn’t want to give information over about patrons in the library that the FBI wanted to get information on.
JACOB APPELBAUM: Right, absolutely. So, an NSL, what’s specifically scary about it is that all that is required is for an FBI agent to assert that they need one, and that’s it. And you don’t have a chance to have judicial review, because you aren’t the one served. Your service provider will be served. And they can’t tell you, so you don’t get your day in court.
AMY GOODMAN: Laura, can you set up this clip that we have?
LAURA POITRAS: Yes, actually, this is what Jake was alluding to. On Monday, there was a panel at the Open Society Institute. And Jake – and there was a deputy general counsel of the FBI who was present, and Jake had the opportunity to question her about national security letters.
JACOB APPELBAUM: Are you including national security letters in your comment about believing that there is judicial oversight with the FBI’s actions?
FBI DEPUTY GENERAL COUNSEL: National security letters and administrative subpoenas have the ability to have judicial oversight, yes.
JACOB APPELBAUM: How many of those actually do have judicial oversight, in percentage?
FBI DEPUTY GENERAL COUNSEL: What do you mean by that? How many have –
JACOB APPELBAUM: I mean, every time you get a national security letter, you have to go to a judge? Or –
FBI DEPUTY GENERAL COUNSEL: No, as you well know, national security letters, just like administrative subpoenas, you don’t have to go to a judge. The statute does allow for the person on whom those are served to seek judicial review. And people have done so.
JACOB APPELBAUM: And in the case of the third parties, such as, say, the 2703(d) orders that were served on my – according to the Wall Street Journal – my Gmail account, my Twitter account, and my internet service provider account, the third parties were prohibited from telling me about it, so how am I supposed to go to a judge, if the third party is gagged from telling me that I’m targeted by you?
FBI DEPUTY GENERAL COUNSEL: There are times when we have to have those things in place. So, at some point, obviously, you became aware. So at some point, the person does become aware. But yes, the statute does allow us to do that. The statute allows us.
AMY GOODMAN: Now, Jacob, explain who she was again.
JACOB APPELBAUM: So, my understanding is that she’s the deputy general counsel of the FBI.
AMY GOODMAN: And the significance of what she has just said?
JACOB APPELBAUM: Essentially, what she says is,
“We are just and righteous because you get judicial review. But there are some cases where you don’t, and we are still just and righteous. And you should trust us, because
COINTELPROwill never happen again.”
That’s what I heard from that. And, in fact, later, someone asked about COINTELPRO and said, “How can we” –
AMY GOODMAN: The counterintelligence program that targeted so many dissidents in the 1970s.
JACOB APPELBAUM: Yeah. Tried to get Martin Luther King Jr. to kill himself, for example. The FBI wrote him a letter and encouraged him to commit suicide. So for her to suggest that it is just and right and that we should always trust them sort of overlooks the historical problems with doing exactly that for any people in a position of power, with no judicial oversight.
JUAN GONZALEZ: William Binney, what about the companies that are approached by the government to participate or facilitate the surveillance? Your sense of the degree of opposition that they’re mounting, if at all? And also, has there been any kind of qualitative change since the Obama administration came in versus what the Bush administration was practicing?
WILLIAM BINNEY: Well, first of all, I don’t think any of them opposed it in any way. I mean, they were approached to saying, “You’ll be patriotic if you support us.” So I think they saluted and said, “Yes, sir,” and supported them, because they were told it was legal, too. And then, of course, they had to be given retroactive immunity for the crimes they were committing. So –
JUAN GONZALEZ: Approved by President Obama.
WILLIAM BINNEY: And President Bush, yeah. It started with Bush, yeah.
JUAN GONZALEZ: And the differences in the administrations?
WILLIAM BINNEY: Actually, I think the surveillance has increased. In fact, I would suggest that they’ve assembled on the order of 20 trillion transactions about U.S. citizens with other U.S. citizens.
AMY GOODMAN: How many?
WILLIAM BINNEY: Twenty trillion.
AMY GOODMAN: And you’re saying that this surveillance has increased? Not only the –
WILLIAM BINNEY: Yes.
AMY GOODMAN: – targeting of whistleblowers, like your colleagues, like people like Tom Drake, who are actually indicted under the Obama administration –
WILLIAM BINNEY: Right.
AMY GOODMAN: – more times – the number of people who have been indicted are more than all presidents combined in the past.
WILLIAM BINNEY: Right. And I think it’s to silence what’s going on. But the point is, the data that’s being assembled is about everybody. And from that data, then they can target anyone they want.
AMY GOODMAN: Bill Binney, talk about Bluffdale, Utah. What is being built there?
WILLIAM BINNEY: Well, a very large storage device, basically, for remote interrogation and remote processing. That’s the way I view that. Because there’s not enough people there to actually work the data there, so it’s being worked somewhere else.
AMY GOODMAN: Where do you get the number 20 trillion?
WILLIAM BINNEY: Just by the numbers of telecoms, it appears to me, from the questions that CNET posed to them in 2006, and they published the names and how – what the responses were. I looked at that and said that anybody that equivocated was participating, and then estimated from that the numbers of transactions. That, by the way, estimate only was involving phone calls and emails. It didn’t involve any queries on the net or any assembles – other – any financial transactions or credit card stuff, if they’re assembling that. I do not know that, OK.
JUAN GONZALEZ: And the original – the original allegations that you made, in terms of the crimes being committed under the Bush administration in terms of the rights of American citizens, could you detail those?
WILLIAM BINNEY: Well, I made that – I reported the crime when I was raided in 2007. And it was that Bush and Cheney and Hayden and Tenet conspired to subvert the Constitution and violate various laws of the – that exist in the statute at the time, and here’s how they did it. And I was reporting this to the FBI on my back porch during the raid. And I went through Stellar Wind and told them what it did and what the information it was using and how they were spying on – or assembling data to be able to spy on any American.
AMY GOODMAN: I want to go to a clip of Congress Member Hank Johnson – he’s the Georgia Democrat – questioning National Security Administration director, General
Keith Alexander, last month, asking him whether the NSA spies on U.S. citizens.
REP. HANK JOHNSON: Does the NSA routinely intercept American citizens’ emails?
GEN. KEITH ALEXANDER: No.
REP. HANK JOHNSON: Does the NSA intercept Americans’ cell phone conversations?
GEN. KEITH ALEXANDER: No.
REP. HANK JOHNSON: Google searches?
GEN. KEITH ALEXANDER: No.
REP. HANK JOHNSON: Text messages?
GEN. KEITH ALEXANDER: No.
REP. HANK JOHNSON: Amazon.com orders?
GEN. KEITH ALEXANDER: No.
REP. HANK JOHNSON: Bank records?
GEN. KEITH ALEXANDER: No.
REP. HANK JOHNSON: What judicial consent is required for NSA to intercept communications and information involving American citizens?
GEN. KEITH ALEXANDER: Within the United States, that would be the FBI lead. If it was a foreign actor in the United States, the FBI would still have the lead and could work that with NSA or other intelligence agencies, as authorized. But to conduct that kind of collection in the United States, it would have to go through a court order, and the court would have to authorize it. We are not authorized to do it, nor do we do it.
AMY GOODMAN: That was General Keith Alexander, the NSA director, being questioned by Democratic Congress Member Hank Johnson. Bill Binney, he’s the head of your agency, of the NSA. Explain what he’s saying – what he’s not saying, as well.
WILLIAM BINNEY: Well, I think it’s – part of it is a term, how you use the term “intercept,” as to whether or not what they’re saying is, “We aren’t actually looking at it, but we have it,” you know, or whether or not they’re actually collecting it and storing it somewhere.
JUAN GONZALEZ: So the mistake of the congressman was not to ask, “Are you collecting information?”
WILLIAM BINNEY: Well, he also said things like, “We don’t collect” – or, “We don’t collect against U.S. citizens unless we have a warrant.” And then, at the same time, he said that we don’t – at the same interview, he said, “We don’t have the capability to collect inside this country.” Well, those are kind of contradictory.
AMY GOODMAN: Is he lying? Is General Keith Alexander lying?
WILLIAM BINNEY: I wouldn’t – you know, the point is how you split the words. I wouldn’t say “lying.” It’s a kind of avoiding the issue.
AMY GOODMAN: Jacob Appelbaum, how does this relate to you? And how powerful is General Keith Alexander?
JACOB APPELBAUM: I was saying to Bill that I think he’s probably the most powerful person in the world, in the sense that –
AMY GOODMAN: More powerful than President Obama?
JACOB APPELBAUM: Well, sure. I mean, if he controls the information that arrives on Obama’s desk, and Obama makes decisions based on the things on his desk, what decisions can he make, if – except the decisions presented to him by the people he trusts? And when the people he trusts are the military, the military makes the decisions, then the civilian government is not actually in power.
AMY GOODMAN: Bill Binney, you’re nodding your head.
WILLIAM BINNEY: Yes. I mean, well, for example, their responsibility is to interpret what they have and report up echelon. So, I mean, that’s the responsibility of all the intelligence agencies. So, they basically filter the information to what they believe is important, which is what they should do, because, you know, they’re occupying – it takes time for leaders to review material to make decisions. So they have to boil it down as best they can. So it’s a function of their processing, but it is important that they do it correctly to make sure the information that gets there is correct and complete as it can.
AMY GOODMAN: Is General Alexander more powerful than President Obama?
WILLIAM BINNEY: In the sense of making – of presenting information for decision making, sure.
JUAN GONZALEZ: And Laura, the impact on journalists, who have to go through what you go – you’ve gone through the last few years, just to be able to report what’s going on with our government? The chilling effect that this has on – maybe not on you, but on many other journalists?
LAURA POITRAS: Sure. I mean, I feel like I can’t talk about the work that I do in my home, in my place of work, on my telephone, and sometimes in my country. So the chilling effect is huge. It’s enormous.
AMY GOODMAN: You keep your computers and telephones away from conversations you’re having in a room?
LAURA POITRAS: Yeah. When we had a meeting with you, remember, we told you – we kicked all your cell phones and all your computers out of the room.
AMY GOODMAN: You un – the wired phone, you unwired.
LAURA POITRAS: Yeah.
AMY GOODMAN: My cell phone, you didn’t allow me to have it in the room. And you made sure there were no computers in the room.
LAURA POITRAS: Right.
AMY GOODMAN: Why?
LAURA POITRAS: Because we wanted – well, we wanted to talk about – because we were bringing – we were bringing William to New York. And –
AMY GOODMAN: We have to leave it there, but we’re going to go online right now at democracynow.org. We’re going to continue this conversation with Bill Binney of the NSA, formerly with NSA; Laura Poitras and Jacob Appelbaum.
Part 5More Secrets on Growing State Surveillance
– Exclusive with NSA Whistleblower and Targeted Hacker –
April 23, 2012
In part two of our national broadcast exclusive on the growing domestic surveillance state, we speak with National Security Agency whistleblower William Binney and two targeted Americans:
- Oscar-nominated filmmaker Laura Poitras
- hacker Jacob Appelbaum, who has volunteered for WikiLeaks and now works with Tor Project, a nonprofit organization that teaches about internet security
Binney left the NSA after the 9/11 attacks over his concerns about the agency’s widespread surveillance of U.S. citizens.
He describes how the FBI later raided his home and held him at gunpoint and notes there is still no effective way of monitoring how and what information the NSA is gathering on U.S. citizens and how that data is being used.
Rush Transcript
AMY GOODMAN: We turn to part two of Democracy Now!’s whistleblowerwilliam”>national broadcast exclusive on the growing domestic surveillance state and the Department of Homeland Security’s efforts to spy on dissident journalists, whistleblowers and activists.
We play more of our interview with National Security Agency whistleblower William Binney. He was a key source for James Bamford’s recent exposé in Wired Magazine about the NSA, how the National Security Agency is quietly building the largest spy center in the country in Bluffdale, Utah. Binney served in the NSA for close to 40 years, including a time as technical director of the NSA’s World Geopolitical and Military Analysis Reporting Group. Since retiring from the NSA in 2001, he has warned the agency’s data-mining program has become so vast it could, quote, “create an Orwellian state.” In 2007, the FBI raided Binney’s house. An agent put a gun to his head. His appearance on Democracy Now! on Friday marked the first time Binney spoke on national television about surveillance by the National Security Agency. He revealed the agency collected vast amounts of data on communications between U.S. citizens.
Juan González and I also interviewed two people who have been frequent targets of government surveillance. Laura Poitras is the Oscar-nominated filmmaker, and Jacob Appelbaum, a computer security researcher who has volunteered with WikiLeaks. Poitras is the director of documentary films, My Country, My Country, about Iraq, and The Oath, about Guantánamo and Yemen. Both Poitras and Appelbaum have been repeatedly detained and interrogated by federal agents when entering the United States. Their laptops, cameras, cell phones have been seized. Presumably, their data has been copied. The Justice Department has also targeted Appelbaum’s online communications.
I started by asking Jacob Appelbaum about his work and how being targeted for surveillance has impacted him.
JACOB APPELBAUM: I work for a nonprofit, and I work for –
AMY GOODMAN: Explain the nonprofit.
JACOB APPELBAUM: The nonprofit is the Tor Project,
TorProject.org. It’s a nonprofit dedicated to creating an anonymity network and the software that powers it. It’s free software for freedom, so that everybody has the right to read and to speak freely. No logins, no payment, nothing. It’s run by volunteers. And I also work at the University of Washington, which technically is a government institution, as a staff research scientist in the Security and Privacy Research Lab.
