Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Report: NSA can access most smartphone data
AP via knoxnews.com ^ | September 8, 2013 | Frank Jordans

Posted on 09/08/2013 6:09:55 AM PDT by John W

BERLIN (AP) — The U.S. National Security Agency is able to crack protective measures on iPhones, BlackBerry and Android devices, giving it access to users' data on all major smartphones, according to a report Sunday in German news weekly Der Spiegel.

The magazine cited internal documents from the NSA and its British counterpart GCHQ in which the agencies describe setting up dedicated teams for each type of phone as part of their effort to gather intelligence on potential threats such as terrorists.

The data obtained this way includes contacts, call lists, SMS traffic, notes and location information, Der Spiegel reported. The documents don't indicate that the NSA is conducting mass surveillance of phone users but rather that these techniques are used to eavesdrop on specific individuals, the magazine said.

(Excerpt) Read more at knoxnews.com ...


TOPICS: Breaking News; News/Current Events
KEYWORDS: 0fartfones; android; androids; benghazi; blackberries; blackberry; fastandfurious; impeachnow; iphone; iphones; irs; kenyanjerk; smartphone; smartphones

1 posted on 09/08/2013 6:09:55 AM PDT by John W
[ Post Reply | Private Reply | View Replies]

To: John W

Sorry, but the fact that this stands and does not have American citizens in an uproar tells me a lot about the state of our nation. This is the single greatest invasion of privacy and invasion of our constitutional rights in history.


2 posted on 09/08/2013 6:21:13 AM PDT by ilgipper (Obama is proving that very bad ideas can be wrapped up in pretty words)
[ Post Reply | Private Reply | To 1 | View Replies]

To: John W

I’m very happy with my dumb phone. I can no nothing with it but make and receive phone calls.


3 posted on 09/08/2013 6:21:36 AM PDT by basil (2ASisters.org)
[ Post Reply | Private Reply | To 1 | View Replies]

To: basil

Phone calls that are logged and transcribed by machine into text


4 posted on 09/08/2013 6:24:12 AM PDT by varyouga
[ Post Reply | Private Reply | To 3 | View Replies]

To: John W

The NSA has more supercomputer access than anyone else on Earth. If they can break 1024-bit encryption, they could easily track all cellphone calls.


5 posted on 09/08/2013 6:26:30 AM PDT by RayChuang88 (FairTax: America's economic cure)
[ Post Reply | Private Reply | To 1 | View Replies]

To: varyouga

Whatever-—I simply don’t care any more, and if anyone is interested in my phone conversations, I beg them to get a life.


6 posted on 09/08/2013 6:29:23 AM PDT by basil (2ASisters.org)
[ Post Reply | Private Reply | To 4 | View Replies]

To: John W; Travis McGee; Ernest_at_the_Beach; ASA Vet; BIGLOOK

This is probably the main reason, NSA, is building its massive data storage center in Utah. With millions of smart phones in the US and our allies, a lot of storage must be needed.

” The U.S. National Security Agency is able to crack protective measures on iPhones, BlackBerry and Android devices, giving it access to users’ data on all major smartphones, according to a report Sunday in German news weekly Der Spiegel.”


7 posted on 09/08/2013 6:33:22 AM PDT by Grampa Dave ( When insane/feral Islamics are killing each other, stand back and let Allah sort them out!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ilgipper
Americans ARE in an uproar. They are in an uproar in regards to the IRS targeting as well.

But....they know, nothing will be done to change it.

Webs of cameras being installed “Britain style”, Surveillance drones being deployed across America, DHS grants to local law enforcement to militarize their operations, Every alphabet agency deploying swat units, federal gubbamint attempting to dry up ammunition supplies, LEO raids on Amish dairy farms, home schools, private community gardens, private businesses.

What’cha gonna do? You call, you write, you attend townhalls...what else can a citizen do? They are NOT listening.

8 posted on 09/08/2013 6:42:27 AM PDT by servantboy777
[ Post Reply | Private Reply | To 2 | View Replies]

To: John W

And if they can access data, they can plant data.


9 posted on 09/08/2013 6:57:28 AM PDT by DonaldC (A nation cannot stand in the absence of religious principle.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: John W

not doing too much illegal here for these maggots to see, other than me calling them at best maggots


10 posted on 09/08/2013 7:05:15 AM PDT by Joe Boucher ((FUBO) ( Hey Rubio, eat pooh pal))
[ Post Reply | Private Reply | To 1 | View Replies]

To: RayChuang88
If they can break 1024-bit encryption

Show me where they claim to be able to do this. The NSA has done nothing intelligent when it comes to encryption. They've seeded back doors into applications and brute-forced very simple private keys, but actually decrypting RSA 1024-bit encryption is not possible with even the most advanced farms of servers. Not yet, anyway. Quantum computing is a ways off. With current hardware, even in the best case scenarios and an estimated 100,000 dual-octo core processor servers with 1TB/s fiber backplanes, it would take over 10 years to crack a properly-implemented encryption algorithm assuming large primes greater than or equal to half of the large primes used below 1024-bit encryption or greater than 75% of large primes.

11 posted on 09/08/2013 7:09:31 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: servantboy777
You call, you write, you attend townhalls...what else can a citizen do? They are NOT listening.

Chances are that by now, the vast majority of people have heard about NSA spying. But, to the majority, it's not their problem, since, they believe that, they have nothing to hide or useful to the government.

In addition, the people running the government and making the decisions, were put into office by a coalition of the clueless and the government dependents, which in reality, is more than 50% of the population. When 43-47% of the population doesn't pay federal taxes, and when most of them need some sort of government assistance, they will be voting for the people who can continue giving them things from government. Thus, the country is doomed. The NSA spying and EPA abuses and FBI targeting of reporters and the issue of Benghazi, is all foreign to most of the people who seek big government to take care of them, and they couldn't care less about any of those issues. They care more about keeping their benefits and freebies flowing their way.

It's the "what's in it for me" mentality. They can't relate to the issues, as long as those issues don't take away their freebies and benefits.
12 posted on 09/08/2013 7:21:32 AM PDT by adorno (Y)
[ Post Reply | Private Reply | To 8 | View Replies]

To: rarestia
You assertion may be true if you're talking standard commercially available hardware used on most supercomputer systems.

But the NSA has supposed worked with IBM on special dedicated computer hardware designed specifically for breaking encryption, which means custom made hardware including the processing chips. If that's the case, the NSA is many steps ahead of everyone else in breaking encryption, since by using dedicated hardware the time needed to break the encryption is vastly shorter.

13 posted on 09/08/2013 7:23:51 AM PDT by RayChuang88 (FairTax: America's economic cure)
[ Post Reply | Private Reply | To 11 | View Replies]

To: adorno
"It's the "what's in it for me" mentality."

Then there is the "I'm not slaving away to fund this nonsense anymore" mentality .

14 posted on 09/08/2013 7:26:21 AM PDT by Paladin2
[ Post Reply | Private Reply | To 12 | View Replies]

To: John W

http://www.freerepublic.com/focus/f-news/3064092/posts

Obama administration had restrictions on NSA reversed in 2011
The Washington Post ^ | Ellen Nakashima

Posted on Sunday, September 08, 2013 6:59:34 AM by originalbuckeye

The Obama administration secretly won permission from a surveillance court in 2011 to reverse restrictions on the National Security Agency’s use of intercepted phone calls and e-mails, permitting the agency to search deliberately for Americans’ communications in its massive databases, according to interviews with government officials and recently declassified material.

In addition, the court extended the length of time that the NSA is allowed to retain intercepted U.S. communications from five years to six years — and more under special circumstances, according to the documents, which include a recently released 2011 opinion by U.S. District Judge John D. Bates, then chief judge of the Foreign Intelligence Surveillance Court.


15 posted on 09/08/2013 7:27:54 AM PDT by Grampa Dave ( When insane/feral Islamics are killing each other, stand back and let Allah sort them out!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: John W

Techniques are used to eavesdrop on specific individuals.
Looks like the only way to have security is talk face to face only.


16 posted on 09/08/2013 7:33:21 AM PDT by Vaduz
[ Post Reply | Private Reply | To 1 | View Replies]

To: John W; All

Well, i would hope the NSA has this capability, because their Chinese counterparts do. The only thing i wonder when i read this stuff is how often the NSA impersonates the Chinese & Russian state-sponsered hackers to obfuscate their cybertracks.

Once you wrap your head around the intrusion capabilities of these freaks to get past the paranoia stage, it can even be a source of entertainment. We’ve created our own redneck-based language to use in front of phones, computers, etc., and it can get quite hilarious at times. Our latest entertainment involved trying to inject the uniquely illiterate “Honey-BooBoo Family Phonics” into our own vernacular. Lol! Have you ever tried speaking a complete sentence without ever closing your lips to form the words?


17 posted on 09/08/2013 7:34:16 AM PDT by Nita Nupress ( Use your mind, not your emotions. Refuse to be manipulated by Marxists!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: DonaldC

Correct. “Plant” in data terms means INSERT, UPDATE, or DELETE. It just depends on who needs what. Easier than you think.


18 posted on 09/08/2013 7:47:59 AM PDT by kdot
[ Post Reply | Private Reply | To 9 | View Replies]

To: RayChuang88

I hedge everything I say with the phrase “properly-implemented.” That means no root CAs with 10+ year expiry, no intermediate CAs with greater than 2 year expiry, no encryption hashes under 1024-bit, symmetric key generation, 45 day password change requirements with >12-character, symalphanumeric (symbols, letters, and numbers) with no repeatability, mandatory two-factor authentication (what I have and what I know), and no local key generation (all keys generated on a non-Internet-connected machine).

I’m not saying that they can’t crack it all, ever, but the amount of effort required to read my personal documents, emails, browser history, and secure transactional databases is such that they will need a really good lead to think I’m even remotely worth the effort.

Essentially, I’m hedging against someone planting incriminating data on any of my devices in the event someone or entity wants to take me down. I’m prepared to die with my complex passwords.


19 posted on 09/08/2013 7:51:22 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 13 | View Replies]

To: Vaduz

What we need is an open-source smart phone.

All this closed-source equipment is the NSAs playground.

The government has access to the source code for cellphones and smart phones...I’m sure of this. The reason I am sure is that you must have that source code to modify a smart phone to add really strong encryption abilities to the phone. With that level of encryption the phone becomes as secure as the older STU3 secure phones. You see government officials using smart phones all the time, even the president has one. These phones are secure.

They probably forced the companies to hand over the source code :-( With the source they can write patches and put them onto your phone and make it dance to their tune.


20 posted on 09/08/2013 7:53:56 AM PDT by Bobalu (Bobo the Wonder Marxist leads Operation Rodeo Clown against Syria)
[ Post Reply | Private Reply | To 16 | View Replies]

To: Vaduz
Looks like the only way to have security is talk face to face only.

You'll need one of these:


21 posted on 09/08/2013 8:01:32 AM PDT by Cementjungle
[ Post Reply | Private Reply | To 16 | View Replies]

To: Cementjungle

LOL who knew how much ahead of their time they were?.


22 posted on 09/08/2013 8:04:51 AM PDT by Vaduz
[ Post Reply | Private Reply | To 21 | View Replies]

To: rarestia; RayChuang88

“Quantum computing is a ways off.”

Oh, i’d guess you’ve missed something ...
http://www.dwavesys.com/en/products-services.html

I’m quite sure someone already ported shores algorithm to this neat kind of hardware. And i’d bet NSA already has quite a bunch of these.


23 posted on 09/08/2013 9:19:47 AM PDT by SgtBilko
[ Post Reply | Private Reply | To 11 | View Replies]

To: SgtBilko

Umm. Saying that something is quantum and it being actually quantum are not the same. Researchers MIT are still working on TRUE quantum computing. They estimate at least ten years for a serious breakthrough.


24 posted on 09/08/2013 9:59:41 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 23 | View Replies]

To: ilgipper

The fact that anyone is surprised the government is spying on us using communication technology is the reason we got to this state.


25 posted on 09/08/2013 10:36:10 AM PDT by VerySadAmerican (".....Barrack, and the horse Mohammed rode in on.")
[ Post Reply | Private Reply | To 2 | View Replies]

To: basil
I?m very happy with my dumb phone. I can no nothing with it but make and receive phone calls.

That's what I thought as well, until I kept hearing a twangy sound every now and again.

As you can see from the photo, I had a state of the art anonymizer system, no labels to track me, or so I thought.

Brought in a security expert to check it out. Turns out I've got FIVE agencies tapping my line.

HEY nSa and the rest of you bastids, stop watching porn on my dime$ !

26 posted on 09/08/2013 11:12:28 AM PDT by Covenantor ("Men are ruled...by liars who refuse them news, and by fools who cannot govern." Chesterton)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Covenantor

LOL!


27 posted on 09/08/2013 11:29:25 AM PDT by basil (2ASisters.org)
[ Post Reply | Private Reply | To 26 | View Replies]

To: John W

.
.

- One very simple method used to hack into a large email service “somewhere” in the USA

add a period before the @ in the email account you want to access (or even edit!!!!)

kenyanjerk.@dingbat.com

Now use ANY password

You are now inside somebody’s email mailto:kenyanjerk@dingbat.com account

Too simple?

Really?

I opened this email account:

autoresponder@dingbat.com

by using:

autoresponder.@dingbat.com

The email site was not amused

- -

What did you do in the Army Daddy?

.
.


28 posted on 09/08/2013 11:31:34 AM PDT by devolve (----- ----- ----- get your hands off my wallet you damned dirty clown ----- ----- -----)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Joe Boucher; DonaldC
not doing too much illegal here for these maggots to see, other than me calling them at best maggots

But as comment #9 stated, they can plant data (child porn usually) and get rid of you that way.

29 posted on 09/08/2013 11:39:05 AM PDT by steve86 (Some things aren't really true but you wouldn't be half surprised if they were.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: rarestia

You know this how?

“The NSA has done nothing intelligent when it comes to encryption.”


30 posted on 09/08/2013 11:52:22 AM PDT by Henry Hnyellar
[ Post Reply | Private Reply | To 11 | View Replies]

To: John W

Start by calling back all 0bama phones. Give the poor a landline and dial up access.

Starve the beast


31 posted on 09/08/2013 11:52:27 AM PDT by Steven Tyler
[ Post Reply | Private Reply | To 1 | View Replies]

To: John W

Old news. Software to do this has been publicly available for about 10 years. Just one example:

http://www.mobistealth.com


32 posted on 09/08/2013 11:55:52 AM PDT by Henry Hnyellar
[ Post Reply | Private Reply | To 1 | View Replies]

To: varyouga

I don’t know how accurate the show, “24” was, but it seems they were able to transcribe simple cell phone conversations.


33 posted on 09/08/2013 11:57:07 AM PDT by MayflowerMadam ("A hyphenated American is not an American at all." Teddy Roosevelt)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Henry Hnyellar

And the NSA was using that to do what the article reports at that time?


34 posted on 09/08/2013 12:09:20 PM PDT by John W (Viva Cristo Rey!)
[ Post Reply | Private Reply | To 32 | View Replies]

To: John W

And anything you have in the cloud, internet connected computer, or purchased with a credit card or check.

In other words, anything that isn’t a Dead Tree Book or bought with cash.


35 posted on 09/08/2013 12:21:06 PM PDT by redgolum ("God is dead" -- Nietzsche. "Nietzsche is dead" -- God.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Henry Hnyellar

Look up Bruce Schneier’s blog. He’s an expert in cryptography and has said so much as the NSA being a govt funded group of digital bullies. They have very little actual mathematical talent at their disposal. It’s all brute force and guessing. Mathematical changes will find a way to further confound the NSA.


36 posted on 09/08/2013 12:26:40 PM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 30 | View Replies]

To: rarestia

At least some scientist found that the dwave systems actually are quantum computers, but can only solve a subset of all quantum solvable problems. So it’s not a universal quantum computer, but still a quantum computer. http://spectrum.ieee.org/tech-talk/computing/hardware/scientists-confirm-dwave-computer-chips-compute-using-quantum-mechanics

I once found an article (just can’t find it anymore when i need it ..) reporting that it would be possible to port a derivate of the shor algorithm with O(n^3) on these machines. On a universal quantum computer shor has only O((log n)^3)


37 posted on 09/08/2013 12:57:39 PM PDT by SgtBilko
[ Post Reply | Private Reply | To 24 | View Replies]

To: SgtBilko

I’ll go back to my previous postulate that while the NSA might have hardware to do it, they don’t have the right brains for it to matter. I’m not a mathematician, I’m an engineer. I know from working with mathematicians that encryption is still secure for a majority of workable solutions. The NSA is hitting low hanging fruit right now. Look at black hat for industry clues. Working for the NSA is to black hat what snitching is to criminals. It might be lucrative, but you put yourself out of the community.


38 posted on 09/08/2013 1:20:17 PM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 37 | View Replies]

To: rarestia

“Complex passwords,” huh? Well, how’s this one?

|F.I.shOOtUinTheBuTTwithA12gaSlugthatmaykz.U.UhDuBBl€@zzHOl€!


39 posted on 09/08/2013 1:25:46 PM PDT by Nita Nupress ( Use your mind, not your emotions. Refuse to be manipulated by Marxists!)
[ Post Reply | Private Reply | To 19 | View Replies]

To: basil

“I beg them to get a life,,,”

Yeah,, except the life they might want is yours. Indeed, national security states that recognize no limits to their power often do “get a life”. Thousands and millions of lives in some cases.


40 posted on 09/08/2013 1:57:55 PM PDT by DesertRhino (I was standing with a rifle, waiting for soviet paratroopers, but communists just ran for office.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: John W

If anyone thinks the government isn’t tracking phones calls and internet browsing history, I have some ocean front property in Nebraska to sell them.


41 posted on 09/08/2013 2:17:29 PM PDT by Red White and Blue patriot
[ Post Reply | Private Reply | To 1 | View Replies]

To: RayChuang88

The NSA computer = The Beast?


42 posted on 09/08/2013 2:29:07 PM PDT by madison10 (I miss America.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: DesertRhino

I don’t know anything that I can do about this, so I’ll put it under the heading: LIFE’S A BITCH AND THEN YOU DIE.....

There are only so many things one can worry about....


43 posted on 09/08/2013 2:58:25 PM PDT by basil (2ASisters.org)
[ Post Reply | Private Reply | To 40 | View Replies]

To: Nita Nupress

I would want to be shot in the backside with a 12 ga but that’s certainly a complex password.


44 posted on 09/08/2013 3:26:26 PM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 39 | View Replies]

To: John W

Old Ted Kaczinski’s anti-technology rant doesn’t look quite as insane as it used to, does it?


45 posted on 09/08/2013 7:02:20 PM PDT by BuckeyeTexan (There are those that break and bend. I'm the other kind. ~Steve Earle)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rarestia

<< I would[n’t?] want to be shot in the backside with a 12 ga but that’s certainly a complex password. >>

I forgot to say that wasn’t directed at you. ;-)


46 posted on 09/08/2013 9:16:07 PM PDT by Nita Nupress ( Use your mind, not your emotions. Refuse to be manipulated by Marxists!)
[ Post Reply | Private Reply | To 44 | View Replies]

To: ilgipper

Yup. And if the election was held again today, bam-bam would win again.


47 posted on 09/08/2013 11:12:28 PM PDT by chessplayer
[ Post Reply | Private Reply | To 2 | View Replies]

To: steve86

You are absolutely correct/
About 5 months ago when this punk decided he didn’t want the public touring the White House I wrote a letter to him at the white house and called him a shiftless N word.
Within about thirty minutes my computer was taken over frozen and taken over with a note from the FBI stating that I’d accessed a child porn site ( which is fabrication) and they froze my computer. Scared hell out of me but it was a message sent that they will not put up with dessent.


48 posted on 09/09/2013 5:11:01 AM PDT by Joe Boucher ((FUBO) ( Hey Rubio, eat pooh pal))
[ Post Reply | Private Reply | To 29 | View Replies]

To: basil; MayflowerMadam
You might care if your conversation is mistranscribed, taken out of context or falsified by someone who simply doesn't like you.

The “right” words can easily bring SWAT to your door to shoot/harass you, your family or your dog. It's the favorite pastime of those former schoolyard bullies and they ALWAYS get away with it.

49 posted on 09/09/2013 6:59:32 AM PDT by varyouga
[ Post Reply | Private Reply | To 6 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson