{"id":165760,"date":"2014-12-11T05:02:19","date_gmt":"2014-12-11T10:02:19","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/nsas-auroragold-mining-operation.php"},"modified":"2014-12-11T05:02:19","modified_gmt":"2014-12-11T10:02:19","slug":"nsas-auroragold-mining-operation","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/nsas-auroragold-mining-operation.php","title":{"rendered":"NSA&#39;s Auroragold Mining Operation"},"content":{"rendered":"<p><p>    The United States National Security Agency, which is known for    monitoring landline, Web and cellphone communications    worldwide, also targets wireless carriers, The    Intercept reported last week.  <\/p>\n<p>    Documents released by whistle-blower Edward Snowden show the    NSA has monitored more than 1,200 email accounts associated    with major cellphone network operators worldwide since 2010, in    a covert operation named \"Auroragold,\" according to the report.  <\/p>\n<p>    Those intercepted communications help the NSA hack into phone    networks.  <\/p>\n<p>    The agency also plans to secretly introduce backdoors into new    communications systems.  <\/p>\n<p>    The GSM Association, whose members are mobile operators and    related companies, and which releases standards for GSM phones,    is a particular target.  <\/p>\n<p>    \"The mission of the NSA is to gather data,\" said Jonathan    Sander, strategy and research officer at Stealthbits    Technologies.  <\/p>\n<p>    \"They will do so in whatever way they can, so long as there    aren't explicit legal limits put on them,\" he told    TechNewsWorld.  <\/p>\n<p>    The NSA's Wireless Portfolio Management Office defines and    carries out the agency's strategy for exploiting wireless    communications, and its Target Technology Trends Center    monitors the development of new communications technology to    ensure the NSA remains on top of innovation, The Intercept    said. The existence of both has not been publicly disclosed.  <\/p>\n<p>    As of May 2012, the NSA apparently had collected information    from about 70 percent of cellphone networks worldwide -- 702    out of about 985.  <\/p>\n<p>    Data collected reportedly is sent to NSA \"signals development\"    teams that infiltrate communications networks. The data is    shared with other U.S. intelligence agencies and with NSA's    counterparts in the so-called Five    Eyes alliance.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original post:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.technewsworld.com\/story\/81464.html?rss=1\/RK=0\/RS=tCn.lLFufOMNg96YPwf3evE36wk-\" title=\"NSA&#39;s Auroragold Mining Operation\">NSA&#39;s Auroragold Mining Operation<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The United States National Security Agency, which is known for monitoring landline, Web and cellphone communications worldwide, also targets wireless carriers, The Intercept reported last week. Documents released by whistle-blower Edward Snowden show the NSA has monitored more than 1,200 email accounts associated with major cellphone network operators worldwide since 2010, in a covert operation named \"Auroragold,\" according to the report.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/nsas-auroragold-mining-operation.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-165760","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/165760"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=165760"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/165760\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=165760"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=165760"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=165760"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}