see also
http://www.secondaryscreening.net/
"When asked why the president didn’t ask for Congressional authority for this wiretapping, Gonzales said:
We’ve had discussions with members of Congress, certain members of Congress, about whether or not we could get an amendment to FISA, and we were advised that was not likely to be – that was not something we could likely get, certainly not without jeopardizing the existence of the program, and therefore, killing the program.
Terrorists and dictators already know their communications can and will be tapped. But what technology don’t they know about that the NSA is using here?
Hayden also hinted today that the wiretaps involved suspicions below the level of probable cause.
And here the key is not so much persistence as it is agility. It’s a quicker trigger. It’s a subtly softer trigger. And the intrusion into privacy – the intrusion into privacy is significantly less. It’s only international calls. The period of time in which we do this is, in most cases, far less than that which would be gained by getting a court order.
And is the period of time shorter in most cases, because the net starts very wide and then is narrowed as the eavesdropping continues?
And what does that “softer trigger” mean? That the program relies on some standard much lower than probable cause as applied to an individual? Maybe something like probable cause to believe someone from the state of Virginia is calling a terrorist?
So does the executive order turn the NSA’s ears, data-mining supercomputers and real time transcription powers on ALL calls leaving the U.S. that are bound for Pakistan, Afghanistan, Iran, Somalia and Iraq?
If that’s the case, then that’s the equivalent of the Catholic Church revealing that for the past three hundred years, the Vatican hasn’t believed in the Pope’s infallibility.
Rule number one at the NSA is don’t spy on Americans.
Rule number two at the NSA is don’t talk about the NSA.
This story broke because some at the NSA broke rule number two because they think that rule number one was broken.
The other possibility, suggested to me by someone with experience with wiretapping, is that the NSA may have compromised a hardware manufacturer – say Motorola or a satellite phone manufacturer, a telecom carrier or a satellite(s).
In any of those scenarios, the NSA would not have to intercept any signals since they would be diverted at the hardware level to the agency. Such power might also give the agency the ability to conduct man-in-the-middle attacks on encrypted communications."