• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

China-linked group Houken hit French organizations using zero-days

 | 

Cybercriminals Target Brazil: 248,725 Exposed in CIEE One Data Breach

 | 

Europol shuts down Archetyp Market, longest-running dark web drug marketplace

 | 

Kelly Benefits data breach has impacted 550,000 people, and the situation continues to worsen as the investigation progresses

 | 

Cisco removed the backdoor account from its Unified Communications Manager

 | 

U.S. Sanctions Russia's Aeza Group for aiding crooks with bulletproof hosting

 | 

Qantas confirms customer data breach amid Scattered Spider attacks

 | 

CVE-2025-6554 is the fourth Chrome zero-day patched by Google in 2025

 | 

U.S. CISA adds TeleMessage TM SGNL flaws to its Known Exploited Vulnerabilities catalog

 | 

A sophisticated cyberattack hit the International Criminal Court

 | 

Esse Health data breach impacted 263,000 individuals

 | 

Europol dismantles €460M crypto scam targeting 5,000 victims worldwide

 | 

CISA and U.S. Agencies warn of ongoing Iranian cyber threats to critical infrastructure

 | 

U.S. CISA adds Citrix NetScaler flaw to its Known Exploited Vulnerabilities catalog

 | 

Canada bans Hikvision over national security concerns

 | 

Denmark moves to protect personal identity from deepfakes with new copyright law

 | 

Ahold Delhaize data breach affected over 2.2 Million individuals

 | 

Facebook wants access to your camera roll for AI photo edits

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 51

 | 

Security Affairs newsletter Round 530 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Intelligence
  • Security
  • NSA programs MYSTIC and RETRO spies phone calls on global scale, also on past conversations

NSA programs MYSTIC and RETRO spies phone calls on global scale, also on past conversations

Pierluigi Paganini March 19, 2014

Documents leaked by Snowden reveals that NSA has built a surveillance system capable of recording all the phone calls of a foreign country.

The information on the surveillance capabilities of the National Security Agency is updated on a daily base and last news is that the agency has the necessary technology to record all the phone calls of an entire country and replaying them later.

The news has been refused by a report based on Edward Snowden leaked documents and described the Washington Post. A senior manager for the program described the technology used in the interception as a “time machine” that is able to analyze also phone calls occurred in the past. When I read it, I immediately thought to the series “Person of Interest”, probably the amazing producer Jonathan Nolan have imagined something of similar.

The NSA can collect 100 percent of the phone calls of a target country and use the tools codenamed as MYSTIC and RETRO to search and reanalyze each conversation, the document revealed that the tools can “retrieve audio of interest that was not tasked at the time of the original call.”

NSA Mystic Retro intercept phone calls

The news is shocking and IT experts have called the tool as the most powerful instrument used by the NSA for surveillance,  the spy agency is able to tap into the entire network from a country. It must be considered that analysts listen to only a fraction of 1 percent of the calls, MYSTIC and RETRO instruments give them the possibility to analyze phone calls in each time window.

“The National Security Agency has built a surveillance system capable of recording “100 percent” of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden.” reports the article published on the Washington Post.

The voice interception program MYSTIC was started in 2009 meanwhile its RETRO tool reached full capacity against the first target nation in 2011.  According to a classified summary, billions of phone calls every day were collected and archived, the oldest calls were deleted once the buffer is saturated for the arrival of new conversations.

 “Ubiquitous voice surveillance, even overseas, pulls in a great deal of content from Americans who telephone, visit, and work in the target country,”  “Present and former U.S. officials … acknowledged that large numbers of conversations involving Americans would be gathered from the country where RETRO operates.” The Washington Post reports.

At the time I was writing The National Security Agency hasn’t commented the news, probably as already happened the Agency will confirm to have operated respecting laws as well as the privacy rights of Americans and foreigners.

 “new or emerging threats” are “often hidden within the large and complex system of modern global communications, and the United States must consequently collect signals intelligence in bulk in certain circumstances in order to identify these threats.” said “Caitlin Hayden, spokeswoman for the National Security Council.

US Intelligence is defending the numerous surveillance programs disclosed by Edward Snowden sustaining that those projects have avoided in the past terrorist acts and that they are necessary instruments to grant Homeland Security

The problem is that in many cases the monitoring systems have gone beyond the purpose for which they were designed and have been used in an “improper” way to monitor the actions of governments and foreign companies.

Anyway, President Barack Obama has started a process to reforms the surveillance programs and the related activities.

Pierluigi Paganini

(Security Affairs –  NSA, Mystic, Retro)


facebook linkedin twitter

Botnets DDoS Edward Snowden Facebook Hacking malware MYSTIC NSA NSA FOXACID PRISM QUANTUMHAND RETRO surveillance Tor network TURBINE zero-day vulnerability

you might also like

Pierluigi Paganini July 03, 2025
China-linked group Houken hit French organizations using zero-days
Read more
Pierluigi Paganini July 02, 2025
Cisco removed the backdoor account from its Unified Communications Manager
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    China-linked group Houken hit French organizations using zero-days

    APT / July 03, 2025

    Cybercriminals Target Brazil: 248,725 Exposed in CIEE One Data Breach

    Data Breach / July 03, 2025

    Europol shuts down Archetyp Market, longest-running dark web drug marketplace

    Cyber Crime / July 03, 2025

    Kelly Benefits data breach has impacted 550,000 people, and the situation continues to worsen as the investigation progresses

    Uncategorized / July 03, 2025

    Cisco removed the backdoor account from its Unified Communications Manager

    Security / July 02, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT