Angry Birds And The NSA

Angry Birds And The NSA

The National Security Agency and British Government Communications Headquarters have been working together since 2007 to plant surveillance into mobile phone users’ applications, allowing them to store location information, alongside a slew of other private information users put into applications.  NSA-AngryBirds

Popular app Angry Birds was targeted, alongside more common information hotspots like Facebook, LinkedIn and Twitter. The NSA was able to find out political alignment and sexual orientation, amongst other personal details on app users.

Google Maps was a prime target for the British organisation helping the NSA, being able to track users location to a few yards. The spy agencies are able to download all users data and store it onto their databases, where new information would crop up and show location, age, sex, marital status and even household income.

Using the term “leaky-apps”, the NSA and other spy agencies were capable of exploiting weaknesses on the different mobile platforms, allowing them to check in on apps without strong security. Once the app had been compromised, the spy agencies relentlessly downloaded and monitored users information.

In the leaked reports, provided by Edward Snowden, the agency does detail some success thanks to the mobile surveillance. Teams were able to capture several members of a drug cartel hit squad in Mexico and arrest them for the murder of an American Consulate in Mexico.

This one helpful act and a few others don’t really make up for the immense amount of data procured on every app user. President Obama has forced restrictions on NSA spying activity, but for mobile apps like this there is currently on restrictions and shows even more hidden details we still do not know about the NSA.

Mobile phones are more of a problem, on computers users normally do not reveal location and are not mobile, but phones provide a bit of both for spy agencies. While the location tracking may be positive for hunting criminals, both spy agencies cannot consider the vast amount of data collection worth the small rewards in Mexico.

By Walter Bailey

(Image Source: Shutterstock)

About Walter

Walter has been a technology freelance writer for several years. His focus is on Cloud Computing and Big Data.

View All Articles

Sorry, comments are closed for this post.

How Data Privacy Reform Is Wreaking Havoc In The Cloud

How Data Privacy Reform Is Wreaking Havoc In The Cloud

Data Privacy Reform Is Wreaking Havoc Nations around the globe are stepping up efforts to better protect the personal data of private citizens. In particular, cross-border data security regulations and legislative reform is on the rise. The laws must evolve in order to mitigate theft, abuse and misappropriation of personally identifiable information (PII), better guard…

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

CIOs Must Transform IT The emergence of the Cloud and its three delivery models of Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS) has dramatically impacted and forever changed the delivery of IT services. Cloud services have pierced the veil of IT by challenging traditional method’s dominance…

The Internet of Things And The Knowledge Revolution

The Internet of Things And The Knowledge Revolution

The Knowledge Revolution Think about a few things in your life right now. It really doesn’t matter what they are, as long as you interact with them daily. They could be your phone, your shoes, your watch, your car, your refrigerator, your garage door opener…you get the idea. What do all of these things have…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

You’ve Moved Your Data To The Cloud…What Now?

You’ve Moved Your Data To The Cloud…What Now?

Data To The Cloud…What Now? You’ve done the research. You’ve vetted multiple cloud solutions. You’ve chosen the right vendor. And you’ve migrated your data to the cloud. All done, right? Not so fast… While it has become a bit of a scary proposition for many organizations to put their trust in the cloud and start…

How Successful Businesses Ensure Quality Team Communication

How Successful Businesses Ensure Quality Team Communication

Quality Team Communication  (Sponsored post courtesy of Hubgets) Successful team communication and collaboration are as vital to project and overall business success as the quality of products and services an organization develops. We rely on a host of business tools to ensure appropriate customer interactions, sound product manufacturing, and smooth back-end operations. However, the interpersonal relationships…

Featured Sponsored Articles
How To Develop A Business Continuity Plan Using Internet Performance Management

How To Develop A Business Continuity Plan Using Internet Performance Management

Internet Performance Management Planning CDN Performance Series Provided By Dyn In our previous post, we laid out the problems of business continuity and Internet Performance Management in today’s online environment.  In this article, we will take a look at some of the ways you can use traffic steering capabilities to execute business continuity planning and…

Featured Sponsored Articles
Optimizing Digital Marketing Through Accessibility & Aesthetics

Optimizing Digital Marketing Through Accessibility & Aesthetics

Optimizing Digital Marketing In The Cloud Marketers are constantly looking for better ways to tantalize and engage customers, and there’s no space more competitive than the digital universe. Deliberating over pleasing layouts, effective calls to action, site responsiveness, and much more, digital marketers have more than enough to keep themselves busy without understanding the intricacies…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor