1 / 21

Major Communications Cables - Points of Convergence - ATT Verizon British Telecom T-Mobile

Explore the network convergence points of major communications cables, including ATT, Verizon, British Telecom, and T-Mobile, connecting cities like New York, Chicago, Los Angeles, and more. Discover the importance of these points for global communication.

jbliss
Download Presentation

Major Communications Cables - Points of Convergence - ATT Verizon British Telecom T-Mobile

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Major Communications Cables - Points of Convergence - ATTVerizon British Telecom T-Mobile New York New York New York New York Chicago Chicago Chicago Chicago Los Angeles Los Angeles Los Angeles Los Angeles Salt Lake City Salt Lake City Salt Lake City Denver Denver Denver Phoenix Phoenix Phoenix Kansas City Kansas City Kansas City Atlanta Atlanta Atlanta Miami Miami Miami Washington DC Washington DC Washington DC Seattle Seattle Seattle San Francisco San Francisco San Francisco Dallas Dallas Dallas

  2. Major Cable Convergence Points (Cont.) ATT Verizon British Telecom T-Mobile San Jose San Jose San Diego San Diego St Louis St Louis Orlando Orlando Boston Boston Newark Newark Houston Houston Philadelphia Philadelphia Nashville Cleveland Portland San Diego Las Vegas Detroit Charlotte NC Richmond Sunnyvale Burbank Tucson Tampa Eckington

  3. ATT Verizon British Telecom T-Mobile Major Cable Convergence Points (Cont.) Amsterdam Amsterdam Amsterdam Frankfurt Frankfurt Frankfurt Paris Paris Paris London London London London Tokyo Tokyo Tokyo Tokyo Hong Kong Hong Kong Hong Kong Singapore Singapore Singapore Stockholm Stockholm Sydney Sydney Toronto Redditch Sophia Antipolis Bangolor Shanghai Buenos Aires Copenhagen Rio De Janeiro Marseille Santiago Hamburg Lima Hanover Mexico City Nuremberg Bogota Zurich Mumbai Vienna

  4. FISA Amendments Act Section 702 Operations

  5. FAIRVIEW Sites

  6. 3 Global Public Service Telephone Network Switching System

  7. The Phone System Knows What It’s Doing – Why Don’t U.S. Officials? FOREIGN TO FOREIGN 00 FOREIGN TO UNITED STATES 00 UNITED STATES TO FOREIGN 01 or 011 UNITED STATES TO UNITED STATES1 PHONE CALL (LANDLINE OR CELL) REQUIRED PREFIX STELLAR WIND

  8. Both IPv4 and IPv6 addresses are generally assigned in a hierarchical manner. Users are assigned IP addresses by Internet service providers (ISPs). ISPs obtain allocations of IP addresses from a local Internet Registry (LIR) or national Internet Registry (NIR), or from their appropriate Regional Internet Registry (RIR):

  9. Target Development and Discovery Suspect Zone of “Suspects” 2º of separation from “Knowns” Unknown Known

  10. Focus of Analysis: One Degree and Two Degrees of Separation Known Bad Guy Suspected Bad Guys

  11. Encryption – The key to Protecting the Privacy of U.S. Citizens • Using encrypted identifiers of US individuals • Relationships can still be mapped     • Communities can still be determined     • Connections with known US or foreign targets can be traced     • IC and/or LE analysts can look at any relationships without • identifying protected persons     • IC analysts cannot purposefully or accidentally access and analyze • protected citizen data without probable cause • Identifying data can be decrypted for targeting, once criteria • constituting probable cause are met      • Civil liberties are protected while preserving the ability to detect terrorists and/or other activities

  12. E Discovering and Protecting - Guarding Privacy While Finding the Threat - Mullah Omar Kandahar, Afghanistan Mustafa Alhawsawi Dubai, UAE Mustafa Alhawsawi Dubai, UAE Nawaf Alhazmi San Diego, CA Ramzi Binalshibh Hamburg, Germany Ramzi Binalshibh Hamburg, Germany <#(!}| ?%#*&”:> Hollywood, FL Marwan Alshehhi Hollywood, FL Khalid Almihdhar San Diego, CA Mohamed Atta Hollywood, FL (#@&^:” ?<|{ Hollywood, FL +^#* ?<“|{@$ Hollywood, FL Hani Hanjour Hollywood, FL Majed Moqed Daytona Beach, FL ){;?] %)/’| Daytona Beach, FL WANTED U.S. WANTED UNKNOWN U.S. PROTECTED

  13. Community Transaction Timeline

  14. Illegal Use of Private InformationU.S. Drug Enforcement Agency/Special Ops Division http://rt.com/usa/dea-agents-nsa-evidence-067/

  15. Illegal Use of Private Information- Masking the (Illegal) Source - http://rt.com/usa/dea-agents-nsa-evidence-067/

More Related