Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

NSA Can Retrieve, Replay Phone Calls: Report

WASHINGTON – The National Security Agency has technology capable of recording all the phone calls of an entire country and replaying them later, a report based on leaked documents said Tuesday.

WASHINGTON – The National Security Agency has technology capable of recording all the phone calls of an entire country and replaying them later, a report based on leaked documents said Tuesday.

The Washington Post, citing documents leaked by former NSA contractor Edward Snowden, said the technology functions like a time machine by being able to reach into the past.

The report said the NSA can collect 100 percent of the calls of a target country and reach as far back as one month with the tools called MYSTIC and RETRO.

The leaked documents say the tools can “retrieve audio of interest that was not tasked at the time of the original call.”

The Post said that at the request of US officials, it withheld details that could be used to identify the country where the system is being used or other countries where it may be used in the future.

If accurate, the program would be more powerful than any other NSA program by allowing the spy agency to tap into the entire network from a country.

The National Security Agency would neither confirm or deny the report but said in a statement that its electronic spying was not “arbitrary.”

The NSA’s intelligence gathering respected laws as well as the privacy rights of Americans and foreigners, it said.

Advertisement. Scroll to continue reading.

But the spy agency renewed its criticism of the stream of leaks from Snowden.

“Continuous and selective reporting of specific techniques and tools used for legitimate US foreign intelligence activities is highly detrimental to the national security of the United States and of our allies, and places at risk those we are sworn to protect,” it said.

Dozens of documents leaked by Snowden have sparked outrage in the US and abroad about the vast capabilities of the intelligence programs.

US officials have defended the programs as needed to thwart terrorist attacks, but President Barack Obama has ordered reforms for the surveillance programs.

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Cybercrime

Daniel Kelley was just 18 years old when he was arrested and charged on thirty counts – most infamously for the 2015 hack of...

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...