Skip to content

Breaking News

Graphic to be used with stories about the National Security Agency.
Graphic to be used with stories about the National Security Agency.
PUBLISHED: | UPDATED:

Even if you love the NSA and you say you have nothing to hide, you should be against a policy that introduces security vulnerabilities, because once NSA introduces a weakness, a vulnerability, it s not only the NSA that can exploit it.

Karsten Nohl, cell phone security expert and cryptographer, comments on a newly revealed NSA program aimed at exploiting vulnerabilities in global cell phone technology to help surveillance efforts.

The Intercept reports that, based on documents leaked by former tech government contractor Edward Snowden, the NSA s Auroragold program spied on cell phone communications around the world, including those of corporations, organizations and non-hostile countries. Also spied on was the GSM Association, or the GSMA, which represents more than 800 major cell phone, software and Internet companies from 220 countries. Those companies include the United States top wireless providers, plus Facebook, Intel, Cisco, Oracle, Microsoft and others. The documents show the NSA spied on GSMA member meetings about new technologies and policies.

The Intercept s report comes a month after NSA Chief Mike Rogers visit to Silicon Valley, during which he said the U.S. needs the valley s technological expertise.

An NSA spokeswoman told the Intercept: NSA collects only those communications that it is authorized by law to collect in response to valid foreign intelligence and counterintelligence requirements. She declined to comment on Auroragold and whether the program continues.

 

Illustration from MCT