Knowledge (XXG)

Real Time Regional Gateway

Source 📝

159:, where it was used to fuse and analyze even more types of data. Besides the more traditional military intelligence information, this included for example road-traffic patterns, public opinion and even the price of potatoes, because changes in the latter could indicate potential conflicts. Initially these data were gathered and analyzed for 30-day periods, but later this was extended to 90 days, as adding more data appeared to give better results. A former US counterterrorism official described the RT-RG as "the ultimate correlation tool" adding that "It is literally being able to predict the future". 580: 128:
Huron aircraft, and SIGINT drones and satellites. With the RT-RG, field commanders and intelligence analysts in the field were for the first time able to directly access NSA databases, making that intercepted data were ten times faster available on the ground than in the past. On a screen they were
117:. As its name describes, the Real Time Regional Gateway was a gateway through which all sorts of information related to one region (Iraq) became available to analysts and soldiers in real time and they could search the data similar to a search-engine like Google. 44:. It is able to store, fuse, search and analyze data from numerous sources, from intercepted communications to open source information. It was effective in providing information about Iraqi insurgents who had eluded less comprehensive techniques. 102:, the NSA got access to foreign communications at the switching points where international fiber-optic cables entered the United States. This enabled NSA not only to monitor many communications from Iraq, but also to initiate 136:(NRO). In a 2010 interview he said that the system was designed to put together pieces from a different types of data sources, looking for patterns, and make this available directly to American warfighters on the ground. 82:, who initiated a massive search for every piece of electronic information that could be found, after the Iraqi road side bombings reached an all-time high in 2005. Alexander's "collect it all" strategy is believed by 252: 189: 910: 320: 267:"The crux of the NSA story in one phrase: 'collect it all': The actual story that matters is not hard to see: the NSA is attempting to collect, monitor and store all forms of human communication" 71:, which can manage extremely large data sets and also includes granular access controls. The successor of the Real Time Regional Gateway is named Nexus 7 and is now under development at the 120:
The RT-RG derived its data from all kinds of sources, like raids, interrogations, and signal intelligence collected from ground sensors, as well as by airborne platforms like the
868: 383: 53: 1235: 1215: 1230: 147:, the RT-RG was "a rare example of successful collaboration within the byzantine federal bureaucracy" and eventually the key for winning the war in Iraq. 168: 129:
provided with "every type of surveillance available in a given territory" and they could also "get back a phone number or list of potential targets".
72: 336: 903: 588: 376: 356: 139:
The Real Time Regional Gateway contributed to "breaking up Iraqi insurgent networks and significantly reducing the monthly death toll from
783: 498: 369: 1181: 421: 407: 977: 1139: 970: 505: 133: 998: 491: 741: 110: 1153: 1146: 776: 484: 140: 86:
to be the model for the comprehensive worldwide mass collection of communications which NSA is supposedly engaged in.
294: 223:
Shane Harris, "@War, The Rise of the Military-Internet Complex", Houghton Mifflin Harcourt, New York, 2014, p. 33-38.
1210: 769: 755: 470: 428: 307: 822: 762: 477: 449: 52:
The prototype of the Real Time Regional Gateway (RT-RG) was designed by the military and intelligence contractor
333: 266: 748: 734: 695: 554: 414: 392: 33: 568: 1160: 236: 1220: 984: 681: 667: 526: 435: 125: 57: 56:. Instead of storing all data in centralized databases, as was NSA's traditional approach, RT-RG uses 924: 95: 1040: 1026: 956: 611: 547: 1054: 702: 639: 540: 79: 1079: 1225: 1167: 709: 660: 205:
Collect it all, tag it, store it. . . . And whatever it is you want, you go searching for it.
113:
began, the NSA exported this all-encompassing way of intelligence gathering and analysing to
60:, which means hundreds or even thousands of individual computers work together on one task. 1107: 1033: 875: 815: 561: 519: 463: 1188: 688: 653: 625: 604: 83: 68: 67:
software, that was originally developed by Yahoo. The NSA created its own version, called
25: 1174: 1132: 882: 442: 1204: 896: 850: 716: 674: 340: 121: 64: 1019: 618: 597: 190:"For NSA chief, terrorist threat drives passion to 'collect it all,' observers say" 144: 103: 938: 931: 801: 632: 156: 99: 41: 29: 456: 1086: 1047: 917: 808: 646: 533: 361: 1072: 991: 963: 512: 94:
Under the secret interception programs that were started right after the
132:
One of the developers of the RT-RG, was Pedro "Pete" Rustan from the US
1114: 1093: 889: 843: 1100: 836: 78:
At NSA the driving force behind the system was former NSA director
1005: 829: 253:
For NSA chief, terrorist threat drives passion to ‘collect it all’
114: 37: 365: 295:
Top Secret America: The Rise of the New American Security State
36:(NSA) and deployed during the American military operations in 308:
Intel Wars: The Secret History of the Fight Against Terror
143:(IED) by late 2008". According to journalist and author 1124: 1064: 948: 860: 793: 726: 587: 399: 357:RT-RG display at the National Cryptologic Museum 106:against Iraqi telephone and computer equipment. 188:Ellen Nakashima; Joby Warrick (July 14, 2013). 869:Global surveillance disclosures (2013–present) 321:NSA growth fueled by need to target terrorists 377: 8: 219: 217: 215: 213: 384: 370: 362: 247: 245: 169:Combined Information Data Network Exchange 231: 229: 73:Defense Advanced Research Projects Agency 904:NSA warrantless surveillance controversy 180: 289: 287: 7: 32:system introduced in 2007 by the US 1236:National Security Agency operations 1216:American secret government programs 742:Information Warfare Support Center 297:, Little, Brown and Company, 2011. 14: 499:Misawa Security Operations Center 265:Glenn Greenwald (July 15, 2013). 1182:Vulnerabilities Equities Process 578: 422:Consolidated Intelligence Center 408:Alaska Mission Operations Center 823:Secure Terminal Equipment (STE) 293:Dana Priest, William M. Arkin, 1231:War in Afghanistan (2001–2021) 1140:Institute for Defense Analyses 506:Multiprogram Research Facility 134:National Reconnaissance Office 90:Origins and deployment in Iraq 1: 237:Technology Emboldened the NSA 155:In 2010, RT-RG refocused on 141:improvised explosive devices 111:Iraq War troop surge of 2007 1154:National Cryptologic School 1147:National Cryptologic Museum 485:Interagency Training Center 443:European Cryptologic Center 415:Colorado Cryptologic Center 1252: 1013:Real Time Regional Gateway 756:Special Collection Service 471:Georgia Cryptologic Center 18:Real Time Regional Gateway 576: 478:Hawaii Cryptologic Center 450:European Technical Center 151:Deployment in Afghanistan 569:Pacific Technical Center 555:Texas Cryptologic Center 393:National Security Agency 34:National Security Agency 1161:National Vigilance Park 98:, which were codenamed 63:This is managed by the 985:Insider Threat Program 682:John Michael McConnell 668:William Eldridge Odom 235:Wall Street Journal: 58:distributed computing 925:Thomas Andrews Drake 96:September 11 attacks 957:Boundless Informant 612:Laurence Hugh Frost 310:, Bloomsbury, 2012. 194:The Washington Post 703:Keith B. Alexander 640:Samuel C. Phillips 343:, October 8, 2010. 80:Keith B. Alexander 1211:Mass surveillance 1198: 1197: 1168:NSA Hall of Honor 710:Michael S. Rogers 661:Lincoln D. Faurer 332:Defensenews.com: 319:Washington Post: 251:Washington Post: 1243: 1191: 1184: 1177: 1170: 1163: 1156: 1149: 1142: 1135: 1117: 1110: 1103: 1096: 1089: 1082: 1075: 1057: 1050: 1043: 1036: 1029: 1022: 1015: 1008: 1001: 994: 987: 980: 973: 966: 959: 941: 934: 927: 920: 913: 906: 899: 892: 885: 878: 876:Church Committee 871: 853: 846: 839: 832: 825: 818: 811: 804: 786: 779: 772: 765: 758: 751: 744: 737: 719: 712: 705: 698: 691: 684: 677: 670: 663: 656: 649: 642: 635: 628: 621: 614: 607: 600: 582: 581: 571: 564: 562:Utah Data Center 557: 550: 543: 536: 529: 522: 520:RAF Menwith Hill 515: 508: 501: 494: 487: 480: 473: 466: 464:Friendship Annex 459: 452: 445: 438: 431: 424: 417: 410: 386: 379: 372: 363: 344: 330: 324: 323:, July 22, 2013. 317: 311: 306:Matthew M. Aid, 304: 298: 291: 282: 281: 279: 277: 262: 256: 249: 240: 233: 224: 221: 208: 207: 202: 200: 185: 124:Rivet Joint and 1251: 1250: 1246: 1245: 1244: 1242: 1241: 1240: 1201: 1200: 1199: 1194: 1189:Zendian Problem 1187: 1180: 1173: 1166: 1159: 1152: 1145: 1138: 1131: 1120: 1113: 1106: 1099: 1092: 1085: 1078: 1071: 1060: 1053: 1046: 1039: 1032: 1025: 1018: 1011: 1004: 997: 990: 983: 976: 969: 962: 955: 944: 937: 930: 923: 916: 909: 902: 895: 888: 881: 874: 867: 856: 849: 842: 835: 828: 821: 814: 807: 800: 789: 782: 775: 768: 761: 754: 747: 740: 733: 722: 715: 708: 701: 694: 689:Kenneth Minihan 687: 680: 673: 666: 659: 654:Bobby Ray Inman 652: 645: 638: 631: 626:Marshall Carter 624: 617: 610: 605:John A. Samford 603: 596: 583: 579: 574: 567: 560: 553: 546: 539: 532: 525: 518: 511: 504: 497: 490: 483: 476: 469: 462: 455: 448: 441: 434: 427: 420: 413: 406: 395: 390: 353: 348: 347: 331: 327: 318: 314: 305: 301: 292: 285: 275: 273: 264: 263: 259: 255:, July 14, 2013 250: 243: 239:, June 9, 2013. 234: 227: 222: 211: 198: 196: 187: 186: 182: 177: 165: 153: 92: 84:Glenn Greenwald 50: 26:data processing 12: 11: 5: 1249: 1247: 1239: 1238: 1233: 1228: 1223: 1218: 1213: 1203: 1202: 1196: 1195: 1193: 1192: 1185: 1178: 1171: 1164: 1157: 1150: 1143: 1136: 1133:Dundee Society 1128: 1126: 1122: 1121: 1119: 1118: 1111: 1104: 1097: 1090: 1083: 1076: 1068: 1066: 1062: 1061: 1059: 1058: 1051: 1044: 1037: 1030: 1023: 1016: 1009: 1002: 995: 988: 981: 974: 967: 960: 952: 950: 946: 945: 943: 942: 935: 928: 921: 914: 911:Pike Committee 907: 900: 893: 886: 883:Edward Snowden 879: 872: 864: 862: 858: 857: 855: 854: 847: 840: 833: 826: 819: 812: 805: 797: 795: 791: 790: 788: 787: 780: 773: 766: 759: 752: 745: 738: 730: 728: 724: 723: 721: 720: 713: 706: 699: 696:Michael Hayden 692: 685: 678: 671: 664: 657: 650: 643: 636: 629: 622: 615: 608: 601: 593: 591: 585: 584: 577: 575: 573: 572: 565: 558: 551: 544: 537: 530: 523: 516: 509: 502: 495: 488: 481: 474: 467: 460: 453: 446: 439: 432: 425: 418: 411: 403: 401: 397: 396: 391: 389: 388: 381: 374: 366: 360: 359: 352: 351:External links 349: 346: 345: 339:2015-02-27 at 325: 312: 299: 283: 257: 241: 225: 209: 179: 178: 176: 173: 172: 171: 164: 161: 152: 149: 91: 88: 49: 46: 13: 10: 9: 6: 4: 3: 2: 1248: 1237: 1234: 1232: 1229: 1227: 1224: 1222: 1221:War on terror 1219: 1217: 1214: 1212: 1209: 1208: 1206: 1190: 1186: 1183: 1179: 1176: 1172: 1169: 1165: 1162: 1158: 1155: 1151: 1148: 1144: 1141: 1137: 1134: 1130: 1129: 1127: 1123: 1116: 1112: 1109: 1105: 1102: 1098: 1095: 1091: 1088: 1084: 1081: 1077: 1074: 1070: 1069: 1067: 1063: 1056: 1052: 1049: 1045: 1042: 1038: 1035: 1031: 1028: 1024: 1021: 1017: 1014: 1010: 1007: 1003: 1000: 996: 993: 989: 986: 982: 979: 975: 972: 968: 965: 961: 958: 954: 953: 951: 947: 940: 936: 933: 929: 926: 922: 919: 915: 912: 908: 905: 901: 898: 897:James Bamford 894: 891: 887: 884: 880: 877: 873: 870: 866: 865: 863: 859: 852: 851:WARRIOR PRIDE 848: 845: 841: 838: 834: 831: 827: 824: 820: 817: 813: 810: 806: 803: 799: 798: 796: 792: 785: 781: 778: 774: 771: 767: 764: 760: 757: 753: 750: 746: 743: 739: 736: 732: 731: 729: 725: 718: 717:Paul Nakasone 714: 711: 707: 704: 700: 697: 693: 690: 686: 683: 679: 676: 675:Bill Studeman 672: 669: 665: 662: 658: 655: 651: 648: 644: 641: 637: 634: 630: 627: 623: 620: 616: 613: 609: 606: 602: 599: 595: 594: 592: 590: 586: 570: 566: 563: 559: 556: 552: 549: 545: 542: 538: 535: 531: 528: 527:Roaring Creek 524: 521: 517: 514: 510: 507: 503: 500: 496: 493: 489: 486: 482: 479: 475: 472: 468: 465: 461: 458: 454: 451: 447: 444: 440: 437: 433: 430: 426: 423: 419: 416: 412: 409: 405: 404: 402: 398: 394: 387: 382: 380: 375: 373: 368: 367: 364: 358: 355: 354: 350: 342: 341:archive.today 338: 335: 329: 326: 322: 316: 313: 309: 303: 300: 296: 290: 288: 284: 272: 268: 261: 258: 254: 248: 246: 242: 238: 232: 230: 226: 220: 218: 216: 214: 210: 206: 195: 191: 184: 181: 174: 170: 167: 166: 162: 160: 158: 150: 148: 146: 142: 137: 135: 130: 127: 123: 118: 116: 112: 107: 105: 104:cyber attacks 101: 97: 89: 87: 85: 81: 76: 74: 70: 66: 61: 59: 55: 47: 45: 43: 39: 35: 31: 27: 23: 19: 1055:Epic Shelter 1020:Stellar Wind 1012: 619:Gordon Blake 598:Ralph Canine 334:Change agent 328: 315: 302: 274:. Retrieved 271:The Guardian 270: 260: 204: 197:. Retrieved 193: 183: 154: 145:Shane Harris 138: 131: 119: 108: 93: 77: 62: 51: 21: 17: 15: 1027:TRAILBLAZER 939:Matthew Aid 932:Thomas Tamm 861:Controversy 802:ANT catalog 633:Noel Gayler 548:Sugar Grove 492:Kent Island 436:Dorsey Road 157:Afghanistan 100:STELLARWIND 48:Development 42:Afghanistan 30:data mining 1205:Categories 1080:Interquake 1034:Turbulence 794:Technology 541:Salt Creek 457:Fort Meade 175:References 1087:Main Core 1065:Databases 1048:XKeyscore 918:Russ Tice 809:FROSTBURG 727:Divisions 647:Lew Allen 534:Room 641A 400:Locations 109:When the 75:(DARPA) 1226:Iraq War 1073:DISHFIRE 1041:Upstream 992:MUSCULAR 978:Fairview 964:Dropmire 949:Programs 513:Pine Gap 337:Archived 276:July 16, 199:July 15, 163:See also 69:Accumulo 1115:PINWALE 1094:MAINWAY 971:ECHELON 890:LOVEINT 844:STU-III 816:HARVEST 589:Leaders 24:) is a 1175:VENONA 1108:Nymrod 1101:MARINA 999:MYSTIC 837:STU-II 122:RC-135 65:Hadoop 1125:Other 1006:PRISM 830:STU-I 22:RT-RG 784:NSOC 777:NTOC 429:CSSG 278:2013 201:2013 126:C-12 115:Iraq 54:SAIC 40:and 38:Iraq 28:and 16:The 770:TAO 763:SSO 749:ROC 735:CSS 1207:: 286:^ 269:. 244:^ 228:^ 212:^ 203:. 192:. 385:e 378:t 371:v 280:. 20:(

Index

data processing
data mining
National Security Agency
Iraq
Afghanistan
SAIC
distributed computing
Hadoop
Accumulo
Defense Advanced Research Projects Agency
Keith B. Alexander
Glenn Greenwald
September 11 attacks
STELLARWIND
cyber attacks
Iraq War troop surge of 2007
Iraq
RC-135
C-12
National Reconnaissance Office
improvised explosive devices
Shane Harris
Afghanistan
Combined Information Data Network Exchange
"For NSA chief, terrorist threat drives passion to 'collect it all,' observers say"




Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.