NSA Spies Triple Text and Phone Collection

The US National Security Agency collected 534 million records of phone calls and text messages of Americans last year, more than triple gathered in 2016, a US intelligence agency recently released said.

The sharp increase from 151 million occurred during the second full year of a new surveillance system established at the spy agency after US lawmakers passed a law in 2015 that sought to limit its ability to collect such records in bulk.

The records collected include the numbers and time of a call or text message, but not their content.

The spike in collection of call records coincided with an increase reported on recently across other surveillance methods, raising questions from some privacy advocates who are concerned about potential government overreach and intrusion into the lives of American citizens.

This report also showed a rise in the number of foreigners living outside the US who were targeted under a warrantless Internet surveillance program, known as Section 702 of the Foreign Intelligence Surveillance Act, that Congress renewed earlier this year.

The 2017 call records tally remained far less than an estimated billions of records collected per day under the NSA's old bulk surveillance system, which was exposed by former US intelligence contractor Edward Snowden in 2013. Overall increases in surveillance hauls were both mystifying and alarming coming years after Snowden's leaks, privacy advocates said.

"The intelligence community's transparency has yet to extend to explaining dramatic increases in their collection," said Robyn Greene, policy counsel at the Washington-based Open Technology Institute that focuses on digital issues.

The government "has not altered the manner in which it uses its authority to obtain call detail records," Timothy Barrett, a spokesman at the Office of the Director of National Intelligence, which released the annual report, said in a statement.

The NSA has found that a number of factors may influence the amount of records collected, Barrett said. These included the number of court-approved selection terms, which could be a phone number of someone who is potentially the subject of an investigation, or the amount of historical information retained by phone service providers, Barrett said.

"We expect this number to fluctuate from year to year," he said.

US intelligence officials have said the number of records collected would include multiple calls made to or from the same phone numbers and involved a level of duplication when obtaining the same record of a call from two different companies.

The number of foreigners living outside the US who were targeted under a warrantless Internet surveillance program, Section 702, increased to 129,080 in 2017 from 106,469 in 2016, the report said, and is up from 89,138 targets in 2013, or a cumulative rise over five years of about 45 per cent.

US intelligence agencies consider Section 702 a vital tool to protect national security but privacy advocates say the program incidentally collects an unknown number of communications belonging to Americans.

Canberra Times:   Image: NSA Listening Post Teufelsberg

You Might Also Read: 

NSA’s Global Spy Monitor:

Suspect Monitoring & Surveillance Technology:

NSA Should Thank Edward Snowden:

 

« 'Cyber is Uncharted Territory And It’s Going To Get Worse…’
Ex-Employee Suspected Of Leaking CIA Hacking Tools »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Qualys

Qualys

Qualys is a pioneer and leading provider of cloud security and compliance solutions.

Continuum

Continuum

Continuum is the IT management platform company that allows Managed IT Services Providers to maintain and back up on-premise and cloud-based servers, desktops, mobile devices and other endpoints

I-Tracing

I-Tracing

I-TRACING are experts in IT security, specialized in legal compliance of information systems, security of information systems, and the collection of digital evidence and traces.

tietoEVRY

tietoEVRY

TietoEVRY creates digital advantage for businesses and society. We are a leading digital services and software company with local presence and global capabilities.

XTN Cognitive Security

XTN Cognitive Security

XTN is focused on the development of security, Fraud and Mobile Threat Prevention advanced behaviour-based solutions.

Pentest People

Pentest People

Pentest People are a UK-based security consultancy focussing on bringing the benefits of Pentesting as a Service (PTaaS) to all its clients.

Axcient

Axcient

Axcient offers MSPs the most secure backup and disaster recovery technology stack with a proven Business Availability suite.

Polaris Infosec

Polaris Infosec

Polaris Web Presence Protection (WPP) is powered by our proprietary artificial intelligence and machine learning engine to ensure that attacks are stopped before they affect your business.

WebSec B.V.

WebSec B.V.

WebSec is a Dutch Cybersecurity firm mainly focused on offensive security services such as pentesting, red teaming and security awareness and phishing campaigns.

InfoSec Conferences

InfoSec Conferences

InfoSec Conferences is an online directory of infosec conferences. We list every single Information Security conference, event and seminar within every niche in Cybersecurity.

Com Olho

Com Olho

Com Olho provides the measurement, analytics, quality assurance, and fraud protection technologies brands need for their business and customers.

Dutch Research Council (NWO)

Dutch Research Council (NWO)

The Dutch Research Council (NWO) is one of the most important science-funding bodies in the Netherlands and ensures quality and innovation in science.

CyBourn

CyBourn

Cybourn's diverse offerings include engineering, analysis, product development, assessment, and advisory services in the cybersecurity space.

Firesand

Firesand

Based in Milton Keynes, Firesand Ltd provides penetration testing services to improve your cyber security and protect your company against hackers.

Cork

Cork

Cork is a purpose-built cyber warranty company for managed service providers (MSPs) serving small businesses (SMBs) and the software solutions they manage.

CardinalOps

CardinalOps

The CardinalOps platform continuously assesses your detection posture and eliminates coverage gaps in your existing detection stack so you can easily implement a threat-informed defense.