The proliferation of cell phones, e-mail and faxes is making the hunt for terrorists increasingly more difficult. Security agencies have literally billions of messages to sift through every day — many with encryptions that make it impossible for anyone other than the intended recipient to read. — From the opening of “Hiding Like Snakes in the E-Grass” on Wired.com on Sept. 14, 2001.
Throughout the years, I’ve been haunted by two stories that I worked on while at Wired.com. The first story was never published. ((In the days after one of the early 9/11 commission reports in 2002, the Wired.com journalists poured through the document. While most people gravitated to the larger stories. I was intrigued by a few throwaway lines about vulnerability of the power grid because of old and failing sensors. After 3 weeks of reporting, I was ready to file my stories when I decided to leave the company during a round of layoffs. I left my notes with an editor, but I turned my attention to my own book. In August 2003, the New York City power grid went down for precisely the reasons outlined in the report and my reporting.)) This is the story of the second one, which which came out in the days after September 11.
As the nation tried to collect itself in the hours, minutes, and days after the terrorist attacks, our president rightfully spent a great deal of time and energy reassuring the public. While I didn’t vote for President George W. Bush, I’ve always believed that as an American it’s our duty to support and back our leader (even if we respectfully disagree.) I have little tolerance for those who find it appropriate to cast insults. As such, I appreciated the president’s steadfast and earnest compassion that he showed on those workers who were on the ground. ((He always seemed much better when he was ‘hanging out’ than when we was reading speeches.))
What I didn’t believe, though, was the insistence that we could adequately monitor digital communications in order to find out if there were looming threats.
As a technology journalist, I was dubious. Such a system was simply not possible unless you believed the rumored capacity of Echelon really existed or you believed backdoor technologies like the Clipper chip had been secretly deployed. Short of that, you simply couldn’t monitor every IM, chat, and private conversation in a meaningful, real-time way back then.
I began reporting my story on September 12. I called security experts, analysts, academics, and scientists while trying to wrap my head around just what we could and couldn’t realistically accomplish in terms of monitoring communications.