• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • January 18th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Surveillance
NSA

Snowden documents show how NSA converts Audio calls into searchable data

May 6th, 2015 Waqas NSA, Surveillance 0 comments
Snowden documents show how NSA converts Audio calls into searchable data
Share on FacebookShare on Twitter

A new Edward Snowden document released by The Intercept describes the way NSA converted voice calls into searchable text files for about a decade. 

In a new document released by The Intercept from the cache of government files possessed by Edward Snowden has exposed how the National Security Agency (NSA) has been converting audio calls into identifiable text files.

At least for a decade, the NSA has managed to discreetly monitor signals intelligence (SIGNIT) throughout the world specifically in active combat zones like Latin America, Afghanistan and Iraq.

Usually, this kind of data collection involved listening to calls via a live operator and translating them in real-time. However, an automated system called “Google for Voice” was developed by the NSA, which provided a transcription that was rough but keyword searchable.

leaked-snowdown-documents-nsa-voice-call-tracking

As per the documents, the NSA also developed sophisticated algorithms and analytical programs to flag voice calls for the human review.

Moreover, this monitoring was conducted on an industrial and automated scale, which allowed the NSA to track huge amounts of total SIGNIT traffic in a specific region. 

[q]Latin America, Afghanistan and Iraq were the main targets[/q]

It is true that these transcriptions aren’t flawless but according to another NSA whistleblower Thomas Drake these “can still get a lot more information. It’s far more accessible. I can search against it. The breakthrough was being able to do it on a vast scale.”

[src src=”source” url=”https://firstlook.org/theintercept/2015/05/05/nsa-speech-recognition-snowden-searchable-text/”]The Intercept[/src]

  • Tags
  • DARPA
  • Edward Snowden
  • Google
  • Military
  • NSA
  • Privacy
  • security
  • Surveillance
  • Tracking
Facebook Twitter LinkedIn Pinterest
Previous article New iPhone case charges your phone battery without being plugged in
Next article This New Rombertik Malware Crashes Your PC Once Detected
Waqas

Waqas

I am a UK-based cybersecurity journalist with a passion for covering the latest happenings in cyber security and tech world. I am also into gaming, reading and investigative journalism

Related Posts
IMF could track your browsing history to determine credit score

IMF could track your browsing history to determine credit score

Apple, Google to ban X-Mode's location tracking apps from stores

Apple, Google to ban X-Mode's location tracking apps from stores

German court forcing Tutanota to let authorities read emails in plain text

German court forcing Tutanota to let authorities read emails in plain text

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
'Child's Play' - Kids breach and bypass Linux Mint screensaver lock
Security

'Child's Play' - Kids breach and bypass Linux Mint screensaver lock

786
Transferring data between smartphones seamlessly
Technology News

Transferring data between smartphones seamlessly

549
Infamous cybercrime, carding market Joker's Stash is shutting down
Cyber Crime

Infamous cybercrime, carding market Joker's Stash is shutting down

1091

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us