article By now you’ve probably heard that the NSA recently leaked a series of documents detailing the agency’s collection and use of the Milwaukee-area’s WalkieTalk Walkie-talkies.
The documents revealed how the NSA uses a variety of different technology to monitor the location of all of the devices connected to the Milwaukee area, which it calls a “situational awareness collection” of communications.
The documents also showed how the agency is able to collect the WalkieWalls’ location information and then use it to gather the personal information of all those devices that are connected to it.
The NSA was able to leverage these Walkie Walls to track the movements of individuals from different locations all over the world in order to gather data on them, the documents said.
But the Milwaukee documents also detailed how the government can also use Walkie talkies to track its targets.
The Walkietalk Walkie is an “electronic device that provides the ability to send messages to and receive voice, data, and text messages,” according to the documents.
This means the Walkiietalk can track the location, route, and other location data of people using the device.
The NSA is able use the Walkies location information to track a targeted individual.
Once the NSA is in possession of this location information, it can determine the person’s location by tracking their smartphone.
The data can be used to track individuals, the document said.
The Walkiewalk data is also stored on a hard drive and can be accessed from a remote location using a mobile device, the NSA documents said, noting that the Walkiness can be configured to automatically receive location updates from a wireless network, such as a Wi-Fi hotspot.
Once an individual has been tracked, the information can be transmitted to a data repository where it is stored for “forensic purposes.”
This is done through a network of “key points” that “can be identified by the unique identifiers associated with the key points and are not visible to any individual.”
According to the NSA, the key point data is “suspected to contain metadata that provides access to the location data stored on the Walk-ie-Talk.”
The documents said that the “specially designed, highly secure network allows access to key point and metadata records,” which include the location and frequency of the walkie-walkie’s communication.
The system also has an “extensive” collection of “sources and methods of communication.”
The NSA documents noted that the agency also uses “samples of these data to identify communications originating from and emanating from known, known, or suspected terrorists,” as well as to target individuals who have “conspired to commit a terrorist act.”
While the documents described a surveillance system as having “near field communication capabilities,” the NSA said it could also “sensitize” a device by collecting the location information from it.
The document said the NSA could also use “sensor data” to track communications, including audio, video, or text messages, and then analyze the data to determine the location.
The data collected by the NSA can then be “processed to determine targets’ personal information, including email, social media, and location information.”
The document said that data collected can also be “used to identify, locate, and track individuals within a target’s network.”
In addition to its collection of information about individual communication and location, the Milwaukee document said, the agency was also able to use the data collected for “target analysis” and “targeting.”
The NSA’s use of this method is “not limited to surveillance on individuals,” the document noted.
This is an article from The Intercept, a non-profit news organization dedicated to reporting on surveillance, cryptography, and civil liberties.
We do not necessarily endorse the content of this content.