Snowden : Smartphones Can Be Remotely Controlled

Smartphone users can do "very little" to stop security services getting "total control" over their devices, US whistleblower Edward Snowden has said.

The former intelligence contractor told the BBC's Panorama that UK intelligence agency GCHQ had the power to hack into phones without their owners' knowledge.

Snowden said GCHQ could gain access to a handset by sending it an encrypted text message and use it for such things as taking pictures and listening in. The UK government declined to comment.

Edward Snowden says government phone-hacking capabilities were "named after Smurfs" Mr Snowden spoke to Panorama in Moscow, where he fled in 2013 after leaking to the media details of extensive internet and phone surveillance by his former employer, the US National Security Agency (NSA).

He did not suggest that either GCHQ or the NSA were interested in mass-monitoring of citizens' private communications but said both agencies had invested heavily in technology allowing them to hack smartphones. "They want to own your phone instead of you," he said.

Mr Snowden talked about GCHQ's "Smurf Suite", a collection of secret intercept capabilities individually named after the little blue imps of Belgian cartoon fame. "Dreamy Smurf is the power management tool which means turning your phone on and off with you knowing," he said.

"Nosey Smurf is the 'hot mic' tool. For example if it's in your pocket, [GCHQ] can turn the microphone on and listen to everything that's going on around you - even if your phone is switched off because they've got the other tools for turning it on.

"Tracker Smurf is a geo-location tool which allows [GCHQ] to follow you with a greater precision than you would get from the typical triangulation of cellphone towers."

Mr Snowden also referred to a tool known as Paranoid Smurf. "It's a self-protection tool that's used to armour [GCHQ's] manipulation of your phone. For example, if you wanted to take the phone in to get it serviced because you saw something strange going on or you suspected something was wrong, it makes it much more difficult for any technician to realise that anything's gone amiss."

Once GCHQ had gained access to a user's handset, Mr Snowden said the agency would be able to see "who you call, what you've texted, the things you've browsed, the list of your contacts, the places you've been, the wireless networks that your phone is associated with. "And they can do much more. They can photograph you".

Mr Snowden also explained that the SMS message sent by the agency to gain access to the phone would pass unnoticed by the handset's owner.
"It's called an 'exploit'," he said. "That's a specially crafted message that's texted to your number like any other text message but when it arrives at your phone it's hidden from you. It doesn't display. You paid for it [the phone] but whoever controls the software owns the phone."
Image copyright

Describing the relationship between GCHQ and its US counterpart, he said: "GCHQ is to all intents and purposes a subsidiary of the NSA. "They, the NSA, provide technology, they provide tasking and direction as to what they, GCHQ, should go after." The NSA is understood to have a similar programme to the Smurf Suite used by GCHQ on which it is reported to have spent $1bn in response to terrorists' increasing use of smartphones.

Mr Snowden said the agencies were targeting those suspected of involvement in terrorism or other serious crimes such as pedophilia "but to find out who those targets are they've got to collect mass data".

"They say, and in many cases this is true, that they're not going to read your email, for example, but they can and if they did you would never know," he said.

In a statement, a spokesperson for the UK government said: "It is long-standing policy that we do not comment on intelligence matters.
"All of GCHQ's work is carried out in accordance with a strict legal and policy framework, which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight, including from the secretary of state, the interception and intelligence services commissioners and the Parliamentary Intelligence and Security Committee. All our operational processes rigorously support this position."

The government believes Mr Snowden has caused great damage to the intelligence agencies' ability to counter threats to national security.
Mr Snowden maintains he has acted in the public interest on the grounds that the surveillance activities revealed in the thousands of documents he leaked are carried out - in his words - "without our knowledge, without our consent and without any sort of democratic participation".

US has not offered Snowden a plea deal

Snowden says he has offered to do time in prison as part of a deal to return to US, but ‘we are still waiting for them to call us back’

Snowden, who is wanted under the Espionage Act after leaking tens of thousands of top secret documents, said he had offered to do time in prison as part of a deal. The US justice department has made no effort to contact Edward Snowden to discuss a plea deal that would see him return from exile in Russia, the NSA whistleblower said in an interview on BBC Panorama.

Snowden, who is wanted under the Espionage Act after leaking tens of thousands of top secret documents, said he had offered to do time in prison as part of a deal. “We are still waiting for them to call us back,” he said.
His comments come just months after Eric Holder, who was US Attorney-General until April, said Snowden’s revelations had “spurred a necessary debate”. He also said the “possibility exists” of a plea deal.
But senior figures in the security services in both the US and UK are unforgiving, wanting him to serve a long sentence both as punishment and to act as a deterrent to others.

Former head of the NSA Michael Hayden, asked by Panorama what would happen to Snowden, said: “If you’re asking me my opinion, he’s going to die in Moscow. He’s not coming home.”

Snowden, in his first interview with the BBC since he disclosed the documents two years ago, said: “I’ve volunteered to go to prison with the government many times. What I won’t do is I won’t serve as a deterrent to people trying to do the right thing in difficult situations.”

BBC: http://bbc.in/1FSGiy5
Guardian: http://bit.ly/1hsorCH

« The Rules of Cyberspace Just Got A Bit Clearer
Safe Harbour No More. Facebook Data Transfer Deal Is Ruled Invalid »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Gigamon

Gigamon

Gigamon provides intelligent Traffic Visability solutions that provide unmatched visbility into physical & birtual networks without affecting the performance or stability of production environments.

Optiv

Optiv

Optiv is a market-leading provider of end-to-end cyber security solutions. We help clients plan, build and run successful cyber security programs that achieve business objectives.

AXA XL

AXA XL

AXA XL is the P&C and Specialty Risk Division of AXA. Professional insurance products include Cyber Insurance.

Invest Ottawa

Invest Ottawa

The IO Accelerator Program is designed to rapidly and systematically accelerate the development and commercial success of high growth technology firms.

Bellvista Capital

Bellvista Capital

Bellvista Capital connects entrepreneurs with capital and unmatched business expertise in the technology areas of Cloud Computing, Cyber Security and Data Analytics.

Cyentia Institute

Cyentia Institute

The Cyentia Institute is a research & data science firm with a mission to advance knowledge in the cybersecurity industry.

CyberCube

CyberCube

CyberCube provide world-leading cyber risk analytics for the cyber insurance market.

Hyperion Gray

Hyperion Gray

Hyperion Gray are a small research and development team focused on innovative work in a variety of areas including Software & Security Research, Penetration Testing, Incident Response, and Red Teaming

BitTrap

BitTrap

BitTrap helps companies worldwide detect attackers and put an early end to breaches, preventing data exfiltration and ransomware altogether.

NVISIONx

NVISIONx

NVISIONx data risk governance platform enables companies to gain control of their enterprise data to reduce data risks, compliance scopes and storage costs.

FCI

FCI

FCI is a NIST-Based Managed Security Service Provider (MSSP) offering Cybersecurity Compliance Enablement Technologies & Services to Financial Services organizations.

Eunetic

Eunetic

Eunetic IT security solutions - we secure your websites, emails, domains and data.

Allurity

Allurity

Allurity is a group of tech-enabled cybersecurity service providers, comprised of best-in-class experts with a common mission to enable a safe digital world.

Innov8tif

Innov8tif

Innov8tif is an AI company specialised in providing ID assurance solutions — helping digital businesses to prevent frauds by verifying and authenticating customers identity.

Leaf IT

Leaf IT

Leaf IT are a pioneering cloud-first MSP, dedicated to helping businesses in the UK and Ireland. We focus on delivering tangible results for our clients through IT transformation.

View

View

View is the leader in smart building technologies including OT cybersecurity to securely connect buildings to the cloud and manage building networks and OT devices.