HTTP/1.1 302 Found Date: Mon, 27 Jan 2014 18:23:56 GMT Server: Apache Set-Cookie: NYT-S=0MzK460oq5ZsfDXrmvxADeHJF0OrRfEO5SdeFz9JchiAIUFL2BEX5FWcV.Ynx4rkFI; expires=Wed, 26-Feb-2014 18:23:56 GMT; path=/; domain=.nytimes.com Location: http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html?_r=0 Content-Length: 0 Cneonction: close Content-Type: text/html; charset=UTF-8 HTTP/1.1 200 OK Server: Apache Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 44075 Accept-Ranges: bytes Date: Mon, 27 Jan 2014 18:23:56 GMT X-Varnish: 164534443 164534421 Age: 0 Via: 1.1 varnish Connection: keep-alive X-Cache: HIT
When a smartphone user opens Angry Birds, the popular game application, and starts slinging birds at chortling green pigs, spy agencies have plotted how to lurk in the background to snatch data revealing the playerâs location, age, sex and other personal information, according to secret British intelligence documents.
In their globe-spanning surveillance for terrorism suspects and other targets, the National Security Agency and its British counterpart have been trying to exploit a basic byproduct of modern telecommunications: With each new generation of mobile phone technology, ever greater amounts of personal data pour onto networks where spies can pick it up.
According to dozens of previously undisclosed classified documents, among the most valuable of those unintended intelligence tools are so-called leaky apps that spew everything from usersâ smartphone identification codes to where they have been that day.
The N.S.A. and Britainâs Government Communications Headquarters were working together on how to collect and store data from dozens of smartphone apps by 2007, according to the documents, provided by Edward J. Snowden, the former N.S.A. contractor. Since then, the agencies have traded recipes for grabbing location and planning data when a target uses Google Maps, and for vacuuming up address books, buddy lists, phone logs and the geographic data embedded in photos when someone sends a post to the mobile versions of Facebook, Flickr, LinkedIn, Twitter and other services.
The eavesdroppersâ pursuit of mobile networks has been outlined in earlier reports, but the secret documents, shared by The New York Times, The Guardian and ProPublica, offer far more details of their ambitions for smartphones and the apps that run on them. The efforts were part of an initiative called âthe mobile surge,â according to a 2011 British document, an analogy to the troop surges in Iraq and Afghanistan. One N.S.A. analystâs enthusiasm was evident in the breathless title â âGolden Nugget!â â given to one slide for a top-secret 2010 talk describing iPhones and Android phones as rich resources, one document notes.
The scale and the specifics of the data haul are not clear. The documents show that the N.S.A. and the British agency routinely obtain information from certain apps, particularly some of those introduced earliest to cellphones. With some newer apps, including Angry Birds, the agencies have a similar capability, the documents show, but they do not make explicit whether the spies have put that into practice. Some personal data, developed in profiles by advertising companies, could be particularly sensitive: A secret 2012 British intelligence document says that spies can scrub smartphone apps that contain details like a userâs âpolitical alignmentâ and sexual orientation.
President Obama announced new restrictions this month to better protect the privacy of ordinary Americans and foreigners from government surveillance, including limits on how the N.S.A. can view âmetadataâ of Americansâ phone calls â the routing information, time stamps and other data associated with calls. But he did not address the avalanche of information that the intelligence agencies get from leaky apps and other smartphone functions.
And while he expressed concern about advertising companies that collect information on people to send tailored ads to their mobile phones, he offered no hint that American spies routinely seize that data. Nothing in the secret reports indicates that the companies cooperate with the spy agencies to share the information; the topic is not addressed.
The agencies have long been intercepting earlier generations of cellphone traffic like text messages and metadata from nearly every segment of the mobile network â and, more recently, computer traffic running on Internet pipelines. Because those same networks carry the rush of data from leaky apps, the agencies have a ready-made way to collect and store this new resource. The documents do not address how many users might be affected, whether they include Americans, or how often, with so much information collected automatically, analysts would see personal data.
âN.S.A. does not profile everyday Americans as it carries out its foreign intelligence mission,â the agency said in a written response to questions about the program. âBecause some data of U.S. persons may at times be incidentally collected in N.S.A.’s lawful foreign intelligence mission, privacy protections for U.S. persons exist across the entire process.â Similar protections, the agency said, are in place for âinnocent foreign citizens.â
The British spy agency declined to comment on any specific program, but said all its activities complied with British law.
Two top-secret flow charts produced by the British agency in 2012 show incoming streams of information skimmed from smartphone traffic by the Americans and the British. The streams are divided into âtraditional telephonyâ â metadata â and others marked âsocial apps,â âgeo apps,â âhttp linking,â webmail, MMS and traffic associated with mobile ads, among others. (MMS refers to the mobile system for sending pictures and other multimedia, and http is the protocol for linking to websites.)
In charts showing how information flows from smartphones into the agencyâs computers, analysts included questions to be answered by the data, including âWhere was my target when they did this?â and âWhere is my target going?â
As the program accelerated, the N.S.A. nearly quadrupled its budget in a single year, to $ 767 million in 2007 from $ 204 million, according to a top-secret Canadian analysis written around the same time.
