159:, where it was used to fuse and analyze even more types of data. Besides the more traditional military intelligence information, this included for example road-traffic patterns, public opinion and even the price of potatoes, because changes in the latter could indicate potential conflicts. Initially these data were gathered and analyzed for 30-day periods, but later this was extended to 90 days, as adding more data appeared to give better results. A former US counterterrorism official described the RT-RG as "the ultimate correlation tool" adding that "It is literally being able to predict the future".
580:
128:
Huron aircraft, and SIGINT drones and satellites. With the RT-RG, field commanders and intelligence analysts in the field were for the first time able to directly access NSA databases, making that intercepted data were ten times faster available on the ground than in the past. On a screen they were
117:. As its name describes, the Real Time Regional Gateway was a gateway through which all sorts of information related to one region (Iraq) became available to analysts and soldiers in real time and they could search the data similar to a search-engine like Google.
44:. It is able to store, fuse, search and analyze data from numerous sources, from intercepted communications to open source information. It was effective in providing information about Iraqi insurgents who had eluded less comprehensive techniques.
102:, the NSA got access to foreign communications at the switching points where international fiber-optic cables entered the United States. This enabled NSA not only to monitor many communications from Iraq, but also to initiate
136:(NRO). In a 2010 interview he said that the system was designed to put together pieces from a different types of data sources, looking for patterns, and make this available directly to American warfighters on the ground.
82:, who initiated a massive search for every piece of electronic information that could be found, after the Iraqi road side bombings reached an all-time high in 2005. Alexander's "collect it all" strategy is believed by
252:
189:
910:
320:
267:"The crux of the NSA story in one phrase: 'collect it all': The actual story that matters is not hard to see: the NSA is attempting to collect, monitor and store all forms of human communication"
71:, which can manage extremely large data sets and also includes granular access controls. The successor of the Real Time Regional Gateway is named Nexus 7 and is now under development at the
120:
The RT-RG derived its data from all kinds of sources, like raids, interrogations, and signal intelligence collected from ground sensors, as well as by airborne platforms like the
868:
383:
53:
1235:
1215:
1230:
147:, the RT-RG was "a rare example of successful collaboration within the byzantine federal bureaucracy" and eventually the key for winning the war in Iraq.
168:
129:
provided with "every type of surveillance available in a given territory" and they could also "get back a phone number or list of potential targets".
72:
336:
903:
588:
376:
356:
139:
The Real Time
Regional Gateway contributed to "breaking up Iraqi insurgent networks and significantly reducing the monthly death toll from
783:
498:
369:
1181:
421:
407:
977:
1139:
970:
505:
133:
998:
491:
741:
110:
1153:
1146:
776:
484:
140:
86:
to be the model for the comprehensive worldwide mass collection of communications which NSA is supposedly engaged in.
294:
223:
Shane Harris, "@War, The Rise of the
Military-Internet Complex", Houghton Mifflin Harcourt, New York, 2014, p. 33-38.
1210:
769:
755:
470:
428:
307:
822:
762:
477:
449:
52:
The prototype of the Real Time
Regional Gateway (RT-RG) was designed by the military and intelligence contractor
333:
266:
748:
734:
695:
554:
414:
392:
33:
568:
1160:
236:
1220:
984:
681:
667:
526:
435:
125:
57:
56:. Instead of storing all data in centralized databases, as was NSA's traditional approach, RT-RG uses
924:
95:
1040:
1026:
956:
611:
547:
1054:
702:
639:
540:
79:
1079:
1225:
1167:
709:
660:
205:
Collect it all, tag it, store it. . . . And whatever it is you want, you go searching for it.
113:
began, the NSA exported this all-encompassing way of intelligence gathering and analysing to
60:, which means hundreds or even thousands of individual computers work together on one task.
1107:
1033:
875:
815:
561:
519:
463:
1188:
688:
653:
625:
604:
83:
68:
67:
software, that was originally developed by Yahoo. The NSA created its own version, called
25:
1174:
1132:
882:
442:
1204:
896:
850:
716:
674:
340:
121:
64:
1019:
618:
597:
190:"For NSA chief, terrorist threat drives passion to 'collect it all,' observers say"
144:
103:
938:
931:
801:
632:
156:
99:
41:
29:
456:
1086:
1047:
917:
808:
646:
533:
361:
1072:
991:
963:
512:
94:
Under the secret interception programs that were started right after the
132:
One of the developers of the RT-RG, was Pedro "Pete" Rustan from the US
1114:
1093:
889:
843:
1100:
836:
78:
At NSA the driving force behind the system was former NSA director
1005:
829:
253:
For NSA chief, terrorist threat drives passion to ‘collect it all’
114:
37:
365:
295:
Top Secret
America: The Rise of the New American Security State
36:(NSA) and deployed during the American military operations in
308:
Intel Wars: The Secret
History of the Fight Against Terror
143:(IED) by late 2008". According to journalist and author
1124:
1064:
948:
860:
793:
726:
587:
399:
357:RT-RG display at the National Cryptologic Museum
106:against Iraqi telephone and computer equipment.
188:Ellen Nakashima; Joby Warrick (July 14, 2013).
869:Global surveillance disclosures (2013–present)
321:NSA growth fueled by need to target terrorists
377:
8:
219:
217:
215:
213:
384:
370:
362:
247:
245:
169:Combined Information Data Network Exchange
231:
229:
73:Defense Advanced Research Projects Agency
904:NSA warrantless surveillance controversy
180:
289:
287:
7:
32:system introduced in 2007 by the US
1236:National Security Agency operations
1216:American secret government programs
742:Information Warfare Support Center
297:, Little, Brown and Company, 2011.
14:
499:Misawa Security Operations Center
265:Glenn Greenwald (July 15, 2013).
1182:Vulnerabilities Equities Process
578:
422:Consolidated Intelligence Center
408:Alaska Mission Operations Center
823:Secure Terminal Equipment (STE)
293:Dana Priest, William M. Arkin,
1231:War in Afghanistan (2001–2021)
1140:Institute for Defense Analyses
506:Multiprogram Research Facility
134:National Reconnaissance Office
90:Origins and deployment in Iraq
1:
237:Technology Emboldened the NSA
155:In 2010, RT-RG refocused on
141:improvised explosive devices
111:Iraq War troop surge of 2007
1154:National Cryptologic School
1147:National Cryptologic Museum
485:Interagency Training Center
443:European Cryptologic Center
415:Colorado Cryptologic Center
1252:
1013:Real Time Regional Gateway
756:Special Collection Service
471:Georgia Cryptologic Center
18:Real Time Regional Gateway
576:
478:Hawaii Cryptologic Center
450:European Technical Center
151:Deployment in Afghanistan
569:Pacific Technical Center
555:Texas Cryptologic Center
393:National Security Agency
34:National Security Agency
1161:National Vigilance Park
98:, which were codenamed
63:This is managed by the
985:Insider Threat Program
682:John Michael McConnell
668:William Eldridge Odom
235:Wall Street Journal:
58:distributed computing
925:Thomas Andrews Drake
96:September 11 attacks
957:Boundless Informant
612:Laurence Hugh Frost
310:, Bloomsbury, 2012.
194:The Washington Post
703:Keith B. Alexander
640:Samuel C. Phillips
343:, October 8, 2010.
80:Keith B. Alexander
1211:Mass surveillance
1198:
1197:
1168:NSA Hall of Honor
710:Michael S. Rogers
661:Lincoln D. Faurer
332:Defensenews.com:
319:Washington Post:
251:Washington Post:
1243:
1191:
1184:
1177:
1170:
1163:
1156:
1149:
1142:
1135:
1117:
1110:
1103:
1096:
1089:
1082:
1075:
1057:
1050:
1043:
1036:
1029:
1022:
1015:
1008:
1001:
994:
987:
980:
973:
966:
959:
941:
934:
927:
920:
913:
906:
899:
892:
885:
878:
876:Church Committee
871:
853:
846:
839:
832:
825:
818:
811:
804:
786:
779:
772:
765:
758:
751:
744:
737:
719:
712:
705:
698:
691:
684:
677:
670:
663:
656:
649:
642:
635:
628:
621:
614:
607:
600:
582:
581:
571:
564:
562:Utah Data Center
557:
550:
543:
536:
529:
522:
520:RAF Menwith Hill
515:
508:
501:
494:
487:
480:
473:
466:
464:Friendship Annex
459:
452:
445:
438:
431:
424:
417:
410:
386:
379:
372:
363:
344:
330:
324:
323:, July 22, 2013.
317:
311:
306:Matthew M. Aid,
304:
298:
291:
282:
281:
279:
277:
262:
256:
249:
240:
233:
224:
221:
208:
207:
202:
200:
185:
124:Rivet Joint and
1251:
1250:
1246:
1245:
1244:
1242:
1241:
1240:
1201:
1200:
1199:
1194:
1189:Zendian Problem
1187:
1180:
1173:
1166:
1159:
1152:
1145:
1138:
1131:
1120:
1113:
1106:
1099:
1092:
1085:
1078:
1071:
1060:
1053:
1046:
1039:
1032:
1025:
1018:
1011:
1004:
997:
990:
983:
976:
969:
962:
955:
944:
937:
930:
923:
916:
909:
902:
895:
888:
881:
874:
867:
856:
849:
842:
835:
828:
821:
814:
807:
800:
789:
782:
775:
768:
761:
754:
747:
740:
733:
722:
715:
708:
701:
694:
689:Kenneth Minihan
687:
680:
673:
666:
659:
654:Bobby Ray Inman
652:
645:
638:
631:
626:Marshall Carter
624:
617:
610:
605:John A. Samford
603:
596:
583:
579:
574:
567:
560:
553:
546:
539:
532:
525:
518:
511:
504:
497:
490:
483:
476:
469:
462:
455:
448:
441:
434:
427:
420:
413:
406:
395:
390:
353:
348:
347:
331:
327:
318:
314:
305:
301:
292:
285:
275:
273:
264:
263:
259:
255:, July 14, 2013
250:
243:
239:, June 9, 2013.
234:
227:
222:
211:
198:
196:
187:
186:
182:
177:
165:
153:
92:
84:Glenn Greenwald
50:
26:data processing
12:
11:
5:
1249:
1247:
1239:
1238:
1233:
1228:
1223:
1218:
1213:
1203:
1202:
1196:
1195:
1193:
1192:
1185:
1178:
1171:
1164:
1157:
1150:
1143:
1136:
1133:Dundee Society
1128:
1126:
1122:
1121:
1119:
1118:
1111:
1104:
1097:
1090:
1083:
1076:
1068:
1066:
1062:
1061:
1059:
1058:
1051:
1044:
1037:
1030:
1023:
1016:
1009:
1002:
995:
988:
981:
974:
967:
960:
952:
950:
946:
945:
943:
942:
935:
928:
921:
914:
911:Pike Committee
907:
900:
893:
886:
883:Edward Snowden
879:
872:
864:
862:
858:
857:
855:
854:
847:
840:
833:
826:
819:
812:
805:
797:
795:
791:
790:
788:
787:
780:
773:
766:
759:
752:
745:
738:
730:
728:
724:
723:
721:
720:
713:
706:
699:
696:Michael Hayden
692:
685:
678:
671:
664:
657:
650:
643:
636:
629:
622:
615:
608:
601:
593:
591:
585:
584:
577:
575:
573:
572:
565:
558:
551:
544:
537:
530:
523:
516:
509:
502:
495:
488:
481:
474:
467:
460:
453:
446:
439:
432:
425:
418:
411:
403:
401:
397:
396:
391:
389:
388:
381:
374:
366:
360:
359:
352:
351:External links
349:
346:
345:
339:2015-02-27 at
325:
312:
299:
283:
257:
241:
225:
209:
179:
178:
176:
173:
172:
171:
164:
161:
152:
149:
91:
88:
49:
46:
13:
10:
9:
6:
4:
3:
2:
1248:
1237:
1234:
1232:
1229:
1227:
1224:
1222:
1221:War on terror
1219:
1217:
1214:
1212:
1209:
1208:
1206:
1190:
1186:
1183:
1179:
1176:
1172:
1169:
1165:
1162:
1158:
1155:
1151:
1148:
1144:
1141:
1137:
1134:
1130:
1129:
1127:
1123:
1116:
1112:
1109:
1105:
1102:
1098:
1095:
1091:
1088:
1084:
1081:
1077:
1074:
1070:
1069:
1067:
1063:
1056:
1052:
1049:
1045:
1042:
1038:
1035:
1031:
1028:
1024:
1021:
1017:
1014:
1010:
1007:
1003:
1000:
996:
993:
989:
986:
982:
979:
975:
972:
968:
965:
961:
958:
954:
953:
951:
947:
940:
936:
933:
929:
926:
922:
919:
915:
912:
908:
905:
901:
898:
897:James Bamford
894:
891:
887:
884:
880:
877:
873:
870:
866:
865:
863:
859:
852:
851:WARRIOR PRIDE
848:
845:
841:
838:
834:
831:
827:
824:
820:
817:
813:
810:
806:
803:
799:
798:
796:
792:
785:
781:
778:
774:
771:
767:
764:
760:
757:
753:
750:
746:
743:
739:
736:
732:
731:
729:
725:
718:
717:Paul Nakasone
714:
711:
707:
704:
700:
697:
693:
690:
686:
683:
679:
676:
675:Bill Studeman
672:
669:
665:
662:
658:
655:
651:
648:
644:
641:
637:
634:
630:
627:
623:
620:
616:
613:
609:
606:
602:
599:
595:
594:
592:
590:
586:
570:
566:
563:
559:
556:
552:
549:
545:
542:
538:
535:
531:
528:
527:Roaring Creek
524:
521:
517:
514:
510:
507:
503:
500:
496:
493:
489:
486:
482:
479:
475:
472:
468:
465:
461:
458:
454:
451:
447:
444:
440:
437:
433:
430:
426:
423:
419:
416:
412:
409:
405:
404:
402:
398:
394:
387:
382:
380:
375:
373:
368:
367:
364:
358:
355:
354:
350:
342:
341:archive.today
338:
335:
329:
326:
322:
316:
313:
309:
303:
300:
296:
290:
288:
284:
272:
268:
261:
258:
254:
248:
246:
242:
238:
232:
230:
226:
220:
218:
216:
214:
210:
206:
195:
191:
184:
181:
174:
170:
167:
166:
162:
160:
158:
150:
148:
146:
142:
137:
135:
130:
127:
123:
118:
116:
112:
107:
105:
104:cyber attacks
101:
97:
89:
87:
85:
81:
76:
74:
70:
66:
61:
59:
55:
47:
45:
43:
39:
35:
31:
27:
23:
19:
1055:Epic Shelter
1020:Stellar Wind
1012:
619:Gordon Blake
598:Ralph Canine
334:Change agent
328:
315:
302:
274:. Retrieved
271:The Guardian
270:
260:
204:
197:. Retrieved
193:
183:
154:
145:Shane Harris
138:
131:
119:
108:
93:
77:
62:
51:
21:
17:
15:
1027:TRAILBLAZER
939:Matthew Aid
932:Thomas Tamm
861:Controversy
802:ANT catalog
633:Noel Gayler
548:Sugar Grove
492:Kent Island
436:Dorsey Road
157:Afghanistan
100:STELLARWIND
48:Development
42:Afghanistan
30:data mining
1205:Categories
1080:Interquake
1034:Turbulence
794:Technology
541:Salt Creek
457:Fort Meade
175:References
1087:Main Core
1065:Databases
1048:XKeyscore
918:Russ Tice
809:FROSTBURG
727:Divisions
647:Lew Allen
534:Room 641A
400:Locations
109:When the
75:(DARPA)
1226:Iraq War
1073:DISHFIRE
1041:Upstream
992:MUSCULAR
978:Fairview
964:Dropmire
949:Programs
513:Pine Gap
337:Archived
276:July 16,
199:July 15,
163:See also
69:Accumulo
1115:PINWALE
1094:MAINWAY
971:ECHELON
890:LOVEINT
844:STU-III
816:HARVEST
589:Leaders
24:) is a
1175:VENONA
1108:Nymrod
1101:MARINA
999:MYSTIC
837:STU-II
122:RC-135
65:Hadoop
1125:Other
1006:PRISM
830:STU-I
22:RT-RG
784:NSOC
777:NTOC
429:CSSG
278:2013
201:2013
126:C-12
115:Iraq
54:SAIC
40:and
38:Iraq
28:and
16:The
770:TAO
763:SSO
749:ROC
735:CSS
1207::
286:^
269:.
244:^
228:^
212:^
203:.
192:.
385:e
378:t
371:v
280:.
20:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.