[Q] NSA Can Spy on Smart Phone Data

Search This thread

Memethecat

Senior Member
Mar 26, 2013
176
80
Isle of Yew
Really, all this NSA bs is nothing new. If you are just now aware that spy agencies can spy on you now, well welcome to the modern age. They could spy on your phone even before smartphones existed.
Now what they are mostly doing is "Data Mining" on top of being able to hear what you say and if you really think you can do something against it, think again. And BTW, every developed country does it. The whole evil NSA is just antiamerican propaganda. If you think the russians are not spying or the chinese are not spying, think again. Maybe this will ease your conscience a bit by knowing that everybody spies.
If you are afraid of being spied and you have valuable information, you should not be asking major geopolitical agencies to change their policy, instead you should get off the internet. These are matters of "National Security".

Wellcome to the information age.
Information is power.

Yes, anybody with half a brain has been aware of mobile phone vulnerabilities for 15yrs plus.
Anti American propaganda? No, just anti American.
China and Russia aren't using this technology to murder civilians across Africa and the Middle East, to extradite innocent people and journalists from around the globe to torture and imprison without charge. To start wars on the false pretext of "national security". Pouring trillions of $$s of weaponry into fragile regions and watching the massacres unfold. China and Russia don't have public contracts, a bill of rights with their citizenry outlawing the surveillance being conducted on behalf of a few greedy, sick individuals.
The "everyone's doing it" argument isn't gonna fly, if the US and it's allies put half the time, effort and money into making the internet safe, secure and truly private it might be able to scale that moral high ground it misleadingly claims. If that happened it'd be an example that the peoples of other countries would demand and eventually get.
Sadly, it's chosen the opposite.

Sent from my Xperia S using XDA Premium 4 mobile app
 

shadowcore

Senior Member
Apr 26, 2013
680
117
Hell
OnePlus 8T
Xiaomi Poco F3
Yes, anybody with half a brain has been aware of mobile phone vulnerabilities for 15yrs plus.
Anti American propaganda? No, just anti American.
China and Russia aren't using this technology to murder civilians across Africa and the Middle East, to extradite innocent people and journalists from around the globe to torture and imprison without charge.
Russia instead sends FSB agents and poisons people which it dislikes with polonium. Yes, give them time and everyone will surprise you...

To start wars on the false pretext of "national security".
How do you know its false? At least from what I hear, the people they kill or intend to kill mostly happen to be extremists, the rest, collateral damage.
Yes, innocents do die but I dont see how that is of any concern to anybody in power nowadays.

Pouring trillions of $$s of weaponry into fragile regions and watching the massacres unfold.
Thats what the EU, BRICS and many other arms dealers do. War is business.

China and Russia don't have public contracts, a bill of rights with their citizenry outlawing the surveillance being conducted on behalf of a few greedy, sick individuals
You apparently never heard of the great friewall of china. Chinese Gov sponsored groups are monitoring, hacking and so on all the time.
.
The "everyone's doing it" argument isn't gonna fly, if the US and it's allies put half the time, effort and money into making the internet safe, secure and truly private it might be able to scale that moral high ground it misleadingly claims. If that happened it'd be an example that the peoples of other countries would demand and eventually get.
Sadly, it's chosen the opposite.
Sent from my Xperia S using XDA Premium 4 mobile app

Thats true, Listen, I am not defending what all these allegations of NSA mass data mining and privacy intrusions claim. I am just sceptical that all of this seems to have caught wind when E:Snowden did what he did. Its not like NSA is the only "agency" on the world that does these sort of things.
We just got a glimpse of how Security-Espionage agencies work.
I would be really surprised if china and russia are not aspiring or doing the same thing. Its seems all like some cold war style propaganda coupled with a scandal. FYI, if you are american, complaining about it now is nonsense. Did notall of this start with PATRIOT Act?
 
Last edited:

meskes

Senior Member
Feb 7, 2012
230
41
Tucson
I agree .... just recently a criminal in my area was found and arrested after the police called his cell phone provider and had them track him for them... now it's good that a criminal was caught but the possibility of abuse of the tracking abilities of these phones is too risky for me .... I would love to see some privacy apps come out that can get a handle on this issue.

They can do that via cell triangulation only, I'm afraid to say.

Sent from my Verizon Wireless Samsung Galaxy SIII, via Tapatalk.
 

itman-ch

Member
Apr 23, 2008
49
15
Zürich
i would love to see some digits on how many of those newly-security-aware-guys (nsa-g) still happyly install every crap google play has to offer while keep running the FB-app in the background...

security is also a mindset to me.

android FOSS? http://f-droid.org
 

blind2privacy

New member
Apr 10, 2014
2
0
Ha, yeap, this is how this is being used, not to protect us from terrorist's but according to reports by the information commissioners office 11% relate to terrorism related enquiries and the other 79% relate to police abuse of legal statutory powers.

They're shielding themselves with the: "Well it's to stop terrorism!" when in point of fact if they had such a big problem with people leaving the country to go fight in some stupid war over a holy book, they should really just tell them "You can leave but you can't come back!" problem solved IMHO.

But what we're watching is systematic abuse of people's right's to privacy.

Oh wait your looking for the back-door, then let me point it out for you...

Fire up your Terminal and now type in: echo $uid and now tell me what is your Android Linux $uid or User ID which can also be found with the command: id

Unless I am mistaken and I believe I am not, you have no User ID. So does anyone else beside's myself know why having no User ID is a BAD very BAD thing? If you did this to another Linux user, you would ROT in Jail for the rest of your natural life, google & apple seem's to do it to millions, nay billions of users and they get away with it under the pre-text of better national security whilst they're busy selling your personal infor to the highest bidder. SCUM!

I also loved the way they denied any involvement in what they're doing whilst the NSA's own legal breif went "Eh, yeah of course they know about it!" that's just Epic. So instead of secure all of us from being Exploited in this fashion they actually condone it. DISGUSTING!

That Chinese firm that was giving them so much difficulty isnt going to be too difficult in future because they just sold most of there tech to ALCATEL-LUCENT for $750'000'000 Dollars in a deal. But who are ALCATEL I hear you ask, oh they're nobody really, they're just the guys with this unhackable OS that mimick's apache going around injecting QFire && ACID debugger across your device bridge!

You see the truth is slowly coming out that in fact the NSA has been putting back-door's in products since WIndows 95 OS2 (NSAKey.dll) and the guys who go around handling all there government contract's oh thats those awesome Guys at Alcatel who go around setting up SUPER-COMPUTER clusters with there Savage Rabbit! The back-door in the Linux kernel aimed at Phones, oh thats just Multi-Path TCP from some guys at a university in Cambridge england. "Dont worry about it!" they've got nothing to hide and neither have you! They've been doing this since the 70's how else do you think you get a transmittion onto a monitor with something like TEMPEST? Of course thats why your Unix Box has a Serial Line on the display frame buffer.. STTY

It's actually startng to look more and more like the stock markets have been rigged from the very beginnng but hey what harm could that possibly cause: We all know politicians are as corrupt as they come! Because if they think they can get away with it, of course they'll try and get away with it.. "Dutch Sandwhich" for the Win!
 
Last edited:

blind2privacy

New member
Apr 10, 2014
2
0
These guy's love themselves and when I say they love themselves I mean they really LOVE themselves!

They think they're the best of the best, whilst they're company goes around splicing cables offing to become everyones cable carrier...

Here you go, go watch the presentation @ (Sorry you'll have to add ]HTTP doubledot && //)

sites.google.com/a/nsawestafricasecurity.com/www/case-study

When you've finished looking the presentation over you might want to reflect that they're own operating system is also open source but they dont like Free GNU Software much which is painfully evident from there own pictures:

i.imgur.com/t2vr1aP.png

So my advice would be go download a copy, it's free open source software after all at the end of the day.

Now we can all enjoy the same little hedge-money of power that they think they've got all to themselves and if your in doubt that they're the hackers behind it all, just take a peek at there own properganda pictures:

img.stanleylieber.com/src/11793/img/small52113402.png
img.stanleylieber.com/src/12723/img/1320808603.jpg

What's more harmful in your opinion, an old hippy trying to get everyone interested in Freedom of Values and Free Software (which sadly all got corrupted after DARPA got there hands on Unix) or a load of Guy's who think they're the ****, whilst they're selling us all down the River?

Enjoy the download:

code.google.com/p/plan9front/

BTW - Yes, it is an Unhackable OS - in so far as it doesnt play well with Wave Devices that need a STTY to log whats on the screen! Also it's just as secure as Kerberos but without the Encryption, that can be added on Optionally later!

Nobody will know we're influencing Kids to become Killers "Call of Duty & Manhunt"
Nobody will know we're recording what they watch on TV "Microsoft IPTV"
Nobody will know we're looking at there Bank Account
Nobody will know we're reading there e-Mails
Nobody will know we're browsing every aspect of there Private Life
Nobody will know we're selling there Browsing Habits
Nobody will know we're hitting them with Targetted Advertising
Nobody will know we're influencing what they should Buy in Bulk

News Flash - WE ALL KNOW NOW F-OFF!

Do you know what we the general public would love to do? Stab your employer in the face with a Spoon!

Why a Spoon? - It's blunt you idiot - It'll hurt more! The most revealing aspect about all of this is the fact our own security services have been helping these evil insidious ass-hats by corrupting things like the BIOS and UEFI Bootloader, so they could remotely destroy peoples computers.

CRIME DOESNT PAY - TIME TO THROW ALL THIS TECHNOLOGY IN THE GARBAGE!

AN I'LL BE DAMNED SURE TO NEVER BUY ANYTHING FROM YOU PEOPLE EVER AGAIN!!
 
Last edited:

Takht84

Member
Apr 10, 2014
7
0
One interesting thing also is that my friend was getting letters from comcast while on windows. Installed Linux letters mysteriously stopped,
 

cinnaC2C

Senior Member
May 5, 2014
59
11
Florida
Cell Phone Tracking

A cell provider can track you like this regardless of what type of phone you have. It's not a smartphone thing. All they need to do is see what cell tower your phone is connected too (any network, not just data). And since it's their tower they know where it is - hence they know your approximate location from you turning your phone on.

So if you don't want your provider to know where you are - don't connect to their network.


There are companies out there as well, that, for a fee, will provide YOUR cellphone location on a map (not sure if in real time or delayed a few mins) to ANYONE. Law enforcement agencies often use this method to track a subject because it is quicker than any other means. For more info, use google or ask a PI.
 

SecUpwN

Senior Member
Jun 12, 2012
2,086
645
DEUTSCHLAND!
secupwn.github.io
There are companies out there as well, that, for a fee, will provide YOUR cellphone location on a map (not sure if in real time or delayed a few mins) to ANYONE. Law enforcement agencies often use this method to track a subject because it is quicker than any other means. For more info, use google or ask a PI.
I don't believe you. Links, references, proof for this theory?
 

cinnaC2C

Senior Member
May 5, 2014
59
11
Florida
Links and proof that can police track you

I don't believe you. Links, references, proof for this theory?

After prepairing some links for you guys to see, I was informed by XDA that I don't have the privilage to post outside links untill I reach 10 posts.

I will update this thread then.



The above two links have some of the same information and some different. Shows you how the Police do it. WITHOUT A WARRANT.

Generally, the information is sold to a third party by your cell phone provider and the third party sells to law enforcement and anyone who is saavy enough to find them over the internet.


I have to go at the moment, but I will updating this thread within the next few days with more links, and with actual companies that sell the information online in realtime to ANYONE. It is not against the law.
 

CHEF-KOCH

Senior Member
Jan 2, 2012
451
237
Have a look at THIS THREAD. It aims to develop a tool to at least warn people that they're being traced down. Developer missing. Post there and revive the project!

Yes, but that doesn't protect anything because as long as this tool exists (or any other that "claims" to secure anything) the NSA mostly knows about it and can react on it. So any tool is more or less placebo (or with a small effect). It can inform yes, but do you really think if all people have any choice? What is the alternate, use your own satellite? As long NSA working with AT&T and other providers together (in the name of "security" ....) it will always easy to get your data, no matter which tool since in this low-level area all is useless except to encrypt all the information from IN and Outgoing and not only from Outgoing alone. Tor network is a proof for that, it's only "total" secure if you also encrypt local stuff too e.g. with I2P since the notes may could be compromised.

I am afraid not only NSA but also an ordinary people around us can spy on smartphone data with a secret cell phone spy app like iKeyMonitor.

Most of effective malware needs root + a confirmation to watch your activities (admin enabled) for e.g. ransomeware or keyloggers. There are also other malware which does not need root but most of them simply use exploits in the OS or applications, but's very easy to detect since we can watch network stuff like traffic, running process,....

I don't believe you. Links, references, proof for this theory?
But I do, there is a lot of more spying that you think. Leaked documents are years old, do you really think they not improve there work on it. Look at the BlackHat page and watch there videos, the nsa chief said something like "Yes, we are spying as much as possible and need good hackers to secure our country" ... With such sentence all things are said.

Here are some papers and sources (unsorted because I have around 8000 papers):
https://www.eff.org/files/2015/02/0...erations_and_passive_signals_intelligence.pdf
http://securelist.com/blog/research/69203/inside-the-equationdrug-espionage-platform/
http://www.s3.eurecom.fr/docs/acsac13_zaddach.pdf
https://firstlook.org/theintercept/2015/03/10/ispy-cia-campaign-steal-apples-secrets/
https://firstlook.org/theintercept/2015/03/10/ispy-cia-campaign-steal-apples-secrets/
https://firstlook.org/theintercept/document/2015/03/10/smurf-capability-iphone/
https://firstlook.org/theintercept/document/2015/03/10/rocoto-implanting-iphone/
http://www.taz.de/Kontrolle-der-Geheimdienste/!134812/
http://blog.wawzyniak.de/wie-bitte/
http://www.spiegel.de/politik/deuts...e-afghanischen-minister-farhang-a-549434.html
http://statewatch.org/news/2015/feb/eu-council-dp-reg-chapII-17072-rev3-14.pdf
http://www.europarl.europa.eu/sides...EP//TEXT+REPORT+A7-2013-0402+0+DOC+XML+V0//DE
https://www2.fireeye.com/WEB-2015RPTMobileThreatAssessment.html
http://www.zeit.de/datenschutz/malte-spitz-vorratsdaten
http://www.theverge.com/2014/11/13/...s-with-blackberry-to-beef-up-android-security
http://techcrunch.com/2015/03/02/jo...e-version-of-its-sailfish-mobile-os/?ncid=rss
https://www.smacktls.com/
http://cado-nfs.gforge.inria.fr/ (cracks 512-Bit keys in around 7+ hours)
http://blog.cryptographyengineering.com/2015/03/attack-of-week-freak-or-factoring-nsa.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204
http://arstechnica.com/tech-policy/...mano-with-nsa-director-over-crypo-backdoors/#
https://www.genios.de/document/RP__69043777 <-- I guess this is what cinnaC2C is talking about
http://dip21.bundestag.de/dip21/btd/18/025/1802552.pdf (and the document for it^^)
https://firstlook.org/theintercept/2015/02/19/great-sim-heist/
https://firstlook.org/theintercept/document/2015/02/19/cne-access-core-mobile-networks-2/
https://firstlook.org/theintercept/document/2015/02/19/pcs-harvesting-scale/
http://www.popsci.com/article/techn...-cell-towers-could-be-intercepting-your-calls (about IMSI)
https://opensource.srlabs.de/projects/mobile-network-assessment-tools/wiki/CatcherCatcher
http://www.sba-research.org/wp-cont...tcher-Catcher-ACSAC2014-preprint-20140820.pdf
https://www.privacyinternational.org/illegalspying

To install any other OS does not change anything btw. sure it can help a little bit to escape from known insecure apps or leaks but as long the user have no real alternate it's a mission impossible for most of us. You can't choose any satellite, can't audit everything or don't know what the NSA have for ability's, they have billions per year and what do you have? some tools .. wow! ... Tools are general useless if it's a low level attack on hardware or the whole hdd or os is already compromised since the first day without knowing anything.
 

