Skip to content or view screen version

Hidden Article

This posting has been hidden because it breaches the Indymedia UK (IMC UK) Editorial Guidelines.

IMC UK is an interactive site offering inclusive participation. All postings to the open publishing newswire are the responsibility of the individual authors and not of IMC UK. Although IMC UK volunteers attempt to ensure accuracy of the newswire, they take no responsibility legal or otherwise for the contents of the open publishing site. Mention of external web sites or services is for information purposes only and constitutes neither an endorsement nor a recommendation.

Remote eavesdropping on mobile phones - Remove Battery

Not secure | 26.08.2007 08:36 | Repression | Technology | World

Your mobile phone can be used against you. Security Services can eavesdrop on you even with it turned off. REMOVE THE BATTERY AT MEETINGS.

FBI taps cell phone mic as eavesdropping tool

By Declan McCullagh
 http://news.com.com/FBI+taps+cell+phone+mic+as+eavesdropping+tool/2100-1029_3-6140191.html

Story last modified Mon Dec 04 06:56:51 PST 2006




The FBI appears to have begun using a novel form of electronic surveillance in criminal investigations: remotely activating a mobile phone's microphone and using it to eavesdrop on nearby conversations.
The technique is called a "roving bug," and was approved by top U.S. Department of Justice officials for use against members of a New York organized crime family who were wary of conventional surveillance techniques such as tailing a suspect or wiretapping him.

Nextel cell phones owned by two alleged mobsters, John Ardito and his attorney Peter Peluso, were used by the FBI to listen in on nearby conversations. The FBI views Ardito as one of the most powerful men in the Genovese family, a major part of the national Mafia.

The surveillance technique came to light in an opinion published this week by U.S. District Judge Lewis Kaplan. He ruled that the "roving bug" was legal because federal wiretapping law is broad enough to permit eavesdropping even of conversations that take place near a suspect's cell phone.

Kaplan's opinion said that the eavesdropping technique "functioned whether the phone was powered on or off." Some handsets can't be fully powered down without removing the battery; for instance, some Nokia models will wake up when turned off if an alarm is set.

While the Genovese crime family prosecution appears to be the first time a remote-eavesdropping mechanism has been used in a criminal case, the technique has been discussed in security circles for years.

The U.S. Commerce Department's security office warns that "a cellular telephone can be turned into a microphone and transmitter for the purpose of listening to conversations in the vicinity of the phone." An article in the Financial Times last year said mobile providers can "remotely install a piece of software on to any handset, without the owner's knowledge, which will activate the microphone even when its owner is not making a call."

Nextel and Samsung handsets and the Motorola Razr are especially vulnerable to software downloads that activate their microphones, said James Atkinson, a counter-surveillance consultant who has worked closely with government agencies. "They can be remotely accessed and made to transmit room audio all the time," he said. "You can do that without having physical access to the phone."

Because modern handsets are miniature computers, downloaded software could modify the usual interface that always displays when a call is in progress. The spyware could then place a call to the FBI and activate the microphone--all without the owner knowing it happened. (The FBI declined to comment on Friday.)

"If a phone has in fact been modified to act as a bug, the only way to counteract that is to either have a bugsweeper follow you around 24-7, which is not practical, or to peel the battery off the phone," Atkinson said. Security-conscious corporate executives routinely remove the batteries from their cell phones, he added.

FBI's physical bugs discovered
The FBI's Joint Organized Crime Task Force, which includes members of the New York police department, had little luck with conventional surveillance of the Genovese family. They did have a confidential source who reported the suspects met at restaurants including Brunello Trattoria in New Rochelle, N.Y., which the FBI then bugged.

But in July 2003, Ardito and his crew discovered bugs in three restaurants, and the FBI quietly removed the rest. Conversations recounted in FBI affidavits show the men were also highly suspicious of being tailed by police and avoided conversations on cell phones whenever possible.

That led the FBI to resort to "roving bugs," first of Ardito's Nextel handset and then of Peluso's. U.S. District Judge Barbara Jones approved them in a series of orders in 2003 and 2004, and said she expected to "be advised of the locations" of the suspects when their conversations were recorded.

Details of how the Nextel bugs worked are sketchy. Court documents, including an affidavit (p1) and (p2) prepared by Assistant U.S. Attorney Jonathan Kolodner in September 2003, refer to them as a "listening device placed in the cellular telephone." That phrase could refer to software or hardware.

One private investigator interviewed by CNET News.com, Skipp Porteous of Sherlock Investigations in New York, said he believed the FBI planted a physical bug somewhere in the Nextel handset and did not remotely activate the microphone.

"They had to have physical possession of the phone to do it," Porteous said. "There are several ways that they could have gotten physical possession. Then they monitored the bug from fairly near by."

But other experts thought microphone activation is the more likely scenario, mostly because the battery in a tiny bug would not have lasted a year and because court documents say the bug works anywhere "within the United States"--in other words, outside the range of a nearby FBI agent armed with a radio receiver.

In addition, a paranoid Mafioso likely would be suspicious of any ploy to get him to hand over a cell phone so a bug could be planted. And Kolodner's affidavit seeking a court order lists Ardito's phone number, his 15-digit International Mobile Subscriber Identifier, and lists Nextel Communications as the service provider, all of which would be unnecessary if a physical bug were being planted.

A BBC article (  http://news.bbc.co.uk/2/hi/uk_news/magazine/3522137.stm) from 2004 reported that intelligence agencies routinely employ the remote-activiation method. "A mobile sitting on the desk of a politician or businessman can act as a powerful, undetectable bug," the article said, "enabling them to be activated at a later date to pick up sounds even when the receiver is down."

For its part, Nextel said through spokesman Travis Sowders: "We're not aware of this investigation, and we weren't asked to participate."

Other mobile providers were reluctant to talk about this kind of surveillance. Verizon Wireless said only that it "works closely with law enforcement and public safety officials. When presented with legally authorized orders, we assist law enforcement in every way possible."

A Motorola representative said that "your best source in this case would be the FBI itself." Cingular, T-Mobile, and the CTIA trade association did not immediately respond to requests for comment.

Not secure

Comments

Hide the following 5 comments

Leave the phones home

26.08.2007 10:45

The article you quote was actually by Declan McCullagh AND Anne Broache. I only mention it because one of them, or someone they know, must read here.

The BBC article they quote was the first mainstream confirmation of what had been known by activists for years. When I spotted it on the day it was published by the BBC I reposted it everywhere, as it was official confirmation of what was standard practice for years. The activists reactions were generally "Great, I thought we were being too paranoid". I thought they were maybe being too paranoid until then too but I didn't see that as harmful so I went along with it like everyone else.

I'd like to point out one important historical fact that keeps getting overlooked - this BBC article was the establishment reaction to Blairs MI5 having been caught bugging the UN secretary general in the lead up to Balirs war in Iraq. He was caught red-handed sabotaging the peace process.

Secondly, what I said at the time still holds - a bunch of activists who all take their batteries out simultaneously is dangerous in itself - basic data-mining techniques can highlight this instantly. So, my original advice still applies:

"
Phone companies at the behest of security services are already able to use any existing mobile phone as a remote listening device. Although removing the battery stops this, phones can still have 'active' bugs within them and so shouldn't be permitted in secure meetings. The same goes for all ISDN lines although this is less relevant.

Also, security services can learn a lot from mobile usage even without listening in - if a certain group of activists all turn off their phones at the same time and location, then inferences can be drawn.


"According to some reports, intelligence services do not even need to obtain permission from the networks to get their hands on the codes."
 http://news.bbc.co.uk/2/hi/uk_news/magazine/3522137.stm

Danny
"

Danny
- Homepage: http://www.indymedia.org.uk/en/2005/11/327236.html?c=on#c134568


actually

26.08.2007 12:22

actually this can only be done if the security services have had your phone and inserted the bug,

cj


Do you have a Nextel phone? No, of course you don't.

26.08.2007 12:23

This story is about Nextel phones, which don't work in the UK in the way required for this bugging technique to work, because there is no Nextel network. Posting bollocks about eavesdropping technology is as bad as posting bollocks about the law, it makes people do stupid things and increases paranoia.

ACAB


other ways and means

26.08.2007 12:40

If concerned about this you don't have to take out the battery. Simply obtain a small METAL canister that the phone will fit in (cookie/candy can?). Insert phone and put on the lid. You might also find it adequate to simply wrap the phone in aluminum foil.

Might be more suggestive of something suspicious having happened to your phone that it would over here (with our greater amount of space, connectivity is spotty -- most of the AREA of this country has no cell coverage).

You might also consider that if those who might be eavesdropping are making that assumptiuon that your working cell phone implies that it is next to you, serves as evidence of where you are and what sounds are near you, that you could USE that (not necessarily true) assumption to your benefit. I will not explain further -- just think about it a little and I am sure you'll come up with ideads.

Mike Novack
mail e-mail: stepbystpefarm mtdata.com


more to the point

26.08.2007 12:52

Having your mobile phone with you in a meeting is fucking rude.

CH