RAMPART-A

Last updated
Screenshot from one of the unclassified slides in the published top secret documents. The aim of the program is to gain access to these fiber-optic cables. Special Source Operations (SSO) Overview RAMPART-A, "Got Fiber%3F%3F".png
Screenshot from one of the unclassified slides in the published top secret documents. The aim of the program is to gain access to these fiber-optic cables.
NSA lists "Approved SIGINT countries" which are divided into two groups by their cooperation level with the NSA.
.mw-parser-output .legend{page-break-inside:avoid;break-inside:avoid-column}.mw-parser-output .legend-color{display:inline-block;min-width:1.25em;height:1.25em;line-height:1.25;margin:1px 0;text-align:center;border:1px solid black;background-color:transparent;color:black}.mw-parser-output .legend-text{}
Second Partners
Third Partners Approved SIGINT countries - NSA partners.svg
NSA lists "Approved SIGINT countries" which are divided into two groups by their cooperation level with the NSA.
  Second Partners
  Third Partners

RAMPART-A is the code name for global mass surveillance and world-wide signals intelligence partnership program led by the United States National Security Agency (NSA). [2] [3] Aim of the program is to "gain access to high-capacity international fiber-optic cables that transit at major congestion points around the world". [4] [5]

Contents

NSA is working with secret cooperation with the partner countries, which are hosting U.S. equipment and providing access to the fiber-optic cables. [4] [3] [5] In 2013 the program had "access to over 3 terabits per second of data streaming world-wide and encompasses all communication technologies such as voice, fax, telex, modem, email internet chat, virtual private network (VPN), voice over IP (VoIP), and voice call records" [6] and there were total of 37 partner countries including 17 European Union member states. [3] [2] [7]

There are two conditions on the partnership between the NSA and the partner country for making an agreement. The first one is that the partner countries will not use the NSA's technology to collect any data on U.S. citizens. The second one is that the NSA will not use the access it has been granted in the partner countries to collect data on the host countries' citizens. [4] [5] Although these conditions have exceptions, NSA doesn't state which those exceptions are. According to Edward Snowden, these agreements between the NSA and its partner countries are vague and are easily circumvented. [8]

The program was publicly revealed in June 2014, by the Danish newspaper Dagbladet Information [3] and by The Intercept . [2] Revelation of the program was based on as part of the leaks by the former NSA contractor Edward Snowden.

According to a NSA's classified intelligence briefing in 2010, [4] RAMPART-A was used across all NSA Analysis and Production lines, and in the previous year (2009), over 9000 intelligence reports were written based solely on the RAMPART-A data.

The program cost about $170 million between 2011 and 2013. [2] [3] The program started in 1992. [4]

XKeyscore is implemented in the program's architecture. [1]

Partners

The partner countries are divided into two groups by their cooperation level, "Second" and "Third". [7] [2] [3]

For the host partner country, U.S. provides processing and analysis tools and equipment, which means that the partner countries are able to use the NSA's tools for processing and analysing the data that flows in and out of their country. [2] [3] [4] [5] It's likely that not every partner country has RAMPART-A site(s); in 2013 NSA had set up at least 13 RAMPART-A sites, nine of which were in active state. Three of the largest sites, AZUREPHOENIX, SPINNERET and MOONLIGHTPATH gathers traffic from some 70 different cables or networks. [1] [2] [3]

Second level (partners of the Five Eyes) partner countries:

Third level partner countries:

See also

Related Research Articles

ECHELON Signals intelligence collection and analysis network

ECHELON, originally a secret government code name, is a surveillance program operated by the United States with the aid of four other signatory states to the UKUSA Security Agreement: Australia, Canada, New Zealand, and the United Kingdom, also known as the Five Eyes.

National Security Agency U.S. signals intelligence organization

The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence. The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems. The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine.

Government Communications Security Bureau

The Government Communications Security Bureau (GCSB) is the public-service department of New Zealand charged with promoting New Zealand's national security by collecting and analysing information of an intelligence nature.

UKUSA Agreement Secret treaty organising surveillance of electronic communications

The United Kingdom – United States of America Agreement is a multilateral agreement for cooperation in signals intelligence between Australia, Canada, New Zealand, the United Kingdom, and the United States. The alliance of intelligence operations is also known as the Five Eyes. In classification markings this is abbreviated as FVEY, with the individual countries being abbreviated as AUS, CAN, NZL, GBR, and USA, respectively.

Five Eyes Intelligence alliance comprising Australia, Canada, New Zealand, the UK and the US

The Five Eyes (FVEY) is an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom and the United States. These countries are parties to the multilateral UKUSA Agreement, a treaty for joint cooperation in signals intelligence.

PRISM (surveillance program) Mass surveillance program run by the NSA

PRISM is a code name for a program under which the United States National Security Agency (NSA) collects internet communications from various U.S. internet companies. The program is also known by the SIGAD US-984XN. PRISM collects stored internet communications based on demands made to internet companies such as Google LLC under Section 702 of the FISA Amendments Act of 2008 to turn over any data that match court-approved search terms. Among other things, the NSA can use these PRISM requests to target communications that were encrypted when they traveled across the internet backbone, to focus on stored data that telecommunication filtering systems discarded earlier, and to get data that is easier to handle.

Boundless Informant Big data analysis and visualization tool used by the NSA

Boundless Informant is a big data analysis and data visualization tool used by the United States National Security Agency (NSA). It gives NSA managers summaries of the NSA's worldwide data collection activities by counting metadata. The existence of this tool was disclosed by documents leaked by Edward Snowden, who worked at the NSA for the defense contractor Booz Allen Hamilton. Those disclosed documents were in a direct contradiction to the NSA's assurance to United States Congress that it does not collect any type of data on millions of Americans.

Edward Snowden American whistleblower, former National Security Agency contractor

Edward Joseph Snowden is an American whistleblower who copied and leaked highly classified information from the National Security Agency (NSA) in 2013 when he was a Central Intelligence Agency (CIA) employee and subcontractor. His disclosures revealed numerous global surveillance programs, many run by the NSA and the Five Eyes Intelligence Alliance with the cooperation of telecommunication companies and European governments, and prompted a cultural discussion about national security and individual privacy.

Tempora GCHQ-operated Internet and telephone surveillance system

Tempora is the codeword for a formerly-secret computer system that is used by the British Government Communications Headquarters (GCHQ). This system is used to buffer most Internet communications that are extracted from fibre-optic cables, so these can be processed and searched at a later time. It was tested since 2008 and became operational in late 2011.

Special Source Operations (SSO) is a division in the US National Security Agency (NSA) which is responsible for all programs aimed at collecting data from major fiber-optic cables and switches, both inside the US and abroad, and also through corporate partnerships. Its existence was revealed through documents provided by Edward Snowden to media outlets in 2013 and, according to him, it is the "crown jewel" of the NSA.

XKeyscore Mass surveillance system

XKeyscore is a secret computer system used by the United States National Security Agency (NSA) for searching and analyzing global Internet data, which it collects continually. The NSA has shared XKeyscore with other intelligence agencies, including the Australian Signals Directorate, Canada's Communications Security Establishment, New Zealand's Government Communications Security Bureau, Britain's Government Communications Headquarters, Japan's Defense Intelligence Headquarters, and Germany's Bundesnachrichtendienst.

Mass surveillance in the United States

The practice of mass surveillance in the United States dates back to wartime monitoring and censorship of international communications from, to, or which passed through the United States. After the First and Second World Wars, the surveillance continued throughout the Cold War period, via programs such as the Black Chamber and Project SHAMROCK. The formation and growth of federal law-enforcement and intelligence agencies such as the FBI, CIA, and NSA institutionalized surveillance used to also silence political dissent, as evidenced by COINTELPRO projects which targeted various organizations and individuals. During the Civil Rights Movement era, many individuals put under surveillance orders were first labelled as integrationists then deemed subversive and sometimes suspected to be supportive of the communist model of the United States' rival at the time, the Soviet Union. Other targeted individuals and groups included Native American activists, African American and Chicano liberation movement activists, and anti-war protesters.

Global surveillance disclosures (2013–present) Disclosures of NSA and related global espionage

Ongoing news reports in the international media have revealed operational details about the Anglophone cryptographic agencies' global surveillance of both foreign and domestic nationals. The reports mostly emanate from a cache of top secret documents leaked by ex-NSA contractor Edward Snowden, which he obtained whilst working for Booz Allen Hamilton, one of the largest contractors for defense and intelligence in the United States. In addition to a trove of U.S. federal documents, Snowden's cache reportedly contains thousands of Australian, British and Canadian intelligence files that he had accessed via the exclusive "Five Eyes" network. In June 2013, the first of Snowden's documents were published simultaneously by The Washington Post and The Guardian, attracting considerable public attention. The disclosure continued throughout 2013, and a small portion of the estimated full cache of documents was later published by other media outlets worldwide, most notably The New York Times, the Canadian Broadcasting Corporation, the Australian Broadcasting Corporation, Der Spiegel (Germany), O Globo (Brazil), Le Monde (France), L'espresso (Italy), NRC Handelsblad, Dagbladet (Norway), El País (Spain), and Sveriges Television (Sweden).

Origins of global surveillance

The origins of global surveillance can be traced back to the late 1940s, when the UKUSA Agreement was jointly enacted by the United Kingdom and the United States, whose close cooperation eventually culminated in the creation of the global surveillance network, code-named "ECHELON", in 1971.

This is a category of disclosures related to global surveillance.

Global surveillance Mass surveillance across national borders

Global mass surveillance refers to the mass surveillance of entire populations across national borders. Its roots can be traced back to the middle of the 20th century when the UKUSA Agreement was jointly enacted by the United Kingdom and the United States, which later expanded to Canada, Australia, and New Zealand to create the present Five Eyes alliance. The alliance developed cooperation arrangements with several "third-party" nations. Eventually, this resulted in the establishment of a global surveillance network, code-named "ECHELON" (1971).

Upstream collection Term used by the National Security Agency (NSA) of the United States

Upstream collection is a term used by the National Security Agency (NSA) of the United States for intercepting telephone and Internet traffic from the Internet backbone, i.e. major Internet cables and switches, both domestic and foreign. Besides the Upstream collection, NSA also gathers information from Internet communications through arrangements with Internet companies under the program codenamed PRISM. Both the Upstream programs and PRISM are part of the Special Source Operations (SSO) division, which is responsible for collection in cooperation with corporate partners.

Global surveillance whistleblowers

Global surveillance whistleblowers are whistleblowers who provided public knowledge of global surveillance.

Timeline of global surveillance disclosures (2013–present)

This timeline of global surveillance disclosures from 2013 to the present day is a chronological list of the global surveillance disclosures that began in 2013. The disclosures have been largely instigated by revelations from the former American National Security Agency contractor Edward Snowden.

Targeted surveillance is a form of surveillance, such as wiretapping, that is directed towards specific persons of interest, and is distinguishable from mass surveillance. Both untargeted and targeted surveillance is routinely accused of treating innocent people as suspects in ways that are unfair, of violating human rights, international treaties and conventions as well as national laws, and of failing to pursue security effectively.

References

  1. 1 2 3 "Special Source Operations (SSO) slides with details on RAMPART-A sites, collection and tasking" (Classified Top Secret PDF-file. Part of the published files (see the articles from Dagbladet Information and The Intercept ).). Archived from the original on 13 March 2016. Retrieved 4 August 2018.
  2. 1 2 3 4 5 6 7 Ryan, Gallagher (June 19, 2014). "How Secret Partners Expand NSA's Surveillance Dragnet". The Intercept. Archived from the original on May 2, 2018.
  3. 1 2 3 4 5 6 7 8 Anton Geist; Sebastian Gjerding; Henrik Moltke; Laura Poitras. (19 June 2014). "NSA 'third party' partners tap the Internet backbone in global surveillance program". Dagbladet Information. Archived from the original on 22 July 2018. Retrieved 4 August 2018.
  4. 1 2 3 4 5 6 "RAMPART-A Project Overview" (PDF) (Classified Top Secret PDF-file. Part of the published files (see the articles from Dagbladet Information and The Intercept ).). 1 October 2010. Archived from the original (PDF) on 21 March 2018. Retrieved 4 August 2018.
  5. 1 2 3 4 "Special Source Operations (SSO) Overview presenting the RAMPART-A program" (Classified Top Secret PDF-file. Part of the published files (see the articles from Dagbladet Information and The Intercept ).). Archived from the original on 21 March 2018. Retrieved 4 August 2018.
  6. "Black Budget" (PDF). United States Intelligence Community (Classified Top Secret PDF-file. Part of the published files (see the articles from Dagbladet Information and The Intercept ).). 2011. Archived from the original (PDF) on 21 March 2018. Retrieved 4 August 2018.
  7. 1 2 Glenn Greenwald (13 May 2014). No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. Henry Holt and Company. pp. 104–105. ISBN   978-1-62779-074-1.
  8. "Edward Snowden's testimony - European Parliament" (PDF). 7 March 2014. p. 4. Archived from the original (PDF) on 21 June 2018. Retrieved 4 August 2018.