And how has it changed my work? Well, like Laura, I don’t have important conversations in the United States anymore. I don’t have conversations in bed with my partner anymore. I don’t trust any of my computers for anything at all. And in a sense, one thing that it has done is push me away from the work that I’ve done around the world trying to help pro-democracy activists starting an Arab Spring, for example, because I present a threat, in some cases, to those people. And I have a duty as a human being, essentially, to not create a threat for people. And so, in a sense, the state targeting me makes me less effective in the things they even, in some cases, fund the Tor Project to do, which is to help people to be anonymous online and to fight against censorship and surveillance.
JUAN GONZÁLEZ: I’d like to ask, William Binney, the impact of having devoted your entire working life to an agency – that is, to protecting the national security of the United States – to have that very agency then attempt to turn you into a criminal and to view you as a criminal, the emotional toll on you and your family of what’s happened the last few years?
WILLIAM BINNEY: Well, I guess, first of all, it was a very depressing thing to have happen, that they would turn their – the capabilities that I built for them to do foreign – detection of foreign threats, to have that turned on the people of the United States. That was an extremely depressing thing for me to see happen internally in NSA, that was chartered for foreign intelligence, not domestic intelligence.
And I guess that simply made it more important for me to try to do things to get the government, first of all, to correct its own criminal activity, and I did that by going to the House Intelligence Committees. I also attempted to see Chief Justice Rehnquist to try to address that issue to him, and I also visited the Department of Justice Inspector General’s Office – after Obama came into office, by the way, to no avail. I mean, that was before the 2009 joint IG report on surveillance.
AMY GOODMAN: Which said?
WILLIAM BINNEY: Basically it just said you need to have better and more active monitoring of these surveillance programs. It didn’t say anything else. So that just simply did absolutely nothing, because the oversight that’s given to the intelligence community is virtually nonexistent from Congress. I mean, all – they are totally dependent, because they have no way of really knowing what’s happening inside the agencies that are involved. Unless they had people who would come forward and tell them – like me, for example – they would not know those things.
AMY GOODMAN: Bill Binney, can you compare today’s surveillance to John Poindexter’s Total Information Awareness, who was head of DARPA – and you can explain what that military agency was – the outcry then, forcing ultimately the Bush administration to say, “It is shut down. We’re ending Total Information Awareness”?
WILLIAM BINNEY: Well, here’s how I viewed Poindexter’s efforts. He was actually pushed out as a test, to test the waters in Congress to see how they would be receptive to something they were already doing. In other words, that process of building that information about everybody getting total information was already happening. And they threw Poindexter out with DARPA, which is the base – an advanced research group. They fund advanced research programs, and that was one of the things they were saying they were doing, but it was actually already happening. And the question was, would it be acceptable to Congress, because they were keeping it very closely held in Congress under the – calling it a covert program. So, that makes it – that would make it a process to find out what the reaction would be, if they exposed to Congress what they were already doing.
JUAN GONZÁLEZ: But the NSA is such a huge agency, and there are so many career people in that agency. Your concerns cannot be yours alone. There must be many within the agency who are deeply troubled by what’s going on.
WILLIAM BINNEY: Oh, yeah, I’m sure there are. I mean, I know a number of them that are. But they’re still – they’re so afraid to do anything. I mean, they’ve seen what happened to us. They sent the FBI to us. So they’re afraid of being indicted, prosecuted. And even if you win the case, if you’re indicted, you still lose, because you’ve had to hire a lawyer and all, like Tom did and we did.
AMY GOODMAN: Tom Drake.
WILLIAM BINNEY: Right, Tom Drake. And so, you lose any way you speak of it. When they have unlimited funds to do whatever they want and you don’t, they can indict you on any number of things, like they tried to do with us.
AMY GOODMAN: They didn’t indict you, though.
WILLIAM BINNEY: They drafted an indictment, but they didn’t – they didn’t actually do it, because I found evidence of malicious prosecution. And they dropped it.
AMY GOODMAN: How?
WILLIAM BINNEY: Well, the indictment was drawn up against all of us who were on the IG report, and also Tom Drake, because we all met, plus some others, at the Turf Valley Club, and they had all our emails and all of our data to show that we were doing that. Plus they had the view graphs that we prepared there. And their whole objective there was, how could we incorporate to attack Medicare/Medicaid fraud? And so, what we were doing was preparing a joint teaming paper that would be a kind of a incorporation papers. They called that the “conspiracy paper.”
They called it a conspiracy, and we were conspiring to do something. But they didn’t – they thought they had all the exculpatory evidence, and they didn’t, because there were two other people there that weren’t – that had never had a clearance, and they were going to participate in this, in this development, so they had all the data, too.
And when I found out, because they told our lawyer that they were preparing to indict us on that as a conspiracy, why, I went through and pulled all the data together.
And since Tom had been indicted at that time, and I knew his phone was tapped, so I – by the FBI – I decided I would give him a call and tell him what all the evidence is of malicious prosecution, so that I was speaking to the FBI people, and they would pass the information along to the DOJ, that would say,
“Hey, we know this is malicious prosecution. You had the emails that listed the agenda, what we were going to discuss at the Turf Valley Club. You also had all of the slides that we prepared at the Turf Valley Club. And, oh, by the way, if you need to find out when they were prepared, you go in to click on the file, go down to properties, look in the properties and see the date and time that the file was created, and that’s when we were at the Turf Valley Club. So it was direct evidence of what we were doing there. Plus there were two other people that were there that they didn’t have a grudge against, so they weren’t targeting, and they never talked to them at all about what the meeting was about.”
So I said,
“This is all evidence of malicious prosecution. And you need, Tom, to tell your lawyer about this,” because I was telling the FBI that we’re going to notify all our lawyers what you’re doing.
So, and after that phone call, we never heard about the Turf Valley Club again. That was dead.
AMY GOODMAN: Tom Drake then, though, faced espionage charges.
WILLIAM BINNEY: They created – yeah, they created other charges.
AMY GOODMAN: They said he had aided the enemy, etc. Ultimately, the case went away.
WILLIAM BINNEY: Those were all fabricated charges, yeah.
AMY GOODMAN: William Binney, federal aviation regulators have acknowledged dozens of universities and law enforcement agencies have been given approval to use drones inside the United States. The list includes Department of Homeland Security, Customs and Border Protection, various branches of military, defense contractor Raytheon, drone manufacturer General Atomics, as well as numerous universities, Police departments with drone permits include North Little Rock, Arkansas; Arlington, Texas; Seattle, Washington; Gadsden, Alabama; and Ogden, Utah.
WILLIAM BINNEY: Well, that’s simply another step in the assembly of information. This is the visual part of the electronic information they’re collecting about people. So here’s your visual part. I mean, you could collect on phone – the cell phones as you move around, and then you can watch them now with a drone.
AMY GOODMAN: And it’s not just the NSA who can gather phone information.
WILLIAM BINNEY: No, this –
AMY GOODMAN: Police departments now.
WILLIAM BINNEY: Right. Actually, I think it’s shared, because if you – if you go back and look at Director Mueller’s testimony on the 30th of March to the Senate Judiciary Committee, he responded to a question when he was asked the question of “How would you prevent a future Fort Hood?”
He responded by saying that
“We have gotten together with the DOD and have created this technology database.”
He called it a “technology database.” Utah will be included in that, I’m sure. And –
AMY GOODMAN: Meaning Bluffdale.
WILLIAM BINNEY: Yeah, right.
AMY GOODMAN: Where they’re building this massive data center.
WILLIAM BINNEY: Its storage, yeah. And he said,
“From this technology base, with one query, we can get all past and all future emails. So we only have to make one query to get it.”
That means he gets a target, puts the target in, goes into the base, pulls all past ones, and as they come in, then he gets all future ones. So, that says they’re sharing it across the legal – with the legal authorities, so…
JUAN GONZÁLEZ: But then also having these private defense contractors and universities, I mean, you’re talking about a potential in terms of – not only of people gathering information, but of malicious use of that information by –
WILLIAM BINNEY: Yeah, you want to see if your wife is cheating on you? OK, you could do that, yes. That’s right. There’s a – that’s the hazard of assembling all this kind of data. It’s not just the government misusing it, but it’s also people working in it, looking at it, and using it in different ways. They have no effective way of monitoring how people are using that information. They don’t.
AMY GOODMAN: You can get information under the Freedom of Information Act about your FBI files, but can you get information about what the NSA has on you? And explain the difference between the CIA and the NSA. I think a lot of people don’t even realize there’s this far larger intelligence agency in the United States than the CIA.
WILLIAM BINNEY: Yeah, it’s about three to four times as large, yeah. The difference is that the primary focus of CIA is supposed to be human intelligence, a human espionage, you know, like spies, recruiting sources around the world, and so on, whereas NSA’s responsibility is electronic intercept and electronic – analysis of electronic communications, to form intelligence from what they’re either saying or how they’re acting, to assess threat. And CIA is to take the people input side, the human input side. That’s their charter, anyway, so… But they also do some of their own intelligence gathering, that there’s kind of some overlap there, which is, I guess, a part of their charter also. I’ve not really looked at the CIA charter that much. But so – but I do know they do some of that. But they’re primarily focused on human intelligence.
JUAN GONZÁLEZ: And has there been any historic conflict or competition between the NSA and the CIA, as you often have seen that –
WILLIAM BINNEY: Yes.
JUAN GONZÁLEZ: – more recently with the FBI and the CIA?
WILLIAM BINNEY: It’s not – it’s not historical. It’s continuous. It is a continuous competition. It’s – the barrier for sharing, the way I would put it, is they’re hesitant to share knowledge and information, because then that’s sharing power, and you no longer control that kind of input to higher authorities for decision making. So when they do that, that’s like releasing knowledge and releasing their power to others. And that’s a barrier for them.
AMY GOODMAN: Jacob Appelbaum, I asked you before how people can protect themselves. I remember you mentioned, when they took your computer, the authorities at the border, there wasn’t a hard drive in it. Explain what people can do.
JACOB APPELBAUM: Well, I think one thing that is important is to know that if you’re being targeted, these people, they’re, you know, in the weapons industry. It turns out that they also have the ability to break into computers. So, if you’re being targeted, you have to take a lot of precautions. For example, there’s a bootable CD called “Tails,” and the idea is you run Linux, and all your traffic routes over Tor, so you don’t have something like Adobe Flash trying to update itself, and then the NSA or someone else gets to perform what’s called a “man in the middle” attack. Instead of using Gmail, using something like Riseup. I mean, after their server was just seized, I think kicking them some cash is probably a good thing. They provide mutual aid for people all around the world to have emails that are not just given up automatically, or even with a court battle. They try to encrypt it so they can’t give things up. So people can make choices where their privacy is respected, but also they can make technical choices, like using Tor, to ensure, for example, that when data is gathered, it’s encrypted and it’s worthless. And I think that’s important to do, even though it’s not perfect. I mean, there is no perfection in this. But perfection is the enemy of “good enough.”
AMY GOODMAN: How do you download Tor, T-O-R?
JACOB APPELBAUM: You go to TorProject.org, https://www.torproject.org. And the “S” is for “secure,” for some value of “secure.” And you download a copy of it, and it’s a web browser, for example. And the program, all put together, double-click it, run it, you’re good to go.
AMY GOODMAN: You can even Skype on it?
JACOB APPELBAUM: You – I would really recommend using something like Jitsi instead of Skype. Every time you use proprietary software –
AMY GOODMAN: “Jitsi” is spelled…?
JACOB APPELBAUM: J-I-T-S-I. So, every time you use proprietary software, you have to ask yourself, “Why is this provided to me for free?” And now that Microsoft is involved with Skype, the question is: Doesn’t Microsoft have some sort of government leaning on them, say the U.S. government, to give them so-called lawful interception capabilities? And of course the answer is going to be yes, right? If you log into Skype on a computer you’ve never used before, you get all your chat history. Well, why is that? Well, that’s because Skype has it. And if Skype can give it to you, they can give it to the Feds. And they will. And everybody that has that ability will. Some will fight it, like Twitter. But in the end, if the state asserts it has the right to get your data, sometimes without you even knowing that that’s happening, they’re going to get it, if they can get it.
So we have to solve these privacy problems with mathematics, because it’s pretty hard to solve math problems with a gun or threat of violence, right? No amount of violence is going to solve a math problem. And despite the fact that the NSA has got a lot of people working on those math problems, you know, podunk cops in Seattle, for example, they’re not going to be able to do that, and the NSA is not going to help them. Now, they may have surveillance capability. They may have IMSI catchers. They might have automatic license plate readers. They have an incredible surveillance state. They’re still not the NSA.
And even if they are sharing information, what we want to do is make whatever information they would share worthless, especially if it’s encrypted. So if your browsing is going over Tor, at least if someone is watching your home internet connection, they don’t see that you’re looking at Democracy Now!’s website. They don’t see that you’re checking your Riseup email. They see that you’re talking to the Tor network. And there’s a lot of value in that, especially because your geographic location is hidden. So when you log into Gmail – let’s say you still use Gmail – but you don’t want Gmail to have a log of every place you’ve been, you use Tor, and Gmail sees Tor, and anyone watching you sees Tor. And that’s really useful, because it means that they don’t get your home address, they don’t know when you’re at work. You make the metadata worthless, essentially, for people that are surveilling you.
