Nancy Pelosi urges FBI director to debunk Donald Trump’s wiretap claim | US news | The Guardian

“Theoretically, do I think that a director of the FBI who knows for a fact that something is a mythology but is misleading to the American people … should set the record straight? Yes, I do think he should say that, publicly,” Pelosi said

Fuente: Nancy Pelosi urges FBI director to debunk Donald Trump’s wiretap claim | US news | The Guardian


Montreal police defend surveillance of journalist’s phone amid outcry | World news | The Guardian

Rights campaigners are among those sounding the alarm over the erosion of press freedom in Canada after it emerged that police in Montreal had spent several months monitoring the phone of a journalist in order to identify his sources.

Fuente: Montreal police defend surveillance of journalist’s phone amid outcry | World news | The Guardian


FBI Says Edward Snowden Is Reason Companies Are Resisting Handing Over Phone Records

Companies became more resistant to the FBI’s collection of their customers’ information following revelations by former NSA contractor Edward Snowden, according to an inspector general report released Thursday.

Fuente: FBI Says Edward Snowden Is Reason Companies Are Resisting Handing Over Phone Records


Long-Secret Stingray Manuals Detail How Police Can Spy on Phones

Harris Corp.’s Stingray surveillance device has been one of the most closely-guarded secrets in law enforcement for more than 15 years. The company and its police clients across the United States have fought to keep information about the mobile-phone-monitoring boxes from the public against which they are used. The Intercept has obtained several Harris instruction manuals spanning roughly 200 pages and meticulously detailing how to create a cellular surveillance dragnet.

Fuente: Long-Secret Stingray Manuals Detail How Police Can Spy on Phones


German proposals could see refugees’ phones searched by police | World news | The Guardian

Checking smartphones of those without passports among measures announced by the interior minister, Thomas de Maizière

Fuente: German proposals could see refugees’ phones searched by police | World news | The Guardian


Google voice search records and keeps conversations people have around their phones – but the files can be deleted | News | Lifestyle | The Independent

The feature works as a way of letting people search with their voice, and storing those recordings presumably lets Google improve its language recognition tools as well as the results that it gives to people.Read moreFacebook to introduce encryption but ensure it can still read messagesBut it also comes with an easy way of listening to and deleting all of the information that it collects.

Fuente: Google voice search records and keeps conversations people have around their phones – but the files can be deleted | News | Lifestyle | The Independent


Tedic rechaza afirmaciones del Gobierno sobre sistemas de espionaje

La organización no gubernamental Tecnología, Educación, Desarrollo, Investigación y Comunicación (Tedic) rechazó las expresiones del ministro de la Secretaría Nacional Antidrogas (Senad), Luis Rojas, sobre el sistema de espionaje adquirido por el Gobierno. Pide transparencia y rendición de cuentas.

Fuente: Tedic rechaza afirmaciones del Gobierno sobre sistemas de espionaje


Senad asume compra de software para ubicar a personas – Paraguay.com

Paraguay: Meses atrás trascendió la información acerca de un software espía adquirido por el Gobierno. Desde la Senad asumen la compra, sin embargo aseguran que no sirve para vigilar sino solo para ubicar a las personas.

Fuente: Senad asume compra de software para ubicar a personas – Paraguay.com


Vozpópuli – Para qué quieren pinchar tu teléfono, si tienen tus metadatos

Un nuevo estudio confirma que el análisis de los metadatos permite averiguar tu identidad, la de tus amigos más próximos, así como tu dirección, tu estado de salud o tu ideología.

Fuente: Vozpópuli – Para qué quieren pinchar tu teléfono, si tienen tus metadatos


La clave de cifrado global de BlackBerry, en manos de la polícia

Problemas para BlackBerry. Mientras Apple lucha en los tribunales -y fuera de ellos- para proteger la privacidad de los usuarios, Vice News desvela, a través de documentos por un caso de asesinato, cómo la Policía Canadiense habría obtenido la clave de cifrado global de BlackBerry, haciendo de la seguridad del sistema… algo prácticamente inservible y al servicio de las fuerzas y cuerpos de seguridad de Canadá. ¿Y lo peor del asunto? según fuentes de Vice, poseen esta clave desde 2010.

Fuente: La clave de cifrado global de BlackBerry, en manos de la polícia


Proceso de paz Colombia: Una negociación histórica sin tabletas ni celulares | Internacional | EL PAÍS

Proceso de paz Colombia: Una negociación histórica sin tabletas ni celulares | Internacional | EL PAÍS.

 

Alejandre, en una reunión del Estado Mayor en 2003. / Uly martín

 

El general español retirado Luis Alejandre, con años de experiencia en procesos de paz en Centroamérica, fue testigo a finales de la semana pasada de una jornada histórica en La Habana. Por primera vez, cinco generales y un contraalmirante colombianos en activo se veían cara a cara con sus viejos enemigos, los jefes de las FARC, en el marco de las negociaciones de paz. Unas conversaciones que se celebran en Cuba desde hace más de dos años con el fin de acabar con un conflicto iniciado hace medio siglo y que ha causado 220.000 muertos.

Alejandre, que fue seleccionado como experto por el Gobierno noruego e intervino en el encuentro, destaca “el clima de respeto entre las partes en una reunión donde lo más importante era transmitir confianza. Hablaron con el corazón e incluso hubo momentos de distensión. Todo el mundo tomaba notas en papel. Nada de tabletas o móviles.


La vulnerabilidad de los smartphones: Muy pocos modelos son seguros ante los hackers – BioBioChile

La vulnerabilidad de los smartphones: Muy pocos modelos son seguros ante los hackers – BioBioChile.

 

Johan Larsson (CC) Flickr

Johan Larsson (CC) Flickr

 

Publicado por Denisse Charpentier | La Información es de Agencia AFP

 

Muy vulnerables actualmente, los smartphones pueden convertirse en el futuro blanco predilecto de los hackers que se pueden aprovechar de las negligencias y la inocencia de los usuarios al manejar su teléfono.

“El mercado del móvil se rige por la innovación y se concentra sobre todo en la obtención de nuevas funcionalidades ligadas al marketing más que en la seguridad y el respeto de la vida privada”, analiza James Lyne, entrevistado en el Mobile World Congress que se cierra este jueves en Barcelona.

Responsable de la seguridad global en Sophos, Lyne responsabiliza a los fabricantes de la insuficiente sensibilización de los consumidores, de los que solo un 40% utiliza un código PIN.

En su presentación del Galaxy S6 el domingo en Barcelona, Samsung insistió en su apariencia, en la recarga inalámbrica o en la calidad de su cámara fotográfica pero apenas se refirió a su protección antivirus.

Por ello, explica a la AFP Tanguy de Coatpont, director general de Kaspersky Lab France, “vivimos con los smartphones lo que experimentamos con los ordenadores hace 15 años”.

“Cada vez hay más problemas de seguridad porque con su potencia se convierten en pequeños ordenadores, conectados permanentemente”, añade.


ARGENPRESS.info – Prensa argentina para todo el mundo: Espionaje de Estados Unidos: El cuento de nunca acabar

ARGENPRESS.info – Prensa argentina para todo el mundo: Espionaje de Estados Unidos: El cuento de nunca acabar.

lunes, 2 de marzo de 2015

Carmen Esquivel (PL)

Cuando aún está fresco en la memoria el escándalo por el espionaje masivo contra ciudadanos, instituciones y hasta dignatarios europeos, el tema vuelve a la palestra al revelarse ahora que otros objetivos estuvieron en la mira de los servicios de inteligencia estadounidenses.

El nuevo blanco de los ataques es la compañía holandesa Gemalto, primera de su tipo en el mundo en la fabricación de tarjetas SIM (Subscriber Identity Module), en español Módulo de Identificación de Abonados, usada en teléfonos celulares y módems.

Para dar una idea de la magnitud de lo que esto significa baste señalar que la firma produce cerca de dos mil millones de estos dispositivos al año para 450 empresas de telecomunicaciones, entre ellas T-Mobile, Vodafone, Orange, Verizon y Sprint.

Gemalto trabaja, además, con unas tres mil instituciones financieras porque elabora chips para tarjetas de crédito.

De acuerdo con documentos filtrados recientemente por Edward Snowden, ex analista de la Agencia Nacional de Seguridad (NSA, por sus siglas en inglés), las inteligencias estadounidense y británica lograron apropiarse de las claves de la compañía, lo cual les abrió las puertas a los celulares de medio mundo.

La NSA y el Cuartel General de Comunicaciones del gobierno de Gran Bretaña (GCHQ) obtuvieron las llaves al acceder a los servidores centrales de Gemalto, valiéndose de información privada de algunos ingenieros, fabricantes de tarjetas y proveedores.

De esta manera pudieron espiar las llamadas, mensajes y correos electrónicos de una persona o empresa sin necesidad de pasar por una operadora o de obtener una orden judicial y, lo más alarmante, sin dejar ningún tipo de rastro.

“Es imposible saber cuántos códigos robaron la NSA y el GCHQ, pero si nos basamos en hipótesis modestas, el número es impresionante”, afirmó el sitio digital The Intercept, que filtró la información.


Gemalto Doesn't Know What It Doesn't Know – The Intercept

Gemalto Doesn’t Know What It Doesn’t Know – The Intercept.

Featured photo - Gemalto Doesn’t Know What It Doesn’t Know

Gemalto CEO Olivier Piou shows a cellphone SIM card before a press conference on February 25, 2015 in Paris.

Gemalto, the French-Dutch digital security giant, confirmed that it believes American and British spies were behind a “particularly sophisticated intrusion” of its internal computer networks, as reported by The Intercept last week.

This morning, the company tried to downplay the significance of NSA and GCHQ efforts against its mobile phone encryption keys — and, in the process, made erroneous statements about cellphone technology and sweeping claims about its own security that experts describe as highly questionable.

Gemalto, which is the largest manufacturer of SIM cards in the world, launched an internal investigation after The Intercept six days ago revealed that the NSA and its British counterpart GCHQ hacked the company and cyberstalked its employees. In the secret documents, provided by NSA whistleblower Edward Snowden, the intelligence agencies described a successful effort to obtain secret encryption keys used to protect hundreds of millions of mobile devices across the globe.

The company was eager to address the claims that its systems and encryption keys had been massively compromised. At one point in stock trading after publication of the report, Gemalto suffered a half billion dollar hit to its market capitalization. The stock only partially recovered in the following days.

After the brief investigation, Gemalto now says that the NSA and GCHQ operations in 2010-2011 would not allow the intelligence agencies to spy on 3G and 4G networks, and that theft would have been rare after 2010, when it deployed a “secure transfer system.” The company also said the spy agency hacks only affected “the outer parts of our networks — our office networks — which are in contact with the outside world.”

Security experts and cryptography specialists immediately challenged Gemalto’s claim to have done a “thorough” investigation into the state-sponsored attack in just six days, saying the company was greatly underestimating the abilities of the NSA and GCHQ to penetrate its systems without leaving detectable traces.

“Gemalto learned about this five-year-old hack by GCHQ when the The Intercept called them up for a comment last week. That doesn’t sound like they’re on top of things, and it certainly suggests they don’t have the in-house capability to detect and thwart sophisticated state-sponsored attacks,” says Christopher Soghoian, the chief technologist at the American Civil Liberties Union. He adds that Gemalto remains “a high-profile target for intelligence agencies.”

Matthew Green, a cryptography specialist at the Johns Hopkins Information Security Institute, said, “This is an investigation that seems mainly designed to produce positive statements. It is not an investigation at all.”


Secret 'BADASS' Intelligence Program Spied on Smartphones – The Intercept

Secret ‘BADASS’ Intelligence Program Spied on Smartphones – The Intercept.

BY MICAH LEE 

British and Canadian spy agencies accumulated sensitive data on smartphone users, including location, app preferences, and unique device identifiers, by piggybacking on ubiquitous software from advertising and analytics companies, according to a document obtained by NSA whistleblower Edward Snowden.

The document, included in a trove of Snowden material released by Der Spiegel on January 17, outlines a secret program run by the intelligence agencies called BADASS. The German newsweekly did not write about the BADASS document, attaching it to a broader article on cyberwarfare. According to The Intercept‘s analysis of the document, intelligence agents applied BADASS software filters to streams of intercepted internet traffic, plucking from that traffic unencrypted uploads from smartphones to servers run by advertising and analytics companies.

Programmers frequently embed code from a handful of such companies into their smartphone apps because it helps them answer a variety of questions: How often does a particular user open the app, and at what time of day? Where does the user live? Where does the user work? Where is the user right now? What’s the phone’s unique identifier? What version of Android or iOS is the device running? What’s the user’s IP address? Answers to those questions guide app upgrades and help target advertisements, benefits that help explain why tracking users is not only routine in the tech industry but also considered a best practice.

For users, however, the smartphone data routinely provided to ad and analytics companies represents a major privacy threat. When combined together, the information fragments can be used to identify specific users, and when concentrated in the hands of a small number of companies, they have proven to be irresistibly convenient targets for those engaged in mass surveillance. Although the BADASS presentation appears to be roughly four years old, at least one player in the mobile advertising and analytics space, Google, acknowledges that its servers still routinely receive unencrypted uploads from Google code embedded in apps.

For spy agencies, this smartphone monitoring data represented a new, convenient way of learning more about surveillance targets, including information about their physical movements and digital activities. It also would have made it possible to design more focused cyberattacks against those people, for example by exploiting a weakness in a particular app known to be used by a particular person. Such scenarios are strongly hinted at in a 2010 NSA presentation, provided by agency whistleblower Edward Snowden and published last year in The New York TimesPro Publica, andThe Guardian. That presentation stated that smartphone monitoring would be useful because it could lead to “additional exploitation” and the unearthing of “target knowledge/leads, location, [and] target technology.”

The 2010 presentation, along with additional documents from Britain’s intelligence service Government Communications Headquarters, or GCHQ, showed that the intelligence agencies were aggressively ramping up their efforts to see into the world of mobile apps. But the specifics of how they might distill useful information from the torrent of internet packets to and from smartphones remained unclear.


Chinese Android phones contain in-built hacker 'backdoor' | Technology | The Guardian

Chinese Android phones contain in-built hacker ‘backdoor’ | Technology | The Guardian.

Coolpad
 Smartphones from Chinese manufacturer Coolpad found to have malware pre-installed. Photograph: Coolpad

Smartphones from a major Chinese manufacturer have a security flaw that was deliberately introduced and allows hackers full control of the device.

The “CoolReaper” backdoor was found in the software that powers at least 24 models made by Coolpad, which is now the world’s sixth-biggest smartphone producer according to Canalys.

The flaw allows hackers or Coolpad itself to download and install any software onto the phones without the user’s permission.

“The operator can simply uninstall or disable all security applications in user devices, install additional malware, steal information and inject content into the users device in multiple ways,” according to a report on the malware by security firm Palo Alto Networks (Pan).


Bangladesh's brutal security service meets with Swiss surveillance company Neosoft | Privacy International

Bangladesh’s brutal security service meets with Swiss surveillance company Neosoft | Privacy International.

Swiss authorities are investigating the potentially illegal export of mobile phone surveillance technology to an infamous elite unit of the Bangladeshi security apparatus accused of wide-scale human rights abuses. The investigation comes after Privacy International and Swiss magazine WOZprovided evidence that representatives of the Rapid Action Battalion were in Zurich this past week meeting with the Swiss surveillance company Neosoft.

In April, Privacy International published restricted procurement documentsshowing that the RAB were looking to buy mobile phone tracking technologyknown as an IMSI Catcher, which we believed they were looking to purchase from a company based in Switzerland.

However, evidence provided to Privacy International suggests that the deal may still not yet be complete. For an export of an IMSI Catcher to go ahead, Swiss authorities previously confirmed to Privacy International that companies need approval in the form of an export license. We have therefore provided our new evidence to the relevant Swiss authorities, who have confirmed that in addition to other measures they have now instructed customs authorities to investigate.


Yes, Google Maps is tracking you. Here's how to stop it | VentureBeat | Mobile | by Dylan Tweney

Yes, Google Maps is tracking you. Here’s how to stop it | VentureBeat | Mobile | by Dylan Tweney.

Yes, Google Maps is tracking you. Here’s how to stop it

Above: Google’s location history web page shows all the places you’ve been, as logged by Google Maps.

Google is probably logging your location, step by step, via Google Maps.

Want to see what kind of data it has on you? Check outGoogle’s own location history map, which lets you see the path you’ve traced for any given day that your smartphone has been running Google Maps.

In the screenshot above, it shows some of my peregrinations around Paris in June of this year.

This location history page has actually been available for several years, since Google first rolled it out as part of Latitude, its now-defunct location-sharing app. Cnet noticed it in December, 2013, TechCrunchpicked it up a few days later, and now Junkee.com noticed it last week.

We’re highlighting it again because it’s trivially easy to turn off Google Maps location-tracking, if you want to.


The Insidiousness of Facebook Messenger's Mobile App Terms of Service | Sam Fiorella

The Insidiousness of Facebook Messenger’s Mobile App Terms of Service | Sam Fiorella.

Sam Fiorella

 

How much access to your (and your friends’) personal data are you prepared to share for access to free mobile apps? I suspect the amount is significantly less than that which you actually agreed to share when blindly accepting the Terms of Service.

Case in point: Facebook’s Messenger App, which boasts over 1,000,000,000 downloads, requires the acceptance of an alarming amount of personal data and, even more startling, direct control over your mobile device. I’m willing to bet that few, if any, of those who downloaded this app read the full Terms of Service before accepting them and downloading the app.

2013-11-30-Messenger.jpg

The Facebook Messenger app is a standalone version of the instant chat feature within the social network. You can easily access this within the Facebook app on your mobile device, but opening the full application also requires more memory, bandwidth, and battery life. As a result, Facebook offers this one feature as a standalone app in which you can instantly chat with your Facebook friends without having to launch the full Facebook app.

If you’re one of those 1,000,000,000 people who have downloaded this app, take a moment to read the following. I’ve posted, word for word, a few of the most aggressive app permission you’ve accepted.

    • Allows the app to change the state of network connectivity


  • Allows the app to call phone numbers without your intervention. This may result in unexpected charges or calls. Malicious apps may cost you money by making calls without your confirmation.


  • Allows the app to send SMS messages. This may result in unexpected charges. Malicious apps may cost you money by sending messages without your confirmation.


  • Allows the app to record audio with microphone. This permission allows the app to record audio at any time without your confirmation.


  • Allows the app to take pictures and videos with the camera. This permission allows the app to use the camera at any time without your confirmation.


  • Allows the app to read you phone’s call log, including data about incoming and outgoing calls. This permission allows apps to save your call log data, and malicious apps may share call log data without your knowledge.


  • Allows the app to read data about your contacts stored on your phone, including the frequency with which you’ve called, emailed, or communicated in other ways with specific individuals.


  • Allows the app to read personal profile information stored on your device, such as your name and contact information. This means the app can identify you and may send your profile information to others.


  • Allows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call.


  • Allows the app to get a list of accounts known by the phone. This may include any accounts created by applications you have installed.


Psst! Your phone is snooping on you. What you need to know and how to stop it – video | Technology | theguardian.com

Psst! Your phone is snooping on you. What you need to know and how to stop it – video | Technology | theguardian.com.


Televisión china acusa al iPhone de amenazar la seguridad nacional – BioBioChile

Televisión china acusa al iPhone de amenazar la seguridad nacional – BioBioChile.


Yutaka Tsutano (CC)

Yutaka Tsutano (CC)

Publicado por Carolina Reyes | La Información es de Agencia AFP
Los teléfonos iPhone vendidos por el estadounidense Apple son una amenaza para la seguridad nacional de China debido a su dispositivo de geolocalización, afirmó la televisión pública CCTV.

Al hacer posible, simplemente con activar un parámetro del smartphone, seguir a una persona, el teléfono de Apple puede ser utilizado para recopilar “datos muy sensibles”, explicó Ma Ding, directora del Instituto de seguridad de internet de la Universidad de seguridad pública del pueblo.

Por ejemplo, “si el usuario es un periodista, se pueden conocer los lugares a los que fue, en donde hizo entrevistas, y se puede incluso saber sobre qué temas trabaja, políticos o económicos”, detalló Ma Ding durante un largo reportaje transmitido en la televisión pública el viernes.

Según Ma, la geolocalización de millones de usuarios de iPhone hace posible obtener informaciones sobre las condiciones de vida o la economía de un país, e incluso sobre “secretos de Estado”.

Sin embargo, varios internautas chinos acusaron a la televisión de Estado de concentrarse únicamente en los iPhone, y en su sistema operativo iOS d’Apple, ignorando los peligros potenciales de otros teléfonos inteligentes.

“Casi todos los smartphones fabricados en China funcionan con Android (el sistema operativo de Google) ¿Es más seguro? CCTV ignora deliberadamente esto y engaña al mundo”, opinó un internauta.


Llega Blackphone el teléfono que cuida tu privacidad – El Mostrador

Llega Blackphone el teléfono que cuida tu privacidad – El Mostrador.

En la era de las filtraciones llega un aparato que te protege, pero ¿es necesario? Analizamos sus ventajas y desventajas en nuestro blog de tecnología.

1

Cuando se anunció en el Congreso de Telefonía Celular en Barcelona el lanzamiento de Blackphone, un teléfono para cuidar la privacidad, los medios se apresuraron a cubrirlo. Después de todo las filtraciones de Edward Snowden estaban frescas en la memoria digital.

Cuatro meses después y con un precio de US$629 Blackphone ya puede adquirirse, pero ¿vale la pena?

“Habla y charla en libertad sabiendo que tus conversaciones están fuera del radar de vigilancia” dice la empresa al promover su producto y agrega: “Navega internet con la confianza de saber que nadie está mirando por encima de tu hombro”.

La premisa de venta es que tú estás en control de tus datos, tu dispositivo y nadie más puede acceder a tu información.


Is this the beginning of the end of the age of legal government spying? | Trevor Timm | Comment is free | theguardian.com

Is this the beginning of the end of the age of legal government spying? | Trevor Timm | Comment is free | theguardian.com.

The US supreme court’s new decision on cellphone searches could be a really big deal for the future of your privacy

banksy phone
We might not have to hand over so much of our data to the authorities with little to no oversight for too much longer. Photograph: Jules Annan / Barcroft Media

The US supreme court’s unanimous 9-0 opinion this week requiring police to get a warrant before searching your cellphone is arguably the most important legal privacy decision of the digital age. Its immediate impact will be felt by the more than 12m people who are arrested in America each year (many for minor, innocuous crimes), but the surprisingly tech-savvy opinion from Chief Justice John Roberts may also lead to far more protection than that.

Roberts’s analysis of the current state of the digital world in his Riley v Wurie opinion is was so thorough, and so sweeping, that I’d be willing to bet you won’t find many privacy and technology cases going forward thatdon’t cite this one.

From phone tracking to NSA snooping and beyond, here’s a look at the domino effect.


Supreme court endorses cellphone privacy rights in sweeping ruling | Law | theguardian.com

Supreme court endorses cellphone privacy rights in sweeping ruling | Law | theguardian.com.

Justices decide warrantless cellphone searches of people who have been arrested are not permitted under fourth amendment

 

 

Cellphone-related injuries sent three times as many people to emergency rooms in 2010 than in 2005.
Warrantless cellphone searches: unconstitutional. Photograph: Alamy

 

The US supreme court delivered a landmark endorsement of electronic privacy on Wednesday, ruling that police must obtain a warrant to search the contents of cellphones seized from people they have arrested.

All nine justices joined the ruling on a case hailed by civil liberties campaigners as a crucial test of the rights of individuals to be protected against intrusion into their ever-expanding digital lives.

The opinion of the court, delivered by chief justice John Roberts, recognised that many owners of modern cellphones “keep on their person a digital record of nearly every aspect of their lives”, which may disclose a uniquely large volume of personal information if searched.

“Modern cell phones are not just another technological convenience,” Roberts wrote. “With all they contain and all they may reveal, they hold for many Americans the privacies of life.

Reading his ruling from the bench, Roberts went on: “The fact that technology now allows an individual to carry such information in his hand does not make the information any less worthy of the protection for which the founders fought. Our answer to the question of what police must do before searching a cell phone seized incident to an arrest is accordingly simple – get a warrant.”


Apple's iOS 8 will stop retailers spying on customers via Wi-Fi | Technology | theguardian.com

Apple’s iOS 8 will stop retailers spying on customers via Wi-Fi | Technology | theguardian.com.

New software will randomise the unique device identifier of phones, protecting users against spying from shops and others

Tim Cook announces iOS 8 and Mac OS X Yosemite at WWDC in San Francisco.
Tim Cook announces iOS 8 and Mac OS X Yosemite at WWDC in San Francisco. Photograph: Xinhua/Landov/Barcroft Media

Apple’s iOS 8 will protect users from being spied on by retailers and hackers, by randomising a key piece of information phones use to connect to Wi-Fi.

Users of Apple’s next mobile operating system, due in autumn, will no longer be sharing their real “MAC address” with anyone who cares to listen – putting the brakes on attempts to use it to track shoppers.

Every networked device has a unique identifier, called a MAC (Media Access Control) address. (The MAC address is not specific to Apple devices.) That address lets networks tell whether a particular device has joined before, or block specific MAC addresses from joining, or allow only those with specific MAC addresses join. Because of how services like Wi-Fi work, phones must broadcast the MAC address widely, even to wireless networks they don’t intend to join.

As a result, some retailers have used that information to track customers as they move through stores – because the MAC address from the device shows up at different Wi-Fi points, and triangulation between a number of them plus the signal strength indicates where the phone’s owner is.

In May 2013, US retailer Nordstrom ended a programme that let it keep tabs on peoples’ shopping habits. “The test is over and we’ll now evaluate the results from it, along with results from other initiatives we have going on that are designed to better serve our customers,” the company said at the time.

But devices with iOS 8 installed will not share that information by default: instead, the phone or tablet broadcasts a fake MAC address, until the user actually joins a wireless network, at which point the real address is revealed.


Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas – The Intercept

Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas – The Intercept.

By , and 1
Featured photo - Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas Photo credit: Getty Images

The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas.

According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. Instead, the agency appears to have used access legally obtained in cooperation with the U.S. Drug Enforcement Administration to open a backdoor to the country’s cellular telephone network, enabling it to covertly record and store the “full-take audio” of every mobile call made to, from and within the Bahamas – and to replay those calls for up to a month.

SOMALGET is part of a broader NSA program called MYSTIC, which The Intercept has learned is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country.

All told, the NSA is using MYSTIC to gather personal data on mobile calls placed in countries with a combined population of more than 250 million people. And according to classified documents, the agency is seeking funding to export the sweeping surveillance capability elsewhere.

The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.

“The Bahamas is a stable democracy that shares democratic principles, personal freedoms, and rule of law with the United States,” the State Department concluded in a crime and safety report published last year. “There is little to no threat facing Americans from domestic (Bahamian) terrorism, war, or civil unrest.”

By targeting the Bahamas’ entire mobile network, the NSA is intentionally collecting and retaining intelligence on millions of people who have not been accused of any crime or terrorist activity. Nearly five million Americans visit the country each year, and many prominent U.S. citizens keep homes there, including Sen. Tom Harkin (D-Iowa), Bill Gates, and Oprah Winfrey.

In addition, the program is a serious – and perhaps illegal – abuse of the access to international phone networks that other countries willingly grant the United States for legitimate law-enforcement surveillance. If the NSA is using the Drug Enforcement Administration’s relationship to the Bahamas as a cover for secretly recording the entire country’s mobile phone calls, it could imperil the longstanding tradition of international law enforcement cooperation that the United States enjoys with its allies.

“It’s surprising, the short-sightedness of the government,” says Michael German, a fellow at New York University’s Brennan Center for Justice who spent 16 years as an FBI agent conducting undercover investigations. “That they couldn’t see how exploiting a lawful mechanism to such a degree that you might lose that justifiable access – that’s where the intelligence community is acting in a way that harms its long-term interests, and clearly the long-term national security interests of the United States.”


¿Por qué los usuarios abandonan WhatsApp y se mudan en masa a Telegram?

¿Por qué los usuarios abandonan WhatsApp y se mudan en masa a Telegram?.


 

Más de 200 mil personas están migrando cada día de Whatsapp a Telegram en España, en México Argentina y Colombia  el ritmo es 20,000 personas diariamente 

¿Qué es lo que está motivando este cambio? ¿Qué está haciendo que la gente abandone en masa a Whatsapp?

Pues al parecer la clave está en la gratuidad del servicio y en su seguridad.

Telegram es un servicio de código abierto en el que si sabes programar puedes desarrollar tu propia versión. Funciona en los iPhone, en los sistemas Android, en Windows y en Mac.

La información se mantiene en la nube y se pueden crear grupos de hasta 100 personas. El chat es cifrado y puede autodestruirse  de los servidores centrales si lo deseas.


NSA and GCHQ target 'leaky' phone apps like Angry Birds to scoop user data | World news | theguardian.com

NSA and GCHQ target ‘leaky’ phone apps like Angry Birds to scoop user data | World news | theguardian.com.

 

• US and UK spy agencies piggyback on commercial data
• Details can include age, location and sexual orientation
• Documents also reveal targeted tools against individual phones

 

Angry Birds
GCHQ documents use Angry Birds – reportedly downloaded more than 1.7bn times – as a case study for app data collection.

The National Security Agency and its UK counterpart GCHQ have been developing capabilities to take advantage of “leaky” smartphone apps, such as the wildly popular Angry Birds game, that transmit users’ private information across the internet, according to top secret documents.

The data pouring onto communication networks from the new generation of iPhone and Android apps ranges from phone model and screen size to personal details such as age, gender and location. Some apps, the documents state, can share users’ most sensitive information such as sexual orientation – and one app recorded in the material even sends specific sexual preferences such as whether or not the user may be a swinger.

Many smartphone owners will be unaware of the full extent this information is being shared across the internet, and even the most sophisticated would be unlikely to realise that all of it is available for the spy agencies to collect.

Dozens of classified documents, provided to the Guardian by whistleblower Edward Snowden and reported in partnership with the New York Times and ProPublica, detail the NSA and GCHQ efforts to piggyback on this commercial data collection for their own purposes.

Scooping up information the apps are sending about their users allows the agencies to collect large quantities of mobile phone data from their existing mass surveillance tools – such as cable taps, or from international mobile networks – rather than solely from hacking into individual mobile handsets.

Exploiting phone information and location is a high-priority effort for the intelligence agencies, as terrorists and other intelligence targets make substantial use of phones in planning and carrying out their activities, for example by using phones as triggering devices in conflict zones. The NSA has cumulatively spent more than $1bn in its phone targeting efforts.

The disclosures also reveal how much the shift towards smartphone browsing could benefit spy agencies’ collection efforts.

golden nugget
A May 2010 NSA slide on the agency’s ‘perfect scenario’ for obtaining data from mobile apps. Photograph: Guardian

One slide from a May 2010 NSA presentation on getting data from smartphones – breathlessly titled “Golden Nugget!” – sets out the agency’s “perfect scenario”: “Target uploading photo to a social media site taken with a mobile device. What can we get?”

The question is answered in the notes to the slide: from that event alone, the agency said it could obtain a “possible image”, email selector, phone, buddy lists, and “a host of other social working data as well as location”.


Blackphone: el smartphone que quiere ser la pesadilla de los espías – BioBioChile

Blackphone: el smartphone que quiere ser la pesadilla de los espías – BioBioChile.


Visitas
Blackphone | Silent Circle

Blackphone | Silent Circle

Publicado por Denisse Charpentier | La Información es de Agencia AFP
Es negro, se parece a un teléfono inteligente cualquiera, pero el Blackphone tiene una cosa más: sus creadores prometen a sus propietarios que tendrán comunicaciones seguras, al amparo de los “grandes oídos” gubernamentales o de los piratas informáticos.

En pleno debate sobre la extensión de la vigilancia de los servicios de inteligencia estadounidenses, el lanzamiento del Blackphone, concebido por la firma estadounidense Silent Circle y la española Geeksphone, no se habría beneficiado de una mejor publicidad.

Pero el jefe de Silent Circle, Mike Janke, dice no haber buscado esa oportuna publicidad. Su empresa, explicó a la AFP, trabajaba sobre ese aparato desde mucho antes que el exconsultor de la agencia de inteligencia NSA Edward Snowden comenzará a divulgar documentos secretos acerca del espionaje estadounidense.

“Hicimos esto porque el problema de las comunicaciones seguras no estaba regulado”, señaló este exmiembro del cuerpo de élite de la marina estadounidense Navy Seal, quien se unió a compañeros de armas y expertos en criptografía de Silicon Valley para crear la empresa Silent Circle.

“Ofrecemos a los usuarios la posibilidad de comunicarse de manera encriptada a través de videos, textos o de llamadas orales sobre redes compatibles IP”, destacó Janke.

Su empresa no se estrena con el Blackphone. En el pasado colaboró con multinacionales y hasta con el gobierno de Tíbet en el exilio.

Las habilidades de Silent Circle han que hecho que “casi todos los grandes fabricantes de smartphones se volviesen hacia nosotros” para trabajar en un aparato seguro.


Xabber para Android: conversaciones seguras de manera fácil, sobre una plataforma libre y abierta | Manzana Mecánica

Xabber para Android: conversaciones seguras de manera fácil, sobre una plataforma libre y abierta | Manzana Mecánica.

Xabber es el mejor cliente de mensajería para Android que he encontrado hasta el momento. Viene listo para usarse con Google (GTalk), Windows Live (MSN), Facebook chat, y muchos otros sistemas de presencia online.

Esta aplicación hace muy fácil usar mensajería off-the-record, uno de los protocolos de encriptación de chat más seguros que existe, ya que además de permitir que ningún intermediario pueda leer tus mensajes, tiene denegabilidad sobre mensajes antiguos y secreto sobre mensajes pasados incluso si alguien rompe tu clave. La primera característica significa que nadie puede probar que tú enviaste un mensaje: los mensajes están encriptados pero no firmados digitalmente. La segunda característica significa que incluso si alguien tiene tu clave, no puede desencriptar tus mensajes antiguos, ya que se establece una nueva clave en cada sesión.

En comparación con otros clientes como Whatsapp, Facebook o BBM, el operador del servicio no puede leer tus mensajes, ni enviarte una clave falsa para montar un ataque de man-in-the-middle. Esta seguridad proviene en gran parte de que Xabber es software libre y abierto, con todo el código fuente disponible en GitHub.


La NSA rastrea cada día cientos de millones de celulares en el mundo, dice el Washington Post | SurySur

La NSA rastrea cada día cientos de millones de celulares en el mundo, dice el Washington Post | SurySur.

dic 5 2013

,

 

La NSA rastrea cada día cientos de millones de celulares en el mundo, dice el Washington Post

internet centro operativo}

La Agencia de Seguridad Nacional de Estados Unidos recauda diariamente más de 5 mil millones de registros de ubicación de cientos de millones de celulares en el mundo que le permiten detectar redes de interrelaciones entre usuarios mediante un programa de espionaje mucho más grande en escala que los antes revelados en los documentos secretos filtrados por Edward Snowden, reporta hoy el diario The Washington Post.

 

Los registros nutren un banco de datos que almacena información sobre la ubicación de cientos de millones de aparatos, y con nuevos programas esto se convierte en una herramienta de vigilancia masiva, informa el rotativo con base en documentos filtrados por el ex contratista de la Agencia de Seguridad Nacional (NSA, por sus siglas en inglés) y entrevistas con funcionarios estadunidesnses.

 

Un funcionario de la agencia comentó al Post que están recibiendo vastos volúmenes de datos sobre la ubicación de celulares alrededor del mundo a través de intervenir los cables que vinculan a las redes móviles a escala mundial. Aunque la NSA no tiene el objetivo de espiar los datos de ubicación de estadunidenses, obtiene información de manera incidental. Además, reporta el Post, se reacaudan datos de celulares de las decenas de millones de estadunidenses que viajan al extranjero cada año.

 

En escala, dimensión e impacto potencial sobre la privacidad, los esfuerzos para recaudar y analizar datos de ubicación podrían ser insuperables entre los programas de vigilancia de la NSA que se han divulgado desde junio. Analistas pueden encontrar teléfonos celulares en cualquier parte del mundo, rastrear sus movimientos y revelar relaciones secretas entre los individuos que los usan, indica el Post.