SafeUM
Home Blog Services Download Help About Recharge
EN
RU

Axarhöfði 14, 110 Reykjavik, Iceland

Iceland - 2015
SafeUM
Blog
Services
Download
Help
About
Recharge
Menu
EN
Lang
EN
RU
Archive
TOP Security!
23 Mar 2015

10 spy programmes used by GCHQ and NSA

You’ve probably heard a lot about online mass surveillance, but maybe you’re wondering how exactly intelligence agencies are monitoring you.

Last month Kaspersky said it found personal computers in 30 countries infected with one or more of the spying programs, with the most infections seen in Iran, followed by Russia, Pakistan, Afghanistan, China, Mali, Syria, Yemen and Algeria.

The National Security Agency of the USA figured out how to hide spying software deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers, giving the agency the means to eavesdrop on the majority of the world's computers, according to cyber security researchers and former operatives. Helpfully, they like to give their surveillance programmes silly codenames, so we can explain what’s going on. Here’s our top 10 NSA and GCHQ surveillance programmes, brought to you by Amnesty International and Privacy International.

10. MUSCULAR

Who? NSA & GCHQ

What? It intercepts user data as it passes between Google servers. Yahoo! was also said to be affected.

Why should I care? Between December 2012 and January 2013, MUSCULAR collected 181 million records. But Google have now strengthened security between their servers so it’s not all bad news.

What should I do? Try not to worry, it’s not like Google is the internet or anything.

9. OPTIC NERVE

Who? GCHQ with the help of NSA.

What? A program started in 2008, Optic Nerve allowed secret access to a Yahoo! webcam chats. In one six month period in 2008 it spied on 1.8 MILLION Yahoo! users and took one still image every five minutes of video per user. Between 3-11% of the images captured by Optic Nerve captured were sexually explicit “undesirable nudity”.

Why should I care? Well, if they've owned Yahoo! webcam chats, what other video apps can they break into?

What should I do? Smile for the camera!

8. MYSTIC

Who? NSA

What? Mystic spies on every single phone call made in five target countries. In the Philippines, Kenya and Mexico, Mystic ‘only’ records the metadata (who called who, when the call happened, for how long and the location of the call if it was made on a mobile). In Afghanistan and the Bahamas, it records the content of every call made and stores it for 30 days. That’s a combined population of 250 million people whose phone calls are being secretly monitored by the NSA.

Why should I care? This is basically the NSA conducting 24 hour-a-day surveillance on entire countries.

What should I do? Don’t be born in, live in, visit or call people in the Philippines, Kenya, Mexico, Afghanistan and the Bahamas.

7. OPERATION SOCIALIST

Who? GCHQ

What? GCHQ targeted Belgacom, Belgium's largest telecommunications provider, with spyware called Regin, a malicious piece of software designed to break into Belgaom’s networks. The purpose of the GCHQ hack was to spy on phones and internet users using the Belgacom network.

Why should I care? The GCHQ attack means that anyone who used Belgacom’s networks could have been secretly spied on. This includes the European Commission, the European Parliament and the European Council. It potentially also allowed GCHQ to monitor communications transmitted between Belgacom and its international partners (the company had connections across Europe, the Middle East and North Africa).

What should I do? To be absolutely sure, avoid communications.

6. GEMALTO HACKING

Who? NSA and GCHQ

What? Gemalto is the largest SIM Card manufacturer in the world, producing two billion sim cards a year. It has 400 mobile network operator partners with 700 million subscribers. GCHQ attacked its network to steal the sim card encryption keys that protect conversations from being listened to. Gemalto said it detected attacks in 2010 and 2011 and repelled them.

Why should I care? When intelligence agencies break the locks on communications infrastructure like SIM cards, they don't just leave the doors open for government spying, they leave the doors open for identity thieves, hackers and organised criminals too. What should I do? 3 steps to ensure you and your calls are free from spying: 1. Hang up 2. Remove sim card from phone 3. Never use phone again.

We think that people are not ready for such radical steps. Moreover, it is impossible to imagine modern life without talking on the phone and messages exchange. It is much better to give preference to services and solutions that guarantee secure communication. Smart messenger SafeUM is the securest multimedia messenger that provides an unprecedented level of personal data protection. SafeUM eliminates any possibility of data interception and spoofing and also provides the parties' authentication.

5. PRISM

Who? NSA

What? According to leaked NSA slides, Prism allowed the NSA to compel companies – including Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube and Apple – to grant them access to users’ personal data on their servers. These internet companies store enormous quantities of personal information. For example, Google’s gmail service had 425 million active users worldwide in June 2012. Google’s search engine is also the most widely used in the world and it was estimated in 2012 that it processed over 5 billion search requests per day. Google by default collects and stores email and search data.

Why should I care? You know those embarrassing late night Facebook messages you send? The slightly dodgy YouTube videos you like to watch? The risqué Skype chats you have with your other half when they're travelling for work? Wonder who else is watching?

What should I do? Ummm, did we suggest not communicating already?

4. THE THREE SMURFS – Dreamy, Nosey and Tracker

Who? GCHQ

What? Dreamy Smurf is a program that allows its user to activate a target's phone when it is apparently turned off. Nosey Smurf is a “hot mic” feature that turns on the microphone on a phone to listen in to conversations going on around it. Finally, Tracker Smurf can track your location and other accompanying tools can retrieve messages, e-mails, web history, call records, videos, address book, notes, calendar from your phone. Essentially, it it’s on your phone, they can get it.

Why Should I care? Your phone – the love of your life – has been turned against you. It's not just a time waster and a way to Instagram photos of your dinner – now it's a tracking device and microphone that you willingly carry around with you all the time.

What can I do? Do not stand, sit, run or fall near someone who owns a mobile phone.

3. XKEYSCORE

Who? NSA and Australia, Canada, New Zealand and the UK have access to it. The Five countries call themselves the Five Eyes Alliance.

What? It’s an NSA search database for intercepted communications. XKeyscore is basically Google search for spies. Intelligence officers can find personal information in the database about anyone they like using search terms. Oh, and there is no need for a warrant to do this.

Why should I care? This is one giant database full of billions of people's emails, text messages and phone calls. How much worse can it get?

What can I do? Be careful what you search for, who you talk to, what you look at and what you say at all times. Spies are known to be paranoid.

AND THE JOINT WINNERS ARE:

1. UPSTREAM AND TEMPORA

Who? NSA and GCHQ

What? Undersea fibre optic cables carry 99% of the world’s communications. The NSA and GCHQ directly intercept cables connected to the US (through Upstream) and the UK (Tempora). These cables carry most of the word's communications, and a leaked slide from GCHQ expressly says they are intent on “Mastering the Internet”.

The ‘context’ of intercepted data (in other words, your emails and Facebook posts) are stored for at least three days and metadata (the websites you visited, who you emailed, when you sent your emails and the subject of your emails) are stored for 30 days. Tempora also intercepts telephone calls. GCHQ has set over 40,000 search terms and the NSA has set over 31,000 search terms which are used to determine which data should be extracted. That’s a lot of searches.

Tags:
GCHQ NSA surveillance
Source:
Amnesty International
2050
Other NEWS
3 Jul 2020 safeum news imgage An encrypted messaging service has been infiltrated by police
4 May 2020 safeum news imgage Two-Factor Authentication ​What Is It and Why You Should Use It
12 Dec 2019 safeum news imgage Encryption is under threat - this is how it affects you
4 Nov 2019 safeum news imgage Should Big Decisions Be Based on Data or Your Intuition?
7 Jun 2018 safeum news imgage VPNFilter malware infecting 500,000 devices is worse than we thought
4 Jun 2018 safeum news imgage Hackers target Booking.com in criminal bid to steal hundreds of thousands from customers
1 Jun 2018 safeum news imgage Operator of World's Top Internet Hub Sues German Spy Agency
30 May 2018 safeum news imgage US says North Korea behind malware attacks
29 May 2018 safeum news imgage Facebook and Google targeted as first GDPR complaints filed
25 May 2018 safeum news imgage A new reason to not buy these cheap Android devices
24 May 2018 safeum news imgage Flaws in smart pet devices, apps could come back to bite owners
23 May 2018 safeum news imgage Google sued for 'clandestine tracking' of 4.4m UK iPhone users' browsing data
21 May 2018 safeum news imgage LocationSmart reportedly leaked phone location data onto the web
18 May 2018 safeum news imgage The SEC created its own scammy ICO to teach investors a lesson
17 May 2018 safeum news imgage Thieves suck millions out of Mexican banks in transfer heist
All news
SafeUM
Confidential Terms of Use Our technologies Company
Follow us
Download
SafeUM © Safe Universal Messenger

Axarhöfði 14,
110 Reykjavik, Iceland

Iceland - 2015