Snowden: Just 10% of NSA data is terrorism-related
New documents released by Edward Snowden reveal that only 10 per cent of the NSA’s collected data pertains to possible illegal activity
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
New releases from whistleblower Edward Snowden have revealed that only 10 per cent of all communications data collected by the NSA came from the agency's targets.
The documents released by Snowden included 160,000 email and instant messaging conversations, as well as 7,900 files ripped from more than 11,000 online accounts. All of the info was collected during the NSA's highly controversial PRISM and Upstream projects.
According to analysis conducted by The Washington Post, nearly half of all the files contained details belonging to US citizens which had been "minimised" due to lack of a security threat.
A significant majority of the remaining 50 per cent were foreigners with no links to terrorist or criminal activities, such as tourists and visitors on business.
Among the documents that it pinched, the NSA found revelations about an overseas nuclear project, the military secrets of a foreign power and the identities of aggressive intruders into US computer networks, according to The Post.
Despite this, a far larger number of discoveries included the details of ordinary people's lives. Among them were divorce proceedings, tax documents, political and religious conversations and other private communications.
There are rules in place for most government agencies in the US when they intend to hack into someone's private life. Taps that are installed into phones by the FBI, for example, are switched off when a wife or child uses it.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The NSA, however, dredged up the names and details of every person in a chatroom their target entered. This included those who were logged into the room by default for just visiting the website.
According to a former agency analyst that spoke to the publication, the NSA taught their staff that only "reasonable belief" a target was foreign would be enough to justify spying on them.
Often people would be targeted for writing their emails or communications in a foreign language, despite millions of Americans not having English as their primary dialect, the documents detail.
The NSA would then push the boundaries outwards, so that every friend of a "foreigner" was guilty by association and warranted surveillance.
-
Pulsant unveils high-density data center in Milton KeynesNews The company is touting ultra-low latency, international connectivity, and UK sovereign compute power to tempt customers out of London
-
Anthropic Labs chief claims 'Claude is now writing Claude'News Internal teams at Anthropic are supercharging production and shoring up code security with Claude, claims executive
-
What security teams need to know about the NSA's new zero trust guidelinesNews The new guidelines aim to move an organization from discovery to target-level implementation of zero trust practices
-
Scania admits leak of data after extortion attemptNews Hacker stole 34,000 files from a third-party managed website, trucking company says
-
Hackers are lying low in networks to wage critical infrastructure attacks - here’s how they do itNews Hackers are researching key IT workers in their bid to gain access to vital systems
-
ASUS, Cisco, Netgear devices exploited in ongoing Chinese hacking campaignNews Critical national infrastructure is the target of sustained attempts from state-sponsored hackers, according to Five Eyes advisories
-
Capita tells pension provider to 'assume' nearly 500,000 customers' data stolenCapita told the pension provider to “work on the assumption” that data had been stolen
-
US reveals bespoke tool that took down Russian malware operationNews Snake had been used to steal NATO countries’ data for 20 years
-
Move away from memory-unsafe languages like C and C++, NSA urgesNews The US agency advises organisations to begin using languages like Rust, Java, and Swift
-
US gov issues fresh warning over Russian threat to critical infrastructureNews The FBI, NSA and CISA have urged network defenders to be on "heightened alert" for Russian cyber attacks