{"id":995,"date":"2020-08-11T21:21:35","date_gmt":"2020-08-11T21:21:35","guid":{"rendered":"https:\/\/osintme.com\/?p=995"},"modified":"2020-08-11T23:28:38","modified_gmt":"2020-08-11T23:28:38","slug":"the-nsas-advice-on-limiting-location-data-exposure","status":"publish","type":"post","link":"https:\/\/osintme.com\/index.php\/2020\/08\/11\/the-nsas-advice-on-limiting-location-data-exposure\/","title":{"rendered":"The NSA&#8217;s advice on limiting location data exposure"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"995\" class=\"elementor elementor-995\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-296e01d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"296e01d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-334160b\" data-id=\"334160b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7f10d4c elementor-widget elementor-widget-text-editor\" data-id=\"7f10d4c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This week the US National Security Agency (NSA) published, rather ironically, a <a href=\"https:\/\/media.defense.gov\/2020\/Aug\/04\/2002469874\/-1\/-\/0\/CSI_LIMITING_LOCATION_DATA_EXPOSURE_FINAL.PDF\">3 page long document<\/a> on the privacy risks posed by mobile devices.<\/p><p>Ironically, because the wider global public nearly exclusively associates the NSA (for years jokingly referred to as &#8220;No Such Agency&#8221;) with their mass digital surveillance and privacy infringements programs revealed by the Agency&#8217;s most famous whistleblower, <a href=\"https:\/\/twitter.com\/Snowden\">Edward Snowden<\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3d54c56 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3d54c56\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e9ef59d\" data-id=\"e9ef59d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-451dbf2 elementor-widget elementor-widget-image\" data-id=\"451dbf2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"311\" height=\"309\" src=\"https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2020\/08\/NSA-mobile-phone-safety.png?fit=311%2C309&amp;ssl=1\" class=\"attachment-large size-large wp-image-999\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2020\/08\/NSA-mobile-phone-safety.png?w=311&amp;ssl=1 311w, https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2020\/08\/NSA-mobile-phone-safety.png?resize=300%2C298&amp;ssl=1 300w, https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2020\/08\/NSA-mobile-phone-safety.png?resize=150%2C150&amp;ssl=1 150w\" sizes=\"(max-width: 311px) 100vw, 311px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">source: Chevy-Monsenhor, DeviantArt<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-baf1960 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"baf1960\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-206a113\" data-id=\"206a113\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5f13c18 elementor-widget elementor-widget-text-editor\" data-id=\"5f13c18\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This time it seems the NSA is looking out for the average citizen as opposed to spying on them (even though the document appears to be primarily directed to the US military and government employees).<\/p><p>The agency&#8217;s report highlights risks posed by mobile phone location data, which can reveal a wealth of details about the number of users in a location, users&#8217; movements and their daily routines.<\/p><p>These findings are nothing new and anybody who is interested in digital privacy is familiar with the topic.<\/p><p>Nevertheless, it&#8217;s valuable to have a professional digital intelligence agency highlight these things and organise them according to the risk.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-06a921a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"06a921a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a9d5c7c\" data-id=\"a9d5c7c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10c1e77 elementor-widget elementor-widget-heading\" data-id=\"10c1e77\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">The main takeaways of the NSA report<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d9e20ac elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d9e20ac\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f4abae7\" data-id=\"f4abae7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-76355eb elementor-widget elementor-widget-text-editor\" data-id=\"76355eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li>Mobile phone carriers are omniscient when it comes to tracking users through cellular networks. They also monetise the location data which they sell to third parties.<\/li><li>Commercially available <strong>rogue base stations*<\/strong> for mobile phone signal transmission can be used for nefarious purposes. Mobile devices will automatically try to connect to those, if their signal is stronger than the real cellular network in a particular locality.<\/li><li>Websites can use browser fingerprinting to harvest location information, while WiFi access points and Bluetooth sensors can reveal it.<\/li><li>GPS is NOT the same as location services. Even if GPS \/ cellular data are unavailable, a mobile device can calculate and identify its own location using Wi-Fi connectivity.<\/li><li>Location data is also collected by various wearable gadgets such as fitness trackers, smart watches, smart medical devices and Internet of Things (IoT) devices. Their security features can be low or simply non existent. In some cases it is not possible to secure IoT devices and prevent them from sharing their location with cloud services and systems.<\/li><li>Smartphone apps and social media can still collect and reveal location even if restricted by settings; be it through misconfiguration, errors or hidden metadata.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f1c1441 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f1c1441\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d03a7da\" data-id=\"d03a7da\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7d1a94b elementor-widget elementor-widget-text-editor\" data-id=\"7d1a94b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>*<\/strong>A rogue base station is a mobile phone GSM signal interceptor that operates outside of the boundaries set by the regulated mobile network providers. It exploits the vulnerabilities of the over 30-years old GSM technology (traditional SMS and phone calls). A home made, amateur GSM spy kit can be built for about 1000 USD. More details on how this may be done can be found <a href=\"https:\/\/www.telecomtv.com\/content\/mobile\/build-your-own-gsm-bts-for-unencrypted-traffic-with-a-raspberry-pi-13462\/\">here<\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7174963 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7174963\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3868ba1\" data-id=\"3868ba1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9bda95a elementor-widget elementor-widget-image\" data-id=\"9bda95a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"896\" height=\"504\" src=\"https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2020\/08\/rogue-mobile-phone-base-station-interceptor.jpg?fit=896%2C504&amp;ssl=1\" class=\"attachment-large size-large wp-image-1004\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2020\/08\/rogue-mobile-phone-base-station-interceptor.jpg?w=896&amp;ssl=1 896w, https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2020\/08\/rogue-mobile-phone-base-station-interceptor.jpg?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2020\/08\/rogue-mobile-phone-base-station-interceptor.jpg?resize=768%2C432&amp;ssl=1 768w\" sizes=\"(max-width: 896px) 100vw, 896px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">A power-bank and Raspberry Pi driven homebuilt rogue GSM interceptor (source: TelecomTV)<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0f9bfb0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0f9bfb0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e1e47d\" data-id=\"1e1e47d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fa5be5d elementor-widget elementor-widget-heading\" data-id=\"fa5be5d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Counter-measures<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2933239 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2933239\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5df0951\" data-id=\"5df0951\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c2386b6 elementor-widget elementor-widget-text-editor\" data-id=\"c2386b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Disable location services using devices settings.<\/li><li>Disable any equipment with Wi-Fi capabilities \/ use airplane mode if a device is not in use.<\/li><li>Limit apps permissions to the bare minimum. Leverage privacy settings where possible.<\/li><li>Do not use apps such as fitness trackers, compasses, maps.<\/li><li>Do not use wearable IoT gadgets.<\/li><li>Disable advertising wherever you see it. If not possible, reset the advertising ID frequently.<\/li><li>Do not use the &#8220;Find my Phone&#8221; features.<\/li><li>Do not browse the web on mobile devices.<\/li><li>Use a VPN.<\/li><li>Avoid using cloud storage.<\/li><li>The best countermeasure of all is leaving a mobile device behind, turned off, in a Faraday bag&#8230;<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ec96b82 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ec96b82\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1913959\" data-id=\"1913959\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-66d2f32 elementor-widget elementor-widget-text-editor\" data-id=\"66d2f32\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><em>Do all these privacy precautions sound unrealistic? <\/em><\/strong><\/p><p><strong><em>That&#8217;s because to a large extent they are, at least to the average person who is relying on mobile devices on a daily basis. <\/em><\/strong><\/p><p><strong><em>Next week I want to cover another angle of digital privacy violations in our homes &#8211; the smart TVs&#8230;<\/em><\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>We take a look a the NSA&#8217;s recently released document that covers tangible risks posed by the mobile technology, from smartphones and IoT devices to wearable gadgets and privacy breaching apps.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"off","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[18],"tags":[47,106,105,104,14],"class_list":["post-995","post","type-post","status-publish","format-standard","hentry","category-digital-privacy-security","tag-geolocation","tag-iot","tag-mobile","tag-nsa","tag-privacy"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts\/995","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/comments?post=995"}],"version-history":[{"count":16,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts\/995\/revisions"}],"predecessor-version":[{"id":1013,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts\/995\/revisions\/1013"}],"wp:attachment":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/media?parent=995"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/categories?post=995"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/tags?post=995"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}