Feeds

NSA collects up to FIVE BILLION mobile phone locations daily

Latest Snowden leaks expose massive mobile surveillance

The essential guide to IT transformation

The NSA is maintaining a mobile device tracking program that logs up to five billion updates per day around the world, according to a new report.

The Washington Post, citing government sources and documents leaked by Edward Snowden, reports that the US intelligence agency has built a massive database of locational information gathered as part of its wiretapping activities that can be used to map out user activity around the globe.

According to the report, the locational data is not deliberately targeted by authorities, but rather is obtained when the agency targets a single individual's mobile activities and monitors that person's communications.

In the process of collecting the surveillance data, the NSA is said to also be obtaining locational information from other handsets which connect to a mobile communications tower or wi-fi hotspot to initiate communications. This allows the NSA to gather locational data on all devices within a certain area at any given time.

The report suggests that the collected information is used by the NSA to identify possible associates and accomplices for a known target. By analyzing the locational data and finding common numbers across logs on multiple towers, analytics tools are able to eventually spot devices which appear alongside the target.

Government sources told the post that the collection is only being used to track possible 'co-travelers' and has not been deemed by NSA officials to be illegal surveillance.

The report did not mention any involvement from the GCHQ, though the UK intelligence service has previously proven to be deeply involved with the NSA on many of the electronic surveillance activities brought to light by former contractor Snowden.

The revelation is the latest in what has already proven to be a government surveillance program whose scope reaches beyond anything previously imagined by most citizens. That program has included massive collections of phone records, web correspondence and surfing activities by individuals suspected of terrorism and serious crimes.

The revelations have triggered a debate over the extent to which governments should have surveillance capabilities and has brought backlash from many firms in the private sector who have objected to the covert tapping of their private networks and internal correspondence. ®

5 things you didn’t know about cloud backup

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
KER-CHING! CryptoWall ransomware scam rakes in $1 MEEELLION
Anatomy of the net's most destructive ransomware threat
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
prev story

Whitepapers

Gartner critical capabilities for enterprise endpoint backup
Learn why inSync received the highest overall rating from Druva and is the top choice for the mobile workforce.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.