Mass Surveillance Technology Just Needs Missed Call to Hack You

Mass Surveillance Technology Just Needs Missed Call to Hack You

New Delhi:As Indians break their head over WhatsApp Spygate where Israeli bug infected select users smartphones to access the personal details, the mass surveillance technology has truly come of age and now the governments just need to make a missed call to install an “exploit link” into the device of a person they want to bug and listen in.

From the days when Mass surveillance methods involved bugging the phone or cable wires to tap phones (remember Radia tapes!) to track a person’s vehicle by installing a tracking device beneath the car, cybercriminals and hackers have devised modern and untraceable tools to hack into your systems.

The most popular mass surveillance programme is ‘PRISM’ — under which the US National Security Agency (NSA) collects user’s personal communications from various US internet companies.

‘PRISM’ allegedly collects stored Internet communications based on demands made to internet companies.

The NSA can use PRISM requests to target communications that were encrypted when they traveled across the internet backbone, to focus on stored data that telecommunication filtering systems discarded earlier, and to get access to data.

Its existence was leaked by NSA contractor and whistleblower Edward Snowden, who warned that the extent of mass data collection was far greater than the public knew.

US President Barack Obama, during a visit to Germany, stated that the NSA’s data gathering practices constitute “a circumscribed, narrow system directed at us being able to protect our people”. According to Amnesty.org, NSA and UK’s Government Communications Headquarters (GCHQ) are monitoring you with code names.

‘Muscular’ is one such project that “intercepts user data as it passes between Google servers”. Yahoo! was also said to be affected.

Between December 2012 and January 2013, ‘Muscular’ collected 181 million records but “Google has now strengthened security between their servers since then.

Another tool called ‘Optic Nerve’ allowed secret access to Yahoo! webcam chats. In a six-month period, it spied on 1.8 million Yahoo! users and took one still image every five minutes of video per user. Citizen Lab, a laboratory-based at the Munk School of Global Affairs and Public Policy of the University of Toronto, has identified over 100 cases of abusive targeting of human rights defenders and journalists in at least 20 countries across the globe via the new piece of Israeli spyware called Pegasus.

Once Pegasus is installed, it begins contacting the operator’s command and control (C&C) servers to receive and execute operators’ commands, and send back the target’s private data, including passwords, contact lists, calendar events, text messages, and live voice calls from popular mobile messaging apps. The spyware can be placed on phones using multiple vectors, or means of infection. The WhatsApp exploit from May 2019 was one such vector. (IANS)

Top Headlines

No stories found.
Sentinel Assam
www.sentinelassam.com