FastSaying
In the urgent aftermath of Sept. 11, 2001, with more attacks thought to be imminent, analysts wanted to use 'contact chaining' techniques to build what the NSA describes as network graphs of people who represented potential threats.
Barton Gellman
Aftermath
Analyst
Attacks
Build
Contact
Imminent
More
Network
NSA
People
Potential
Sept
Techniques
Thought
Threats
Urgent
Use
Wanted
Who
Related Quotes
The NSA's business is 'information dominance,' the use of other people's secrets to shape events.
— Barton Gellman
Business
Dominance
Events
Counterterrorism analysts have known for years that al Qaeda prepares for attacks with elaborate 'targeting packages' of photographs and notes.
— Barton Gellman
Al
Analyst
Attacks
The causes and severity of NSA infractions vary widely. One in 10 incidents is attributed to a typographical error in which an analyst enters an incorrect query and retrieves data about U.S phone calls or emails.
— Barton Gellman
About
Analyst
Attributed
NSA surveillance is a complex subject - legally, technically and operationally.
— Barton Gellman
Complex
Legally
Nsa
I have no evidence of any relationship between IRS and NSA.
— Barton Gellman
Any
Between
Evidence