Room 641A: Difference between revisions
m Task 16: replaced (2×) / removed (0×) deprecated |dead-url= and |deadurl= with |url-status=; |
→Description: link |
||
(23 intermediate revisions by 22 users not shown) | |||
Line 1: | Line 1: | ||
{{Short description|Telecommunication interception facility}} |
|||
{{Use mdy dates|date=March 2021}} |
|||
{{coord|37|47|07|N|122|23|48|W|display=title|type:landmark_region:US-CA}} |
{{coord|37|47|07|N|122|23|48|W|display=title|type:landmark_region:US-CA}} |
||
[[File:Picture 001-small.jpg|thumb|300px| |
[[File:Picture 001-small.jpg|thumb|300px|Room 641's exterior]] |
||
{{NSA surveillance}} |
{{NSA surveillance}} |
||
{{Global surveillance}} |
{{Global surveillance}} |
||
'''Room 641A''' is a telecommunication interception facility operated by [[AT&T]] for the U.S. [[National Security Agency]], as part of [[NSA warrantless surveillance (2001–2007)|its warrantless surveillance program]] as authorized by the [[Patriot Act]]. The facility commenced operations in 2003 and its purpose was publicly revealed in 2006.<ref name=WiredEvidence /><ref name=wired1/> |
'''Room 641A''' is a telecommunication interception facility operated by [[AT&T]] for the U.S. [[National Security Agency]], as part of [[NSA warrantless surveillance (2001–2007)|its warrantless surveillance program]] as authorized by the [[Patriot Act]]. The facility commenced operations in 2003 and its purpose was publicly revealed by AT&T technician [[Mark Klein]] in 2006.<ref name=WiredEvidence /><ref name=wired1/> |
||
==Description== |
==Description== |
||
Room 641A is located in the [[SBC Communications]] building at 611 Folsom Street, [[San Francisco]], three floors of which were occupied by AT&T before SBC purchased AT&T.<ref name=WiredEvidence /> The room was referred to in internal AT&T documents as the ''SG3 [Study Group 3] Secure Room''. |
Room 641A is located in the [[SBC Communications]] building at 611 Folsom Street, [[San Francisco]], three floors of which were occupied by AT&T before SBC purchased AT&T.<ref name=WiredEvidence /> The room was referred to in internal AT&T documents as the ''SG3 [Study Group 3] Secure Room''. |
||
The room measures about {{convert|24|by|48|ft}} and contains several racks of equipment, including a [[Narus |
The room measures about {{convert|24|by|48|ft}} and contains several racks of equipment, including a [[Narus Inc.|Narus]] STA 6400, a device designed to intercept and analyze Internet communications at very high speeds.<ref name=WiredEvidence/> It is fed by [[optical fiber|fiber optic]] lines from [[beam splitter]]s installed in fiber optic trunks carrying [[Internet backbone]] traffic.<ref name=kleinex /> In the analysis of J. Scott Marcus, a former [[Chief technology officer|CTO]] for [[GTE]] and a former adviser to the [[Federal Communications Commission]], it has access to all Internet traffic that passes through the building, and therefore "the capability to enable surveillance and analysis of internet content on a massive scale, including both overseas and purely domestic traffic."<ref name=marcus1 /> |
||
The existence of the room was revealed by former AT&T technician [[Mark Klein]] and was the subject of a 2006 [[class action]] lawsuit by the [[Electronic Frontier Foundation]] against AT&T.<ref name=EFFdocs/> Klein claims he was told that similar [[black room]]s are operated at other facilities around the country.<ref name=WiredVindicate/> |
The existence of the room was revealed by former AT&T technician [[Mark Klein]] and was the subject of a 2006 [[class action]] lawsuit by the [[Electronic Frontier Foundation]] against AT&T.<ref name=EFFdocs/> Klein claims he was told that similar [[black room]]s are operated at other facilities around the country.<ref name=WiredVindicate/> |
||
Room 641A and the controversies surrounding it were subjects of an episode of ''[[Frontline (U.S. TV series)|Frontline]]'',<ref>{{cite web|url=https://www.pbs.org/wgbh/pages/frontline/homefront/view/|title=Spying on the Homefront|work=Frontline|publisher=PBS| |
Room 641A and the controversies surrounding it were subjects of an episode of ''[[Frontline (U.S. TV series)|Frontline]]'',<ref>{{cite web|url=https://www.pbs.org/wgbh/pages/frontline/homefront/view/|title=Spying on the Homefront|work=Frontline|publisher=PBS|access-date=August 1, 2013}}</ref> the current affairs documentary program on [[Public Broadcasting Service|PBS]]. It was originally broadcast on May 15, 2007. It was also featured on PBS's ''[[NOW on PBS|NOW]]'' on March 14, 2008. The room was also covered in the PBS ''[[Nova (American TV series)|Nova]]'' episode "The Spy Factory". |
||
==Lawsuits== |
==Lawsuits== |
||
{{main|Hepting v. AT&T}} |
{{main|Hepting v. AT&T}} |
||
The [[Electronic Frontier Foundation]] (EFF) filed a [[Class action|class-action]] [[lawsuit]] against [[AT&T]] on January 31, 2006, accusing the telecommunication company of violating the law and the privacy of its customers by collaborating with the [[National Security Agency]] (NSA) in a massive, illegal program to [[wiretap]] and [[Data mining|data-mine]] Americans' communications. On July 20, 2006, a federal judge denied the government's and AT&T's motions to dismiss the case, chiefly on the ground of the [[state secrets privilege]], allowing the lawsuit to go forward. On August 15, 2007, the case was heard by the [[United States Court of Appeals for the Ninth Circuit|Ninth Circuit Court of Appeals]] and was dismissed on December 29, 2011, based on a [[Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008|retroactive grant of immunity]] by Congress for telecommunications companies that cooperated with the government. The U.S. Supreme Court declined to hear the case.<ref name="eff-hepting">{{cite web|url=https://www.eff.org/cases/hepting |title=Hepting v. AT&T | Electronic Frontier Foundation |publisher=Eff.org |date= |
The [[Electronic Frontier Foundation]] (EFF) filed a [[Class action|class-action]] [[lawsuit]] against [[AT&T]] on January 31, 2006, accusing the telecommunication company of violating the law and the privacy of its customers by collaborating with the [[National Security Agency]] (NSA) in a massive, illegal program to [[wiretap]] and [[Data mining|data-mine]] Americans' communications. On July 20, 2006, a federal judge denied the government's and AT&T's motions to dismiss the case, chiefly on the ground of the [[state secrets privilege]], allowing the lawsuit to go forward. On August 15, 2007, the case was heard by the [[United States Court of Appeals for the Ninth Circuit|Ninth Circuit Court of Appeals]] and was dismissed on December 29, 2011, based on a [[Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008|retroactive grant of immunity]] by Congress for telecommunications companies that cooperated with the government. The U.S. Supreme Court declined to hear the case.<ref name="eff-hepting">{{cite web|url=https://www.eff.org/cases/hepting |title=Hepting v. AT&T | Electronic Frontier Foundation |publisher=Eff.org |date=January 31, 2006 |access-date=February 12, 2014}}</ref> |
||
A different case by the Electronic Frontier Foundation was filed on September 18, 2008, titled ''[[Jewel v. NSA]]''. After many years of litigation, on April 25, 2019, ruling from the Northern District of California for ''Jewel v. NSA''<ref name=JewelvNSA/> concluded that the evidence presented by the plaintiff's experts was insufficient; "the Court confirms its earlier finding that Klein cannot establish the content, function, or purpose of the secure room at the AT&T site based on his own independent knowledge." The ruling noted, "Klein can only speculate about what data were actually processed and by whom in the secure room and how and for what purpose, as he was never involved in its operation." The Court further went on to discredit other experts called upon, citing their heavy reliance on the Klein declaration. |
A different case by the Electronic Frontier Foundation was filed on September 18, 2008, titled ''[[Jewel v. NSA]]''. After many years of litigation, on April 25, 2019, ruling from the Northern District of California for ''Jewel v. NSA''<ref name=JewelvNSA/> concluded that the evidence presented by the plaintiff's experts was insufficient; "the Court confirms its earlier finding that Klein cannot establish the content, function, or purpose of the secure room at the AT&T site based on his own independent knowledge." The ruling noted, "Klein can only speculate about what data were actually processed and by whom in the secure room and how and for what purpose, as he was never involved in its operation." The Court further went on to discredit other experts called upon, citing their heavy reliance on the Klein declaration. |
||
In the Spring of 2006, over 50 other lawsuits were filed against various telecommunications companies, in response to the article.<ref>{{cite web |title=Hepting v. AT&T |url=https://www.eff.org/cases/hepting |website=Electronic Frontier Foundation |language=en |date=July 1, 2011}}</ref> |
|||
There has been speculation that several rooms similar to this exist all over the United States.<ref>{{cite journal |last1=WOLFSON |first1=STEPHEN |title=The NSA, AT&T, and the Secrets of Room 641A |journal=VS: A Journal of Law and Policy for the Information Society |volume=3 |issue=3 |url=https://kb.osu.edu/bitstream/handle/1811/72816/1/ISJLP_V3N3_411.pdf |access-date=March 3, 2021}}</ref><ref>{{cite news |last1=Gallagher |first1=Ryan GallagherHenrik MoltkeRyan |last2=MoltkeJune 25, 2018 |first2=Henrik |title=The NSA's Hidden Spy Hubs in Eight U.S. Cities |url=https://theintercept.com/2018/06/25/att-internet-nsa-spy-hubs/ |access-date=March 4, 2021 |work=The Intercept |language=en}}</ref> |
|||
==Gallery== |
==Gallery== |
||
Line 41: | Line 47: | ||
* [[Upstream collection]] |
* [[Upstream collection]] |
||
* [[Utah Data Center]] |
* [[Utah Data Center]] |
||
* [[33 Thomas Street]] |
|||
==References== |
==References== |
||
Line 47: | Line 54: | ||
<ref name=wired1>{{cite news |
<ref name=wired1>{{cite news |
||
| title = The NSA Is Building the |
| title = The NSA Is Building the Country's Biggest Spy Center (Watch What You Say) |
||
| first = James |
| first = James |
||
| last = |
| last = Bamford |
||
| url = https://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/1 |
| url = https://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/1 |
||
| newspaper = [[Wired (magazine)|Wired]] |
| newspaper = [[Wired (magazine)|Wired]] |
||
| date = |
| date = March 15, 2012 |
||
| |
| access-date = April 23, 2012 |
||
}}</ref> |
}}</ref> |
||
<ref name=WiredEvidence>{{cite |
<ref name=WiredEvidence>{{cite magazine |
||
|url = http://www.wired.com/science/discoveries/news/2006/05/70908 |
|url = http://www.wired.com/science/discoveries/news/2006/05/70908 |
||
|title = AT&T Whistle-Blower's Evidence |
|title = AT&T Whistle-Blower's Evidence |
||
| |
|magazine = Wired |
||
|date = May 17, 2006 |
|date = May 17, 2006 |
||
|access-date = February 27, 2009 |
|||
|url-status = bot: unknown |
|||
| |
|archive-url = https://web.archive.org/web/20140328094710/http://www.wired.com/science/discoveries/news/2006/05/70908 |
||
| |
|archive-date = March 28, 2014 |
||
}}</ref> |
}}</ref> |
||
Line 71: | Line 78: | ||
|title=NSA Multi-District Litigation |
|title=NSA Multi-District Litigation |
||
|publisher=Electronic Frontier Foundation |
|publisher=Electronic Frontier Foundation |
||
| |
|access-date=February 27, 2009 |
||
}}</ref> |
}}</ref> |
||
Line 80: | Line 87: | ||
|url=https://www.wired.com/2013/06/nsa-whistleblower-klein/ |
|url=https://www.wired.com/2013/06/nsa-whistleblower-klein/ |
||
|newspaper=[[Wired (magazine)|Wired]] |
|newspaper=[[Wired (magazine)|Wired]] |
||
|date= |
|date=June 27, 2013 |
||
|access-date=June 26, 2019 |
|||
}}</ref> |
}}</ref> |
||
<ref name=marcus1> |
<ref name=marcus1> |
||
"Marcus Declaration" Document from Hepting vs AT&T lawsuit from 2006. Reported by Ryan Singel in Wired Magazine, article [https://www.wired.com/politics/law/news/2007/06/spy_room "AT&T 'Spy Room' Documents Unsealed; You've Already Seen Them"] 6/13/07 |
"Marcus Declaration" Document from Hepting vs AT&T lawsuit from 2006. Reported by Ryan Singel in Wired Magazine, article [https://www.wired.com/politics/law/news/2007/06/spy_room "AT&T 'Spy Room' Documents Unsealed; You've Already Seen Them"] 6/13/07, Documents posted at the Electronic Frontier Foundation [http://eff.org/legal/cases/att File "SER marcus decl.pdf website] (PDF)</ref> |
||
<ref name=kleinex> |
<ref name=kleinex> |
||
Line 93: | Line 100: | ||
==External links== |
==External links== |
||
*{{cite web |title=Electronic Frontier Foundation's web page about NSA's domestic spying |url=https://www.eff.org/nsa-spying }} |
*{{cite web |title=Electronic Frontier Foundation's web page about NSA's domestic spying |url=https://www.eff.org/nsa-spying }} |
||
*{{cite web |title=Technician Mark Klein discussing Room 641A |work=[[Countdown with Keith Olbermann|Countdown]] episode |date=November 7, 2007 |via=[[YouTube]] |url=https://www.youtube.com/watch?v=QP2tKBtUpVg | |
*{{cite web |title=Technician Mark Klein discussing Room 641A |work=[[Countdown with Keith Olbermann|Countdown]] episode |date=November 7, 2007 |via=[[YouTube]] |url=https://www.youtube.com/watch?v=QP2tKBtUpVg |archive-date=March 10, 2016 |archive-url=https://web.archive.org/web/20160310115202/https://www.youtube.com/watch?v=QP2tKBtUpVg |access-date=August 25, 2016 |url-status=bot: unknown }} |
||
*{{Cite web|url=http://jnslp.com/wp-content/uploads/2014/05/On-the-Bulk-Collection-of-Tangible-Things.pdf|title=On Bulk Collection of Tangible Things|last=Kris|first=David|date=2014|website=Journal of National Security Law & Policy|archive-url=https://web.archive.org/web/20171027001737/http://jnslp.com/2014/05/08/on-the-bulk-collection-of-tangible-things/|archive-date=2017|url-status=live}} |
*{{Cite web|url=http://jnslp.com/wp-content/uploads/2014/05/On-the-Bulk-Collection-of-Tangible-Things.pdf|title=On Bulk Collection of Tangible Things|last=Kris|first=David|date=2014|website=Journal of National Security Law & Policy|archive-url=https://web.archive.org/web/20171027001737/http://jnslp.com/2014/05/08/on-the-bulk-collection-of-tangible-things/|archive-date=2017-10-27|url-status=live}} |
||
{{AT&T}} |
{{AT&T}} |
Latest revision as of 03:07, 25 December 2024
37°47′07″N 122°23′48″W / 37.78528°N 122.39667°W
National Security Agency surveillance |
---|
Part of a series on |
Global surveillance |
---|
Disclosures |
Systems |
Selected agencies |
Places |
Laws |
Proposed changes |
Concepts |
Related topics |
Room 641A is a telecommunication interception facility operated by AT&T for the U.S. National Security Agency, as part of its warrantless surveillance program as authorized by the Patriot Act. The facility commenced operations in 2003 and its purpose was publicly revealed by AT&T technician Mark Klein in 2006.[1][2]
Description
[edit]Room 641A is located in the SBC Communications building at 611 Folsom Street, San Francisco, three floors of which were occupied by AT&T before SBC purchased AT&T.[1] The room was referred to in internal AT&T documents as the SG3 [Study Group 3] Secure Room.
The room measures about 24 by 48 feet (7.3 by 14.6 m) and contains several racks of equipment, including a Narus STA 6400, a device designed to intercept and analyze Internet communications at very high speeds.[1] It is fed by fiber optic lines from beam splitters installed in fiber optic trunks carrying Internet backbone traffic.[3] In the analysis of J. Scott Marcus, a former CTO for GTE and a former adviser to the Federal Communications Commission, it has access to all Internet traffic that passes through the building, and therefore "the capability to enable surveillance and analysis of internet content on a massive scale, including both overseas and purely domestic traffic."[4]
The existence of the room was revealed by former AT&T technician Mark Klein and was the subject of a 2006 class action lawsuit by the Electronic Frontier Foundation against AT&T.[5] Klein claims he was told that similar black rooms are operated at other facilities around the country.[6]
Room 641A and the controversies surrounding it were subjects of an episode of Frontline,[7] the current affairs documentary program on PBS. It was originally broadcast on May 15, 2007. It was also featured on PBS's NOW on March 14, 2008. The room was also covered in the PBS Nova episode "The Spy Factory".
Lawsuits
[edit]The Electronic Frontier Foundation (EFF) filed a class-action lawsuit against AT&T on January 31, 2006, accusing the telecommunication company of violating the law and the privacy of its customers by collaborating with the National Security Agency (NSA) in a massive, illegal program to wiretap and data-mine Americans' communications. On July 20, 2006, a federal judge denied the government's and AT&T's motions to dismiss the case, chiefly on the ground of the state secrets privilege, allowing the lawsuit to go forward. On August 15, 2007, the case was heard by the Ninth Circuit Court of Appeals and was dismissed on December 29, 2011, based on a retroactive grant of immunity by Congress for telecommunications companies that cooperated with the government. The U.S. Supreme Court declined to hear the case.[8]
A different case by the Electronic Frontier Foundation was filed on September 18, 2008, titled Jewel v. NSA. After many years of litigation, on April 25, 2019, ruling from the Northern District of California for Jewel v. NSA[9] concluded that the evidence presented by the plaintiff's experts was insufficient; "the Court confirms its earlier finding that Klein cannot establish the content, function, or purpose of the secure room at the AT&T site based on his own independent knowledge." The ruling noted, "Klein can only speculate about what data were actually processed and by whom in the secure room and how and for what purpose, as he was never involved in its operation." The Court further went on to discredit other experts called upon, citing their heavy reliance on the Klein declaration.
In the Spring of 2006, over 50 other lawsuits were filed against various telecommunications companies, in response to the article.[10]
There has been speculation that several rooms similar to this exist all over the United States.[11][12]
Gallery
[edit]-
Page 9: More complicated diagram of how it allegedly worked. From EFF court filings.[3]
-
A fiber optic tap
See also
[edit]- Cabinet noir
- ECHELON
- Fairview (surveillance program)
- Fiber tapping
- Hemisphere Project, mass surveillance program conducted by AT&T and paid for by the DEA
- Main Core
- NSA warrantless surveillance controversy
- President's Surveillance Program
- PRISM (surveillance program)
- Signals intelligence
- Upstream collection
- Utah Data Center
- 33 Thomas Street
References
[edit]- ^ a b c "AT&T Whistle-Blower's Evidence". Wired. May 17, 2006. Archived from the original on March 28, 2014. Retrieved February 27, 2009.
{{cite magazine}}
: CS1 maint: bot: original URL status unknown (link) - ^ Bamford, James (March 15, 2012). "The NSA Is Building the Country's Biggest Spy Center (Watch What You Say)". Wired. Retrieved April 23, 2012.
- ^ a b "Klein Exhibit" Document from Hepting vs AT&T lawsuit from 2007. Reported by Ryan Singel in Wired Magazine, article "AT&T 'Spy Room' Documents Unsealed; You've Already Seen Them" 6/13/07, Documents posted at the Electronic Frontier Foundation File "SER_klein_exhibits.pdf website (PDF)
- ^ a b "Marcus Declaration" Document from Hepting vs AT&T lawsuit from 2006. Reported by Ryan Singel in Wired Magazine, article "AT&T 'Spy Room' Documents Unsealed; You've Already Seen Them" 6/13/07, Documents posted at the Electronic Frontier Foundation File "SER marcus decl.pdf website (PDF)
- ^ "NSA Multi-District Litigation". Electronic Frontier Foundation. Retrieved February 27, 2009.
- ^ Kravets, David (June 27, 2013). "NSA Leak Vindicates AT&T Whistleblower". Wired. Retrieved June 26, 2019.
- ^ "Spying on the Homefront". Frontline. PBS. Retrieved August 1, 2013.
- ^ "Hepting v. AT&T | Electronic Frontier Foundation". Eff.org. January 31, 2006. Retrieved February 12, 2014.
- ^ Jewel v. NSA April 2019 ruling
- ^ "Hepting v. AT&T". Electronic Frontier Foundation. July 1, 2011.
- ^ WOLFSON, STEPHEN. "The NSA, AT&T, and the Secrets of Room 641A" (PDF). VS: A Journal of Law and Policy for the Information Society. 3 (3). Retrieved March 3, 2021.
- ^ Gallagher, Ryan GallagherHenrik MoltkeRyan; MoltkeJune 25, 2018, Henrik. "The NSA's Hidden Spy Hubs in Eight U.S. Cities". The Intercept. Retrieved March 4, 2021.
{{cite news}}
: CS1 maint: numeric names: authors list (link)
External links
[edit]- "Electronic Frontier Foundation's web page about NSA's domestic spying".
- "Technician Mark Klein discussing Room 641A". Countdown episode. November 7, 2007. Archived from the original on March 10, 2016. Retrieved August 25, 2016 – via YouTube.
{{cite web}}
: CS1 maint: bot: original URL status unknown (link) - Kris, David (2014). "On Bulk Collection of Tangible Things" (PDF). Journal of National Security Law & Policy. Archived from the original on October 27, 2017.