I was out of the country only nine days, hardly a blink in time, but time enough, as it happened, for another small, airless room to be added to the American national security labyrinth. On March 22nd, Attorney General Eric Holder and Director of National Intelligence James Clapper, Jr. signed off on new guidelines allowing the National Counterterrorism Center (NCTC), a post-9/11 creation, to hold on to information about Americans in no way known to be connected to terrorism – about you and me, that is – for up to five years. (Its previous outer limit was 180 days.) This, Clapper claimed, "will enable NCTC to accomplish its mission more practically and effectively."
Joseph K., that icon of single-lettered anonymity from Franz Kafka's novel The Trial, would undoubtedly have felt right at home in Clapper's Washington. George Orwell would surely have had a few pungent words to say about those anodyne words "practically and effectively," not to speak of "mission."
For most Americans, though, it was just life as we've known it since September 11, 2001, since we scared ourselves to death and accepted that just about anything goes, as long as it supposedly involves protecting us from terrorists. Basic information or misinformation, possibly about you, is to be stored away for five years – or until some other attorney general and director of national intelligence think it's even more practical and effective to keep you on file for 10 years, 20 years, or until death do us part – and it hardly made a ripple.
Oh, and in those nine days abroad, a new word surfaced on my horizon, one just eerie and ugly enough for our new reality: yottabyte. Thank National Security Agency (NSA) expert James Bamford for that. He wrote a piece for Wired magazine on a super-secret, $2 billion, one-million-square-foot data center the NSA is building in Bluffdale, Utah. Focused on data mining and code-breaking and five times the size of the U.S. Capitol, it is expected to house information beyond compare, "including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails – parking receipts, travel itineraries, bookstore purchases, and other digital 'pocket litter.'"
Finish article here
No comments:
Post a Comment