JUAN GONZÁLEZ: I think you may have just gotten a lot of customers for Tor, for Project Tor.
AMY GOODMAN: When your computer or phones are taken at the airport, do you use them again?
JACOB APPELBAUM: I never had my phones returned to me, and I can’t talk about that. And my computer, I had – I mean, I can’t remember where I put it, so, I mean, the government back door that’s probably in it is hopefully in safety somewhere.
AMY GOODMAN: The New York Times blog says,
“Companies that make many of the most popular smartphone apps for Apple and Android devices – Twitter, Foursquare and Instagram among them – routinely gather the information in personal address books on the phone and in some cases store it on their own computers. The practice came under scrutiny Wednesday by members of Congress who saw news reports that taking such data was an ‘industry best practice.'”
Jacob Appelbaum?
JACOB APPELBAUM: Sounds like a data Valdez waiting to happen.
AMY GOODMAN: What gives you hope, William Binney? You worked in a top-secret agency for close to 40 years. You quit soon after 9/11 because you saw that the agency was spying on the American people, and you had helped develop the program that allowed this to happen.
WILLIAM BINNEY: Well, the only thing that gives me hope is programs like this or Wired articles that Jim Bamford would write about this activity, to get the word out so that people can be aware of what’s happening, so in a democracy we can stand forward and vote, in some way, as to what we want our government to do or not to do, and what kind of information we want them to have or not have.
JUAN GONZÁLEZ: And are there any members in Congress that you see waging a good fight around this issue?
WILLIAM BINNEY: Well, Senators Wydall sic and Udall are, so – Wyden and Udall, they are. And there are others. They’re just not speaking up. Of course, the problem is, you see, they can’t tell you what their concern, because –
LAURA POITRAS: Well, why? Why can’t they tell you? I mean, what would be the repercussions if you’re in Congress?
WILLIAM BINNEY: Well, because what happens when – if they did, for example, they would lose their clearance immediately and be off the committees.
AMY GOODMAN: Talk about the Gang of Eight, what they know, who they are.
WILLIAM BINNEY: Well, according to Cheney, it originally started with a Gang of Four. And then, after the 2004 objections in the DOJ, then it expanded to the Gang of Eight. The Gang of Four initially was the majority and minority leader of the Intelligence – House Intelligence Committee and the Senate Intelligence Committee, the HPSCI and SSCI. Then, after the – and that, on the House side, that was Chairman Goss and Nancy Pelosi, initially, in 2001. I don’t remember the other two on the Senate side. And then it expanded in 2004, it expanded to the Gang of Eight, which added – on top of those four, it added the senior – the majority and minority leaders of the House and the majority and minority leaders of the Senate.
AMY GOODMAN: So, Jacob Appelbaum, Laura Poitras, your response to what these civilian elected leaders know?
LAURA POITRAS: Well, it’s shameful. I mean, I don’t know how they’re going to explain it to their grandkids, right? I mean, I think this whole post-9/11 era is – it’s indefensible, right? I mean – and so, if the risk is losing one’s clearance, is that really a risk? I mean, or I don’t know. It seems to me that if you have that kind of information, you have an obligation to come forward with it, because it’s illegal. And they’ve been saying that. I mean, they’ve – you know, Wyden and Udall have been saying that this is illegal or that this is secret interpretation that the American public doesn’t know about, and I think that they should come forward, because I –
WILLIAM BINNEY: Well, yeah, more importantly, it’s a violation of the constitutional rights of every American citizen. And that’s a violation that they took an oath to defend against.
JACOB APPELBAUM: I think that it’s –
AMY GOODMAN: Jacob Appelbaum?
JACOB APPELBAUM: You know, Cindy Cohn at the EFF is fighting the good fight.
AMY GOODMAN: Electronic Frontier Foundation?
JACOB APPELBAUM: Yeah, the Electronic Frontier Foundation is like the legal version of Riseup, in my mind, you know? They’re really amazing. And they’re fighting these cases, such as NSA v. Jewel. And I think that it is incredibly important basically to point out – and when we want to talk about Congress for a second, I mean, the judiciary has some –
AMY GOODMAN: We have 30 seconds.
JACOB APPELBAUM: They have some power, but what really – what really matters is that Congress needs to have people like Bill. They need to have people who actually understand the technology questioning people like General Alexander, not people who are bamboozled and fooled by the word “email” or the word “network.” And that’s what we need to do is we need to have people that know speak to the people that don’t know. And that is Congress.
AMY GOODMAN: Jacob Appelbaum is a computer security researcher. He works with the TorProject.org. That’s T-O-R Project-dot-org. William Binney directed the NSA’s World Geopolitical and Military Analysis Reporting Group. That’s the National Security Administration. He worked there for close to 40 years. And Laura Poitras is the Oscar-nominated filmmaker, her films, My Country, My Country and The Oath. This was part two of our broad discussion on the surveillance state. We began it on Friday.
You can go to our website at democracynow.org to see the full discussion or read the transcript or listen.
This includes the complete contents of private emails, cell phone calls and Google searches, as well as all sorts of personal data trails – parking receipts, travel itineraries, bookstore purchases and other digital “pocket litter.”
“The NSA has constantly denied that they’re doing things, and then it turns out they are doing these things,” Bamford says in response to NSA Director General Keith Alexander’s denial yesterday that U.S. citizens’ phone calls and emails are being intercepted.
“A few years ago, President Bush said before camera that the United States is not eavesdropping on anybody without a warrant, and then it turns out that we had this exposure to all the warrantless eavesdropping in the New York Times article. And so, you have this constant denial and parsing of words.”
Transcript
NERMEEN SHAIKH: A new exposé in Wired Magazine has revealed new details about how the National Security Agency is quietly building the largest spy center in the country in Bluffdale, Utah, as part of a secret NSA surveillance program codenamed “Stellar Wind.”
According to investigative reporter James Bamford, the NSA has established listening posts throughout the nation to collect and sift through billions of email messages and phone calls, whether they originate within the country or overseas.
The Utah spy center will contain near-bottomless databases to store all forms of communication collected by the agency.
This includes the complete contents of private emails, cell phone calls and Google searches, as well as all sorts of personal data trails – parking receipts, travel itineraries, bookstore purchases and other digital “pocket litter.”
AMY GOODMAN: In addition, the NSA has also created a supercomputer of almost unimaginable speed to look for patterns and unscramble codes.
James Bamford writes the secret surveillance program,
“is, in some measure, the realization of the ‘total information awareness’ program created during the first term of the Bush administration,”
…but later killed by Congress in 2003 due to privacy concerns and public outcry.
James Bamford joins us now from London, England. His article in Wired is called “
The NSA Is Building the Country’s Biggest Spy Center – Watch What You Say.”
Jim Bamford is an investigative journalist who’s been covering the National Security Agency for the last three decades.
He came close to standing trial after revealing the NSA’s operations in an explosive 1982 book called The Puzzle Palace. His latest book is the last in his trilogy on the NSA; it’s called The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America.
James Bamford, welcome to Democracy Now! Your piece is so dramatic.
I was wondering if you might read the first few paragraphs as we begin.
JAMES BAMFORD: I’ll give it a try.
“The spring air in the small, sand-dusted town has a soft haze to it, and clumps of green-gray sagebrush rustle in the breeze. Bluffdale sits in a bowl-shaped valley in the shadow of Utah’s Wasatch Range to the east and the Oquirrh Mountains to the west. It’s the heart of Mormon country, where religious pioneers first arrived more than 160 years ago.
They came to escape the rest of the world, to understand the mysterious words sent down from their god as revealed on buried golden plates, and to practice what has become known as ‘the principle,’ marriage to multiple wives.
“Today Bluffdale is home to one of the nation’s largest sects of polygamists, the Apostolic United Brethren, with upwards of 9,000 members. The brethren’s complex includes a chapel, a school, a sports field, and an archive. Membership has doubled since 1978 – and the number of plural marriages has tripled – so the sect has recently been looking for ways to purchase more land and expand throughout the town.
“But new pioneers have quietly begun moving into the area, secretive outsiders who say little and keep to themselves. Like the pious polygamists, they are focused on deciphering cryptic messages that only they have the power to understand.
Just off Beef Hollow Road, less than a mile from brethren headquarters, thousands of hard-hatted construction workers in sweat-soaked T-shirts are laying the groundwork for the newcomers’ own temple and archive, a massive complex so large that it necessitated expanding the town’s boundaries.
Once built, it will be more than five times the size of the US Capitol.
“Rather than Bibles, prophets, and worshippers, this temple will be filled with servers, computer intelligence experts, and armed guards. And instead of listening for words flowing down from heaven, these newcomers will be secretly capturing, storing, and analyzing vast quantities of words and images hurtling through the world’s telecommunications networks.
In the little town of Bluffdale, Big Love and Big Brother have become uneasy neighbors.”
AMY GOODMAN: And those are the opening words of Jim Bamford’s piece, “The NSA Is Building the Country’s Biggest Spy Center – Watch What You Say.” So, James Bamford, it’s good to have you on, albeit from Britain right now.
But talk further about what you have found and what the capacity of this data center, as they call it, seemingly so innocuous, is.
JAMES BAMFORD: Well, it’s going to be a million square feet. That’s gigantic. There’s only one data center in the country that’s larger, and it’s only slightly larger than that. And it’s going to cost $2 billion. It’s being built in this area on a military base outside of Salt Lake City in Bluffdale. As I said, they had to actually extend the boundary of the town so it would fit into it.
And the whole purpose of this is the centerpiece of this massive eavesdropping complex, this network that was created after 9/11. During the ’90s, the NSA had a disastrous decade, following the Cold War.
They missed the first World Trade Center bombing. They missed the attack on the USS Cole. They missed the attack on the U.S. embassies in East Africa. And finally, they missed
So NSA wanted to pretty much recreate itself as this massive eavesdropping organization that was, during the Cold War, focused on the Soviet Union, primarily, and to some degree, the Eastern Europe and China and Cuba, communist countries, and today it’s focused on anybody that could use a piece of communication, because the terrorists that they’re eventually after use the same kind of communications that everybody else does.
So it has to focus on the worldwide network of communications, the same network that all of us use.
So you have this massive agency that’s collecting a tremendous amount of information every day by satellites, by tapping into undersea cables, by picking up microwave links and tapping of cell phones and data links on your computer, email links, and so forth.
And then it has to store it someplace, and that’s why they built Bluffdale. And then that acts as, in essence, like a cloud, a digital cloud, so that agency employees, analysts from around the country at NSA headquarters and their listening posts in different parts of the U.S. – in Georgia, Texas, Hawaii and Colorado – can all access that information held in Bluffdale in that data center.
And that’s pretty much a summary of what that data center is all about.
NERMEEN SHAIKH: James Bamford, can you explain also for – you know, I think most people are more familiar with the work of the CIA or the FBI or other intelligence agencies. The National – the NSA is the most secretive.
So can you say a little about what the work they do, how that’s different from what the other agencies do?
JAMES BAMFORD:Sure.The NSAis much different from
the CIA. First of all, it’s aboutthree times the size. It costs far more. It’s tremendously more secret than the CIA. And what it does is very different.
It’s focused on eavesdropping, on tapping into major communications links, on listening to what people around the world and, to some degree, in the United States say on telephones, email, communications. That’s really the high point of intelligence these days. Human intelligence is what the CIA does. It goes out and recruits spies, or it blows people up with drones.
So, the actual collection – and human intelligence hasn’t really been very good historically. Most the intelligence that the U.S. gathers comes from NSA, is from tapping into communications. So that’s a very big difference between the two.
And NSA is really the most powerful intelligence agency, not only in the U.S., but in the world today.
NERMEEN SHAIKH: One of the things that you also mention, one of the key – key functions that this new facility will undertake is – has to do with the Advanced Encryption Standard.
Can you say a little about that and why it’s important?
JAMES BAMFORD: Well, yeah, the other purpose, in addition to storing material, is it’s a – it plays a major role in the codebreaking aspects of NSA. NSA has several missions.
One of them is intercepting communications. The other is breaking codes, because a lot of that information is encrypted. And the third function of NSA is making codes for the U.S., encrypting U.S. communications. So Bluffdale will play a major role in the breaking of codes because, for breaking codes, you really need two key ingredients.
One is a very large – a place where you can store a very large amount of material, because the more material you have, when you’re going through it, using computers to go through it, what you’re looking for is patterns.
And the more material that you have – the more data, the more telephone calls, the more email, the more encrypted data that you have – the more patterns that you’re likely to discover.
And the second thing you need is a very, very powerful computer, a very fast computer that can go through enormous amounts of information very fast looking for those patterns.
And so, the NSA is now also building a very secret facility down in Tennessee at Oak Ridge, where during World War II the U.S., in great secrecy, developed the atomic bomb as part of the Manhattan Project. So now, instead of an atomic bomb, you have a massive computer that the NSA is working on to be the fastest computer in the world, with speeds that are just beyond most people’s comprehensions.
And the reason for that is because they have to use these computers to do what they call “brute force” – in other words, take this data and just go through it as fast as possible just to look for these key patterns.
AMY GOODMAN: We’re talking to James Bamford, investigative reporter who’s covered the National Security Agency for more than three decades.
His piece in Wired Magazine, that we’re going to continue with after break, is called “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say).”
