The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home Network Security Viruses & Malware Cybercrime Security Solutions More Topics...
GET RECOGNIZED
Let an ISACA® certification elevate your career.
Register today and save
You are here: Home / Cybercrime / Can NSA Spy On Smartphone Data?
DDoS Protection Powered By Verisign
Report: NSA Can Now Spy On Smartphone Data
Report: NSA Can Now Spy On Smartphone Data
By Jennifer LeClaire / Enterprise Security Today Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
SEPTEMBER
09
2013


Last week, The New York Times suggested the National Security Agency (NSA) could beat your encryption with a little help from supercomputers, court orders, arm twisting and technical prowess. Now, Spiegel Online International, a German news outlet, is suggesting the NSA can spy on smartphone data from all leading manufacturers, including Apple iPhones, Android devices and even hardened BlackBerry phones.

Spiegel claims it has seen top secret NSA documents that reveal it's possible for the agency to see even the most private data on your smartphone, including contact lists, SMS traffic, notes and location information about where you've been. NSA has also reportedly set up specific working spy groups for each operating system.

Not intending to cause widespread panic, the media outlet noted that: "The material viewed by Spiegel suggests that the spying on smartphones has not been a mass phenomenon. It has been targeted, in some cases in an individually tailored manner and without the knowledge of the smartphone companies."

Should We Be Concerned?

Tim Worstall, a fellow at the Adam Smith Institute in London, reiterated that this is not a mass surveillance scheme. In other words, he explained, this is not akin to the agency's habit of trying to read all the Internet traffic it can lay its hands on.

"Rather, this is much more like dedicated surveillance of named individuals," Worstall said. "It's that they are now capable of doing this across the various different operating systems in a manner akin to the sort of thing the FBI might do if it had a warrant to allow it."

We turned to Joseph Lorenzo Hall, a senior staff technologist at the Center for Democracy & Technology, to get his thoughts on the latest NSA news. He told us part of the problem with "Snowden" revelations is that there aren't a lot of details. The Spiegel story is no different.

"There are certainly cases that we've known about for a while where law enforcement can get access to information on smartphones as long as they have the physical device," Hall said. "That's not necessarily new and the reporting wasn't clear as to whether or not this is a remote access capability. It's hard to know if there's a reason to be concerned."

What's New Here?

There are existing concerns with iPhone and Android devices. Hall explained that enabling a PIN, for example, encrypts the iPhone -- but it's easy enough to break through that encryption. In fact, Hall said law enforcement can crack a four-digit pin in about 13 minutes.

"We know there's a forensic waiting list at Apple where you can send in a device and when they get to it they will somehow bypass the pin setting and encryption. There are similar stories related to Android platforms. It's hard to know what new revelation is in this report," Hall said.

"If the NSA could gain remote access or if they could grab stuff off your iCloud that would be new. What would also be new is seeing in real time what you are doing on your device over the air," Hall said. "There is particularly sensitive information on phones and in the next year or so you will be able to download medical records to your phone."

Tell Us What You Think
Comment:

Name:

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY BE OF INTEREST
Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.
MORE IN CYBERCRIME
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Russian Gang with Stolen IDs Hacks Hosting Company
In August, a Russian cyber gang obtained what researchers called “the largest cache of stolen data." Now, those hackers may be putting their ill-gotten gains to criminal use.
 
Dairy Queen Latest Retailer To Report Hack
Known for its hot fries and soft-serve ice cream, Dairy Queen just made cyber history as the latest victim of a hack attack. The fast food chain said that customer data at some stores may be at risk.
 
Lessons from the JPMorgan Chase Cyberattack
JPMorgan Chase is investigating a likely cyberattack. The banking giant is cooperating with law enforcement, including the FBI, to understand what data hackers may have obtained.
 

Enterprise Hardware Spotlight
AMD's New FX Series CPU Breaks Processing Speed Record
The new FX-8370 processor from Advanced Micro Devices has set a record for silicon processor speed, the company announced. Overclocked, the eight-core chip was measured at 8722.78 MHz.
 
Intel Intros Lightning-Fast PC Processors
Call it extreme. Intel just took the covers off its first-ever eight-core desktop processor, which is aimed at hardcore power users who expect more than the status quo from their computers.
 
HP Previews ProLiant Gen9 Data Center Servers
Because traditional data center and server architectures are “constraints” on businesses, HP is releasing new servers aimed at faster, simpler and more cost-effective delivery of computing services.
 

Mobile Technology Spotlight
Rumor Mill Puts Mobile Wallet in iPhone 6
Apple is moving toward the mobile wallet world with its next iPhone. The tech giant has partnered with retailers, banks and major payment networks to make it happen, according to Bloomberg.
 
Will iPhone Finally Catch Up with NFC Mobile Payment Ability?
Apple's latest version of the iPhone may have a mobile wallet to pay for purchases with a tap of the phone. The iPhone 6 reportedly is equipped with near-field communication (NFC) technology.
 
Visual Search To Shop: Gimmick or Game Changing?
Imagine using your phone to snap a photo of the cool pair of sunglasses your friend is wearing and instantly receiving a slew of information about the shades along with a link to order them.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Cybercrime | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.