Intercept, The
iPhone Secretly Send Call History To Apple, Security Firm Says
Apple emerged as a guardian of user privacy this year after fighting FBI demands to help crack into San Bernardino (CA) shooter Syed Rizwan Farook’s iPhone. The company has gone to great lengths to secure customer data in recent years, by implementing better encryption for all phones and refusing to undermine that encryption. But private information still escapes from Apple products under some circumstances.
The latest involves the company’s online syncing service iCloud. Russian digital forensics firm Elcomsoft has found that Apple’s mobile devices automatically send a user’s call history to the company’s servers if iCloud is enabled — but the data gets uploaded in many instances without user choice or notification. “You only need to have iCloud itself enabled” for the data to be sent, said Vladimir Katalov, CEO of Elcomsoft. The logs surreptitiously uploaded to Apple contain a list of all calls made and received on an iOS device, complete with phone numbers, dates and times, and duration. They also include missed and bypassed calls. Elcomsoft said Apple retains the data in a user’s iCloud account for up to four months, providing a boon to law enforcement, who may not be able to obtain the data either from the user’s carrier, who may retain the data for only a short period, or from the user’s device, if it’s encrypted with an unbreakable passcode.
TITANPOINTE: The NSA’s Spy Hub in New York, Hidden in Plain Sight
They called it Project X. It was an unusually audacious, highly sensitive assignment: to build a massive skyscraper, capable of withstanding an atomic blast, in the middle of New York City. It would have no windows, 29 floors with three basement levels, and enough food to last 1,500 people two weeks in the event of a catastrophe. But the building’s primary purpose would not be to protect humans from toxic radiation amid nuclear war. Rather, the fortified skyscraper would safeguard powerful computers, cables, and switchboards. It would house one of the most important telecommunications hubs in the United States — the world’s largest center for processing long-distance phone calls, operated by the New York Telephone Company, a subsidiary of AT&T.
Documents obtained by The Intercept from the NSA whistleblower Edward Snowden do not explicitly name 33 Thomas Street as a surveillance facility. However — taken together with architectural plans, public records, and interviews with former AT&T employees conducted for this article — they provide compelling evidence that 33 Thomas Street has served as an NSA surveillance site, code-named TITANPOINTE.
In Secret Battle, Surveillance Court Reined in FBI Use of Information Obtained From Phone Calls
Beginning over a decade ago, the country’s surveillance court intervened to limit the FBI’s ability to act on some sensitive information that it collected while monitoring phone calls. The wrangling between the FBI and the secret court is contained in previously undisclosed documents obtained by the Electronic Privacy Information Center, or EPIC. The documents reveal that the Foreign Intelligence Surveillance Court (FISA) told the FBI several times between 2005 and 2007 that using some incidental information it collected while monitoring communications in an investigation — specifically, numbers people punch into their phones after they’ve placed a call — would require an explicit authorization from the court, even in an emergency.
“The newly obtained summaries are significant because they show the power that the [Foreign Intelligence Surveillance Court] has to limit expansive FBI surveillance practices,” said Alan Butler, an attorney for EPIC. Additionally, sections of the FBI’s 2011 Domestic Investigations and Operations Guide described how the FBI currently deals with information it obtains after getting a court order for what’s called a “pen register,” or “trap and trace” on a target — a capability built into the phone lines that records incoming and outgoing phone numbers for a particular phone. The 2011 guide is currently public but heavily redacted. The Operations Guide, in addition to shedding light on how the FBI uses pen registers, reveals that the surveillance court’s pushback more than a decade ago has become internal FBI policy.
After Dallas Shootings, Police Arrest People for Criticizing Cops on Facebook and Twitter
Four men in Detroit were arrested for posts on social media that the police chief called threatening. One tweet that led to an arrest said that Micah Johnson, the man who shot police officers in Dallas, was a hero.
None of the men have been named, nor have they been charged. “I know this is a new issue, but I want these people charged with crimes,” said Detroit Police Chief James Craig. “I’ve directed my officers to prepare warrants for these four individuals, and we’ll see which venue is the best to pursue charges,” he said. Five police officers were killed in the Dallas shootings, constituting the highest number of police casualties in an attack since September 11. And as a result, law enforcement officials everywhere are suddenly much more sensitive to threats against their lives. But one result has been that several police departments across the country have arrested individuals for posts on social media accounts, often from citizen tips — raising concerns among free speech advocates.
“Arresting people for speech is something we should be very careful about,” Bruce Schneier, security technologist at the Berkman Klein Center for Internet & Society at Harvard University.
The “Cuban Twitter” Scam Is a Drop in the Internet Propaganda Bucket
The Associated Press exposed a secret program run by the US Agency for International Development to create “a Twitter-like Cuban communications network” run through “secret shell companies” in order to create the false appearance of being a privately owned operation.
Unbeknownst to the service’s Cuban users was the fact that “American contractors were gathering their private data in the hope that it might be used for political purposes” -- specifically, to manipulate those users in order to foment dissent in Cuba and subvert its government. According to top-secret documents published by The Intercept, this sort of operation is frequently discussed at western intelligence agencies, which have plotted ways to covertly use social media for ”propaganda,” “deception,” “mass messaging,” and “pushing stories.”
The documents in the former National Security Agency contractor and whistleblower Edward Snowden’s archive show that the British are particularly aggressive and eager in this regard, and formally shared their methods with their US counterparts. One previously undisclosed top-secret document -- prepared by GCHQ for the 2010 annual “SIGDEV” gathering of the “Five Eyes” surveillance alliance comprising the UK, Canada, New Zealand, Australia, and the US -- explicitly discusses ways to exploit Twitter, Facebook, YouTube, and other social media as secret platforms for propaganda.