He’s speaking to us from Britain. This is Democracy Now! We’ll be back with Jim Bamford in a minute, and we will also be joined later by Thomas Drake.
If there was a trial, Jim Bamford might have testified at the trial of Thomas Drake, an NSA whistleblower. Stay with us.
[break]
NERMEEN SHAIKH:Yesterday, Democratic Congressman Hank Johnson of Georgia questioned NSA director and CYBERCOM commander, General
Keith Alexander, about reports that the NSA is intercepting U.S. citizens’ phone calls and emails.
Johnson specifically refers to your article, Jim Bamford. Let’s go to that clip.
REP. HANK JOHNSON: General, a article in Wired Magazine reported this month that a whistleblower, formerly employed by the NSA, has stated NSA signals intercepts include, quote, “eavesdropping on domestic phone calls” and “inspection of domestic emails,” end-quote.
Is that true?
GEN. KEITH ALEXANDER: No, not in that context. The question that – or, I think what he’s trying to raise is, are we gathering all the information on the United States? No, that is not correct.
REP. HANK JOHNSON: The author of the Wired Magazine article’s name is James Bashford [sic]. He writes that NSA has software that, quote,
“searches US sources for target addresses, locations, countries, and phone numbers, as well as watch-listed names, keywords, and phrases in email. Any communication that arouses suspicion, especially those to or from the million or so people on agency watch lists, are automatically copied or recorded and then transmitted to the NSA.”
Is this true?
GEN. KEITH ALEXANDER: No, it’s not.
NERMEEN SHAIKH: That was NSA director, General Keith Alexander, being questioned by Georgia Congressman Hank Johnson. James Bamford, your response?
JAMES BAMFORD: Well, you know, the NSA has constantly denied that they’re doing things, and then it turns out they are doing these things.
They denied they were doing domestic eavesdropping back in the ’70s, and it turned out they had
Operation MINARET, and they’ve been reading every single telegram coming in or going out of the country for 30 years at that point, and also eavesdropping on antiwar veterans.
That came out during the Church Committee report.
More recently, a few years ago, President Bush said before camera that the United States is not eavesdropping on anybody without a warrant, and then it turns out that we had this exposure to all the warrantless eavesdropping in the New York Times article.
And so, you have this constant denial and parsing of words in terms of what he’s saying.
So, what I would like to do – I quote from a number of people in the article that are whistleblowers. They worked at NSA. They worked there many years. One of my key whistleblowers was the senior technical person on the largest eavesdropping operation in NSA.
He was a very senior NSA official. He was in charge of basically automating the entire world eavesdropping network for NSA. So – and one of the other people is a intercept operator that was actually listening to these calls, listening to journalists calling from overseas and talking to their wives and having intimate conversations. And she tells about how these people were having these conversations, and she felt very guilty listening to them.
These people came forward and said, you know, this shouldn’t be happening. Bill Binney, the senior official I interviewed, had been with NSA for 40 years almost, and he left, saying that what they’re doing is unconstitutional.
What I’d like to see is, why don’t we have a panel, for the first time in history, of some of these people and have them before Congress, sitting there telling their story to Congress, instead of to me, and then have NSA respond to them?
I mean, this is the American public who we’re talking about whose phone calls we’re talking about, so – and email and data searches and all that.
So I think it’s about time that the Congress get involved, instead of asking questions from a newspaper or from a magazine article, and start actually questioning these people on the record in terms of what they’re doing and how they’re doing it and to whom they’re doing it – you know, to whom they’re doing it.
AMY GOODMAN: We’re talking to James Bamford, longtime reporter on intelligence activities in this country, has been doing it for more than 30 years, been covering the National Security Agency, a top-secret agency far bigger than the CIA. Jim Bamford, you referred to some of your whistleblowers.
And in 2008, I spoke with retired Army Sergeant Adrienne Kinne here on Democracy Now!, who revealed she was personally ordered to eavesdrop on Americans working for news organizations and NGOs in Iraq. Take a listen.
ADRIENNE KINNE: After 9/11, when we were mobilized and given this new mission, it was very – starting something from the bottom up, and it was really striking that in intercepting all these satellite phone communications, the majority of the traffic was not Arabic.
It was languages beyond our translation capabilities. We would get Chinese, Japanese, Tagalog, Tadzhik, a lot of Dari, Persian, Pashto, some minimal Arabic, but really not that much. And so, we would just go through this process of going through and identifying who belonged to what.
And as we began to identify different phone numbers which belong to these humanitarian aid organizations and journalists, we actually had the capability to block those phone numbers from being intercepted, but due to guidance given to our officer in charge, we did not do that.
AMY GOODMAN: That was a retired Army Sergeant Adrienne Kinne, who was here in the United States eavesdropping on the Palestine Hotel, which was later bombed.
She said she saw a piece of paper that showed that the Palestine Hotel was going to be bombed and went to her superiors and said,
“You’re bombing the hotel where I am listening to the people inside, and I can tell you that they are journalists.”
Jim Bamford, you quote Adrienne in your piece, as well, in your piece in Wired Magazine called “The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say).”
Jim?
JAMES BAMFORD: Yes, I first interviewed Adrienne for my book, The Shadow Factory, a number of years ago.
And she’s extremely credible. And these are people, just like Bill Binney, that aren’t speaking to me confidentially; they’re speaking to me on the record, and they’re risking jail, basically, to tell the country what’s going on.
So these people have a great deal of courage and a great deal of credibility, and that’s why I think that the NSA owes them and owes the country a duty to come out and say what they’re doing.
I mean, this is a democracy, as your program often says, and I think the public should really have at least a fair insight into what the government is doing with their communications.
NERMEEN SHAIKH: One of the most extraordinary things about the eavesdropping program is the number of languages that people are – at the NSA are eavesdropping on.
Can you say a little about what kind of linguistic ability the people who are listening in have?
JAMES BAMFORD: Well, the NSA was always very hurting for linguistic capabilities, especially in the lead-up to 9/11, so they had very few people that spoke [Pashto] or Dari, the languages in Afghanistan.
They had very much an insufficient number of people who spoke Arabic. And Adrienne Kinne was telling me how they had an instructor down in Georgia, where she was working for NSA, trying to teach rudimentary [Pashto], I think it was, to some of the people, but they – it was very hard for them to pick it up.
So, there’s 7,000 languages in the world. And NSA is – that’s one of the very difficult things NSA has. It’s trying to understand what people are saying. Picking up the information, intercepting it, is far less difficult than understanding what they’re saying.
AMY GOODMAN:In response to your article, Jim Bamford, Forbes Magazine published a piece yesterday by Loren Thompson of the Lexington Institute called “
NSA’s Secret Data Center Is a Threat, But Only to America’s Enemies.”
