Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Assange names country targeted by NSA's MYSTIC mass phone tapping program

Not revealing the name of the country is censorship, Wikileaks' Julian Assange said

Article comments

The U.S. National Security Agency (NSA) has been recording and storing nearly all domestic and international phone calls from Afghanistan, according to Wikileaks' front man Julian Assange.

Wikileaks revealed the name of the country after The Intercept reported Monday that the NSA was actively recording and archiving "virtually every" cellphone call in the Bahamas and one other country under a program called SOMALGET. The Intercept said it did not name the second country because of concerns that doing so could lead to increased violence.

The voice interception program is part of a broader program called MYSTIC revealed in March when the Washington Post published documents provided by former NSA contractor Edward Snowden.

MYSTIC is used to collect phonecall metadata and is used in Mexico, Kenya and the Philippines, according to The Intercept. SOMALGET enables the NSA to gather and store the contents of every conversation in an entire country, it said.

The program gives the NSA the capability to record and store the phone calls of an entire nation for up to 30 days, according to the Washington Post. The paper decided not to identify the countries affected on request of the U.S. government.

While The Intercept revealed the identity of five of the Mystic target countries, Assange said the decision not to name Afghanistan was "censorship."

"Such censorship strips a nation of its right to self-determination on a matter which affects its whole population," ="https://wikileaks.org/WikiLeaks-statement-on-the-mass.html">he said on Wikileak's site. "By denying an entire population the knowledge of its own victimization, this act of censorship denies each individual in that country the opportunity to seek an effective remedy, whether in international courts, or elsewhere," he said.

To protect his source, Assange did not disclose how Wikileaks confirmed the identity of the second country. However, he said, it can also be independently verified through forensic scrutiny of imperfectly applied censorship on related documents released to date, and through correlations with other NSA programs.

The censorship of a victim state's identity directly assists the killing of innocent people, Assange said. The U.S. has been using mass interception programs as a key component in its drone targeting program that has killed "thousands of people and hundreds of women and children in Afghanistan, Pakistan, Yemen and Somalia in violation of international law," he added.

"We do not believe it is the place of media to 'aid and abet' a state in escaping detection and prosecution for a serious crime against a population. Consequently Wikileaks cannot be complicit in the censorship of victim state X. The country in question is Afghanistan," he said.

U.S. intelligence officials defended the program in a presentation to the U.S. Privacy and Civil Liberties Oversight Board in March, the day after the Washington Post ran its MYSTIC article. The surveillance program focused on overseas telephone and email communications is targeted and narrow, and not the bulk collection portrayed in numerous news reports, the officials said.

The U.S. government's claims lack credibility, said Assange.

"Not only has it not bothered to contact Wikileaks pre-publication in this matter, it has been aware of the material obtained by Edward Snowden for almost a year. Almost every office in Washington DC has specifically been aware of the material relating to the censored victim country since at least March 18, 2014, when the Washington Post issued a front page story on the subject," he said.

The U.S has had plenty of time to protect its assets, he said, adding that Wikileaks believes any ongoing perceived risks to be fanciful or willfully embraced by the U.S. government. "We also reject the implication that it is the role of the international press to protect U.S. assets from arrest for the mass infringement of the rights of another nation's people."

Loek is Amsterdam Correspondent and covers online privacy, intellectual property, open-source and online payment issues for the IDG News Service. Follow him on Twitter at @loekessers or email tips and comments to loek_essers@idg.com



Share:

More from Techworld

More relevant IT news

Comments



Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *