NSA is Recording Every Phone Call in at Least Five Countries
March 18, 2014 9:27 PM
Americans fall victim as NSA guns for a yottabyte data haul
The latest revelation regarding the extent of
U.S. National Security Agency
(NSA) spying comes courtesy of
The Washington Post
a fresh set of documents (as always) from
leaker Edward Joseph Snowden
a former contractor for the NSA
his former status as a contractor
, he was not allowed to whistleblow
no matter what potentially criminal actions he witnessed
his coworkers at the NSA doing. Hence, he
fled to Russia
-- the only nation willing to defy the U.S. and grant him asylum.
I. Lies the President Told Me
While controversial, the flight has given him the time to continue to drop fresh bombshells, such as the documents revealed on Tuesday about MYSTIC, a secret phone surveillance program.
a Jan. 17 speech
U.S. President Barack Obama (D) claimed:
The United States is not spying on ordinary people who don’t threaten our national security... we take their privacy concerns into account.
President Obama claimed to Americans that law-abiding citizens in the U.S. and ally states were not spied upon. That claims appears to be a lie. [Image Source: AP]
Simply put, the President misled, and
we now know
that law-abiding citizens are being spied on to an extent so incredible that it stretches the bounds of the imagination.
One of the biggest programs responsible for such violations is dubbed "MYSTIC".
MYSTIC was launched in 2009, but wasn't fully operational until 2011 given technical limitations and its incredibly ambitious aim. From the start, MYSTIC's goal was simple -- intercept all metadata
and audio from phone calls
in a target region. That includes every single call from every single law abiding person in the nations that the program currently targets (yes, it targets more than one, as you'll find out).
The program is currently deployed in at least two target countries. Documents from the FY2013 Congressional budget suggest allocating an undisclosed amount of taxpayer dollars to provide "complete access to the additional target country". From this (and the previous documents from 2011) the text suggests that the program is live in at least two target countries.
But apparently that number has grown even bigger.
II. Five Nations are Currently Under "Complete" Surveillance
While originally justified as a "unique one-off capability" aimed at a specific country, the program now targets several nations. According to
The Washington Post
, the redacted, secret Congressional budget states that it allows "comprehensive metadata access and content" (aka: records all communications) in five target countries. The addition of a sixth target nation is scheduled to wrap up in October.
While it would be tempting to hope that surveillance might be trained against enemy states such as Iran or Russia, past leaks have indicated that some of America's heaviest surveillance
has targeted the homeland
wealthy economic rivals
such as France and Germany. Thus while it’s unsurprising to discover a hotbed of terrorism, such as Pakistan was targeted,
the NSA's track record
would suggest that it would be equally unsurprising to instead discover that America's
allies like France
Given past claims by former officials that
all American phone calls are being recorded and stored
, it's possible the program even targeted America itself.
Metadata allows the NSA to track millions, possibly even billions of people worldwide.
[Image Source: EFF]
It does appear the
The Washington Post
knows the identity of at least one of the target nations. Columnists Barton Gellman and Ashkan Soltani write:
At the request of U.S. officials, The Washington Post is withholding details that could be used to identify the country where the system is being employed or other countries where its use was envisioned.
Given that the Obama administration has
threatened criminal charges against members of the media
in the past, it's not surprising to hear the publication's hands were tied (for now) on the topic.
the administration of President Obama has
charged more than twice as many whistleblowers
with Espionage Act (
18 U.S.C. § 792
) offenses as all the previous administrations before him (since the Act was passed in 1917) combined.
III. Agents Comb Through Millions of Recordings of Americans', Foreigners' Phone Calls.
In the case of MYSTIC, we see for the first time the NSA mining literally all the metadata and voice data of at least two countries. According to documents every single call in the target nations is collected and stored locally for at least 30 days.
The NSA stores every single phone call in the targeted nations for 30 days.
[Image Source: Warner Bros.]
Metadata collection was handled under the FASCIA program -- a program that also is used to reap the metadata of virtually every call made in the U.S., tell the NSA where you were, at what time you were there, and who you were talking to.
Despite technical challneges, FASCIA is storing 5 billion metadata records a day.
The NSA complains in leaked documents of the headache of transporting so much data back to the U.S. A document comments:
SCALAWAG (US3310BG) has long since reached the point where it was collecting and sending home far more than the bandwidth could handle. Over collecting has significantly increased the latency of pri 12 content data. Because SCALAWAG is NSA's #1 provider of actionable SIGINT on [REDACTED COUNTRY NAME], measures had to be taken to alleviate pressure on the bandwidth and decrease latency of priority 12 data. In the summer of 2011, in an effort decrease the amount of voice content brought home, SSO deleted a large quantity of priority 4 and below tasking that was bringing content and according to the DOUBLEARROW database had not been "touched". Additionally, a change of priority 4 tasking to priority 6 was effected, again based on DOUBLEARROW results. As a result, the latency for primarily pri 12 had dropped considerably. However, these actions were still falling short because the volume of collection was increasing ....
SCALAWAG is the remote database(s) used to locally store the harvested data. As the above account states, agents then use filtering tools such as "DOUBLEARROW" (a tool for filtering voice data) to create "cuts" -- snippets of millions of phone calls every month. While these millions of snippets only account for "a fraction of 1 percent of the calls", it goes on to state that the "absolute numbers are very high".
Agents use a tool called RETRO to inspect and perform the cuts, up to 30 days after the call was placed. Once they save the data in long-term storage, other tools can be used.
IV. President Obama and the NSA Don't Believe They Need Permission From Congress
Assuming the NSA isn't targeting America directly with MYSTIC, it's almost certain that some Americans' data is scooped up by SCALAWAG. And it's possible some of it is even saved in long-term storage, against the orders of Congress, and in defiance of the laws that supposedly govern the NSA.
NUCLEON is a final destination for NSA voice content.
The NSA has already effectively acknowledged that it is
actively spying on Congress
and that it commits serious violations of the law
thousands of times a year
blames its illegal activity on "human error"
, such as typos in searches, which happen to expose Americans' sensitive data.
But overseas, the violations may be far worse. Sources close to the agency indicate to
The Washington Post
that the NSA feels it
has no obligation to avoid spying on Americans whose phone calls it records overseas
. It says such items are "acquired incidentally", but as they are "a result of collection directed against appropriate foreign intelligence targets", no filtering is necessary.
Americans' data is vulnerable to the NSA, both at home and overseas.
[Image Source: ClimateViewer 3D]
An independent panel in December suggested
that all data known to belong to Americans "be purged upon detection" by the NSA. But President Obama and the NSA rejected that provision.
The administration justifies its actions with
Executive Order 12333
, an order which the Obama administration believes nullifies the authority of Congress and the Justice Department,
granting the President unlimited power
to conduct spying overseas --
including (in the administration's opinion) on American citizens
MYSTIC is a critical part of the NSA's PRISM machine.
Timothy H. Edgar, the former director of privacy and civil liberties on Obama’s national security staff, argues that even if Congress rolls back or restricts the controversial amendments to the Foreign Intelligence Surveillance Act -- e.g. the
U.S.A. PATRIOT Act Additional Reauthorizing Amendments Act of 2006
-- the administration believes it still has plenty of authority to defy Congress and spy on everyone.
Comments Mr. Edgar:
Much of the U.S. government’s intelligence collection is not regulated by any statute passed by Congress. There’s a lot of focus on the Foreign Intelligence Surveillance Act, which is understandable, but that’s only a slice of what the intelligence community does. [All data must be for nationals security, but that] still leaves a gap for activities that otherwise basically aren’t regulated by law because they’re not covered by FISA.
In order to inspect and cut down SCALAWAG's harvest, the NSA also employs voice-to-text transcription and smart data mining tools that drop links into conversations. For example, if you say someone's name, a link to their phone number might be added. The content of the collected call and its relations to other callers of interest determines the call's "priority" level.
Higher priority calls are chopped up and offloaded to long-term storage in NUCLEON, which reportedly houses data for at least 15 years. Meanwhile FASCIA allows virtually all of the metadata -- a substantially leaner information format -- to be hauled back to the U.S. and placed in long-term storage.
V. NSA Once More Claims it Needs to Spy to Defeat Phantom Foes
Caitlin Hayden, a spokeswoman for the National Security Council -- a group which represents both the NSA and other agencies -- defended the program in a general sense, stating:
New or emerging threats [are] often hidden within the large and complex system of modern global communications, and the United States must consequently collect signals intelligence in bulk in certain circumstances in order to identify these threats.
[Image Source: PC World]
NSA spokeswoman Vanee Vines takes things a step further, blasting those members of the press bold enough to report on this surveillance. She writes
The Washington Post
Continuous and selective reporting of specific techniques and tools used for legitimate U.S. foreign intelligence activities is highly detrimental to the national security of the United States and of our allies, and places at risk those we are sworn to protect.
The NSA has finally admitted for all its years of spying it has -- at most -- assisted in investigating one or two terrorist plots. But these plots may have been overseas in Iraq. Indeed, it's very probable that the NSA data mining has never been able to help foil a U.S. terror scheme.
But again, the agency is asserting that it
needs to spy on everyone
to offer indeterminate protection from indeterminate threats.
, a member of the President's review panel, asserts:
It's important to have institutional protections so that advanced capabilities used overseas don't get turned against our democracy at home.
But the reality is that the President rejected that argument and has shown no signs of slowing down. Currently the campaign covers six regions.
VI. A Dark Future
To the administration it has unchecked legal power. Thus the primary obstacle to recording every word spoken into a phone by Americans or our allies is merely technical limitations.
And the administration is working tirelessly to wipe out those limitations. It's currently in the process of building a state of the art storage center in Utah to provide deep, long-term storage. Vaguely resembling a jelly bean, the facility is
believed to have gone online
The NSA's new Utah data center has an estimated 1 yottabyte of storage.
[Image Source: Silicon Angle]
But the NSA is also building an even bigger follow-up facility in Baltimore, spending $792M USD in taxpayer money, or over $2 dollars per U.S. taxpayer.
At this point the main thing holding the NSA back isn't even storage, but simple bandwidth. But as global high-speed data conduits continue to grow, the NSA will acquire new routes to funnel its massive hoards of data.
Civil liberties advocates say that unless something is done quickly, it may be too late to stop the police state's universal tax and spy campaign. Comments
, chief technologist for the
American Civil Liberties Union
Over the next couple of years they will expand to more countries, retain data longer and expand the secondary uses.
In other words,
the glimpse that leaker Edward Snowden has given us
is just the tip of
the ever enlarging iceberg
[Image Source: Patheos]
The NSA didn't stop at complete surveillance of one nation. It didn't stop at complete surveillance of two nations. It didn't stop at complete surveillance of a half dozen nations. And it likely won't stop until
American taxpayers and Congress find a way to wrest power from it
, or it achieves its goal of ubiquitous, loosely regulated surveillance.
The Washington Post 
"When an individual makes a copy of a song for himself, I suppose we can say he stole a song." -- Sony BMG attorney Jennifer Pariser
Report: NSA Still Spying on German Officials
February 24, 2014, 1:19 PM
European Commission Calls for Less U.S. Influence on the Internet
February 12, 2014, 11:59 AM
Senator Rand Paul Files Suit to Block NSA Surveillance
February 12, 2014, 4:28 PM
Report: Snowden Used Cheap Web Crawler to Obtain NSA Documents
February 10, 2014, 1:50 PM
NSA Uses Angry Birds, Candy Crush to Spy on Americans
January 28, 2014, 1:00 PM
Best Secure Android Mobile Browsers:
December 5, 2016, 7:24 PM
Latest News, this is how the Moto X (2017) might look
December 3, 2016, 9:02 AM
Fake Apple Chargers Fail Safety Tests
December 2, 2016, 5:00 AM
FlowMotion veils its new smartphone stabilizer, FlowMotion One
December 1, 2016, 3:00 AM
Samsung Galaxy C7 Pro smartphone surfaces online.
November 30, 2016, 1:00 AM
Best Phones of 2016 - Priced under $650.00
November 27, 2016, 5:00 AM
Most Popular Articles
What Can You Do with Your New Echo Dot?
December 3, 2016, 5:00 AM
Sales Battle - Apple iPad Mini vs Samsung Galaxy Tab
November 29, 2016, 12:36 AM
Google Wi-Fi – A Scalable Wi-Fi Solution for any size Home or Apartment
November 30, 2016, 1:00 AM
PIQ ROBOTTM reveals its new artificial intelligence software
November 29, 2016, 12:59 AM
PlayStation 4 Pro – 4K Console for 4K TVs
November 28, 2016, 1:00 AM
Latest Blog Posts
e Guide: Mobile Security for 2017
Dec 6, 2016, 5:00 AM
Apple Car is Not Dead
Dec 5, 2016, 1:00 AM
Dec 4, 2016, 5:00 AM
Dec 3, 2016, 5:00 AM
Dec 2, 2016, 5:00 AM
Surface Ergonomic Keyboard
Dec 1, 2016, 3:01 AM
Chapeconense plane crash: Football rallies around Brazilian Team
Nov 30, 2016, 1:00 AM
How to Extends Your iPhone’s Battery Life
Nov 29, 2016, 12:49 AM
Nov 28, 2016, 1:12 AM
News: Fidel Castro
Nov 27, 2016, 5:00 AM
Nov 26, 2016, 5:00 AM
Changes in Social status affect the way genes turn on and off within immune cells.
Nov 25, 2016, 5:12 AM
Austrian far–right hopeful Hofer may back EU vote.
Nov 24, 2016, 4:00 AM
Final Fantasy XV Leaked Before Nov 29 Launch Date
Nov 23, 2016, 1:00 AM
Nov 22, 2016, 2:26 AM
Nov 21, 2016, 1:00 AM
HTC Makes Big Moves in China
Nov 20, 2016, 2:00 AM
Do you know who is the number one company in the word?
Nov 19, 2016, 5:30 AM
Foldable Cardboard ”EcoHelmet” wins James Dyson Award’s Top Prize
Nov 18, 2016, 2:39 AM
Scientists Discover Roundest Object Ever Spotted in Universe
Nov 17, 2016, 1:00 AM
More Blog Posts
Copyright 2016 DailyTech LLC. -
Terms, Conditions & Privacy Information