cross-referenced news and research resources about
NSA's MAINWAY surveillance database
MAINWAY is a database maintained by the United States' National Security Agency (NSA) containing metadata for hundreds of billions of telephone calls made through the four largest telephone carriers in the United States: At&t, SBC, BellSouth (all three now called AT&T), and Verizon.
The existence of this database and the NSA program that compiled it was unknown to the general public until USA Today broke the story on May 10, 2006. It is estimated that the database contains over 1.9 trillion call-detail records. According to Bloomberg News, the effort began approximately seven months before the September 11, 2001 attacks. As of June 2013, the database stores metadata for at least five years.
The records include detailed call information (caller, receiver, date/time of call, length of call, etc.) for use in traffic analysis and social network analysis, but do not include audio information or transcripts of the content of the phone calls.
The database's existence has prompted fierce objections. It is often viewed as an illegal warrantless search and a violation of the pen register provisions of the Foreign Intelligence Surveillance Act and (in some cases) the Fourth Amendment of the United States Constitution.
August 11, 2016
's response to the Mizo rebellion
was harsh, but it quickly changed tracks and resorted to a successful strategy
of purchase and suasion, in an operation that gave current NSA
Ajit Doval his reputation. Separatism in Punjab was scary, if only ...
Shout Out UK
May 19, 2016
Nonetheless, we may be in the process of the most momentous social happening of the century, far bigger than the scandal around the NSA
, and all because of the machinations of a free press. It is a great honour, and a feather in my cap, to be able to ...
Huffington Post UK
May 6, 2016
The extent of NSA
monitoring revealed by whistle-blower Edward Snowden
showed that democratic and supposedly "free" governments
do already attempt to monitor us.
Foreign Policy (blog)
April 19, 2016
December 14, 2015
"[O]ur national security establishment is still convinced that the main way to defeat extremist groups is US military
intervention, despite the nagging suspicion that it just creates more ungoverned spaces and makes it easier for groups like the ...
Foreign Policy (blog)
December 12, 2015
In particular, our national security establishment is still convinced that the main way to defeat extremist groups is U.S. military
intervention, despite the nagging suspicion that it just creates more ungoverned spaces and makes it easier for groups ...
November 23, 2015
One of the best-known and most controversial examples of this is the practice of the US National Security Agency (NSA
) of grabbing telecommunications metadata
(basically, who called whom when) covering the entire US, which was revealed when Edward ...
Shout Out UK
June 11, 2015
An NSA program
named MAINWAY collects phone communications through major phone companies
. Transcripts and phonetic representations are done automatically by a program named 'Google
Ars Technica (blog)
June 2, 2015
Mainway data is also processed, according to documents leaked by Edward Snowden
, by XKeyscore
, the distributed data analysis system the NSA
built to process "signals intelligence
." Anything from new Mainway data that matches identifiers selected byÃÂ ...
Alaska Dispatch News
May 27, 2015
's freewheeling cyber-universe has grown by leaps and bounds in recent years, and now has more than 80 million users, or about 60 percent of the population.
Christian Science Monitor
May 26, 2015
May 20, 2015
gathering on intelligence gatherers. Watching the watchers. Whatever you want to call it, Transparency Toolkit is doing it.
Cato Institute (blog)
May 14, 2015
First, let's get our facts straight: Private schools
are not the main way better-off people
, or people with high social capital, isolate themselves from poor families.
March 23, 2015
February 11, 2015
"This is the main way to cut through the fog of war
," Lloyd continued, before recommending "all organisations should follow this model for their cyber defences".
February 10, 2015