Phurkus

Senior Member
Feb 18, 2015
288
28
they can spy on everyone man :(

i heard on documentrys that your phone doesnt even have to be turned on so they can use the microphone to hear whats around the phone.

the only way to be secure is to pull the battery out
 

CHEF-KOCH

Senior Member
Jan 2, 2012
451
237
I wouldn't say it's impossible but it's hard and it needs a lot of knowledge to handle such low level attacks. But it's nothing new, as long there are no satellites that aren't controlled by external possible attackers it's always hard, to only stuff we can do is to use secure software, encryption and stuff which was definitely tested from the experts. And this not only started after 9/11!
There are also several malware "which fake" a shutdown, you will see a shutdown logo and the usually stuff but in fact it's listening to the wifi or as you said to the camera/microphone. To prevent this you need to remove the battery (which isn't possible on all devices).

Here are some docs info (in germany/english)
http://www.wasc.noaa.gov/wrso/security_guide/cellular.htm#Cellular Phones
http://www.br.de/fernsehen/das-erst...smartphone-als-super-wanze-108~attachment.pdf
http://www.politechbot.com/docs/fbi.ardito.roving.bug.opinion.120106.txt
http://www.washingtonsblog.com/2013...-protect-yourself-from-government-spying.html
 

Top Liked Posts

  • There are no posts matching your filters.
  • 5
    Surprise, surprise!

    SPIEGEL has learned from internal NSA documents that the US intelligence agency has the capability of tapping user data from the iPhone, devices using Android as well as BlackBerry, a system previously believed to be highly secure.
    -http://www.spiegel.de/international/world/a-920971.html-

    I believe that smartphones are a gold mine not only for spying agencies but also for commercial behavioral trackers. I would wish to see more privacy-aware development from the XDA community.

    I am aware of Xprivacy, OpenPDroid and Replicant. What other work is done to make Android more privacy friendly?
    4
    Not Anymore i found the Backdoor Nobody belive me but Why :(
    The name of the Backdoor is SevenEngine.apk delet it and no more Spying
    Sent from my GT-S5830i using xda premium

    Well... If you perhaps looked into what that app is, you'd find that it's the engine powering Samsung stock ROM email services?

    Before you claim something is a backdoor, and that removing it leads to "no more spying", what about some proper analysis of the app?

    The app is not present on stock version of Android either :)
    2
    This app dont appear is service list and used this week 190 Gb data connection Oo explain !

    Sent from my GT-S5830i using xda premium

    If it's not in the service list, it's not a service...

    190 Gb - really? I think you need to either check your stats are correct there, or look at the traffic you've sent/received in terms of Email.

    You can't "call" a backdoor using these userland tools, as a good backdoor won't appear in them...
    2
    I am aware of Xprivacy, OpenPDroid and Replicant. What other work is done to make Android more privacy friendly?
    Good thread, thanks has been given. Have a look into my signature. This is the project I am very fire and flame for at the moment. If you would like to know when being traced down by law enforcement agencies or police, participate in developing this awesome app!
    2
    NSA's sole purpose is spying, they will die but do this. They try to spy on everybody not just in USA but all over the world. Smartphones are not the only target. They put their hands on everything, I am sure Windows and other OS and most popular software are full of hidden back-doors inserted by NSA. Of course it is done without warrants. It is approved by secret judges in secret courts. Thanks Snowden and other guys to poor more light on this.