ThinThread is the name of a project that the United States National Security Agency pursued during the 1990s, according to a May 17, 2006 article in the Baltimore Sun.[1] The program involved wiretapping and sophisticated analysis of the resulting data, but according to the article, the program was discontinued after the September 11, 2001 attacks due to the changes in priorities and the consolidation of U.S. intelligence authority. The "change in priority" consisted of the decision made by the Director of NSA Gen. Michael V. Hayden to go with a concept called Trailblazer, despite the fact that ThinThread was a working prototype that protected the privacy of U.S. citizens.

ThinThread was dismissed and replaced by the Trailblazer Project, which lacked the privacy protections.[2] A consortium led by Science Applications International Corporation was awarded a $280 million contract to develop Trailblazer in 2002.[3]

Whistleblowing[edit | edit source]


Redacted version of the DoD Inspector General audit, obtained through FOIA[4][5]

A group of former NSA workers — Kirk Wiebe, Bill Binney, Ed Loomis, and Thomas A. Drake, along with House Intelligence Committee staffer Diane Roark (an expert on the NSA budget[6]) — believed the operational prototype system called ThinThread was a better solution than Trailblazer, which was just a concept on paper at the time. They complained to the DoD Inspector General office in 2002 about mismanagement and the waste of taxpayer money at the NSA surrounding the Trailblazer program. In 2007 the FBI raided the homes of these people, an evolution of President Bush's crackdown on whistleblowers and "leaks" after the New York Times disclosed a separate program (see NSA warrantless surveillance controversy). In 2010, one of the people who had helped the IG in the ensuing investigation, NSA official Thomas Andrews Drake, was charged with espionage,[6][7] part of the Obama administration's crackdown on whistleblowers and "leaks".[7][8][9] The original charges against him were later dropped and he pled to a misdemeanor.

The result of the DoD IG complaint was a 2004 audit report that was released under FOIA in 2011.[5] Although highly redacted, the report contained significant criticisms of Trailblazer, and included some relatively minor criticisms of ThinThread, for example, citing a low "quality of service and support" from the ThinThread program team, a lack of documentation, a lack of a configuration management system, and a lack of a trouble ticket system. However, "The findings that led to the recommendations would not have prevented the successful deployment of THINTHREAD ... the recommendations were made to improve the operational efficiency of THINTHREAD after it was deployed ..."[10]

Technical details[edit | edit source]

The program would have used a technique of encrypting sensitive privacy information in order to comply with legal concerns, and would have automatically identified potential threats. The sources of the data for this program would have included "massive phone and e-mail data," but the extent of this information is not clear. Only once a threat was discovered, would the data be decrypted for analysis by agents.[11]

ThinThread would have bundled together four cutting-edge surveillance tools.:[citation needed]

  • Used more sophisticated methods of sorting through massive phone and e-mail data to identify suspect communications.
  • Identified U.S. phone numbers and other communications data and encrypted them to ensure caller privacy.
  • Employed an automated auditing system to monitor how analysts handled the information, in order to prevent misuse and improve efficiency.
  • Analyzed the data to identify relationships between callers and chronicle their contacts. Only when evidence of a potential threat had been developed would analysts be able to request decryption of the records.

Intelligence experts describe as rigorous testing of ThinThread in 1998, the project succeeded at each task with high marks. For example, its ability to sort through massive amounts of data to find threat-related communications far surpassed the existing system. It also was able to rapidly separate and encrypt U.S.-related communications to ensure privacy.[1]

The Pentagon report concluded that ThinThread's ability to sort through data in 2001 was far superior to that of another NSA system in place in 2004, and that the program should be launched and enhanced. ThinThread was designed to address two key challenges: One, the NSA had more information than it could digest, and, two, increasingly its targets were in contact with people in the United States whose calls the agency was prohibited from monitoring.[citation needed]

Trailblazer Project had more political support internally because it was initiated by Michael Hayden when he first arrived at the NSA.[citation needed]

NSA's existing system for data-sorting has produced a database clogged with corrupted and useless information. The mass collection of relatively unsorted data, combined with system flaws erroneously flag people as suspect, has produced numerous false leads, draining analyst resources. NSA leads have resulted in numerous dead ends.[citation needed]

NSA dropped the component that monitored for abuse of records. It not only tracked the use of the database, but hunted for the most effective analysis techniques, and some analysts thought it would be used to judge their performance. Within the NSA, the primary advocate for the ThinThread program was Richard Taylor. Taylor has retired from the NSA. The strength of ThinThread's approach is that by encrypting information on Americans, it is legal regardless of whether the country is at war.[citation needed]

ThinThread "was designed very carefully from a legal point of view, so that even in non-wartime, you could have done it legitimately."[12]

End of the project[edit | edit source]

The project was ended after successful testing by General Michael Hayden, and while the privacy elements were not retained, the analysis technology is reported to be the underlying basis of current NSA analysis techniques.

"They basically just disabled the [privacy] safeguards."[11]

Some anonymous NSA officials told Hosenball of Newsweek that the ThinThread program, like Trailblazer, was a "wasteful failure".[6]

See also[edit | edit source]

Drake was interviewed on The Daily Show on August 6, 2012 about his charges and the program with his lawyer.

Notes[edit | edit source]

  1. 1.0 1.1 Siobhan Gorman (2006-05-17). "NSA killed system that sifted phone data legally". baltimoresun.com. http://www.commondreams.org/headlines06/0518-07.htm. Retrieved 2008-08-14. 
  2. "NSA datamining pushes tech envelope". PhysOrg.com. May 25, 2006. http://www.physorg.com/news67784662.html. .
  3. "SAIC Team Wins National Security Agency TRAILBLAZER Contract". SAIC. October 21, 2002. http://www.thefreelibrary.com/SAIC+Team+Wins+National+Security+Agency+TRAILBLAZER+Contract.-a093081931. 
  4. POGO Obtains Pentagon Inspector General Report Associated With NSA Whistleblower Tom Drake, By Nick Schwellenbach, Project on Government Oversight, 2011 6 22, http://pogo.typepad.com
  5. 5.0 5.1 Too Classified to Try Myth in Failed Drake Prosecution, Jesselyn Radack, DailyKos, 6/11/11
  6. 6.0 6.1 6.2 Exclusive: House Republican Staffer Introduced Alleged NSA Leaker to Reporter , Mark Hosenball, Declassified , Newsweek.com, 2010 Apr 16, accessed 2010 Apr 17
  7. 7.0 7.1 Indictment Continues Obama Administration’s War on Leaks ,Shane Harris, washingtonian, 01/25/2011, retrieved 3/9/11
  8. Scott Shane (11 June 2010). "Obama Takes a Hard Line Against Leaks to Press". The New York Times. http://www.nytimes.com/2010/06/12/us/politics/12leak.html. 
  9. Checkpoint Washington - Setback in case against accused NSA leaker, Ellen Nakashima, Washington Post, 2010 Nov, retrieved from voices.washingtonpost.com on 2011 03 10]
  10. See the report report, linked above. page 79 & preceeding
  11. 11.0 11.1 The Secret Sharer, Jane Mayer, The New Yorker, 2011 May, retrieved from www.newyorker.com on 2011 05 29]
  12. NSA Killed System That Sifted Phone Data Legally

External links[edit | edit source]

Community content is available under CC-BY-SA unless otherwise noted.