
Within minutes of the strikes, U.S. law-enforcement and intelligence-gathering authorities mobilized to find the culprits and prevent another attack. They ramped up the tapping of Americans' phone calls and voicemails. They watched Internet traffic and e-mails as never before. They tailed greater numbers of people and into places previously deemed off-limits, such as mosques.
They clandestinely accessed bank and credit card transactions and school records. They monitored travel. And they broke into homes without notice, looking for signs of terrorist activity and copying entire file cabinets and computer hard drives.
Authorities even tried to get inside peoples' heads, using supercomputers and "predictive" software to analyze enormous amounts of personal data about them and their friends and associates in an effort to foretell who might become a terrorist, and when.
No comments:
Post a Comment