FastSaying

In the urgent aftermath of Sept. 11, 2001, with more attacks thought to be imminent, analysts wanted to use 'contact chaining' techniques to build what the NSA describes as network graphs of people who represented potential threats.

Barton Gellman

Barton Gellman

AftermathAnalystAttacksBuildContactImminentMoreNetworkNSAPeoplePotentialSeptTechniquesThoughtThreatsUrgentUseWantedWho

Related Quotes

The NSA's business is 'information dominance,' the use of other people's secrets to shape events.
— Barton Gellman
BusinessDominanceEvents
Counterterrorism analysts have known for years that al Qaeda prepares for attacks with elaborate 'targeting packages' of photographs and notes.
— Barton Gellman
AlAnalystAttacks
The causes and severity of NSA infractions vary widely. One in 10 incidents is attributed to a typographical error in which an analyst enters an incorrect query and retrieves data about U.S phone calls or emails.
— Barton Gellman
AboutAnalystAttributed
NSA surveillance is a complex subject - legally, technically and operationally.
— Barton Gellman
ComplexLegallyNsa
I have no evidence of any relationship between IRS and NSA.
— Barton Gellman
AnyBetweenEvidence