Wednesday, September 18, 2013

U.S. intelligence methods to spy on your phone

In pursuit continued toward information , put U.S. intelligence mobile phones and modern communications as one of the main objectives of the work, especially with the boom witnessed by the world in the use of smartphones « Smartphone » , and managed and the National Security Agency, the U.S. , according to confidential documents that leaked « Snowden » , the development of techniques and tools and mechanisms for granted the ability to penetrate these devices of various types , from « iPhone » hardware, operating system « Android » and even devices « BlackBerry » , which girl reputation on the security of the device and communications passing through its network is too impenetrable .

Magazine « Der Spiegel » German was able to see many of the confidential documents and reports, which have been leaked from the National Security Agency, the U.S. NSA monitored in this investigation how successful agency in penetrating devices modern mobile phones and what information you get from this breakthrough at large.

In a conference held in Washington recently , Cut « Michael Hayden » Chairman and the National Security Agency , former U.S. to attend a funny story about Bmobail « iPhone », where he and his wife in one of the shops « Apple » state of Virginia , approached them a vendor for the promotion of the device , saying that there are more than 400 thousand application to work on the device , listen ' Hayden ' and then turned around , saying to his wife in a low voice : ' this young man did not know who I am .. Is not it? 400 thousand application means 400 thousand chance of attack and penetration .

In fact, did not comment « Hayden » exaggerated greatly , According to the papers of Interior , told U.S. National Security , obtained by « Edward Snowden » and managed the magazine « Der Spiegel » access them , the United States Agency not only penetrate systems embassies and data , which are traded via submarine cables , but they are also very interested in new forms of communication , which exploded on a large scale in recent years via smartphones .

In Germany, for example , currently has more than 50 % of the users of mobile devices « smart » , and in the United Kingdom , the ratio of up to two-thirds of the total users, and possesses some 130 million people of these devices in the United States , as turning the computer minivan to the center communications and personal assistant, these devices also find out information about its users much more than what people think of the user.

For an institution like NSA , the data volumes are simply gold mines , which meets all the information you need intelligence , almost, in a single device : lists of social communication to information about the user's behavior and its geographical location and interests Personal ( through Keywords for example ), photos, and sometimes credit cards numbers and passwords.

Technology experts at the headquarters of the agency NSA in the « Fort Meade » state « Maryland » considered at the outset that the global success overwhelming for smartphones represents an enormous challenge and very difficult to get information , where to open this up many new channels of communication and that I think IAEA experts that they could not at all to explore their way through this maze .

According to an internal report issued in 2010 and titled « explore trends and objectives and current techniques » the spread of smartphones is happening « rapidly » and developments « complexity of the analysis of information targets traditional » , but the National Security Agency has dealt with this issue as quickly as it has changed user behavior with these devices .

According to the document of the Interior, has been the formation of a task force to deal with production companies and operating systems, the famous , and the teams started specializing in the study extensive for a « iPhone » and operating system iOS with the study of operating systems Android from « Google », and another team's work on ways to penetrate ' Blackberry ' , which appeared in front of them fortified castle until that time.

However , the information that was leaked from within the agency does not refer to operations of espionage and large-scale users of mobile devices smart, but at the same time, the documents clearly confirm that the agency if you select a smartphone as a target 'll find a way to access the information comprising the this device .

Exciting thing is that the agency NSA has targeted devices and systems manufactured by American companies such as « Apple and Google » , but the case « BlackBerry » , which is manufactured by a Canadian company not less sensitivity , because Canada is one of the countries of the Alliance « Eyes five » , which signed an agreement not to engaging in any espionage activities against one another .

The documents reveal , which was leaked that this agreement has been completely ignored , where there is no evidence on the cooperation of the company « Blackberry is on a voluntary basis with the intelligence agency .

And reveal the leaked documents , the agency relies primarily on « negligence » , which handles its user with the phone, where the user does not deal seriously with any concerns about the use of the phone, and the biggest concerns user is mostly lost contact with the company to provide the service , and review a detailed report carries title « Does the target have a smart phone ? » intensive espionage operations , carried out by the agency against a users ' iPhone ' His great popularity and proliferation .

In this report, the review by comparison with the novel « 1984» classic of the writer George Orwell , which revolves around the state practiced espionage wide , revealing at the same time for the current view , adopted by the National Security Agency, the U.S. on smart phones and users , and wondering author of the report : « Who knew in 1984 that this person will be the older brother .... it refers to images of ' Steve Jobs ' founder ' Apple ' .

The results reviewed by the National Security Agency examples of penetrating successful it is surprising , since the training image to the son of defense minister a former U.S. He put his arm around the waist woman , an image taken Abjahazh « iPhone » , and a host other images reviewed by younger and girls in disaster areas, and include men militants in the mountains of Afghanistan , and an Afghan man suspected with his friends in Thailand.

No comments:

Post a Comment