Snowden: The Government Can Hack Your iPhone Like A Criminal To Track You | The 11th Hour | MSNBC


>>>NEXT TIME YOU’RE SITTING AT>>>NEXT TIME YOU’RE SITTING AT A TRAFFIC LIGHT IN YOUR CITY OR A TRAFFIC LIGHT IN YOUR CITY OR TOWN, JUST TAKE A LOOK AT THE TOWN, JUST TAKE A LOOK AT THE PEOPLE YOU CAN SEE. PEOPLE YOU CAN SEE. MANY AREN’T LOOKING FORWARD AS MANY AREN’T LOOKING FORWARD AS THEY WALK, THEY’RE LOOKING DOWN, THEY WALK, THEY’RE LOOKING DOWN, JUST LIKE THEY’RE LOOKING DOWN JUST LIKE THEY’RE LOOKING DOWN WHILE ON PLANES, AT THE WHEEL, WHILE ON PLANES, AT THE WHEEL, AT BALL GAMES, AT HOME. AT BALL GAMES, AT HOME. OUR PHONES HAVE TAKEN OVER A OUR PHONES HAVE TAKEN OVER A PORTION OF OUR LIVES WE DIDN’T PORTION OF OUR LIVES WE DIDN’T KNOW WE HAD TO GIVE AWAY. KNOW WE HAD TO GIVE AWAY. NOW, PLEASE LISTEN TO EDWARD NOW, PLEASE LISTEN TO EDWARD SNOWDEN FROM OUR CONVERSATION SNOWDEN FROM OUR CONVERSATION EARLIER TODAY WHEN HE TALKS EARLIER TODAY WHEN HE TALKS ABOUT HOW VULNERABLE WE ARE, ABOUT HOW VULNERABLE WE ARE, WHAT OUR PHONES GIVE OFF, WHAT WHAT OUR PHONES GIVE OFF, WHAT THEY GIVE AWAY, AND WHAT THEY THEY GIVE AWAY, AND WHAT THEY CAN TELL SOMEONE ABOUT US. CAN TELL SOMEONE ABOUT US.>>HACKING HAS INCREASINGLY>>HACKING HAS INCREASINGLY BECOME WHAT GOVERNMENTS CONSIDER BECOME WHAT GOVERNMENTS CONSIDER A LEGITIMATE INVESTIGATIVE TOOL. A LEGITIMATE INVESTIGATIVE TOOL. THEY USE THE SAME METHODS AND THEY USE THE SAME METHODS AND TECHNIQUES AS CRIMINAL HACKERS. TECHNIQUES AS CRIMINAL HACKERS. AND WHAT THIS MEANS IS THEY WILL AND WHAT THIS MEANS IS THEY WILL TRY TO REMOTELY TAKE OVER YOUR TRY TO REMOTELY TAKE OVER YOUR DEVICE. DEVICE. ONCE THEY DO THIS, BY DETECTING ONCE THEY DO THIS, BY DETECTING A VULNERABILITY IN THE SOFTWARE A VULNERABILITY IN THE SOFTWARE THAT YOUR DEVICE RUNS SUCH AS THAT YOUR DEVICE RUNS SUCH AS APPLE’S IOS OR MICROSOFT APPLE’S IOS OR MICROSOFT WINDOWS, IT CAN CRAFT A SPECIAL WINDOWS, IT CAN CRAFT A SPECIAL KIND OF ATTACK CODE CALLED AN KIND OF ATTACK CODE CALLED AN EXPLOIT. EXPLOIT. THEY THEN LAUNCH THIS EXPLOIT AT THEY THEN LAUNCH THIS EXPLOIT AT THE VULNERABILITY ON YOUR DEVICE THE VULNERABILITY ON YOUR DEVICE WHICH ALLOWS THEM TO TAKE TOTAL WHICH ALLOWS THEM TO TAKE TOTAL CONTROL OF THAT DEVICE. CONTROL OF THAT DEVICE. ANYTHING YOU CAN DO ON THAT ANYTHING YOU CAN DO ON THAT DEVICE, THE ATTACKER, IN THIS DEVICE, THE ATTACKER, IN THIS CASE, THE GOVERNMENT, CAN DO. CASE, THE GOVERNMENT, CAN DO. THEY CAN READ YOUR EMAIL, THEY THEY CAN READ YOUR EMAIL, THEY CAN COLLECT EVERY DOCUMENT B CAN COLLECT EVERY DOCUMENT B THEY CAN LOOK AT YOUR CONTACT THEY CAN LOOK AT YOUR CONTACT BOOK, THEY CAN TURN THE LOCATION BOOK, THEY CAN TURN THE LOCATION SERVICES ON. SERVICES ON. THEY CAN SEE ANYTHING THAT IS ON THEY CAN SEE ANYTHING THAT IS ON THAT PHONE INSTANTLY AND SEND IT THAT PHONE INSTANTLY AND SEND IT BACK HOME TO THE MOTHER SHIP. BACK HOME TO THE MOTHER SHIP. THEY CAN DO THE SAME WITH THEY CAN DO THE SAME WITH LAPTOPS. LAPTOPS. THE OTHER PRONG THAT WE FORGET THE OTHER PRONG THAT WE FORGET SO FREQUENTLY IS THAT IN MANY SO FREQUENTLY IS THAT IN MANY CASES THEY DON’T NEED TO HACK CASES THEY DON’T NEED TO HACK OUR DEVICES. OUR DEVICES. THEY CAN SIMPLY ASK GOOGLE FOR A THEY CAN SIMPLY ASK GOOGLE FOR A COPY OF OUR EMAIL BOX BECAUSE COPY OF OUR EMAIL BOX BECAUSE GOOGLE SAVES A COPY OF THAT. GOOGLE SAVES A COPY OF THAT.>>WHAT ABOUT ENABLEING YOUR>>WHAT ABOUT ENABLEING YOUR MICROPHONE CAMERA? MICROPHONE CAMERA?>>IF YOU CAN DO IT, THEY CAN DO>>IF YOU CAN DO IT, THEY CAN DO IT. IT. IT IS TRIVIAL TO REMOTELY TURN IT IS TRIVIAL TO REMOTELY TURN ON YOUR MICROPHONE OR TO ON YOUR MICROPHONE OR TO ACTIVATE YOUR CAMERA SO LONG AS ACTIVATE YOUR CAMERA SO LONG AS YOU HAVE SYSTEMS-LEVEL ACCESS. YOU HAVE SYSTEMS-LEVEL ACCESS. IF YOU HAD HACKED SOMEONE’S IF YOU HAD HACKED SOMEONE’S DEVICE REMOTELY, ANYTHING THEY DEVICE REMOTELY, ANYTHING THEY CAN DO, YOU CAN DO. CAN DO, YOU CAN DO. THEY CAN LOOK UP YOUR NOSE, THEY CAN LOOK UP YOUR NOSE, RIGHT, THEY CAN RECORD WHAT’S IN RIGHT, THEY CAN RECORD WHAT’S IN THE ROOM. THE ROOM. THE SCREEN MAY BE OFFER AS IT’S THE SCREEN MAY BE OFFER AS IT’S SITTING ON YOUR DESK, BUT THE SITTING ON YOUR DESK, BUT THE DEVICE IS TALKING ALL OF THE DEVICE IS TALKING ALL OF THE TIME. TIME. THE QUESTION WE HAVE TO ASK, WHO THE QUESTION WE HAVE TO ASK, WHO IS IT TALKING TO? IS IT TALKING TO? EVEN IF YOUR PHONE IS NOT EVEN IF YOUR PHONE IS NOT HACKED, RIGHT NOW, YOU LOOK AT HACKED, RIGHT NOW, YOU LOOK AT IT, IT’S SITTING THERE ON A IT, IT’S SITTING THERE ON A CHARGER, IT IS TALKING TENS OR CHARGER, IT IS TALKING TENS OR HUNDREDS OR THOUSANDS OF TIMES A HUNDREDS OR THOUSANDS OF TIMES A MINUTE TO ANY NUMBER OF MINUTE TO ANY NUMBER OF DIFFERENT COMPANIES WHO HAVE DIFFERENT COMPANIES WHO HAVE APPS INSTALLED ON YOUR PHONE. APPS INSTALLED ON YOUR PHONE. IT LOOKS LIKE IT’S OFF. IT LOOKS LIKE IT’S OFF. IT LOOKS LIKE IT’S JUST SITTING IT LOOKS LIKE IT’S JUST SITTING THERE, BUT IT IS CONSTANTLY THERE, BUT IT IS CONSTANTLY CHATTERING. CHATTERING.>>WHAT ABOUT THE PUBLIC>>WHAT ABOUT THE PUBLIC ATTITUDE HELD BY MILLIONS OF ATTITUDE HELD BY MILLIONS OF EVERYDAY AMERICANS, ALL I’VE GOT EVERYDAY AMERICANS, ALL I’VE GOT ON A COMPUTER IS PICTURES OF MY ON A COMPUTER IS PICTURES OF MY FAMILY-, FAMILY-, FAMILY. FAMILY. CC-TV CAMERAS THAT ARE PREVALENT CC-TV CAMERAS THAT ARE PREVALENT IN A TON OF AMERICAN CITIES AND IN A TON OF AMERICAN CITIES AND OVERSEAS CAPITALS. OVERSEAS CAPITALS. THOSE CAMERAS ARE YOUR FRIEND IF THOSE CAMERAS ARE YOUR FRIEND IF YOU’RE INNOCENT AND HAVE NOTHING YOU’RE INNOCENT AND HAVE NOTHING TO HIDE. TO HIDE.