Even sophisticated users are often unaware of how smartphones offer a unique opportunity for one-stop shopping for information about them. âBy having these devices in our pockets and using them more and more,â said Philippe Langlois, who has studied the vulnerabilities of mobile phone networks and is the founder of the Paris-based company Priority One Security, âyouâre somehow becoming a sensor for the world intelligence community.â
Smartphones almost seem to make things too easy. Functioning as phones â making calls and sending texts â and as computers â surfing the web and sending emails â they generate and also rely on data. One secret report shows that just by updating Android software, a user sent nearly 500 lines of data about the phoneâs history and use onto the network.
Such information helps mobile ad companies, for example, create detailed profiles of people based on how they use their mobile device, where they travel, what apps and websites they open, and other factors. Advertising firms might triangulate web shopping data and browsing history to guess whether someone is wealthy or has children, for example.
The N.S.A. and the British agency busily scoop up this data, mining it for new information and comparing it with their lists of intelligence targets.
One secret 2010 British document suggests that the agencies collect such a huge volume of âcookiesâ â the digital traces left on a mobile device or a computer when a target visits a website â that classified computers were having trouble storing it all.
âThey are gathered in bulk, and are currently our single largest type of events,â the document says.
The two agencies displayed a particular interest in Google Maps, which is accurate to within a few yards or better in some locations. Intelligence agencies collect so much data from the app that âyouâll be able to clone Googleâs databaseâ of global searches for directions, according to a top-secret N.S.A. report from 2007.
âIt effectively means that anyone using Google Maps on a smartphone is working in support of a G.C.H.Q. system,â a secret 2008 report by the British agency says.
(In December, The Washington Post, citing the Snowden documents, reported that the N.S.A. was using metadata to track cellphone locations outside the United States and was using ad cookies to connect Internet addresses with physical locations.)
In another example, a secret 20-page British report dated 2012 includes the computer code needed for plucking the profiles generated when Android users play Angry Birds. The app was created by Rovio Entertainment, of Finland, and has been downloaded more than a billion times, the company has said.
Rovio drew public criticism in 2012 when researchers claimed that the app was tracking usersâ locations and gathering other data and passing it to mobile ad companies. In a statement on its website, Rovio says that it may collect its usersâ personal data, but that it abides by some restrictions. For example, the statement says, âRovio does not knowingly collect personal information from children under 13 years of age.â
The secret report noted that the profiles vary depending on which of the ad companies â which include Burstly and Googleâs ad services, two of the largest online advertising businesses â compiles them. Most profiles contain a string of characters that identifies the phone, along with basic data on the user like age, sex and location. One profile notes whether the user is currently listening to music or making a call, and another has an entry for household income.
Google declined to comment for this article, and Burstly did not respond to multiple requests for comment. Saara Bergstrom, a Rovio spokeswoman, said that the company had no knowledge of the intelligence programs. âNor do we have any involvement with the organizations you mentioned,â Ms. Bergstrom said, referring to the N.S.A. and the British spy agency.
Another ad company creates far more intrusive profiles that the agencies can retrieve, the report says. The apps that generate those profiles are not identified, but the company is named as Millennial Media, which has its headquarters in Baltimore.
In securities filings, Millennial documented how it began working with Rovio in 2011 to embed ad services in Angry Birds apps running on iPhones, Android phones and other devices.
According to the report, the Millennial profiles contain much of the same information as the others, but several categories listed as âoptional,â including ethnicity, marital status and sexual orientation, suggest that much wider sweeps of personal data may take place.
Possible categories for marital status, the report says, include single, married, divorced, engaged and âswingerâ; those for sexual orientation are straight, gay, bisexual and ânot sure.â It is unclear whether the ânot sureâ category exists because so many phone apps are used by children, or because insufficient data may be available.
There is no explanation of precisely how the ad company defined the categories, whether users volunteered the information, or whether the company inferred it by other means. Nor is there any discussion of why all that information would be useful for marketing â or intelligence.
The agencies have had occasional success â at least by their own reckoning â when they start with something closer to a traditional investigative tip or lead. The spies say that tracking smartphone traffic helped break up a bomb plot by Al Qaeda in Germany in 2007, and the N.S.A. bragged that to crack the plot, it wove together mobile data with emails, log-ins and web traffic. Similarly, mining smartphone data helped lead to arrests of members of a drug cartel hit squad for the 2010 murder of an employee of an American Consulate in Mexico.
But the data, whose volume is soaring as mobile devices have begun to dominate the technological landscape, is a crushing amount of information for the spies to sift through. As smartphone data builds up in N.S.A. and British databases, the agencies sometimes seem a bit at a loss on what to do with it all, the documents show. A few isolated experiments provide hints as to how unwieldy it can be.
In 2009, the American and British spy agencies each undertook a brute-force analysis of a tiny sliver of their cellphone databases. Crunching just one month of N.S.A. cellphone data, a secret report said, required 120 computers and turned up 8,615,650 âactorsâ â apparently callers of interest. A similar run using three months of British data came up with 24,760,289 actors.
âNot necessarily straightforward,â the report said of the analysis. The agenciesâ extensive computer operations had trouble sorting through the slice of data. Analysts were âdealing with immaturity,â the report said, encountering computer memory and processing problems. The report made no mention of anything suspicious in the enormous lumps of data.
More on nytimes.com
- © 2014 The New York Times Company
- Contact Us
- Work With Us
- Your Ad Choices
- Terms of Service
- Terms of Sale