Longform's Picks of the Week

The best stories from around the world.

Every weekend, Longform highlights its favorite international articles of the week. For daily picks of new and classic nonfiction, check out Longform or follow @longform on Twitter. Have an iPad? Download Longform's new app and read all of the latest in-depth stories from dozens of magazines, including Foreign Policy.

Obama's Drone-Master

Reid Cherlin • GQ

An interview with John Brennan, the man behind America's drone strategy.

"I'm going up to Jersey tomorrow, to try to escape." John O. Brennan, President Obama's top counterterrorism advisor and his soon-to-be new CIA director, leans back in his chair. Brennan is a proud son of Hudson County, a baseball player at his Catholic high school, a commuter student at Fordham. It's a common-touch backstory that, a tad predictably, Brennan's fans bring up all the time, and that he himself seems to cling to. He points to a photograph on the wall behind my head, a black and white shot of George H.W. Bush, surrounded by aides.

"The guy walking through the door actually is me, with hair," he says. "That was the first time I went into the Oval Office. I remember almost pinching myself, saying, 'What's a guy from Jersey doing in here? And why does the president really care about what I say?' Now, since then, I've been in the Oval Office I guess hundreds of times, and there are still a lot of times I say to myself, 'What's a guy from Jersey-you know, doing in this?'"

SAUL LOEB/AFP/Getty Images

The Prism

Jill Lepore • The New Yorker

Privacy in an age of publicity.

An extraordinary fuss about eavesdropping started in the spring of 1844, when Giuseppe Mazzini, an Italian exile in London, became convinced that the British government was opening his mail. Mazzini, a revolutionary who'd been thrown in jail in Genoa, imprisoned in Savona, sentenced to death in absentia, and arrested in Paris, was plotting the unification of the kingdoms of Italy and the founding of an Italian republic. He suspected that, in London, he'd been the victim of what he called "post-office espionage": he believed that the Home Secretary, Sir James Graham, had ordered his mail to be opened, at the request of the Austrian Ambassador, who, like many people, feared what Mazzini hoped-that an insurrection in Italy would spark a series of revolutions across Europe. Mazzini knew how to find out: he put poppy seeds, strands of hair, and grains of sand into envelopes, sealed the envelopes with wax, and sent them, by post, to himself. When the letters arrived-still sealed-they contained no poppy seeds, no hair, and no grains of sand. Mazzini then had his friend Thomas Duncombe, a Member of Parliament, submit a petition to the House of Commons. Duncombe wanted to know if Graham really had ordered the opening of Mazzini's mail. Was the British government in the business of prying into people's private correspondence? Graham said the answer to that question was a secret.


Booz Allen, the World's Most Profitable Spy Organization

Drake Bennett and Michael Riley • Businessweek

Inside America's shadow intelligence agency. 

In 1940, a year before the attack on Pearl Harbor, the U.S. Navy began to think about what a war with Germany would look like. The admirals worried in particular about the Kriegsmarine's fleet of U-boats, which were preying on Allied shipping and proving impossible to find, much less sink. Stymied, Secretary of the Navy Frank Knox turned to Booz, Fry, Allen & Hamilton, a consulting firm in Chicago whose best-known clients were Goodyear Tire & Rubber (GT) and Montgomery Ward. The firm had effectively invented management consulting, deploying whiz kids from top schools as analysts and acumen-for-hire to corporate clients. Working with the Navy's own planners, Booz consultants developed a special sensor system that could track the U-boats' brief-burst radio communications and helped design an attack strategy around it. With its aid, the Allies by war's end had sunk or crippled most of the German submarine fleet.


The Price of Loyalty in Syria

Robert F. Worth • The New York Times

A portrait of Bashar al-Assad's Alawite base

The family fled their home on the capital's outskirts to Mezze 86, where they would be surrounded by other Alawites. "We are the ones who are being targeted," Ibtisam told me. "My husband did nothing. He was a retired officer volunteering at a hospital." Now, she said, she could barely afford to rent two cramped rooms with her four children. A dull artillery boom shook the coffee cups on the table where we sat. The men who took me to her, also Alawite, began to reel off their own stories of murdered friends and relatives, and of neighbors abducted by rebels. "You will find stories like this in every house, people killed, people kidnapped, and all because of their sect," one of them said. "They think all Alawites are rich, because we are the same sect as Bashar al-Assad. They think we can talk to the president whenever we like. But look how we are living!"


Comey Don't Play That

Marc Ambinder • Foreign Policy

How Obama's pick to lead the FBI tried to put the brakeson the NSA's surveillance dragnet

It was not until Attorney General John Ashcroft was hospitalized with pancreatitis in early 2004 that his deputy, James Comey, first learned the extent of the Bush administration's surveillance programs. Reluctantly, the White House had agreed to "read him in." What Comey found out -- about both the government's warrantless domestic telephone interceptions and the bulk collection of data processed on American servers -- stunned him. Relying on an extreme interpretation of executive authority, the Bush legal team had established a set of war powers that broke precedent and concentrated power in the White House. Together with Jack Goldsmith, the Justice Department's head of the Office of Legal Counsel, Comey realized these efforts were based on legal opinions that should never have been signed.

Of particular concern was the fact that telecom companies, Internet companies, credit-rating agencies, and the like had been providing the National Security Agency (NSA) with any customer records that the agency asked to see -- who called whom, who bought what, who rented a car where. As many as 50 companies were providing the NSA with un-sifted bulk data on a regular basis without a court order. There was no discrimination at all; Americans and non-Americans alike were swept up by this surveillance dragnet. Faced with a White House request to reauthorize these activities, as Ashcroft had done, Comey balked.

Alex Wong/Getty Images

For daily picks from around the web, check out Longform or download Longform for iPad.



Total Recall

If the NSA's massive spying operation sounds a lot like a Bush-era program ... that's because it is.

A decade ago, a Pentagon research project called "Total Information Awareness" sparked a mass panic because of its seemingly Orwellian interest in categorizing and mining every aspect of our digital lives. It was "the supersnoop's dream," declared William Safire of the New York Times, a "computerized dossier on your private life from commercial sources, [combined with] every piece of information that government has about you...."

If this sounds reminiscent of the current uproar over NSA surveillance, you're paying attention. That's because the NSA monitoring tools are very similar to -- and, in many cases are directly based on -- the technology that Total Information Awareness (TIA) tried to use.

The story of that convergence starts on the morning of Feb. 2, 2002, when retired Admiral John Poindexter drove to the headquarters of the National Security Agency at Ft. Meade, Maryland, and sat down with the agency's deputy director, an NSA veteran named Bill Black. Poindexter, a former White House national security adviser, was now running the TIA program at the Defense Advanced Research Projects Agency, the organization that tackles some of the hardest engineering and technology challenges in the Pentagon. Poindexter thought TIA was an innovative new way to stop terrorist attacks, and he wanted the NSA to help him test it. 

The idea, he explained to Black, was to give U.S. intelligence analysts access to the vast universe of electronic information stored in private databases that might be useful for detecting the next plot. Data such as phone call records, emails, and Internet searches. Poindexter wanted to build what he called a "system of systems" that would access all this raw information, sort and analyze it, and hopefully find indications of terrorist plotting. 

The NSA was the biggest collector of electronic data in the government, and Poindexter thought the NSA would be a natural partner in his endeavor. But what he didn't know was that under secret orders from President George W. Bush, the NSA was already building its own version of Total Information Awareness. Fewer than 100 people at the NSA knew that for the past few months, the agency had been monitoring the phone calls and other electronic communications of Americans, and that it was obtaining copies of domestic phone call records and looking at them for potential clues about terrorist attacks. 

Poindexter left Ft. Meade that day with no firm commitment from Black that the NSA would assist in his research. And TIA didn't last long. Although Poindexter's work wasn't classified, the press soon caught wind of his grand data-mining ambitions, and Poindexter was held up as the poster boy for intrusive government surveillance. "I think it's fair to say that in the country's history there has never been proposed a program with something this far reaching in terms of surveillance capacity," said Sen. Ron Wyden at the time. "And my sense is that the country just does not want to unleash a bunch of virtual bloodhounds to go sniffing into the medical, financial and travel records of law-abiding Americans."

TIA was officially shut down in 2003, and Poindexter left the government. But this wasn't the end of his grand vision.  

In a secret negotiation, members of Congress, some of whom had been among Poindexter's critics, reached an agreement to keep TIA research going, and to fund it from the classified portion of the military budget, the so-called "black budget." TIA's research components were given new cover names, and the program was moved under the control of the very agency that Poindexter had originally wanted to help him -- the NSA. There, Poindexter's ideas were incorporated into NSA's surveillance activities, the latest glimpses of which we have seen in the past two weeks. 

The NSA went on to build its own total information awareness system. What was once an idea in Poindexter's head is now a fully realized global surveillance apparatus, capable of gathering unprecedented amounts of digital information for near real-time analysis, or to be stored for future investigations, perhaps years from now. It is not precisely the system that Poindexter imagined, but what became clear to him looking back, as he explained to me in a series of interviews for my book, The Watchers, was that the NSA was doing many of the things he had proposed all along. Poindexter was demonized for even suggesting that the government get access to vast troves of private information. The NSA now does this routinely, and under the law.  

There are several key respects in which the NSA's system today mirrors that which Poindexter had proposed more than a decade ago. 

Access to many categories of private information

TIA envisioned, as its name suggested, access to the total universe of electronic information that might be useful for investigating terrorists. It placed particular emphasis on phone records, e-mails, Internet searches, travel records, and financial transactions -- because in order to plan attacks, terrorists need to communicate, conduct research, move around, and make purchases. 

This NSA is using the same body of information to investigate terrorists. Under a court order, the NSA obtains copies of all domestic phone call records, as well as records of international calls into and out of the United States. The agency also reportedly taps into undersea cables that carry Internet traffic. Using the PRISM system, it can read emails and see Internet searches, as well as forms of electronic messages that didn't even exist when TIA was proposed, such as Facebook messages. The agency has also obtained credit card receipt transactions and records from Internet service providers. The NSA has teams of analysts that work at the National Counterterrorism Center, where airline travel records are monitored and watch lists are compiled. And soon, the NSA will get to tap into a rich repository of financial information compiled by the Treasury Department that's used for investigating financial crimes and tracking terrorist money flows.  

Use of "virtual" databases

Rather than trying to make copies of private databases and hold them in a government facility, TIA proposed a kind of federated or "virtual" database. The system would effectively reach out and touch the private databases themselves, or systems that were set up attached to them, working with the information at, or close to, the source and siphoning off what it needed for analysis.  

This is what's happening with the NSA's Internet mining tool known as PRISM. The NSA doesn't have "direct access" to company servers, but obtains information on an as-needed basis using a technology that some have described as a drop box: The company deposits the information NSA wants in the box, and NSA takes it. Notably, Google has said that it doesn't use this kind of setup. But the company does comply with lawful orders for information without turning over the entirety of its data or letting the NSA jack into its central servers. The same goes for other companies that have provided information to the NSA, reportedly as many as 50. 

(Lack of) privacy protection  

At the core of TIA was a device, then yet-to-be-invented, that Poindexter called a "privacy appliance." It would strip all data of personally identifying information -- such as names and addresses -- and give each data point a unique, encrypted designation. A TIA analyst would see how pieces of information fit together, but he would need a court order if he wanted to unlock the privacy appliance and see the names associated with that data. 

NSA abandoned this privacy research when it took over Poindexter's programs in 2003, and a privacy appliance as sophisticated as what was hoped for in TIA still doesn't exist. However, the NSA's database of phone call records, known as Mainway, now have some privacy controls, according to intelligence employees who have used the system. The database does not contain any names, nor is the NSA collecting geolocation data that could pinpoint a user on a map, according to administration officials. When an analyst comes upon a phone number associated with a U.S. citizen or legal resident, a black 'X' mark appears over the number, says one former defense intelligence employee. Administration officials have said publicly that the databases only can be queried as part of a terrorism investigation, and that it has been accessed about 300 times last year. 

Much less is known about how PRISM protects the privacy and identities of U.S. persons, whose communications the NSA cannot target without a warrant. Analysts are allowed to target a set of foreign communications -- such as emails -- if PRISM determines with 51 percent confidence that they are indeed foreign. Technically, it is very difficult to determine whether an email was actually sent by a foreigner and not a US person, experts say. And a 51 percent confidence rating is not a high threshold. This practically guarantees that US persons' information is swept up by PRISM. The NSA has not disclosed the procedures it uses to separate that information from the foreigners' data. 

Use of broad searches 

Poindexter believed that in order to find the proverbial "needle in the haystack," analysts needed to be able to look at a lot of haystacks. TIA would cast a wide net searching among mostly innocent and innocuous communications for those that merited further scrutiny. 

NSA attempts to do just that with PRISM. It is meant to filter out potentially meaningful signals from an ocean of noise. Gen. Keith Alexander, the NSA director, has said that in the vast majority of terrorist attacks that the United States was able to stop, this kind of analysis was essential. (With the Mainway database, officials say their searches are more targeted, and are begun based on a specific phone number of a known or suspected terrorist.) 

Reliance on court orders 

Poindexter never envisioned giving the intelligence community unsupervised access to private data. He thought that courts should play a role, because this would legitimize the government's monitoring of private data and provide a check on potential abuse--at least in theory. He pointed to the longstanding practice of issuing intelligence surveillance warrants under the Foreign Intelligence Surveillance Court as a model. 

The NSA has come to rely on that court, which is now issuing broad orders for information that, prior to the 9/11 attacks, would have been unimaginable. The court has sanctioned the copying of all phone records in the United States. It also reviews the government's Internet surveillance methods in an attempt to ensure that they don't unreasonably scoop up Americans' data too. This is far from perfect science. On at least one occasion, the court has found that these procedures were unconstitutional. We still don't know how they were changed to make them legal. 

Amended privacy laws

Poindexter also hoped to ignite a national debate on whether to change privacy laws to reflect both advances in technology and the difficult task of finding an enemy -- such as terrorist networks -- that don't announce their presence.

He got his wish. In 2007 and 2008, after some of the NSA's secret programs were exposed, Congress debated changes to the Foreign Intelligence Surveillance Act. There were many public, heated exchanges. Ultimately, lawmakers voted to give the NSA more authority to search broadly for potential terrorists, and to do so without individualized warrants that name the specific person and place the agency wants to search.  

* * * 

The key question still unanswered is whether any of this surveillance actually prevents terrorist attacks. Poindexter couldn't say for sure that TIA would, though he believed that his early research showed promising signs. Officials now say that the NSA's surveillance activities have helped stop dozens of attacks. If the details of those plots are released, we'll all be able to decide for ourselves. Perhaps then can finally decide whether building Total Information Awareness was a good idea.