• How Levitation works

    A look at how Canada tracked one person who downloaded a suspicious document
  • Graphic -- details follow

    Scour file-sharing sites

    Canada and its spying partners have amassed a vast trove of metadata of files uploaded and downloaded around the world. Every day, the agency's analysts sift through information on 10 to 15 million uploads or download events. It could include videos, music, documents and other files hosted by so-called "free file upload" sites. The data comes from 102 file-sharing websites.
  • Graphic -- details follow

    Watch a suspicious file

    Security analysts focus on suspicious files. Every month, the agency identifies about 350 “interesting download events” related to extremism or terrorism, the document says, adding this is the "easy part." One target file is The Explosives Course, an English al-Qaeda bomb-making manual published in late 2010, found on Sendspace.com.
  • Graphic -- details follow

    Trace the IP

    At 7:46 a.m., someone downloads The Explosives Course. Analysts look at the IP address. It reveals the location of the computer network used as Kenya. It doesn't give them the exact location of the person.
  • Graphic -- details follow

    Follow the cookies

    They drill down further. The IP address is plugged into Mutant Broth, a database run by Britain's electronic spy agency, which stores billions of internet cookies (most commonly used for targeted advertising). With this data, they piece together the target's online activity for five hours before the file was downloaded and five hours after.
  • Graphic -- details follow

    Identify the suspect

    In total, the agency finds nearly 700 signs of online activity, but only 77 match the characteristics of the computer used to download the al-Qaeda manual. These identifiers include the type of web browser and operating system the person used. The most revealing page visited is a Facebook profile. According to that page, the person is based in Dubai, in the UAE. The spies now have a name and possible location.
  • Graphic -- details follow

    Digging deeper

    But that's not the end. The agency can also plug that Facebook ID – every profile gets assigned a unique number – into the U.S. National Security Agency's powerful Marina database, which keeps online metadata of millions of people for up to a year. That can give CSE lots of information, including a person's email address.
  • Graphic -- details follow

    Share findings

    In the end, the spy agency not only paints a detailed picture of someone's online life, but can also identify that individual as a new potential suspect. In other cases, the exercise leads them to previously unknown suspicious documents. Ultimately, all these findings are handed over to CSE's Office of Counter Terrorism. Some information may end up in the hands of spying partners or law enforcement agencies.
  • Levitation

    • Scour file-sharing sites
    • Watch a suspicious file
    • Trace the IP
    • Follow the cookies
    • Identify the suspect
    • Dig deeper
    • Share findings