Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Audits

NSA Tracks Mobile Phone Locations Worldwide: Report

WASHINGTON – The National Security Agency is collecting some 5 billion records a day on the location of mobile phones around the world, The Washington Post reported Wednesday, citing documents from US intelligence leaker Edward Snowden.

WASHINGTON – The National Security Agency is collecting some 5 billion records a day on the location of mobile phones around the world, The Washington Post reported Wednesday, citing documents from US intelligence leaker Edward Snowden.

The information is added to a gigantic database that shows the locations of “at least hundreds of millions of cell phones” worldwide, a stunning revelation that suggests the eavesdropping agency has created a mass surveillance tool, according to the Post report.

The report comes six months since the first bombshell leaks from Snowden, a former information technology subcontractor for the NSA who says he spilled secrets to spark public debate on the agency’s widespread surveillance activities.

Snowden faces espionage charges but has fled to Russia, where he has been granted asylum.

Of the NSA surveillance programs revealed to date, including spying on foreign leaders and the collection of Internet “meta-data,” the geo-location project appears to represent the agency’s largest in scale and scope.

The NSA declined to comment on the report when contacted by AFP.

The data is scooped up by tapping into cables that link mobile phone networks — both American and foreign — across the globe, the Post said.

The location data is gathered with the help of ten “sigads” or signals intelligence activity designators.

Advertisement. Scroll to continue reading.

In an example given by the Post, one sigad called “STORMBREW” collects data from two unnamed corporate firms which administer interception equipment. Then “NSA asks nicely for tasking/updates,” according to leaked documents.

Information from the cell phones of Americans traveling abroad also forms part of the database.

Because mobile phones broadcast their locations even when there is no call made or text sent, NSA analysts are able to use mathematical techniques to comb through location data and track patterns of movement over time for a given suspect, it said.

The analytic methods used by the agency to sift through location data are known as CO-TRAVELER, according to the report.

Although the vast majority of mobile phone users are of no interest to the spy agency, the NSA gathers the bulk data to try to track known “intelligence targets” and their unknown associates, the paper said.

Even the use of disposable cell phones that users switch on and off to make only brief calls in the hopes of avoiding authorities trigger note in the system.

According to the Post, CO-TRAVELER combs for new devices connecting to a cell tower after another cell phone is used for the last time.

The NSA insists it does not intentionally track the location data of Americans, but it ends up receiving details that show the whereabouts of domestic mobile devices “incidentally,” wrote the Post, which also quoted intelligence officials.

US officials told the Post that the programs that collect geo-location data are legal and designed only to gather intelligence about foreign militants or other “targets” deemed a threat to the United States.

The volume of information flowing in from the program is “outpacing our ability to ingest, process and store” data, according to a May 2012 internal NSA briefing leaked to the Post.

“The NSA’s capabilities to track location are staggering, based on the Snowden documents, and indicate that the agency is able to render most efforts at communications security effectively futile,” said the Post article written by Barton Gellman and Ashkan Soltani.

The scale of the program will reinforce long-running concerns raised by civil liberties groups that the NSA’s electronic spying poses a serious threat to privacy rights in the United States and abroad.

“It is staggering that a location-tracking program on this scale could be implemented without any public debate, particularly given the substantial number of Americans having their movements recorded by the government,” said Catherine Crump, an attorney with the American Civil Liberties Union.

Greg Nojeim, a director at the Center for Democracy and Technology, called for Congress “to finally act to rein in NSA surveillance.”

“It’s clear the very personal location records of innocent people, including American citizens, are being collected and analyzed in previously unimaginable ways and on a massive scale,” it said.

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Cybercrime

Daniel Kelley was just 18 years old when he was arrested and charged on thirty counts – most infamously for the 2015 hack of...

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...