Latest Snowden Leak Reveals NSA's Ability To Tap Your Mobile Phone
from the no-matter-what-phone-it-is dept
The latest article coming out of Ed Snowden's documents is reported in the German publication Spiegel and details how the NSA is able to access data from basically every popular mobile phone/operating system:The United States' National Security Agency intelligence-gathering operation is capable of accessing user data from smart phones from all leading manufacturers. Top secret NSA documents that SPIEGEL has seen explicitly note that the NSA can tap into such information on Apple iPhones, BlackBerry devices and Google's Android mobile operating system.The "location" tidbit is particularly interesting, in part because that's one point that Senator Ron Wyden has asked the NSA to discuss repeatedly: whether or not it's tracking people's location info based on their mobile phones, and the NSA has denied that they do (or, rather, indicated that they're not doing that currently).
The documents state that it is possible for the NSA to tap most sensitive data held on these smart phones, including contact lists, SMS traffic, notes and location information about where a user has been.
The documents also indicate that the NSA has set up specific working groups to deal with each operating system, with the goal of gaining secret access to the data held on the phones.
As for the Blackberry, that's often been pitched because it was supposedly much more secure than other phones -- but the NSA figured out how to get around that. And here's an interesting tidbit: for a little while, they lost access because RIM changed how it encrypted its data:
The documents suggest the intelligence specialists have also had similar success in hacking into BlackBerrys. A 2009 NSA document states that it can "see and read SMS traffic." It also notes there was a period in 2009 when the NSA was temporarily unable to access BlackBerry devices. After the Canadian company acquired another firm, it changed the way in compresses its data. But in March 2010, the department responsible declared it had regained access to BlackBerry data and celebrated with the word, "champagne!"The 2010 cracking of Blackberry data is interesting, because we've noted previously that the NSA had claimed a "major" breakthrough in breaking encryption in 2010. This was first reported by James Bamford a few years ago, and discussed in more detail just last week with the revelation about their encryption hacking efforts. These may have been different breakthroughs, but interesting to see the timing.
The documents also state that the NSA has succeeded in accessing the BlackBerry mail system, which is known to be very secure. This could mark a huge setback for the company, which has always claimed that its mail system is uncrackable.
Either way, it's yet more confirmation of the capabilities of the NSA to tap into almost anything if it really wants to.
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: encryption, messages, mobile phone, nsa, nsa surveillance, surveillance
Reader Comments
Subscribe: RSS
View by: Time | Thread
Big Brother celebrates with champagne
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
PC's, not so much...
[ link to this | view in chronology ]
Re: Re:
It's not about good will. First, it was because carriers liked the lock in. Remember those old java phones where the only way to get new ringtones was to buy a 30 second clip for $5? The other reason was Steve Jobs and his control freak tendencies.
If you look at cell phone security, most of it is stupidly weak. The only thing it's good for is keeping non technical users from breaking anything too badly.
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Communications tapping
That cell phones can be turned on remotely, while giving the appearance of being off, has also been known for a long time. Such phones can be used as bugs, not merely for tapping.
It is well published and documented that the NSA, CIA and possibly others are building enormous data centers in Utah which can hold all the phone communications that any will ever have. With cell tower ping records, the locations of phones at a given time can be established.
I have no understanding why there is so much foofarah over Snowden's "leaks" to date. It has all been there for anyone who cared to see.
[ link to this | view in chronology ]
Re: Communications tapping
[ link to this | view in chronology ]
Re: Communications tapping
The content is so damning, so thorough and shows so many consistent violations of the most basic rights that it is impossible to ignore.
Look, we both know (or at least suspect) that proprietary software (and sometimes even open-source software...temporarily at least) can be and often is compromised. We also know how to mitigate the damage.
Now go tell a room of computer illiterates that their operating system is compromised and that they have to switch to Linux right now to protect their rights. The end result will probably be that people will basically tell you to fuck off...I should know: I've done that.
These leaks at least made people aware of the issues in a way that is impossible to ignore. So much that it even has political representatives asking questions and pressuring the NSA.
People can still choose to pretend that the problem does not exist, of course. But that's like trying to pretend that the Sun doesn't exist at this point.
Snowden has done the world a great service.
[ link to this | view in chronology ]
Re: Communications tapping
If nothing else, the dirt and rust getting revealed in these parts of the government machine is encouraging more politicians to look into further transparency and changes to the regulation. Even Obama has caught the inevitability of having to do something about the issues after the leaks.
[ link to this | view in chronology ]
Re: Communications tapping
[ link to this | view in chronology ]
Re: Communications tapping
It's the reaction to revelation of deviance.
[ link to this | view in chronology ]
Re: Communications tapping
Because now it's out there for all those who DIDN'T care to see it...right there in their faces.
[ link to this | view in chronology ]
Re: Communications tapping
Next up, enormously gigantic prisons.
[ link to this | view in chronology ]
Re: Communications tapping
[ link to this | view in chronology ]
[ link to this | view in chronology ]
And this is why they killed Symbian!
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
One word
[ link to this | view in chronology ]
There's a very serious secondary problem
So the NSA, by subverting standards, weakening crypto, implanting backdoors, has undercut security for everyone.
In other words, they've made life much easier for pedophiles and spammers, drug gangs and stalkers, rapists and identity thieves, phishers and terrorists -- everyone out there who wants to use technical measures to gather intelligence on their victims or to attack them.
All those vermin don't have to do the hard work: the NSA did it for them. For free. (Well, not quite: they spent American taxpayer dollars to do it.) All they have to do is piggyback on the NSA's work and reap the rewards. That may still not be easy per se, but it's waaaaay easier than it would be without the NSA's contributions.
The NSA has done a thousand times the damage that all terrorists combined could do to the US even if they were working double shifts.
[ link to this | view in chronology ]
Re: There's a very serious secondary problem
[ link to this | view in chronology ]
Re: Re: There's a very serious secondary problem
Remember, you're dealing with a group of people who firmly believe that 'unintended consequences' are things other people have to deal with, and that those pesky things called 'rules' and 'laws' are more 'guidelines' than things that they need to obey.
[ link to this | view in chronology ]
Corporations are people now, can we start executing them for treason?
Money comes in 1 door to make things more secure, and in another door to make sure its not actually secure.
Maybe it is time to wonder why our leaders listen to these people who are leaving the country far less safe despite being paid to make it safer.
[ link to this | view in chronology ]
Re:
Purposefully weakening security is a luddites work and it should be obvious that it is incredibly damaging to technological development, the companies whose products are getting abused and to the trust in the government for those in the know.
While procuring vulnerabilities and backdoors is insanity, most of the other programs run on collecting information. While there is a census on this site, that the protection of privacy against government is extremely important, the information they are able to gather that way, would be possible for others to gather anyway, even though it is a much harder task.
Crude, inefficient and potentially open to abuse, as it is, it is still at least meant to be non-disruptive to the private market (the economics of gathering is always questionable).
Phone tapping like described in the OP is just another surveillance tool and more "tolerable" to corporations and private citizens than Bullrun.
[ link to this | view in chronology ]
Oh, and do sign a petition.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
'tapped' BS
effectively, you don't own your phone hardware, even if you bought it outright, and took reasonable steps to insure it was solely in your control.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Of course, if it's some subtle flaw in Android's code, like that Windows encryption problem that a couple of Microsoft devs stumbled across, it might have been ported over to CyanogenMod...
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
How to Squeeze Out Hardware Back-Doors, to John Fenderson, #25
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Is congress, or any other legally-empowered, governmental entity going to DO anything here?
Internet protests unfortunately carry little to no weight in the real world. The most important thing is to get mainstream media back into looking at this. I want to do help, but have no idea how to start.
It's not like all this foreign spying was able to prevent the release of Sarin in Syria.
[dons tinfoil hat]
Or was the release of Sarin in Syria a ploy to distract from the domestic spying?
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re: Re:
Remember, we are from the government, and we are here to help.
[ link to this | view in chronology ]
Privacy
Using a SilentPocket™ allows you to take control of your own privacy when it comes to Smartphone tracking. MIAmobi™ addresses this issue and many more problems associated with mobile devices.
With over 1,500,000 mobile app developed for smartphones, many of which are stealth and are eavesdropping on your every move. Some are capable of turning on functions on your phone like your mic, camera, GPS, address book and more, even when it has been turned off. There is only one way to stop this if you really want to know for sure that you have control of your mobile device is to block all forms of wifi coming in or going out. Get informed MIA-mobi.com
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Such a phone will probably be declared illegal though. The spies will state it doesn't 'fully' comply with 'Enhanced 9-1-1' because the GPS chip could be turned off by the user.
Ahhh, good 'ol Enhanced 9-1-1. Policy laundering at it's finest! Require GPS tracking for every smartphone in the world, under the guise of 'safety'.
They're always doing it for your own good! ;)
[ link to this | view in chronology ]
Snowden
[ link to this | view in chronology ]
Appreciation
[ link to this | view in chronology ]
your smartphone is dangerous
[ link to this | view in chronology ]
News
Increase Your Knowledge with Latest Technology News Website :
Website URL is : http://www.techmortal.com
If you feel that this website is very informative then share with your good friends.
Thanks.
Visit: techmortal.com
[ link to this | view in chronology ]
Hi Friend
my URL this
http://calmemobiles.com/
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Nice
[ link to this | view in chronology ]
Mobile phone taps
Conferencing is not enabled.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
[ link to this | view in chronology ]
raiz
Hello, Windows, Mac, even Linux. You heard it here first.
[ link to this | view in chronology ]
Decanter
This is the great innovation and i like the iphone . Thanks for the nice mobile advice
[ link to this | view in chronology ]
Source : https://firedout.com/movie-rulz-kodi-addon/
[ link to this | view in chronology ]