Feeds

Fancy a little kinky sex? GCHQ+NSA will know - thanks to ANGRY BIRDS

Evil spooks slurped EVERYTHING about your life from app's phone-home data

The Power of One eBook: Top reasons to choose HP BladeSystem

Some of the world's most popular smartphone applications are telling British and American intelligence agencies everything about you – from your location to your politics or whether you're part of the swinging set.

That's according to classified documents leaked by NSA whistleblower Edward Snowden.

The dossier, published today by ProPublica and The New York Times, show the NSA and its Brit counterpart GCHQ were working together on exploiting smartphones in 2007, the same year as the first iPhone launched. The NSA nearly quadrupled its budgets for such monitoring from $204m to $767m that year.

A top-secret report compiled by the NSA shortly after that time boasted the agency had collected so much information from phones running Google's mapping applications that "you'll be able to clone Google's database." In 2008 British intelligence reported "anyone using Google Maps on a smartphone is working in support of a GCHQ system."

Poorly secured mobile apps have proved to be a "golden nugget," according to a May 2010 NSA presentation: harvesting sensitive data sent over public networks by applications is not a problem, but it was a little trickier to tag the intercepted information in the agency's XKeyscore database so that analysts could easily pull up a person's records. In the same year a British analyst described the development of smartphone slurping as a "mobile surge," comparing it to the surge of US and allied troops into Iraq and Afghanistan.

A 2012 British intelligence document states that the immensely popular Angry Birds game from Finnish developer Rovio had become a useful source thanks to advertising code added by US firm Millennial Media.

Millennial's tracking software generates a personal record for each user that can store information from their political affiliation and sexual orientation to whether their marital state was single, married, divorced, engaged or "swinger." This information is used to target in-app ads more effectively, and can be collected by UK and US intelligence agencies for analysis, we're told.

The documents don't suggest that NSA and GCHQ staffers are directly hacking mobile applications. Instead it's made clear the snoopers are simply skimming and decoding sensitive data the apps collect and transmit back to their developers. One report noted that anyone updating Android on a device will leak about 500 slurpable records describing how the gadget was used by its owner.

“NSA does not profile everyday Americans as it carries out its foreign intelligence mission,” the agency said in a statement. “Because some data of US persons may at times be incidentally collected in NSA's lawful foreign intelligence mission, privacy protections for US persons exist across the entire process,” with similar protections for “innocent foreign citizens.”

GCHQ declined to comment on the allegations, but said its activities were compliant with today's UK law. Google and Millennial Media haven’t commented as yet.

Your tinfoil hat is useless – your browser lets spies into your mind

Other Snowden-sourced information published by NBC News today revealed [PDF] that in 2012 GCHQ developed technology, code named Squeaky Dolphin, to spy on people en masse as they used social networks and other big-name websites.

The British tapped into internet data cables running though the UK and scooped out Facebook, Twitter, YouTube, and Blogger visits to see what's trending online and where hotspots of interest spring up around the world in various topics.

The Human Science Operations Cell also compiled data on what a particular browser choice told them about a user's behavior. Internet Explorer users scored lowest in being open to new experiences but highest in "agreeableness" and "conscientiousness," while Firefox users are the most neurotic, apparently.

But Snowden, who gave his first TV interview for German network ARD on Sunday, claims that the NSA wasn't above hacking business systems if it felt the information would further US interests. He said that the German manufacturer Siemens was a particular favorite among spies in this regard, and that non-key German government targets may also have been infiltrated.

"What I can say is that we know that [German Chancellor] Angela Merkel was monitored by the NSA. But the question is how logical is it that she's the only one who was monitored, how likely is it that she was the German person the NSA was watching?" he said, Reuters reports.

"I'd say that it's not very likely that anyone who was watching the German government was only watching Merkel and not her advisers nor other government officials nor ministers, heads of industries or even local government officials."

Snowden said he no longer had any NSA documents himself, having passed them all on to journalists around the world. Despite death threats from certain excitable US intelligence operatives, Snowden said he was unconcerned for his safety.

"I'm still alive and don't lose sleep for what I did because it was the right thing to do," he added. ®

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.