Maahantuomme ravintolisiä USA: sta, FDA: n tiukasti valvomilta markkinoilta.
Visionamme on tuottaa oikeaa tietoa terveyden uhkatekijöistä.
Suurimpana ongelmana länsimaissa on jatkuva, yksipuolisesti liian hapan ruokavalio, jota elimistö ei kykene riittävästi puskuroimaan, vaan koko aineenvaihdunta -järjestelmä joutuu tekemään työtä happamuutta vastaan.
Lopulta elimistö alkaa tulehtua ja saavuttaa potilaan huomaamatta, jatkuvan tulehduksellisen tilan.
and led by Stefan Borgwardt, MD, PhD, has now shown that drinking a green tea extract can enhance memory performance. This may have important practical applications for the treatment of neuropsychiatric disorders such as cognitive impairment and Alzheimer’s disease.
Green tea has been discussed for a long time as a tool to use to improve memory. Studies have shown that it does improve cognitive functioning in mice. Several preliminary studies have been done in humans.
This study is unique because it is the “first evidence for the putative beneficial effect of green tea on cognitive functioning, in particular, on working memory processing at the neural system level by suggesting changes in short – term plasticity of the parietal – frontal brain connections”, as stated by the authors. The special thing about this study is that they used Functional MRI (fMRI), to actually view the subjects brains functioning when they were given green tea in different concentrations or a placebo. The subjects in this study were 12 healthy male students in their early 20’s. The researchers were so careful to avoid any placebo effect, that they did not let the 12 students in the study even drink the green tea drink! They were required to to swallow a feeding tube and given the drink through the tube so that they could not taste it! Functional MRI scanning allowed the researchers to actually watch the brain working after each of the students “drank” their drink and then did the tasks that they were asked to do while in the fMRI machine. The researchers specifically noticed that there was an increase in connectivity between the parietal lobe of the brain and the frontal lobe of the brain, which went along with the improvement in the performance of tasks that the students were given while they were in the MRI machine. To me, this is extremely exciting research! With the new technologies including functional MRI, scientists are now able to prove in very objective ways much of the traditional “folklore” that has been handed down regarding nutritional supplements. This is the gateway to the future of healthcare, where we can individualize treatment for each patient according to their needs. Certainly, if you have older friends or family who are complaining of memory issues, you can recommend them to have some green tea to help! Let me know your thoughts!
Received: 7 January 2014 Accepted: 26 February 2014 Published online: 19 March 2014
Abstract
Rationale
It has been proposed that green tea extract may have a beneficial impact on cognitive functioning, suggesting promising clinical implications. However, the neural mechanisms underlying this putative cognitive enhancing effect of green tea extract still remain unknown.
Objectives
This study investigates whether the intake of green tea extract modulates effective brain connectivity during working memory processing and whether connectivity parameters are related to task performance.
Material and methods
Using a double-blind, counterbalanced, within-subject design, 12 healthy volunteers received a milk whey-based soft drink containing 27.5 g of green tea extract or a milk whey-based soft drink without green tea as control substance while undergoing functional magnetic resonance imaging. Working memory effect on effective connectivity between frontal and parietal brain regions was evaluated using dynamic causal modeling.
Results
Green tea extract increased the working memory induced modulation of connectivity from the right superior parietal lobule to the middle frontal gyrus. Notably, the magnitude of green tea induced increase in parieto-frontal connectivity positively correlated with improvement in task performance.
Conclusions
Our findings provide first evidence for the putative beneficial effect of green tea on cognitive functioning, in particular, on working memory processing at the neural system level by suggesting changes in short-term plasticity of parieto-frontal brain connections. Modeling effective connectivity among frontal and parietal brain regions during working memory processing might help to assess the efficacy of green tea for the treatment of cognitive impairments in psychiatric disorders such as dementia.
Image acquisition and analysis
fMRI was performed on a 3T scanner (Siemens Magnetom Verio, Siemens Healthcare, Erlangen, Germany) using an echo planar sequence with a repetition time of 2.5 s, echo time of 28 ms, matrix 76 × 76, 126 volumes and 38 slices with 0.5 mm interslice gap, providing a resolution of 3 × 3 × 3 mm3, and a field of view 228 × 228 mm2. We analyzed fMRI data using SPM8 (http://www.fil.ion.ucl.ac.uk/spm/). All volumes were realigned to correct for head movements, mean adjusted by proportional scaling, normalized into standard stereotactic space (Montreal Neurological Institute), and smoothed using a 8 mm full-width at half-maximum Gaussian kernel. We convolved the onset times for each condition (0-back, 1-back, and 2-back) with a canonical haemodynamic response function. Serial correlations were removed using a first-order autoregressive model and a high-pass filter (128 s) was applied to remove low-frequency noise. Six movement parameters were also entered as nuisance covariates to control for movement. We focused our analysis on the 2-back >0-back contrast (main effect of task) to capture the highest possible WM load during the N-back task according to previous N-back fMRI studies (Deserno et al. 2012; Schmidt et al. 2013b).
By Greg Arnold, DC, CSCS, July 18, 2014, abstracted from “Green Tea Polyphenols Provide Photoprotection, Increase Microcirculation, and Modulate Skin Properties of Women” in the June 2011 issue of the Journal of Nutrition
When it comes to protecting your skin from the harms of ultraviolet radiation, there is a class of antioxidants called flavonols (1) that maintains skin health and is the reason why consuming cocoa products has been shown to maintain skin health and improve blood circulation (2,3). Beyond cosmetic skin health, flavonols also help protect against skin cancer. This is the most common form of cancer in the United States, with more than 1 million new cases estimated in 2010 (4) and a significant contributor to the $216 total cost of cancer each year (5).
Now a new study (6) suggests that another source of flavonols, green tea, may help maintain skin health in a number of ways. The study involved 60 female subjects between the ages of 40 and 65. For 12 weeks, they consumed either:
-A green tea beverage providing 1,402 milligrams of a class of flavonols called catechins per day (30 subjects)
-A placebo drink (30 subjects)
Before the study began and at weeks 6 and 12, researchers simulated sun exposure to the upper back of each subject, specifically a “minimal erythemal dose (7) of radiation from a solar simulator” and measured skin redness with a method called chromametry (8).
The researchers noted a significant benefit of the green tea supplementation compared to the placebo on skin health. Specifically, skin redness from sun exposure (called UV-induced erythema) was 16% lower than the placebo group by week 6 (p < 0.05) and 25% lower than the placebo group by week 12 (p < 0.05). In addition, the green tea group experienced a 16% decrease in skin roughness, 20% decrease in skin volume, 25% decrease in scaling, and a 17% increase in skin hydration and 20% increase in skin blood flow after 12 weeks compared to the placebo group (p < 0.05).
For the researchers, ““Regular consumption of a beverage rich in tea flavonols contributed photoprotection against harmful UV radiation and helped maintain skin structure and function.”
Greg Arnold is a Chiropractic Physician practicing in Hauppauge, NY. You can contact Dr. Arnold directly by emailing him at PitchingDoc@msn.com or visiting his web site at www.PitchingDoc.com
Reference:
1.Dinkova-Kostova AT. Phytochemicals as protectors against ultraviolet radiation: versatility of effects and mechanisms. Planta Med. 2008; 74:1548–59
2.Heinrich U, Neukam K, Tronnier H, Sies H, Stahl W. Long-term ingestion of high flavanol cocoa provides photoprotection against UVinduced erythema and improves skin condition in women. J Nutr. 2006; 136:1565–9.
3. Neukam K, Stahl W, Tronnier H, Sies H, Heinrich U. Consumption of flavanol-rich cocoa acutely increases microcirculation in human skin. Eur J Nutr. 2007;46:53–6.
4.“Skin Cancer” posted on the National Cancer Institute website
5.“Economic Impact of Cancer” posted on the American Cancer Society Website
6.Heinrich U. Green Tea Polyphenols Provide Photoprotection, Increase Microcirculation, and Modulate Skin Properties of Women. J Nutr 2011 Jun;141(6):1202-8. doi: 10.3945/jn.110.136465
7.Sies H, Stahl W. Nutritional protection against skin damage from sunlight. Annu Rev Nutr. 2004;24:173–200 8.Alaluf
S, Heinrich U, Stahl W, Tronnier H, Wiseman S. Dietary carotenoids
contribute to normal human skin color and UV photosensitivity. J Nutr. 2002;132:399–403
Vihreä tee on eniten tutkittuja luonnon tuotteita. Parhaiten
tunnetut ainesosat ovat puriinialkaloideja, kofeiini (josta teen
yhteydessä joskus käytetään nimitystä teiini), teobromiini, sekä
teofylliini, joka on myös tehokas astmalääke. Katekiinit (tärkein ryhmä)Ehkäisee ikäihmisten muistin heikkenemistä Polttaa kaloreita/laihduttaa Parantaa insuliiniherkkyyttä Suojaa auringon UV-säteiltä Estää syöpää Pienentää kasvainten kokoa Estää mutaatiota Estää vapaita radikaaleja Alentaa kohonnutta kolesterolia Estää verenpaineen nousua Tappaa bakteereja Tappaa influenssaviruksia Estää kariesbakteereja Estää pahanhajuista hengitystä Kofeiini (teiini): Piristää ja virkistää, Diureetti C-vitamiini: Ehkäisee stressiä, Ehkäisee flunssaa B-vitamiinit: Edistää hiilihydraattien aineenvaihduntaa Aminobutyyrihappo (GABA):Alentaa kohonnutta verenpainetta Flavonoidit: Vahvistaa verisuonten seinämiä Polysakkaridit: Alentaa kohonnutta verensokeria Fluori: Estää hammasmätää E-vitamiini: Hidastaa vanhenemista, Suojaa soluja Theaiini (aminohappo): Antaa tyypillisen maun vihreälle teelle Ainesosissa on runsaasti kasviantioksidantteja, jotka tuhoavat
elimistössä syntyviä haitallisia vapaita radikaaleja. Niitä syntyy
elimistössä ylimäärin sekä ulkoisista että sisäisistä syistä. Ulkoisia
aiheuttajia ovat muun muassa ympäristömyrkyt, ilman epäpuhtaudet
(kaupunki-liikenne- ja teollisuuspäästöt), otsoni, UV-säteily ja
tupakansavu. Sisäisiä syitä radikaalien syntyyn ovat muun muassa
tulehdustaudit ja muut pitkäaikaissairaudet (esim. nivelreuma), runsas
kahvin ja alkoholin käyttö sekä monet lääkkeet.
Vihreäteeuute nopeuttaa rasvan
palamista, todettiin äskettäin tutkimuksessa, joka tehtiin Geneven
yliopistossa. Koehenkilöille annettiin vihreää teetä kapseloituna
uutteena; puolet koehenkilöistä sai vastaavia lumekapseleita. Tutkijat
mittasivat aineenvaihdunnan nopeutta 24 tunnin ajan. Teeuutetta
saaneiden kalorit paloivat neljä prosenttia nopeammin ja
kokonaisenergian kulutus lisääntyi lähes viisi prosenttia.
Vihreän teen laihduttava vaikutus perustuu sen sisältämiin
katekiini-polyfenoleihin. Tutkijat korostavat nimenomaan, ettei kyse ole
pelkästään teen sisältämän kofeiinin (teiinin) vaikutuksesta, vaan
kofeiinin ja katekiiniaineiden yhteisvaikutuksesta, joka kiihdyttää
aineenvaihduntaa.
A sad story with a happy ending. And all because of a little colored strip of paper.
Eight-year-old Josie Nuñez was sick for a long time. She felt nauseous and weak and would vomit on a regular basis. She took it in stride like it was normal. Her parents knew it wasn’t normal. They brought her to several doctors but no one could find what was wrong with her.
Finally, one doctor had Josie undergo a CT (computerized tomography) scan to X-ray Josie’s body, looking for anything unusual. They found it.
Josie had a tumor that was pushing against her brain stem. She was very brave when she asked her mother if surgery would hurt and with good nature said “okay” when she was told she’d be asleep during the procedure. After surgery, chemotherapy, and radiation therapy, Josie weighed just 42 pounds.
Seemingly without hope
She seemed to be on the mend but then another tumor was discovered in the middle of her brain; it was therefore inoperable. Doctors told her parents to find a hospice and enjoy the short time they had left with their little girl.
Josie’s parents weren’t willing to give up. They were researching all viable options when they found Dr. Bernardo Majalaca, a San Diego naturopath. Dr. Majalaca asked for Josie’s complete medical history. As is his practice, the very first test he ran was a simple pH test. As he suspected, Josie’s pH level was so acidic, it didn’t register on the litmus strip. His diagnosis:acidosis.
Acidosis is the term given to the condition in which the acid levels in your blood are chronically and dangerously high.“pH”stands for “potential for Hydrogen”: it represents the willingness of a particular substance to share or retain hydrogen atoms. Acids donate hydrogen and bases accept them.
On a scale of 0 to 14, 7 is neutral, 0 is the low acid level and 14 is the high alkaline level. The optimal pH level in our blood is 7.4. When a condition of acidosis occurs, the cells in the body can’t get enough oxygen or nutrition from food and the body basically becomes toxic and cells die (Nobel, Warburg effect).
It is in the nature of cancerous–abnormal–cells to thrive in an oxygen-depleted environment.
In Josie’s case, Dr. Majalaca put her on a strict alkaline diet, prohibiting acidic foods (e.g., meat and fish, bread, dairy, processed foods) and loading up on fresh fruits and vegetables. He prescribed these in juiced form to make them easier for Josie’s body to break down. They consisted of:
Juice 1:
Half a mashed avocado mixed with 8 ounces of freshly juiced carrots. A wooden spoon is used to mash and mix because metal implements can destroy vital enzymes.
When Josie went for a check-up with her doctor a few months after beginning this diet, the oncologist was incredulous – she wasn’t expected to have survived that long and, to her amazement, the size of the tumor in Josie’s brain had shrunk seventy-five percent (75%)!The doctor asked, “what on Earth are you doing?!”
With such fantastic results, Josie continued with Dr. Majalaca’s regimen. At her examination another eight months later, the cancer was gone.
It is easy to measure your pH level using alitmus test, placing your saliva on a strip oflitmus paperand reading the results. If your acid level is consistently below 7, and/or if you experiencesymptoms of acidosis, there is cause for concern.
You can help to balance the acid and alkaline levels in your body through food. Not enough stress can be put on the importance of pH balance of your body–it affects every cell.
In Josie Nuñez’ case, an insightful doctor had the presence of mind to run a simple test. He knew the implications and how to treat the problem rather than the symptoms. He is the co-author of Josie’s happy ending: a healthy, vibrant young girl with a full life ahead of her.
For many years I worked in palliative care. My patients were those who had gone home to die. Some incredibly special times were shared.
I was with them for the last three to twelve weeks of their lives.
People grow a lot when they are faced with their own mortality. I learnt never to underestimate someone’s capacity for growth. Some changes were phenomenal. Each experienced a variety of emotions, as expected, denial, fear, anger, remorse, more denial and eventually acceptance. Every single patient found their peace before they departed though, every one of them.
When questioned about any regrets they had or anything they would do differently, common themes surfaced again and again. Here are the most common five:
1. I wish I’d had the courage to live a life true to myself, not the life others expected of me.
This was the most common regret of all. When people realise that their life is almost over and look back clearly on it, it is easy to see how many dreams have gone unfulfilled. Most people had not honoured even a half of their dreams and had to die knowing that it was due to choices they had made, or not made.
It is very important to try and honour at least some of your dreams along the way. From the moment that you lose your health, it is too late. Health brings a freedom very few realise, until they no longer have it.
2. I wish I didn’t work so hard.
This came from every male patient that I nursed. They missed their children’s youth and their partner’s companionship. Women also spoke of this regret. But as most were from an older generation, many of the female patients had not been breadwinners. All of the men I nursed deeply regretted spending so much of their lives on the treadmill of a work existence.
By simplifying your lifestyle and making conscious choices along the way, it is possible to not need the income that you think you do. And by creating more space in your life, you become happier and more open to new opportunities, ones more suited to your new lifestyle.
3. I wish I’d had the courage to express my feelings.
Many people suppressed their feelings in order to keep peace with others. As a result, they settled for a mediocre existence and never became who they were truly capable of becoming. Many developed illnesses relating to the bitterness and resentment they carried as a result.
We cannot control the reactions of others. However, although people may initially react when you change the way you are by speaking honestly, in the end it raises the relationship to a whole new and healthier level. Either that or it releases the unhealthy relationship from your life. Either way, you win.
4. I wish I had stayed in touch with my friends.
Often they would not truly realise the full benefits of old friends until their dying weeks and it was not always possible to track them down. Many had become so caught up in their own lives that they had let golden friendships slip by over the years. There were many deep regrets about not giving friendships the time and effort that they deserved. Everyone misses their friends when they are dying.
It is common for anyone in a busy lifestyle to let friendships slip. But when you are faced with your approaching death, the physical details of life fall away. People do want to get their financial affairs in order if possible. But it is not money or status that holds the true importance for them. They want to get things in order more for the benefit of those they love. Usually though, they are too ill and weary to ever manage this task. It is all comes down to love and relationships in the end. That is all that remains in the final weeks, love and relationships.
5. I wish that I had let myself be happier.
This is a surprisingly common one. Many did not realise until the end that happiness is a choice. They had stayed stuck in old patterns and habits. The so-called ‘comfort’ of familiarity overflowed into their emotions, as well as their physical lives. Fear of change had them pretending to others, and to their selves, that they were content. When deep within, they longed to laugh properly and have silliness in their life again.
When you are on your deathbed, what others think of you is a long way from your mind. How wonderful to be able to let go and smile again, long before you are dying.
Wikileaks dropped the bomb - put a spyware download 9/15/2014 4:22 PM
Wikileaks hopes that sharing the program will help develop tools against the software.
Wikileaks has today released FinFisher Spyware on its website for download. FinFisher is a German commercial spyware that runs on OS X, Windows, Linux, Android, iOS, Blackberry, Symbian and Windows Mobile. It is uncertain whether the program runs on Windows Phone. The program routing and data acquisition modules and the data storage component were downloaded. In addition, there is a PC version of the program, which records e-mails, video calls, and Spy on your computer using your microphone and webcam. Wikileaks explains the reason why its activities are that government spyware is used in many countries to spy on journalists, activists and dissidents. FinFisher describes its software as "innovative cyber tools for suspect devices that provide valuable intelligence".
Wikileaks boss Julian Assange described the program in the release as follows: - FinFisher (a company) is openly brazen from Germany selling spyware to many of the world's worst repressive regimes. (Angela) Merkel's government claims to be concerned about privacy, but its actions speak a different language.
Why do they continue to protect FinFisher?
Sharing the program helps the technology community build tools to protect themselves from FinFisher and find its command servers. Originally part of the English Gamma Group, FinFisher split off at the end of last year.
So far, it is difficult to estimate what the FinFisher download will lead to. At least it will have an impact on the business of the company selling it.
A more serious consequence is that the spyware will spread very quickly. When it is available to anyone, it can be believed to end up quickly for a variety of misuse purposes.
Digitoday does not link directly to spyware pages. http://www.digitoday.fi/tietoturva/2014/09/15/wikileaks-pudotti-pommin--laittoi-vakoiluohjelman-ladattavaksi/201412817/66//
_________
Stellar’s visibly shaken chief engineer - Video
- viewing the same documents, shares his boss’ reaction. “The intelligence services could use this data to shut down the internet in entire African countries that are provided access via our satellite connections,” he says.
Treasure Map is avast NSA campaign to map the global internet. The program doesn’t just seek to chart data flows in large traffic channels, such as telecommunications cables. Rather, it seeks to identify and locate every single device that is connected to the internet somewhere in the world—every smartphone, tablet, and computer—”anywhere, all the time,” according to NSA documents.
(The short film above,Chokepoint, by filmmaker Katy Scoggin andInterceptco-founder Laura Poitras, documents the reactions of Stellar engineers when confronted with evidence that their company—and they themselves—had been surveilled by GCHQ.)
Though the NSA documents indicate that it can be used to monitor “adversaries,” and for “computer attack/exploit planning”—offering a kind of battlefield map for cyber warfare—they also clearly show that Treasure Map monitors traffic and devices inside the United States. Unnamed intelligence officials told theTimesthat the program didn’t have the capacity to monitorallinternet-connected devices, and was focused on foreign networks, as well as the U.S. Defense Department’s own computer systems.
_ https://firstlook.org/theintercept/2014/09/14/nsa-stellar/
Today, 15 September 2014, WikiLeaks releases previously unseen copies of weaponised German surveillance malware used by intelligence agencies around the world to spy on journalists, political dissidents and others.
FinFisher (formerly part of the UK based Gamma Group International until late 2013) is a German company that produces and sells computer intrusion systems, software exploits and remote monitoring systems that are capable of intercepting communications and data from OS X, Windows and Linux computers as well as Android, iOS, BlackBerry, Symbian and Windows Mobile devices. FinFisher first came to public attention in December 2011 when WikiLeaks published documents detailing their products and business in the firstSpyFilesrelease.
Since the first SpyFiles release, researchers publishedreportsthat identified the presence of FinFisher products in countries aroud the world and documented its use against journalists, activists and political dissidents.
Julian Assange, WikiLeaks Editor in Chief said: "FinFisher continues to operate brazenly from Germany selling weaponised surveillance malware to some of the most abusive regimes in the world. The Merkel government pretends to be concerned about privacy, but its actions speak otherwise. Why does the Merkel government continue to protect FinFisher? This full data release will help the technical community build tools to protect people from FinFisher including by tracking down its command and control centers."
FinFisher RelayandFinSpy Proxyare the components of the FinFisher suite responsible for collecting the data acquired from the infected victims and delivering it to their controllers. It is commonly deployed by FinFisher's customers in strategic points around the world to route the collected data through an anonymizing chain, in order to disguise the identity of its operators and the real location of the final storage, which is instead operated by theFinSpy Master.
In order to challenge the secrecy and the lack of accountability of the surveillance industry, analyzing the internals of this software could allow security and privacy researchers to develop new fingerprints and detection techniques, identify more countries currently using the FinFisher spyware and uncover human rights abuses.
In addition, in this fourth iteration of the SpyFiles collection, WikiLeaks publishes the newly indexed material the same as therecent FinFisher breach(for which you can find the torrent filehere), including new brochures and a database of the customer support website, that provide updated details on their productline and a unique insight into the company's customer-base.
In order to make the data more easily accessible and consumable, all the new brochures, videos and manualsare now availableorganized under the related FinFisher product name. Thedatabaseis represented in full, from which WikiLeaks compiled a list of customers, their eventual attribution, all the associated support tickets and acquired licenses, along with the estimated costs calculated from FinFisher's price list.
IMEI: International Mobile Equipment Identity IMSI: International Mobile Subscriber Identity
Just two of the digital identity cards inside your phone that make it possible for a global network to monitor your daily movements and activities. https://t.co/rYDF9N8gDH
The phones and tablets that we carry constantly transmit a steady stream of information to third parties. Our searches, shares, and messages represent only a fraction of the sensitive, private, and identifiable data that our devices generate.
The data includes many ‘identifiers,’ ranging from a serial-like IMEI number that is unique to each handset to unique operating system identifiers and even location information. Some of these identifiers are personally identifiable and ‘baked in’ to the devices we carry around with us, while others are created as we use apps or browse the Internet. Moreover, many of these identifiers are transmitted and collected without notification to users, ending up with third parties, including app developers and advertising partners.
The constant transmission of identifier data is important to delivering seamless and tailored services and content to users. However, the uniquely revealing nature of identifiers, combined with the inconsistencies in how they are collected, transmitted, and secured, raise serious security and privacy concerns.
This document:
Describes key identifiers for mobile devices.
Highlights some identifiers that are accessible, and often collected, by various parties.
Highlights the risks associated with thewidespread transmission and use of these identifiers.
Figure 1: Overview of mobile device data transmission.
Key Identifiers for Mobile Devices
Mobile devices are assigned many identifiers that are used by hardware manufacturers, telecommunications service providers, operating system manufacturers, advertisers, and application developers. The identifiers are used to register devices to mobile networks, to ensure that operating systems operate smoothly, and that applications work correctly. They can also be used to facilitate user tracking, and for targeting advertising.
In what follows we discuss some of the different kinds of identifiers that are present at several levels (see Figure 1):
Physical device (e.g., cell phones)
Communications network (e.g., AT&T)
Operating System (e.g., Android or iOS)
Application layer (e.g., Angry Birds)
Physical Device
Acronym
What it does
MAC Address
Media Access Control address uniquely identifies wireless transmitters like Bluetooth and Wi-Fi chips in the device
The International Mobile Equipment Identifier is a string of numbers that is unique for every device
Table 1: Selected Physical Device Identifiers
There are a set of ‘hard baked’ identifiers associated with different components of mobile devices. The various radios that are integrated with the device, such as those associated with cellular, wireless, bluetooth, and near field communications, are all assigned unique Media Access Control (MAC) addresses. The MAC address is assigned to a radio, although it can sometimes be rewritten using software programs. The MAC address of the device’s Wi-Fi chip is typically broadcast when Wi-Fi is enabled and the device is searching for access points. The International Mobile Equipment Identifier (IMEI) is tied to physical devices and remains the same throughout the life of the device. The IMEI denotes the standards board responsible for assigning the identifier, the time that it was manufactured, the serial number issued to the model of the device, and the version of the software installed on the phone.
Communications Network
Acronym
What it does
MIN / MSIN
The Mobile Identification Number or Mobile Subscription Identification Number uniquely identifies a mobile device to a carrier. The number is included in the IMSI as an important identifier.
SIM
The Subscriber Identification Module identifies and authenticates the phone and user to the network, has a unique serial number, and holds substantial information about the user.
IMSI
The International Mobile Subscriber Identification number uniquely identifies the user.
Device IP Address
With mobile data, devices are typically assigned a network IP address.
MSISDN
The Mobile Subscriber Integrated Services Digital Network number includes the caller’s phone number, and uniquely identifies a particular subscriber’s SIM card.
The operators of communications networks, like mobile carriers (e.g., AT&T), or the operators of a Wi-Fi connection (e.g., coffee shops), can read a range of identifiers from devices. In the case of carriers, they also assign their own identifiers.
Mobile Carriers
Mobile service operators typically assign identifiers that register subscribers to cellular networks. The Mobile Identification Number (MIN) or Mobile Subscription Identification Number (MSIN) are used to uniquely identify a subscriber. A Subscriber Identification Module (SIM), commonly referred to as a “SIM Card,” includes information about which carrier is associated with the module, its time of manufacture and other carrier-specific information, as well as a serial number uniquely linked with the SIM itself. The SIM is identified to the network with an International Mobile Subscriber Identity (IMSI) number2, which in turn identifies the mobile country code, network code, and mobile subscription identification number. In the case of cellular data, a network IP addresses is also assigned to the device.
Using identifiers like the IMSI, cellular operators typically collect geolocation records of mobile devices movements based on proximity to cellular towers. They also collect billing and usage information (e.g., websites visited, numbers dialled out, numbers dialled in, messages sent and received, etc.).
Wi-Fi Operators
In comparison to cellular providers, Wi-Fi operators tend to issue or require fewer identifiers. Wi-Fi operators will most commonly assign IP address information, though they may also require authentication credentials in order to log into the Wi-Fi hotspot. However, it is difficult to generalize about the practices of Wi-Fi operators, as they have widely varying policies about collecting and retaining data transmitted by users’ devices.
Importantly, communications network providers (both mobile and Wi-Fi) are often able to read, retain/log, or make decisions based on the identifiers and data that are transmitted on their networks. For example, a communications provider can watch for the identifiers linked to a physical device as well as the identifiers associated with operating systems and applications. After reading the identifiers, they can log the presence of the identifiers for billing or marketing purposes, as well as make decisions whether or not to provide the device with service.
Operating System
Acronym
What it does
IFA
Apple’s Identifier For Advertisers lets app developers track users and replaces the UDID (Unique Device Identifier)3
Android Identifier
A unique number generated when the operating system is first run that can be used to track users.
Google Wallet & Apple Pay
Payment services linked to both devices and accounts.
Table 3: Selected Operating System Identifiers
Mobile operating system developers, such as Google, Apple, Microsoft, and Blackberry, can also include identifiers that assist users in operating their devices and provide resources to developers responsible for creating applications for the respective manufacturers’ operating systems.
Android devices, for example, have the Android Identifier that is generated the first time a newly installed Android OS is booted.4 Previously, Apple devices both used and shared a UDID (Unique Device Identifier) with applications. After privacy and security concerns were raised by researchers and the press, Apple introduced a separate number in more recent versions of iOS that is called the Identifier for Advertisers (IFA). The IFA (which can be disabled by a device owner) lets advertisers track user behavior across activities.
Sometimes operating systems providers will prompt users to generate new identifiers or credentials, such as a new Google account, Microsoft Live account, or AppleID. A growing number of companies, including Google (Google Wallet) and Apple (Apple Pay) are also integrating mobile payment services with near field communication options built into devices. In addition, mobile carriers sometimes integrate these payment options with mobile app stores, like Google Play or the App Store. Users may also be asked to provide ‘crash’ information to the operating system manufacturer, and such information may contain details about the user’s device and their usage of it.
Application Layer
Finally, application makers develop identifiers for authentication and advertising purposes. They may require users to create or sign in using authentication credentials or, when paying for items, either pay through operating system-based payment systems or through their own independent payment gateways. Applications may also ‘leak’ identifying information about the application itself, such as declaring their name, version information, or communications protocol in the user-agent identification string.5
Applications may also request access to sensor (e.g. accelerometer) or communications data, such as GPS, Wi-Fi, or SMS information. Applications can also request user data, such as contacts and files. Still other applications request a wide range of information from user devices, not all of it clearly aligned with the advertised functionality of the app. Even if the application itself is only using the “necessary” permissions for functionality, advertising networks included in the application may be “piggy backing” on the permissions requested by the app in order to access identifying data.
Access to these pieces of data is typically referred to as ‘permissions’; only once a user or device owner has permitted the application to read this information does it gain access to the requested sensor, user, or communications data.
Surveys of mobile device applications haveshown that applications request access to more information than they require to perform their stated functions (e.g., a calculator application requesting access to geolocation, SMS, and call log information). Such overbroad requests for data on mobile devices create privacy problems, including: the user may not know that personal data is shared; the app developer may share data with third parties; the data may not be transmitted securely; and, the data may not be stored securely.
Who can access what on a mobile device?
The range of identifiers discussed previously are not accessible to all of the different parties involved in facilitating and enabling mobile device-based communications. Table 4 provides a general summary of the kinds of data available to each party. However, given the complexity of the ecosystem it is difficult to generalize, and there is likely to be variation in specific cases.
Table 4: Mobile Identifiers and who has access to them
Cellular Provider
Cellular providers typically possess a wide range of information about you; in addition to the identifiers, denoted in Table 4, they may have payment information for post-billing purposes, government identification information when that kind of information must be provided to receive a SIM card, credit information, and more. These additional kinds of information may be needed to satisfy business or regulatory requirements.
Wi-Fi Provider
The provider of the Wi-Fi network to which a device is connected can capture and read unencrypted data traffic, such as unencrypted web traffic. This type of provider can also determine information about a device connected to the network by analyzing transmitted user-agent strings, the device’s MAC address, or any identifiers that application or mobile operating system developers transmit in plaintext.
OS Vendor
The developers of major operating systems, like Android, have access to a wide range of information about the device. For an Android device to regularly receive updates it must be tied to an account, such as the Gmail account required to access the Google Play Store. In addition to the exceptionally wide range of information about the device that this access provides, many of the bundled applications on phones, including maps, provide a rich stream of location information back to the operating system manufacturer.
The design principles integrated within mobile operating systems vary considerably, with consequences for how much of a user’s communications the vendor sees. For example, on Android, Google Hangout messages are accessible to Google in an unencrypted format, whereas iMessage communications on iOS are encrypted end-to-end, blocking Apple from easily reading the messages. Despite these differences, vendors still receive substantial information about users via avenues like mobile account backup and recovery, updates, map applications, and activities on app stores.
Finally, while tremendous variation exists across handset manufacturers, major manufacturers also have avenues for access to identifying information about users. For example, some major manufacturers offer ‘find my mobile,’ backup services, and updates. Some previous reports have highlighted privacy and security concerns with these services, including cases where personal user data was apparently sent without encryption.
Application Developer
Application developers can access a range of identifiers in the course of providing their services. Many mobile operating systems will reveal which identifiers an application seeks to access, such as phone dialing information, SMS messages, or the device’s GPS; these possible permissions are noted in Table 4. In addition, developers may partner with advertising networks or other third parties, and share their users’ identifiers or personal information with these other parties. As a result, in addition to the apparent collectors of identifiers (i.e. app developers) there are largely hidden collectors, such as those belonging to advertisers and analytics or crash report companies.
Device Tracking by Third Parties Using Identifiers
The many identifiers assigned to our devices form a key part of the operations of mobile and wireless networks. However, a range of vulnerabilities can be exploited by another category of actors: third parties who seek to track or monitor the communications of device owners.
For example, security flaws in the design of the global telephone system enable third parties to silently track the location of any mobile number anywhere in the world, as well as snoop on user activities. At a more local level, businesses are increasingly monitoring the movement of shoppers and foot traffic near and within their stores; some companies use the Wi-Fi MAC address, signal strength, and other mobile device characteristics to identify customers as they browse stores or walk in retail areas. Some attempts have been made by manufacturers to reduce the identifying characteristics of Wi-Fi connectivity by randomizing MAC addresses, but with mixed results.
Data Gathering and Surveillance by State Actors
Governments throughout the world make extensive use of the vulnerabilities and privacy deficits associated with mobile communications to conduct both targeted and widespread surveillance.
We know from a recent case in Libya that the Gaddafi regime leveraged tracking and monitoring on the mobile network as a potent tool for control and repression. Moreover, state-level actors have also hacked SIM card manufacturers’ systems to collect encryption keys, and can collect IMSI and IMEI numbers alongside phone call information. At local levels, some authorities use ‘IMSI-catchers’ to create fake cellular towers for targeted monitoring. As nearby cellular phones connect to these fake towers, users can be identified and their calls and messages monitored.
The applications running on mobile devices are also targeted by state actors. The Canadian Communications Security Establishment intelligence agency reportedly experimented with capturing data that leaked from mobile devices to map and track those devices (and their owners) as they moved around the country. British intelligence officers exploited a popular web browsing application that poorly secured users’ information. Finally, British and American intelligence officers reportedly captured information, such as contact books, that were collected by the application ‘Angry Birds.’
Concluding Remarks
The mobile ecosystem is complex and multi-faceted, making it challenging for ordinary users to evaluate their security and privacy risks. Even security conscious users find it difficult to control the communications from their devices. This working document is intended to highlight only one part part of this environment: the many unique identifiers that are regularly transmitted from our devices. We welcome feedback and input, and hope to update the working document in the future.
Footnotes
1 On CDMA networks, devices may use an ESN (Electronic Serial Number) or an MEID (Mobile Equipment Identifier) for the same purposes 2 To limit transmission of the more sensitive IMSI number, the network uses a temporary number (the Temporary Mobile Subscriber Identity) for most periodic updates. 3 Apple still has access to the UDID; the IFA was developed to reduce Apps access to the UDID while providing tracking information to advertisers. 4 A factory reset results in a new Android Identifier. 5 When a user visits a website, the user’s browser sends a string of text (the ‘user agent identification string’) to the requested web server identifying the user’s web browser, browser version number, operating system and other details about the user’s system. 6 Depending on the OS, apps would typically need to request permissions for this access. 7 In jurisdictions where enhanced emergency calling is being rolled out some providers may be able to access your device GPS output when you make an emergency call. 8 In some cases carriers provide mobile payment options, e.g. Google Play, for online services.