You are on page 1of 32

The NSA Has Inserted Its Code Into Android OS, Or Three Quarters Of All Smartphones

Submitted by Tyler Durden on 07/09/2013 20:34 -0400 Over a decade ago, it was discovered that the NSA embedded backdoor access into Windows 95, and likely into virtually all other subsequent internet connected, desktop-based operating systems. However, with the passage of time, more and more people went "mobile", and as a result the NSA had to adapt. And adapt they have: as Bloomberg reports, "The NSA is quietly writing code for Googles Android OS." Is it ironic that the same "don't be evil" Google which went to such great lengths in the aftermath of the Snowden scandal to wash its hands of snooping on its customers and even filed a request with the secretive FISA court asking permission to disclose more information about the governments data requests, is embedding NSA code into its mobile operatin g system, which according to IDC runs on three-quarters of all smartphones shipped in the first quarter? Yes, yes it is. Google spokeswoman Gina Scigliano confirms that the company has already inserted some of the NSAs programming in Android OS. "All Android code and contributors are publicly available for review at source.android.com." Scigliano says, declining to comment further. From Bloomberg: Through its open-source Android project, Google has agreed to incorporate code, first developed by the agency in 2011, into future versions of its mobile operating system, which according to market researcher IDC runs on three-quarters of the smartphones shipped globally in the first quarter. NSA officials say their code, known as Security Enhancements for Android, isolates apps to prevent hackers and marketers from gaining access to personal or corporate data stored on a device. Eventually all new phones, tablets, televisions, cars, and other devices that rely on Android will include NSA code, agency spokeswoman Vanee Vines said in an e-mailed statement. NSA researcher Stephen Smalley, who works on the program, says, Our goal is to raise the bar in the security of commodity mobile devices. See, there's no need to worry: the reason the NSA is generously providing the source code for every Google-based smartphone is for your own security. Oh but it's open-sourced, so someone else will intercept any and all attempts at malice. We forgot. The story continues:

In a 2011 presentation obtained by Bloomberg Businessweek, Smalley listed among the benefits of the program that its normally invisible to users. The programs top goal, according to that presentation: Improve our understanding of Android security. Well one wouldn't want their bug to be visible to users now, would one... Vines wouldnt say whether the agencys work on Android and other software is part of or helps with Prism. The source code is publicly available for anyone to use, and that includes the ability to review the code line by line, she said in her statement. Most of the NSAs suggested additions to the operating system can already be found buried in Googles latest release on newer devices including Sonys Xperia Z, HTCs One, and Samsung Electronics Galaxy S4. Although the features are not turned on by default, according to agency documentation, future versions will be. In May the Pentagon approved the use of smartphones and tablets that run Samsungs mobile enterprise software, Knox, which also includes NSA programming, the company wrote in a June white paper. Sony, HTC, and Samsung declined to comment. Apple appears to be immune from this unprecedented breach of customer loyalty, if only for now, although open-sourced Linux may not be as lucky: Apple (AAPL) does not accept source code from any government agencies for any of our operating systems or other products, says Kristin Huguet, a spokeswoman for the company. Its not known if any other proprietary operating systems are using NSA code. SE for Android is an offshoot of a long-running NSA project called Security-Enhanced Linux. That code was integrated a decade ago into the main version of the open-source operating system, the server platform of choice for Internet leaders including Google, Facebook (FB), and Yahoo! (YHOO). Jeff Zemlin, the executive director of the Linux Foundation, says the NSA didnt add any obvious means of eavesdropping. This code was peer -reviewed by a lot of people, he says. But that's not all: The NSA developed a separate Android project because Googles mobile OS required markedly different programming, according to Smalleys 2011 presentation. Brian Honan, an information technology consultant in Dublin, says his clients in European governments and multinational corporations are worried about how vulnerable their data are when dealing with U.S. companies. The information security world had been preoccupied with Chinese hacking until recently, Honan says. With Prism, the same accusations can be laid against the U.S. government. In short: the (big brother supervised) fun never stops in Stasi 2.0 world. Just buy your 100 P/E stocks, eat your burgers, watch your Dancing With The Stars, pay your taxes, and engage in as much internet contact with other internet-addicted organisms as possible and all shall be well. Oh, and from this...

To this (courtesy of @paradism_)

COMMENTS

Wipe the rom and roll your own. http://www.tabletroms.com/

Some good stuff in there. Couple wickedly extend battery life.

Login or register to post comments

Tue, 07/09/2013 - 20:44 | 3735801 wintermute

"Security-Enhanced" 21st Century Orwellian double-speak for "Enhanced Spyware" which is used on the sheeple.

Login or register to post comments

Tue, 07/09/2013 - 21:03 | 3735877 Pladizow

Can you hear me now? A rhetorical question that Verizon originally asked the NSA!

Login or register to post comments

Tue, 07/09/2013 - 21:09 | 3735924 Raymond K Hessel

The original IP tech was designed to be used over the AM radio frequency. Anyone know if this is true?

Login or register to post comments

Tue, 07/09/2013 - 21:13 | 3735941 philipat

Paraphrased quote Obozo: "You can talk about Big Brother and all. If there are concerns about privacy then that's a debate we should have" Um....When? "But if you don't trust your Government, The Courts and the Congress, then we are going to have some problems" Roger that. And stop calling me Shirley.

Login or register to post comments

Tue, 07/09/2013 - 21:18 | 3735956 IndicaTive

Stop being so paranoid. Google lets you go "incognito mode." Safe AND anonymous. Right?

Login or register to post comments

Tue, 07/09/2013 - 21:21 | 3735967 Ban KKiller

"Fingerprint File" Roling Stones...It's only Rock 'n' Roll. They knew!

Login or register to post comments

Tue, 07/09/2013 - 21:25 | 3735980 The Thunder Child

I understand the Amish a little bit more everyday....

Login or register to post comments

Tue, 07/09/2013 - 21:28 | 3735990 Zer0head

if it saves just one life or protects us from insider threat behavior it is all worth it

Login or register to post comments

Tue, 07/09/2013 - 21:32 | 3736000 akak

Banning all air and automobile travel would save far more than one life, so it is necessary and logical to do so, yes?

Login or register to post comments

Tue, 07/09/2013 - 21:37 | 3736009 Zer0head

that appears to be the logic used by the majority of Americans of course that majority would have a difficult time understanding said logic

Just giv'em thar TeeVee to watch sports on and a bowl full of doritos and all is right with the world

Login or register to post comments

Tue, 07/09/2013 - 21:51 | 3736033 King_of_simpletons

SELinux, SE Android has got nothing to do with snooping and exposing ones privacy. NSA developed SELinux initially in conjunction with open-source community and is now only in an advisory role to companies like www.tresys.com & Red Hat that develop policies on a full time basis. SELinux, as I know it in its current form, is only used for securing individual systems from vulnerabilities post penetration attack.

Login or register to post comments

Tue, 07/09/2013 - 22:10 | 3736099 TeamDepends

Code is code for phallus.

Login or register to post comments

Tue, 07/09/2013 - 23:55 | 3736421 Think for yourself

Hacker wisdom, not so "tin-foil" anymore: Can't trust the OS unless if you coded it Can't trust the code unless if you compiled it Can't trust the executable unless if you coded the compiler Can't trust the compiler unless if you wrote the architecture Can't trust the architecture unless if you fabbed the chip How far down the rabbit hole do you want to go? I know very little about serious crypto, but enough to understand this. And if I do, I don't to know what the NSA can do. At this point, I just use vanilla google os, assume I'm treading enemy territory and that for some reason they're letting me tread it out of the "kindness of their own heart"... there's no other way about it.

Login or register to post comments

Wed, 07/10/2013 - 00:18 | 3736467 Skateboarder

You can build a computer entirely out of NAND/NOR gates, NOT gates, and D Flip-Flops. Of course, it will be the size of a car.

Login or register to post comments

Wed, 07/10/2013 - 00:57 | 3736522 FEDbuster

or you could just pull the plug (see Amish reference above).

Login or register to post comments

Wed, 07/10/2013 - 01:26 | 3736565 flacon

"which according to IDC runs on three-quarters of all smartphones shipped in the first quarter?" So that's why AAPL stock is down.

Login or register to post comments

Wed, 07/10/2013 - 02:16 | 3736625 limit_less

flacon - Because they are not co-operating?

Login or register to post comments

Wed, 07/10/2013 - 07:12 | 3736814 GetZeeGold

I don't have a smart phone....cause I'm smart. All my cell phone can do is take phone calls....that and it's got a calculator.....but I never use that.

Login or register to post comments

Wed, 07/10/2013 - 08:47 | 3736980 TerminalDebt

If it saves one overpaid underworked government job it's all worth it

Login or register to post comments

Wed, 07/10/2013 - 02:50 | 3736664 swiss chick

+1 For some reason I can't up arrow you...

Login or register to post comments

Wed, 07/10/2013 - 03:12 | 3736683 lewy14

slightly realistic option for the dedicated: - use an FPGA - plenty big enough. Get an eval board with plenty of flash, or a USB connector for a flash drive. And an Ethernet port. No need to fab a chip, or a board for that matter. - use an open source, synthesizable CPU core from OpenCores. There are GCC ports for it. Bonus (if you know what you're doing): randomize the instruction set encoding some. It only affects a few header files. - cross-compile yourself some little network stack - ssh, true crypt, proxy server, email server, ftp, etc - from open source. The resulting machine will be pretty weak (32 bit, will run a few hundred MHZ tops; a few GB of flash) but sufficient to run a little net stack. Build it into a tiny enclosure, plug into a router where you can hide it (you can probably rig it to be powered from the ethernet connection - don't bother with WiFi) and you will have something that will be quite a challenge to hack. It would be big enough to host some primitive BBS software for a few dozen people to collaborate. I was seriously thinking of doing this as a hobby project a few years ago; I figured it was just stupid and nobody would care... now it seems like it might be interesting...

Login or register to post comments

Wed, 07/10/2013 - 08:14 | 3736908 kralizec

For the Tech-impaired...whats all that mean? Oh, forget it. I can either choose to keep my smartphone and torment the listeners...or just smash it to bits.

Login or register to post comments

Wed, 07/10/2013 - 11:59 | 3737693 akak

Or, you can do what the sanest among us have always done, and continue to do: live without a fucking cell phone. Somehow, life did manage to go on before the advent of cell phones, and I feel absolutely no hole in my life for never having had one --- quite the opposite in fact.

Login or register to post comments

Wed, 07/10/2013 - 11:05 | 3737411 aerojet

You can maybe stop at the OS--the hardware isn't going to do something you don't tell it to do. Then again, there could be microcode embedded in there to snoop, but it wouldn't necessarily work if you put a new, unrecognized OS on top of it. All network hardware is designed with snooping in mind now--it's been know for at least a decade or more that Cisco switches and all telecom equipment has to be bug-able by law.

Login or register to post comments

Tue, 07/09/2013 - 23:46 | 3736403 Suisse

SELinux is generally disabled as it interferes with tons of stuff. I almost never leave it on as it's a nightmare to allow applications to function with it on.

Login or register to post comments

Wed, 07/10/2013 - 03:56 | 3736715 malikai

Correct. SE is not a threat, but it is a good counter-threat for post-breach control. This article either stems from a clear lack of understanding towards what SE is or it is an attempt to divert anger to places where it can be easily discredited. Pay attention TD.

Login or register to post comments

Wed, 07/10/2013 - 12:03 | 3737709 Max_Power

Agreed. I do love ZH but, every once in a while the paranoia spins out of control. It is, in fact, open source. Anybody can look at the code that NSA wrote to verify its innocence or insidiousness. That it's meant to be transparent to users does not mean that they're hiding something. In the computer world, this means it's an improvement that does not impact the user/usability of the end product. Just because the NSA has done bad things does not mean that everything they do is bad. It's a bit McCarthyist to believe that EVERYTHING the NSA does is evil.

Login or register to post comments

Wed, 07/10/2013 - 15:35 | 3738663 freet0pian

Like "Think for yourself" pointed out it's not that simple, so you might want to refrain posting on matters you don't understand. Are the drivers open source? Are google apps that come with it open source? Can you compile the OS for Galaxy S1-4 etc. yourself? There is plenty of space the NSA back doors can be hiding. You can even introduce some hard to detect coding "flaw" in plain view in the truly open source portion of the system that makes the phone susceptible for attacks. So let's recap the dark waters of code NSA might be lurking in: 1. Drivers 2. Google's own closed apps

3. OEM changes to the OS 4. OEM apps 5. Other closed bloatware 6. The cross compiler 7. CPU or other chip microcode (not that likely) 8. Ethernet, Wifi, cellular or other peripheral flash, rom or eeprom 9. The guy or company compiling the OS or apps for you 10. A hard to detect flaw in the open source code

Me thinks the boat got some holes.

Login or register to post comments

Tue, 07/09/2013 - 23:03 | 3736255 Ranger4564

You might think you're being sarcastic, but part of the feudal structure is restricted travel... there is a reason roadways were private and you had to pay toll. Some people, colloquially referred to as slaves, were prohibited from travel. So the logic flows, but you haven't yet accepted the depths of this cesspool. I wrote about 3 years ago, that the roads will be transferred to the banks as collateral confiscated when the states cannot pay their debts. In Greece, the banks intended to confiscate shipping, train, and mass transit, to cripple movement. It's not even a stretch to imagine that the bankers will one day restrict mobility... DHS is ready.

Login or register to post comments

Wed, 07/10/2013 - 11:06 | 3737418 aerojet

Restricing travel would be the hill DHS dies on.

Login or register to post comments

Tue, 07/09/2013 - 21:29 | 3735988 macholatte

I believe it has already been well documented that EVERYTHING affiliated with Google is bugged by Google as well as anything they can get their hands on (see Google Earth street view spying and data mining). The NSA, and others, have learned quite a lot from Google. All of it done under the pretext of "market samples for advertising" and "providing the user with an enhanced experience" and other such crap. Has any government official in any jurisdiction in any country, city, state or province ever tried to pass a law that privacy is inherent and that one should have to "opt-in" instead of having to "opt-out"?

"A few agents of the thought Police moved always among them, spreading false rumours and marking down and eliminating the few individuals who were judged capable of becoming dangerous..." -- Orwell 1984

Login or register to post comments

Tue, 07/09/2013 - 22:37 | 3736177 FreedomGuy

Yes, yes, but it is all good for us. You give up an insigificant amount of freedom and the NSA will only use all your private information for your good to protect you from those invisible bad guys out there. Now, if you happen to run against your local incumbent your sexting and private photos will magically and accidentally appear during the campaign. You will definitely get an apology and a promise to "fully investigate" the matter at some nebulous time in the future.

Login or register to post comments

Wed, 07/10/2013 - 00:05 | 3736446 whotookmyalias

(You guys kill me, it is next to impossible to get anything on the front page of comments) It appears that this may not be a new issue: http://www.wired.com/politics/security/commentary/securitymatters/2006/05/70886

OK, tin foil hat back on for now. /sarc

Login or register to post comments

Wed, 07/10/2013 - 02:49 | 3736663 matrix2012 European Politicians Are Realizing Blackmail is the Game A revelation is dawning that the excuse of the NSA looking for terrorists but taking absolutely everything, is at last causing a light to go off. European politicians realize that they are targets and the name of the game is to blackmail anyone that the NSA simply does not like. They realize that the New York Attorney General Eliot Spitzer was targeted when he tried to go after the Wall Street Investment Bankers everyone today calls the UNTOUCHABLES. After he got rid of Hank Greenberg at AIG for Wall Street not realizing he was doing them a service, when he turned on them that was his serious mistake. They suddenly discovered checks to a hooker and his hotel in Washington was bugged when he met with her. Since then, no one has dared to investigate Wall Street. "This is not about terrurizts. This is about monitoring society and blackmailing politicians to do as the unelected bureaucracy demands." Behind the Curtain politicians are targets NOT TERRURIZTS and the agenda is to blackmail them to direct the political changes the UNELECTED bureaucracy demands. This is the real object of collecting absolutely everything. * * * * * See also "US Spying on EU A Big Charade?" The documents, seen by the Observer, show that in addition to the UK Denmark, the Netherlands, France, Germany, Spain, and Italy have all had formal agreements to provide communications data to the US. They state that the EU countries have had second and third -party status under decades-old signal intelligence (Sigint) agreements that compel them to hand over data which, in later years, experts believe, has come to include mobile phone and internet data. Under the international intelligence agreements, nations are categorised by the US according to their trust level. The US is defined as first party while the Anglo -Saxon sphere: UK, Canada, Australia and New Zealand enjoy second party trusted relationships. Countries such as Germany and France have third party, or less trusted, relationships. How to identify a limited hangout op ? By Dr. Webster Griffin Tarpley The operations of agencies aiming at the manipulation of public opinion generally involve a combination of cynical deception with the pathetic gullibility of the targeted populations. Additional info and analysis about 'Elvis' recent highlighted shows are also available at Gordon Duff's collection of articles at Veterans Today.

Login or register to post comments

Wed, 07/10/2013 - 11:13 | 3737454 aerojet

The problem with the whole "looking for terrorists" theme is that there aren't enough terrorists out there. If you consider that a database error rate runs 5-15% best case, and if the percentage of the poplulation that is a terrorist is a micro-fraction of 1%, say, 0.0001%, you kind of see the problem here--it is impossible to detect a terrorist from random noise. No amount of sophisticated technology and behavior recognition is going to help. The best you can do is maybe do a longitudinal study of specific individuals. Our government doesn't do that, however. They are trying to mass surveil while baiting suspects with entrapment schemes. It's all a crock of shit.

Login or register to post comments

Tue, 07/09/2013 - 23:08 | 3736283 Dick Buttkiss

So let's delve a little deeper into Orwell's thought via the so-called "book within the book" http://en.wikipedia.org/wiki/The_Theory_and_Practice_of_Oligarchical_Col... wherein he lays out the "controlled insanity" by which The Party exercises absolute dominion over everyone, quite literally in thought, word, and deed: With the development of television, and the technical advance which made it possible to receive and transmit simultaneously on the same instrument, private life came to an end. Every citizen, or at least every citizen important enough to be worth watching, could be kept for twenty-four hours a day under the eyes of the police and in the sound of official propaganda, with all other channels of communication closed. The possibility of enforcing not only complete obedience to the will of the State, but complete uniformity of opinion on all subjects, now existed for the first time. ... [The Party] systematically undermines the solidarity of the family, and it calls its leader by a name which is a direct appeal to the sentiment of family loyalty. Even the names of the four Ministries by which we are governed exhibit a sort of impudence in their deliberate reversal of the facts. The Ministry of Peace concerns itself with war, the Ministry of Truth with lies, the Ministry of Love with torture and the Ministry of Plenty with starvation. These contradictions are not accidental, nor do they result from ordinary hypocrisy; they are deliberate exercises in doublethink. For it is only by reconciling contradictions that power can be retained indefinitely. In no other way could the ancient cycle be broken. If human equality is to be for ever averted if the High, as we have called them, are to keep their places permanently then the prevailing mental condition must be controlled insanity.

... On the other hand [the individual's] actions are not regulated by law or by any clearly formulated code of behaviour. In Oceania there is no law. Thoughts and actions which, when detected, mean certain death are not formally forbidden, and the endless purges, arrests, tortures, imprisonments, and vaporizations are not inflicted as punishment for crimes which have actually been committed, but are merely the wiping-out of persons who might perhaps commit a crime at some time in the future. ... War is now a purely internal affair. In the past, the ruling groups of all countries, although they might recognize their common interest and therefore limit the destructiveness of war, did fight against one another, and the victor always plundered the vanquished. In our own day they are not fighting against one another at all. The war is waged by each ruling group against its own subjects, and the object of the war is not to make or prevent conquests of territory, but to keep the structure of society intact. The very word 'war', therefore, has become misleading. It would probably be accurate to say that by becoming continuous war has ceased to exist. The peculiar pressure that it exerted on human beings between the Neolithic Age and the early twentieth century has disappeared and been replaced by something quite different. The effect would be much the same if the three super-states [the equivalent of the U.S., China, and Russia, as well as their satellites], instead of fighting one another, should agree to live in perpetual peace, each inviolate within its own boundaries. For in that case each would still be a self-contained universe, freed for ever from the sobering influence of external danger. A peace that was truly permanent would be the same as a permanent war. This although the vast majority of Party members understand it only in a shallower sense is the inner meaning of the Party slogan: War is Peace. The fiendish irony, of course, is that by "everyone," Orwell does in fact mean everyone. All are under the domination of Big Brother, and thus everyone is at war with everyone else, such that Hobbes' thesis that Leviathan is necesary to preclude a "war of all against all" is precisely what Leviathan descends into. Thus is the U.S. Surveillance State merely fulfilling Orwell's prophecy, as it daily plunges the world deeper into the ordered chaos of abject sociopathy.

Login or register to post comments

Tue, 07/09/2013 - 23:53 | 3736416 macholatte

The genius of Orwell (Eric Arthur Blair (25 June 1903 21 January 1950), known by his pen name George Orwell)

was that he pretty much had it figured out long before TV. But so did the Founding Fathers long before Orwell and Sun Su long before them, as well as many others. So what does that tell you.... human nature does not change. The behaviour of dictators & tyrants is the same since the beginning of time to Caesar to Mao to Barry. The behaviour of the sheeple is also well documented.

Login or register to post comments

Wed, 07/10/2013 - 02:03 | 3736607 prains

and every so often a cleansing tonic starts the whole process over again

Login or register to post comments

Wed, 07/10/2013 - 11:16 | 3737460 aerojet

Most discussions of 1984 come to the conclusion that Orwell was writing about his time--he experienced all of it during WWII. It was not that genius, in other words.

Login or register to post comments

Tue, 07/09/2013 - 23:56 | 3736423 BLOTTO

01001110 01101111 01110100 01101000 01101001 01101110 01100111 00100000 01001110 01100101 01110111 00100000 01010101 01101110 01100100 01100101 01110010 00100000 01110100 01101000 01100101 00100000 01010011 01110101 01101110 00001101 00001010 01001000 01101001 01110011 01110100 01101111 01110010 01111001 00100000 01101001 01110011 00100000 01110010 01100101 01110000 01100101 01100001 01110100 01101001 01101110 01100111 00100000 01101001 01110100 01110011 01100101 01101100 01100110

Login or register to post comments

Wed, 07/10/2013 - 04:53 | 3736744 Bearwagon

01000001 01101100 01101100 00100000 01111001 01101111 01110101 01110010 00100000 01100010 01101001 01101110 01100001 01110010 01101001 01100101 01110011 00100000 01100001 01110010 01100101 00100000 01100010 01100101 01101100 01101111 01101110 01100111 00100000 01110100 01101111 00100000 01110101 01110011 00100001

Login or register to post comments

Wed, 07/10/2013 - 09:36 | 3737104 clones2

01001001 00100000 01110100 01101111 01110100 01100001 01101100 01101100 01111001 00100000 01101000 01100001 01100100 00100000 01110100 01101111 00100000 01100111 01101111 01101111 01100111 01101100 01100101 00100000 01110100 01101000 01101001 01110011

Login or register to post comments

Tue, 07/09/2013 - 23:57 | 3736424 BLOTTO

01100100 01101111 01110101 01100010 01101100 01100101 00100000 01110000 01101111 01110011 01110100

Login or register to post comments

Wed, 07/10/2013 - 00:04 | 3736442 HardAssets

Thanks for the link. Its great to have all the pages in The Book in one place. 1984 is the work of a genius. Thankfully, in addition to my third party erasable Kindle edition, - - -I have several copies in good, old fashioned paper.

Login or register to post comments

Wed, 07/10/2013 - 04:56 | 3736745 Bearwagon

Just in case you run low: http://ebooks.adelaide.edu.au/o/orwell/george/

Login or register to post comments

Wed, 07/10/2013 - 00:20 | 3736469 Kiwi Pete

Is that why they called it the Patriot Act? Big brother must think you're stupid.

Login or register to post comments

Wed, 07/10/2013 - 05:01 | 3736749 matrix2012

George Orwell - Complete works, Biography, Quotes, Essays http://www.george-orwell.org/

Login or register to post comments

Tue, 07/09/2013 - 21:45 | 3736031 cynicalskeptic

'Stop being so paranoid. Google lets you go "incognito mode." Safe AND anonymous. Right?'

I thought 'incognito' was a signal to start recording ALL activity so they'd have easier access to all the stuff needed to blackmail you..... and you thought your obsession with big-boobed dwarfs and farm animals was a secret....... by the way - that 'live chat/private show' you had with shortnsexxxxy38g is STILL near the top of the NSA's 'all time favorites' list

Login or register to post comments

Tue, 07/09/2013 - 22:05 | 3736090 Go Tribe

You mean the mutherfucking nigga president who just told public employees to spy on each other and report unusual behavior?

Wed, 07/10/2013 - 02:45 | 3736612 prains

you'll need to cut eye holes in the bag first, you know help let some of the hot air out

Login or register to post comments

Wed, 07/10/2013 - 08:46 | 3736977 GeezerGeek

I know of this government employee with a bogus birth certificate, questionable Social Security number, etc....is this important?

Login or register to post comments

Tue, 07/09/2013 - 23:13 | 3736306 Thorny Xi

The NSA has had beam splitters are all peering points since 2005. Look up beam splitter if you do not know what this is. They get everything. The end.

Login or register to post comments

Wed, 07/10/2013 - 07:58 | 3736881 Umh

They are more likely to be unaware of what a "peering point" is.

Login or register to post comments

Tue, 07/09/2013 - 21:14 | 3735946 max2205

Great. Mine is slowing dooooown. And it keeps asking me if I like Barry.. Wtf

Login or register to post comments

Tue, 07/09/2013 - 21:14 | 3735947 francis_sawyer

I'm just glad I never switched from my shoe phone that has the "cone of silence" feature...

Login or register to post comments

Tue, 07/09/2013 - 21:37 | 3736011 NidStyles

That's pretty Smart... ;-)

Login or register to post comments

Wed, 07/10/2013 - 07:04 | 3736809 Peter Pan

And the rest should get smart.

Login or register to post comments

Wed, 07/10/2013 - 07:53 | 3736874 mach777

They monitor everything!

99% of all users:


You're logged onto gmail, yahoo, amazon, etc? They know who you are everywhere. You're logged off but keep other cookies in your browser. They know who you are by cross-matching cookies. Those directed ads are a sign that sites know of your identity and are tracking you,

You're running an icognito browser:


They track you through your IP which is basically like your internet phone number. Incognito mode shows youve got something to hide, maybe that is even more suspectible to tracking.

You're running a safe incognito browser:

They can track you anyway if(as) the OS intercepts the information between itself and the browser before it is sent out.

You've taken safety measures with the OS and: 1. using "safe" proxy servers as gateways for your internet traffic to hide your IP. 2. hacked the TCP/IP stack to hide any traces of your original IP / address in the packets sent out

3. running a self compiled "safe browser" 4. your hardware is safe, and you're using something like TOR (is that safe?): They still got you through patterns of sites you visit often, at what times you visit them, and by text recognition matching of what you write and how fast you write it against previous data. Remember: if you haven't been using the internet safely from when you first started using it, they have a huge backlog of behavioural information that defines who you are. Your demographic, your patterns of writing, patterns of interest, patterns of reading (what you skim, what you read), what you bought, what you returned, when you piss and when you shit. They can predict what you're going to do before you do it. That is not science fiction, its real. Its just crunching of numbers if you have the information. If there is a full moon, and rains in Australia, and GLD is down more than 3% YOU're 68% likely to google midget porn. Mach

Login or register to post comments

Wed, 07/10/2013 - 08:56 | 3737002 GeezerGeek

You mentioned "when you piss and when you shit." That's been common knowledge ever since the South Park episode regarding the Toilet Safety Administration. http://www.southparkstudios.com/clips/410441/toilet-safety-administration

Login or register to post comments

Tue, 07/09/2013 - 22:08 | 3736096 Oldballplayer

That is the fifth safest phone out there.....

Login or register to post comments

Tue, 07/09/2013 - 21:16 | 3735953 Vagabond

If it is truly open source you people need to calm the fuck down. It's what we can't see that you need to worry about.

Login or register to post comments

Tue, 07/09/2013 - 21:23 | 3735971 The Thunder Child

There is definitely some more wicked shit hardwired and outside the OS that we don't know about....but if this is enough to cause people to start dropping smartphones that is enough for me.

Login or register to post comments

Tue, 07/09/2013 - 22:17 | 3736121 dryam

I guess I'm going to have start typing in code. NSA........ ....................../ /) ....................,/ ../ .................../..../ ............./ /'...'/ ` ........../'/.../..../......./ \ ........('(.......... ~/'...') .........\.................'...../ ..........''...\.......... _. ............\..............( ..............\.............\...

Login or register to post comments

Wed, 07/10/2013 - 00:29 | 3736482 ceilidh_trail

^what he did- to mr eric of google fame. (see below)

Login or register to post comments

Tue, 07/09/2013 - 22:35 | 3736152 AlaricBalth

I see nothing wrong with the coding on my Android. You all are just paranoid. See for yourself. <?xml version="1.0" encoding="utf-8"?> android:src="@drawable/icon_ca" /><?xml version="1.0" encoding=act"utf-8"?> NSA< activate microphone="@spying/main_ltr"/>we arelistening:-) activatecamera=android-http?:XMLversion-[weseeyou]

Login or register to post comments

Tue, 07/09/2013 - 23:09 | 3736287 Ranger4564

Hahaha. That's one thing I like about this site / most people... there's always some form of humor.

Login or register to post comments

Wed, 07/10/2013 - 03:36 | 3736696 matrix2012

"There is definitely some more wicked shit hardwired and outside the OS that we don't know about..." -and here comes into play the various powerful smartphones with all kinds of tracking capabilities incl. the facial recognition, various location services, and many other "knowing you" features... not to mention all the kinds of social networking facades...

Login or register to post comments

Wed, 07/10/2013 - 04:58 | 3736746 Bringin It

Pick up the sylus and give them a sample of your handwriting!

Login or register to post comments

Tue, 07/09/2013 - 21:25 | 3735979 francis_sawyer

Yeah, like... They admitted to being involved in an MK Ultra program, but they stopped all that shit years ago... Nothing to worry about anymore... Gotta go ~ Britney Spears & Lady Gaga are doing an interview on TV...

Login or register to post comments

Tue, 07/09/2013 - 22:06 | 3736091 SgtShaftoe

RFC 1149 - ip over avian carrier I.e. carrier pigeon. Look it up.

Login or register to post comments

Tue, 07/09/2013 - 22:56 | 3736226 G-R-U-N-T

Good lord, our government is soooo out of control. Next up, confiscation of your cash and assets! Government against the people, which is the usual historic outcome!

Login or register to post comments

Tue, 07/09/2013 - 23:23 | 3736348 Anusocracy

Government is always against the people and for itself. That's the only way it survives.

"Whether the mask is labelled Fascism, Democracy, or Dictatorship of the Proletariat, our great adversary remains the Apparatusthe bureaucracy, the police, the military. Not the one facing us across the frontier or the battlelines, which is not so much our enemy as our brother's enemy, but the one that calls itself our protector and makes us its slaves. No matter what the circumstances, the worst betrayal will always be to subordinate ourselves to this Apparatus, and to trample underfoot, in its service, all human values in ourselves and in others." Simone Weil, Politics, Spring 1945

Login or register to post comments

Wed, 07/10/2013 - 00:50 | 3736513 G-R-U-N-T

Nice Anusocracy and touche...

'Each type of government enacts laws that are in its own interest, a democracy democratic laws, a tyranny tyrannical ones and so on; and in enacting these laws they make it quite plain that what is right for their subjects is what is in the interest of thems elves, the rulers, and if anyone deviates from this he is punished as a lawbreaker and wrongdoer. That is what I mean when I say that right is the same thing in all states, namely the interest of the established government; and government is the strongest element in each state, and so if we argue correctly we see that right is always the same, the interest of the stronger party.' -THRASYMACHUS

Login or register to post comments

Wed, 07/10/2013 - 01:56 | 3736595 Son of Loki

"Snoop-phone" may be a better name.

Login or register to post comments

Wed, 07/10/2013 - 08:30 | 3736942 Groundhog Day

"vger"

Login or register to post comments

Wed, 07/10/2013 - 09:11 | 3737043 TeMpTeK

You pay for the bandwidth , they tax u for it then use your own bandwidth to violate your privacy .... We should celebrate independence day every day of the week just for shits and giggles.. And while we're at it we should give Egypt our constitution cuz we sure as hell aren't using it..

Login or register to post comments

Tue, 07/09/2013 - 20:46 | 3735813 Buckaroo Banzai

Google blows cock. "If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place. If you really need that kind of privacy, the reality is that search engines -including Google -- do retain this information for some time and it's important, for example, that we are all subject in the United States to the Patriot Act and it is possible that all that information could be made available to the authorities." -- Eric Schmidt, CEO, Google

Login or register to post comments

Tue, 07/09/2013 - 20:49 | 3735826 buzzsaw99

8.88 million results for the search phrase "midget tranny porn". The man can't be all bad.

Login or register to post comments

Wed, 07/10/2013 - 00:31 | 3736486 Hengist

4.76 million for "nsa midget tranny porn"

Login or register to post comments

Tue, 07/09/2013 - 20:49 | 3735827 Jumbotron

FUCK YOU NSA Can You Hear Me Now ??

Login or register to post comments

Tue, 07/09/2013 - 20:51 | 3735837 Jumbotron

You know it's the endgame on Prison Planet when every one is admitting... "Yeah...We're Bugging You....SO THE FUCK WHAT" ? I've said it once...I'll say it again.... "The Matrix was a documentary".

Login or register to post comments

Tue, 07/09/2013 - 22:17 | 3736116 ghengis86

At least Apple doesn't let the NSA in.... Bwahahahaha!!!!! Oh, I slay myself sometimes....

Login or register to post comments

Tue, 07/09/2013 - 23:39 | 3736387 Anusocracy

Ever wonder how an ant colony develops? Through culling the disobedient and rewarding the obedient?

Login or register to post comments

Wed, 07/10/2013 - 00:35 | 3736492 object_orient

I may be a worker drone, but I'm doing a really half assed job.

Login or register to post comments

Wed, 07/10/2013 - 09:15 | 3737064 post turtle saver

they pretend to pay us, we pretend to work

Login or register to post comments

Tue, 07/09/2013 - 23:15 | 3736309 Ranger4564

... rap rap rap ... Hey You, open up, we know you're in there. Even the weather channel / online stores know where my current IP is located, to be able to provide me with localized benefits, like boot steps on my throat, while I'm hiding in my parent's cellar. Why don't we all shutoff the PC's and meet at the local bars, or better idea, the lodal gun rallies. You can find me easily, just look for the guy on the floor with the boot on his throat.

Login or register to post comments

Tue, 07/09/2013 - 20:56 | 3735855 tuttisaluti

Just use Duckduckgo as search engine...

Login or register to post comments

Tue, 07/09/2013 - 21:41 | 3736022 Race Car Driver

Noob - ALL of your data is being collected, cataloged and permanently stored by numerous agencies. ALL OF YOUR DATA - from your electric use, your phone, your purchases, banking records, medical records, school records, transportation (GPS), tax info, property info ... etc. Just about everything you do. What search engine you use makes no difference.

Login or register to post comments

Tue, 07/09/2013 - 23:18 | 3736326 Ranger4564

You cannot do a single thin online that is not using Google analytics, isn't using a host of other utilities and aggragators. You cannot hide simply by Ducking.

By the way, don't bother with Firefox / Internet Private Browsing either. The clause that pops up is brilliant. Firefox won't remember a thing you did... but the agencies that are spying on everyone will definitely know. So basically, the only person that won't know what I'm doing, is me. There is not one web browser today that I know of that has not been infiltrated. But even worse, there is not one OS that I know of that has not been infiltrated. We are living in hell. Wake up, HELL.

Login or register to post comments

Wed, 07/10/2013 - 12:58 | 3737931 mkhs

So Ghostery does not block google analytics?

Login or register to post comments

Tue, 07/09/2013 - 20:59 | 3735873 Overfed

Ixquick, bitchez.

Login or register to post comments

Tue, 07/09/2013 - 21:01 | 3735885 monoloco

I wonder if he'll still be singing that tune after The Carlyle Group collects confidential corporate information from Google and uses it to manipulate their stock price, or maybe Erics been personally compromised and blackmailed into being an NSA shill.

Login or register to post comments

Tue, 07/09/2013 - 21:54 | 3736069 i-dog

"Maybe"!?! He's been a regular Bilderberg attendee for the last 7 years!

Login or register to post comments

Tue, 07/09/2013 - 21:14 | 3735945 Bearish News

"we are all subject in the United States to the Patriot Act and it is possible that all that information could be made available to the authorities." The first part of his statement is reprehensible, but he's saying that these are the laws. It's been known that Patriot Act has been used for mostly non-terrorism related crimes. http://www.washingtonpost.com/blogs/blogpost/post/patriot-act-used-to-fight-more-drugdealers-than-terrorists/2011/09/07/gIQAcmEBAK_blog.html Yet we continue to elect muppets who support, extend, and expand it. Google's hand seems to be forced by Fed thugs. With gag orders, unrelated FTC & other prosecutions, gov has a big arsenal against private cos. Is Google making moral compromises to protect itself? Yes. Are other companies making more? Yes.

Login or register to post comments

Tue, 07/09/2013 - 22:54 | 3736234 NaN

It was only a matter of time before the Patriot Act was used for other than its intended purpose. For instance, on Feb. 14, 2008, Eliot Spitzer, governor of New York, wrote a flaming editorial in Washington Post about predatory lending: http://www.washingtonpost.com/wp-dyn/content/article/2008/02/13/AR2008021302783.html The piece is very critical of the Bush administration and it's defense of banks making deceptive loans without regard to ability to pay. One month later, Spitzer resigned on March 17, 2008 after an embarrassing payment to an escort service was dug up via the Patriot Act. Very chilly.

Login or register to post comments

Tue, 07/09/2013 - 21:49 | 3736049 cynicalskeptic

"If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place." this from a company whose top 10 searches all involve 'porn' or 'sex' http://www.youtube.com/watch?v=T-TA57L0kuc

Login or register to post comments

Wed, 07/10/2013 - 05:07 | 3736753 Bringin It

The whole point of the argument is that I should curtail my liberty to avoid hassles with the state. So in the Eric "google" Schmidt perfect world - we should, for example all forget about exhibiting any kind of support for a Ron Paul-type politician less we wind up in an IRS audit for our troubles. Thanks, I'd rather have my privacy back.

Login or register to post comments

Tue, 07/09/2013 - 22:39 | 3736184 FreedomGuy

My phone service contract is up soon. I have decide to forgo all Google and Android products. I will probably go I-phone but I figure the NSA is into everything, anyway. We have arrived at Big Brother and my only recourse is to boycot anyone who willingly cooperates with the State.

Login or register to post comments

Tue, 07/09/2013 - 23:25 | 3736359 Zadok

Good luck living on the moon!

And Many More Comments