A> or more often loose their baggageor moreew days before the start of the confirmation hearings for General Michael Hayden, who has been nominated by President Bush to be the head of the C.I.A., I spoke to an official of the National Security Agency who recently retired. The official joined the N.S.A. in the mid-nineteen-seventies, soon after contentious congressional hearings that redefined the relationship between national security and the publicâ€™s right to privacy. The hearings, which revealed that, among other abuses, the N.S.A. had illegally intercepted telegrams to and from the United States, led to the passage of the 1978 Foreign Intelligence Surveillance Act, or FISA, to protect citizens from unlawful surveillance. â€œWhen I first came in, I heard from all my elders that â€˜weâ€™ll never be able to collect intelligence again,â€™â€ the former official said. â€œTheyâ€™d whine, â€˜Why do we have to report to oversight committees?â€™ â€ But, over the next few years, he told me, the agency did find a way to operate within the law. â€œWe built a system that protected national security and left people able to go home at night without worrying whether what they did that day was appropriate or legal.â€
After the attacks of September 11, 2001, it was clear that the intelligence community needed to get more aggressive and improve its performance. The Administration, deciding on a quick fix, returned to the tactic that got intelligence agencies in trouble thirty years ago: intercepting large numbers of electronic communications made by Americans. The N.S.A.â€™s carefully constructed rules were set aside.
Last December, the Times reported that the N.S.A. was listening in on calls between people in the United States and people in other countries, and a few weeks ago USA Today reported that the agency was collecting information on millions of private domestic calls. A security consultant working with a major telecommunications carrier told me that his client set up a top-secret high-speed circuit between its main computer complex and Quantico, Virginia, the site of a government-intelligence computer center. This link provided direct access to the carrierâ€™s network coreâ€”the critical area of its system, where all its data are stored. â€œWhat the companies are doing is worse than turning over records,â€ the consultant said. â€œTheyâ€™re providing total access to all the data.â€
â€œThis is not about getting a cardboard box of monthly phone bills in alphabetical order,â€ a former senior intelligence official said. The Administrationâ€™s goal after September 11th was to find suspected terrorists and target them for capture or, in some cases, air strikes. â€œThe N.S.A. is getting real-time actionable intelligence,â€ the former official said.
The N.S.A. also programmed computers to map the connections between telephone numbers in the United States and suspect numbers abroad, sometimes focussing on a geographic area, rather than on a specific personâ€”for example, a region of Pakistan. Such calls often triggered a process, known as â€œchaining,â€ in which subsequent calls to and from the American number were monitored and linked. The way it worked, one high-level Bush Administration intelligence official told me, was for the agency â€œto take the first number out to two, three, or more levels of separation, and see if one of them comes backâ€â€”if, say, someone down the chain was also calling the original, suspect number. As the chain grew longer, more and more Americans inevitably were drawn in.
FISA requires the government to get a warrant from a special court if it wants to eavesdrop on calls made or received by Americans. (It is generally legal for the government to wiretap a call if it is purely foreign.) The legal implications of chaining are less clear. Two people who worked on the N.S.A. call-tracking program told me they believed that, in its early stages, it did not violate the law. â€œWe were not listening to an individualâ€™s conversation,â€ a defense contractor said. â€œWe were gathering data on the incidence of calls made to and from his phone by people associated with him and others.â€ Similarly, the Administration intelligence official said that no warrant was needed, because â€œthereâ€™s no personal identifier involved, other than the metadata from a call being placed.â€
But the point, obviously, was to identify terrorists. â€œAfter you hit something, you have to figure out what to do with it,â€ the Administration intelligence official told me. The next step, theoretically, could have been to get a suspectâ€™s name and go to the FISA court for a warrant to listen in.
One problem, however, was the volume and the ambiguity of the data that had already been generated. (â€œThereâ€™s too many calls and not enough judges in the world,â€ the former senior intelligence official said.) The agency would also have had to reveal how far it had gone, and how many Americans were involved. And there was a risk that the court could shut down the program.
Instead, the N.S.A. began, in some cases, to eavesdrop on callers (often using computers to listen for key words) or to investigate them using traditional police methods. A government consultant told me that tens of thousands of Americans had had their calls monitored in one way or the other. â€œIn the old days, you needed probable cause to listen in,â€ the consultant explained. â€œBut you could not listen in to generate probable cause. What theyâ€™re doing is a violation of the spirit of the law.â€ One C.I.A. officer told me that the Administration, by not approaching the FISA court early on, had made it much harder to go to the court later.
The Administration intelligence official acknowledged that the implications of the program had not been fully thought out. â€œThereâ€™s a lot that needs to be looked at,â€ he said. â€œWe are in a technology age. We need to tweak FISA, and we need to reconsider how we handle privacy issues.â€
Marc Rotenberg, the executive director of the Electronic Privacy Information Center, believes that if the White House had gone to Congress after September 11th and asked for the necessary changes in FISA â€œit would have got them.â€ He told me, â€œThe N.S.A. had a lot of latitude under FISA to get the data it needed. I think the White House purposefully ignored the law, because the President did not want to do the monitoring under FISA. There is a strong commitment inside the intelligence community to obey the law, and the community is getting dragged into the mud on this.â€
General Hayden, who as the head of the N.S.A. supervised the intercept program, is seen by many as a competent professional who was too quick to follow orders without asking enough questions. As one senior congressional staff aide said, â€œThe concern is that the Administration says, â€˜Weâ€™re going to do this,â€™ and he does itâ€”even if he knows better.â€ Former Democratic Senator Bob Kerrey, who was a member of the 9/11 Commission, had a harsher assessment. Kerrey criticized Hayden for his suggestion, after the Times exposÃ©, that the N.S.A.â€™s wiretap program could have prevented the attacks of 9/11. â€œThatâ€™s patently false and an indication that heâ€™s willing to politicize intelligence and use false information to help the President,â€
Haydenâ€™s public confirmation hearing last week before the Senate Intelligence Committee was unlike the tough-minded House and Senate investigations of three decades ago, and added little to what is known about the wiretap program. One unexamined issue was the effectiveness of the N.S.A. program. â€œThe vast majority of what we did with the intelligence was ill-focussed and not productive,â€ a Pentagon consultant told me. â€œItâ€™s intelligence in real time, but you have to know where youâ€™re looking and what youâ€™re after.â€
On May 11th, President Bush, responding to the USA Today story, said, â€œIf Al Qaeda or their associates are making calls into the United States, or out of the United States, we want to know what they are saying.â€ That is valid, and a well-conceived, properly supervised intercept program would be an important asset. â€œNobody disputes the value of the tool,â€ the former senior intelligence official told me. â€œItâ€™s the unresolved tension between the operators saying, â€˜Hereâ€™s what we can build,â€™ and the legal people saying, â€˜Just because you can build it doesnâ€™t mean you can use it.â€™ â€ Itâ€™s a tension that the President and his advisers have not even begun to come to terms with.