Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

US, British Spies Tap Mobile Apps: Report

WASHINGTON – The National Security Agency and its British counterpart are tapping into smart phone applications to scoop up personal data, the New York Times reported Monday.

WASHINGTON – The National Security Agency and its British counterpart are tapping into smart phone applications to scoop up personal data, the New York Times reported Monday.

In the latest revelations from US intelligence leaker Edward Snowden, classified documents show the NSA and Britain’s Government Communications Headquarters are working to snatch location and other sensitive information by exploiting “leaky” smartphone apps such as Google Maps or mobile versions of Facebook, Twitter and other services, the Times wrote.

Previous media leaks have shown that the NSA sifts through phone records, SMS text messages, online games and other Internet traffic in its surveillance of terror suspects and other intelligence “targets.”

Each time someone opens an application, whether to play the popular game Angry Birds or check out Google Maps, the eavesdropping agencies can vacuum up data that reveals the user’s location, age, personal address list and other information, according to the Times.

In one top secret NSA slide from 2010 published by the Times, an agency analyst is clearly excited at the espionage opportunity offered by the smart phone applications.

The slide is titled “Golden Nugget!” and describes a “perfect scenario” in which a “target” uploads a photo to a social media site using a mobile phone.

The scope of the spying on apps is unclear, as well many details of the espionage, the newspaper said.

When asked about the report, the NSA did not deny the account but reiterated, as it has for months, that the agency is not out to spy on ordinary people and is respectful of privacy rights.

Advertisement. Scroll to continue reading.

“The communications of people who are not valid foreign intelligence targets are not of interest to the National Security Agency,” spokeswoman Vanee Vines said in a statement.

“Any implication that NSA’s foreign intelligence collection is focused on the smartphone or social media communications of everyday Americans is not true,” she said.

“We collect only those communications that we are authorized by law to collect for valid foreign intelligence and counterintelligence purposes — regardless of the technical means used by the targets.”

The NSA’s funding for the program has quadrupled since 2007, from $204 million to $767 million, according to a secret Canadian analysis, the Times said.

In a speech this month, President Barack Obama announced changes to NSA surveillance that he said would better protect privacy, including an end to the government’s storage of Americans’ phone records.

But Obama did not touch on the reams of data gathered from apps and other smartphone functions.

Related: Britain’s GCHQ Listening Post in Tune with NSA

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...