Feeds

NSA collects up to FIVE BILLION mobile phone locations daily

Latest Snowden leaks expose massive mobile surveillance

Intelligent flash storage arrays

The NSA is maintaining a mobile device tracking program that logs up to five billion updates per day around the world, according to a new report.

The Washington Post, citing government sources and documents leaked by Edward Snowden, reports that the US intelligence agency has built a massive database of locational information gathered as part of its wiretapping activities that can be used to map out user activity around the globe.

According to the report, the locational data is not deliberately targeted by authorities, but rather is obtained when the agency targets a single individual's mobile activities and monitors that person's communications.

In the process of collecting the surveillance data, the NSA is said to also be obtaining locational information from other handsets which connect to a mobile communications tower or wi-fi hotspot to initiate communications. This allows the NSA to gather locational data on all devices within a certain area at any given time.

The report suggests that the collected information is used by the NSA to identify possible associates and accomplices for a known target. By analyzing the locational data and finding common numbers across logs on multiple towers, analytics tools are able to eventually spot devices which appear alongside the target.

Government sources told the post that the collection is only being used to track possible 'co-travelers' and has not been deemed by NSA officials to be illegal surveillance.

The report did not mention any involvement from the GCHQ, though the UK intelligence service has previously proven to be deeply involved with the NSA on many of the electronic surveillance activities brought to light by former contractor Snowden.

The revelation is the latest in what has already proven to be a government surveillance program whose scope reaches beyond anything previously imagined by most citizens. That program has included massive collections of phone records, web correspondence and surfing activities by individuals suspected of terrorism and serious crimes.

The revelations have triggered a debate over the extent to which governments should have surveillance capabilities and has brought backlash from many firms in the private sector who have objected to the covert tapping of their private networks and internal correspondence. ®

Intelligent flash storage arrays

More from The Register

next story
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
Oi, Europe! Tell US feds to GTFO of our servers, say Microsoft and pals
By writing a really angry letter about how it's harming our cloud business, ta
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.