Angry Birds And The NSA

Angry Birds And The NSA

The National Security Agency and British Government Communications Headquarters have been working together since 2007 to plant surveillance into mobile phone users’ applications, allowing them to store location information, alongside a slew of other private information users put into applications.  NSA-AngryBirds

Popular app Angry Birds was targeted, alongside more common information hotspots like Facebook, LinkedIn and Twitter. The NSA was able to find out political alignment and sexual orientation, amongst other personal details on app users.

Google Maps was a prime target for the British organisation helping the NSA, being able to track users location to a few yards. The spy agencies are able to download all users data and store it onto their databases, where new information would crop up and show location, age, sex, marital status and even household income.

Using the term “leaky-apps”, the NSA and other spy agencies were capable of exploiting weaknesses on the different mobile platforms, allowing them to check in on apps without strong security. Once the app had been compromised, the spy agencies relentlessly downloaded and monitored users information.

In the leaked reports, provided by Edward Snowden, the agency does detail some success thanks to the mobile surveillance. Teams were able to capture several members of a drug cartel hit squad in Mexico and arrest them for the murder of an American Consulate in Mexico.

This one helpful act and a few others don’t really make up for the immense amount of data procured on every app user. President Obama has forced restrictions on NSA spying activity, but for mobile apps like this there is currently on restrictions and shows even more hidden details we still do not know about the NSA.

Mobile phones are more of a problem, on computers users normally do not reveal location and are not mobile, but phones provide a bit of both for spy agencies. While the location tracking may be positive for hunting criminals, both spy agencies cannot consider the vast amount of data collection worth the small rewards in Mexico.

By Walter Bailey

(Image Source: Shutterstock)

Walter

Walter has been a technology freelance writer for several years. His focus is on Cloud Computing and Big Data.

Sorry, comments are closed for this post.

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.

Contributors

Cloud Infographic – Wearable Tech And Preventative Healthcare

Cloud Infographic – Wearable Tech And Preventative Healthcare

Wearable Tech And Preventative Healthcare There are so many exciting new opportunities available to utilize wearable technology in the future.  Areas such as nanotechnology disease monitoring, crowdfunding to wearable accessories are some excellent examples of the potential. Estimates vary, but appear to suggest that the market will produce between $14-50 Billion over the next few years. Included below

Ten Tips For Successful Business Intelligence Implementation

Ten Tips For Successful Business Intelligence Implementation

Ten Tips for Successful Business Intelligence Implementation The cost of Business Intelligence (BI) software goes far beyond the purchase price. Time spent researching, implementing, and maintaining your BI investment can snowball quickly and mistakes are often expensive. Your time is valuable – save it by learning from other businesses’ experiences. We’ve compiled the top ten

Knots And Cloud Service Providers

Knots And Cloud Service Providers

How Do These Two Compare? In Boy Scouts, I learned how to tie knots. The quickest knot you can tie is the slipknot. It’s very effective for connecting one thing to another via the rope you have. It was used in setting up tents, mooring boats to docks temporarily and lifting your food up into

Aggregated News

Popular News Sources

Storage Considerations for SharePoint Backups

Storage Considerations for SharePoint Backups

Storage Considerations for SharePoint Backups Wednesday, October 29, 2014 @ 9:00 am/12:00pm ET. Backup and Restore of a SharePoint environment can be a complex endeavor as the product consists of multiple components running at various tiers, each with their own backup and restore requirements. In addition, SharePoint documents are stored as Binary Large Objects (BLOBs) in

OpenDNS Deployment Leads to Twenty-Fold Decrease in Malware Infections at Hamamatsu

OpenDNS Deployment Leads to Twenty-Fold Decrease in Malware Infections at Hamamatsu

Decreases in Malware Infections at Hamamatsu OpenDNS, a leading provider of cloud-delivered security, today announced that it has enabled Hamamatsu, a Japanese manufacturer of optical sensor technologies, to virtually eliminate malware infections across its U.S. Read the source article at Finance News About Latest Posts WalterWalter has been a technology freelance writer for several years. His

IBM and Microsoft – What Are They Doing With The Hybrid Cloud?

IBM and Microsoft – What Are They Doing With The Hybrid Cloud?

What Are They Doing With The Hybrid Cloud? “Microsoft is committed to helping enterprise customers realize the tremendous benefits of cloud computing across their own systems, partner clouds and Microsoft Azure,” said Scott Guthrie, executive vice president,Cloud and Enterprise, Microsoft. “With this … Read the source article at CNNMoney About Latest Posts WalterWalter has been a technology freelance writer