Wednesday, December 4, 2013

NSA tracking billions of cellphones around world, documents say

NSA tracking billions of cellphones around world, documents say

The Seattle Times - ‎3 hours ago‎
In scale, scope and potential impact on privacy, the efforts to collect and analyze cellphone-location data may be unsurpassed among the NSA surveillance programs that have been disclosed since June.
NSA collects 5 billion cell phone records globally per day says report
NSA is said to collect cellphone location data across the world
NSA tracking cellphone locations worldwide, Snowden documents show
Report: NSA Tracks Billions Of Cellphones Daily

NSA tracking billions of cellphones around world, documents say

In scale, scope and potential impact on privacy, the efforts to collect and analyze cellphone-location data may be unsurpassed among the NSA surveillance programs that have been disclosed since June.

The Washington Post
Most Popular Comments
Hide / Show comments
Seems like all a terrorist would need to do to thwart this is to keep using different... MORE
Words fail me. Thought I lived in Seattle, not Stalingrad. MORE
"Those who would give up essential liberty to purchase a little temporary safety... MORE
advertising
Click here
The National Security Agency (NSA) is gathering nearly 5 billion records a day on the whereabouts of cellphones around the world, according to top-secret documents and interviews with U.S. intelligence officials, enabling the agency to track the movements of individuals — and map their relationships — in ways that would have been previously unimaginable.
The records feed a vast database that stores information about the locations of at least hundreds of millions of devices, according to the officials and the documents, which were provided by former NSA contractor Edward Snowden. New projects created to analyze that data have provided the intelligence community with what amounts to a mass surveillance tool.
The NSA does not target Americans’ location data by design, but the agency acquires a substantial amount of information on the location of domestic cellphones “incidentally,” a legal term that connotes a foreseeable but not deliberate result.
One senior collection manager, speaking on condition of anonymity but with permission from the NSA, said: “We are getting vast volumes” of location data from around the world by tapping into the cables that connect mobile networks globally and that serve U.S. cellphones, as well as foreign ones. Additionally, data is often collected from the tens of millions of Americans who travel abroad with their cellphones every year.
In scale, scope and potential impact on privacy, the efforts to collect and analyze location data may be unsurpassed among the NSA surveillance programs that have been disclosed since June. Analysts can find cellphones anywhere in the world, retrace their movements and expose hidden relationships among individuals using them.
U.S. officials said the programs that collect and analyze location data are lawful and intended strictly to develop intelligence about foreign targets.
Robert Litt, general counsel for the Office of the Director of National Intelligence, which oversees the NSA, said: “There is no element of the intelligence community that under any authority is intentionally collecting bulk cellphone location information about cellphones in the United States.”
The NSA has no reason to suspect that the movements of most cellphone users would be relevant to national security. Rather, it collects locations in bulk because its most powerful analytic tools — known collectively as CO-TRAVELER — allow it to look for unknown associates of known intelligence targets by tracking people whose movements intersect.
Still, location data, especially when aggregated over time, is widely regarded among privacy advocates as uniquely sensitive. Sophisticated mathematical techniques enable NSA analysts to map cellphone owners’ relationships by correlating their patterns of movement over time with thousands or millions of other phone users who cross their paths. Cellphones broadcast their locations even when they are not being used to place a call or send a text.
CO-TRAVELER and related tools require the methodical collection and storage of location data on what amounts to a planetary scale. The government is tracking people from afar into confidential business meetings or personal visits to medical facilities, hotel rooms, homes and other traditionally protected spaces.
“One of the key components of location data, and why it’s so sensitive, is that the laws of physics don’t let you keep it private,” said Chris Soghoian, principal technologist at the American Civil Liberties Union (ACLU). People who value their privacy can encrypt their emails and disguise their online identities, but “the only way to hide your location is to disconnect from our modern communication system and live in a cave.”
The NSA cannot know in advance which tiny fraction of 1 percent of the records it may need, so it collects and keeps as many as it can — 27 terabytes, by one account, or more than double the text content of the Library of Congress’s print collection.
The location programs have brought in such volumes of information, according to a May 2012 internal NSA briefing, that they are “outpacing our ability to ingest, process and store” data. In the ensuing year and a half, the NSA has been transitioning to a processing system that provided it with greater capacity.
The possibility that the intelligence community has been collecting location data, particularly of Americans, has long concerned privacy advocates and some lawmakers. Three Democratic senators — Ron Wyden of Oregon, Mark Udall of Colorado and Barbara Mikulski of Maryland — have introduced an amendment to the 2014 defense-spending bill that would require U.S. intelligence agencies to say whether they have ever collected or made plans to collect location data for “a large number of United States persons with no known connection to suspicious activity.”
The number of Americans whose locations are tracked as part of the NSA’s collection of data overseas is impossible to determine from the Snowden documents alone, and senior intelligence officials declined to offer an estimate.
“It’s awkward for us to try to provide any specific numbers,” one intelligence official said in a telephone interview. An NSA spokeswoman who took part in the call cut in to say the agency has no way to calculate such a figure.
An intelligence lawyer, speaking with his agency’s permission, said location data is obtained by methods “tuned to be looking outside the United States,” a formulation he repeated three times. When U.S. cellphone data is collected, he said, the data is not covered by the Fourth Amendment, which protects Americans against unreasonable searches and seizures.
According to top-secret briefing slides, the NSA pulls in location data around the world from 10 major “sigads,” or signals intelligence activity designators.
A sigad known as STORMBREW, for example, relies on two unnamed corporate partners described only as ARTIFICE and WOLFPOINT. According to an NSA site inventory, the companies administer the NSA’s “physical systems,” or interception equipment, and “NSA asks nicely for tasking/updates.”
The agency’s access to carriers’ networks appears to be vast.
“Many shared databases, such as those used for roaming, are available in their complete form to any carrier who requires access to any part of it,” said Matt Blaze, an associate professor of computer and information science at the University of Pennsylvania. “This ‘flat’ trust model means that a surprisingly large number of entities have access to data about customers that they never actually do business with, and an intelligence agency — hostile or friendly — can get ‘one-stop shopping’ to an expansive range of subscriber data just by compromising a few carriers.”
The NSA’s capabilities to track location are staggering, based on the Snowden documents, and indicate the agency is able to render most efforts at communications security effectively futile.
Like encryption and anonymity tools online, which are used by dissidents, journalists and terrorists alike, security-minded behavior — using disposable cellphones and switching them on only long enough to make brief calls — marks a user for special scrutiny. CO-TRAVELER takes note, for example, when a new telephone connects to a cell tower soon after another nearby device is used for the last time.
Washington Post staff writer Julie Tate contributed to this report. Soltani is an independent security researcher and consultant.

  end quote from:

NSA tracking billions of cellphones around world, documents say

However, it is important to note that "Tracking" actually means they know the "location" of every cell phone on earth all the time. This is done through the GPS part of the phone. However, all phone calls only work through the GPS as well. In order for any phone call to work the phone company has to locate the location of the phone through GPS so it can send the phone signals for conversations to occur to the right microwave towers. So, "Tracking" a cell phone occurs anytime a cell phone is on in order to send or receive a phone call anywhere on earth. So, actually, the records of where every phone is every given moment is known by the phone companies all the time that that phone has a service through. Otherwise no phone calls could be sent or received ever.

No comments: