backtop


Print 76 comment(s) - last by Nemisisorama.. on Dec 10 at 8:53 PM

They can see us, read our emails, watch our IM conversations, and now even hear us whether we want them to or not

It seems as though George Orwell hit it the bullseye again when he wrote about Big Brother and the government's way of keeping track of the general public. It has been recently revealed that the U.S. Federal Bureau of Investigation has a way of tapping a cell phone and using the microphone to listen in on nearby conversations.

The method used for listening in on conversations held by alleged members of Cosa Nostra is called a "roving bug" and was ruled to be a legal method of wiretapping by U.S. District Judge Lewis Kaplan. The bug was alledgedly used on two Nextel phones. It looks like all cellular phones are vulnerable to this sort of wiretapping according to CNet's findings:

The U.S. Commerce Department's security office warns that "a cellular telephone can be turned into a microphone and transmitter for the purpose of listening to conversations in the vicinity of the phone." An article in the Financial Times last year said mobile providers can "remotely install a piece of software on to any handset, without the owner's knowledge, which will activate the microphone even when its owner is not making a call."

Kaplan further added that the functionality of the roving bug was in place even when the phone was powered off -- or at least when the phone looked to be powered off.  One possible method that the FBI used to tap into the two Nextel phones is by getting the network to install a rogue firmware update which gave the agency access to such features.

Such capability has long been rumored to exist in Motorola phones after it was discovered how the 9/11 terrorists used cellular phones to coordinate most of their activities.

Still there are some skeptics who believe that this method does not exist and that the FBI had to have physically planted a bug into the cellular phone to monitor conversations. But with the recent boom of PDA phones and devices that support custom software it was only a matter of time before hackers, or the government found a way to exploit similar features.


Comments     Threshold


This article is over a month old, voting and posting comments is disabled

A Part of Echelon? Probably...
By Aelius on 12/2/2006 7:19:19 PM , Rating: 2
All you need to do is combine this capability with Echelon. What you get is the instant ability to listen to just about any conversation in the world, record it, categorize it, flag it and archive it forever. It's not just possible but inevitable.

Fact:
Google Toolbar has hidden code allowing someone with the knowhow to activate your mic. This has been outed by some hackers who found the code and Google responded with a lame answer about it's use for customer service assistance. Ummm no.

Previously unknown Fact:
Telecom companies such as Bell not only have the hardware to listen in on your converstaions but all calls are recorded and sent for storage at a CO "Central Office". Previously the process of recording and filing was thought to be a part of Echelon. In fact it probably is an extention of Echelon acting as a funnel for voice/data at various CO's where all calls are routed through.

If you give them an inch they will take a mile. We gave that inch a long time ago. I think they are past the mile.




RE: A Part of Echelon? Probably...
By yacoub on 12/2/2006 11:13:08 PM , Rating: 2
Well, it is true that there were/are closets in the COs where the feds had the ability to store recordings of conversations, but it wasn't ALL conversations. They had to choose which splices and connections they would record.


RE: A Part of Echelon? Probably...
By Aelius on 12/3/2006 6:09:15 AM , Rating: 2
This is incorrect. ALL conversations are recorded, categorized and sent for storage. Period. This has already been outed by at least one NSA employee. I think it was on 60 minutes.

All conversations are recorded and Echelon simply sorts through it. We assume that those converstaions that do not include key words are deleted.

This may seem fiction to some people but you have to remember that the computer industry is about 4 years ahead of what is out today. They are far ahead of where people think they are at. All major software companies are required to sign a non-disclosure agreement to get inside information so they can write code for upcoming hardware. This is fact and has been outed by Brad McQuad on the Vanguard forums some months ago.

Black Ops tech projects are aproximately 20+ years ahead. No one really knows how far ahead, even many of those working at the NSA even on Echelon. The reason is simple. Compartmentalization. They probably won't even let a programmer write more than one part of the code and have someone else write another. We know for a fact that those working on Echelon work under this system and no one employee knows the entire system.


RE: A Part of Echelon? Probably...
By KristopherKubicki (blog) on 12/3/2006 6:54:07 AM , Rating: 2
I've said it before and I'll say it again, the NSA almost certainly has quantum computers. There were dozens of researchers close to "breakthroughs" with regard to quantum computing back in the 80s and early 90s, yet it took almost 15 years in some cases to see even the most basic quantum tech become at least commercial research projects.

Of course, you could just argue that "it is very hard," but I mean c'mon. The US built The Bomb covertly and spent nearly $5 billion (adjusted for inflation) on just the first test weapon.

You're right, some of the tech being used for this is easily 10+ years into the future.


RE: A Part of Echelon? Probably...
By mino on 12/3/2006 7:29:33 PM , Rating: 2
Well this "future tech" is purely insane.

The fact is, Complete echelon thingie is/was doable with 90's commercial available tech. And it was done that way. Now they are "just" extending the reach an possible consequences with it...


RE: A Part of Echelon? Probably...
By Aelius on 12/4/2006 1:12:25 PM , Rating: 2
80s actually. It was first designed to monitor the "enemy" that being communist nations and purely voice.

The installation of the funneling/recording devices/software at COs was most likely done in the early 90s so Clinton could turn it on Americans.

Today it does voice/data. What exactly "data" means is anyone's quess but it is a known fact that e-mail is one such source. SMS is most likely another. The list is most likely quite long.


RE: A Part of Echelon? Probably...
By goku on 12/5/2006 6:03:30 AM , Rating: 2
"We know for a fact that those working on Echelon work under this system and no one employee knows the entire system."

Hmm, this sounds familiar, what organization acts like this? Oh I know, it's al qaeda... You know, terrorists groups have it setup so that no one particular group or person knows too much.


"We shipped it on Saturday. Then on Sunday, we rested." -- Steve Jobs on the iPad launch











botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki