Pinwale

From Wikipedia, the free encyclopedia
Reference to Pinwale in an XKeyscore slide
Reference to Pinwale in a PRISM slide

Pinwale is the code name for a National Security Agency (NSA) collection and retrieval system for so-called "Digital Network Intelligence", including internet e-mail.[1][2] It is searchable by monitored NSA analysts.

The existence of the system was first revealed by an NSA analyst who was trained in its use during 2005.[2] However, according to Homeland Security Today, Pinwale contains information much more than email. It also contains other forms of Internet data, and other forms of digital communications as well. Its software has built-in protections against collecting from any of the Five Eyes members. Unlike its successor XKeyscore, targets for Pinwale have to be approved beforehand by the FISC.[1]

According to information obtained by The Guardian from Edward Snowden, Pinwale is part of a "multi-tiered system" to address the issue of NSA "collecting so much internet data that it can be stored only for short periods of time." The system allows analysts to store "interesting" content in databases such as Pinwale, which is capable of storing material for up to five years.[3]

Pinwale consists of at least two known partitions referred to as "Sweet" and "Sour".[4]

According to the documents leaked by Snowden, Pinwale normally processed about 60 GB data per day without trouble. However, Pinwale was overwhelmed when Yahoo started mass mailbox transfers between its data centers, which were captured by the NSA's MUSCULAR program that taps the private clouds of Google and Yahoo. Monitored email accounts being hacked by spammers also present a challenge to Pinwale, because they can cause the database of suspect email addresses to grow exponentially with information of no intelligence value.[5]

See also[]

References[]

  1. ^ a b Anthony L. Kimery (2013-08-05). "NSA's X-KEYSCORE Does Far More than Just Siphon the 'Net, But is it Working?". HStoday. Homeland Security Today. Archived from the original on 2014-03-23. Retrieved 2014-03-23.
  2. ^ a b James Risen, Eric Lichtblau (2013-06-16). "E-Mail Surveillance Renews Concerns in Congress". The New York Times. Archived from the original on 2014-03-23. Retrieved 2014-03-23., page 1 at archive.
  3. ^ Glenn Greenwald (2013-07-31). "XKeyscore: NSA tool collects 'nearly everything a user does on the internet'". The Guardian. Archived from the original on 2014-03-20. Retrieved 2014-03-23.
  4. ^ James Ball, Spencer Ackerman (2013-08-09). "NSA loophole allows warrantless search for US citizens' emails and phone calls". The Guardian. Archived from the original on 2014-03-23. Retrieved 2014-03-23.
  5. ^ Sean Gallagher (2013-10-31). "How the NSA's MUSCULAR tapped Google's and Yahoo's private networks". Ars Technica. Archived from the original on 2014-03-23. Retrieved 2014-03-23.
Retrieved from ""