Defeat Echelon/NSAQ/CIA Cell Phone Spying
Tin Foil Hatter | 04.05.2007 21:37 | Anti-militarism | Technology | Terror War | World
Tin Foil Hatter
Tin Foil Hatter | 04.05.2007 21:37 | Anti-militarism | Technology | Terror War | World
Tin Foil Hatter
Comments
Hide the following 14 comments
One flaw in your design
04.05.2007 22:19
Maybe I've missed your point. If you have to have a mobile phone on you then for health reasons or privacy reasons it would be good to stick it in a metal box. But you wouldn't get any incoming calls when it was in there. Which negates part of the reason of having a mobile phone. Not that I do anymore.
I would urge activists just to leave their mobile phones turned on at home when they go out on actions. Taking them with you and taking the batteries out while discussing actions is just a sign to the cops you are up to something.
Danny
drain
05.05.2007 01:08
Is there any credible evidence that a mobile can be tracked with the battery out? It seems to me that if the handset has no power it'd be invisible?
Aside: A friend who worked on 999 told me that mobiles are tracked/located using a triangulation of the node (unique network ID) between phone masts (the more remote the area and the fewer the masts the harder it gets to be precise. I.e. the Emergency Services wouldn't be able to tell if you were on Skye or Applecross if you were in line of sight of just a single mast within any point within hundreds of square miles. In a place like London, you could probably get it down to meters.
Also
Missing The Point
05.05.2007 07:54
One example in Islamophobic Western societies might be using a cell phone while Arab, or any color skin darker than bleached pastry flour. A second would be defense attorneys meeting with clients afraid that government spy agencies are listening in on their private conversations: it has happened countless times before. Think Jose Padilla and Guantanamo, for example. Yet another would be the phenomenon of "flash mobs," which gained popularity a few years back, and are now under scrutiny as potential "tewwowists," as Elmer Fudd would say.
.
Better solution
05.05.2007 10:03
Zeberdee
dot
05.05.2007 10:22
Wrapping the phone in foil will achieve nothing to prevent this. Like mentioned, the best method of not being tracked is to take the battery out your phone... or better still just don't have a mobile phone. Which won't stop them them bugging everyone else's phone who they show to be of interest to an investigation.
See Regulation of Investigatory Powers Act 2000:
http://en.wikipedia.org/wiki/Regulation_of_Investigatory_Powers_Act_2000
I remember seeing a nice flow chart of what the police/security services do to obtain a warrant and how wide the scope was for monitoring telephone numbers "close" to the person being monitored.
I'd be wary of believing the US about anything regarding how powerful their national security projects are. They are famous for telling massive fibs. Here's a prime example of them duping the public into letting rich people ride off the taxes of poor people:
http://en.wikipedia.org/wiki/Strategic_Defense_Initiative
Drain
CNET article confirming spying on private cell phone conversations
05.05.2007 19:42
==================================
FBI taps cell phone mic as eavesdropping tool
By Declan McCullagh
http://news.com.com/FBI+taps+cell+phone+mic+as+eavesdropping+tool/2100-1029_3-6140191.html
Story last modified Mon Dec 04 06:56:51 PST 2006
The FBI appears to have begun using a novel form of electronic surveillance in criminal investigations: remotely activating a mobile phone's microphone and using it to eavesdrop on nearby conversations.
The technique is called a "roving bug," and was approved by top U.S. Department of Justice officials for use against members of a New York organized crime family who were wary of conventional surveillance techniques such as tailing a suspect or wiretapping him.
Nextel cell phones owned by two alleged mobsters, John Ardito and his attorney Peter Peluso, were used by the FBI to listen in on nearby conversations. The FBI views Ardito as one of the most powerful men in the Genovese family, a major part of the national Mafia.
The surveillance technique came to light in an opinion published this week by U.S. District Judge Lewis Kaplan. He ruled that the "roving bug" was legal because federal wiretapping law is broad enough to permit eavesdropping even of conversations that take place near a suspect's cell phone.
Kaplan's opinion said that the eavesdropping technique "functioned whether the phone was powered on or off." Some handsets can't be fully powered down without removing the battery; for instance, some Nokia models will wake up when turned off if an alarm is set.
While the Genovese crime family prosecution appears to be the first time a remote-eavesdropping mechanism has been used in a criminal case, the technique has been discussed in security circles for years.
The U.S. Commerce Department's security office warns that "a cellular telephone can be turned into a microphone and transmitter for the purpose of listening to conversations in the vicinity of the phone." An article in the Financial Times last year said mobile providers can "remotely install a piece of software on to any handset, without the owner's knowledge, which will activate the microphone even when its owner is not making a call."
Nextel and Samsung handsets and the Motorola Razr are especially vulnerable to software downloads that activate their microphones, said James Atkinson, a counter-surveillance consultant who has worked closely with government agencies. "They can be remotely accessed and made to transmit room audio all the time," he said. "You can do that without having physical access to the phone."
Because modern handsets are miniature computers, downloaded software could modify the usual interface that always displays when a call is in progress. The spyware could then place a call to the FBI and activate the microphone--all without the owner knowing it happened. (The FBI declined to comment on Friday.)
"If a phone has in fact been modified to act as a bug, the only way to counteract that is to either have a bugsweeper follow you around 24-7, which is not practical, or to peel the battery off the phone," Atkinson said. Security-conscious corporate executives routinely remove the batteries from their cell phones, he added.
FBI's physical bugs discovered
The FBI's Joint Organized Crime Task Force, which includes members of the New York police department, had little luck with conventional surveillance of the Genovese family. They did have a confidential source who reported the suspects met at restaurants including Brunello Trattoria in New Rochelle, N.Y., which the FBI then bugged.
But in July 2003, Ardito and his crew discovered bugs in three restaurants, and the FBI quietly removed the rest. Conversations recounted in FBI affidavits show the men were also highly suspicious of being tailed by police and avoided conversations on cell phones whenever possible.
That led the FBI to resort to "roving bugs," first of Ardito's Nextel handset and then of Peluso's. U.S. District Judge Barbara Jones approved them in a series of orders in 2003 and 2004, and said she expected to "be advised of the locations" of the suspects when their conversations were recorded.
Details of how the Nextel bugs worked are sketchy. Court documents, including an affidavit (p1) and (p2) prepared by Assistant U.S. Attorney Jonathan Kolodner in September 2003, refer to them as a "listening device placed in the cellular telephone." That phrase could refer to software or hardware.
One private investigator interviewed by CNET News.com, Skipp Porteous of Sherlock Investigations in New York, said he believed the FBI planted a physical bug somewhere in the Nextel handset and did not remotely activate the microphone.
"They had to have physical possession of the phone to do it," Porteous said. "There are several ways that they could have gotten physical possession. Then they monitored the bug from fairly near by."
But other experts thought microphone activation is the more likely scenario, mostly because the battery in a tiny bug would not have lasted a year and because court documents say the bug works anywhere "within the United States"--in other words, outside the range of a nearby FBI agent armed with a radio receiver.
In addition, a paranoid Mafioso likely would be suspicious of any ploy to get him to hand over a cell phone so a bug could be planted. And Kolodner's affidavit seeking a court order lists Ardito's phone number, his 15-digit International Mobile Subscriber Identifier, and lists Nextel Communications as the service provider, all of which would be unnecessary if a physical bug were being planted.
A BBC article from 2004 reported that intelligence agencies routinely employ the remote-activiation method. "A mobile sitting on the desk of a politician or businessman can act as a powerful, undetectable bug," the article said, "enabling them to be activated at a later date to pick up sounds even when the receiver is down."
For its part, Nextel said through spokesman Travis Sowders: "We're not aware of this investigation, and we weren't asked to participate."
Other mobile providers were reluctant to talk about this kind of surveillance. Verizon Wireless said only that it "works closely with law enforcement and public safety officials. When presented with legally authorized orders, we assist law enforcement in every way possible."
A Motorola representative said that "your best source in this case would be the FBI itself." Cingular, T-Mobile, and the CTIA trade association did not immediately respond to requests for comment.
Mobsters: The surveillance vanguard
This isn't the first time the federal government has pushed at the limits of electronic surveillance when investigating reputed mobsters.
In one case involving Nicodemo S. Scarfo, the alleged mastermind of a loan shark operation in New Jersey, the FBI found itself thwarted when Scarfo used Pretty Good Privacy software (PGP) to encode confidential business data.
So with a judge's approval, FBI agents repeatedly snuck into Scarfo's business to plant a keystroke logger and monitor its output.
Like Ardito's lawyers, Scarfo's defense attorneys argued that the then-novel technique was not legal and that the information gleaned through it could not be used. Also like Ardito, Scarfo's lawyers lost when a judge ruled in January 2002 that the evidence was admissible.
This week, Judge Kaplan in the southern district of New York concluded that the "roving bugs" were legally permitted to capture hundreds of hours of conversations because the FBI had obtained a court order and alternatives probably wouldn't work.
The FBI's "applications made a sufficient case for electronic surveillance," Kaplan wrote. "They indicated that alternative methods of investigation either had failed or were unlikely to produce results, in part because the subjects deliberately avoided government surveillance."
Now on News.com
Tesla's roadster meets the engineers Urban farming barges ahead in New York Week in review: The revolution will be posted Extra: A half century of lunar exploration Video: Web developers sound off on Silverlight
Bill Stollhans, president of the Private Investigators Association of Virginia, said such a technique would be legally reserved for police armed with court orders, not private investigators.
There is "no law that would allow me as a private investigator to use that type of technique," he said. "That is exclusively for law enforcement. It is not allowable or not legal in the private sector. No client of mine can ask me to overhear telephone or strictly oral conversations."
Surreptitious activation of built-in microphones by the FBI has been done before. A 2003 lawsuit revealed that the FBI was able to surreptitiously turn on the built-in microphones in automotive systems like General Motors' OnStar to snoop on passengers' conversations.
When FBI agents remotely activated the system and were listening in, passengers in the vehicle could not tell that their conversations were being monitored.
Malicious hackers have followed suit. A report last year said Spanish authorities had detained a man who write a Trojan horse that secretly activated a computer's video camera and forwarded him the recordings.
.
Homepage: http://news.com.com/FBI+taps+cell+phone+mic+as+eavesdropping+tool/2100-1029_3-6140191.html
Tin Foil Tent
06.05.2007 09:38
Which is why you should never use a mobile with a poor signal, in a shopping centre for instance. Not for security, just because you will fry your brain.
"It seems to me that if the handset has no power it'd be invisible? "
Yep, if it really has no power and hasn't been tampered with.
This is that BBC article from when MI6 was exposed by Claire Short of spying on the UN and Kofi Annan just before Blair invaded Iraq ( I posted it here at the time).
"But today's spies are also able to convert conventional phones into bugs without the owners' knowledge. Experts believe this is the most likely method used to gather information in the UN building. Mobiles communicate with their base station on a frequency separate from the one used for talking. If you have details of the frequencies and encryption codes being used you can listen in to what is being said in the immediate vicinity of any phone in the network. According to some reports, intelligence services do not even need to obtain permission from the networks to get their hands on the codes. So provided it is switched on, a mobile sitting on the desk of a politician or businessman can act as a powerful, undetectable bug. The technology also exists to convert land line telephones into covert listening devices. According to one security expert, telephone systems are often fitted with "back doors" enabling them to be activated at a later date to pick up sounds even when the receiver is down....Another way of making sure you are not being bugged is to use a Faraday cage or shielded tent, which prevents radio waves entering or leaving. Mobile phone calls are impossible from inside the tent, but no-one will be able to listen to your conversations using bugs or radio wave listening devices. "
Danny
Homepage: http://news.bbc.co.uk/1/hi/magazine/3522137.stm
Infinites
06.05.2007 11:45
Littlebugger
Buggy windows (non-microsoft)
06.05.2007 12:40
£10,575.00
For use in situations where secret surveillance is absolutely necessary and the operator is not able to enter the target room in order to place a transmitter.
http://www.spyshop.ltd.uk/index.php?main_page=product_info&products_id=27
Ideally something that omitted noise at the key frequencies of male/female speech placed right against the window glass should mask people talking. Getting a couple of portable radios (about £5 each) and having them on two different talk channels, at a reasonable volume right against the window should fuck this up.
Given the price of equipment, I'd doubt that many agencies have it as standard equipment.
Drain
For £10.000 less
06.05.2007 20:58
Cheapspy
Curtains ?
06.05.2007 21:17
Danny
Not sure
07.05.2007 16:43
Putting the curtains on the outside would probably be more effective... a little less than low profile as far as appearances go.
Perhaps adding a perspex sheet and sealing it with silicone would reduce the overall transmission. Certainly using thick felt curtains would make a difference but expensive, heavy and not very flexible.
Asking a supplier about what the weaknesses of the system is (triple glazing, ambient room noise, curtains etc.) would probably give you some insight.
I just found this, which confirms some of my ideas.
http://www.security-int.com/categories/audio-surveillance-countermeasures/audio-surveillance-countermeasures-2.asp
This came up on the search too, but not being an electronics buff, I have no clue if it's valid.
http://www.instructables.com/id/EF9RFCKV9JEPORT41Y/
Drain
More
07.05.2007 17:22
Looks suspiciously like those cheapo speakers you get greetings cards.
Drain
The Voyeur State
08.05.2007 12:30
Thanks for the tip though. I guess the only way to test http://www.electromax.com/laser.html would be to buy one. Or someone from here could offer to become the 'UK affiliate' and ask for sample products. The sad thing is although the home page is a tweenage James Bond fetish pastiche, all their other products are genuine. So it would be surprising if the laser thingy didn't work. I wouldn't mind living in a surveillance state but it is illegal to walk around naked and talk honestly. If there are future generations they will consider us bizarre.
People who have nothing to say like to listen in to those of us who do. Write things down and burn the paper. I don't have a techie tip of equal quality except to recommend once again the movie 'The Lives of Others' to anyone who has the brains to realise the Stasi wasn't so different from MI5 - except it was disbanded.
Ynnad