recommended reading

WikiLeaks Claims NSA Is Recording 'Nearly All' of Afghanistan’s Phone Calls

A female supporter of Afghan presidential candidate Ashraf Ghani Ahmadzai talks on the phone after a campaign rally for women in Kabul.

A female supporter of Afghan presidential candidate Ashraf Ghani Ahmadzai talks on the phone after a campaign rally for women in Kabul. // Massoud Hossaini/AP

The National Security Agency has been recording and archiving "nearly all" domestic and international phone calls in Afghanistan as of last year, according to the antisecrecy website WikiLeaks.

Following through on a promise made earlier in the week, WikiLeaks revealed Friday the identity of what it says is "Country X," a previously unnamed country that journalism reports have said was subject to an NSA surveillance program that allows agents to listen in to the entirety of its telephone conversations.

The country's identity had been censored by multiple journalism outlets because of requests from U.S. intelligence officials, who claimed its disclosure could significantly jeopardize national security and lead to deaths.

But WikiLeaks, which is known for an aggressive disclosure policy that rarely favors redaction, dismissed such concerns.

"Both The Washington Post and The Intercept stated that they had censored the name of the victim country at the request of the U.S. government," WikiLeaks said in a statement. "By denying an entire population the knowledge of its own victimization, this act of censorship denies each individual in that country the opportunity to seek an effective remedy, whether in international courts, or elsewhere."

If true, the disclosure that the U.S. government is able to listen to almost any phone conversation in Afghanistan could have substantial ramifications for international relations.

The program in question is codenamed MYSTIC and was formed in 2009 to allow NSA analysts to rewind and play back phone conversations taking place within the previous 30 days. The program has been described by one official as a "time machine" that opens a "door into the past," allowing a full replay of the voices on any given call, without the need for prior identification of those on the line.

Earlier in the week, WikiLeaks began a heated debate on Twitter with journalist Glenn Greenwald, a confidant of NSA whistle-blower Edward Snowden. Greenwald is believed to be one of only two people to possess all of the Snowden files. WikiLeaks took issue with a new report from The Intercept, Greenwald's new journalism endeavor, that revealed that the U.S. was covertly recording the conversations of "virtually every cellphone conversation" in the Bahamas, in addition to its content-vacuuming efforts in Country X.

Ignoring pleas from Greenwald that he and his fellow journalists were "very convinced" that naming the country would lead to deaths, WikiLeaks abruptly threatened to disclose its identity.

It remains unclear how the website would possess such top-secret information. On Friday, it refused to give further detail.

"Although, for reasons of source protection we cannot disclose how, WikiLeaks has confirmed that the identity of victim state is Afghanistan," WikiLeaks wrote. "This can also be independently verified through forensic scrutiny of imperfectly applied censorship on related documents released to date and correlations with other NSA programs."

The NSA did not immediately respond to a request for comment. But in a statement provided to National Journal in March, the agency said it "does not conduct signals intelligence collection in any country, or anywhere in the world, unless it is necessary to advance U.S. national security and foreign policy interests."

Greenwald and other journalists with knowledge of the NSA's classified programs did not immediately comment on the veracity of WikiLeaks's naming of Afghanistan.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.