The mobile versions of Facebook, LinkedIn and Twitter were cited as targets Spy agencies including the U.S. National Security Agency have been working together to extract personal information, including location data and address books, from mobile apps as part of a globe-spanning effort to thwart terrorist plots, according to newly disclosed documents provided by former NSA contractor Edward Snowden.Dozens of documents, as reported Monday in The New York Times, the Guardian and ProPublica show that the apps people download onto their smartphones comprise one of many sources of information that intelligence agencies have looked to in recent years as part of their surveillance efforts.The NSA and Britain’s Government Communications Headquarters, were working together on how to collect and store data from dozens of smartphone apps by 2007, according to the reports.The targeted apps have included the mobile versions of Facebook, Yahoo’s Flickr, LinkedIn and Twitter. Since 2007, spy agencies have acted in unison to access data like address books, buddy lists, phone logs and geographic data stored within those apps, the reports said. Location and planning data stored within Google Maps was also cited as a potential surveillance target. The efforts were part of an initiative known as “the mobile surge,” according to a 2011 British document, referring to the troop surges in Iraq and Afghanistan.Facebook, Yahoo, LinkedIn, Twitter and Google could not be immediately reached for comment. The amount of data gathered from mobile apps, as well as specific information about how the process works, was not made clear. But the documents show that the NSA and its British counterpart routinely obtain information from certain apps, like those introduced earliest to cellphones, according to the reports.But spy agencies may also be looking at data from newer apps, like the popular gaming service “Angry Birds.” Although it is marketed as a game, “Angry Birds” gathers information about its users such as their location. Spy agencies have plotted how to gather this type of information in the background but it is not clear whether they have targeted these newer apps, the reports said.Spy agencies’ pursuit of mobile networks have been detailed in other reports. But the previously classified documents revealed Monday by the Times, the Guardian and ProPublica, provide new information on the level of interest that the NSA and others might have in smartphones specifically and the apps that run on them.President Barack Obama recently outlined new changes to limit the surveillance powers of the government, partly with a plan to keep the NSA from holding onto bulk phone records. He did not, however, address the wealth of personal information that could be gleaned from mobile smartphone apps.Zach Miners covers social networking, search and general technology news for IDG News Service. Follow Zach on Twitter at @zachminers. Zach’s e-mail address is zach_miners@idg.com Related content news Okta launches Cybersecurity Workforce Development Initiative New philanthropic and educational grants aim to advance inclusive pathways into cybersecurity and technology careers. By Michael Hill Oct 04, 2023 3 mins IT Skills IT Skills IT Skills news New critical AI vulnerabilities in TorchServe put thousands of AI models at risk The vulnerabilities can completely compromise the AI infrastructure of the world’s biggest businesses, Oligo Security said. By Shweta Sharma Oct 04, 2023 4 mins Vulnerabilities news ChatGPT “not a reliable” tool for detecting vulnerabilities in developed code NCC Group report claims machine learning models show strong promise in detecting novel zero-day attacks. By Michael Hill Oct 04, 2023 3 mins DevSecOps Generative AI Vulnerabilities news Google Chrome zero-day jumps onto CISA's known vulnerability list A serious security flaw in Google Chrome, which was discovered under active exploitation in the wild, is a new addition to the Cybersecurity and Infrastructure Agency’s Known Exploited vulnerabilities catalog. By Jon Gold Oct 03, 2023 3 mins Zero-day vulnerability Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe