Operation AURORAGOLD - How NSA Hacking Every Cellphone Network in the World


In March 2011, the National Security Agency received a secret message prior to the Western intervention in Libya. An intelligence unit in the United States military’s Africa Command required help to hack Libya’s cell phone network to be able to monitor their text messages. This task was easy for the NSA as they had already gotten their hands on technical information about their carrier’s internet system by spying on the documents sent among their company employees which were perfect to provide help to break into the networks.

NSA giving its assistance in this matter was not an isolated case, rather it was part of a much a larger surveillance program. Documents which were part of the material provided to The Intercept, NSA had spied on a number of companies and international organizations to be able to find weaknesses in their cell phone technology which they could exploit. It also reveals how NSA plans on introducing new flaws into communication systems which they can tap into which is seen to be a controversial tactic.

The covert operation is known as AURORAGOLD and has monitored content which has been sent and received by more than 1200 email accounts as part of major cell phone network operators and has also intercepted confidential papers which have helped NSA hack into cell phone networks.

According to a cell phone security expert and cryptographer, Karsten Nohl, the broad scope of the information collected from AURORAGOLD appears to be aimed at ensuring that NSA can access every cell phone network possible. He also said that collecting such an inventory on world networks is likely to have ramifications as well since it does allow the NSA to track and circumvent upgrades in encryption technology, which is used by cell phone companies to prevent calls and texts from being eavesdropped. The operation is one which is carried out by special surveillance units of the NSA whose existence hasn’t been disclosed.

The information which is collected from the companies is passed to the signals development team of the NSA which focuses on infiltrating communication networks. It is also shared with other agencies which are NSA’s counterparts in countries known as the Five Eyes surveillance which include the UK, Canada, New Zealand and Australia.

The NSA documents do not have the names of many operations apart from those in Iran, China and Libya. However a world map feature in 2012 suggests that the NSA has network coverage in almost every country in every continent. One of the main targets under the AURORAGOLD program is the GSM Association, headquartered in London which represents the interests of more than 800 cell phone software and internet companies from almost 220 countries.

The NSA focuses on getting their hands on important and obscure information which is circulated among the GSMA’s members which are known as IR.21s most cell phone network operators share IR.21 documents with each other as part of their agreement allowing customers to connect to the foreign networks while they are abroad.

The details of the IR.21 serve as a warning mechanism which flags any new technology, which is used by network operators. This allows NSA to identify any security vulnerabilities in latest communication systems which can be exploited and helps efforts made to introduce further vulnerabilities where they may not even exist.

The IR. 21’s also contain information about the encryption which is used by cell phone companies in order to keep their customers communication safe and private while they are transmitted across the networks. These details are of interest to the NSA as they can help in listening to conversations.

Last year, the Washington Post stated that the NSA had managed in breaking the most common encryption algorithm used which is known as A5/1. The information which is collected under AURORAGOLD however, allows the agency to focus on circumventing stronger and newer versions of the cell phone encryption system such as the A5/3.
Extensive attempts to attack cell phone encryption has been replicated throughout the Five Eyes surveillance alliance as well.

Documents by the NSA show that the focus is placed on collecting details about all technical standards which are used by cell phone operators and their efforts to stay ahead in technology yields surprising results. In 2010, its operatives had found new ways to penetrate the fourth generation of smart phone era technology for surveillance, years before it was adopted by people all around the world.

The agency says that their targets are terrorists, weapons proliferators and other foreign targets and not ordinary people. However the methods used by them and their partners pose significant risks. In April, officials from the White House confirmed that Obama had told the NSA to disclose any vulnerabilities it may find, however qualified that with a loophole flaws should be secretly exploited as long as there is deemed to be a clear national security or law enforcement use.


Nicki is a tech blogger and gadget lover, she loves to write about Android and iOS security and cell phone spy apps.



4G,1,A/B Testing,2,Aerospace Engineering,2,AFP Consortium,1,Agile,2,AI,5,amazon,4,Amazon india coupons,3,AMD,1,Analytics,2,android,28,android phones,2,Anonymous,3,Antivirus,1,app,24,App Development,6,apple,32,apps,5,Artificial Intelligence,8,Assurance,1,asus,1,Audi,2,auto,7,automation,2,automation software,11,automotive technology,11,banking,1,Big data,2,bitcoin,3,BlackBerry,5,blockchain,4,blogging,1,BMW,1,branding,1,brands,2,browser,2,Business,18,Business Analytics,2,Business Intelligence,1,Business lesson,18,Business models,6,business strategy,24,Business Strategy Model,16,Business Success Story,7,business techniques,24,cameraphone,5,car,15,car technology,11,CES,1,chromebook,3,Cloud computing,6,cloud Technology,5,CMS,1,coding,1,companies,3,Consortium,1,consulting,1,content marketing,9,corporate,1,coupons,3,CRM,2,CRM Software,3,cryptocurrency,2,Customer experience,8,Customer Service,7,customer support,4,cyber crime,5,cyber security,27,data,3,data recovery,1,deals,1,Dell Streak,1,development,9,devices,2,DevOps,1,digital currency,1,digital marketing,23,Digital Transformation,2,disk,1,e commerce,1,eBay,1,ebook,1,ecommerce,8,Electric Cars,11,electronics sale,2,elon musk,2,email,1,energy,1,enterprise,11,Enterprise Security,2,enterprise technology,9,entrepreneur,3,entrepreneurship,7,ERP,2,facebook,24,file conversion,1,financial tech,1,fintech,1,firefox,2,firefox os,2,Flipkart,2,Front-end Development,3,future business,10,future technology,34,gadget,33,gamail,1,games,6,Games.,1,google,20,google cars,1,google glass,3,Google I/O,1,Google+,8,goole ranking,1,Graphics Card,1,Green energy,1,hackers,18,hacking,14,hardware,5,Healthcare,1,HealthTech,1,Home Automation,1,Hosting,3,How To Guides,22,How Tos,17,icloud,3,IDE,1,Infographic,2,Information Technology,19,infosec,14,innovation,52,internet,8,Internet Explorer,1,Internet of Things,8,Inventory Management,1,ios,18,IoT,10,ipad,8,iPhone,14,iPhone 8,1,IT certification,1,IT Operation,1,IT Service,2,IT services management,3,ITSM,2,iWatch,1,Jabong,1,JavaScript,4,JS,1,Kubernetes,1,laptop,3,LinkedIn,2,local business,1,Lotus Notes,3,MacBook,3,mackbook air,2,Magento,1,Managed IT Services,3,Mark Zuckerberg,4,Mercedes,1,messenger,1,microsoft,6,mobile app development,28,mobile apps,30,mobile broadband,1,mobile enterprise,15,mobile recharge,2,mobility,18,mobility management,11,Motorola Xoom,1,Myntra,1,network,4,nokia,1,NSA,2,Nvidia,1,Objective-C,1,Omnichannel,1,OnePlus Smartphones,1,online course,1,online education,2,online recharge,1,online shopping,4,open source,1,opreating system,5,Outlook,2,P2P,1,page ranking,1,patent,1,Payment,1,PayTM,1,pc software,1,photoshop,1,playstation,1,Porsche,1,process management,4,Procure,1,programming,4,programming language,5,Python,1,Quality,2,Redbus,1,remote control,1,renewable energy,3,review,10,SAAS,4,sales,2,Sales Funnel,2,samsung,7,scrum,1,search engine,4,Search Engine Optimization,2,security,15,Self Driving Cars,11,SEO,9,smartphone,14,SmartTech,1,SME,1,sms,1,Snapdeal,2,social media,12,social network,11,software,14,Software as a service (SaaS),5,software development,17,software methodology,8,Software Outsourcing,2,software review,4,Solar,1,Solar energy,1,Solar power,1,startup,10,steve jobs,3,storage,1,strategy,1,Supercars,1,sustainability,1,Swift,1,tablet,9,team management,3,tech,4,tech conference,1,Tech event,2,Ted talk,1,Tesla,2,Tesla Motors,3,The Internet Of Things,2,timeline,1,toolbar,1,tools,2,torrent,1,touchscreen,2,trdx,1,tutorial,2,twitter,3,udacity,1,udemy,1,ultrabook,1,USB,1,video,2,video editor,2,virtual phone,1,Virtual Reality,4,Volvo,2,VPN,3,VR,2,Wearable gadget,2,Wearable Tech,2,Web 4.0,3,Web Development,9,web technology,12,Wi-Fi,1,wikileaks,2,windows,7,windows 10,1,Windows 8,8,Windows 8 Preview,1,Wordpress,3,workplace,2,X Mountain Lion,2,xcode,1,xp,1,
TechFond - Latest Technology | Analysis | Enterprise | Startups | Product Reviews | How Tos: Operation AURORAGOLD - How NSA Hacking Every Cellphone Network in the World
Operation AURORAGOLD - How NSA Hacking Every Cellphone Network in the World
TechFond - Latest Technology | Analysis | Enterprise | Startups | Product Reviews | How Tos
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS CONTENT IS PREMIUM Please share to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy