Well, after searching all over for the answer to your question, which I wanted to discover for myself as well, I returned to one of my favorite bloggers (eriposte), on one of my favorite sites (the leftcoaster) and voila!
(btw, SDRC=
the Shills for Republican-Dictators Coalition... - formerly known as "Conservatives")
King-George-gate takes an unexpected turn
...Setting aside this new garbage, it looks like the real story may be even more appalling and unfriendly to the SRDC. Via the indispensable Laura Rozen, we see a different revelation in Slate by Shane Harris and Tim Naftali (emphasis mine):
A former telecom executive told us that efforts to obtain call details go back to early 2001, predating the 9/11 attacks and the president's now celebrated secret executive order. The source, who asked not to be identified so as not to out his former company, reports that the NSA approached U.S. carriers and asked for their cooperation in a "data-mining" operation, which might eventually cull "millions" of individual calls and e-mails.
Like the pressure applied to ITT a half-century ago, our source says the government was insistent, arguing that his competitors had already shown their patriotism by signing on. The NSA would not comment on the issue, saying that, "We do not discuss details of actual or alleged operational issues."
There's more at Slate about the NSA operation, but, as Laura says:
The NSA getting access to all of this domestic telecommunications information from private companies ahead of September 11th didn't stop the big terrorist attack.
http://www.theleftcoaster.com/cgi-bin/mt-tb.cgi/3436You can also read more information about all this here:
http://www.nytimes.com/2006/01/04/politics/04nsa.html?hp&ex=1136350800&en=7709e127186eb686&ei=5094&partner=homepage(NYT article, which I myself have not checked out as it requires a subscription)
...and here:
http://www.warandpiece.com/blogdirs/003396.html (Laura Rosen)
Here's some from the Slate article (Jan. 3, 2006) on this issue:
Tinker, Tailor, Miner, Spy
Why the NSA's snooping is unprecedented in scale and scope.
By Shane Harris and Tim Naftali
Posted Tuesday, Jan. 3, 2006, at 6:30 AM ET
Fifty years ago, officers from the Signal Security Agency, the predecessor to the National Security Agency, visited an executive from International Telephone and Telegraph and asked for copies of all foreign government cables carried by the company. The request was a direct violation of a 1934 law that banned the interception of domestic communications, but Attorney General Tom Clark backed it. Initially reluctant, ITT relented when told that its competitor, Western Union, had already agreed to supply this information. As James Bamford relates in his book The Puzzle Palace, the government told ITT it "would not desire to be the only non-cooperative company on the project." Codenamed Shamrock, the effort to collect cables sent through U.S.-controlled telegraph lines ultimately involved all the American telecom giants of the era, captured private as well as government cables, and lasted nearly 30 years. Like other illegal Cold War domestic snooping programs —such as the FBI's wiretaps without warrants and the CIA's mail-opening operations—it collapsed under the weight of public reaction to the abuses of executive power revealed by Vietnam and Watergate.
Today's generation of telecom leaders is similarly involved in the current controversy over spying by the NSA. The New York Times reported in December that since 9/11, leading telecommunications companies "have been storing information on calling patterns and giving it to the federal government to aid in tracking possible terrorists." Citing current and former government and corporate officials, the Times reported that the companies have granted the NSA access to their all-important switches, the hubs through which colossal volumes of voice calls and data transmissions move every second. A former telecom executive told us that efforts to obtain call details go back to early 2001, predating the 9/11 attacks and the president's now celebrated secret executive order. The source, who asked not to be identified so as not to out his former company, reports that the NSA approached U.S. carriers and asked for their cooperation in a "data-mining" operation, which might eventually cull "millions" of individual calls and e-mails.
Like the pressure applied to ITT a half-century ago, our source says the government was insistent, arguing that his competitors had already shown their patriotism by signing on. The NSA would not comment on the issue, saying that, "We do not discuss details of actual or alleged operational issues."
The magnitude of the current collection effort is unprecedented and indeed marks a shift in how the NSA spies in the United States. The current program seems to involve a remarkable level of cooperation with private companies and extraordinarily expansive data-mining of questionable legality. Before Bush authorized the NSA to expand its domestic snooping program after 9/11 in the secret executive order, the agency had to stay clear of the "protected communications" of American citizens or resident aliens unless supplied by a judge with a warrant. The program President Bush authorized reportedly allows the NSA to mine huge sets of domestic data for suspicious patterns, regardless of whether the source of the data is an American citizen or resident. The NSA needs the help of private companies to do this because commercial broadband now carries so many communications. In an earlier age, the NSA could pick up the bulk of what it needed by tapping into satellite or microwave transmissions. "Now," as the agency noted in a transition document prepared for the incoming Bush administration in December 2000, "communications are mostly digital, carry billions of bits of data, and contain voice, data and multimedia. They are dynamically routed, globally networked and pass over traditional communications means such as microwave or satellite less and less."
http://www.slate.com/id/2133564/ (Shane Harris and Tim Naftali)