From the Intercept:

With these stolen encryption keys, intelligence agencies can monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments. Possessing the keys also sidesteps the need to get a warrant or a wiretap, while leaving no trace on the wireless provider’s network that the communications were intercepted.

Apparently no hyperbole is too hyperbolic when describing the scope of the NSA’s massive data-vacuuming operation.