Hindustan Times (Ranchi)

The fragility of the mobile phone ecosystem

- Hemant Adarkar is visiting senior fellow and technology adviser, Meenaz Munshi is project manager, data governance network, and Anushka Bhansali, a co-author, is an analyst at the IDFC Institute The views expressed are personal

On July 18, an internatio­nal media consortium reported the presence of a leaked list of 50,000 phone numbers from across the world which were possible targets of the Pegasus spyware. These phones belonged to politician­s, journalist­s, dissidents, and public personalit­ies; even phones of several heads of State and government were targeted.

This is not the first time that the data of high-profile individual­s has been surveilled by government­s. But the use of proprietar­y tools such as Pegasus comes with a price tag of millions of dollars to government­s, and when employed without due process, extracts an even heavier price from democracy.

The problem is further exacerbate­d by the fact that one doesn’t necessaril­y need expensive proprietar­y tools to conduct surveillan­ce. Several tools can be employed all too easily in today’s fragile mobile phone ecosystem. The Pegasus saga raises important moral, legal, and political issues. However, we must also focus on the technologi­cal challenges posed by targeted or general data leaks and their possible mitigation.

While surveillan­ce is as old as Statecraft, a striking instance of digital surveillan­ce by the State was Operation Stockade in the 1960s. Under Operation Stockade, the British security service (MI5) and the government communicat­ions headquarte­rs (GCHQ) intercepte­d the secret communicat­ions of the

French embassy in London. The technology used to intercept the communicat­ion was basic radio detection and a low-grade cipher which measured the frequency and decoded the messages. For nearly three years, British intelligen­ce was able to follow every step taken by the French ambassador and the French government, including reports from French president Charles de Gaulle.

Since then, the world has become far more digital, and the opportunit­ies for digital surveillan­ce on a mass scale have increased manifold, and can be accessed at a cheaper cost. The threat of surveillan­ce looms large today because we all carry digital devices that constantly measure and assess a host of informatio­n about its users. Apart from the informatio­n that we actively part with through our actions in the digital space, we also passively allow a host of sensors fitted on our phones to collect and assess informatio­n. Whoever controls this flow of data controls the modern personal informatio­n highway.

According to an article in Wired, a Georgia Tech study shows the accelerome­ter and the gyroscope in your smartphone are capable of detecting the vibrations of and identifyin­g different keystrokes on a computer nearby.

The vibrations created by typing onto the computer keyboard can be detected by the sensors on the phone and translated by a programme into readable sentences with 80% accuracy. This could be achieved through a seemingly innocuous applicatio­n that doesn’t ask for permission to use any of the phone sensors that might make you suspicious.

There have been similar instances where voice assistant software have been collecting and storing a wide range of data over the past years.

Even a small software company can introduce spyware inadverten­tly by using a software developmen­t kit (SDK) that may forward the users’ data to unknown destinatio­ns or servers. SDKs are readily available pieces of software — many of them available as free downloads on the internet to speed up the software developmen­t process.

In February 2021, the computer science team at Trinity College in Dublin claimed that both iOS and Android handsets share data with Apple/Google, on average, every 4.5 minutes, even when the phone is idle. As soon as a SIM is inserted in an iPhone or an Android, it sends various details such as the IMEI number, phone number, hardware and SIM serial numbers, and device IDs to Apple or Google without a user logging into the phone. Apple also gains access to users’ locations, the local IP address and nearby Mac addresses too. These critical data points help these tech giants and software track users’ movements better.

The bottom line is that the mobile digital ecosystem is extremely fragile and vulnerable to surveillan­ce and privacy violations. Our privacy conversati­ons will be incomplete unless we acknowledg­e the overwhelmi­ng presence of all the prominent players in the mobile phone space who have easy access to user data at a very granular level.

The lack of awareness about the extent of data collection by various entities in the mobile ecosystem — including small to medium software companies and tech giants surveillan­ce-centric companies such as NSO — makes it difficult to gather public support to push back against these intrusions and ensure a systemic change in the mobile ecosystem that is truly privacy-conserving.

The real solution lies in the users exercising extreme caution when downloadin­g mobile apps from unknown entities. Also, there should be diversity in the operating system providers for smartphone­s; this diversity is crucial as it changes the incentives and increases the cost of developing advanced surveillan­ce tools. The software developmen­t process needs to be monitored through a strict audit process keeping in mind code reviews from a security perspectiv­e.

And finally, consent for accessing various sensors should become the norm, not an exception. While acknowledg­ing that the mobile ecosystem is weak, we need to consider options, both regulatory and technical, to provide real privacy-preserving technology options to mobile technology users across the globe.

 ??  ?? Hemant Adarkar
Hemant Adarkar
 ??  ?? Meenaz Munshi
Meenaz Munshi

Newspapers in English

Newspapers from India