NSA collects data from millions of cellphones daily
Program seeks to identify individuals who communicate with tagets of NSA surveillance, report says
Computerworld - The U.S. National Security Agency is collecting location data daily from tens of millions of cellphones around the world, the Washington Post reported Wednesday.
The report is based on documents obtained from former NSA contractor turned document leaker Edward Snowden and interviews with U.S. officials.
The five billion or so cellphone records collected by the agency every day include data on millions of Americans who use personal devices while traveling aboard.
Since Snowden began leaking information in June, there has been a string of stories detailing varied NSA data collection programs.
The disclosures have raised widespread security and privacy concerns around the world and have spawned calls for greater transparency and oversight over NSA data collection activities.
In a statement, the American Civil Liberties Union expressed dismay at the sheer scale and scope of the program described yesterday.
"It is staggering that a location-tracking program on this scale could be implemented without any public debate, particularly given the substantial number of Americans having their movements recorded by the government," the civil liberties group said.
"The dragnet surveillance of hundreds of millions of cell phones flouts our international obligation to respect the privacy of foreigners and Americans alike," the ACLU said
The collected cellphone data is fed into a massive database from where it's combed with a suite of sophisticated analytic tools collectively dubbed CO-TRAVELER, the report aid. The tools let NSA analysts to identify cellphones and quickly retrace their movements to find hidden relationships among the people using them, the Post said, citing unnamed sources.
CO-TRAVELER algorithms allow NSA analysts to correlate the movements of millions of cellphones to find hidden patterns.
The analytics suite includes tools that can map the date, time and location of cellphones to find significant moments of overlap. "Other tools compute speed and trajectory for large numbers of mobile devices, overlaying the electronic data on transportation maps to compute the likely travel time and determine which devices might have intersected," the Post said in its report.
Individuals who use disposable phones, or who switch on their phones only long enough to make calls, are usually marked for special attention by the NSA. CO-TRAVELER is designed, for instance, to note when a new phone connects to a cell tower soon after an existing phone is used for the last time, the Post report said.
The apparent goal of the massive data collection effort is to identify people meeting overseas with foreign intelligence targets.
The NSA gets much of the cellphone data directly from cables linking the networks of major U.S and international mobile service providers. The spy agency also works with at least two large corporate partners, identified only as ARTIFICE and WOLFPOINT, to administer and manage the equipment used to intercept and collect the data.
Though the NSA does not collect location data on Americans by design, in reality the agency ends up collecting metadata, including detailed location information, on potentially millions of Americans, the Post report said.
U.S. intelligence officials told the newspaper that the cell phone data collection program i legal and aims only to acquire information about foreign intelligence targets. No U.S. intelligence agency deliberately collects bulk information from cellphones in the United States, agency officials claimed.
An NSA spokeswoman on Wednesday declined a Computerworld request for comment on the report.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His email address is email@example.com.
- Privacy jitters derail controversial K-12 big data initiative
- 3 privacy violations you shouldn't worry about
- U.S. commercial drone industry struggles to take off
- Snowden leaks erode trust in Internet companies, government
- NSA phone metadata collection program renewed for 90 days
- NSA isn't evil, says noted civil libertarian
- Franken presses Ford on location data collection practices
- Justices let stand appeals court decision on border searches of laptops
- California lawmakers move to bar state help to NSA
- Appeals court again nixes Google's bid to overturn Street View case
Read more about Privacy in Computerworld's Privacy Topic Center.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Infographic: Converged Infrastructure Benefits This Infographic quantifies the savings organizations are realizing from increased deployment speed, higher availability, and lower annual costs.
- CIOs Deliver Productivity Breakthroughs with Intelligent Digital Signage Retailers have long recognized the influence that digital signage provides over a shopper's point-of-purchase decision making process.
- Going Paperless? Here's What You Need to Think About As makers of some of the world's most popular PDF solutions, we often consult with businesses & governmental agencies that have the goal...
- The Big Data Opportunity for HR and Finance If CEOs, CFOs, CIOs, and CHROs want to drive their businesses forward, they will need to quickly recognize the enormous value of big...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to... All Privacy White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!