{"id":40272,"date":"2013-06-09T03:17:23","date_gmt":"2013-06-09T02:17:23","guid":{"rendered":"http:\/\/rinf.com\/alt-news\/breaking-news\/boundless-informant-nsas-complex-tool-for-classifying-global-intelligence\/40272\/"},"modified":"2013-06-09T03:17:23","modified_gmt":"2013-06-09T02:17:23","slug":"boundless-informant-nsas-complex-tool-for-classifying-global-intelligence","status":"publish","type":"post","link":"http:\/\/rinf.com\/alt-news\/breaking-news\/boundless-informant-nsas-complex-tool-for-classifying-global-intelligence\/","title":{"rendered":"Boundless Informant: NSA\u2019s complex tool for classifying global intelligence"},"content":{"rendered":"<p>A new batch of classified NSA docs leaked to the media reveals the details of a comprehensive piece of software used by NSA to analyze and evaluate intelligence gathered across the globe as well as data extraction methods.<\/p>\n<p>\n  The top-secret documents released by the Guardian shed light on<br \/>\n  the National Security Agency\u2019s data-mining tool being used for<br \/>\n  counting and categorizing metadata gathered and stored in<br \/>\n  numerous databases around the world.\n<\/p>\n<p>\n  Known as Boundless Informant, the software provides its operator<br \/>\n  a graphical insight on how many records were collected for a<br \/>\n  specific \u201corganizational unit\u201d or country, what type of data was<br \/>\n  collected and what type of collection was used. The program also<br \/>\n  allows determining trends in data collection for both strategic<br \/>\n  and tactical decision making, according to the <a target=\"_blank\" href=\"http:\/\/www.documentcloud.org\/documents\/710559-doc01187820130608104742.html#document\/p1\">slides<\/a>.\n<\/p>\n<p>\n  One of the slides contains a part of the Informant\u2019s user<br \/>\n  interface showing a world map with countries color-coded ranging<br \/>\n  from green to red depending on the amount of records collected<br \/>\n  there. While Iran, Pakistan and other some other states are<br \/>\n  predictably \u201chottest\u201d according to the map, the agency collected<br \/>\n  almost 3 billion intelligence pieces in the US in March 2013<br \/>\n  alone.\n<\/p>\n<p>\n  <img decoding=\"async\" alt=\"The map showing how much data is being collected in different countries across the globe (image from the Guardian)\" src=\"http:\/\/admin.rt.com\/files\/news\/1f\/5a\/70\/00\/picture-1.jpg\" \/><\/p>\n<p>\n  The insight on the software being used by the NSA comes amid the<br \/>\n  agency spokesperson Judith Emmel\u2019s claims that the NSA cannot at<br \/>\n  the moment determine how many Americans may be accidentally<br \/>\n  included in its surveillance.\n<\/p>\n<p>\n  <i>\u201cCurrent technology simply does not permit us to positively<br \/>\n  identify all of the persons or locations associated with a given<br \/>\n  communication,\u201d<\/i> Emmel said Saturday adding that <i>\u201cit is<br \/>\n  harder to know the ultimate source or destination, or more<br \/>\n  particularly the identity of the person represented by the TO:,<br \/>\n  FROM: or CC: field of an e-mail address or the abstraction of an<br \/>\n  IP address.\u201d<\/i><br \/>\n  <\/p>\n<h2>\n  NSA data sources<br \/>\n  <br \/><\/h2>\n<p>\n  Another slide from the internal NSA presentation redacted by the<br \/>\n  Guardian editors details the data gathering methods used in the<br \/>\n  NSA global surveillance program.<br \/>\n  <\/p>\n<p>\n  The first method suggests interception of data from <i>\u201cfiber<br \/>\n  cables and infrastructure as data flows past\u201d<\/i> under the FISA<br \/>\n  Amendments Act (FAA) of 2008, Section 702.\n<\/p>\n<p>\n  The second distinguished method is data collection <i>\u201cdirectly<br \/>\n  from the servers of the US service providers.\u201d<\/i>\n<\/p>\n<p>\n  <img decoding=\"async\" alt=\"The slide detailing methods of data extraction under the FISA Amendment Act (image from the Guardian)\" src=\"http:\/\/admin.rt.com\/files\/news\/1f\/5a\/70\/00\/picture-2.jpg\" \/><\/p>\n<p>\n  The presentation encourages analysts to use both methods for<br \/>\n  better results.\n<\/p>\n<h2>\n  Google, Facebook negotiated \u2018secure portals\u2019 to share data with<br \/>\n  NSA?<br \/>\n<\/h2>\n<p>\n  Meanwhile, a report by the New York Times revealed that Internet<br \/>\n  giants, including Google and Facebook, have been in negotiations<br \/>\n  with the US security agency over \u2018digital rooms\u2019 for sharing the<br \/>\n  requested data. The companies still insist there is no \u201cback<br \/>\n  door\u201d for a direct access to user data on their servers.\n<\/p>\n<p>\n  The Internet companies seem more compliant with the spy agencies<br \/>\n  than they want to appear to their users, and are cooperating on<br \/>\n  \u201cbehind-the-scenes transactions\u201d of the private information,<br \/>\n  according to a report that cites anonymous sources \u201cbriefed on<br \/>\n  the negotiations.\u201d\n<\/p>\n<p>\n  According to the report, Google, Microsoft, Yahoo, Facebook, AOL,<br \/>\n  Apple and Paltalk have \u201copened discussions with national security<br \/>\n  officials about developing technical methods to more efficiently<br \/>\n  and securely share the personal data of foreign users in response<br \/>\n  to lawful government requests,\u201d sometimes \u201cchanging\u201d their<br \/>\n  computer systems for this purpose.\n<\/p>\n<p>\n  These methods included a creation of \u201cseparate, secure portals\u201d<br \/>\n  online, through which the government would conveniently request<br \/>\n  and acquire data from the companies.\n<\/p>\n<p>\n  <img decoding=\"async\" alt=\"A slide from a classified NSA presentation leaked by the Guardian\" src=\"http:\/\/admin.rt.com\/files\/news\/1f\/5a\/70\/00\/picture-3.jpg\" \/><\/p>\n<p>\n  Twitter was the only major Internet company mentioned in the<br \/>\n  report that allegedly declined to facilitate the data transfer to<br \/>\n  the NSA in a described way. As opposed to a legitimate FISA<br \/>\n  request, such a move was considered as not \u201ca legal requirement\u201d<br \/>\n  by Twitter.\n<\/p>\n<p>\n  The sources claim the negotiations have been actively going in<br \/>\n  the recent months, referring to a Silicon Valley visit of the<br \/>\n  chairman of the Joint Chiefs of Staff Martin E. Dempsey. Dempsey<br \/>\n  is said to have met the executives of Facebook, Microsoft, Google<br \/>\n  and Intel to secretly discuss their collaboration on the<br \/>\n  government\u2019s \u201cintelligence-gathering efforts.\u201d\n<\/p>\n<h2>\n  NSA pressured to declassify more PRISM details<br \/>\n<\/h2>\n<p>\n  In response to the fury over US government\u2019s counterterrorism<br \/>\n  techniques, Director of National Intelligence James Clapper for<br \/>\n  the second time in three days revealed some details of the PRISM<br \/>\n  data-scouring program.\n<\/p>\n<p>\n  Being one of the <i>\u201cmost important tools for the protection of<br \/>\n  the nation&#8217;s security\u201d<\/i> the PRISM is an internal government<br \/>\n  computer system for collecting <i>\u201cforeign intelligence<br \/>\n  information from electronic communication service providers under<br \/>\n  court supervision,\u201d<\/i> Clapper said.\n<\/p>\n<p>\n  He also said that PRISM seeks foreign intelligence information<br \/>\n  concerning foreign targets located outside the US and cannot<br \/>\n  intentionally target any US citizen or any person known to be in<br \/>\n  the US. As for <i>\u201cincidentally intercepted\u201d<\/i> information<br \/>\n  about a US resident, the dissemination of such data is prohibited<br \/>\n  unless it is <i>\u201cevidence of a crime\u201d<\/i>, <i>\u201cindicates\u201d<\/i> a<br \/>\n  serious threat, or is needed to <i>\u201cunderstand foreign<br \/>\n  intelligence or assess its importance.\u201d<\/i>\u00a0\n<\/p>\n<p>\n  Clapper also stressed that the agency operates with a court<br \/>\n  authority and that it does not unilaterally obtain information<br \/>\n  from the servers of US telecoms and Internet giants without their<br \/>\n  knowledge and a FISA Court judge approval.\n<\/p>\n<p>This article originally appeared on: <a href=\"http:\/\/rt.com\/news\/boundless-informant-nsa-prism-423\/\" target=\"_blank\" title=\"Boundless Informant: NSA\u2019s complex tool for classifying global intelligence\">RT<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new batch of classified NSA docs leaked to the media reveals the details of a comprehensive piece of software used by NSA to analyze and evaluate intelligence gathered across the globe as well as data extraction methods. The top-secret documents released by the Guardian shed light on the National Security Agency\u2019s data-mining tool being [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[487],"tags":[],"class_list":{"0":"post-40272","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-breaking-news"},"_links":{"self":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts\/40272","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/comments?post=40272"}],"version-history":[{"count":0,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts\/40272\/revisions"}],"wp:attachment":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/media?parent=40272"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/categories?post=40272"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/tags?post=40272"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}