Click to Skip Ad
Closing in...
  1. Best Robot Mop 2021
    08:29 Deals

    The world’s first self-cleaning robot mop is $100 off at Amazon – and I’m obsessed

  2. Best Meat Thermometer 2021
    09:31 Deals

    The gadget that helps you cook perfect steak is $33 at Amazon, a new all-time low

  3. Mac Mini Price Amazon
    13:52 Deals

    Hidden Amazon deal saves you $100 on Apple’s blazing-fast M1 Mac mini

  4. AirPods Pro Price
    11:35 Deals

    AirPods Pro are back down to Amazon’s lowest price of the year

  5. MacBook Pro 2021 Price
    12:16 Deals

    Apple’s M1 MacBook Pro is $200 off at Amazon, matching the lowest price ever

British spies can remotely ‘Smurf’ your iPhone and Android phone

January 28th, 2014 at 12:25 PM
GCHQ iPhone, Android Hack

Unsurprisingly, it’s not just the NSA that can hack iPhones and other mobile devices in order to retrieve data that may be relevant to an investigation. New documentation provided to The Guardian by former NSA contractor turned whistleblower Edward Snowden shows that the British GCHQ agency is also rather skilled in the art of remotely obtaining data from iOS devices and Android smartphones.

Interestingly enough, the mobile surveillance operation, which is described in slides from a presentation dating back to late May 2010, reveal that GCHQ has relied on the popular TV show The Smurfs to come up with codenames for the various spying apps that can be run on the iPhone and Android devices. Dreamy Smurf describes a way of stealthily activating a phone that’s turned off, Nosey Smurf would turn on the microphone, Tracker Smurf would geolocate a device, while Paranoid Smurf would take care of all the other Smurfs, making sure the spying tools aren’t discovered by the user. A Porus program would also deal with securing the spy software, by providing undisclosed “kernel stealth” features.

In addition to these capable Smurfs, the presentation said GCHQ could basically retrieve any file from an iPhone, including “SMS, MMS, e-mails, web history, call records, videos, photos, address book, notes, calendar,” concluding that “if [something] is on the phone, we can get it.”

The Smurf program – actually part of a Warrior Pride tool – has been ported to the iPhone sometime before the presentation, the slides seem to indicate, suggesting that even spies choose iPhone development first. A second slide from the same presentation says that Warrior Pride will have been ported to Android by Q3 2010.

In addition to dedicated tools to capture data directly from iPhone and Android devices, the NSA and QCHQ have found a way to tap the data provided by various popular mobile apps including Angry Birds, but also services such as YouTube, Facebook or Google Maps. “A more sophisticated effort, though, relied on intercepting Google Maps queries made on smartphones, and using them to collect large volumes of location information,” The Guardian writes. “So successful was this effort that one 2008 document noted that ‘[i]t effectively means that anyone using Google Maps on a smartphone is working in support of a GCHQ system.’”

Furthermore, by accessing EXIF data of photo uploads from mobile devices – a popular feature for social network users including Facebook and others – the agencies would be able to collect “almost every key detail of a user’s life: including home country, current location (through geolocation), age, gender, zip code, martial status – options included “single”, “married”, “divorced”, “swinger” and more – income, ethnicity, sexual orientation, education level, and number of children.”

While the slides offered by Snowden date back to mid-2010 describing then-sophisticated attacks, it may be logical to assume that the NSA’s and GCHQ’s spying efforts targeting mobile device users have kept up with the times and adapted their tools to match the evolution of these mobile platforms, and that the Smurfs are still in action – after all, the GCHQ presentation’s cover slide reveals that the agency wanted more, faster and better spying of mobile devices.

Slides from the NSA and GCHQ presentations detailed by The Guardian follow below.

GCHQ mobile briefing | Image source: The Guardian
GCHQ mobile briefing | Image source: The Guardian
GCHQ mobile briefing | Image source: The Guardian
NSA presentation | Image source: The Guardian

Chris Smith started writing about gadgets as a hobby, and before he knew it he was sharing his views on tech stuff with readers around the world. Whenever he's not writing about gadgets he miserably fails to stay away from them, although he desperately tries. But that's not necessarily a bad thing.

Popular News