Is There Any Alternative To The NSA's 'Take It All' Approach?

from the intelligent-intelligence-services dept

At the moment, the only half-way serious attempt at justifying the NSA's "take it all" approach to surveillance is to claim that there is no alternative if we want intelligence agencies to spot and stop extreme threats like terrorism:

President Obama and his top advisers have concluded that there is no workable alternative to the bulk collection of huge quantities of "metadata," including records of all telephone calls made inside the United States.
But maybe there are other ways of achieving the same goals, and it's just that the US government is loath to give up the capabilities it has developed to spy on its own citizens and the rest of the world, and so doesn't try too hard to find any. For example, one threat that is often invoked to justify surveillance is that of terrorists causing explosions, potentially with great loss of life. Searching through trillions of pieces of metadata to find clues about bombers before they act really is like looking for the proverbial needle in a haystack -- it's significant that NSA leaders have used this metaphor time and again. Wouldn't it be better to search for signs of the explosives directly, as in this research project, reported by New Scientist?
Bomb-makers or chemists with Breaking Bad crystal-meth labs better watch out. A sewer system full of chemical sensors could sniff out their homemade labs as part of a €4.5 million European Union-funded research programme called Emphasis.

The idea is that once a sewer sensor finds telltale traces of home-brewed explosives, it sounds an alarm and a police team carrying a portable, high-resolution sensing unit can be dispatched to narrow the search and pinpoint the exact location.
This approach would not only be proportionate -- it's tightly focused on the specific threat, not on vague epiphenomena that the threat may produce in the Internet's vast flood of digital data -- it would also be far more effective when fully deployed, since it would allow the actual bomb-making laboratories and materials themselves to be located, not just people who are discussing related matters.

Maybe the NSA's dogged reliance on the haystack approach is impeding the search for more intelligent methods. Instead of varying the selectors, or exploring yet more hops in the hope that terrorists will somehow be revealed in the vast stores of the world's metadata, a better approach would be to develop new ways to spot specific major threats -- whether it is explosives, chemical weapons or radioactive material. If those can be addressed effectively in this way, there will be no need for a "take it all" approach, and we can go back to a system where surveillance is the exception, directed at real suspects, rather than the rule, encompassing us all.

Follow me @glynmoody on Twitter or, and +glynmoody on Google+

Filed Under: collect it all, metadata, nsa, nsa surveillance

Reader Comments

Subscribe: RSS

View by: Time | Thread

  1. identicon
    Jerrymiah, 6 Nov 2013 @ 11:19am

    Is there an alternative to

    First, I'd suggest to throw Gen Alexander in jail along with Feinstein, Pelosi, Rogers, Hayden, Clapper ... and all for the rest of their life (although I don't think that will ever happen). Second enact a law to stopo lobbying once and for all (that's been tries before without luck but let's have a serious look at it). Third, defund the NSA completely and put together a new security system with a major emphasis on the respect of the constitution.

Add Your Comment

Have a Techdirt Account? Sign in now. Want one? Register here

Subscribe to the Techdirt Daily newsletter

Comment Options:

  • Use markdown. Use plain text.
  • Remember name/email/url (set a cookie)

Follow Techdirt
Special Affiliate Offer

Essential Reading
Techdirt Insider Chat
Recent Stories

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it

Email This

This feature is only available to registered users. Register or sign in to use it.