Ragtime: Code name of NSA’s Secret Domestic Intelligence Program Revealed in New Book

“Deep State” uncovers new details about the agency’s secretive and hugely controversial surveillance programs.By Shane Harris
Comments (32) | Published February 27, 2013

More than a decade after the 9/11 terrorist attacks, a set of extraordinary and secretive surveillance programs conducted by the National Security Agency has been institutionalized, and they have grown. 

These special programs are conducted under the code name Ragtime, and are divided into several subcomponents, according to the new book Deep State: Inside the Government Secrecy Industry, by Marc Ambinder and D.B. Grady. (I purchased a copy this morning.) 

The authors, both journalists who cowrote a previous book about special operations in the military, have dug deep into the code names and operational nitty gritty of the NSA's secretive and hugely controversial surveillance programs, and they've come up with impressive new details. 

Ragtime, which appears in official reports by the abbreviation RT, consists of four parts. 

Ragtime-A involves US-based interception of all foreign-to-foreign counterterrorism-related data;  

Ragtime-B deals with data from foreign governments that transits through the US; 

Ragtime-C deals with counterproliferation actvities; 

and then there's Ragtime-P, which will probably be of greatest interest to those who continue to demand more information from the NSA about what it does in the United States. 

P stands for Patriot Act. Ragtime-P is the remnant of the original President’s Surveillance Program, the name given to so-called "warrantless wiretapping" activities after 9/11, in which one end of a phone call or an e-mail terminated inside the United States. That collection has since been brought under law, but civil liberties groups, journalists, and legal scholars continue to seek more information about what it entailed, who was targeted, and what authorities exist today for domestic intelligence-gathering. 

Deep State has some answers.  

Only about three dozen NSA officials have access to Ragtime's intercept data on domestic counter-terrorism collection. That's a tiny handful of the agency's workforce, which has been pegged at about 30,000 people.  

As many as 50 companies have provided data to this domestic collection program, the authors report. 

If the NSA wants to collect information on a specific target, it needs one additional piece of evidence besides its own "link-analysis" protocols, a computerized analysis that assigns probability scores to each potential target. This is essentially a way to use a computer data-mining program to help determine whether someone is a national security threat. But the authors find that this isn't sufficient if NSA wants to collect on said target. And while the authors found that the Foreign Intelligence Surveillance Court rarely rejects Ragtime-P requests, it often asks the NSA to provide more information before approving them.   

How the surveillance is approved tells us a lot about the breadth of the NSA's intelligence gathering. The court and the Attorney General both certify a slate of approved targets under Ragtime-P, the authors find. That includes a certain amount of "bulk data"—such as phone call logs and records—that can be collected around those targets. An NSA official told the authors that Ragtime-P can process as many as 50 different data sets at one time. 

What happens next looks like a 21st-century data assembly line. At the NSA's headquarters in Fort Meade, Maryland, a program called Xkeyscore processes all intercepted electronic signals before sending them to different "production lines" that deal with specific issues. Here, we find another array of code names. 

Pinwale is the main NSA database for recorded signals intercepts, the authors report. Within it, there are various keyword compartments, which the NSA calls "selectors." 

Metadata (things like the "To" and "From" field on an e-mail) is stored in a database called Marina. It generally stays there for five years. 

In a database called Maui there is "finished reporting," the transcripts and analysis of calls. (Metadata never goes here, the authors found.) 

As all this is happening, there are...REST OF IT

Views: 37

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Doc Vega posted a blog post

Why Did We Americans Become so Cynical? At Least Those Who Think

 Cynicism is a form of counter intelligence. It materializes when the general public has been…See More
4 hours ago
tjdavis posted a video
17 hours ago
Doc Vega posted blog posts
yesterday
cheeki kea commented on Snakedaddy's album
Thumbnail

a soon shit

"lol at first I thought this was an acronym or phase meaning an urgent trip to the lavatory but alas…"
yesterday
tjdavis posted a video

Europe will be an Islamic Muslim State

සිංහලෙන් කියවන්න http://sinhalabuddhist.comSlavery, Terrorism and Islam: The Historical Roots and Contemporary Threat.. Adapted from Dr. Peter Hammond's book...
Monday
Sandy posted a video

A conversation with Charlotte Iserbyt

“The Deliberate Dumbing Down of America — A Chronological Paper Trail”, will change forever the way you look at your child’s education. Written by whistleblo...
Monday
Doc Vega posted a blog post

Realizations

Used to think I had something special to bringThat I was seeing what others weren't seeingThe…See More
Sunday
Burbia replied to cheeki kea's discussion Tartaria
"I forget some written language reads from right to left. The various calendars used up to now from…"
Sunday
Less Prone favorited Burbia's blog post Mystery illness strikes Russia with fever, blood symptoms, and no cure in sight.
Sunday
Less Prone commented on Burbia's blog post Mystery illness strikes Russia with fever, blood symptoms, and no cure in sight.
"Sounds like a bioweapon"
Sunday
Doc Vega commented on Doc Vega's blog post Through Her Disguise
"cheeki kea Thank you so much your words are  always inspirational. But, when the word joy…"
Sunday
Sandy posted a photo
Sunday
cheeki kea replied to cheeki kea's discussion Tartaria
"The early writing."
Saturday
cheeki kea commented on Doc Vega's blog post Through Her Disguise
"Spoken like a true poet. I wanted to reply to your comment but had to think on it for awhile. My…"
Friday
Doc Vega posted blog posts
Apr 10
Snakedaddy posted a photo
Apr 10
Snakedaddy commented on Snakedaddy's album
Thumbnail

a soon shit

"a soon shit"
Apr 10
Snakedaddy posted a photo
Apr 10
cheeki kea replied to cheeki kea's discussion Tartaria
"Thanks for reply Burbia. Language wise there appears to be Hungarian sub branch component to it…"
Apr 10
tjdavis posted a video

Passing Strange- Keys/ It's Alright

I do not own the rights to this video... But it is Helluva awesome.
Apr 9

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted