When a smartphone user opens Angry Birds, the popular game
application, and starts slinging birds at chortling green pigs, spy agencies have
plotted how to lurk in the background to snatch data revealing the player’s
location, age, sex and other personal information, according to secret British
intelligence documents.
In their globe-spanning surveillance for terrorism suspects
and other targets, the National Security Agency and its British counterpart
have been trying to exploit a basic byproduct of modern telecommunications:
With each new generation of mobile phone technology, ever greater amounts of
personal data pour onto networks where spies can pick it up.
According to dozens of previously undisclosed classified
documents, among the most valuable of those unintended intelligence tools are
so-called leaky apps that spew everything from users’ smartphone identification
codes to where they have been that day.
The N.S.A. and Britain’s Government Communications
Headquarters were working together on how to collect and store data from dozens
of smartphone apps by 2007, according to the documents, provided by Edward J.
Snowden, the former N.S.A. contractor. Since then, the agencies have traded
recipes for grabbing location and planning data when a target uses Google Maps,
and for vacuuming up address books, buddy lists, phone logs and the geographic
data embedded in photos when someone sends a post to the mobile versions of
Facebook, Flickr, LinkedIn, Twitter and other services.
The eavesdroppers’ pursuit of mobile networks has been
outlined in earlier reports, but the secret documents, shared by The New York
Times, The
Guardian and ProPublica,
offer far more details of their ambitions for smartphones and the apps that run
on them. The efforts were part of an initiative called “the mobile surge,”
according to a 2011 British document, an analogy to the troop surges in Iraq
and Afghanistan. One N.S.A. analyst’s enthusiasm was evident in the breathless
title — “Golden Nugget!” — given to one
slide for a top-secret 2010 talk describing iPhones and Android phones as
rich resources, one document notes.
The scale and the specifics of the data haul are not
clear. The documents show that the N.S.A. and the British agency routinely
obtain information from certain apps, particularly some of those introduced
earliest to cellphones. With some newer apps, including Angry Birds, the
agencies have a similar capability, the documents show, but they do not make
explicit whether the spies have put that into practice. Some personal data, developed
in profiles by advertising companies, could be particularly sensitive: A secret
2012 British intelligence document says that spies can scrub smartphone apps
that contain details like a user’s “political alignment” and sexual
orientation.
President Obama announced new restrictions this month to better
protect the privacy of ordinary Americans and foreigners from government
surveillance, including limits on how the N.S.A. can view “metadata” of
Americans’ phone calls — the routing information, time stamps and other data
associated with calls. But he did not address the avalanche of information that
the intelligence agencies get from leaky apps and other smartphone functions.
And while he expressed concern about advertising
companies that collect information on people to send tailored ads to their
mobile phones, he offered no hint that American spies routinely seize that
data. Nothing in the secret reports indicates that the companies cooperate with
the spy agencies to share the information; the topic is not addressed.
The agencies have long been intercepting earlier
generations of cellphone traffic like text messages and metadata from nearly
every segment of the mobile network — and, more recently, computer traffic
running on Internet pipelines. Because those same networks carry the rush of
data from leaky apps, the agencies have a ready-made way to collect and store
this new resource. The documents do not address how many users might be
affected, whether they include Americans, or how often, with so much
information collected automatically, analysts would see personal data.
“N.S.A. does not profile everyday Americans as it carries
out its foreign intelligence mission,” the agency said in a written response to
questions about the program. “Because some data of U.S. persons may at times be
incidentally collected in N.S.A.'s lawful foreign intelligence mission, privacy
protections for U.S. persons exist across the entire process.” Similar
protections, the agency said, are in place for “innocent foreign citizens.”
The British spy agency declined to comment on any
specific program, but said all its activities complied with British law.
Two top-secret flow charts produced by the British agency
in 2012 show incoming streams of information skimmed from smartphone traffic by
the Americans and the British. The streams are divided into “traditional
telephony” — metadata — and others marked “social apps,” “geo apps,” “http linking,”
webmail, MMS and traffic associated with mobile ads, among others. (MMS refers
to the mobile system for sending pictures and other multimedia, and http is the
protocol for linking to websites.)
In charts showing how information flows from smartphones into
the agency’s computers, analysts included questions to be answered by the data,
including “Where was my target when they did this?” and “Where is my target
going?”
As the program accelerated, the N.S.A. nearly quadrupled
its budget in a single year, to $767 million in 2007 from $204 million,
according to a top-secret Canadian analysis written around the same time.
Even sophisticated users are often unaware of how
smartphones offer a unique opportunity for one-stop shopping for information
about them. “By having these devices in our pockets and using them more and
more,” said Philippe Langlois, who has studied the vulnerabilities of mobile
phone networks and is the founder of the Paris-based company Priority One
Security, “you’re somehow becoming a sensor for the world intelligence
community.”
Detailed Profiles
Smartphones almost seem to make things too easy.
Functioning as phones — making calls and sending texts — and as computers —
surfing the web and sending emails — they generate and also rely on data. One
secret report shows that just by updating Android software, a user sent nearly
500 lines of data about the phone’s history and use onto the network.
Such information helps mobile ad companies, for example,
create detailed profiles of people based on how they use their mobile device,
where they travel, what apps and websites they open, and other factors.
Advertising firms might triangulate web shopping data and browsing history to
guess whether someone is wealthy or has children, for example.
The N.S.A. and the British agency busily scoop up this
data, mining it for new information and comparing it with their lists of
intelligence targets.
One secret 2010 British document suggests that the agencies
collect such a huge volume of “cookies” — the digital traces left on a mobile
device or a computer when a target visits a website — that classified computers
were having trouble storing it all.
“They are gathered in bulk, and are currently our single
largest type of events,” the document says.
The two agencies displayed a particular interest in
Google Maps, which is accurate to within a few yards or better in some
locations. Intelligence agencies collect so much data from the app that “you’ll
be able to clone Google’s database” of global searches for directions,
according to a top-secret N.S.A. report from 2007.
“It effectively means that anyone using Google Maps on a
smartphone is working in support of a G.C.H.Q. system,” a secret 2008 report by
the British agency says.
(In December, The Washington Post, citing the Snowden
documents, reported
that the N.S.A. was using metadata to track cellphone locations outside the
United States and was using ad cookies to connect Internet addresses with
physical locations.)
In another example, a secret 20-page British report dated
2012 includes the computer code needed for plucking the profiles generated when
Android users play Angry Birds. The app was created by Rovio Entertainment, of
Finland, and has been downloaded more than a billion times, the company has
said.
Nothing much new here. Decades ago, during the Viet Nam
War, (something I was not an enthusiastic supporter of) the F.B.I. asked
Customs to...
Let's face it - today's smartphones are nothing more than
nicely packaged tracking devices that the user proudly, happily & naively
brings...
The poetic irony (and saving grace?) is that the
government also does not have privacy (from the public). Let the age of
blackmailing each...
Rovio drew public criticism in 2012 when researchers
claimed that the app was tracking users’ locations and gathering other data and
passing it to mobile ad companies. In a statement on its website, Rovio
says that it may collect its users’ personal data, but that it abides by some
restrictions. For example, the statement says, “Rovio does not knowingly
collect personal information from children under 13 years of age.”
No comments:
Post a Comment
Horn-Watch welcomes your comment