Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

CIA Paid AT&T for Phone Records: Report

WASHINGTON – The CIA pays AT&T more than $10 million a year to provide phone records with possible links to suspected terrorists, the New York Times reported Thursday, citing government officials.

The arrangement is voluntary and there is no court order requiring the company to cooperate with the Central Intelligence Agency, officials told the Times.

WASHINGTON – The CIA pays AT&T more than $10 million a year to provide phone records with possible links to suspected terrorists, the New York Times reported Thursday, citing government officials.

The arrangement is voluntary and there is no court order requiring the company to cooperate with the Central Intelligence Agency, officials told the Times.

The program differs from controversial data collection by the National Security Agency, which receives phone records or other “meta-data” from telecommunications companies through court orders.

The CIA passes on phone numbers of suspected militants abroad and AT&T then sifts through its database for records of phone calls that can identify foreigners with terror links, the newspaper reported.

Most of the logs handed over by AT&T are related to foreign-to-foreign calls, the report said.

For international calls that include one end in the United States, the company does not reveal the identity of the Americans and hides several digits of their phone numbers, which allows the CIA to comply with a ban on domestic spying, it said.

The Central Intelligence Agency could choose to refer a hidden number to the FBI, which could then issue a subpoena demanding AT&T divulge the information, according to the report.

An AT&T spokesman did not confirm or deny the program but said the firm acted in accordance with laws in the United States and in foreign countries.

Advertisement. Scroll to continue reading.

“In all cases, whenever any governmental entity anywhere seeks information from us, we ensure that the request and our response are completely lawful and proper,” spokesman Mark Siegel told AFP.

But he added: “We do not comment on questions concerning national security.”

Without verifying the existence of the program, the CIA said its intelligence gathering does not violate the privacy of Americans.

“The CIA protects the nation and upholds the privacy rights of Americans by ensuring that its intelligence collection activities are focused on acquiring foreign intelligence and counterintelligence in accordance with US laws,” said spokesman Todd Ebitz.

The CIA is usually associated with gathering intelligence through spies in the field while the NSA focuses on eavesdropping abroad and code-breaking.

But an unnamed intelligence official told the Times that the CIA sometimes needs to check phone records in “time-sensitive situations” and be able to act with speed and agility.

The report offered the first indication that the CIA had a role in electronic data collection as leaks from a former intelligence contractor, Edward Snowden, have sparked a global firestorm around the NSA’s digital spying.

US Internet communications firms have voiced complaints that they are legally required to cooperate with the NSA’s “data mining.”

Industry advocates have expressed concerns that NSA spying revelations could turn consumers in the US and abroad against the American technology companies.

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Cybercrime

Daniel Kelley was just 18 years old when he was arrested and charged on thirty counts – most infamously for the 2015 hack of...

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...