NSA Spies Triple Text and Phone Collection

The US National Security Agency collected 534 million records of phone calls and text messages of Americans last year, more than triple gathered in 2016, a US intelligence agency recently released said.

The sharp increase from 151 million occurred during the second full year of a new surveillance system established at the spy agency after US lawmakers passed a law in 2015 that sought to limit its ability to collect such records in bulk.

The records collected include the numbers and time of a call or text message, but not their content.

The spike in collection of call records coincided with an increase reported on recently across other surveillance methods, raising questions from some privacy advocates who are concerned about potential government overreach and intrusion into the lives of American citizens.

This report also showed a rise in the number of foreigners living outside the US who were targeted under a warrantless Internet surveillance program, known as Section 702 of the Foreign Intelligence Surveillance Act, that Congress renewed earlier this year.

The 2017 call records tally remained far less than an estimated billions of records collected per day under the NSA's old bulk surveillance system, which was exposed by former US intelligence contractor Edward Snowden in 2013. Overall increases in surveillance hauls were both mystifying and alarming coming years after Snowden's leaks, privacy advocates said.

"The intelligence community's transparency has yet to extend to explaining dramatic increases in their collection," said Robyn Greene, policy counsel at the Washington-based Open Technology Institute that focuses on digital issues.

The government "has not altered the manner in which it uses its authority to obtain call detail records," Timothy Barrett, a spokesman at the Office of the Director of National Intelligence, which released the annual report, said in a statement.

The NSA has found that a number of factors may influence the amount of records collected, Barrett said. These included the number of court-approved selection terms, which could be a phone number of someone who is potentially the subject of an investigation, or the amount of historical information retained by phone service providers, Barrett said.

"We expect this number to fluctuate from year to year," he said.

US intelligence officials have said the number of records collected would include multiple calls made to or from the same phone numbers and involved a level of duplication when obtaining the same record of a call from two different companies.

The number of foreigners living outside the US who were targeted under a warrantless Internet surveillance program, Section 702, increased to 129,080 in 2017 from 106,469 in 2016, the report said, and is up from 89,138 targets in 2013, or a cumulative rise over five years of about 45 per cent.

US intelligence agencies consider Section 702 a vital tool to protect national security but privacy advocates say the program incidentally collects an unknown number of communications belonging to Americans.

Canberra Times:   Image: NSA Listening Post Teufelsberg

You Might Also Read: 

NSA’s Global Spy Monitor:

Suspect Monitoring & Surveillance Technology:

NSA Should Thank Edward Snowden:

 

« 'Cyber is Uncharted Territory And It’s Going To Get Worse…’
Ex-Employee Suspected Of Leaking CIA Hacking Tools »

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Tenable Network Security

Tenable Network Security

Tenable Network Security - Need to Evolve to a Risk-Based Vulnerability Management Strategy but Don’t Know How? This Guide Will Show You.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Prolinx

Prolinx

Prolinx provide secure Data Centre hosting services and other fully managed security services for networks and information systems.

Rosberg System

Rosberg System

Rosberg System provides security and management solutions for wireless mobile devices.

NPCore

NPCore

NPCore is specialized in defense solution against unknown APT and Ransomware and provides two-level defense on network and endpoint based on behavior.

Randed

Randed

Randed provide a disruptive technology which attains isolation of any type of web based threat while browsing.

LSoft Technologies

LSoft Technologies

LSoft Technologies is a leader in data recovery software technologies.

Sequoia Capital

Sequoia Capital

Sequoia Capital is a venture capital firm focused mainly on technology. We partner both with young companies finding their stride and established ones looking for growth.

Passbase

Passbase

Passbase is building a full-stack identity verification engine backed by verified government documents.

Qualcomm Technologies

Qualcomm Technologies

Qualcomm invents breakthrough technologies that transform how the world connects, computes and communicates.