CORRESPONDENT AND SENIOR PRODUCER
Hedrick Smith
WRITTEN BY
Hedrick Smith & Rick Young
PRODUCED and DIRECTED BY
Rick Young
ANNOUNCER: Tonight on FRONTLINE-
PETER SWIRE, White House Privacy Counsel, 1999-01: Everybody's a suspect. And if you're good, we won't bother you, and if you look a little strange, then you might get on a watch list.
ANNOUNCER: A permanent war against a hidden enemy.
JOHN ASHCROFT, Attorney General, 2001-05: The president turned to me and said, "Never let this happen again."
ANNOUNCER: -a new strategy of prevention-
MICHAEL WOODS, FBI National Security Atty., 1997-02: You have to cast the net a bit more broadly.
ANNOUNCER: -and new perils to privacy.
SUZANNE SPAULDING, Fmr. CIA Senior Attorney: It is inevitable that totally innocent Americans are going to be affected by these programs.
ANNOUNCER: Correspondent Hedrick Smith looks into the government's secret surveillance efforts here at home-
CINDY COHN, Electronic Frontier Foundation: We're talking about a wholesale diversion of communications to government control.
MARK KLEIN, Fmr. AT&T technician: Oh, that's what they're doing. This is a spy apparatus.
ANNOUNCER: -and explores the new era of prevention, hunting them by watching us.
STEPHEN SPROUSE, Las Vegas Tourist: It seems to be like the beginning of "We're going to treat everyone like a bad guy."
HEDRICK SMITH, Correspondent: And that applies to everything- telephone records-
PETER SWIRE: Telephone records, financial records-
LARRY MEFFORD, FBI Assistant Director, 2002-03: How much security do you want, and how many rights do you want to give up?
ANNOUNCER: Tonight on FRONTLINE, Spying on the Home Front.
HEDRICK SMITH, Correspondent: [voice-over] Las Vegas. It was the week before New Year's 2004 when Stephen Sprouse and Kristin Douglas flew in from Kansas City to get married.
KRISTIN DOUGLAS, Las Vegas Tourist: Stephen always wanted to get married in Vegas. I mean, that was sort of a joke.
HEDRICK SMITH: Stephen and Kristin exchanged vows in front of friends, family-
"ELVIS": Ladies and gentlemen, it is show time!
HEDRICK SMITH: -and Elvis.
STEPHEN SPROUSE, Las Vegas Tourist: You come in and you're thinking, "OK, I'm going to get married." And you know, Elvis comes down the aisle. Then you're kind of up there, and all of a sudden, you're thinking, "Wow, I'm really getting married." Then they're doing the vows, and you're, like, "Oh, this is for real."
WEDDING OFFICIAL: You may kiss your bride.
KRISTIN DOUGLAS: And then you're singing "Viva Las Vegas."
STEPHEN SPROUSE: And then you're singing "Viva Las Vegas."
HEDRICK SMITH: But in fact, things in Vegas weren't looking so good. There was disturbing news.
BILL YOUNG, Fmr. Sheriff, Clark County, Nevada: Tom Ridge was on national TV, and you know, he said, "Hey, there's three cities that," you know, "we got to really pay attention to- Washington, D.C., New York and Las Vegas." And whew! You know, when that happens, then the whole eyes of the world come on you.
RADIO NEWSCASTER: U.S. intelligence from overseas has prompted an elevated alert-
ELLEN KNOWLTON, FBI Chief, Las Vegas, 2002-06: On Saturday, December 20, I was contacted by someone from our terrorism division at FBI headquarters. The information that I received was that al Qaeda could have an interest in Las Vegas, possibly over the New Year's weekend.
HEDRICK SMITH: [on camera] That's it?
ELLEN KNOWLTON: That's it.
HEDRICK SMITH: No names? No targets?
ELLEN KNOWLTON: No targets identified. No threat articulated. No plot uncovered.
HEDRICK SMITH: [voice-over] New Year's Eve is a security nightmare for the cops, who see it as a tempting target for terrorists.
BILL YOUNG: We have 3000,000 to 400,000 people on the streets, on Las Vegas Boulevard, in front of all these beautiful hotels, waiting for the clock to strike midnight and all the fireworks to go off. And that was what the intelligence information indicated, that that was, you know, the type of area or venue that they were going to try to target.
Here was the real dilemma. Do we cancel our New Year's Eve celebration in Las Vegas? That was the question being placed on me.
STEPHEN SPROUSE: When you were out there, that's when you kind of notice that you don't see any of the planes flying and you see helicopters off in the distance, kind of circling around. That's when it kind of seemed a little weird, a little odd.
KRISTIN DOUGLAS: Yeah. It was a little creepy.
STEPHEN SPROUSE: Yeah.
HEDRICK SMITH: [voice-over] The clock was ticking, just 11 days until New Year's. They needed to act fast.
ELLEN KNOWLTON: We spoke almost on an hourly basis, at times, with our own headquarters, with the Department of Justice, to try to determine if there were terrorist operatives in Las Vegas or preparing to come to Las Vegas.
BILL YOUNG: Who's in Las Vegas, you know? Can we find out who's in Las Vegas today and who's going to be here over the New Year's Eve weekend? Is there the potential that a Mohammed Atta is staying at the Economy Lodge again?
HEDRICK SMITH: The feds called in security chiefs from the major hotels and casinos and asked for help, but much different help from usual.
[on camera] When Ellen Knowlton, the FBI agent in charge in Las Vegas at the time, in December 2003, came to all the casinos and said, "We want all your records," how does that hit you?
ALAN FELDMAN, Senior VP, MGM Mirage: To my knowledge, no one has ever made a request that is as broad as, "We want all of your records," or no one had prior to that.
HEDRICK SMITH: The hotel records, the airline records, the rental car records, the gift shop records, the casino records- when you're talking about all those records, you're talking about hundreds of thousands of people, particularly during this two-week period.
ALAN FELDMAN: That's correct.
GARY PECK, ACLU Director, Nevada: Hotel casino executives resisted, said they did not want to turn over the information. There was, according to published reports, a lot of arm twisting, a lot of intimidation.
ELLEN KNOWLTON: It was an extraordinary step. It really was. We were asking for records for the single purpose of making comparisons. We were not asking for records that would become incorporated into the FBI files.
HEDRICK SMITH: But records for everybody who was here.
ELLEN KNOWLTON: As many as we could obtain, yes.
HEDRICK SMITH: So you're talking hundreds of thousands of people.
ELLEN KNOWLTON: It was very, very, very voluminous, yes.
ALAN FELDMAN: As a citizen, I was very troubled by it. As an executive with this company, I was very troubled by it. You know, prior to this, we had dealt with the notion of, "Here's a list of people whom we suspect are doing bad things or have the potential to do bad things." To simply say, you know, "It's a matter of national security, we need to know the name of every single person checking into your hotel at any given moment"- that seems extremely unusual and I think extremely troubling.
HEDRICK SMITH: Did you feel like you were doing something unprecedented?
ELLEN KNOWLTON: In a way, yeah. In a way, I did, but we were doing so in order to safeguard this community, If someone was not a terrorist or a terrorist associate, they were not of any interest to us whatsoever.
GARY PECK, ACLU Director, Nevada: "Trust us. We're the government. And if you're not up to no good, why should you care?" That's not the way our system works. We are a country that is founded on a set of principles relating to individual freedom, including our privacy, our right to be left alone by the government.
HEDRICK SMITH: [voice-over] 9/11 indelibly altered America in ways that are now being seriously questioned.
Pres. GEORGE W. BUSH: The deliberate and deadly attacks which were carried out yesterday against our country were more than acts of terror, they were acts of war.
HEDRICK SMITH: A new paradigm of war spawned a new strategy, a proactive strategy of preemption.
JOHN ASHCROFT, Attorney General, 2001-05: When the president turned to me within hours, really, after 9/11, a day or so, and said- in my direction, anyhow- "Never let this happen again." Now, not letting something happen is different than proving something happened. The old business of the Justice Department, to be able to prosecute the criminal and declare victory, is not good enough when you lose 3,000 people and the criminals purposefully extinguish themselves in the perpetration of the crime. Prevention means disrupting a scenario before it actually all comes together.
HEDRICK SMITH: The new paradigm of prevention carried a new peril. Innocent people will get caught in the dragnet.
MICHAEL WOODS, FBI National Security Atty., 1997-02: When you talk about prevention, you're saying to people, "Well, you can't just focus on one person. You have to cast the net a bit more broadly, and you have to- you have to start to work with situations where you're going to collect a lot of data and then try to connect the dots." But that means you're going to collect a lot of data, and that means you're going to end up holding a lot of data about ordinary people who have nothing to do with your threat.
HEDRICK SMITH: [on camera] That sounds pretty intrusive.
MICHAEL WOODS: It is.
NEWSCASTER: Tonight, Big Brother, the uproar over a secret presidential order giving the government unprecedented powers to spy on Americans.
NEWSCASTER: -surveillance inside the U.S. without court orders-
HEDRICK SMITH: [voice-over] It was a bombshell, the National Security Agency engaged in warrantless eavesdropping inside the United States. The New York Times story broke on December 16, 2005, but spying on the home front had begun in the shadow of 9/11. And there was more going on than the Times story revealed. Congress erupted in protest.
Sen. PATRICK LEAHY (D), Vermont: Mr. President, it is time to have some checks and balances in this country! We are a democracy!
Sen. ARLEN SPECTER (R), Pennsylvania: It's inexcusable to have spying on people in the United States without court surveillance, in violation of our law, beyond any question.
PETER SWIRE, White House Privacy Counsel, 1999-01: This was enormous news. When The New York Times told us about the NSA wiretap program, for people like me, it was as though there was this alternate universe. We had thought we had a legal system and we knew what the moves were, and it turns out that the NSA was doing something entirely outside of that.
HEDRICK SMITH: In the cold war, NSA's mission was to collect communications intelligence on enemies abroad. Except in very rare cases, its cardinal rule was hand -off Americans at home.
JAMES BAMFORD, Author, The Puzzle Palace: NSA was looked at more as the nuclear weapon for eavesdropping, much too powerful to use domestically. It was never set up to use domestically.
KEVIN O'CONNELL, Fmr. NSA Analyst: It was almost something that was put into your blood line from the very beginning. In essence, you were taught that it was not part of the NSA mission, except under very exceptional and legally approved circumstances, to be involved with U.S. communications.
HEDRICK SMITH: But with one sweeping secret order, President Bush had changed all that.
Pres. GEORGE W. BUSH: [December 19, 2005] As president and commander-in-chief, I have the constitutional responsibility and the constitutional authority to protect our country. So consistent with U.S. law and the Constitution, I authorized the interception of international communications of people with known links to al Qaeda.
HEDRICK SMITH: The president minimized the risks to Americans. His eavesdropping program, he said, was very narrowly targeted, with one party outside the U.S. and known to be a member of or connected to al Qaeda.
Pres. GEORGE W. BUSH: I just want to assure the American people that, one, I've got the authority to do this. Two, it is a necessary part of my job to protect you. And three, we're guarding your civil liberties.
HEDRICK SMITH: But once before, the NSA was accused of invading American civil liberties, during the scandals of the Watergate era in the 1970s.
Sen. FRANK CHURCH (D), Idaho: The select committee made its first inquiries into this operation last May-
HEDRICK SMITH: The Church committee, headed by Senator Frank Church of Idaho, exposed widespread abuses of power at the FBI and the CIA and revealed that the NSA had been spying on Americans for decades.
[on camera] What was Operation Shamrock?
L. BRITT SNIDER, Church Cmte. Investigator, 1975-76: Operation Shamrock was a- a program of the National Security Agency to collect- to obtain access to telegrams that were leaving the United States for other countries, for foreign countries. And the idea was that the NSA would look through these telegrams, look for telegrams of interest from a foreign intelligence standpoint.
HEDRICK SMITH: Are you saying all of the telegrams going out of the U.S.? How did they get access?
L. BRITT SNIDER: They asked. I mean, that sounds very simplistic, but they approached the communications carriers, the telegraph companies concerned-
HEDRICK SMITH: RCA, ITT-
L. BRITT SNIDER: And Western Union.
HEDRICK SMITH: So in Operation Shamrock, what we saw was the NSA turning its foreign intelligence operations internally on American communications.
JAMES BAMFORD, Author, The Puzzle Palace: Oh, exactly. Yeah. Operation Shamrock was getting access to all the communications coming into, going out of and going through the United States.
L. BRITT SNIDER: There were very few rules back then, very few laws, regulations that dealt with what NSA or any intelligence agency could collect back then. The capabilities were there, the restraints weren't there. The temptation is to do it.
Sen. FRANK CHURCH: the committee believes that serious legal and constitutional questions are raised by this program-
HEDRICK SMITH: [voice-over] The exercise of unchecked executive power rankled Congress.
Sen. FRANK CHURCH: The program certainly appears to violate section 605 of the Communications Act of 1934, as well as the 4th Amendment to the Constitution.
HEDRICK SMITH: So Congress passed the FISA law, the Foreign Intelligence Surveillance Act, and set up a super-secret court here on the sixth floor of the Justice Department to prevent abuses of civil liberties. FISA said no intelligence wiretaps inside the U.S. without a warrant, and the FISA court was designated as the exclusive authority for getting warrants.
[on camera] Why is the FISA court, the judge or the Congress, so important to this process?
PETER SWIRE: Because the cop is a zealous person. You want your cop, you want your intelligence agent to go full bore, to be really devoted to what they're doing. And then you want somebody to say, "Wait a second. We don't want Dirty Harry. We have to have some ways to rein that in." And so you want the energy of the executive and you want the checks and balances on that, so we get energy and we get rule of law. And that was our American invention. That's the whole checks and balances Madison Federalist Papers. It's those inventions that can get put at risk if it's just saying, "Commander-in-chief? Stop there. Don't question it."
HEDRICK SMITH: [voice-over] Hence the furor when President Bush went around the FISA court.
REPORTER: And why did you skip the basic safeguard of asking courts for permission for these intercepts?
Pres. GEORGE W. BUSH: You're referring to the FISA court in your question. Of course we use FISAs. But FISAs is for long-term monitoring. What is needed in order to protect the American people is the ability to move quickly to detect-
[www.pbs.org: The President and the law]
PETER SWIRE: The law said the exclusive authority for wiretaps were these other statutes, and the president looked at exclusive authority and said, "Except when I feel like it." It was as though the lessons of Watergate had been forgotten. It was as though the lessons of centralized executive power and the problems that come with that had been forgotten. And now the president just said, "I think I can do it my way."
HEDRICK SMITH: [on camera] So you're saying the president violated the law?
PETER SWIRE: My view is that the president violated the law, yes.
HEDRICK SMITH: What do you say to people that say the president violated the FISA law?
JOHN YOO, Justice Dept. Sr. Attorney, 2001-03: I think that there's a law greater than FISA, which is the Constitution. And part of the Constitution is the president's commander-in-chief power. Congress can't take away the president's powers in running war that are given to him by the Constitution. There are some decisions the Constitution gives the president, and even if Congress passes a law, they can't seize that from him.
HEDRICK SMITH: [voice-over] But there was another reason the president went around FISA. The NSA needed to tap into communications more broadly than the president had indicated.
JOHN YOO: The difficulty in this war is that the enemy is not a nation. So what they do is they disguise themselves as civilians and they place their communications through normal civilian channels. And so the hard thing for our side is to identify where, in that stream of civilian innocent communications, al Qaeda members are disguising their messages to one another, trying to intercept those and find out what they mean.
HEDRICK SMITH: Fishing for possible targets among streams of civilian communications takes a lot of guessing.
JOHN YOO: If you're trying to prevent future terrorist attacks, trying to make guesses, trying these probabilities, you may not have a lot of information that says, "Yes, this person for sure is a member of al Qaeda."
HEDRICK SMITH: But there's a legal problem. Guessing is not allowed under FISA.
[www.pbs.org: Inside the FISA process]
JOHN YOO: The second difficulty is that it doesn't allow you, for example, to tap streams of communication that might be coming, say, from Afghanistan to the United States to try to search through those for terrorist communications, even though you don't have a specific name of a terrorist leader.
HEDRICK SMITH: [on camera] Could you do that kind of blanket eavesdropping, listening to those calls, under the Foreign Intelligence Surveillance Act?
JOHN YOO: No. I think that's- this is a good example of where existing laws were not up to the job.
HEDRICK SMITH: [voice-over] In the intelligence game, blanket eavesdropping is called a "driftnet," an electronic driftnet. But former NSA director General Michael Hayden, said no, that's not what was going on in the president's eavesdropping program.
Gen. MICHAEL HAYDEN: This isn't a driftnet out there, where we're soaking up everyone's communications. We're going after very specific communications that-
HEDRICK SMITH: [on camera] Now, you have General Hayden, the former head of the NSA, and the attorney general saying, "This is not a driftnet. We're not doing data mining in this program."
PETER SWIRE: What they've said repeatedly is that, "We're not doing the driftnet in this program." But it might be program number two or program number three.
HEDRICK SMITH: "This program" being what, the president's program?
PETER SWIRE: Because they were talking about the president's program. And then the other things we're worried about tend to be happening in these other programs they haven't admitted to.
Sen. PATRICK LEAHY (D-VT), Judiciary Committee: Is there anything to stop you from wiretapping without a warrant somebody inside the United States that you suspect of having al Qaeda connections?
ALBERTO GONZALES, Attorney General: Clearly, Senator, that is not what's going on here, first of all. The president has authorized a much more narrow program.
HEDRICK SMITH: So you're suggesting their denials are a word game, not a true denial.
PETER SWIRE: Yes.
HEDRICK SMITH: And you've looked at it closely?
PETER SWIRE: I looked at the attorney general's testimony very carefully, and every time he gave the big denials, they were attached to the words "this program."
Sen. HERB KOHL (D-WI), Judiciary Committee: Al Qaeda to al Qaeda within the country- you're saying we do not get involved in those calls. Now-
ALBERTO GONZALES, Attorney General: Not under the program on which I'm testifying, that's right.
Sen. HERB KOHL: It seems to me you're saying al Qaeda to al Qaeda within the country is beyond the bounds?
ALBERTO GONZALES: Sir, it is beyond the bound of the program which I'm testifying about today.
Sen. DIANE FEINSTEIN (D-CA), Judiciary Committee: Has the president ever invoked this authority with respect to any activity other than NSA surveillance?
ALBERTO GONZALES: Again, Senator, I'm not sure how to answer that question. The president has exercised his authority to authorize this very targeted surveillance of international communications of the enemy, so- I'm sorry. Your question is?
Sen. DIANE FEINSTEIN: Has the president ever invoked this authority with respect to any activity other than the program we're discussing, the NSA surveillance-
ALBERTO GONZALES: Senator, I am not comfortable going down the road of saying yes or no as to what the president has or has not authorized.
PETER SWIRE: He's a former judge. He's a smart lawyer. The attorney general was speaking very carefully. But I think there could be lots of room, after you read his testimony, for other programs to be doing really unprecedented things.
HEDRICK SMITH: [voice-over] What other things might the NSA be doing? To answer that, you have to understand what the NSA actually does and how it works.
WILLIAM WEAVER, Fmr. NSA Analyst: The average person doesn't have a concept of the massive capability that is available to the National Security Agency. Forget about the idea of the guy with the earphones on, listening to something. That's not what happens. You know, the calls are being sucked up by the millions. And not just the calls, you're engaged with data mining.
KEVIN O'CONNELL, Fmr. NSA Analyst: It's essentially looking for certain kinds of signals in an almost Herculean task of much, much larger communications environment to find the things that actually have intelligence value.
HEDRICK SMITH: Data mining, sifting through oceans of phone calls and Internet traffic. That's a far cry from what President Bush described, targeted intercepts of point-to-point al Qaeda communications.
WILLIAM WEAVER: Another feature of data mining is that you don't have any individualized suspicion going in. They don't say, "Hey, we're looking for something that Hedrick Smith is doing." They are just collecting the data, and then the analysis of the data gives rise to suspicion of individuals based on these connections.
HEDRICK SMITH: The inside story of what the NSA has actually been up to was discovered here in San Francisco by Mark Klein, a long-time Internet technician for AT&T.
MARK KLEIN, Fmr. AT&T Technician: In 2002, I was sitting at my workstation one day, and some email came in saying that somebody from the National Security Agency, NSA, was going to come visit for some business. This NSA representative showed up at the door. I happened to be the one who opened the door. I let him in.
DONALD HENRY, Fmr. AT&T Manager: He was doing a background check for a security clearance for one of our field engineers. He was going to be working at the Folsom Street office, and they were building a secure facility there.
MARK KLEIN: And I heard from our manager, Don, that he's working on some new room that's being built. So people start speculating, "Now, what's this new room being built?"
HEDRICK SMITH: Mark Klein got suspicious when the workmen constructing the room treated it as hush-hush.
[on camera] So how do you know that it wasn't just some kind of new-fangled AT&T thing that was going beyond what had already been established for its security purposes elsewhere?
MARK KLEIN: They wouldn't need the NSA for that purpose. The odd thing about the whole room, of course, was that only this one guy who had clearance from the NSA could get in there. So that changed the whole context of what this is about.
HEDRICK SMITH: [voice-over] Klein's job was to maintain AT&T's Internet service for several million customers, domestic and international traffic all mixed together.
MARK KLEIN: We're talking about billions and billions of bits of data going across every second, right?
HEDRICK SMITH: A co-worker showed Klein how their Internet room was directly connected to the secret NSA room through a special device called a splitter.
MARK KLEIN: So what they do with the splitter is they intercept that data stream and make copies of all the data, and those copies go down on the cable to the secret room.
BRIAN REID, Internet Systems Consortium: What this thing was is a very full-scale device to take all communication, voice and data, and send it both wherever it was supposed to go but also shunted off to a little listening room.
HEDRICK SMITH: So what exactly was going on in that listening room? Klein found clues at work one day.
MARK KLEIN: I came across these three documents and I brought them back to my desk. And when I started looking at it, I looked at it more, and finally, it dawned on me sort of all at once, and I almost fell out of my chair,
HEDRICK SMITH: Klein eventually found detailed designs for the secret room. One of the first to see his documents was Internet expert Brian Reid.
[www.pbs.org: See Klein's AT&T documents]
BRIAN REID: Lord, they had a lot of hardware. And they could- with the computers that they had there, they could do anything they wanted with that data. There was serious compute power available to process that wiretap data.
MARK KLEIN: But then there was one thing that was odd because I didn't recognize it. It was not part of normal day-to-day telecommunications equipment that I was familiar with. And that was a Narus - N-A-R-U-S - Narus STA 6400.
BRIAN REID: The Narus STA 6400 made me sit up and take notice and realize this was not an amateur game. And so when you see it, a Narus box and all that storage space and all that compute power, you can't help but think, "Wow,you know, this is some heavy-duty processing power here to really analyze the data that is siphoned off. What is going on?"
STEVE BANNERMAN, VP, Narus Marketing: The term "Narus" is Latin for "to know." The way our software works is it monitors all of the traffic on the Internet, all of the ones and zeros that make up all of the data that- you know, that you and I generate when we're looking at Web pages or when corporations are sending e-mails back and forth, all of that information. We just sort of peer into the pipes, if you will, and look at the ones and zeros as they go by.
HEDRICK SMITH: [on camera] Peering into the pipes- what does that mean?
STEVE BANNERMAN: It's sort analogous to a letter inside of an envelope. So you've got different layers in these things we call packets. And you know, the first layer that you get to peer back is the information about where the packet's coming from and where it's going to, the addresses that identify, you know, who's communicating with who. And then once you've delved into deeper parts of the packets, that's when you get into what's called the payload, and that includes the actual information that you're trying to send in the packet.
HEDRICK SMITH: The contents.
STEVE BANNERMAN: The content of the packet. That's correct.
HEDRICK SMITH: So your customers would be communications providers like AT&T or the Bell system. Do you also sell to government agencies like the National Security Agency or the FBI?
STEVE BANNERMAN: I can't comment on any- on any particular agencies that we may or may not have sold to because they haven't given us permission to- to announce their names.
HEDRICK SMITH: Why would AT&T put a Narus STA system in a room in its San Francisco office to which the NSA has access?
STEVE BANNERMAN: That's not a question that I- I- I- so as far as I know, no one's ever proved anything. I don't know- I don't know the answer to that question. I have no idea if that's ever been done or not.
HEDRICK SMITH: You've seen the splitter. You've now got the documents. You've seen the Narus. What is it you think is going on here?
MARK KLEIN: When I saw all that, it all clicked together to me, "Oh, that's what they're doing. This is a spy apparatus."
HEDRICK SMITH: [voice-over] Klein decided to blow the whistle. He went to see the Electronic Frontier Foundation. Cindy Cohn is their senior attorney.
CINDY COHN, Electronic Frontier Foundation: Mark Klein brought us some very good specific information about a specific facility in San Francisco that confirmed a lot of things that we thought were going on. We found a few other experts who know about the telecommunications companies and the issues that Mr. Klein was talking about. And we ran what Mr. Klein had given us past them and we said, you know, "Does this fly? Does this hold water to you?" And we were told, "Yes, it does."
HEDRICK SMITH: Scott Marcus, a former Federal Communications Commission expert, estimated that they set up eavesdropping rooms at 15 to 20 sites across the U.S., intercepting about "10 percent of all purely domestic" Internet traffic. And that's just at AT&T.
CINDY COHN: We're not just talking about targeted person-to-person communications being handed over to the government, we're talking about something much bigger. We're talking about a wholesale diversion of communications to government control.
HEDRICK SMITH: In early 2006, the Electronic Frontier Foundation filed suit against AT&T, asking the court to stop AT&T from handing over customer communications to the government.
CINDY COHN: [press conference] Our case alleges that AT&T is wholesalely providing the communication records and ongoing live information to the government. That's a violation of law.
HEDRICK SMITH: In court, AT&T urged dismissal of the case, citing state secrecy. Both AT&T and NSA refused to talk to FRONTLINE about the case.
[on camera] You're aware there's a case out here in San Francisco where people are saying that AT&T violated the law by giving the National Security Agency access to all its phone and Internet traffic. As a lawyer, is it your opinion that that actually would violate the law?
JOHN YOO: No, I don't think so, if it was part of the president's commander-in-chief power to gather information on the signals intelligence of the enemy.
HEDRICK SMITH: Can the government pull out the communications it wants, or does it have to have access to the entire flow?
JOHN YOO: I think the government needs to have at least access to the flow. Even if it was going to enforce a warrant, it has to have access to the flow.
HEDRICK SMITH: [voice-over] Under pressure from lawsuits like the AT&T case and from Congress, President Bush made a dramatic reversal last January. He put the one NSA eavesdropping program that he has acknowledged under the FISA court. But he still claims he has the power to go outside FISA any time he wants.
And the government isn't saying whether the eavesdropping at AT&T in San Francisco is covered by FISA. As far as we know, the Narus box that Mark Klein told us about is still peering into the Internet traffic.
They say what happens in Vegas stays in Vegas. But the marketing pitch, like the city itself, is a paradox. While legions of fun-seekers flock to Vegas every day to get lost in the crowd, the reality is that privacy has become an illusion.
[on camera] I see this sign on your cab getting in, "Video and audio recording going on."
CABBIE: Well, what we have here is, first, the minute the doors are opened, digital still pictures are taken, OK, which are saved. Then the video and audio is running at the same time. And in the event that there is a problem, then the videocamera will now download the 20 seconds previous to the event and what's going on during the event.
HEDRICK SMITH: This is quite a place, Las Vegas. I mean, there's obviously in the airport lots of video, and obviously at the hotels and casinos. They're loaded with cameras. And now taxis. So we're on film from practically the moment we arrive.
CABBIE: Correct.
BILL YOUNG, Fmr. Sheriff, Clark County, Nevada: People that come to Vegas, the only time they're not on video is when they're in their room or they're in a public restroom. They don't have them in those. But the hallways, the elevators, the gaming area. We've taken that to a level that has, I think, surpassed any place in the united states
HEDRICK SMITH: [voice-over] Las Vegas as "Surveillance City" struck me as an apt metaphor for life in the digital age. Businesses gather information on us routinely. Every day, we leave digital trails that reveal where we go, what we do, who we are. After 9/11, government agencies moved aggressively to tap into all that information compiled in commercial data banks. That's what the FBI was doing when it asked for records on 250,000 tourists in Las Vegas.
[on camera] So you're looking at airlines, car rental agencies, hotels, casinos, timeshare apartments, storage places, the works.
ELLEN KNOWLTON, FBI Chief, Las Vegas, 2002-06: As much as we could get in a the few days that we had to work with, yeah.
HEDRICK SMITH: Were legal papers produced of some kind?
ELLEN KNOWLTON: There were official requests for the information. It was not off the record or in any way inappropriate
HEDRICK SMITH: What you wanted was an assurance that this was a legal request backed by the power of law, not just voluntary compliance.
ALAN FELDMAN, Senior VP, MGM Mirage: Absolutely. Absolutely.
HEDRICK SMITH: And why-
ALAN FELDMAN: The concept that someone would want all records with no names identified over a period of time - in this case, it was give or take a couple of weeks - is in our industry an extraordinary request.
GARY PECK, ACLU Director, Nevada: The Patriot Act includes provisions that permitted the government and the FBI to do exactly what it did with very little or no judicial oversight whatsoever. It gave the FBI broad, sweeping power and authority to engage in precisely this kind of massive fishing expedition.
HEDRICK SMITH: [voice-over] What the Patriot Act had done was vastly expand the reach of "national security letters," which are FBI administrative subpoenas not approved by any court.
PETER SWIRE, White House Privacy Counsel, 1999-01: One big change that most people haven't quite seen is that before the Patriot Act, you could get a national security letter, one of these special "without a judge, get the phone records" letters, but it would be about one person, just about me. But now the language was changed so the government can get the entire database, and that's just a little change in the language. NSLs - national security letters - get X, but X went from the suspect to being the entire database.
HEDRICK SMITH: [on camera] And that applies to everything- telephone records, financial records-
PETER SWIRE: Telephone records, financial records, your credit histories. And it applies to these other kind of orders for any kind of record in the American economy.
HEDRICK SMITH: Did you use national security letters?
ELLEN KNOWLTON: I'm not going to be in a position to tell you what the legal avenues we used were. I can't go there.
HEDRICK SMITH: Do you know whether or not you got a subpoena, a warrant from a court, or do you know whether or not you got a national security letter from the FBI?
ALAN FELDMAN: Here's the fun of the Patriot Act. If we were to have received a national security letter, it would be against the law for me to tell you that we did.
HEDRICK SMITH: And had you received a subpoena with- signed off on by a judge, you would be able to?
ALAN FELDMAN: As a rule, usually, we would- we would acknowledge that we received something.
HEDRICK SMITH: And we're left in blanket silence, which- blanket silence in the sense that there are quite a few people who say, "We can't say." Logical deduction, they must have received the national security letters direct from the government.
ALAN FELDMAN: It would seem to be a logical deduction.
HEDRICK SMITH: [voice-over] But the big question remains, what did they do with all that information?
ELLEN KNOWLTON: It was burned onto CDs here in Las Vegas, and then those CDs were transported to Washington, D.C., for comparison against the various terrorist watch lists.
HEDRICK SMITH: Back in Washington, the FBI did a batch match, matching the list of 250,000 Vegas visitors against watch lists of tens of thousands of terrorist suspects. And they got a few hits.
[on camera] Now, when you said there were a few hits, what does that mean, that there were-
ELLEN KNOWLTON: There might be a similar name.
HEDRICK SMITH: On the hotel list and on the-
ELLEN KNOWLTON: On one of the watch lists, yes.
HEDRICK SMITH: [voice-over] But how could the FBI decipher those hits? Were those really terrorists or mistaken identities? And what if the bad guys had disguised their names to get lost in the crowd? How could the FBI ferret them out?
Ironically, the answer was right here in Las Vegas. For years, the casinos had been using special computer software to ferret out the hidden links between criminals and prospective employees.
ALAN FELDMAN: At one point, this young computer wizard named Jeff Jonas approached us and had this idea to use a computer program to compare lots of data, things like addresses phone numbers, birth dates, Social Security numbers, where things were inverted to make it look different.
HEDRICK SMITH: [on camera] Is the idea behind the Jonas software - he calls it NORA, N-O-R-A - to unmask sort of obscured relationships?
ALAN FELDMAN: That's exactly the idea. I mean, the idea was to- was to determine whether or not someone who was applying as a dealer was, in fact, associated with or connected with someone who was a known thief. So the idea was to protect the company's assets before a crime took place.
HEDRICK SMITH: Our sources said the FBI used Jonas's software to analyze the data collected in Las Vegas. But would that invade the privacy of ordinary Americans.
[on camera] I'm just wondering, in that 2003 episode, was Jeff Jonas a help? Were you guys able to use-
BILL YOUNG, Fmr. Sheriff, Clark County, Nevada: I believe he was.
HEDRICK SMITH: The reason I asked is we were actually told that it was used, that he had-
BILL YOUNG: You got a source here that says it was used. You know, I'm not going to disagree with you or argue with you. Did I use it? I'm not saying. Did my department? We may have. Like I said, there's a lot of- there is a lot of privacy concerns and there's a lot of issues, and there's a lot in the weeds when it comes to private information and how it's used. And I'm simply not in a position today, and maybe never will be, to talk about how we use software to match up tourist information with potential terrorism suspects.
ANNOUNCER: [Axciom marketing video] We house 24 terrabytes of on-line systems storage, enough capacity to contain the entire contents of the U.S. Library of Congress 48 times-
HEDRICK SMITH: [voice-over] This is a marketing video for Axciom. Since the 1990s, companies like Axciom, Lexis-Nexis and Choicepoint have marketed their ability to collect vast amounts of data about all of us, from home mortgages to spending habits, and create virtual digital dossiers.
Watergate-era reforms restricted government use of these private information empires. But after 9/11, the Bush administration lifted the restraints and pushed agencies aggressively to use private databases. This internal FBI document, for example, spread the word- "Use Choicepoint to your heart's content."
PETER SWIRE, White House Privacy Counsel, 1999-01 : When it comes to the Privacy Act, the law didn't change, but there's a change in computers that changed everything. It used to be the fear that the government would have the government database in some big room, an IBM Brainiac computer, and the Privacy Act said, "We're going to protect against problems there." Today-
HEDRICK SMITH: [on camera] You can't have a big database-
PETER SWIRE: Yeah, you can't have the big Brainiac with the one database on all Americans run by the government. But here's the trick. What you can do, if you're the FBI, is you can ping the private sector database. "Hey, Lexis-Nexis."
HEDRICK SMITH: You can access it?
PETER SWIRE: You can access it. "Hey, give me some information on this person" or on that person. And as long as you just access it one at a time, which is the way it works anyways, Privacy Act doesn't apply because it's not a government database, it's the private sector database. The law doesn't apply to the private sector data.
HEDRICK SMITH: Why should Americans worry about the government having the same kind of information that private companies have, companies like Choicepoint?
MICHAEL WOODS, FBI National Security Atty., 1997-02: Well, the easy answer is that Choicepoint can't come and arrest you. They can't come search your house. They can't use that information to- to sort of put into motion the machinery of the justice system. Once it's in the hands of the government, it has those consequences, and that's why the government is looking for the information.
LARRY MEFFORD, FBI Assistant Director, 2002-03: If an American company would have access to this data for purposes of conducting business, I guess I would argue why wouldn't you want an agency like the FBI, in charge of national security, to help you protect American lives? And again, it's done, to my knowledge, in accordance with strict guidelines and controls. It's not willy-nilly. There's a structure to the process.
HEDRICK SMITH: [voice-over] Well, not exactly. FBI director Robert Mueller was called on the carpet by Congress this spring for myriad abuses by the FBI in using national security letters to secretly collect private records of American citizens. The FBI had issued 150,000 national security letter requests over the past three years, and the Justice Department's inspector general determined that thousands were improperly issued.
Sen. PATRICK LEAHY (D-VT), Judiciary Committee: I'm deeply disturbed by the Justice Department inspector general's report finding widespread illegal and improper use of national security letters to obtain Americans' phone and financial records.
HEDRICK SMITH: Mueller acknowledged the problem and the dangers.
ROBERT MUELLER, FBI Director: We will correct the deficiencies in our use of national security letters and utilize each of the critical tools Congress has provided us, consistent with the privacy protections and civil liberties that we are sworn to uphold.
HEDRICK SMITH: But the FBI is hardly alone in mining the mountains of commercial data now available. The Government Accounting Office found 199 data-mining projects in more than 50 government agencies. The granddaddy of them all originated inside an elite Defense Department research agency known as DARPA.
ANNOUNCER: [DARPA video] The key to fighting terrorism is information. We must be able to detect, classify, identify and track potential foreign terrorists in a world of noise.
HEDRICK SMITH: This is a DARPA video for TIA, or Total Information Awareness. The concept was to use predictive data mining to detect suspicious patterns of terrorist operations.
ANNOUNCER: -information and human identification at a distance will improve the ability to identify foreign terrorists from a distance.
HEDRICK SMITH: TIA's controversial logo was an all-seeing eye.
ROBERT POPP, Fmr. TIA Deputy Director: If one could imagine that, you know, we have an eye in the sky and we could truly get all the transactions, all the things that that group did to conduct that plot, OK, to conduct that attack, our thesis is, is that that set of transactions across space, time and by some number of people will be a unique signature.
HEDRICK SMITH: TIA's mission, which required access to enormous volumes of personal data, triggered controversy in Congress.
Sen. RON WYDEN (D), Oregon: The Total Information Awareness program is over the line, is invading the civil liberties of law-abiding Americans on U.S. soil.
HEDRICK SMITH: In 2003, Congress cut off funding for TIA. Or so it seemed.
[on camera] Is it true that in that black budget, some of the TIA programs were moved over to the National Security Agency?
[www.pbs.org: How TIA worked]
ROBERT POPP: All I can- I can't- it's classified. I mean, all I can say is that there were elements of our agenda at DARPA that the Congress recognized as being valuable to the point where they said, "Let's not kill them. Let's get them out of DARPA and transition them to another agency within the intelligence community." And I was the guy that did that.
HEDRICK SMITH: Is it inevitable that we're moving towards a world in which this kind of mass data mining and analysis is just going to happen?
ROBERT POPP: I mean, I think it is happening. There's been an explosion of information technology and access to data. I mean, this is what the Internet and all this IT revolution has done. You know, the world is getting digitized. It's ubiquitous, information technology. Access to data is far more easy, and a lot of people see tremendous advantage in being able to tap into that.
HEDRICK SMITH: So we should be having an open discussion about this and then maybe talking about what privacy safeguards are needed in a new world.
ROBERT POPP: Bless you. Absolutely. Absolutely.
HEDRICK SMITH: What do we need to do? Are we just going to have to live with this? Is this going to happen inevitably, and we just have to live with it.
MICHAEL WOODS, FBI National Security Atty., 1997-02: I think that we do need to say, "Look, data mining or fusion of information or connecting the dots, or whatever you want to call it, is clearly going to be a huge feature of our law enforcement national security apparatus. Let's start crafting a set of rules for it."
[www.pbs.org: Do we need a new privacy law?]
LARRY MEFFORD, FBI Assistant Director, 2002-03: I always said, when I was in my position running counterterrorism operations for the FBI, "How much security do you want, and how many rights do you want to give up?" I can give you more security, but I've got to take away some rights. And so there's a balance. Personally, I want to live in a country where you have a common-sense, fair balance because I'm worried about people that are untrained, unsupervised, doing things with good intentions that at the end of the day, harm our liberties.
HEDRICK SMITH: [voice-over] Back in December 2003, Sheriff Bill Young ultimately decided to carry on with Las Vegas's New Year's celebrations.
[on camera] So your conclusion was, a day or two or three before New Year's Eve, that the threat wasn't that hard.
BILL YOUNG: Well, it- it wasn't specific enough to me as to time, method or place for me to make the call to say, "Let's cancel this New Year's Eve celebration."
HEDRICK SMITH: It was too vague.
BILL YOUNG: Too vague.
HEDRICK SMITH: [voice-over] Long after the celebrations were over, Stephen Sprouse and Kristin Douglas received the disquieting news that they had been swept up in that FBI data dragnet.
[on camera] You found out afterwards that all the hotel records were collected. What went through your head when you heard that?
KRISTIN DOUGLAS: They have no reason to be looking at me. I don't think that I've done anything to raise any suspicion. So I mean, just being in Las Vegas on New Year's shouldn't be enough for them to say, "Well, you know, she might be a terrorist."
ELLEN KNOWLTON, FBI Chief, Las Vegas, 2002-06: I just tell people that we made every effort to safeguard the privacy of everyone whose records were accessed. There was no breach. The information was closely safeguarded.
HEDRICK SMITH: [voice-over] The FBI says it held all the data from Vegas for more than two years but has now destroyed it all.
STEPHEN SPROUSE: I work with data. I mean, you know, if it's on the computer, it's not really ever gone. It's on a tape. It's on a back-up. It's on a drive somewhere.
HEDRICK SMITH: A more fundamental question confronts all of us. The 4th Amendment protects us against unreasonable search and seizure without probable cause. So does the strategy of prevention collide with the Constitution?
[on camera] When the government is doing this kind of data mining, has it moved from individualized suspicion, getting an individual warrant, to generalized suspicion, to check everybody to find out who are the bad guys?
PETER SWIRE: Yeah. Check everybody. Everybody's a suspect. Everybody's phone records, everybody's email is subject to government scrutiny. And if you're good, we won't bother you, and if you look a little strange, then you might get on a watch list.
HEDRICK SMITH: Isn't that a huge change in Anglo-Saxon law? I mean, Anglo-Saxon law is based on "Get a warrant." The 4th Amendment is based on individual suspicion.
PETER SWIRE: Right. General warrants was part of the reason for the American Revolution. It was that the king's agent could go in and search a house everywhere, search a whole neighborhood with one warrant. And the Boston people said, "We don't like that. We'll have a tea party. We'll fight you." We said no.
JOHN YOO, Justice Dept. Sr. Attorney, 2001-03: Look, there's no doubt that there are important 4th Amendment issues here. One is, is this a reasonable search and seizure? You can still have warrantless searches, but they have to be reasonable. And then the second question is, does that restriction apply to wartime operations? We don't require a warrant, we don't require reasonable searches and seizures when the army- the military's out on the battlefield attacking, killing members of the enemy.
HEDRICK SMITH: But that's usually abroad, and it doesn't involve the American homeland and American citizens.
JOHN YOO: But this gets to my point is, do you want to make it more difficult for our government to try to stop terrorists attacks? The closer that members of al Qaeda get to the United States, the closer they get to striking our cities, as they did on 9/11, you want to make it more legally difficult for the government to stop that? I don't think so.
MICHAEL WOODS: In our tradition of law, there is this idea that there is private space around the individual- you know, the individual's home, their papers, as it says in the Constitution- that there is this- there is a sphere around you that the government can't come into without meeting this level of suspicion.
And what I see in all of these developments is the sphere is getting smaller and smaller. You know, we're allowing access to much more information, so that maybe the government can't come into that sphere, but they can go all the way around it. They can get the contours, the outlines of your daily life through a lot of this information that isn't protected as well. And I think that's what's eroding.
SUZANNE SPAULDING, Fmr. CIA Senior Attorney: So many people in America think this does not affect them. They've been convinced that these programs are only targeted at suspected terrorists. "I'm not engaged in any terrorist activities. Therefore, this does not concern me. There's no way in which I'm going to be caught up in this activity."
HEDRICK SMITH: And you think that's wrong.
SUZANNE SPAULDING: And I think that's wrong. I think that- as I said, I think our technology is not perfect, our programs are not perfect, and it is inevitable that totally innocent Americans are going to be affected by these programs.
STEPHEN SPROUSE: It seems to be like the beginning of, "We're going to treat everyone like a bad guy to begin with, knowing that most of them are not bad guys, but we're going to start with the assumption that everybody is a bad guy. And then if we just collect the right stuff and connect the right dots, we'll find the real bad guys."
HEDRICK SMITH: Did you find any terrorists?
ELLEN KNOWLTON: No. No, we didn't.
HEDRICK SMITH: So when you got to the bottom of it, you found nothing.
ELLEN KNOWLTON: Which was on about the 29th of December. We had gone through everything, and we had- had no- no identifiable- no known terrorists or terrorist associates.
HEDRICK SMITH: [voice-over] Later we learned that, in fact, the original intelligence warning about Las Vegas was mistaken. In decoding a suspected al Qaeda message, someone got it wrong.
Spying On The Home Front
PRODUCED and DIRECTED BY
Rick Young
WRITTEN BY
Hedrick Smith & Rick Young
CORRESPONDENT AND SENIOR PRODUCER
Hedrick Smith
EDITOR
Anthony Szulc
PRINCIPAL CAMERA
Peter Pearce
Foster Wiley
ASSOCIATE PRODUCER
Catherine Rentz Pernot
PRODUCTION ASSISTANT
Fritz Kramer
ORIGINAL MUSIC
Eric Kaye
ADDITIONAL CAMERA
Catherine Rentz Pernot
Chet Chabuk
SOUND
Paul Rusnak
Luis Granados
Tracy Shreve
Robert Sullivan
Don Hooper
ONLINE EDITOR
Jim Ferguson
SOUND MIX
Jim Sullivan
MOTION CONTROL
Berle Cherney
GRAPHICS
Todd Gardner
Andrew Huang
John MacGibbon
PRODUCTION COORDINATOR
Janina Roncevic
BUDGET ASSISTANT
Suzanne Snyder
RESEARCH ASSISTANTS
Kathryn Connelly
Woodrow Chris Covington
Katelyn Espley-Jones
Christina Frenzel
Alex Payne
Malia Politzer
TRANSCRIBERS
Patti Pancoe
Suzanne Pardee
ARCHIVAL MATERIALS
ABCNews VideoSource
American Civil Liberties Union
Getty Images
GeoEye
Jordan Friedberg
KVBC 3 Las Vegas
MacNeil / Lehrer Productions
Prof. James W. Davis, Ohio State University
PJ Productions II
Robert Popp/ Defense Advanced Research Projects Agency
Stephen Sprouse and Kristin Douglas
The Las Vegas Convention and Visitors Authority
The National Security Agency
The Office of Senator Patrick Leahy
The Office of Senator Ron Wyden
Video Monitoring Service
WGBH
SPECIAL THANKS
Arnold & Porter
James Fitzpatrick
Shane Harris
David Nye
FOR FRONTLINE
DIRECTOR OF BROADCAST
Tim Mangini
POST PRODUCTION
DIRECTOR
Chris Fournelle
ON AIR PROMOTION
PRODUCER
Missy Frederick
SENIOR AVID EDITOR
Steve Audette
AVID EDITORS
Jim Ferguson
John MacGibbon
Julie Kahn
ASSISTANT EDITOR
Ming Xue
POST PRODUCTION
ASSISTANT
Erin Anguish
SERIES MUSIC
Mason Daring
Martin Brody
SENIOR PUBLICIST
Diane Buxton
OUTREACH MANAGER
Sandy St. Louis
PUBLICISTS
Paula Fleming
Diane Hebert Farrell
INTERACTIVE MARKETER
Jessica Smith
PROMOTION DESIGNER
Peter Lyons
ASSOCIATE PUBLICIST
Phil Zimmerman
MARKETING CONSULTANT
Kito Cetrulo
SECRETARY
Nina Hazen
ADMINISTRATIVE ASSISTANT
Susanna Thompson
ASSOCIATE RESEARCHER
Kirsti Potter
COMPLIANCE MANAGER
Lisa Palone
LEGAL
Eric Brass
Jay Fialkov
Janice Flood
Scott Kardel
CONTRACTS MANAGER
Cynthia Ahn
UNIT MANAGER
Mary Sullivan
BUSINESS MANAGER
Tobee Phipps
WEBSITE ASSOCIATE DEVELOPER
Bill Rockwood
WEBSITE RESEARCH ASSISTANT
David Kieley
WEBSITE PRODUCER
Richard Parr
WEBSITE COORDINATING
PRODUCER
Sarah Moughty
STORY EDITOR
Catherine Wright
DIRECTOR OF NEW MEDIA
AND TECHNOLOGY
Sam Bailey
COORDINATING PRODUCER
Robin Parmelee
SENIOR PRODUCER
SPECIAL PROJECTS
Sharon Tiller
SENIOR EDITOR
Ken Dornstein
EDITORIAL DIRECTOR
Marrie Campbell
SERIES MANAGER
Jim Bracciale
EXECUTIVE PRODUCER
SPECIAL PROJECTS
Michael Sullivan
EXECUTIVE EDITOR
Louis Wiley Jr.
EXECUTIVE PRODUCER
David Fanning
A FRONTLINE coproduction with Hedrick Smith Productions, Inc.
© 2007
WGBH EDUCATIONAL FOUNDATION
ALL RIGHTS RESERVED
FRONTLINE is a production of WGBH Boston, which is solely responsible for its content.
ANNOUNCER: This report continues on our Web site, where you can watch the full program again on line, get experts' analyses on the issues explored in this report, read intelligence insiders' details about the NSA and its history with the telecom industry, and an essay by correspondent Hedrick Smith on the post-9/11 shift to preemption. Then join the discussion at PBS.org.
Next time on FRONTLINE:
- He's been so vehemently anti-gay.
ANNOUNCER: A conservative mayor-
- And now we find him in Gay.com.
ANNOUNCER: -an aggressive newspaper-
- What if he's using the Internet to have sex with underage boys?
ANNOUNCER: -and a story that took apart a man's life.
- The worst thing you can say about somebody is that they're a sexual predator. How do you refute that?
ANNOUNCER: FRONTLINE examines the conflict between the public interest and A Hidden Life next time on FRONTLINE.
To order FRONTLINE's Spying on the Home Front on DVD, call PBS Home Video at 1-800-PLAY PBS. [$24.99 plus s&h]
FRONTLINE is made possible by contributions to your PBS station from viewers like you. Thank you.
Additional funding for FRONTLINE is provided by the Park Foundation, with additional funding for this program from the Jeht Foundation.
home . introduction . watch online . pre-emption . interviews . analysis . what happens in vegas... . join the discussion
correspondent's chat . readings & links . site map . dvd & transcript . press reaction
credits . privacy policy . journalistic guidelines . FRONTLINE series home . wgbh . pbs
posted may. 15, 2007
FRONTLINE is a registered trademark of wgbh educational foundation.
camera photograph © john wilkes studio/corbis
web site copyright WGBH educational foundation