>>THAT’S VERY MUCH WHAT THE>>THAT’S VERY MUCH WHAT THE AVERAGE CHINESE CITIZEN BELIEVED AVERAGE CHINESE CITIZEN BELIEVED OR PERHAPS EVEN STILL TO THIS OR PERHAPS EVEN STILL TO THIS DAY BELIEVE SS. DAY BELIEVE SS. WE SEE HOW THESE SAME WE SEE HOW THESE SAME TECHNOLOGIES ARE BEING APPLIED TECHNOLOGIES ARE BEING APPLIED TO CREATE WHAT THEY CALL THE TO CREATE WHAT THEY CALL THE SOCIAL CREDIT SYSTEM. SOCIAL CREDIT SYSTEM. IF ANY OF THESE FAMILY PHOTOS, IF ANY OF THESE FAMILY PHOTOS, ANY OF YOUR ACTIVITIES ONLINE, ANY OF YOUR ACTIVITIES ONLINE, YOUR PURCHASES, IF YOUR YOUR PURCHASES, IF YOUR ASSOCIATIONS, IF YOUR FRIENDS ASSOCIATIONS, IF YOUR FRIENDS ARE IN ANY WAY DIFFERENT FROM ARE IN ANY WAY DIFFERENT FROM WHAT THE GOVERNMENT OR THE WHAT THE GOVERNMENT OR THE POWERS THAT BE OF THE MOMENT POWERS THAT BE OF THE MOMENT WOULD LIKE THEM TO BE, YOU’RE NO WOULD LIKE THEM TO BE, YOU’RE NO LONGER ABLE TO PURCHASE TRAIN LONGER ABLE TO PURCHASE TRAIN TICKETS. TICKETS. YOU’RE NO LONGER ABLE TO BOARD YOU’RE NO LONGER ABLE TO BOARD AN AIRPLANE. AN AIRPLANE. YOU MAY NOT BE ABLE TO GET A YOU MAY NOT BE ABLE TO GET A PASSPORT. PASSPORT. YOU MAY NOT BE ELIGIBLE FOR A YOU MAY NOT BE ELIGIBLE FOR A JOB. JOB. YOU MIGHT NOT BE ABLE TO WORK YOU MIGHT NOT BE ABLE TO WORK FOR THE GOVERNMENT. FOR THE GOVERNMENT. ALL OF THESE THINGS ARE ALL OF THESE THINGS ARE INCREASINGLY BEING CREATED AND INCREASINGLY BEING CREATED AND PROGRAMMED AND DECIDED BY PROGRAMMED AND DECIDED BY ALGORITHMS AND THOSE ALGORITHMS ALGORITHMS AND THOSE ALGORITHMS ARE FUELED BY PRECISELY THE ARE FUELED BY PRECISELY THE INSTANT DATA THAT OUR DEVICES INSTANT DATA THAT OUR DEVICES ARE CREATING ALL OF THE TIME, ARE CREATING ALL OF THE TIME, CONSTANTLY, INVISIBLY, QUIETLY, CONSTANTLY, INVISIBLY, QUIETLY, RIGHT NOW. RIGHT NOW. OUR DEVICES ARE CASTING ALL OF OUR DEVICES ARE CASTING ALL OF THESE RECORDS THAT WE DO NOT SEE THESE RECORDS THAT WE DO NOT SEE BEING CREATED THAT IN AGGREGATE BEING CREATED THAT IN AGGREGATE SEEM VERY INNOCENT. SEEM VERY INNOCENT. YOU WERE AT STARBUCKS AT THIS YOU WERE AT STARBUCKS AT THIS TIME. TIME. YOU WENT TO THE HOSPITAL YOU WENT TO THE HOSPITAL AFTERWARDS AFTERWARDS AFTERWARDS. AFTERWARDS. YOU SPENT A LONG TIME AT THE YOU SPENT A LONG TIME AT THE HOSPITAL. HOSPITAL. AFTER YOU LEFT THE HOSPITAL, YOU AFTER YOU LEFT THE HOSPITAL, YOU MADE A PHONE CALL. MADE A PHONE CALL. YOU MADE A PHONE CALL TO YOUR YOU MADE A PHONE CALL TO YOUR MOTHER. MOTHER. YOU TALKED TO HER UNTIL THE YOU TALKED TO HER UNTIL THE MIDDLE OF THE NIGHT. MIDDLE OF THE NIGHT. THE HOSPITAL WAS AN ONCOLOGY THE HOSPITAL WAS AN ONCOLOGY CLINIC. CLINIC. EVEN IF YOU CAN’T SEE THE EVEN IF YOU CAN’T SEE THE CONTENT OF THESE COMMUNICATIONS, CONTENT OF THESE COMMUNICATIONS, THE ACTIVITY RECORDS, WHAT THE THE ACTIVITY RECORDS, WHAT THE GOVERNMENT CALLS METADATA, WHICH GOVERNMENT CALLS METADATA, WHICH THEY ARGUE THEY DO NOT NEED A THEY ARGUE THEY DO NOT NEED A WARRANT TO COLLECT, TELLS THE WARRANT TO COLLECT, TELLS THE WHOLE STORY. WHOLE STORY. AND THESE ACTIVITY RECORDS ARE AND THESE ACTIVITY RECORDS ARE BEING CREATED AND SHARED AND BEING CREATED AND SHARED AND COLLECTED AND INTERCEPTED COLLECTED AND INTERCEPTED CONSTANTLY BY COMPANIES AND CONSTANTLY BY COMPANIES AND GOVERNMENTS. GOVERNMENTS. AND ULTIMATELY, IT MEANS AS THEY AND ULTIMATELY, IT MEANS AS THEY SELL THESE, AS THEY TRADE THESE, SELL THESE, AS THEY TRADE THESE, AS THEY MAKE THEIR BUSINESSES ON AS THEY MAKE THEIR BUSINESSES ON THE BACKS OF THESE RECORDS, WHO THE BACKS OF THESE RECORDS, WHO THEY ARE SELLING IS NOT THEY ARE SELLING IS NOT INFORMATION. INFORMATION. WHAT THEY’RE SELLING IS US. WHAT THEY’RE SELLING IS US. THEY’RE SELLING OUR FUTURE. THEY’RE SELLING OUR FUTURE. THEY’RE SELLING OUR PARENT. THEY’RE SELLING OUR PARENT. THEY ARE SELLING OUR HISTORY. THEY ARE SELLING OUR HISTORY. OUR IDENTITY. OUR IDENTITY. AND ULTIMATELY, THEY ARE AND ULTIMATELY, THEY ARE STEALING OUR POWER AND MAKING STEALING OUR POWER AND MAKING OUR STORIES WORK FOR THEM. OUR STORIES WORK FOR THEM.>>WHAT DEVICES DO YOU USE IN>>WHAT DEVICES DO YOU USE IN YOUR LIFE NOW, AND HAVE YOU YOUR LIFE NOW, AND HAVE YOU ACCEPTED THE NOTION THAT YOU ARE ACCEPTED THE NOTION THAT YOU ARE WATCHED RATHER CONSTANTLY? WATCHED RATHER CONSTANTLY?>>I TRY NOT TO MAKE THAT EASY>>I TRY NOT TO MAKE THAT EASY FOR THEM. FOR THEM. IF I GET A SMARTPHONE AND I NEED IF I GET A SMARTPHONE AND I NEED TO USE A PHONE, I ACTUALLY OPEN TO USE A PHONE, I ACTUALLY OPEN IT UP BEFORE I USE IT. IT UP BEFORE I USE IT. I PERFORM A KIND OF SURGERY ON I PERFORM A KIND OF SURGERY ON IT TO PHYSICALLY DESOLDER OR IT TO PHYSICALLY DESOLDER OR SORT OF MELT THE METAL SORT OF MELT THE METAL CONNECTIONS THAT HOLD THE CONNECTIONS THAT HOLD THE MICROPHONE ON THE PHONE AND I MICROPHONE ON THE PHONE AND I PHYSICALLY TAKE THIS OFF. PHYSICALLY TAKE THIS OFF. I REMOVE THE CAMERA FOR THE I REMOVE THE CAMERA FOR THE PHONE. PHONE. I CLOSE IT BACK UP. I CLOSE IT BACK UP. I SEAL IT UP. I SEAL IT UP. AND THEN IF I NEED TO MAKE A AND THEN IF I NEED TO MAKE A PHONE CALL, I WILL ATTACH AN PHONE CALL, I WILL ATTACH AN EXTERNAL MICROPHONE ON IT. EXTERNAL MICROPHONE ON IT. THIS IS JUST SO IF THE PHONE IS




Comments
  1. Contrary to many in the US, most of the world considers this man to be a hero. And he really is.
    But also for the people in the US – most just dont want to acknowledge what he did for them when he exposed the privacy intrusion hydra the NSA was. And because of that, this hydra is probably going back to what it did before Snowden showed us…

  2. I think that whatever Snowden talks about here in this interview is way beyond the third grade intellectual capacity of the orangutan in chief.

  3. Well, we've known the government can track us through our cellphones for years… It's kind of a common theme in tv shows and movies.

  4. Has this guy ever said anything negative about Putin? I wonder why… nothing is free, including refuge in Russia. KGB thug Putin isnโ€™t dumb …

  5. Oh my, a pocket computer that so many people give everybody access to by allowing the device to be constantly connected to third party servers.

    We've seen the reports that Obama said he used this stuff. So much more than some microphones in a Hotel in DC

  6. For sure our government can spy on u by iPhone and apple computers…. They created apple for this matter…. Snowdon is an hero… No doubt…. Shame on those politicians who said snowden is a traitor

  7. Probably our greatest comfort is that with over 250,000,000 smart phones up and running in America, the chances that ours will be targeted for individual scrutiny is slim. For someone like Snowden, however, he will never have that anonymity. The second you make yourself a target, perhaps just by being in the wrong place at the wrong time, you lose that comfortable anonymity perhaps for all time. The 21st Century get scarier every day.

  8. Snowden is telling the truth, be afraid of whatโ€™s coming up. It will get even worse and nobody does something about it. Edward is a hero who sacrificed so much to let us know whatโ€™s really going on.

  9. I am firmly of the belief that our only hope is to elect people with integrity like Bernie Sanders and to give them a mandate to legislate aggressively on behalf of actual people. We donโ€™t have much time left imo, maybe 10-20 years, maybe less, maybe the ball is already rolling with too much momentum.

  10. Enjoy your lucrative speaking engagements while you can. There's a deep hole under the Pentagon with your name on it, Snowden!

  11. You are a hacker i know how the world to start the mess why you not tell how to start your story and who is your contact? And how to begin to hired you and you run to hongkong after russia?

  12. This has been happenning to me. There is also a company called Renaissance technologies which makes a "predictive marketing program" with this info and sells it. They helped Trump win for example by letting him use their program to campaign. Google it.

  13. Wait we are listening to Snowed MSBC who lives in Russia with stollen US secrets were Putin hack America elections ? What Snowden is talking about is not new. This click bait reporting from the 11 hour show.

  14. Just don't get a smartphone. There are tons of phones that don't have cameras and aren't controlled by an OS.
    Got as smartphone? Don't "de-solder" anything internally, that's mental. Just run it to zero power and use an external battery when you need to use it.
    BTW a friend told me to do this. cough.

  15. Oh yeah, and your Tivo "Smart TV" is the exact same thing as your iphone and worse cuz it's running Android, which is basically fully accessible by the US Gov.

  16. Snowden is a national hero and instead is treated like a criminal because he speaks the truth that is so obvious yet many of us are still blind to

  17. Just so you know I was talking about some straps because we were picking up some sofas. Got home and started watching youtube videos and under suggestions for videos there were some videos on how to use the very straps I was talking about.

  18. This is so stupid, iโ€™ve got four laptops for smart phones and my family all over the Internet four years. Not once have I felt as if my rights have been taken away, and if it means it makes our country safer because the bad guys are being spied on to Iโ€™m perfectly all right with that.

  19. Let nuke Isreal and Saudi Arabia so we don't have to send our children to Iran to fight and die for the war mongering animals. Donald Trump is their lap dog.

  20. If the government thinks they can sum up the essence of humanity in an algorithm donโ€™t worry folks! They are truly stupid.

  21. Did you hear him? Did you understand what Snowden said? Do you realize that hated conspiracy theorist and crazed lunatic Alex Jones told us what Snowden spoke about over ten years ago? You may hate Jones (understandably), but you can't deny Infowars.com reported and discussed this phenomenon years ago. There's something to be said about fringe journalism with alt-right and leftist science and futurist conspiracy fodder. George Orwell is laughing at us.

  22. We all know this sense world WAR 1we HAD people .I new ALL the time I AM being wacht. BUT GOD IS THE ONLY ONE WHO WE NEED TO BE WORRYING ABOUT WHAT WE THINK OF.they were tapping phones FOR a million years.

  23. Read the Patriot Act overview notes. After 9/11, Americans wanted to give all their data away. Willfully and pleaded no contest to it. This breach in privacy could NEVER be turned back. If you want to see scary, find someone in IT, ask them to spin up a virtual network, get a VPN and go look around on the dark web. It will COMPLETELY horrify you as to the kind of stuff on there. The government and hackers already have an entire generation by the throats without showing a single weapon. Cyber warfare has already happened and I'm afraid there's no stopping it

  24. DOH, everyone knows your phone is a tracking device. The government has total access to your phone. This is old news.

  25. So I guess this is why our government isn't too concerned that Trump refuses to use a government issued phone and he uses his personal iPhone. They've probably hacked into his iPhone and he doesn't even know it. Still think cell phones are the greatest thing since sliced bread? Me either!

Leave a Reply

Your email address will not be published. Required fields are marked *