Some foreign-backed US phone companies reportedly excluded from NSA surveillance program

Their call metadata could still be collected further upstream, from the telecommunication infrastructure operated by other US companies

At least two U.S. mobile operators, T-Mobile US and Verizon Wireless, reportedly do not participate directly in the U.S. National Security Agency's call metadata collection program because of their partial ownership by foreign telecommunication companies.

That said, call metadata from these operators' phone traffic is still likely collected when it travels over the networks of U.S. companies that work with the NSA and own the country's telecommunications backbone infrastructure, The Wall Street Journal reported late Thursday.

Citing information received from unnamed people familiar with the matter, including current and former U.S. officials, the newspaper reported that the exclusion of T-Mobile USA and Verizon Wireless from NSA's collection program is likely related to their foreign ownership.

Germany's Deutsche Telekom has a 74 percent majority stake in T-Mobile US and the U.K.'s Vodafone Group owns 45 percent of Verizon Wireless, the mobile operator being a joint venture between Vodafone and American telecommunications firm Verizon Communications.

Information recently leaked to The Washington Post and the Guardian revealed that the NSA used secret court orders issued under the provisions of the U.S. Foreign Intelligence Surveillance Act (FISA) to force Verizon Business Network Services, a U.S. Verizon Communications subsidiary, to provide the agency with call metadata for phone traffic passing through its systems on an ongoing, daily basis.

Verizon Business Network Services is one of the companies that operate the backbone telecommunications infrastructure in the U.S.

Call metadata includes the time, date and duration of the calls; the originating and recipient phone numbers; the unique device identifiers of the mobile devices used for the call and other traffic information, except for the actual content of the calls.

The secret court orders issued by the Foreign Intelligence Surveillance Court for cellphone metadata collection by the NSA are classified as top secret and "NOFORN," which means that "no foreign nationals" should be aware of them. This classification would make it impractical to serve such orders directly to companies like T-Mobile US or Verizon Wireless, considering their foreign ownership.

Join the CSO newsletter!

Error: Please check your email address.

Tags Government use of ITtelecommunicationsecurityVodafone Groupgovernmentdeutsche telekomT-Mobile USVerizon CommunicationsprivacyVerizon WirelessVerizon Business Network Services

More about Deutsche TelekomNational Security AgencyNSAT-MobileT-MobileVerizonVerizonVerizon BusinessVerizon WirelessVodafoneWall Street

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Lucian Constantin

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place