Unplugged: What the End of Metadata Collection Means for Intelligence

leaked_prism_collection_dataflow_slide_about_analyzing_information_harvested_from_private_companies-100383579-orig.gif

The future of the NSA’s bulk metadata collection program is in serious doubt, which raises the questions: how useful is it to the intelligence community, and what will they do if it goes away?

Recently President Obama endorsed a bill to end the government’s practice of sucking up and storing one kind of electronic data such as information about Americans’ telephone calls. The bill, called the Freedom Act, passed the House on Wednesday by a vote of 338 to 88. Meanwhile senators from both parties threatened to filibuster the renewal of the Patriot Act, the law that makes it legal. And one federal court has ruled the practice unlawful.
What would ending bulk collection mean for intelligence collection? Last year, the National Academy of Sciences, or NAS, began looking at what would happen if US spies no longer had easy access to phone records. In January, they issued their findings as Bulk Collection of Signals Intelligence: Technical Options. The 80-page report draws open a curtain on the probable future of electronic spying.

The most important conclusion comes early on: a huge database of the phone records of millions of people is quite valuable to signals intelligence, or SIGINT. “There is no software technique that will fully substitute for bulk collection where it is relied on to answer queries about the past after new targets become known,” the NAS report says.
But the report also suggests that there may be ways to at least partially replace this. “It may be possible to improve targeted collection [as opposed to bulk collection] to the point where it provides a viable substitute for bulk collection in at least some cases, using profiles of potential targets that are compiled from a wide range of information.”

Metadata can be defined, broadly, as all the data that you produce through your exchanges with digital devices. On its most literal level, it’s “a set of data that describes and gives information about other data.” For example, metadata about a phone conversation might include the numbers of the caller and the recipient, where each one was when they began the call, and who they called previously or next—but not an actual recording of the conversation.
The NSA sweeps up vast amounts of these digital identifiers, including information about the activities of millions of

Americans not related to any particular investigation or target, and holds them for up to five years. It does this under the authority of the Foreign Intelligence Surveillance Act (FISA)’s Section 215, which was enacted as part of the USA Patriot Act in 2001.

What does the intelligence community get from all the metadata it collects and stores? The report outlines three broad areas, starting with “contact chaining.” Phone numbers, time logs, and other pieces of metadata can be used to find hidden connections between people: middlemen, hidden contacts, or simply mutual acquaintances. Next is alternate identifier discovery, aka finding digital aliases: names, usernames, and even different communications methods a person uses. Lastly, there is triage, or ranking the urgency of threats.

Spotify for Spies: Replacing A Valuable Tool
Concerns about privacy and civil society aside, the NAS report says (passive aggressively) ending bulk collection would eliminate a unique and valuable tool.
“If the past events are unique or if delay in obtaining results is unacceptable (because of an imminent threat or perhaps because of press coverage or public demand), then the intelligence will not be as complete. So restricting bulk collection will make intelligence less effective, and technology cannot do anything about this; whether the gain in privacy is worth the loss of information is a policy question that the committee does not address,” the authors write.
But the report also explores a partial remedy; a conceptual system that would give analysts access to stored metadata only under certain circumstances and under tightly controlled limits. Think of a streaming music service like Pandora or Spotify that allows you to listen to a song but prevents you from downloading it. In the consumer world, this is called “digital rights management”; in the context of intelligence collection, it’s “usage control.” 

This raises another question: how should analysts figure out what portions of the data to ask for? It’s hard to ask for the “right” puzzle piece if you don’t know what they all look like.
Again, the report offers a partial solution: create a new generation of artificial intelligence agents to assess the relevance of data either in real time or in storage. “More powerful automation could improve the precision, robustness, efficiency, and transparency of the controls, while also reducing the burden of controls on analysts,” the report says.
Such a system would, in theory, prevent unlawful fishing expeditions by limiting the scope, queries, and even personnel able to access to the data. 

Finally, the program would keep a log of all the above so that overseers could make sure that analysts weren’t abusing the system … or absconding with the royal jewels to Hong Kong. 

Now Google vs. NSA
Technically, this problem isn’t substantially different than other AI challenges that have recently occupied the best minds of Silicon Valley. Machines have learned to find YouTube videos featuring cats and to recognize how some queries may indicate a user’s interest in a particular product. Both are Google projects; the latter allows the search giant to send you targeted ads in Gmail without identifying you to advertisers.
Yet this begs another question: when does an algorithm become so smart that it constitutes a human-like threat to privacy?

It depends on the degree to which the program understands the data that it’s collecting. A 2013 article in The Futurist magazine outlines how a supercomputer, under a Defense Advanced Research Project Agency grant, was taught to comprehend the meaning of sentences based on grammar and syntax. It performed at 85% accuracy

What happens to your phone metadata, whether it stays with your phone companies or goes to the NSA data storage center in Utah, is a matter of temporary concern. The future of intelligence collection belongs to the machines. That’s where the debate is headed as well.
DefenseOne: http://bit.ly/1EGAAcz

« Sophos to Raise £100m From Stock Market Float
Silk Road Investigators Charged for Stealing Bitcoin »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Hyve

Hyve

Hyve provide a wide range of managed web hosting services including private, hybrid and public VMware cloud hosting.

Accredia

Accredia

Accredia is the national accreditation body for Italy. The directory of members provides details of organisations offering certification services for ISO 27001.

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS) is a non-profit organization dedicated to the recruitment, retention and advancement of women in the cybersecurity field.

Zamna

Zamna

Zamna (formerly VChain Technology) is an award-winning software company building GDPR compliant identity platforms for the aviation industry.

Blockchain Firm

Blockchain Firm

Blockchain Firm is a leading Blockchain based software solutions and service provider with our roots of expertise running deep into the technology.

SixThirty CYBER

SixThirty CYBER

SixThirty is a venture fund that invests in early-stage enterprise technology companies from around the world building FinTech, InsurTech, and Cybersecurity solutions.

Qualcomm Technologies

Qualcomm Technologies

Qualcomm invents breakthrough technologies that transform how the world connects, computes and communicates.

Vala Secure

Vala Secure

Vala Secure is a cybersecurity and compliance consultancy that always stays ahead of regulations, future threats and ever-changing security environments.

Cyber Security Works (CSW)

Cyber Security Works (CSW)

Cyber Security Works is your organization’s early cybersecurity warning system to help prevent attacks before they happen.

Bugv

Bugv

Bugv is a crowdsourcing cybersecurity platform powered by human intelligence where we connect businesses with cyber security experts, ethical hackers, bug bounty hunters from all around the world.

Babble

Babble

Babble is a Unified Comms, Contact Centre and Cyber Solutions provider. We believe in making next-generation technology simple to use, deploy and manage.

Aeries Technology

Aeries Technology

Aeries is a technology services organization offering capabilities in Technology Services, Digital Transformation, and Business Process Management.

Onwardly

Onwardly

For everyday folks tasked with implementing security and privacy. Do it faster with Onwardly - build, launch and scale your cyber resilience program in 30 minutes per week.

Apollo Secure

Apollo Secure

Apollo is an automated cybersecurity platform for startups and small businesses to achieve and maintain security compliance.

Strobes Security

Strobes Security

Strobes is among the world’s first cybersecurity platforms specifically designed for end-to-end continuous threat exposure management.

Boldend

Boldend

Boldend offers leading-edge offensive and defensive cybersecurity solutions that empower government and commercial organizations to stay resilient in an evolving threat landscape.