The author writes, quote,
“The real reason the intelligence community needs big cryptological and analytic complexes is that modern information technology has empowered hostile states and extremists of every stripe, giving them unprecedented access to the sources of American strength while enabling them to thoroughly obscure the authors and content of their communications.”
James Bamford, your comment?
JAMES BAMFORD: Well, listen, I mean, we’ve – I wrote another book called A Pretext for War about how we got into the Iraq War. And I’ve been hearing this fear mongering, fear mongering, fear mongering forever.
We’re spending enormous amounts of money on NSA to pick up communications. And even though they lost all these – they had all these failures during the 1990s, you know, failure after failure – the World Trade Center One and World Trade Center Two, the attack on the Cole, the East African embassies bombings – and even after they started all this rebuilding and more and more money, they still missed the person flying over on the Christmas Day flight to Detroit with a bomb in his underwear.
They missed the person in Times Square. So, you know, all this eavesdropping we’re doing and all this money we’re spending, I don’t see an awful lot of value coming out of that.
But I do hear tremendous amounts of fear mongering, that sort of nonstop fear mongering from the people that are pushing this agenda.
NERMEEN SHAIKH: One of the things that you’ve raised in the past has to do with the way in which the NSA worked with the telecommunications industry here in the U.S. to eavesdrop on American citizens. But they apparently outsourced the eavesdropping – I mean, the relationship between the NSA and the telecommunications companies, to a third party.
Can you say a little bit about who that third party was, who those companies were, and where they were based?
JAMES BAMFORD:Yeah, the – two of the companies that were heavily involved, one of themwas Narus. It was a company that has been since bought by Boeing. It was a company formed in Israel by Israelis, and then it ran its company from California.
But the NSA – or, I guess it was AT&T that basically hired them. And they – or NSA, maybe the two of them working together.
But the bottom line was, Narus provided the equipment that NSA was using in the AT&T facilities. AT&T had this big switch in San Francisco. And it would be using this Narus equipment that would take the information from the wires coming in, the cables coming in, and then route it to NSA, the information that NSA wanted. So it used this company called Narus.
And again, it’s a company that had been formed overseas, and you really have to start wondering when you have companies that were formed in foreign countries, and they’re giving such intimate access to U.S. telecommunications, especially very secret U.S. work.
The other company was Verint, and they do a lot of the monitoring for Verizon. And Verint also was formed in Israel by Israelis. And it turns out that the chairman and founder of the company ended up being a fugitive now from the United States, wanted on multiple counts of fraud and theft and so forth.
He’s hiding out in Namibia in Africa now. And then two other members of the general counsel and another senior executive from the parent company, Comverse, was also arrested and charged in the theft and pleaded guilty.
So you have the problem of – these companies that are actually doing the very sensitive work of monitoring everybody’s communications, you have real questions about them, let alone the people that the NSA is targeting.
AMY GOODMAN: Jim Bamford, you have been writing about the NSA for decades. It’s interesting speaking to you in London.
We usually speak to you in the United States. You’re sitting right along the Thames, across the river from MI6, from British intelligence agencies, as we speak.
But as you unveiled this story in Wired Magazine about this small place or obscure, until now, place, Bluffdale, Utah, right near the Four Corners where, you know, Colorado and New Mexico, Utah and Arizona hit on the map there in the Southwest of the United States, I can’t help but think about how you came close to standing trial in 1982 for your book on the NSA, The Puzzle Palace, revealing what was going on with the NSA.
Are you at all concerned about what it means to reveal this information?
JAMES BAMFORD: Well, as you mentioned, I’ve been doing it for 30 years, so I’ve had concerns about that from time to time.
In 1982, as you mentioned, I didn’t come close to trial, because they never – I was never arrested or prosecuted or anything, but I was threatened twice by the Justice Department to return documents that they said were classified. But these were documents that had been released to me by the attorney general under the Carter administration, Attorney General Civiletti.
And so, I never returned the documents, because they were unclassified when they were given to me. And what the Reagan administration did was reclassify them as top secret and then order that I give them back. But we found a passage in the executive order on secrecy that said once a document has been declassified, it can’t be reclassified.
So then Reagan changed the executive order to say that it could be reclassified, but that couldn’t apply to my case because of the principle of ex post facto. So that was fairly dramatic, where they were threatening me during the writing of The Puzzle Palace.
But, you know, ironically, the second book I had on NSA after that, Body of Secrets, they had a book signing for me at NSA. And I interviewed, you know, the director in his office and had tours of the agency and all that other – everything else.
But then, when I discovered that NSA was doing all this illegal warrantless eavesdropping, I wrote the third book, which was The Shadow Factory, showing how NSA got involved in all this illegal activity after they had basically given it up for many years, ever since the Foreign Intelligence Surveillance Court was created in – around 1978.
So, you know, I’ve had sort of a love-hate relationship with NSA over the years.
But I – so, sometimes I’ll compliment them if they do something good, and other times I’ll criticize them, as I do in this article, for things that I don’t think they’re doing very good.
NERMEEN SHAIKH:James Bamford, can you say what your response is to the way in which
the Obama administrationhas dealt with this issue, as against how
the Bush administrationdid, what differences there are, if any?
JAMES BAMFORD:Well, I haven’t seen a lot of differences. President Obama, for example, when all the furor broke out over the warrantless eavesdropping during the Bush administration, came out and said that he was totally against that, he was going to vote against changing the law to allow that kind of thing and also to vote against giving immunity to the telecom companies.
The telecom companies could have been charged with a crime for violating everybody’s privacy. But then, when he – when push came to shove and it came time to vote, he didn’t.
He voted opposite to what he said, and he voted for the legislation, sort of creating this warrantless eavesdropping change to the law that he was – said he was previously against, which basically legalized what the Bush administration had been doing in their warrantless eavesdropping.
And he also voted against – or he voted in favor of giving immunity to the telecom companies, which is again opposite of what he said previously.
And now he’s, you know, the president here last three years, while they’ve been building this enormous – or at least completing this enormous infrastructure, and they hadn’t even started this when he became president, the large data center in Bluffdale. So I don’t really see an awful lot of difference between the two in terms of what’s going on with NSA.
If anything, it’s gotten much larger under Obama than it was under Bush.
AMY GOODMAN: James Bamford, we’re going to ask you to stay with us – he’s speaking to us from London, investigative reporter who wrote The Puzzle Palace, Shadow Factory, now a piece in Wired called “The NSA Is Building the Country’s Biggest Spy Center – Watch What You Say” – because we’re going to be joined by two whistleblowers.
One of them, if he had stood trial, Thomas Drake, who worked at the NSA, possibly Jim Bamford would have testified at that trial. We’ll also be joined by Jesselyn Radack, who took on the Justice Department, particularly around the case of John Walker Lindh, who is still in prison.
This is Democracy Now!, democracynow.org, The War and Peace Report. We’ll be back in less than a minute.