ConnectABILITY Homepage

Angry Birds App NSA

  • This topic is empty.
Viewing 1 post (of 1 total)
  • Author
    Posts
  • #17741
    Jenna Martinuzzi
    Participant

      NSA using ‘leaky apps’ like Angry Birds to gather data, documents show
      Unintended intelligence tools, so-called leaky apps, spew everything from users’ smartphone identification codes to where they have been that day. The Guardian / The Associated Press File Photo Documents leaked by Edward Snowden, above, a former contractor at the National Security Agency, show that the NSA and its British counterpart were working together on how to collect and store data from dozens of smartphone apps by 2007. By:James GlanzJeff LarsonAndrew W. LehrenThe New York Times, Published on Mon Jan 27 2014
      When a smartphone user opens Angry Birds, the popular game application, and starts slinging birds at chortling green pigs, spy agencies have plotted how to lurk in the background to snatch data revealing the player’s location, age, sex and other personal information, according to secret British intelligence documents. In their globe-spanning surveillance for terrorism suspects and other targets, the National Security Agency and its British counterpart have been trying to exploit a basic byproduct of modern telecommunications: with each new generation of mobile phone technology, ever greater amounts of personal data pour onto networks where spies can pick it up.Read more on thestar.com:
      Edward Snowden says NSA spies on foreign firms NSA leaks prompted major Canadian eavesdropping review Edward Snowden’s NSA leaks: Sex, spies and videotape According to dozens of previously undisclosed classified documents, among the most valuable of those unintended intelligence tools are so-called leaky apps that spew everything from users’ smartphone identification codes to where they have been that day.
      The NSA and Britain’s Government Communications Headquarters were working together on how to collect and store data from dozens of smartphone apps by 2007, according to the documents, provided by Edward J. Snowden, the former NSA contractor.
      Since then, the agencies have traded recipes for grabbing location and planning data when a target uses Google Maps, and for vacuuming up address books, buddy lists, phone logs and the geographic data embedded in photos when someone sends a post to the mobile versions of Facebook, Flickr, LinkedIn, Twitter and other services.
      The eavesdroppers’ pursuit of mobile networks has been outlined in earlier reports, but the secret documents, shared by The New York Times, The Guardian and ProPublica, offer far more details of their ambitions for smartphones and the apps that run on them.
      The efforts were part of an initiative called “the mobile surge,” according to a 2011 British document, an analogy to the troop surges in Iraq and Afghanistan. One NSA analyst’s enthusiasm was evident in the breathless title — “Golden Nugget!” — given to one slide for a top-secret 2010 talk describing iPhones and Android phones as rich resources, one document notes.
      The scale and the specifics of the data haul are not clear. The documents show that the NSA and the British agency routinely obtain information from certain apps, particularly some of those introduced earliest to cellphones.
      With some newer apps, including Angry Birds, the agencies have a similar capability, the documents show, but they do not make explicit whether the spies have put that into practice.
      Some personal data, developed in profiles by advertising companies, could be particularly sensitive: a secret 2012 British intelligence document says that spies can scrub smartphone apps that contain details like a user’s “political alignment” and sexual orientation.
      U.S. President Barack Obama announced new restrictions this month to better protect the privacy of ordinary Americans and foreigners from government surveillance, including limits on how the NSA can view “metadata” of Americans’ phone calls — the routing information, time stamps and other data associated with calls. But he did not address the avalanche of information that the intelligence agencies get from leaky apps and other smartphone functions.
      And while he expressed concern about advertising companies that collect information on people to send tailored ads to their mobile phones, he offered no hint that U.S. spies routinely seize that data. Nothing in the secret reports indicates that the companies co-operate with the spy agencies to share the information; the topic is not addressed.
      The agencies have long been intercepting earlier generations of cellphone traffic like text messages and metadata from nearly every segment of the mobile network — and, more recently, computer traffic running on Internet pipelines. Because those same networks carry the rush of data from leaky apps, the agencies have a ready-made way to collect and store this new resource. The documents do not address how many users might be affected, or how often, with so much information collected automatically, analysts would see personal data.
      “NSA does not profile everyday Americans as it carries out its foreign intelligence mission,” the agency said in a written response to questions about the program. “Because some data of U.S. persons may at times be incidentally collected in NSA’s lawful foreign intelligence mission, privacy protections for U.S. persons exist across the entire process.” Similar protections, the agency said, are in place for “innocent foreign citizens.”
      The British spy agency declined to comment on any specific program, but said all its activities complied with British law.

    Viewing 1 post (of 1 total)
    • You must be logged in to reply to this topic.