"Golden Nuggets" to gather data include
One of the apps the NSA and GCHQ used
Smartphone users may have numerous apps on their phones to play games, navigate and use social networking sites, but these data-using and data-gathering tools also appear to be providing a treasure trove of information for the NSA and GCHQ to exploit.
According to their reporting, the spy agencies collaborated to work out how to best obtain and store all the data, which could include,
- users' age
- sexual orientation
- address books
- marital status
- number of children,
One app GCHQ specified as being amongst its targets for gathering data is the popular game AngryBirds, while a 2010 slide from the NSA seen by the news agencies titled "Golden Nugget!" says that a,
"target uploading a photo to a social media site taken with a mobile device" is a "perfect scenario."
In practice, most major social media sites, such as Facebook and Twitter, strip photos of identifying location metadata (known as EXIF data) before publication.However, depending on when this is done during upload, such data may still, briefly, be available for collection by the agencies as it travels across the networks.
Intelligence agencies collect so much data from the app that,"you'll be able to clone Google's database" of global searches for directions, according to a top-secret N.S.A. report from 2007."It effectively means that anyone using Google Maps on a smartphone is working in support of a G.C.H.Q. system," a secret 2008 report by the British agency says.
The agencies have long been intercepting earlier generations of cellphone traffic like text messages and metadata from nearly every segment of the mobile network - and, more recently, mobile traffic running on Internet pipelines.Because those same networks carry the rush of data from leaky apps, the agencies have a ready-made way to collect and store this new resource.
Part of a statement from the NSA provided to the Guardian said,
"We collect only those communications that we are authorized by law to collect for valid foreign intelligence and counterintelligence purposes - regardless of the technical means used by the targets."