{"id":1312,"date":"2014-01-28T21:41:23","date_gmt":"2014-01-29T02:41:23","guid":{"rendered":"http:\/\/www.opensource.im\/?p=1312"},"modified":"2014-01-28T21:41:23","modified_gmt":"2014-01-29T02:41:23","slug":"how-app-developers-leave-the-door-open-to-nsa-surveillance","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/how-app-developers-leave-the-door-open-to-nsa-surveillance.php","title":{"rendered":"How App Developers Leave the Door Open to NSA Surveillance"},"content":{"rendered":"<p><p>    U.S. and U.K. surveillance of smartphone users has been helped    by mobile developersfew of whom bother to adopt basic    encryption.  <\/p>\n<p>    News that the National Security Agency has for years harvested    personal data leaked from mobile apps such as Angry Birds    triggered a fresh wave of chatter about the extent of the NSAs    reach yesterday. However the NSA and its U.K. equivalent, GCHQ,    hardly had to break much technical ground to hoover up that    data. Few mobile apps implement encryption technology to    protect the data they send over the Internet, so the agencies    could trivially collect and decode that data using their    existing access to Internet networks.  <\/p>\n<p>    Documents seen and published by the New York Times and Guardian newspapers show that the    NSA and GCHQ can harvest information such as a persons age,    location, and sexual orientation from the data sent over the    Internet by apps. Such personal details are contained in the    data that apps send back to the companies that maintain and    support them. This includes data sent to companies that serve    and target ads in mobile apps.  <\/p>\n<p>    This is evidence of negligent levels of insecurity by app    companies, says Peter Eckersly, technology projects director for    the Electronic Frontier Foundation. Eckersly says his efforts    to persuade companies to secure Web traffic shows widespread disregard for    the risks of sending peoples data over the Internet without    protections against interception. Most companies have no    legitimate reason not to secure that data, says Eckersly.    Often the security and privacy of their users is so far down    the priority list that they havent even thought about doing    it.  <\/p>\n<p>    A 2012 study of 13,500 Android apps by    researchers in Germany found that only 0.8 percent used    encrypted connections exclusively, and that 43 percent use no    encryption at all. Last week mobile app security company    MetaIntell reported that 92 percent of the 500 most    popular Android applications communicated some data insecurely.  <\/p>\n<p>    It is often difficult to tell whether an app is using    encryption or not to transmit data. Web browsers show a padlock    icon next to a sites Web address if it is using encryption,    but there is no such equivalent for mobile apps. Manually    checking whether a mobile app is securing data transfers    involves inspecting network logs to examine how an app is    connecting to servers.  <\/p>\n<p>    The documents published on Monday single out Google Maps as    leaking particularly useful data for surveillance purposes.    Documents from both the NSA and GCHQ note how search queries    intercepted from this app can reveal a persons movements. A    2008 document from GCHQ states that a system set up to    intercept that data effectively means that anyone using Google    Maps on a smartphone is working in support of a G.C.H.Q.    system.  <\/p>\n<p>    Google made encryption the default for its Web search last    September but does not publicize which of its mobile apps use    encryption. A company spokesperson told MIT Technology    Review that current versions of the Google Maps app use    encryption to protect data sent back to the companys servers.    That suggests intelligence agencies can no longer see the    places people are searching for by intercepting Internet    traffic.  <\/p>\n<p>    The leaked documents also highlight how ad targeting technology    built into many apps can leak personal information. Many app    companies make use of technology from third party ad companies    that collect and transmit ad-tracking and ad-targeting data    (see Mobile-Ad    Firms Seek New Ways to Track You and Get    Ready for Ads That Follow You from One Device to the    Next).  <\/p>\n<p>    That data often contains profile data about a person, such as    gender, approximate age, and location. A 2012 GCHQ report    details technology designed to pluck such profiles from the    data transmitted by the game Angry Birds. MetaIntells analysis    of the current Android version of that app found that it sends    unencrypted data to AdMob, the mobile ad company owned by    Google. The 2012 report also singles out ad company Millennial, which compiles profiles that can also    include a persons ethnicity, marital status, and sexual    orientation. A spokesperson for Millennial told MIT    Technology Review that the company only gets to see data    that its partners have permission to collect from their users    and that ads are not targeted based on sexual orientation.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Here is the original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.technologyreview.com\/news\/523971\/how-app-developers-leave-the-door-open-to-nsa-surveillance\/\" title=\"How App Developers Leave the Door Open to NSA Surveillance\">How App Developers Leave the Door Open to NSA Surveillance<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> U.S. and U.K. surveillance of smartphone users has been helped by mobile developersfew of whom bother to adopt basic encryption. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-1312","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/1312"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=1312"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/1312\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=1312"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=1312"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=1312"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}