NSA has a spying program that targets many mobile networks

Share This Post

  The NSA has recently conducted a campaign focused on the interception of internal communications of operators and trade groups in order to infiltrate mobile networks around the world, according to recent revelations from Edward Snowden.   

The U.S. National Security Agency ran two undisclosed operations, the Wireless Portfolio Management Office and the Target Technology Trends Center, operating under the aegis of a program called Auroragold, according to an article Saturday in The Intercept, which also published related documents.

Operations closely monitored the GSM Association with a maintained list of 1,201 email targets or “selectors” used to intercept internal company communications and gathered information of network security flaws in the process.

As of May 2012, NSA documents shown that the company had collected technical information on about 70% of  the  estimated 985 mobile phone networks worldwide. Besides mentioned names of operations in Libya, Iran, and China; no other names of the targeted networks were disclosed in the documents revealed by Snowden. Intercept founding editors Glenn Greenwald and Laura Poitras have been instrumental in helping Snowden leak NSA documents to the public through various media outlet

The mentioned NSA operations collected information in “IR.21” documents used by  the GMSA members to report security weaknesses and encryption details used by mobile operators, according to the documents of Mr. Snowden. The NSA used this information to circumvent encrypted communications, according to the documents.

“NSA collects only those communications that it is authorized by law to collect in response to valid foreign intelligence and counterintelligence requirements — regardless of the technical means used by foreign targets, or the means by which those targets attempt to hide their communications,” the NSA said in an emailed statement. “Terrorists, weapons proliferators, and other foreign targets often rely on the same means of communication as ordinary people. In order to anticipate and understand evolving threats to our citizens and our allies, NSA works to indentify and report on the communications of valid foreign targets.”

Since June 2013, Snowden’s leaked documents have lead to a series of of reports on the extent of NSA’s spying on Internet and telecom networks worldwide. The documents have also shown that the NSA has hacked into emails of leaders of U.S. allies as well as into networks and equipment of foreign companies including China-based Huawei.

Additional to the covert spying, the NSA has a bulk telephone record collection system highly criticized by many. Last month, NSA Director Michael Rogers said the agency is planning no major changes in its domestic telephone records collection program after a bill to curb those efforts failed in the Senate.

sources:
computerworld.com – computerworld.com(2)
firstlook.com
pcworld.com

What are your thoughts on the NSA’s mobile spying intentions thus far? Leave a comment below.

Stay Ahead: Join the EwtNet Insider Email Club!

Stay informed and up-to-date with EwtNet's email subscription. Join our exclusive community and receive curated news, updates, and insights tailored to your interests.

Related Posts

German federal prosecutor considers formal NSA investigation

Germany’s federal prosecutor is considering if there is enough...

AT&T will Introduce iPhone 6-Friendly WiFi Calling In 2015

The iPhone 6 supports WiFi calling. But does your...

Hackers Bully the vBulletin Internet Community Software Vulnerability

Hackers are exploiting a vulnerability in the popular vBulletin...

Will our privacy problems be solved by 2025? Responses released in Pew study

As more innovators and tech gurus crawl into the...

The smartest cars may need 5G networks, Ericsson says

IDG News Service - Some of the most futuristic...

How To Get A Job In Tech: Discover The Best Tech Jobs

If you're looking for how to get a job...
- Advertisement -

Discover more from EwtNet

Subscribe now to keep reading and get access to the full archive.

Continue reading