Skip to comments.Report: NSA can access most smartphone data
Posted on 09/08/2013 6:09:55 AM PDT by John W
BERLIN (AP) The U.S. National Security Agency is able to crack protective measures on iPhones, BlackBerry and Android devices, giving it access to users' data on all major smartphones, according to a report Sunday in German news weekly Der Spiegel.
The magazine cited internal documents from the NSA and its British counterpart GCHQ in which the agencies describe setting up dedicated teams for each type of phone as part of their effort to gather intelligence on potential threats such as terrorists.
The data obtained this way includes contacts, call lists, SMS traffic, notes and location information, Der Spiegel reported. The documents don't indicate that the NSA is conducting mass surveillance of phone users but rather that these techniques are used to eavesdrop on specific individuals, the magazine said.
(Excerpt) Read more at knoxnews.com ...
Sorry, but the fact that this stands and does not have American citizens in an uproar tells me a lot about the state of our nation. This is the single greatest invasion of privacy and invasion of our constitutional rights in history.
I’m very happy with my dumb phone. I can no nothing with it but make and receive phone calls.
Phone calls that are logged and transcribed by machine into text
The NSA has more supercomputer access than anyone else on Earth. If they can break 1024-bit encryption, they could easily track all cellphone calls.
Whatever-—I simply don’t care any more, and if anyone is interested in my phone conversations, I beg them to get a life.
This is probably the main reason, NSA, is building its massive data storage center in Utah. With millions of smart phones in the US and our allies, a lot of storage must be needed.
” The U.S. National Security Agency is able to crack protective measures on iPhones, BlackBerry and Android devices, giving it access to users’ data on all major smartphones, according to a report Sunday in German news weekly Der Spiegel.”
But....they know, nothing will be done to change it.
Webs of cameras being installed “Britain style”, Surveillance drones being deployed across America, DHS grants to local law enforcement to militarize their operations, Every alphabet agency deploying swat units, federal gubbamint attempting to dry up ammunition supplies, LEO raids on Amish dairy farms, home schools, private community gardens, private businesses.
What’cha gonna do? You call, you write, you attend townhalls...what else can a citizen do? They are NOT listening.
And if they can access data, they can plant data.
not doing too much illegal here for these maggots to see, other than me calling them at best maggots
Show me where they claim to be able to do this. The NSA has done nothing intelligent when it comes to encryption. They've seeded back doors into applications and brute-forced very simple private keys, but actually decrypting RSA 1024-bit encryption is not possible with even the most advanced farms of servers. Not yet, anyway. Quantum computing is a ways off. With current hardware, even in the best case scenarios and an estimated 100,000 dual-octo core processor servers with 1TB/s fiber backplanes, it would take over 10 years to crack a properly-implemented encryption algorithm assuming large primes greater than or equal to half of the large primes used below 1024-bit encryption or greater than 75% of large primes.
But the NSA has supposed worked with IBM on special dedicated computer hardware designed specifically for breaking encryption, which means custom made hardware including the processing chips. If that's the case, the NSA is many steps ahead of everyone else in breaking encryption, since by using dedicated hardware the time needed to break the encryption is vastly shorter.
Then there is the "I'm not slaving away to fund this nonsense anymore" mentality .
Obama administration had restrictions on NSA reversed in 2011
The Washington Post ^ | Ellen Nakashima
Posted on Sunday, September 08, 2013 6:59:34 AM by originalbuckeye
The Obama administration secretly won permission from a surveillance court in 2011 to reverse restrictions on the National Security Agencys use of intercepted phone calls and e-mails, permitting the agency to search deliberately for Americans communications in its massive databases, according to interviews with government officials and recently declassified material.
In addition, the court extended the length of time that the NSA is allowed to retain intercepted U.S. communications from five years to six years and more under special circumstances, according to the documents, which include a recently released 2011 opinion by U.S. District Judge John D. Bates, then chief judge of the Foreign Intelligence Surveillance Court.
Techniques are used to eavesdrop on specific individuals.
Looks like the only way to have security is talk face to face only.
Well, i would hope the NSA has this capability, because their Chinese counterparts do. The only thing i wonder when i read this stuff is how often the NSA impersonates the Chinese & Russian state-sponsered hackers to obfuscate their cybertracks.
Once you wrap your head around the intrusion capabilities of these freaks to get past the paranoia stage, it can even be a source of entertainment. We’ve created our own redneck-based language to use in front of phones, computers, etc., and it can get quite hilarious at times. Our latest entertainment involved trying to inject the uniquely illiterate “Honey-BooBoo Family Phonics” into our own vernacular. Lol! Have you ever tried speaking a complete sentence without ever closing your lips to form the words?
Correct. “Plant” in data terms means INSERT, UPDATE, or DELETE. It just depends on who needs what. Easier than you think.
I hedge everything I say with the phrase “properly-implemented.” That means no root CAs with 10+ year expiry, no intermediate CAs with greater than 2 year expiry, no encryption hashes under 1024-bit, symmetric key generation, 45 day password change requirements with >12-character, symalphanumeric (symbols, letters, and numbers) with no repeatability, mandatory two-factor authentication (what I have and what I know), and no local key generation (all keys generated on a non-Internet-connected machine).
I’m not saying that they can’t crack it all, ever, but the amount of effort required to read my personal documents, emails, browser history, and secure transactional databases is such that they will need a really good lead to think I’m even remotely worth the effort.
Essentially, I’m hedging against someone planting incriminating data on any of my devices in the event someone or entity wants to take me down. I’m prepared to die with my complex passwords.
What we need is an open-source smart phone.
All this closed-source equipment is the NSAs playground.
The government has access to the source code for cellphones and smart phones...I’m sure of this. The reason I am sure is that you must have that source code to modify a smart phone to add really strong encryption abilities to the phone. With that level of encryption the phone becomes as secure as the older STU3 secure phones. You see government officials using smart phones all the time, even the president has one. These phones are secure.
They probably forced the companies to hand over the source code :-( With the source they can write patches and put them onto your phone and make it dance to their tune.
You'll need one of these:
LOL who knew how much ahead of their time they were?.
“Quantum computing is a ways off.”
Oh, i’d guess you’ve missed something ...
I’m quite sure someone already ported shores algorithm to this neat kind of hardware. And i’d bet NSA already has quite a bunch of these.
Umm. Saying that something is quantum and it being actually quantum are not the same. Researchers MIT are still working on TRUE quantum computing. They estimate at least ten years for a serious breakthrough.
The fact that anyone is surprised the government is spying on us using communication technology is the reason we got to this state.
That's what I thought as well, until I kept hearing a twangy sound every now and again.
As you can see from the photo, I had a state of the art anonymizer system, no labels to track me, or so I thought.
Brought in a security expert to check it out. Turns out I've got FIVE agencies tapping my line.
HEY nSa and the rest of you bastids, stop watching porn on my dime$ !
- One very simple method used to hack into a large email service “somewhere” in the USA
add a period before the @ in the email account you want to access (or even edit!!!!)
Now use ANY password
You are now inside somebody’s email mailto:firstname.lastname@example.org account
I opened this email account:
The email site was not amused
What did you do in the Army Daddy?
But as comment #9 stated, they can plant data (child porn usually) and get rid of you that way.
You know this how?
“The NSA has done nothing intelligent when it comes to encryption.”
Start by calling back all 0bama phones. Give the poor a landline and dial up access.
Starve the beast
Old news. Software to do this has been publicly available for about 10 years. Just one example:
I don’t know how accurate the show, “24” was, but it seems they were able to transcribe simple cell phone conversations.
And the NSA was using that to do what the article reports at that time?
And anything you have in the cloud, internet connected computer, or purchased with a credit card or check.
In other words, anything that isn’t a Dead Tree Book or bought with cash.
Look up Bruce Schneier’s blog. He’s an expert in cryptography and has said so much as the NSA being a govt funded group of digital bullies. They have very little actual mathematical talent at their disposal. It’s all brute force and guessing. Mathematical changes will find a way to further confound the NSA.
At least some scientist found that the dwave systems actually are quantum computers, but can only solve a subset of all quantum solvable problems. So it’s not a universal quantum computer, but still a quantum computer. http://spectrum.ieee.org/tech-talk/computing/hardware/scientists-confirm-dwave-computer-chips-compute-using-quantum-mechanics
I once found an article (just can’t find it anymore when i need it ..) reporting that it would be possible to port a derivate of the shor algorithm with O(n^3) on these machines. On a universal quantum computer shor has only O((log n)^3)
I’ll go back to my previous postulate that while the NSA might have hardware to do it, they don’t have the right brains for it to matter. I’m not a mathematician, I’m an engineer. I know from working with mathematicians that encryption is still secure for a majority of workable solutions. The NSA is hitting low hanging fruit right now. Look at black hat for industry clues. Working for the NSA is to black hat what snitching is to criminals. It might be lucrative, but you put yourself out of the community.
“Complex passwords,” huh? Well, how’s this one?
“I beg them to get a life,,,”
Yeah,, except the life they might want is yours. Indeed, national security states that recognize no limits to their power often do “get a life”. Thousands and millions of lives in some cases.
If anyone thinks the government isn’t tracking phones calls and internet browsing history, I have some ocean front property in Nebraska to sell them.
The NSA computer = The Beast?
I don’t know anything that I can do about this, so I’ll put it under the heading: LIFE’S A BITCH AND THEN YOU DIE.....
There are only so many things one can worry about....
I would want to be shot in the backside with a 12 ga but that’s certainly a complex password.
Old Ted Kaczinski’s anti-technology rant doesn’t look quite as insane as it used to, does it?
<< I would[n’t?] want to be shot in the backside with a 12 ga but thats certainly a complex password. >>
I forgot to say that wasn’t directed at you. ;-)
Yup. And if the election was held again today, bam-bam would win again.
You are absolutely correct/
About 5 months ago when this punk decided he didn’t want the public touring the White House I wrote a letter to him at the white house and called him a shiftless N word.
Within about thirty minutes my computer was taken over frozen and taken over with a note from the FBI stating that I’d accessed a child porn site ( which is fabrication) and they froze my computer. Scared hell out of me but it was a message sent that they will not put up with dessent.
The “right” words can easily bring SWAT to your door to shoot/harass you, your family or your dog. It's the favorite pastime of those former schoolyard bullies and they ALWAYS get away with it.