Mobile Phones Are Bugs
phones off! | 12.02.2007 12:59 | Repression | Technology
this is old news but the debate continues
For those who still don't believe it is possible to be bugged even when you are not using your mobile phone there is plenting of info showing this is the case going back several years.
one such article reprinted here from FT.
" more significantly they can also remotely install a piece of software on to any handset, without the owner's knowledge, which will activate the microphone even when its owner is not making a call, giving security services the perfect bugging device. "We have inadvertently started carrying our own trackable ID card in the form of the mobile phone," said Sandra Bell, head of the homeland security department at the Royal United Services Institute."
For those who still don't believe it is possible to be bugged even when you are not using your mobile phone there is plenting of info showing this is the case going back several years.
one such article reprinted here from FT.
" more significantly they can also remotely install a piece of software on to any handset, without the owner's knowledge, which will activate the microphone even when its owner is not making a call, giving security services the perfect bugging device. "We have inadvertently started carrying our own trackable ID card in the form of the mobile phone," said Sandra Bell, head of the homeland security department at the Royal United Services Institute."
Financial Times
Use of mobile helped police keep tabs on suspect and brother
By Mark Odell,Telecoms Correspondent
Published: August 2 2005 02:00 | Last updated: August 2 2005 02:00
The arrest of Hamdi Adus Issac, who goes by the name of Hussain Osman, is the latest in a long line of police investigations helped by the suspect's use of a mobile telephone.
Italian police revealed yesterday that the initial tip that allowed them to track Mr Issac's cell phone came from their British counterparts.
On July 26, the UK authorities notified those in Italy that a suspect going by the name of Hussain Osman had left the UK.
The next day the cell telephone that British police had linked to the suspect was switched to the Italian telephone system. On July 28, police discovered the destination of Mr Issac and his brother was put under surveillance in Rome.
Once police or the security services know the mobile phone number of a suspect, they can ask the mobile operator to track the individual.
As long as the handset is switched on the telephone can be tracked across any mobile network in real time.
By using no more than three mobile telephone masts or base stations - a process known as triangulation - it is possible to pin down the location of an individual in high density urban areas to between two and three metres. Crucial to this triangulation is the proximity to each other of the three base stations, but on average the standard deviation is no more than 25 metres.
If ordered to do so, mobile telephone operators can also tap any calls, but more significantly they can also remotely install a piece of software on to any handset, without the owner's knowledge, which will activate the microphone even when its owner is not making a call, giving security services the perfect bugging device. "We have inadvertently started carrying our own trackable ID card in the form of the mobile phone," said Sandra Bell, head of the homeland security department at the Royal United Services Institute.
The UK security services have used mobile telephone records to trap IRA terrorists in the past and the police have been helped in solving high-profile murders and abductions too.
The most recent high-profile Italian investigation using telephone records prior to the arrest of Mr Issac is that of Antonio Fazio, Italy's central bank governor, who is under fire over his alleged bias in handling an Italian bank take-over battle.
Copyright The Financial Times Limited 2007
Use of mobile helped police keep tabs on suspect and brother
By Mark Odell,Telecoms Correspondent
Published: August 2 2005 02:00 | Last updated: August 2 2005 02:00
The arrest of Hamdi Adus Issac, who goes by the name of Hussain Osman, is the latest in a long line of police investigations helped by the suspect's use of a mobile telephone.
Italian police revealed yesterday that the initial tip that allowed them to track Mr Issac's cell phone came from their British counterparts.
On July 26, the UK authorities notified those in Italy that a suspect going by the name of Hussain Osman had left the UK.
The next day the cell telephone that British police had linked to the suspect was switched to the Italian telephone system. On July 28, police discovered the destination of Mr Issac and his brother was put under surveillance in Rome.
Once police or the security services know the mobile phone number of a suspect, they can ask the mobile operator to track the individual.
As long as the handset is switched on the telephone can be tracked across any mobile network in real time.
By using no more than three mobile telephone masts or base stations - a process known as triangulation - it is possible to pin down the location of an individual in high density urban areas to between two and three metres. Crucial to this triangulation is the proximity to each other of the three base stations, but on average the standard deviation is no more than 25 metres.
If ordered to do so, mobile telephone operators can also tap any calls, but more significantly they can also remotely install a piece of software on to any handset, without the owner's knowledge, which will activate the microphone even when its owner is not making a call, giving security services the perfect bugging device. "We have inadvertently started carrying our own trackable ID card in the form of the mobile phone," said Sandra Bell, head of the homeland security department at the Royal United Services Institute.
The UK security services have used mobile telephone records to trap IRA terrorists in the past and the police have been helped in solving high-profile murders and abductions too.
The most recent high-profile Italian investigation using telephone records prior to the arrest of Mr Issac is that of Antonio Fazio, Italy's central bank governor, who is under fire over his alleged bias in handling an Italian bank take-over battle.
Copyright The Financial Times Limited 2007
phones off!
Comments
Hide the following 10 comments
stick to the fax...
12.02.2007 16:20
This would be significant, were it actually true. There are some handsets that can have software remotely installed but they are not compatible with UK networks, and even in the US they are not common.
believe the media
What if it is switched off?
12.02.2007 17:35
Harry
Mines in the bin
12.02.2007 17:58
Sting
reactivate at own risk
12.02.2007 19:48
Take the battery out =
Unbugged!
more here http://www.freebeagles.org/articles/mobile_phones.html#4
De-activate
Again no !
13.02.2007 01:01
Take the battery out =
Unbugged!
No, no, no. I've a tawdry electronics qualificatiion but I could bug your phone even with the battery out if I had access to it for 5 minutes. If you want to discuss anything of importance, leave your phones out of ear-shot. Don't be paranoid, be rational. A small cell in a phone can be used to temporarily replace your 'battery'.
drawnIn
To Harry
13.02.2007 15:45
A mobile phone obsessed society like ours (which didn't exist 15 years ago) is open
to bugging - tracking - and any other shit the State deems necessary (waste of time).
What the fuck do people talk about all the time on their mobiles anyway?
A created need for mobile phones has led us all into a big brother scenario which can be avoided - chuck the fucking things in the river!!
Dog n Bone Mast
Out of curiosity...
13.02.2007 18:03
sceptic
But really
14.02.2007 16:35
tracking and bugging while phone 'off' and battery in place = yes
tracking and bugging while phone off and battery removed = no
okay, so somebody could tamper with your phone if they had physical access for long enough and insert a separate bug or tracking device with it's own (limited) power supply. but mobile phones have zero extra space inside them for any additional battery of significant size to be added so forget the idea that they will continue to operate when you remove the battery. as for backup cells used to keep the memory in place while you swap the main battery - they are tiny and not powerful enough to do anything beyond maintaining the memory.
lets be realistic about this phone stuff.
1. they ARE tracking devices and that requires nothing beyond access to the computer systems of your phone network which all intelligence agencies would have and any decent private investigator would also be able to access that information given time.
2. they ARE means to identify associates and networks of association, either via physical access to your phone and it's phonebook and calls register or remotely either hacking your phone via bluetooth or the network, or once again through the data retained by your mobile phone network operator.
3. they COULD BE bugs in real time. possible but unlikely in most cases unless you are being investigated for your mafia or Al Qaeda links. your phones 'talk time' due to limited battery life is the limiting factor here. if your phone was remotely turned into a transmitter the battery would go flat much much faster than you expected - within hours rather than days.
4. turning the phone off DOES NOTHING do defend you as 'off' is merely the equivalent of standby and the software in the phone can continue to periodically report to the nearest cell repeater or switch itself to transmit without you being aware, if that's what somebody really wanted.
5. taking the battery out IS a practical defense. backup battery cells are tiny by comparison and configured to maintain memory functions date/time etc while the main battery is changed. while they could theoretically be used to power the transmitter, it could only do so for a very limited period of time, probably less than a minute.
6. knowledge IS useful, paranoia IS NOT
another view
really you idiot
15.02.2007 10:31
When talking about security it is somewhat suspicious that you talk as if you are an expert when you obviously know nothing.
The argument there is no space in a mobile phone to place a backup cell is simply wrong for most phones, especially the older, bulkier phones most activists can afford. Open one up and see. Perhaps you don't know how small a power source can be. as it would easy to recharge this back up cell, or more likely a high charge capacitor, from the normal battery. A 'super cap' capacitor can maintain it's power for years, be recharged thousands of times, can power your phone and come in sizes small enough to fit inside even the tightest phone. A super cap can even be screen-printed flatly by a 1st year student onto the cover of your phone.
"taking the battery out IS a practical defense. backup battery cells are tiny by comparison and configured to maintain memory functions date/time etc while the main battery is changed. while they could theoretically be used to power the transmitter, it could only do so for a very limited period of time, probably less than a minute"
What an idiot you are, calling other people paranoid while pretending to be an expert on their security. If you think knowledge is useful then why not do five minutes research even if you can't be bothered getting an electronics qualification ? The cell or cap wouldn't need to power the transmitter to act as a bugging device, in fact that could be a giveaway through the heat it would generate, it could simply act as a recorder to be transmitted when the main battery is reinstalled.
Also, do you really know the history of every phone in your group ? You get functional mobile phones that fire bullets. These are obviously built for that purpose rather than tampered with but since activists have been removing their batteries for years, do you really think it is beyond the wit of security services to
Why distrust everyone carrying phones with their cells in only to risk allowing them to carry the phones with the battery out ? If everyone is going to the hassle of taking their batteries out then why not dump them all in a bag 20m away ? And while you are at it, dump every other piece of electronics you are carrying too. Only careless idiots and agents accuse careful activists of being parnoid.
drawnIn
Homepage: http://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html
leave the phones at home
15.02.2007 12:22
There is a difference between switched off and unpowered. Think of it being in standby mode when you 'turn it off', in other words only parts of the circuitry are off.
"There are some handsets that can have software remotely installed but they are not compatible with UK networks, and even in the US they are not common."
Unless you are a phone manufacturer coder or can provide convincing links then forgive me if I take this with a pinch of salt. Considering nearly all commercial computer software gets pssed through the NSA for 'approval', it would be trusting to assume phone companies don't do the same.
If all you are doing is sit-downs and blocks, then don't worry too much. If you are risking prison time then only talk through passed notes to people you trust and make sure they are burned. Hezbullah leaders don't use mobiles since the Israelis either plant bombs in them to blow their heads off or use the signal to guide in missiles. Rich criminals who need mobiles keep a big stack of them and chuck them away regularly. Mafia dons just write notes - even that isn't fool proof, one was caught by his laundry list recently.
The very fact several activists phone all suddenly converge and then get turned off should be indicating to the authorities that something is up. Good practice eliminates doubt. Leave your mobile at home.
drawnIn