NSA: Can they hear us now?
Of course, the buzz inside the Beltway is USA Today's big scoop Thursday about the country's big telecoms handing over all their call data so the National Security Agency can put it in a big database and mine it.
Slate.com's Today's Papers has a round-up of the brouhaha that the whole story generated. CNet has a FAQ on this story.
Here at Federal Computer Week, as we assess how to spend our time and energies, we decided not to do a story even though this is clearly a government technology story.
There are a few reasons. First, everybody else is covering this, so what are you going to get from us that you are not getting from, according to Google News, 1,685 other places?
We have done quite a few stories on data mining itself, of course.
GAO: Federal data mining not obeying privacy rules [FCW.com, Aug. 29, 2005]
Federal agencies are not adequately protecting citizens' privacy when they query databases containing personal information, according to a Government Accountability Office report.
Pentagon builds a database to recruit teens for military [Federal Computer Week, July 11, 2005]
Privacy advocates say the program is a 'bad idea'
The end of the beginning [Federal Computer Week, Dec. 5, 2005]
The technology available for strengthening homeland security may very well be turning a corner in terms of scope and sophistication. That's what a number of other experts in the field believe.
President's statement
After September the 11th, I vowed to the American people that our government would do everything within the law to protect them against another terrorist attack. As part of this effort, I authorized the National Security Agency to intercept the international communications of people with known links to al Qaeda and related terrorist organizations. In other words, if al Qaeda or their associates are making calls into the United States or out of the United States, we want to know what they're saying.
Today there are new claims about other ways we are tracking down al Qaeda to prevent attacks on America. I want to make some important points about what the government is doing and what the government is not doing.
First, our international activities strictly target al Qaeda and their known affiliates.
Al Qaeda is our enemy, and we want to know their plans. Second, the government does not listen to domestic phone calls without court approval.
collecting
Third, the intelligence activities I authorized are lawful and have been briefed to appropriate members of Congress, both Republican and Democrat. Fourth, the privacy of ordinary Americans is fiercely protected in all our activities.
We're not mining or trolling through the personal lives of millions of innocent Americans. Our efforts are focused on links to al Qaeda and their known affiliates. So far we've been very successful in preventing another attack on our soil.
As a general matter, every time sensitive intelligence is leaked, it hurts our ability to defeat this enemy. Our most important job is to protect the American people from another attack, and we will do so within the laws of our country.