The Spybots Among Us

How the NSA tracks terrorists in the United States through the Internet

Other experts are fairly certain the NSA is bending, and perhaps breaking, those legal authorities.

In 1982, investigative journalist James Bamford wrote The Puzzle Palace, an exhaustively documented history of the National Security Agency. Bamford, who until recently was Washington investigative producer for ABC's World News Tonight With Peter Jennings, brought The Puzzle Palace up to date this year with Body of Secrets. He is widely acknowledged as an authority on the NSA.

In an interview from his home in Washington, D.C., Bamford said the Patriot Act dilutes the burden of proof required to show probable cause for targeting a U.S. person and that the NSA is "probably pushing the [internal] guidelines to the limit" to allow the agency to track terrorist suspects throughout the Internet and the World Wide Web.

"It's not easy to penetrate what the NSA is doing, but the climate has changed entirely since Sept. 11. The emphasis is on aggressive pursuit."

The NSA has long had the capability and the motivation to spy on U.S. citizens on the Internet without restriction, Bamford observed. The passage of the Patriot Act gave it the political go-ahead to do that under certain conditions.

"Just as mighty navies once ruled the high seas," Bamford wrote in Body of Secrets, "the [NSA's] goal is to rule cyberspace."

The NSA reportedly intercepts 3 billion messages a day from all the mediums it watches. Modern communications -- and the Internet specifically -- have dramatically changed the nature of national security and intelligence-gathering. The battle for control of the world's information infrastructure has even been given a name: Netwar. Under these new rules of engagement, America's enemies are no longer well-defined, monolithic opponents like the Soviet Union, say experts like John Arquilla, who is an associate professor at the Naval Postgraduate School in Monterey, which trains Navy officers in intelligence techniques and special operations.

Last month, Arquilla gave a talk on Netwar at a meeting of the Council on Foreign Relations in San Francisco. Arquilla defines America's enemies today as loosely organized networks of terrorists, street gangs, international syndicates of criminals, and even anti-World Trade Organization protesters. These anti-hierarchical, leaderless networks tend to operate in the shadows until a trigger moment, Arquilla says, when they suddenly "swarm" a target, such as the World Trade Center towers or the 1999 WTO meeting in downtown Seattle. The Internet enables the underground networks to flourish by providing rapid communication channels, information on how to design weapons, and, most important, an international forum to air grievances and promote political causes.

The NSA is fighting back, Arquilla says, by tracking these enemies with "intelligent software agents" -- bots.

"It is not unreasonable to assume," Arquilla confides, "that the NSA is engaged in clandestine technology intelligence -- ECHELON, Semantic Forests -- there are other names that I am not allowed to tell you. Clandestine technology intelligence allows us to track dark networks; if you go to certain Web sites a bot will follow you. Bots empower human agents."

Simply put, bots are strings of computer code that roam the Internet like fish in the sea, entering people's computers and performing automated tasks on their own. They are everywhere on the Web. Businesses commonly send out bots on the Internet to build customer profiles, search for mentions of the corporate name, or mine Web sites for demographic data to use in market research. Bots can piggyback into your computer every time you visit a Web page, open an e-mail, or download music online. Search engine bots travel the Web, creating indexes for Google and Yahoo!. Once inside a personal computer, bots can, quite legally, connect to the Internet without the computer owner's knowledge, sending out streams of data, including personal financial information sucked out of money-management programs.

In the hands of the NSA, however, bots become a different animal. "[The NSA's] bots are like corporate-marketing and data-mining bots on steroids," Arquilla says.

After cautioning the interviewer that he is "approaching a no-go zone," Arquilla says, "We can use bots to see who is accessing information of dual use to science and terrorism." For example, he says, Web sites that display the human genome can be used to create biological weapons. Spybots inserted into the operating system code at a genome Web server can be instructed to follow any visitor and then report back to the NSA.

Two years ago, the European Parliament issued an investigative report that offered an unprecedented glimpse into the NSA's ECHELON program, which covertly intercepts the world's military, diplomatic, commercial, and civilian communications as they are transmitted through the air or by wire. (ECHELON is a joint effort of the English-speaking countries. The Parliament's investigation was inspired by allegations that the NSA was using those intercepts to give hot tips to American businesses at the expense of their European competitors.) The ECHELON report said the NSA uses custom-designed bots to ferret out information on Web pages, Usenet, and open databases. These spybots are many times more powerful than common search engines, which skim the surface of the Web as they follow a series of hypertext links from one Web page to another.

« Previous Page
Next Page »
My Voice Nation Help
Sort: Newest | Oldest
San Francisco Concert Tickets
©2014 SF Weekly, LP, All rights reserved.