Getbig.com: American Bodybuilding, Fitness and Figure

Getbig Main Boards => General Topics => Topic started by: B_B_C on September 09, 2013, 01:05:24 PM

Title: whats the most intelligent phone ?
Post by: B_B_C on September 09, 2013, 01:05:24 PM
http://www.spiegel.de/international/world/how-the-nsa-spies-on-smartphones-including-the-blackberry-a-921161.html (http://www.spiegel.de/international/world/how-the-nsa-spies-on-smartphones-including-the-blackberry-a-921161.html)

The US intelligence agency NSA has been taking advantage of the smartphone boom. It has developed the ability to hack into iPhones, android devices and even the BlackBerry, previously believed to be particularly secure.
 Michael Hayden has an interesting story to tell about the iPhone. He and his wife were in an Apple store in Virginia, Hayden, the former head of the United States National Security Agency (NSA), said at a conference in Washington recently. A salesman approached and raved about the iPhone, saying that there were already "400,000 apps" for the device. Hayden, amused, turned to his wife and quietly asked: "This kid doesn't know who I am, does he? Four-hundred-thousand apps means 400,000 possibilities for attacks."

ANZEIGEHayden was apparently exaggerating only slightly. According to internal NSA documents from the Edward Snowden archive that SPIEGEL has been granted access to, the US intelligence service doesn't just bug embassies and access data from undersea cables to gain information. The NSA is also extremely interested in that new form of communication which has experienced such breathtaking success in recent years: smartphones.
In Germany, more than 50 percent of all mobile phone users now possess a smartphone; in the UK, the share is two-thirds. About 130 million people in the US have such a device. The mini-computers have become personal communication centers, digital assistants and life coaches, and they often know more about their users than most users suspect.

For an agency like the NSA, the data storage units are a goldmine, combining in a single device almost all the information that would interest an intelligence agency: social contacts, details about the user's behavior and location, interests (through search terms, for example), photos and sometimes credit card numbers and passwords.

New Channels
Smartphones, in short, are a wonderful technical innovation, but also a terrific opportunity to spy on people, opening doors that even such a powerful organization as the NSA couldn't look behind until now.
From the standpoint of the computer experts at NSA headquarters in Fort Meade, Maryland, the colossal success of smartphones posed an enormous challenge at first. They opened so many new channels, that it seemed as if the NSA agents wouldn't be able to see the forest for the trees.
According to an internal NSA report from 2010 titled, "Exploring Current Trends, Targets and Techniques," the spread of smartphones was happening "extremely rapidly" -- developments that "certainly complicate traditional target analysis."
The NSA tackled the issue at the same speed with which the devices changed user behavior. According to the documents, it set up task forces for the leading smartphone manufacturers and operating systems. Specialized teams began intensively studying Apple's iPhone and its iOS operating system, as well as Google's Android mobile operating system. Another team worked on ways to attack BlackBerry, which had been seen as an impregnable fortress until then.
The material contains no indications of large-scale spying on smartphone users, and yet the documents leave no doubt that if the intelligence service defines a smartphone as a target, it will find a way to gain access to its information.

Still, it is awkward enough that the NSA is targeting devices made by US companies such as Apple and Google. The BlackBerry case is no less sensitive, since the company is based in Canada, one of the partner countries in the NSA's "Five Eyes" alliance. The members of this select group have agreed not to engage in any spying activities against one another.

Exploiting 'Nomophobia'

In this case, at any rate, the no-spy policy doesn't seem to apply. In the documents relating to smartphones that SPIEGEL was able to view, there are no indications that the companies cooperated with the NSA voluntarily.

When contacted, BlackBerry officials said that it is not the company's job to comment on alleged surveillance by governments. "Our public statements and principles have long underscored that there is no 'back door' pipeline to our platform," the company said in a statement. Google issued a statement claiming: "We have no knowledge of working groups like these and do not provide any government with access to our systems." The NSA did not respond to questions from SPIEGEL by the time the magazine went to print.

In exploiting the smartphone, the intelligence agency takes advantage of the carefree approach many users take to the device. According to one NSA presentation, smartphone users demonstrate "nomophobia," or "no mobile phobia." The only thing many users worry about is losing reception. A detailed NSA presentation titled, "Does your target have a smartphone?" shows how extensive the surveillance methods against users of Apple's popular iPhone already are.

In three consecutive transparencies, the authors of the presentation draw a comparison with "1984," George Orwell's classic novel about a surveillance state, revealing the agency's current view of smartphones and their users. "Who knew in 1984 that this would be Big Brother …" the authors ask, in reference to a photo of Apple co-founder Steve Jobs. And commenting on photos of enthusiastic Apple customers and iPhone users, the NSA writes: "… and the zombies would be paying customers?"

In fact, given the targets it defines, the NSA can select a broad spectrum of user data from Apple's most lucrative product, at least if one is to believe the agency's account.

The results the intelligence agency documents on the basis of several examples are impressive. They include an image of the son of a former defense secretary with his arm around a young woman, a photo he took with his iPhone. A series of images depicts young men and women in crisis zones, including an armed man in the mountains of Afghanistan, an Afghan with friends and a suspect in Thailand.

No Access Necessary

All the images were apparently taken with smartphones. A photo taken in January 2012 is especially risqué: It shows a former senior government official of a foreign country who, according to the NSA, is relaxing on his couch in front of a TV set and taking pictures of himself -- with his iPhone. To protect the person's privacy, SPIEGEL has chosen not to reveal his name or any other details.

The access to such material varies, but much of it passes through an NSA department responsible for customized surveillance operations against high-interest targets. One of the US agents' tools is the use of backup files established by smartphones. According to one NSA document, these files contain the kind of information that is of particular interest to analysts, such as lists of contacts, call logs and drafts of text messages. To sort out such data, the analysts don't even require access to the iPhone itself, the document indicates. The department merely needs to infiltrate the target's computer, with which the smartphone is synchronized, in advance. Under the heading "iPhone capability," the NSA specialists list the kinds of data they can analyze in these cases. The document notes that there are small NSA programs, known as "scripts," that can perform surveillance on 38 different features of the iPhone 3 and 4 operating systems. They include the mapping feature, voicemail and photos, as well as the Google Earth, Facebook and Yahoo Messenger applications.

The NSA analysts are especially enthusiastic about the geolocation data stored in smartphones and many of their apps, data that enables them to determine a user's whereabouts at a given time.

According to one presentation, it was even possible to track a person's whereabouts over extended periods of time, until Apple eliminated this "error" with version 4.3.3 of its mobile operating system and restricted the memory to seven days.

Still, the "location services" used by many iPhone apps, ranging from the camera to maps to Facebook, are useful to the NSA. In the US intelligence documents, the analysts note that the "convenience" for users ensures that most readily consent when applications ask them whether they can use their current location.

Cracking the Blackberry

The NSA and its partner agency, Britain's GCHQ, focused with similar intensity on another electronic toy: the BlackBerry.

This is particularly interesting given that the Canadian company's product is marketed to a specific target group: companies that buy the devices for their employees. In fact, the device, with its small keypad, is seen as more of a manager's tool than something suspected terrorists would use to discuss potential attacks.

The NSA also shares this assessment, noting that Nokia devices were long favored in extremist forums, with Apple following in third place and BlackBerry ranking a distant ninth.

According to several documents, the NSA spent years trying to crack BlackBerry communications, which enjoy a high degree of protection, and maintains a special "BlackBerry Working Group" specifically for this purpose. But the industry's rapid development cycles keep the specialists assigned to the group on their toes, as a GCHQ document marked "UK Secret" indicates.

According to the document, problems with the processing of BlackBerry data were suddenly encountered in May and June 2009, problems the agents attributed to a data compression method newly introduced by the manufacturer.

In July and August, the GCHQ team assigned to the case discovered that BlackBerry had previously acquired a smaller company. At the same time, the intelligence agency had begun studying the new BlackBerry code. In March 2010, the problem was finally solved, according to the internal account. "Champagne!" the analysts remarked, patting themselves on the back.

Security Concerns

The internal documents indicate that this was not the only success against Blackberry, a company that markets its devices as being surveillance-proof -- and one that has recently lost substantial market share due to strategic mistakes, as the NSA also notes with interest. According to one of the internal documents, in a section marked "Trends," the share of US government employees who used BlackBerry devices fell from 77 to less than 50 percent between August 2009 and May 2012.

The NSA concludes that ordinary consumer devices are increasingly replacing the only certified government smartphone, leading the analysts to voice their concerns about security. They apparently assume that they are the only agents worldwide capable of secretly tapping into BlackBerrys.

As far back as 2009, the NSA specialists noted that they could "see and read" text messages sent from BlackBerrys, and could also "collect and process BIS mails." BIS stands for BlackBerry Internet Service, which operates outside corporate networks, and which, in contrast to the data passing through internal BlackBerry services (BES), only compresses but does not encrypt data.

But even this highest level of security would seem not to be immune to NSA access, at least according to a presentation titled, "Your target is using a BlackBerry? Now what?" The presentation notes that the acquisition of encrypted BES communications requires a "sustained" operation by the NSA's Tailored Access Operation department in order to "fully prosecute your target." An email from a Mexican government agency, which appears in the presentation under the title "BES collection," reveals that this is applied successfully in practice.

Relying on BlackBerry

In June 2012, the documents show that the NSA was able to expand its arsenal against BlackBerry. Now they were also listing voice telephony among their "current capabilities," namely the two conventional mobile wireless standards in Europe and the United States, "GSM" and "CDMA."

But the internal group of experts, who had come together for a "BlackBerry round table" discussion, was still not satisfied. According to the documents, the question of which "additional enrichments would you like to see" with regards to BlackBerry was also discussed.


Even if everything in the materials viewed by SPIEGEL suggests the targeted use of these NSA surveillance options, the companies involved are not likely to be impressed.

BlackBerry is faltering and is currently open to takeover bids. Security remains one of its top selling points with its most recent models, such as the Q10. If it now becomes apparent that the NSA is capable of spying on both Apple and BlackBerry devices in a targeted manner, it could have far-reaching consequences.
Those consequences extend to the German government. Not long ago, the government in Berlin awarded a major contract for secure mobile communications within federal agencies. The winner was BlackBerry.

 
Title: Re: whats the most intelligent phone ?
Post by: Jack T. Cross on September 09, 2013, 02:57:29 PM
What was the basis for obtaining the pictures (particularly those that didn't involve "suspects")?
Title: Re: whats the most intelligent phone ?
Post by: Jack T. Cross on September 09, 2013, 03:04:44 PM
Tough to see how this won't lead to political subversion.
Title: Re: whats the most intelligent phone ?
Post by: B_B_C on September 10, 2013, 04:26:13 AM
Tough to see how this won't lead to political subversion.

this is a german article and the Germans are taking the issue much more seriously than the US
Judging by the reaction in the USA to such leaks the USA is more interested in catching and punishing the wistleblowers than dealing with the possibly illegal and possibly immoral acts of its security systems.
One should always be careful of believing ones own rhetoric 
Title: Re: whats the most intelligent phone ?
Post by: Jack T. Cross on September 10, 2013, 07:21:29 PM
this is a german article and the Germans are taking the issue much more seriously than the US
Judging by the reaction in the USA to such leaks the USA is more interested in catching and punishing the wistleblowers than dealing with the possibly illegal and possibly immoral acts of its security systems.
One should always be careful of believing ones own rhetoric  

Der Spiegel needs to call everything out, right now. Make an editorial like nothing that's ever come before it.
Title: Re: whats the most intelligent phone ?
Post by: Gonuclear on September 10, 2013, 07:35:30 PM
The most intelligent phone was your iPhone, before you stomped it flat.

Why did you destroy it?  Worried that Siri would soon outpace you and grab your consciousness and personhood?

No need to worry.  I don't think it's painful.  It may already have happened.
Title: Re: whats the most intelligent phone ?
Post by: B_B_C on September 11, 2013, 01:34:35 AM
Der Spiegel needs to call everything out, right now. Make an editorial like nothing that's ever come before it.

calling upon a german publication to admonish the loss of US citizen rights ?  Is there no press freedom with a backbone in the USA?
Title: Re: whats the most intelligent phone ?
Post by: Jack T. Cross on September 11, 2013, 05:57:19 AM
calling upon a german publication to admonish the loss of US citizen rights ?  Is there no press freedom with a backbone in the USA?

To begin with, I'm sure you understand that it isn't just U.S. citizens' rights at stake. In fact, the underlying motivating force is global in every respect.

By the way, NO, there aren't any backbones to be found. Media ownership has been reduced to just a very few entities, and they happen to look exactly like one another. It provides an elitist narrative, period.
Title: Re: whats the most intelligent phone ?
Post by: Jack T. Cross on September 11, 2013, 06:02:32 AM
...btw, always find it amazing to see people treat these few entities as though they somehow have competing interests against one another. It is unbelievable to witness.
Title: Re: whats the most intelligent phone ?
Post by: Jack T. Cross on September 11, 2013, 06:05:18 AM
They stir shit, to keep the people opposed to one another.
Title: Re: whats the most intelligent phone ?
Post by: Jack T. Cross on September 11, 2013, 06:11:57 AM
No attempts at problem-solving from them. None. Everything is about perpetuating problems, and keeping people in a problematic state.
Title: Re: whats the most intelligent phone ?
Post by: B_B_C on September 11, 2013, 06:15:48 AM
To begin with, I'm sure you understand that it isn't just U.S. citizens' rights at stake. In fact, the underlying motivating force is global in every respect.
You are right.  I high lighted the US part as it illustrates the dangers of believing ones own (national religion  myth) rhetoric without testing it against practice. No country or society has a monoply on shortsightedness but as the current large economic and military power the USA is not always able to see or correct the inherent dangers. Knowing more is not knowing better. Power is not always strength and might is not always right
Title: Re: whats the most intelligent phone ?
Post by: Jack T. Cross on September 11, 2013, 06:27:42 AM
You are right.  I high lighted the US part as it illustrates the dangers of believing ones own (national religion  myth) rhetoric without testing it against practice. No country or society has a monoply on shortsightedness but as the current large economic and military power the USA is not always able to see or correct the inherent dangers. Knowing more is not knowing better. Power is not always strength and might is not always right

I hear you, bro. But looking around, now, I wonder how many continue to believe. Really. Because when something is built upon such a flimsy platform, unable to stand to scrutiny in any way due to its overwhelming falsity, even the thickest skulls begin to absorb the reality.

So instead, they'll shrug their shoulders and say "oh well".
Title: Re: whats the most intelligent phone ?
Post by: Jack T. Cross on September 11, 2013, 06:29:41 AM
...and by the way, I would strenuously say that these things are taking place separately from the will of the people.
Title: Re: whats the most intelligent phone ?
Post by: B_B_C on September 11, 2013, 07:11:58 AM
...and by the way, I would strenuously say that these things are taking place separately from the will of the people.
possibly, I dont know

at the fair you sell your own cow
Title: Re: whats the most intelligent phone ?
Post by: Jack T. Cross on September 11, 2013, 08:07:12 AM
possibly, I dont know

at the fair you sell your own cow

Believe me, I understand 100% where you're coming from. No denying, whatsoever.

To try to describe it, myself, I'd say the separation of the action versus the will, is the problem at a glance. Ever-fewer people deciding action for ever-greater masses. Growth in this divide is accelerating so quickly, and there's only one thing that fuels it: INFORMATION. It is a decidedly brutal advantage specifically derived from the undue, unwarranted collection of private information.
Title: Re: whats the most intelligent phone ?
Post by: Jack T. Cross on September 11, 2013, 08:28:47 AM
...some small entity, using the advantage of awareness to forcefully and deceptively craft a political environment that is in complete opposition to the benefit of the people, ultimately closing all doors for potential correction, is the most immediate problem to arise from unwarranted collection of data.
Title: Re: whats the most intelligent phone ?
Post by: Jack T. Cross on September 11, 2013, 08:35:08 AM
I urge everyone: DO NOT FEED THIS BEAST.
Title: Re: whats the most intelligent phone ?
Post by: B_B_C on September 11, 2013, 02:28:17 PM
http://www.theguardian.com/world/2013/sep/11/nsa-americans-personal-data-israel-documents (http://www.theguardian.com/world/2013/sep/11/nsa-americans-personal-data-israel-documents)

The National Security Agency routinely shares raw intelligence data with Israel without first sifting it to remove information about US citizens, a top-secret document provided to the Guardian by whistleblower Edward Snowden reveals.

Details of the intelligence-sharing agreement are laid out in a memorandum of understanding between the NSA and its Israeli counterpart that shows the US government handed over intercepted communications likely to contain phone calls and emails of American citizens. The agreement places no legally binding limits on the use of the data by the Israelis.

The disclosure that the NSA agreed to provide raw intelligence data to a foreign country contrasts with assurances from the Obama administration that there are rigorous safeguards to protect the privacy of US citizens caught in the dragnet. The intelligence community calls this process "minimization", but the memorandum makes clear that the information shared with the Israelis would be in its pre-minimized state.

The deal was reached in principle in March 2009, according to the undated memorandum, which lays out the ground rules for the intelligence sharing.

The five-page memorandum, termed an agreement between the US and Israeli intelligence agencies "pertaining to the protection of US persons", repeatedly stresses the constitutional rights of Americans to privacy and the need for Israeli intelligence staff to respect these rights.

But this is undermined by the disclosure that Israel is allowed to receive "raw Sigint" – signal intelligence. The memorandum says: "Raw Sigint includes, but is not limited to, unevaluated and unminimized transcripts, gists, facsimiles, telex, voice and Digital Network Intelligence metadata and content."

According to the agreement, the intelligence being shared would not be filtered in advance by NSA analysts to remove US communications. "NSA routinely sends ISNU [the Israeli Sigint National Unit] minimized and unminimized raw collection", it says.

Although the memorandum is explicit in saying the material had to be handled in accordance with US law, and that the Israelis agreed not to deliberately target Americans identified in the data, these rules are not backed up by legal obligations.

"This agreement is not intended to create any legally enforceable rights and shall not be construed to be either an international agreement or a legally binding instrument according to international law," the document says.

In a statement to the Guardian, an NSA spokesperson did not deny that personal data about Americans was included in raw intelligence data shared with the Israelis. But the agency insisted that the shared intelligence complied with all rules governing privacy.

"Any US person information that is acquired as a result of NSA's surveillance activities is handled under procedures that are designed to protect privacy rights," the spokesperson said.

The NSA declined to answer specific questions about the agreement, including whether permission had been sought from the Foreign Intelligence Surveillance (Fisa) court for handing over such material.

The memorandum of understanding, which the Guardian is publishing in full, allows Israel to retain "any files containing the identities of US persons" for up to a year. The agreement requests only that the Israelis should consult the NSA's special liaison adviser when such data is found.

Notably, a much stricter rule was set for US government communications found in the raw intelligence. The Israelis were required to "destroy upon recognition" any communication "that is either to or from an official of the US government". Such communications included those of "officials of the executive branch (including the White House, cabinet departments, and independent agencies), the US House of Representatives and Senate (member and staff) and the US federal court system (including, but not limited to, the supreme court)".

It is not clear whether any communications involving members of US Congress or the federal courts have been included in the raw data provided by the NSA, nor is it clear how or why the NSA would be in possession of such communications. In 2009, however, the New York Times reported on "the agency's attempt to wiretap a member of Congress, without court approval, on an overseas trip".

The NSA is required by law to target only non-US persons without an individual warrant, but it can collect the content and metadata of Americans' emails and calls without a warrant when such communication is with a foreign target. US persons are defined in surveillance legislation as US citizens, permanent residents and anyone located on US soil at the time of the interception, unless it has been positively established that they are not a citizen or permanent resident.

Moreover, with much of the world's internet traffic passing through US networks, large numbers of purely domestic communications also get scooped up incidentally by the agency's surveillance programs.

The document mentions only one check carried out by the NSA on the raw intelligence, saying the agency will "regularly review a sample of files transferred to ISNU to validate the absence of US persons' identities". It also requests that the Israelis limit access only to personnel with a "strict need to know".

Israeli intelligence is allowed "to disseminate foreign intelligence information concerning US persons derived from raw Sigint by NSA" on condition that it does so "in a manner that does not identify the US person". The agreement also allows Israel to release US person identities to "outside parties, including all INSU customers" with the NSA's written permission.

Although Israel is one of America's closest allies, it is not one of the inner core of countries involved in surveillance sharing with the US - Britain, Australia, Canada and New Zealand. This group is collectively known as Five Eyes.

The relationship between the US and Israel has been strained at times, both diplomatically and in terms of intelligence. In the top-secret 2013 intelligence community budget request, details of which were disclosed by the Washington Post, Israel is identified alongside Iran and China as a target for US cyberattacks.

While NSA documents tout the mutually beneficial relationship of Sigint sharing, another report, marked top secret and dated September 2007, states that the relationship, while central to US strategy, has become overwhelmingly one-sided in favor of Israel.

"Balancing the Sigint exchange equally between US and Israeli needs has been a constant challenge," states the report, titled 'History of the US – Israel Sigint Relationship, Post-1992'. "In the last decade, it arguably tilted heavily in favor of Israeli security concerns. 9/11 came, and went, with NSA's only true Third Party [counter-terrorism] relationship being driven almost totally by the needs of the partner."

.......
,,,,,,,
Title: Re: whats the most intelligent phone ?
Post by: Jack T. Cross on September 13, 2013, 10:58:53 AM
^I have no doubt, this is only the slightest glimpse of what's taking place. Put to further condition, if anything.