Pinwale Explained
Pinwale is the code name for a National Security Agency (NSA) collection and retrieval system for so-called "Digital Network Intelligence", including internet e-mail.
[1] [2] It is searchable by monitored NSA analysts.
The existence of the system was first revealed by an NSA analyst who was trained in its use during 2005.[2] However, according to Homeland Security Today, Pinwale contains information much more than email. It also contains other forms of Internet data, and other forms of digital communications as well. Its software has built-in protections against collecting from any of the Five Eyes members. Unlike its successor XKeyscore, targets for Pinwale have to be approved beforehand by the FISC.[1]
According to information obtained by The Guardian from Edward Snowden, Pinwale is part of a "multi-tiered system" to address the issue of NSA "collecting so much internet data that it can be stored only for short periods of time." The system allows analysts to store "interesting" content in databases such as Pinwale, which is capable of storing material for up to five years.[3]
Pinwale consists of at least two known partitions referred to as "Sweet" and "Sour".[4]
According to the documents leaked by Snowden, Pinwale normally processed about 60 GB data per day without trouble. However, Pinwale was overwhelmed when Yahoo started mass mailbox transfers between its data centers, which were captured by the NSA's MUSCULAR program that taps the private clouds of Google and Yahoo. Monitored email accounts being hacked by spammers also present a challenge to Pinwale, because they can cause the database of suspect email addresses to grow exponentially with information of no intelligence value.[5]
See also
Notes and References
- Web site: NSA's X-KEYSCORE Does Far More than Just Siphon the 'Net, But is it Working? . Anthony L. Kimery . HStoday . Homeland Security Today . 2013-08-05 . 2014-03-23 . 2013-08-10 . dead . https://web.archive.org/web/20130810130033/http://www.hstoday.us/blogs/the-kimery-report/blog/exclusive-nsas-x-keyscore-does-far-more-than-just-siphon-the-net-but-is-it-working/f419986393a64eec5bf2630815d3da3e.html.
- Web site: E-Mail Surveillance Renews Concerns in Congress . James Risen, Eric Lichtblau . The New York Times . 2013-06-16 . 2014-03-23 . 2014-03-31 . live . https://web.archive.org/web/20140331104419/http://www.nytimes.com/2009/06/17/us/17nsa.html?pagewanted=2&_r=0., page 1 at archive.
- Web site: XKeyscore: NSA tool collects 'nearly everything a user does on the internet' . Glenn Greenwald . The Guardian . 2013-07-31 . 2014-03-23 . 2014-03-20 . live . https://web.archive.org/web/20140320191519/http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data.
- Web site: NSA loophole allows warrantless search for US citizens' emails and phone calls . James Ball, Spencer Ackerman . The Guardian . 2013-08-09 . 2014-03-23 . 2014-03-24 . live . https://web.archive.org/web/20140324001621/http://www.theguardian.com/world/2013/aug/09/nsa-loophole-warrantless-searches-email-calls.
- Web site: How the NSA's MUSCULAR tapped Google's and Yahoo's private networks . Sean Gallagher . Ars Technica . 2013-10-31 . 2014-03-23 . 2014-03-03 . live . https://web.archive.org/web/20140303130702/http://arstechnica.com/information-technology/2013/10/how-the-nsas-muscular-tapped-googles-and-yahoos-private-networks/.