The Magazine

Information Please

Only a paranoid solipsist could feel threatened by the calling analysis program.

May 22, 2006, Vol. 11, No. 34 • By HEATHER MAC DONALD
Widget tooltip
Single Page Print Larger Text Smaller Text Alerts

Oh, sorry, it's not 1942. It's 2006, and these three phone giants are about to be excoriated for cooperating with the war on terror. Senate Judiciary Committee chairman Arlen Specter has demanded that ATT, Verizon, and BellSouth testify under oath about their assistance to the National Security Agency's counterterrorism programs; 50 House Democrats are demanding a criminal investigation by special counsel.

Here we go again: another specious privacy scandal. The disclosure by USA Today that these three telecom companies have given the government access to trillions of anonymized domestic calling records has sent Bush administration critics, privacy advocates, and the press into an ecstatic frenzy of denunciation and fear-mongering. This newly energized coalition charges that the White House is trampling citizens' constitutional rights and creating a surveillance state. And the Bush administration has only itself to blame.

Ever since allowing the Pentagon's Total Information Awareness project to go down the tubes in 2003, the administration has failed to explain the potential of data mining, even as it secretly continues to use this vital technology. Thus, at every revelation of a government data mining program, privacy extremists enjoy unchallenged supremacy in characterizing the technology as a massive threat to life as we know it.

Only a paranoid solipsist could feel threatened by the recently revealed calling analysis program. Since late 2001, Verizon, BellSouth, and ATT have connected nearly two trillion calls, according to the Washington Post. The companies gave NSA the incoming and outgoing numbers of those calls, stripped of all identifying information such as name or address. No conversational content was included. The NSA then put its supercharged computers to work analyzing patterns among the four trillion numbers involved in the two trillion calls, to look for clusters that might suggest terrorist connections. Though the details are unknown, they might search for calls to known terrorists, or, more speculatively, try to elicit templates of terror calling behavior from the data.

As a practical matter, no one's privacy is violated by such analysis. Memo to privacy nuts: The computer does not have a clue that you exist; it does not know what it is churning through; your phone number is meaningless to it. The press loves to stress the astounding volume of data that data mining can consume--the Washington Post's lead on May 12 warned that the administration had been "secretly . . . assembling gargantuan databases." But it is precisely the size of that data store that renders the image of individualized snooping so absurd.

True, the government can de-anonymize the data if connections to terror suspects emerge, and it is not known what threshold of proof the government uses to put a name to critical phone numbers. But until that point is reached, your privacy is at greater risk from the Goodyear blimp at a Stones concert than from the NSA's supercomputers churning through trillions of zeros and ones representing disembodied phone numbers.

And even after that point is reached, the notion that 280 million Americans who have not been communicating with al Qaeda are at risk from this quadrillion-bit program is absurd. What exactly are the privacy advocates worried about? That an NSA agent will search the phone records of his ex-wife or of themselves? This quaint scenario completely misunderstands the scale of, and bureaucratic checks on, such data analysis programs.

As a constitutional matter, no one's privacy is violated by such automated analysis of business records.

Senator Dianne Feinstein needs to brush up on her legal doctrine when she decries the program as a "major constitutional confrontation on Fourth Amendment guarantees of unreasonable search and seizure." There is no Fourth Amendment protection for information that you have conveyed to a third party.

Your phone company at the very least--if not a score of marketers--knows your calling history; that history is no longer private, therefore, and the government can obtain your phone records without a judicial warrant. Congress has provided statutory protections for certain kinds of telecommunications information, but those statutes allow telephone companies to share their data with the government for emergencies. After 9/11, a phone executive who didn't believe that the country was in danger of another catastrophic attack was seriously out of touch with reality. And the volume of data requested almost by definition protects the privacy of any individual customer.