Smartphone
users can do "very little" to stop security services getting
"total control" over their devices, US whistleblower Edward Snowden
has said.
The
former intelligence contractor told the BBC's Panorama that UK intelligence
agency GCHQ had the power to hack into phones without their owners' knowledge.
Mr. Snowden said GCHQ could gain access to a handset by sending it an encrypted
text message and use it for such things as taking pictures and listening in.
Edward
Snowden says government phone-hacking capabilities were "named after
Smurfs". Mr. Snowden spoke to Panorama in Moscow, where he fled in 2013
after leaking to the media details of extensive internet and phone surveillance
by his former employer, the US National Security Agency (NSA). He did not
suggest that either GCHQ or the NSA were interested in mass-monitoring of
citizens' private communications but said both agencies had invested heavily in
technology allowing them to hack smartphones. "They want to own your phone instead of you," he said.
Mr
Snowden talked about GCHQ's "Smurf Suite", a collection of secret
intercept capabilities individually named after the little blue imps of Belgian
cartoon fame. "Dreamy Smurf is the power management tool which means
turning your phone on and off with you knowing," he said. "Nosey
Smurf is the 'hot mic' tool. For example if it's in your pocket, [GCHQ] can
turn the microphone on and listen to everything that's going on around you -
even if your phone is switched off because they've got the other tools for
turning it on. "Tracker Smurf is a
geo-location tool which allows [GCHQ] to follow you with a greater precision
than you would get from the typical triangulation of cellphone towers."
Peter
Taylor's film Edward Snowden: Spies and the Law also covers: The contentious
relationship between the British government and social media companies. The
intelligence agencies and the police want the companies to co-operate in
detecting terrorist content but the programme learns that not all companies are
prepared to co-operate to the extent that the agencies would like. Documents
leaked by Mr. Snowden that appear to show that the UK government acquired vast
amounts of communications data from inside Pakistan by secretly hacking into
routers manufactured by the US company, Cisco.
Once
GCHQ had gained access to a user's handset, Mr Snowden said the agency would be
able to see "who you call, what you've texted, the things you've browsed,
the list of your contacts, the places you've been, the wireless networks that
your phone is associated with.
"And
they can do much more. They can photograph you".
Mr. Snowden also
explained that the SMS message sent by the agency to gain access to the phone
would pass unnoticed by the handset's owner. "It's called an
'exploit'," he said. "That's a specially crafted message that's
texted to your number like any other text message but when it arrives at your
phone it's hidden from you. It doesn't display. You paid for it [the phone] but
whoever controls the software owns the phone. GCHQ is the UK government's
digital spy agency. Describing the relationship between GCHQ and its US
counterpart, he said: "GCHQ is to
all intents and purposes a subsidiary of the NSA.”
The government believes
Mr. Snowden has caused great damage to the intelligence agencies' ability to
counter threats to national security. Mr.
Snowden maintains he has acted in the public interest on the grounds that the
surveillance activities revealed in the thousands of documents he leaked are
carried out - in his words - "without
our knowledge, without our consent and without any sort of democratic
participation".
Taylor Peter, Edward Snowden
interview: 'Smartphones can be taken over' BBC News, 5 Oct. 2015.
In this article, we view Mr. Snowden’s
response to how smartphones can be taken over by the GCHQ. It is both
informational, giving us the techniques that he is using to accomplish this and
critical to what he can do with the smartphone.
In my opinion, Mr. Snowden may believe that he is doing what is right
for the greater good by potentially avoiding terrorism actions, however, it is
violating everyone else’s privacy and therefore causing public turmoil. Not
only could it be threatening to other countries as well who do not want the U.S
or the U.K to be involved in their affairs, it also serves as a warning to terrorists
out there, to be more alert on how to track their devices as it is now viral on
the internet.
No comments:
Post a Comment