NSA Spies Triple Text and Phone Collection

The US National Security Agency collected 534 million records of phone calls and text messages of Americans last year, more than triple gathered in 2016, a US intelligence agency recently released said.

The sharp increase from 151 million occurred during the second full year of a new surveillance system established at the spy agency after US lawmakers passed a law in 2015 that sought to limit its ability to collect such records in bulk.

The records collected include the numbers and time of a call or text message, but not their content.

The spike in collection of call records coincided with an increase reported on recently across other surveillance methods, raising questions from some privacy advocates who are concerned about potential government overreach and intrusion into the lives of American citizens.

This report also showed a rise in the number of foreigners living outside the US who were targeted under a warrantless Internet surveillance program, known as Section 702 of the Foreign Intelligence Surveillance Act, that Congress renewed earlier this year.

The 2017 call records tally remained far less than an estimated billions of records collected per day under the NSA's old bulk surveillance system, which was exposed by former US intelligence contractor Edward Snowden in 2013. Overall increases in surveillance hauls were both mystifying and alarming coming years after Snowden's leaks, privacy advocates said.

"The intelligence community's transparency has yet to extend to explaining dramatic increases in their collection," said Robyn Greene, policy counsel at the Washington-based Open Technology Institute that focuses on digital issues.

The government "has not altered the manner in which it uses its authority to obtain call detail records," Timothy Barrett, a spokesman at the Office of the Director of National Intelligence, which released the annual report, said in a statement.

The NSA has found that a number of factors may influence the amount of records collected, Barrett said. These included the number of court-approved selection terms, which could be a phone number of someone who is potentially the subject of an investigation, or the amount of historical information retained by phone service providers, Barrett said.

"We expect this number to fluctuate from year to year," he said.

US intelligence officials have said the number of records collected would include multiple calls made to or from the same phone numbers and involved a level of duplication when obtaining the same record of a call from two different companies.

The number of foreigners living outside the US who were targeted under a warrantless Internet surveillance program, Section 702, increased to 129,080 in 2017 from 106,469 in 2016, the report said, and is up from 89,138 targets in 2013, or a cumulative rise over five years of about 45 per cent.

US intelligence agencies consider Section 702 a vital tool to protect national security but privacy advocates say the program incidentally collects an unknown number of communications belonging to Americans.

Canberra Times:   Image: NSA Listening Post Teufelsberg

You Might Also Read: 

NSA’s Global Spy Monitor:

Suspect Monitoring & Surveillance Technology:

NSA Should Thank Edward Snowden:

 

« 'Cyber is Uncharted Territory And It’s Going To Get Worse…’
Ex-Employee Suspected Of Leaking CIA Hacking Tools »

Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

eBook: Practical Guide to Security in the AWS Cloud

eBook: Practical Guide to Security in the AWS Cloud

AWS Marketplace would like to present you with a digital copy of the new book, Practical Guide to Security in the AWS Cloud, by the SANS Institute.

Lima Networks

Lima Networks

LIMA design and deliver IT Infrastructure solutions and services including managed Security Monitoring services.

ContentKeeper

ContentKeeper

ContentKeeper provides Web Threat Protection solutions to secure today’s Web 2.0 and mobile centric business environments.

Terranova Security

Terranova Security

Terranova is dedicated to providing information security awareness programs customized to your internal policies and procedures.

CERT.lu

CERT.lu

CERT.lu is an initiative to enhance cyber security practices and techniques, and support security professionals in Luxembourg.

Rogers Cybersecure Catalyst

Rogers Cybersecure Catalyst

Rogers Cybersecure Catalyst helps Canadians and Canadian companies seize the opportunities and tackle the challenges of cybersecurity.

Knovos

Knovos

Knovos is a leading technology innovator developing solutions for automating, integrating, and innovating Information Governance.

Curtail

Curtail

Curtail keeps businesses running by using live traffic analysis to identify defects before software goes live, and detect and isolate security threats before they impact systems.

Digital Identification & Authentication Council of Canada (DIACC)

Digital Identification & Authentication Council of Canada (DIACC)

DIACC is a non-profit coalition of public and private sector leaders committed to developing a Canadian framework for digital identification and authentication.