{"id":143149,"date":"2015-01-26T20:25:35","date_gmt":"2015-01-26T20:25:35","guid":{"rendered":"http:\/\/rinf.com\/alt-news\/?p=143149"},"modified":"2015-01-26T20:25:35","modified_gmt":"2015-01-26T20:25:35","slug":"secret-badass-intelligence-program-spied-smartphones","status":"publish","type":"post","link":"http:\/\/rinf.com\/alt-news\/breaking-news\/secret-badass-intelligence-program-spied-smartphones\/","title":{"rendered":"Secret \u2018BADASS\u2019 Intelligence Program Spied on Smartphones"},"content":{"rendered":"<p>British and Canadian spy agencies accumulated sensitive data on smartphone users, including location, app preferences, and unique device identifiers, by piggybacking on ubiquitous software from advertising and analytics companies, according to a document obtained by NSA whistleblower Edward Snowden.<\/p>\n<p>The <a href=\"http:\/\/www.spiegel.de\/media\/media-35670.pdf\">document<\/a>, included in a trove of Snowden material released\u00a0by <em>Der Spiegel<\/em>\u00a0on January 17, outlines a secret program run by the intelligence\u00a0agencies called BADASS. The German newsweekly did not write about the BADASS document, attaching it to a broader <a href=\"http:\/\/www.spiegel.de\/international\/world\/new-snowden-docs-indicate-scope-of-nsa-preparations-for-cyber-battle-a-1013409.html\">article<\/a>\u00a0on cyberwarfare. According to <em>The Intercept<\/em>\u2018s analysis of the document, intelligence agents applied\u00a0BADASS software filters to\u00a0streams\u00a0of\u00a0intercepted\u00a0internet traffic, plucking from that traffic\u00a0unencrypted uploads from smartphones to servers run by advertising and analytics companies.<\/p>\n<p>Programmers\u00a0frequently embed code from a handful of such\u00a0companies into their smartphone apps because it helps them answer a variety of questions: How often does a particular user open the app, and at what time of day? Where does the user\u00a0live? Where does\u00a0the user\u00a0work? Where is\u00a0the user\u00a0right now? What\u2019s the phone\u2019s unique identifier? What version of Android or iOS is the device running? What\u2019s the user\u2019s IP address? Answers to those questions guide app upgrades and help target advertisements, benefits that\u00a0help explain why tracking users is not only routine in the tech industry but also considered a best practice.<\/p>\n<p>For users, however, the smartphone data routinely provided to ad and analytics companies represents a major privacy threat. When combined together, the information fragments can be used to identify specific users, and when concentrated in the hands of a small number of companies, they have proven to be irresistibly convenient targets for those engaged in mass surveillance. Although the BADASS presentation appears to be roughly four years old, at least one player in the mobile advertising and analytics space, Google, acknowledges that its servers still routinely receive unencrypted uploads from Google code embedded in\u00a0apps.<\/p>\n<p><a href=\"https:\/\/firstlook.org\/theintercept\/2015\/01\/26\/secret-badass-spy-program\/\" target=\"_blank\">Read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>British and Canadian spy agencies accumulated sensitive data on smartphone users, including location, app preferences, and unique device identifiers, by piggybacking on ubiquitous software from advertising and analytics companies, according to a document obtained by NSA whistleblower Edward Snowden. The document, included in a trove of Snowden material released\u00a0by Der Spiegel\u00a0on January 17, outlines a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":33936,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[487,1614],"tags":[],"class_list":{"0":"post-143149","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-breaking-news","8":"category-surveillance-big-brother"},"_links":{"self":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts\/143149","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/comments?post=143149"}],"version-history":[{"count":0,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts\/143149\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/media\/33936"}],"wp:attachment":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/media?parent=143149"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/categories?post=143149"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/tags?post=143149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}