SUBSCRIBE TO OUR FREE NEWSLETTER
Daily news & progressive opinion—funded by the people, not the corporations—delivered straight to your inbox.
5
#000000
#FFFFFF
To donate by check, phone, or other method, see our More Ways to Give page.
Daily news & progressive opinion—funded by the people, not the corporations—delivered straight to your inbox.
The intelligence alliance known as Five Eyes--comprising the U.S., Canada, New Zealand, the United Kingdom, and Australia--exploited security weaknesses in one of the world's most popular browsers to obtain data about users and planned to use links to Google and Samsung app stores to infect smartphones with spyware, a top secret National Security Agency (NSA) document published Wednesday has revealed.
According to the 2012 document, leaked by whistleblower Edward Snowden and published jointly by CBC News and The Intercept, the NSA and its international counterparts took part in a series of workshops between November 2011 and February 2012 to find new ways to exploit smartphone technology for spying operations.
The Intercept reports:
As part of a pilot project codenamed IRRITANT HORN, the agencies were developing a method to hack and hijack phone users' connections to app stores so that they would be able to send malicious "implants" to targeted devices. The implants could then be used to collect data from the phones without their users noticing.
CBC continues:
The Five Eyes alliance targeted servers where smartphones get directed whenever users download or update an app from Google and Samsung stores.
...Ultimately, the spy agencies wanted to implant spyware on certain smartphones to take control of a person's device or extract data from it, the document suggests.
The spy agencies also sought to match their targets' smartphone devices to their online activities, using databases of emails, chats and browsing histories kept in the Five Eyes' powerful XKeyScore tool to help build profiles on the people they were tracking.
The project emerged in part due to concerns about the possibility of "another Arab spring," referring to the 2011 wave of revolutionary actions in Tunisia, Egypt, and other countries in the Middle East and North Africa where several autocratic, Western-backed leaders were ousted.
"Respecting agreements not to spy on each others' citizens, the spying partners focused their attention on servers in non-Five Eyes countries, the document suggests," write CBC's Amber Hildebrandt and Dave Seglins. "The agencies targeted mobile app servers in France, Switzerland, the Netherlands, Cuba, Morocco, the Bahamas and Russia."
The spy agencies also began targeting UC Browser--a popular app in India and China with growing usage in North America--in late 2011 after learning that it had leaked information about its half-billion users.
According to the reporting, the operation was launched by a joint surveillance unit called the Network Tradecraft Advancement Team, which includes spies from each of the Five Eyes nations.
The document frames the plan as a move for national security, with the agencies seeking to collect data or spy indefinitely on mobile phones of "suspected terrorists." But they did so without alerting the public or the phone companies of the browser's weaknesses, which "potentially put millions of users in danger of their data being accessed by other governments' agencies, hackers or criminals," Hildebrandt and Seglins write.
"Of course, the security agencies don't [disclose the information]," Ron Deibert, executive director of digital rights group Citizen Lab, which identified security gaps in UC Browser and alerted the company to those issues in April, told CBC. "Instead, they harbor the vulnerability. They essentially weaponize it."
Common Dreams is powered by optimists who believe in the power of informed and engaged citizens to ignite and enact change to make the world a better place. We're hundreds of thousands strong, but every single supporter makes the difference. Your contribution supports this bold media model—free, independent, and dedicated to reporting the facts every day. Stand with us in the fight for economic equality, social justice, human rights, and a more sustainable future. As a people-powered nonprofit news outlet, we cover the issues the corporate media never will. |
The intelligence alliance known as Five Eyes--comprising the U.S., Canada, New Zealand, the United Kingdom, and Australia--exploited security weaknesses in one of the world's most popular browsers to obtain data about users and planned to use links to Google and Samsung app stores to infect smartphones with spyware, a top secret National Security Agency (NSA) document published Wednesday has revealed.
According to the 2012 document, leaked by whistleblower Edward Snowden and published jointly by CBC News and The Intercept, the NSA and its international counterparts took part in a series of workshops between November 2011 and February 2012 to find new ways to exploit smartphone technology for spying operations.
The Intercept reports:
As part of a pilot project codenamed IRRITANT HORN, the agencies were developing a method to hack and hijack phone users' connections to app stores so that they would be able to send malicious "implants" to targeted devices. The implants could then be used to collect data from the phones without their users noticing.
CBC continues:
The Five Eyes alliance targeted servers where smartphones get directed whenever users download or update an app from Google and Samsung stores.
...Ultimately, the spy agencies wanted to implant spyware on certain smartphones to take control of a person's device or extract data from it, the document suggests.
The spy agencies also sought to match their targets' smartphone devices to their online activities, using databases of emails, chats and browsing histories kept in the Five Eyes' powerful XKeyScore tool to help build profiles on the people they were tracking.
The project emerged in part due to concerns about the possibility of "another Arab spring," referring to the 2011 wave of revolutionary actions in Tunisia, Egypt, and other countries in the Middle East and North Africa where several autocratic, Western-backed leaders were ousted.
"Respecting agreements not to spy on each others' citizens, the spying partners focused their attention on servers in non-Five Eyes countries, the document suggests," write CBC's Amber Hildebrandt and Dave Seglins. "The agencies targeted mobile app servers in France, Switzerland, the Netherlands, Cuba, Morocco, the Bahamas and Russia."
The spy agencies also began targeting UC Browser--a popular app in India and China with growing usage in North America--in late 2011 after learning that it had leaked information about its half-billion users.
According to the reporting, the operation was launched by a joint surveillance unit called the Network Tradecraft Advancement Team, which includes spies from each of the Five Eyes nations.
The document frames the plan as a move for national security, with the agencies seeking to collect data or spy indefinitely on mobile phones of "suspected terrorists." But they did so without alerting the public or the phone companies of the browser's weaknesses, which "potentially put millions of users in danger of their data being accessed by other governments' agencies, hackers or criminals," Hildebrandt and Seglins write.
"Of course, the security agencies don't [disclose the information]," Ron Deibert, executive director of digital rights group Citizen Lab, which identified security gaps in UC Browser and alerted the company to those issues in April, told CBC. "Instead, they harbor the vulnerability. They essentially weaponize it."
The intelligence alliance known as Five Eyes--comprising the U.S., Canada, New Zealand, the United Kingdom, and Australia--exploited security weaknesses in one of the world's most popular browsers to obtain data about users and planned to use links to Google and Samsung app stores to infect smartphones with spyware, a top secret National Security Agency (NSA) document published Wednesday has revealed.
According to the 2012 document, leaked by whistleblower Edward Snowden and published jointly by CBC News and The Intercept, the NSA and its international counterparts took part in a series of workshops between November 2011 and February 2012 to find new ways to exploit smartphone technology for spying operations.
The Intercept reports:
As part of a pilot project codenamed IRRITANT HORN, the agencies were developing a method to hack and hijack phone users' connections to app stores so that they would be able to send malicious "implants" to targeted devices. The implants could then be used to collect data from the phones without their users noticing.
CBC continues:
The Five Eyes alliance targeted servers where smartphones get directed whenever users download or update an app from Google and Samsung stores.
...Ultimately, the spy agencies wanted to implant spyware on certain smartphones to take control of a person's device or extract data from it, the document suggests.
The spy agencies also sought to match their targets' smartphone devices to their online activities, using databases of emails, chats and browsing histories kept in the Five Eyes' powerful XKeyScore tool to help build profiles on the people they were tracking.
The project emerged in part due to concerns about the possibility of "another Arab spring," referring to the 2011 wave of revolutionary actions in Tunisia, Egypt, and other countries in the Middle East and North Africa where several autocratic, Western-backed leaders were ousted.
"Respecting agreements not to spy on each others' citizens, the spying partners focused their attention on servers in non-Five Eyes countries, the document suggests," write CBC's Amber Hildebrandt and Dave Seglins. "The agencies targeted mobile app servers in France, Switzerland, the Netherlands, Cuba, Morocco, the Bahamas and Russia."
The spy agencies also began targeting UC Browser--a popular app in India and China with growing usage in North America--in late 2011 after learning that it had leaked information about its half-billion users.
According to the reporting, the operation was launched by a joint surveillance unit called the Network Tradecraft Advancement Team, which includes spies from each of the Five Eyes nations.
The document frames the plan as a move for national security, with the agencies seeking to collect data or spy indefinitely on mobile phones of "suspected terrorists." But they did so without alerting the public or the phone companies of the browser's weaknesses, which "potentially put millions of users in danger of their data being accessed by other governments' agencies, hackers or criminals," Hildebrandt and Seglins write.
"Of course, the security agencies don't [disclose the information]," Ron Deibert, executive director of digital rights group Citizen Lab, which identified security gaps in UC Browser and alerted the company to those issues in April, told CBC. "Instead, they harbor the vulnerability. They essentially weaponize it."