SlideShare una empresa de Scribd logo
1 de 27
Descargar para leer sin conexión
Los Angeles Hemisphere
LAW ENFORCEMENT SENSITIVE
Hemisphere Summary
  The Hemisphere Project is coordinated from the Los Angeles
Clearinghouse and is funded by ONDCP and DEA.
  Hemisphere provides electronic call detail records (CDRs) in
response to federal, state, and local administrative/grand
jury subpoenas.
  The Hemisphere database contains CDRs for any telephone
carrier that uses an AT&T switch to process a telephone call.
  Hemisphere is an unclassified program.
  Hemisphere provides de-confliction within the Hemisphere
database.
  4 billion CDRs populate the Hemisphere database on a daily
basis.
  Hemisphere results can be returned via email within an hour
of the subpoenaed request and include CDRs that are less
than one hour old at the time of the search
  The Hemisphere program has access to long distance and
international CDR’s data going back to 1987
  Hemisphere data contains roaming information that can
identify the city and state at the time of the call
  Results are returned in several formats that aid the analyst/
investigator (I2, Penlink, GeoTime, Target Dialed Frequency
report, Common Calls report, etc)
Hemisphere Summary
Facts and Figures
  Since its inception in September 2007, the Los Angeles
Hemisphere Program has processed over 4,400 requests and
over 11,200 individual telephone numbers
  As of June 2013 Hemisphere has processed 679 requests from
the Northwest HIDTA
  Hemisphere is most often used by DEA and DHS in the
Northwest HIDTA to identify replacement/additional phones
  The Northwest HIDTA has recently utilized Hemisphere to
track known Canadian phones roaming in the U.S. on the
AT&T network
Unique Project Features
  “Dropped Phones” - the program uses an algorithm
and advanced search features to find the new number.
  “Additional Phones” – the program can often
determine cell phones the target is using that are
unknown to law enforcement.
  “International Phones” – the program provides
CDRs for a tremendous amount of international
numbers that place calls through or roam on the AT&T
network. The information is provided in response to
the standard Hemisphere administrative subpoena.
Advanced Results
Analysis
Searching For Dropped Phones
  Dropped Phone Requests: A service provided by
Hemisphere, requestors can ask for analysts to find
possible replacement phones that are no longer active
 To do this, you must mention “Dropped Phone Request”
in the special instructions on your request form
  A dropped phone report will be returned in paragraph
form and either written out in the returned email or
attached with the results as a word file
Advanced Results
Analysis
Searching For Dropped Phones
  The method for identifying the replacement phone for
the dropped phone involves careful analysis of the
developed advanced results
  By systematically grading the common calls report and
scrutinizing the date ranges, candidates for the
replacement phone are ranked by probability
Protecting The Program
Protecting the Hemisphere program is a formidable challenge.
We have taken the following steps to try and keep the program
under the radar.
"   Training – All Hemisphere training modules are inundated
with instruction regarding how to protect Hemisphere data.
"   Use - Hemisphere requests are vetted. Requestors must have
either attended Hemisphere training or be directly connected to
a HIDTA Initiative/Agency or intelligence center familiar with
the program.
Protecting The Program
Hemisphere data will likely produce a variety of different
leads for an array of cases.
Hemisphere data will only indicate calls that hit an AT&T
switch
Therefore, the only way to get a complete and accurate
picture of the target’s phone activity is to subpoena and
review a complete set of the carrier’s CDRs.
Protecting The Program
When a complete set of CDRs are subpoenaed from the
carrier, then all memorialized references to relevant and
pertinent calls can be attributed to the carrier’s records,
thus “walling off” the information obtained from
Hemisphere. In other words, Hemisphere can easily be
protected if it is used as a pointer system to uncover
relevant numbers.
Protecting The Program
In special cases, we realize that it might not be possible to
obtain subpoenaed phone records that will “wall off”
Hemisphere.
In these special circumstances, the Hemisphere analyst
should be contacted immediately. The analyst will work
with the investigator and request a separate subpoena to
AT&T.
-Exigent
Circumstances-
Protecting The Program
All requestors are instructed to never refer to Hemisphere
in any official document. If there is no alternative to
referencing a Hemisphere request, then the results should be
referenced as information obtained from an AT&T subpoena.
-Official Reporting-
What’s new with Hemisphere?
 First court order from Washington submitted in Dec
2012
 AT&T legal approved use of Court orders from Washington state
 Allows Local agencies to utilize Hemisphere through court orders
 Hemisphere began providing subscriber
information in July 2012 for AT&T phones
 Began IMSI and IMEI searches in July 2012 if
equipment is utilizing AT&T’s wireless network
 Started offering mapping through the GeoTime
software in July 2012
 Introduced limited pinging for some phones in May
2013
Hemisphere	
  2012	
  Requests	
  
617
1610
543
Atlanta
Houston
Los	
  Angeles
Hemisphere	
  Requests	
  By	
  HIDTA	
  
2012-­‐2013	
  
28
4
304
4
59
152
19
183
85
Central	
  Valley	
  HIDTA
Hawaii	
  HIDTA
Los	
  Angeles	
  HIDTA
Nevada	
  HIDTA
Northern	
  California	
  
HIDTA
Northwest	
  HIDTA
Oregon	
  HIDTA
Southwest	
  Border	
  
HIDTA:	
  Arizona
Southwest	
  Border	
  
HIDTA:	
  California
Hemisphere	
  Requests	
  By	
  Agency	
  
Northwest	
  HIDTA	
  2012-­‐2013	
  
77
69
4 1 1 DEA
DHS
FBI
Tacoma	
  Pd
Washington	
  DOC
Request	
  by	
  Type	
  
Northwest	
  HIDTA	
  2012-­‐2013
46
106
BASIC DROPPED	
  PHONE
Hemisphere	
  Drug	
  Types	
  	
  
	
  Northwest	
  HIDTA	
  2012-­‐2013
*	
  Fugi'ves,	
  Homicides,	
  Kidnappings,	
  Missing	
  Persons,	
  Etc.
26%
10%
7%21%
28%
4% 4%
COCAINE
HEROIN
MARIJUANA
METH
POLYDRUG
ECSTASY
*OTHER
Hemisphere
SUCCESS
STORIES
Northwest HIDTA
DEA- Seattle 2011
• During a wire intercept conducted from Jan
2011 to April 2011, targets would continually
rotate their pre-paid phones
• Utilized Hemisphere extensively to
identify dropped phones and verify targets
• Hemisphere identified a significant
amount of the new numbers
• Based on this wire intercept investigation DEA
was able to seize;
• 136 kilos of cocaine
• 2000 pounds of marijuana
• Approximately 2.2 million dollars
• Several residences, vehicles, and other
assets.
• “Plus, we really pissed off the Hells
Angel’s in Canada”
Hemisphere
SUCCESS
STORIES
2012-2013
Montclair PD- Los Angeles
2012
• Men wearing ski masks smashed cases inside the Ben
Bridge store at Montclair Plaza and grabbed 30 Rolex
watches while holding employees and customers at
gunpoint
• Police officers worked with law enforcement in
Henderson, Nev., after discovering two similar heists
occurred there
• Through Hemisphere, detectives identified a new target
number being used by the main suspect
• Montclair PD quickly tracked the new target number and the
suspect and six others were apprehended
• Seven people were arrested and officers seized two
motorcycles and $180,000, believed to be bought with
cash from the robberies
• They also found evidence that they were planning to rob
the Glendale Galleria that day and another jewelry store in
San Francisco later
Redondo Beach PD-Los Angeles
2012
• A warrant was issued for Rene Avina's arrest
Monday after authorities identified him as a second
man wanted in connection with the June 2 death of
49-year-old bar bouncer Terie Colecchi
• Through Hemisphere detectives identified a target
number being used by the main suspect
• He was arrested on suspicion of murder
DEA- Los Angeles/South Carolina
Feb 2013
• Melissa Ann Griggs made repeated bomb threats to
hospitals, schools, banks and county offices in South
Carolina
• The local authorities were having great difficulty
finding the number being used and reached out for
federal assistance
• One of the numbers presented on the caller id was
the cell phone number of a local drug trafficker
• Analysis of subpoenaed toll records indicated
this phone was not making the calls.
• Hemisphere toll record analysis of the threatened
businesses showed the calls were coming from a
Verizon Wireless customer
• With this knowledge, calls to destination
searches were requested of Verizon Wireless
revealing the actual number making the calls.
• She was arrested Feb. 14 at the Walmart in Seneca
on a trespassing charge, and charged with 30 counts
of making bombing threats
DEA- Arizona
2013
• Numerous dropped phone searches were
conducted over the course of a continuous
investigation with multiple replacement phones
identified
• Multiple Mexican phones roaming in the U.S.
were identified
• Since early 2012 the investigation has yielded
the following seizures
• 100lbs of meth
• 225 lbs of hashish
• 9kg of cocaine
• $190,000
• 5 assault rifles
• Bullet proof vest
• Investigation is ongoing with more seizures
expected
NCIS- San Diego
March 2013
• Kennard Walters, allegedly impersonating a 2 Star
General, was asked to show an identification card at
Naval Base San Diego
• He stated he left the card in his vehicle and
drove off
• Walters physically assaulted and subsequently ran
over a Naval Criminal Intelligence Service Special
Agent and fled the base
• After the initial incident the suspect changed his
phone number and drove to northern California
• After a return to the Los Angeles area, he then
drove to Tehama County in Northern California
where he was apprehended
• Hemisphere was able determine his new telephone
number, and provide cell site data leading to his
arrest
Questions?

Más contenido relacionado

Destacado

German and English, cousins on friendly terms
German and English, cousins on friendly termsGerman and English, cousins on friendly terms
German and English, cousins on friendly terms
memriseblo
 
August coverage summary
August coverage summaryAugust coverage summary
August coverage summary
OllieHThomas
 
Ppt financial literacy_schools
Ppt financial literacy_schoolsPpt financial literacy_schools
Ppt financial literacy_schools
IMS Proschool
 
ภูมิปัญญา
ภูมิปัญญาภูมิปัญญา
ภูมิปัญญา
phaudjantuk
 
the importance between living organisms and the environment
the importance between living organisms and the environmentthe importance between living organisms and the environment
the importance between living organisms and the environment
Jiwamalar Jiwa
 
German and english we are family...
German and english   we are family...German and english   we are family...
German and english we are family...
memriseblo
 
Objective Three: The Interdependence of Organisms and the Environment (Biology)
Objective Three: The Interdependence of Organisms and the Environment (Biology)Objective Three: The Interdependence of Organisms and the Environment (Biology)
Objective Three: The Interdependence of Organisms and the Environment (Biology)
chendaduong
 
Financial Literacy
Financial LiteracyFinancial Literacy
Financial Literacy
iChange
 
Inherited traits
Inherited traitsInherited traits
Inherited traits
leasc
 
Acquired and Inherited Traits
Acquired and Inherited TraitsAcquired and Inherited Traits
Acquired and Inherited Traits
brandolina1
 

Destacado (20)

German and English, cousins on friendly terms
German and English, cousins on friendly termsGerman and English, cousins on friendly terms
German and English, cousins on friendly terms
 
Out of control torture and other ill treatment in mexico
Out of control torture and other ill treatment in mexicoOut of control torture and other ill treatment in mexico
Out of control torture and other ill treatment in mexico
 
Farmacologia clase2
Farmacologia clase2Farmacologia clase2
Farmacologia clase2
 
August coverage summary
August coverage summaryAugust coverage summary
August coverage summary
 
Ppt financial literacy_schools
Ppt financial literacy_schoolsPpt financial literacy_schools
Ppt financial literacy_schools
 
Scientific Revolution Thinkers
Scientific Revolution ThinkersScientific Revolution Thinkers
Scientific Revolution Thinkers
 
Winter Solstice - Northern Hemisphere
Winter Solstice - Northern HemisphereWinter Solstice - Northern Hemisphere
Winter Solstice - Northern Hemisphere
 
Inherited Traits
Inherited TraitsInherited Traits
Inherited Traits
 
ภูมิปัญญา
ภูมิปัญญาภูมิปัญญา
ภูมิปัญญา
 
the importance between living organisms and the environment
the importance between living organisms and the environmentthe importance between living organisms and the environment
the importance between living organisms and the environment
 
German and english we are family...
German and english   we are family...German and english   we are family...
German and english we are family...
 
Objective Three: The Interdependence of Organisms and the Environment (Biology)
Objective Three: The Interdependence of Organisms and the Environment (Biology)Objective Three: The Interdependence of Organisms and the Environment (Biology)
Objective Three: The Interdependence of Organisms and the Environment (Biology)
 
Curriculum children financial literacy
Curriculum children financial literacyCurriculum children financial literacy
Curriculum children financial literacy
 
Adaptation of animal
Adaptation of animalAdaptation of animal
Adaptation of animal
 
Inherited Traits/Learned Behaviors
Inherited Traits/Learned  BehaviorsInherited Traits/Learned  Behaviors
Inherited Traits/Learned Behaviors
 
Financial Literacy
Financial LiteracyFinancial Literacy
Financial Literacy
 
WAZE
WAZE WAZE
WAZE
 
Adaptation Powerpoint
Adaptation PowerpointAdaptation Powerpoint
Adaptation Powerpoint
 
Inherited traits
Inherited traitsInherited traits
Inherited traits
 
Acquired and Inherited Traits
Acquired and Inherited TraitsAcquired and Inherited Traits
Acquired and Inherited Traits
 

Similar a Hemisphere Database

V way call
V way callV way call
V way call
ajbayne
 
Conversion investigation methods
Conversion investigation methodsConversion investigation methods
Conversion investigation methods
VidaB
 
Conversion investigation methods
Conversion investigation methodsConversion investigation methods
Conversion investigation methods
VidaB
 
Contact Center Compliance Webinar 2 8 12
Contact Center Compliance Webinar 2 8 12Contact Center Compliance Webinar 2 8 12
Contact Center Compliance Webinar 2 8 12
Ryan Thurman
 
Report telemarketers and annoying callers. Trace any phone number.
Report telemarketers and annoying callers. Trace any phone number.Report telemarketers and annoying callers. Trace any phone number.
Report telemarketers and annoying callers. Trace any phone number.
pleasure16
 
Where can you get certified, and what are the eligibility requirem.docx
Where can you get certified, and what are the eligibility requirem.docxWhere can you get certified, and what are the eligibility requirem.docx
Where can you get certified, and what are the eligibility requirem.docx
philipnelson29183
 
Defender Transportation No Price V2
Defender Transportation No Price V2Defender Transportation No Price V2
Defender Transportation No Price V2
krosey1
 
Project Report for City of Los Angeles’ 311 Service Request
Project Report for City of Los Angeles’ 311 Service RequestProject Report for City of Los Angeles’ 311 Service Request
Project Report for City of Los Angeles’ 311 Service Request
Raman Deep Singh
 

Similar a Hemisphere Database (20)

V way call
V way callV way call
V way call
 
Mobile Data for Development Primer
Mobile Data for Development PrimerMobile Data for Development Primer
Mobile Data for Development Primer
 
Jerry Chetty - Myth About Data Investigation
Jerry Chetty - Myth About Data InvestigationJerry Chetty - Myth About Data Investigation
Jerry Chetty - Myth About Data Investigation
 
AICPA The State of the Union of Forensic Accounting From Both Sides of the 49...
AICPA The State of the Union of Forensic Accounting From Both Sides of the 49...AICPA The State of the Union of Forensic Accounting From Both Sides of the 49...
AICPA The State of the Union of Forensic Accounting From Both Sides of the 49...
 
Conversion investigation methods
Conversion investigation methodsConversion investigation methods
Conversion investigation methods
 
Conversion investigation methods
Conversion investigation methodsConversion investigation methods
Conversion investigation methods
 
Guideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu KhimaniGuideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu Khimani
 
Occupational Fraud and Electronic Evidence Investigations
Occupational Fraud and Electronic Evidence InvestigationsOccupational Fraud and Electronic Evidence Investigations
Occupational Fraud and Electronic Evidence Investigations
 
Mobile forensics a primer
Mobile forensics a primerMobile forensics a primer
Mobile forensics a primer
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance Society
 
Contact Center Compliance Webinar 2 8 12
Contact Center Compliance Webinar 2 8 12Contact Center Compliance Webinar 2 8 12
Contact Center Compliance Webinar 2 8 12
 
Cell phone fraud
Cell phone fraud Cell phone fraud
Cell phone fraud
 
Report telemarketers and annoying callers. Trace any phone number.
Report telemarketers and annoying callers. Trace any phone number.Report telemarketers and annoying callers. Trace any phone number.
Report telemarketers and annoying callers. Trace any phone number.
 
Enhanced Due Diligence
Enhanced Due DiligenceEnhanced Due Diligence
Enhanced Due Diligence
 
Where can you get certified, and what are the eligibility requirem.docx
Where can you get certified, and what are the eligibility requirem.docxWhere can you get certified, and what are the eligibility requirem.docx
Where can you get certified, and what are the eligibility requirem.docx
 
Discoverable Client Issues Using Public Big Data
Discoverable Client Issues Using Public Big DataDiscoverable Client Issues Using Public Big Data
Discoverable Client Issues Using Public Big Data
 
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...
 
Defender Transportation No Price V2
Defender Transportation No Price V2Defender Transportation No Price V2
Defender Transportation No Price V2
 
Project Report for City of Los Angeles’ 311 Service Request
Project Report for City of Los Angeles’ 311 Service RequestProject Report for City of Los Angeles’ 311 Service Request
Project Report for City of Los Angeles’ 311 Service Request
 

Más de cherazigzag

Kit de ventas digital snh
Kit de ventas digital snhKit de ventas digital snh
Kit de ventas digital snh
cherazigzag
 

Más de cherazigzag (20)

La gestion de_la_pandemia_en_mexico_salomon_chertorivski
La gestion de_la_pandemia_en_mexico_salomon_chertorivskiLa gestion de_la_pandemia_en_mexico_salomon_chertorivski
La gestion de_la_pandemia_en_mexico_salomon_chertorivski
 
Foro Sistema Penal Acusatorio: ¿Hacia dónde vamos?
Foro Sistema Penal Acusatorio: ¿Hacia dónde vamos?Foro Sistema Penal Acusatorio: ¿Hacia dónde vamos?
Foro Sistema Penal Acusatorio: ¿Hacia dónde vamos?
 
La guerraennumeros t-research-homicidios-mx
La guerraennumeros t-research-homicidios-mxLa guerraennumeros t-research-homicidios-mx
La guerraennumeros t-research-homicidios-mx
 
Evaluacion amlo jul
Evaluacion amlo julEvaluacion amlo jul
Evaluacion amlo jul
 
La pandemiaennumeros t-research-covid19
La pandemiaennumeros t-research-covid19La pandemiaennumeros t-research-covid19
La pandemiaennumeros t-research-covid19
 
Liderazgo en crisis 2020
Liderazgo en crisis 2020Liderazgo en crisis 2020
Liderazgo en crisis 2020
 
Nuevas tendencias seguridad nacional 2020
Nuevas tendencias seguridad nacional 2020Nuevas tendencias seguridad nacional 2020
Nuevas tendencias seguridad nacional 2020
 
Trump GOP's Controversial Secret FISA Memo
Trump GOP's Controversial Secret FISA MemoTrump GOP's Controversial Secret FISA Memo
Trump GOP's Controversial Secret FISA Memo
 
Presentación del disco Ver de Verdad - Claudia Montiel
Presentación del disco Ver de Verdad - Claudia MontielPresentación del disco Ver de Verdad - Claudia Montiel
Presentación del disco Ver de Verdad - Claudia Montiel
 
Catalogo Programa para la Convivencia Ciudadana
Catalogo Programa para la Convivencia CiudadanaCatalogo Programa para la Convivencia Ciudadana
Catalogo Programa para la Convivencia Ciudadana
 
Version de la Policía Estatal de la confrontación con manifestantes en la Car...
Version de la Policía Estatal de la confrontación con manifestantes en la Car...Version de la Policía Estatal de la confrontación con manifestantes en la Car...
Version de la Policía Estatal de la confrontación con manifestantes en la Car...
 
Future State 2030
Future State 2030Future State 2030
Future State 2030
 
Reporte de Indice Delictivo de la Ciudad de México (RINDE) 2014
Reporte de Indice Delictivo de la Ciudad de México (RINDE) 2014Reporte de Indice Delictivo de la Ciudad de México (RINDE) 2014
Reporte de Indice Delictivo de la Ciudad de México (RINDE) 2014
 
Plan orbita-2013
Plan orbita-2013Plan orbita-2013
Plan orbita-2013
 
Kit de ventas digital snh
Kit de ventas digital snhKit de ventas digital snh
Kit de ventas digital snh
 
Sun Tzu: El arte de la guerra
Sun Tzu: El arte de la guerraSun Tzu: El arte de la guerra
Sun Tzu: El arte de la guerra
 
Black budget- How intelligence agencies spend $52 billion
Black budget- How intelligence agencies spend $52 billionBlack budget- How intelligence agencies spend $52 billion
Black budget- How intelligence agencies spend $52 billion
 
Encuentra a tu maestro
Encuentra a tu maestroEncuentra a tu maestro
Encuentra a tu maestro
 
Plan Nacional de Desarrollo 2013-2018
Plan Nacional de Desarrollo 2013-2018Plan Nacional de Desarrollo 2013-2018
Plan Nacional de Desarrollo 2013-2018
 
Violentometro
ViolentometroViolentometro
Violentometro
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Hemisphere Database

  • 1. Los Angeles Hemisphere LAW ENFORCEMENT SENSITIVE
  • 2. Hemisphere Summary   The Hemisphere Project is coordinated from the Los Angeles Clearinghouse and is funded by ONDCP and DEA.   Hemisphere provides electronic call detail records (CDRs) in response to federal, state, and local administrative/grand jury subpoenas.   The Hemisphere database contains CDRs for any telephone carrier that uses an AT&T switch to process a telephone call.   Hemisphere is an unclassified program.   Hemisphere provides de-confliction within the Hemisphere database.   4 billion CDRs populate the Hemisphere database on a daily basis.
  • 3.   Hemisphere results can be returned via email within an hour of the subpoenaed request and include CDRs that are less than one hour old at the time of the search   The Hemisphere program has access to long distance and international CDR’s data going back to 1987   Hemisphere data contains roaming information that can identify the city and state at the time of the call   Results are returned in several formats that aid the analyst/ investigator (I2, Penlink, GeoTime, Target Dialed Frequency report, Common Calls report, etc) Hemisphere Summary
  • 4. Facts and Figures   Since its inception in September 2007, the Los Angeles Hemisphere Program has processed over 4,400 requests and over 11,200 individual telephone numbers   As of June 2013 Hemisphere has processed 679 requests from the Northwest HIDTA   Hemisphere is most often used by DEA and DHS in the Northwest HIDTA to identify replacement/additional phones   The Northwest HIDTA has recently utilized Hemisphere to track known Canadian phones roaming in the U.S. on the AT&T network
  • 5. Unique Project Features   “Dropped Phones” - the program uses an algorithm and advanced search features to find the new number.   “Additional Phones” – the program can often determine cell phones the target is using that are unknown to law enforcement.   “International Phones” – the program provides CDRs for a tremendous amount of international numbers that place calls through or roam on the AT&T network. The information is provided in response to the standard Hemisphere administrative subpoena.
  • 6. Advanced Results Analysis Searching For Dropped Phones   Dropped Phone Requests: A service provided by Hemisphere, requestors can ask for analysts to find possible replacement phones that are no longer active  To do this, you must mention “Dropped Phone Request” in the special instructions on your request form   A dropped phone report will be returned in paragraph form and either written out in the returned email or attached with the results as a word file
  • 7. Advanced Results Analysis Searching For Dropped Phones   The method for identifying the replacement phone for the dropped phone involves careful analysis of the developed advanced results   By systematically grading the common calls report and scrutinizing the date ranges, candidates for the replacement phone are ranked by probability
  • 8. Protecting The Program Protecting the Hemisphere program is a formidable challenge. We have taken the following steps to try and keep the program under the radar. "   Training – All Hemisphere training modules are inundated with instruction regarding how to protect Hemisphere data. "   Use - Hemisphere requests are vetted. Requestors must have either attended Hemisphere training or be directly connected to a HIDTA Initiative/Agency or intelligence center familiar with the program.
  • 9. Protecting The Program Hemisphere data will likely produce a variety of different leads for an array of cases. Hemisphere data will only indicate calls that hit an AT&T switch Therefore, the only way to get a complete and accurate picture of the target’s phone activity is to subpoena and review a complete set of the carrier’s CDRs.
  • 10. Protecting The Program When a complete set of CDRs are subpoenaed from the carrier, then all memorialized references to relevant and pertinent calls can be attributed to the carrier’s records, thus “walling off” the information obtained from Hemisphere. In other words, Hemisphere can easily be protected if it is used as a pointer system to uncover relevant numbers.
  • 11. Protecting The Program In special cases, we realize that it might not be possible to obtain subpoenaed phone records that will “wall off” Hemisphere. In these special circumstances, the Hemisphere analyst should be contacted immediately. The analyst will work with the investigator and request a separate subpoena to AT&T. -Exigent Circumstances-
  • 12. Protecting The Program All requestors are instructed to never refer to Hemisphere in any official document. If there is no alternative to referencing a Hemisphere request, then the results should be referenced as information obtained from an AT&T subpoena. -Official Reporting-
  • 13. What’s new with Hemisphere?  First court order from Washington submitted in Dec 2012  AT&T legal approved use of Court orders from Washington state  Allows Local agencies to utilize Hemisphere through court orders  Hemisphere began providing subscriber information in July 2012 for AT&T phones  Began IMSI and IMEI searches in July 2012 if equipment is utilizing AT&T’s wireless network  Started offering mapping through the GeoTime software in July 2012  Introduced limited pinging for some phones in May 2013
  • 14. Hemisphere  2012  Requests   617 1610 543 Atlanta Houston Los  Angeles
  • 15. Hemisphere  Requests  By  HIDTA   2012-­‐2013   28 4 304 4 59 152 19 183 85 Central  Valley  HIDTA Hawaii  HIDTA Los  Angeles  HIDTA Nevada  HIDTA Northern  California   HIDTA Northwest  HIDTA Oregon  HIDTA Southwest  Border   HIDTA:  Arizona Southwest  Border   HIDTA:  California
  • 16. Hemisphere  Requests  By  Agency   Northwest  HIDTA  2012-­‐2013   77 69 4 1 1 DEA DHS FBI Tacoma  Pd Washington  DOC
  • 17. Request  by  Type   Northwest  HIDTA  2012-­‐2013 46 106 BASIC DROPPED  PHONE
  • 18. Hemisphere  Drug  Types      Northwest  HIDTA  2012-­‐2013 *  Fugi'ves,  Homicides,  Kidnappings,  Missing  Persons,  Etc. 26% 10% 7%21% 28% 4% 4% COCAINE HEROIN MARIJUANA METH POLYDRUG ECSTASY *OTHER
  • 20. DEA- Seattle 2011 • During a wire intercept conducted from Jan 2011 to April 2011, targets would continually rotate their pre-paid phones • Utilized Hemisphere extensively to identify dropped phones and verify targets • Hemisphere identified a significant amount of the new numbers • Based on this wire intercept investigation DEA was able to seize; • 136 kilos of cocaine • 2000 pounds of marijuana • Approximately 2.2 million dollars • Several residences, vehicles, and other assets. • “Plus, we really pissed off the Hells Angel’s in Canada”
  • 22. Montclair PD- Los Angeles 2012 • Men wearing ski masks smashed cases inside the Ben Bridge store at Montclair Plaza and grabbed 30 Rolex watches while holding employees and customers at gunpoint • Police officers worked with law enforcement in Henderson, Nev., after discovering two similar heists occurred there • Through Hemisphere, detectives identified a new target number being used by the main suspect • Montclair PD quickly tracked the new target number and the suspect and six others were apprehended • Seven people were arrested and officers seized two motorcycles and $180,000, believed to be bought with cash from the robberies • They also found evidence that they were planning to rob the Glendale Galleria that day and another jewelry store in San Francisco later
  • 23. Redondo Beach PD-Los Angeles 2012 • A warrant was issued for Rene Avina's arrest Monday after authorities identified him as a second man wanted in connection with the June 2 death of 49-year-old bar bouncer Terie Colecchi • Through Hemisphere detectives identified a target number being used by the main suspect • He was arrested on suspicion of murder
  • 24. DEA- Los Angeles/South Carolina Feb 2013 • Melissa Ann Griggs made repeated bomb threats to hospitals, schools, banks and county offices in South Carolina • The local authorities were having great difficulty finding the number being used and reached out for federal assistance • One of the numbers presented on the caller id was the cell phone number of a local drug trafficker • Analysis of subpoenaed toll records indicated this phone was not making the calls. • Hemisphere toll record analysis of the threatened businesses showed the calls were coming from a Verizon Wireless customer • With this knowledge, calls to destination searches were requested of Verizon Wireless revealing the actual number making the calls. • She was arrested Feb. 14 at the Walmart in Seneca on a trespassing charge, and charged with 30 counts of making bombing threats
  • 25. DEA- Arizona 2013 • Numerous dropped phone searches were conducted over the course of a continuous investigation with multiple replacement phones identified • Multiple Mexican phones roaming in the U.S. were identified • Since early 2012 the investigation has yielded the following seizures • 100lbs of meth • 225 lbs of hashish • 9kg of cocaine • $190,000 • 5 assault rifles • Bullet proof vest • Investigation is ongoing with more seizures expected
  • 26. NCIS- San Diego March 2013 • Kennard Walters, allegedly impersonating a 2 Star General, was asked to show an identification card at Naval Base San Diego • He stated he left the card in his vehicle and drove off • Walters physically assaulted and subsequently ran over a Naval Criminal Intelligence Service Special Agent and fled the base • After the initial incident the suspect changed his phone number and drove to northern California • After a return to the Los Angeles area, he then drove to Tehama County in Northern California where he was apprehended • Hemisphere was able determine his new telephone number, and provide cell site data leading to his arrest