While the announcement that the NSA collected records of "every call placed on the Verizon communications network (and, it appears, every other U.S. phone carrier)", Foreign Policy explains how this "grave violation of privacy" keeps American citizens "safe from terrorism."
We start with a classic scenario. U.S. intelligence officials have captured an al Qaeda operative and obtained the phone number of an al Qaeda fundraiser in Yemen.
You are an analyst for a fictionalized version of the NSA, and you have been authorized to search through metadata in order to expose the fundraiser's network, armed with only a single phone number as a starting point.
The first step is refreshingly simple: You type the fundraiser's phone number into the metadata analysis software and click OK.
In our example data, the result is a list of 79 phone numbers that were involved in an incoming or outgoing call with the fundraiser's phone within the last 30 days. The fundraiser is a covert operator and this phone is dedicated to covert activities, so almost anyone who calls the number is a high-value target right out of the gate.
Using the metadata, we can weight each phone number according to the number of calls it was involved in, the lengths of the calls, the location of the other participant, and the time of day the call was placed. Your NSA training manual claims these qualities help indicate the threat level of each participant. Your workstation renders these data as a graph. Each dot represents a phone number, and the size of the dot is bigger when the number scores higher on the "threat" calculus.
|Governments' Requests for Users' Data on Facebook Increased by 24% in First Half of 2014|
|Edward Snowden May Possibly Be One of Many Leakers|
|Intelligence Gathering Should Never Be a Role for Private Companies|
|Confide: Send Messages that Self-Destruct Once Read|
|How Privacy Vanishes Online|
|"Fossil fuel executives want to get a piece of the clean-energy business."|
|“The release of methane from hydrate may be apocalyptic.”|
|Nerf John Wick|
|"This very internationalism that contributed to the apocalyptic disaster that ended the Bronze Age."|
|“There was not only automation but where the suggestion that humans had any control [...] was absent too.”|
|“One of the major concerns with asteroid mining is, of course, getting to the asteroids.”|
|"Most of what kids currently learn at school will probably be irrelevant by the time they are 40."|
|“You can make spaceships much bigger than anything we’ve seen so far in history.”|
|Top 10 Reasons Men Are Scum|
|Loneliness is Not an Old Friend|
|“That glazed-over look a grandma has at a Vegas slot machine is the same look Facebook chases in its users scrolling the feed.”|
|“The use of AI assistants may dramatically accelerate and broaden what might be looked back on as a global period of cognitive decline.”|