Print 76 comment(s) - last by Nemisisorama.. on Dec 10 at 8:53 PM

They can see us, read our emails, watch our IM conversations, and now even hear us whether we want them to or not

It seems as though George Orwell hit it the bullseye again when he wrote about Big Brother and the government's way of keeping track of the general public. It has been recently revealed that the U.S. Federal Bureau of Investigation has a way of tapping a cell phone and using the microphone to listen in on nearby conversations.

The method used for listening in on conversations held by alleged members of Cosa Nostra is called a "roving bug" and was ruled to be a legal method of wiretapping by U.S. District Judge Lewis Kaplan. The bug was alledgedly used on two Nextel phones. It looks like all cellular phones are vulnerable to this sort of wiretapping according to CNet's findings:

The U.S. Commerce Department's security office warns that "a cellular telephone can be turned into a microphone and transmitter for the purpose of listening to conversations in the vicinity of the phone." An article in the Financial Times last year said mobile providers can "remotely install a piece of software on to any handset, without the owner's knowledge, which will activate the microphone even when its owner is not making a call."

Kaplan further added that the functionality of the roving bug was in place even when the phone was powered off -- or at least when the phone looked to be powered off.  One possible method that the FBI used to tap into the two Nextel phones is by getting the network to install a rogue firmware update which gave the agency access to such features.

Such capability has long been rumored to exist in Motorola phones after it was discovered how the 9/11 terrorists used cellular phones to coordinate most of their activities.

Still there are some skeptics who believe that this method does not exist and that the FBI had to have physically planted a bug into the cellular phone to monitor conversations. But with the recent boom of PDA phones and devices that support custom software it was only a matter of time before hackers, or the government found a way to exploit similar features.

Comments     Threshold

This article is over a month old, voting and posting comments is disabled

RE: A Part of Echelon? Probably...
By Aelius on 12/3/2006 6:09:15 AM , Rating: 2
This is incorrect. ALL conversations are recorded, categorized and sent for storage. Period. This has already been outed by at least one NSA employee. I think it was on 60 minutes.

All conversations are recorded and Echelon simply sorts through it. We assume that those converstaions that do not include key words are deleted.

This may seem fiction to some people but you have to remember that the computer industry is about 4 years ahead of what is out today. They are far ahead of where people think they are at. All major software companies are required to sign a non-disclosure agreement to get inside information so they can write code for upcoming hardware. This is fact and has been outed by Brad McQuad on the Vanguard forums some months ago.

Black Ops tech projects are aproximately 20+ years ahead. No one really knows how far ahead, even many of those working at the NSA even on Echelon. The reason is simple. Compartmentalization. They probably won't even let a programmer write more than one part of the code and have someone else write another. We know for a fact that those working on Echelon work under this system and no one employee knows the entire system.

RE: A Part of Echelon? Probably...
By KristopherKubicki on 12/3/2006 6:54:07 AM , Rating: 2
I've said it before and I'll say it again, the NSA almost certainly has quantum computers. There were dozens of researchers close to "breakthroughs" with regard to quantum computing back in the 80s and early 90s, yet it took almost 15 years in some cases to see even the most basic quantum tech become at least commercial research projects.

Of course, you could just argue that "it is very hard," but I mean c'mon. The US built The Bomb covertly and spent nearly $5 billion (adjusted for inflation) on just the first test weapon.

You're right, some of the tech being used for this is easily 10+ years into the future.

RE: A Part of Echelon? Probably...
By mino on 12/3/2006 7:29:33 PM , Rating: 2
Well this "future tech" is purely insane.

The fact is, Complete echelon thingie is/was doable with 90's commercial available tech. And it was done that way. Now they are "just" extending the reach an possible consequences with it...

RE: A Part of Echelon? Probably...
By Aelius on 12/4/2006 1:12:25 PM , Rating: 2
80s actually. It was first designed to monitor the "enemy" that being communist nations and purely voice.

The installation of the funneling/recording devices/software at COs was most likely done in the early 90s so Clinton could turn it on Americans.

Today it does voice/data. What exactly "data" means is anyone's quess but it is a known fact that e-mail is one such source. SMS is most likely another. The list is most likely quite long.

RE: A Part of Echelon? Probably...
By goku on 12/5/2006 6:03:30 AM , Rating: 2
"We know for a fact that those working on Echelon work under this system and no one employee knows the entire system."

Hmm, this sounds familiar, what organization acts like this? Oh I know, it's al qaeda... You know, terrorists groups have it setup so that no one particular group or person knows too much.

"So, I think the same thing of the music industry. They can't say that they're losing money, you know what I'm saying. They just probably don't have the same surplus that they had." -- Wu-Tang Clan founder RZA

Copyright 2016 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki