background preloader

Telco

Facebook Twitter

Secret messages hidden in TV adverts can order smartphones to spy on people, researchers warn. The Secret Surveillance Catalogue. The Intercept. Privacy: Google's Android HTC mobile phone 'transmits user locations back to company' By Daily Mail Reporter Updated: 20:01 GMT, 22 April 2011 Google's Android HTC phone transmitted data back to Google several times an hourApple slammed for user locations being stored in iPhone and iPadGoogle and Apple are using location data to build databases of Wi-Fi hotspotsData from Apple devices syncs with computer, meaning anyone with access can see Representative Edward Markey questions whether the practice may be illegal Tests: An Android HTC phone was found to track its location every few seconds and transmitted the data back to Google several times an hour The row over the privacy of mobile phone users escalated today as it was revealed that Google devices regularly transmit user locations back to the company.

Privacy: Google's Android HTC mobile phone 'transmits user locations back to company'

The new revelations come after Apple was this week slammed by several Congress members for the way user locations are being stored in unencrypted databases on the iPhone and iPad, sometimes stretching back several months. You've Been Warned: Spotify Wants To Spy On You In Every Way Imaginable. Bugged, Tracked, Hacked. It’s impossible to imagine life without smartphones.

Bugged, Tracked, Hacked.

Everything about our lives can now be contained in the palm of our hand. Personal details, professional contacts, banking details, photos, medical data, it’s all there, so you’d expect your smartphone to be secure. But in this special investigation Ross Coulthart discovers, we are facing the biggest threat to our privacy that the world has ever seen. Apple Has Quietly Started Tracking iPhone Users Again, And It's Tricky To Opt Out. Photo: Flickr/pasukaru76 Apple’s launch of the iPhone 5 in September came with a bunch of new commercials to promote the device.But Apple didn’t shout quite so loud about an enhancement to its new mobile operating system, iOS 6, which also occurred in September: The company has started tracking users so that advertisers can target them again, through a new tracking technology called IFA or IDFA.

Apple Has Quietly Started Tracking iPhone Users Again, And It's Tricky To Opt Out

Previously, Apple had all but disabled tracking of iPhone users by advertisers when it stopped app developers from utilising Apple mobile device data via UDID, the unique, permanent, non-deletable serial number that previously identified every Apple device. NSA Tests Out Smartphones that Recognize Handwriting Motion. The NSA Has Inserted Its Code Into Android OS, Or Three Quarters Of All Smartphones. Over a decade ago, it was discovered that the NSA embedded backdoor access into Windows 95, and likely into virtually all other subsequent internet connected, desktop-based operating systems.

The NSA Has Inserted Its Code Into Android OS, Or Three Quarters Of All Smartphones

However, with the passage of time, more and more people went "mobile", and as a result the NSA had to adapt. And adapt they have: as Bloomberg reports, "The NSA is quietly writing code for Google’s Android OS. " Is it ironic that the same "don't be evil" Google which went to such great lengths in the aftermath of the Snowden scandal to wash its hands of snooping on its customers and even filed a request with the secretive FISA court asking permission to disclose more information about the government’s data requests, is embedding NSA code into its mobile operating system, which according to IDC runs on three-quarters of all smartphones shipped in the first quarter?

Yes, yes it is. From Bloomberg: The story continues: Snowden says Australia watching its citizens ‘all the time,’ slams new metadata laws — RT News. EFF Files FOIA Suit Over U.S. Marshals’ Spy Planes. San Francisco - The Electronic Frontier Foundation (EFF) today filed a Freedom of Information Act (FOIA) lawsuit to shine light on the U.S.

EFF Files FOIA Suit Over U.S. Marshals’ Spy Planes

Marshals Service's (USMS) use of small aircraft mounted with controversial cell-phone tracking systems. The Wall Street Journal revealed last year that the Marshals have been flying small, fixed-wing Cessna planes mounted with IMSI catchers—devices that emulate cell phone towers and are able to capture the locational data of tens of thousands of cell phones during a single flight. The planes—in the air since 2007—reportedly were based out of five metropolitan airports and shared by multiple agencies within the U.S.

Department of Justice, even as sources within the agency questioned the legality of the program. Smartphone Users Tracked by Apps an Average of every Three Minutes. Using a smartphone can mean revealing your whereabouts nearly all the time, according to new research performed by computer scientists at Carnegie Mellon University.

Smartphone Users Tracked by Apps an Average of every Three Minutes

Working with nearly two dozen smartphone owners using the Android operating system over a two-week period, researchers found some apps collected GPS data from those phones an average of every three minutes. The average was calculated after the computer scientists found that about a dozen or so Android apps gathered GPS data 6,200 times per study participant during the two weeks. Some of the apps mentioned in the study include The Weather Channel, which collected GPS data every 10 minutes. Another app, Groupon, requested a smartphone owner’s coordinates 1,062 times in two weeks. “Does Groupon really need to know where you are every 20 minutes?” The study participants were usually taken off guard and not too pleased at the revelations.

Telcos face mass SIM card recall after spy agencies' encryption hack revealed. The SIM cards of Telstra, Vodafone and Optus may be compromised.

Telcos face mass SIM card recall after spy agencies' encryption hack revealed

Photo: Penny Stephens Telstra, Optus and Vodafone may be forced to order the recall of potentially millions of mobile phone SIM cards after it was revealed that US and British spy agencies stole encryption keys that secured personal information, including calls and texts, on the chips. FBI taps cell phone mic as eavesdropping tool. The FBI appears to have begun using a novel form of electronic surveillance in criminal investigations: remotely activating a mobile phone's microphone and using it to eavesdrop on nearby conversations.

FBI taps cell phone mic as eavesdropping tool

The technique is called a "roving bug," and was approved by top U.S. Department of Justice officials for use against members of a New York organized crime family who were wary of conventional surveillance techniques such as tailing a suspect or wiretapping him. Nextel cell phones owned by two alleged mobsters, John Ardito and his attorney Peter Peluso, were used by the FBI to listen in on nearby conversations. The FBI views Ardito as one of the most powerful men in the Genovese family, a major part of the national Mafia.

The surveillance technique came to light in an opinion published this week by U.S. Vodafone made millions helping GCHQ spy on the world. Facebook can gain direct access to your mobile and take pictures or make videos at any time, MPs warn. Verizon Injecting Perma-Cookies to Track Mobile Customers, Bypassing Privacy Controls. Verizon users might want to start looking for another provider.

Verizon apparently created this mechanism to expand their advertising programs, but it has privacy implications far beyond those programs. Indeed, while we're concerned about Verizon's own use of the header, we're even more worried about what it allows others to find out about Verizon users. The X-UIDH header effectively reinvents the cookie, but does so in a way that is shockingly insecure and dangerous to your privacy. Worse still, Verizon doesn't let users turn off this "feature." In fact, it functions even if you use a private browsing mode or clear your cookies. – senseih

In an effort to better serve advertisers, Verizon Wireless has been silently modifying its users' web traffic on its network to inject a cookie-like tracker.

Verizon Injecting Perma-Cookies to Track Mobile Customers, Bypassing Privacy Controls

This tracker, included in an HTTP header called X-UIDH, is sent to every unencrypted website a Verizon customer visits from a mobile device. It allows third-party advertisers and websites to assemble a deep, permanent profile of visitors' web browsing habits without their consent. Verizon apparently created this mechanism to expand their advertising programs, but it has privacy implications far beyond those programs. Vodafone reveals existence of secret wires that allow state surveillance. Vodafone, one of the world's largest mobile phone groups, has revealed the existence of secret wires that allow government agencies to listen to all conversations on its networks, saying they are widely used in some of the 29 countries in which it operates in Europe and beyond.

Vodafone reveals existence of secret wires that allow state surveillance

The company has broken its silence on government surveillance in order to push back against the increasingly widespread use of phone and broadband networks to spy on citizens, and will publish its first Law Enforcement Disclosure Report on Friday . At 40,000 words, it is the most comprehensive survey yet of how governments monitor the conversations and whereabouts of their people. The company said wires had been connected directly to its network and those of other telecoms groups, allowing agencies to listen to or record live conversations and, in certain cases, track the whereabouts of a customer.

IMSI catchers

Mesh networks. Revealed: How governments can take control of smartphones. ‘Legal malware’ produced by the Italian firm Hacking Team can take total control of your mobile phone. That’s according to Russian security firm Kaspersky Lab and University of Toronto’s Citizen Lab(which also obtained a user manual). Operating since 2001, the Milan-based Hacking Team employs over 50 people and offers clients the ability to “take control of your targets and monitor them regardless of encryption and mobility,” while “keeping an eye on all your targets and manage them remotely, all from a single screen.” It’s the first time Remote Control Systems (RCS) malware has been positively linked with mobile phones and it opens up a new privacy threat potential to mobile phone users. “Our latest research has identified mobile modules that work on all well-known mobile platforms, including as Android and iOS,” wrote Kaspersky researcher Sergey Golovanov.

Image from citizenlab.org Various softwares can also lure users to download targeted fake apps. Comments comments. Dozens of countries use Israeli spy technology to tap into global cell phone location databases. Please note that by playing this clip YouTube and Google will place a long term cookie on your computer. Cell phone carriers like AT&T and Verizon keep detailed records of our movements, for business purposes. In order for our phones to work, the companies need to keep track of how many people are in range of a given tower at any moment.

For a long time we thought the government tracked our cell phones by asking phone companies for this information. But a new expose in the Washington Post reveals that governments or even criminal organizations have another way of accessing the information held by cell phone carriers about our locations: they tap directly into the industry's shared location database. Users of such technology type a phone number into a computer portal, which then collects information from the location databases maintained by cellular carriers, company documents show. New app reveals how your smartphone can spy on you without permission (VIDEO) Google Maps Has Been Tracking Your Every Move, And There’s A Website To Prove It. Police scoop up data on thousands in mobile phone 'tower dumps' to track down criminals. Landmark Supreme Court Ruling: Police Need Warrant to Search Your Cellphone. Researchers Find and Decode the Spy Tools Governments Use to Hijack Phones.

Les and Dave Jacobs/Getty Newly uncovered components of a digital surveillance tool used by more than 60 governments worldwide provide a rare glimpse at the extensive ways law enforcement and intelligence agencies use the tool to surreptitiously record and steal data from mobile phones. Vodafone reveals existence of secret wires that allow state surveillance.