The US National Security Agency developed plans to hack into data links to app stores operated by Google and Samsung to plant spyware on smartphones, a media report said yesterday. Also Read - Samsung Galaxy Chromebook Go powered by Intel Jasper Lake Celeron processor revealed
The online news site The Intercept said US intelligence developed the plan with allies in Britain, Canada, New Zealand and Australia, a group known as the “Five Eyes” alliance. The report, based on a document leaked by former NSA contractor Edward Snowden, said the plan aimed to step up surveillance efforts on smartphones. The plan appeared to have been discussed at meetings involving the intelligence services in 2011 and 2012, according to the classified document. Also Read - Free COVID-19 vaccine: Today’s Google Doodle urges all to get vaccinated, wear mask
The project called “Irritant Horn” would allow the agencies to hijack data connections to app stores and surreptitiously implant malicious software on smartphones that would allow for data to be harvested. The intelligence agencies could also use the spyware to send misinformation to targets to confuse potential adversaries, according to the report. The Intercept said the plan was motivated in part by concerns about the possibility of “another Arab Spring,” or the spread of popular movements. Also Read - HP Chromebook 11a review: Great for students, not so for professionals
The agencies were particularly interested in the Africa region, especially Senegal, Sudan and the Congo but also targeted app store servers in France, Cuba, Morocco, Switzerland, Bahamas, the Netherlands and Russia. At the time, the Google app store was called Android Market. It is now known as Google Play. In developing the plan the agencies found weaknesses in UC Browser, an app owned by Alibaba Group which is popular in China and India to browse the Internet and is used by some 500 million people worldwide.
The document was also published in Canada by CBC News, which said the aim of the plan was to collect data on suspected terrorists and other intelligence targets, including their online search queries, SIM card numbers, device IDs and the location of the smartphone. In one case, according to the CBC, analysts found a foreign military using the UC Browser app to communicate covertly about its operations in Western countries.