Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Report: NSA can access most smartphone data
AP via knoxnews.com ^ | September 8, 2013 | Frank Jordans

Posted on 09/08/2013 6:09:55 AM PDT by John W

BERLIN (AP) — The U.S. National Security Agency is able to crack protective measures on iPhones, BlackBerry and Android devices, giving it access to users' data on all major smartphones, according to a report Sunday in German news weekly Der Spiegel.

The magazine cited internal documents from the NSA and its British counterpart GCHQ in which the agencies describe setting up dedicated teams for each type of phone as part of their effort to gather intelligence on potential threats such as terrorists.

The data obtained this way includes contacts, call lists, SMS traffic, notes and location information, Der Spiegel reported. The documents don't indicate that the NSA is conducting mass surveillance of phone users but rather that these techniques are used to eavesdrop on specific individuals, the magazine said.

(Excerpt) Read more at knoxnews.com ...


TOPICS: Breaking News; News/Current Events
KEYWORDS: 0fartfones; android; androids; benghazi; blackberries; blackberry; fastandfurious; impeachnow; iphone; iphones; irs; kenyanjerk; smartphone; smartphones
Navigation: use the links below to view more comments.
first previous 1-2021-4041-49 next last
To: Vaduz
Looks like the only way to have security is talk face to face only.

You'll need one of these:


21 posted on 09/08/2013 8:01:32 AM PDT by Cementjungle
[ Post Reply | Private Reply | To 16 | View Replies]

To: Cementjungle

LOL who knew how much ahead of their time they were?.


22 posted on 09/08/2013 8:04:51 AM PDT by Vaduz
[ Post Reply | Private Reply | To 21 | View Replies]

To: rarestia; RayChuang88

“Quantum computing is a ways off.”

Oh, i’d guess you’ve missed something ...
http://www.dwavesys.com/en/products-services.html

I’m quite sure someone already ported shores algorithm to this neat kind of hardware. And i’d bet NSA already has quite a bunch of these.


23 posted on 09/08/2013 9:19:47 AM PDT by SgtBilko
[ Post Reply | Private Reply | To 11 | View Replies]

To: SgtBilko

Umm. Saying that something is quantum and it being actually quantum are not the same. Researchers MIT are still working on TRUE quantum computing. They estimate at least ten years for a serious breakthrough.


24 posted on 09/08/2013 9:59:41 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 23 | View Replies]

To: ilgipper

The fact that anyone is surprised the government is spying on us using communication technology is the reason we got to this state.


25 posted on 09/08/2013 10:36:10 AM PDT by VerySadAmerican (".....Barrack, and the horse Mohammed rode in on.")
[ Post Reply | Private Reply | To 2 | View Replies]

To: basil
I?m very happy with my dumb phone. I can no nothing with it but make and receive phone calls.

That's what I thought as well, until I kept hearing a twangy sound every now and again.

As you can see from the photo, I had a state of the art anonymizer system, no labels to track me, or so I thought.

Brought in a security expert to check it out. Turns out I've got FIVE agencies tapping my line.

HEY nSa and the rest of you bastids, stop watching porn on my dime$ !

26 posted on 09/08/2013 11:12:28 AM PDT by Covenantor ("Men are ruled...by liars who refuse them news, and by fools who cannot govern." Chesterton)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Covenantor

LOL!


27 posted on 09/08/2013 11:29:25 AM PDT by basil (2ASisters.org)
[ Post Reply | Private Reply | To 26 | View Replies]

To: John W

.
.

- One very simple method used to hack into a large email service “somewhere” in the USA

add a period before the @ in the email account you want to access (or even edit!!!!)

kenyanjerk.@dingbat.com

Now use ANY password

You are now inside somebody’s email mailto:kenyanjerk@dingbat.com account

Too simple?

Really?

I opened this email account:

autoresponder@dingbat.com

by using:

autoresponder.@dingbat.com

The email site was not amused

- -

What did you do in the Army Daddy?

.
.


28 posted on 09/08/2013 11:31:34 AM PDT by devolve (----- ----- ----- get your hands off my wallet you damned dirty clown ----- ----- -----)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Joe Boucher; DonaldC
not doing too much illegal here for these maggots to see, other than me calling them at best maggots

But as comment #9 stated, they can plant data (child porn usually) and get rid of you that way.

29 posted on 09/08/2013 11:39:05 AM PDT by steve86 (Some things aren't really true but you wouldn't be half surprised if they were.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: rarestia

You know this how?

“The NSA has done nothing intelligent when it comes to encryption.”


30 posted on 09/08/2013 11:52:22 AM PDT by Henry Hnyellar
[ Post Reply | Private Reply | To 11 | View Replies]

To: John W

Start by calling back all 0bama phones. Give the poor a landline and dial up access.

Starve the beast


31 posted on 09/08/2013 11:52:27 AM PDT by Steven Tyler
[ Post Reply | Private Reply | To 1 | View Replies]

To: John W

Old news. Software to do this has been publicly available for about 10 years. Just one example:

http://www.mobistealth.com


32 posted on 09/08/2013 11:55:52 AM PDT by Henry Hnyellar
[ Post Reply | Private Reply | To 1 | View Replies]

To: varyouga

I don’t know how accurate the show, “24” was, but it seems they were able to transcribe simple cell phone conversations.


33 posted on 09/08/2013 11:57:07 AM PDT by MayflowerMadam ("A hyphenated American is not an American at all." Teddy Roosevelt)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Henry Hnyellar

And the NSA was using that to do what the article reports at that time?


34 posted on 09/08/2013 12:09:20 PM PDT by John W (Viva Cristo Rey!)
[ Post Reply | Private Reply | To 32 | View Replies]

To: John W

And anything you have in the cloud, internet connected computer, or purchased with a credit card or check.

In other words, anything that isn’t a Dead Tree Book or bought with cash.


35 posted on 09/08/2013 12:21:06 PM PDT by redgolum ("God is dead" -- Nietzsche. "Nietzsche is dead" -- God.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Henry Hnyellar

Look up Bruce Schneier’s blog. He’s an expert in cryptography and has said so much as the NSA being a govt funded group of digital bullies. They have very little actual mathematical talent at their disposal. It’s all brute force and guessing. Mathematical changes will find a way to further confound the NSA.


36 posted on 09/08/2013 12:26:40 PM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 30 | View Replies]

To: rarestia

At least some scientist found that the dwave systems actually are quantum computers, but can only solve a subset of all quantum solvable problems. So it’s not a universal quantum computer, but still a quantum computer. http://spectrum.ieee.org/tech-talk/computing/hardware/scientists-confirm-dwave-computer-chips-compute-using-quantum-mechanics

I once found an article (just can’t find it anymore when i need it ..) reporting that it would be possible to port a derivate of the shor algorithm with O(n^3) on these machines. On a universal quantum computer shor has only O((log n)^3)


37 posted on 09/08/2013 12:57:39 PM PDT by SgtBilko
[ Post Reply | Private Reply | To 24 | View Replies]

To: SgtBilko

I’ll go back to my previous postulate that while the NSA might have hardware to do it, they don’t have the right brains for it to matter. I’m not a mathematician, I’m an engineer. I know from working with mathematicians that encryption is still secure for a majority of workable solutions. The NSA is hitting low hanging fruit right now. Look at black hat for industry clues. Working for the NSA is to black hat what snitching is to criminals. It might be lucrative, but you put yourself out of the community.


38 posted on 09/08/2013 1:20:17 PM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 37 | View Replies]

To: rarestia

“Complex passwords,” huh? Well, how’s this one?

|F.I.shOOtUinTheBuTTwithA12gaSlugthatmaykz.U.UhDuBBl€@zzHOl€!


39 posted on 09/08/2013 1:25:46 PM PDT by Nita Nupress ( Use your mind, not your emotions. Refuse to be manipulated by Marxists!)
[ Post Reply | Private Reply | To 19 | View Replies]

To: basil

“I beg them to get a life,,,”

Yeah,, except the life they might want is yours. Indeed, national security states that recognize no limits to their power often do “get a life”. Thousands and millions of lives in some cases.


40 posted on 09/08/2013 1:57:55 PM PDT by DesertRhino (I was standing with a rifle, waiting for soviet paratroopers, but communists just ran for office.)
[ Post Reply | Private Reply | To 6 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-49 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson