News

This is an archive of educational materials relating to cell phones and privacy.

There is a lot of information on this page so it can take a little while for all of it to load. Please be patient.

In addition to the concerns about bureaucracy out of control, inexpensive Cell Phone Spyware is available on the internet that makes it possible for anyone to do the same things the government can do. This Cell Phone Spyware allows anyone to have undetectable backdoor access to you or a loved ones GPS location, microphone, camera, text, email, stored information, etc.

We are pretty good at staying on top of things, but If you know of something we don't have listed and you think it should appear here, please contact us and let us know.

Visitor comments are posted anonymously.

By Michael Nash | | 0 comments | Read more

Your cell phone was designed to spy on you.

By Michael Nash | | 0 comments | Read more

Associated Press - Cellphone operator reveals scale of gov't snooping

Jun 6, 2:22 PM EDT

Cellphone operator reveals scale of gov't snooping


LONDON (AP) -- Government snooping into phone networks is extensive worldwide, one of the world's largest cellphone companies revealed Friday, saying that several countries demand direct access to its networks without warrant or prior notice.

The detailed report from Vodafone, which covers the 29 countries in which it operates in Europe, Africa and Asia, provides the most comprehensive look to date at how governments monitor mobile phone communications. It amounts to a call for a debate on the issue as businesses increasingly worry about being seen as worthy of trust.

The most explosive revelation was that in six countries, authorities require immediate access to an operator's network - bypassing legal niceties like warrants. It did not name the countries for legal reasons and to safeguard employees working there.

"In those countries, Vodafone will not receive any form of demand for lawful interception access as the relevant agencies and authorities already have permanent access to customer communications via their own direct link," the report said.

Vodafone's report comes one year after former NSA systems analyst Edward Snowden revealed that U.S. and other countries' intelligence agencies routinely gathered huge amounts of private data belonging to millions of innocent people in America and across the globe.

The revelations have focused particular attention on the role of Western technology and telecommunications firms, which stand accused of facilitating the mass surveillance by giving spies unrestricted access to their networks. Several Silicon Valley companies have since attempted to restore consumers' trust by publishing data on government surveillance.

But telecoms companies found themselves in an even more uncomfortable position. Historically closer to governments since many were once state-owned, telecoms companies are much more heavily regulated and have employees on the ground - making them more sensitive to government demands for data.

By making its report public, together with a breakdown on requests for information, Vodafone took the unusual step of entering the international debate about balancing the rights of privacy against security. Rather than being stuck with responsibility and consumer backlash when consumers realize their data has been scooped up without their knowledge, companies like Vodafone have decided it is time to push for a debate.

"Companies are recognizing they have a responsibility to disclose government access," Daniel Castro, senior analyst for the Information Technology and Innovation Foundation in Washington, D.C. "This is new."

The study comes at a time when other businesses are also calling for a revamp of laws too outdated to stand up to the quickly changing telecommunications universe.

Executives in Silicon Valley, for example, have stepped up pressure on President Barack Obama to curb the U.S. government surveillance programs that collect information off the Internet.

Twitter Inc., LinkedIn Corp., AOL Inc., Google Inc., Apple Inc., Yahoo Inc., Facebook Inc. and Microsoft Corp. are pushing for tighter controls over electronic espionage - fearing that eavesdropping threatens the technology industry's financial livelihood.

"They want their customers to be able to trust them to store their data in a private and secure manner," Castro said.

Vodafone's report is also seen by some as an effort to turn the page on the company's embarrassing role in the protests that toppled Egyptian strongman Hosni Mubarak in 2011. As the protests raged, Vodafone bombarded its Egyptian subscribers with pro-government text messages. At the time, the company said it had no choice but to comply, but was severely criticized for its actions. A change in culture followed.

"They took a hard lesson there," said Cynthia Wong, a senior internet researcher at Human Rights Watch. "Even if the government is the ultimate problem, they realized they needed to take steps to mitigate harm to their users."

Civil rights advocates applauded Vodafone for releasing the report, and cracking open the debate, even as they expressed alarm at the infringements into civil rights.

"For governments to access phone calls at the flick of a switch is unprecedented and terrifying," said Shami Chakrabarti, director of the human rights group Liberty, adding that the Snowden revelations showed the Internet was already being treated as "fair game."

"Bluster that all is well is wearing pretty thin - our analogue laws need a digital overhaul," she said.

Though some of the governments included in the report were able to block disclosure of any aspect of how interception was conducted, the report is unique in that it offers insight into how governments conduct surveillance.

Though some of the U.S. operators, such as AT&T and Verizon offered information amid the Snowden allegations, the level of detail is minuscule compared with Friday's report, Wong said.

Civil rights advocates weren't the only ones applauding Vodafone's actions. Norway's Telenor Group, which also has operations across Eastern Europe and Asia, offered support, noting governments have the ultimate responsibility to act.

The countries included in the report are: Albania, Australia, Belgium, the Czech Republic, Congo, Egypt, Fiji, France, Germany, Ghana, Greece, Hungary, India, Ireland, Italy, Kenya, Lesotho, Malta, Mozambique, the Netherlands, New Zealand, Portugal, Qatar, Romania, South Africa, Spain, Tanzania, Turkey and the U.K.

---

Associated Press Writers Raphael Satter in London, Jan M. Olsen in Copenhagen contributed to this report.

By Michael Nash | | 0 comments | Read more

CNET - Cell phone eavesdropping technique "functioned whether the phone was powered on or off."

CNET News- FBI taps cell phone mic as eavesdropping tool

The FBI appears to have begun using a novel form of electronic surveillance in criminal investigations: remotely activating a mobile phone's microphone and using it to eavesdrop on nearby conversations.

The technique is called a "roving bug," and was approved by top U.S. Department of Justice officials for use against members of a New York organized crime family who were wary of conventional surveillance techniques such as tailing a suspect or wiretapping him.

Nextel cell phones owned by two alleged mobsters, John Ardito and his attorney Peter Peluso, were used by the FBI to listen in on nearby conversations. The FBI views Ardito as one of the most powerful men in the Genovese family, a major part of the national Mafia.

The surveillance technique came to light in an opinion published this week by U.S. District Judge Lewis Kaplan. He ruled that the "roving bug" was legal because federal wiretapping law is broad enough to permit eavesdropping even of conversations that take place near a suspect's cell phone.

Kaplan's opinion said that the eavesdropping technique "functioned whether the phone was powered on or off." Some handsets can't be fully powered down without removing the battery; for instance, some Nokia models will wake up when turned off if an alarm is set.

While the Genovese crime family prosecution appears to be the first time a remote-eavesdropping mechanism has been used in a criminal case, the technique has been discussed in security circles for years.

The U.S. Commerce Department's security office warns that "a cellular telephone can be turned into a microphone and transmitter for the purpose of listening to conversations in the vicinity of the phone." An article in the Financial Times last year said mobile providers can "remotely install a piece of software on to any handset, without the owner's knowledge, which will activate the microphone even when its owner is not making a call."

Nextel and Samsung handsets and the Motorola Razr are especially vulnerable to software downloads that activate their microphones, said James Atkinson, a counter-surveillance consultant who has worked closely with government agencies. "They can be remotely accessed and made to transmit room audio all the time," he said. "You can do that without having physical access to the phone."

Because modern handsets are miniature computers, downloaded software could modify the usual interface that always displays when a call is in progress. The spyware could then place a call to the FBI and activate the microphone--all without the owner knowing it happened. (The FBI declined to comment on Friday.)

"If a phone has in fact been modified to act as a bug, the only way to counteract that is to either have a bugsweeper follow you around 24-7, which is not practical, or to peel the battery off the phone," Atkinson said. Security-conscious corporate executives routinely remove the batteries from their cell phones, he added.

FBI's physical bugs discovered
The FBI's Joint Organized Crime Task Force, which includes members of the New York police department, had little luck with conventional surveillance of the Genovese family. They did have a confidential source who reported the suspects met at restaurants including Brunello Trattoria in New Rochelle, N.Y., which the FBI then bugged.

But in July 2003, Ardito and his crew discovered bugs in three restaurants, and the FBI quietly removed the rest. Conversations recounted in FBI affidavits show the men were also highly suspicious of being tailed by police and avoided conversations on cell phones whenever possible.

That led the FBI to resort to "roving bugs," first of Ardito's Nextel handset and then of Peluso's. U.S. District Judge Barbara Jones approved them in a series of orders in 2003 and 2004, and said she expected to "be advised of the locations" of the suspects when their conversations were recorded.

Details of how the Nextel bugs worked are sketchy. Court documents, including an affidavit (p1) and (p2) prepared by Assistant U.S. Attorney Jonathan Kolodner in September 2003, refer to them as a "listening device placed in the cellular telephone." That phrase could refer to software or hardware.

One private investigator interviewed by CNET News.com, Skipp Porteous of Sherlock Investigations in New York, said he believed the FBI planted a physical bug somewhere in the Nextel handset and did not remotely activate the microphone.

"They had to have physical possession of the phone to do it," Porteous said. "There are several ways that they could have gotten physical possession. Then they monitored the bug from fairly near by."

But other experts thought microphone activation is the more likely scenario, mostly because the battery in a tiny bug would not have lasted a year and because court documents say the bug works anywhere "within the United States"--in other words, outside the range of a nearby FBI agent armed with a radio receiver.

In addition, a paranoid Mafioso likely would be suspicious of any ploy to get him to hand over a cell phone so a bug could be planted. And Kolodner's affidavit seeking a court order lists Ardito's phone number, his 15-digit International Mobile Subscriber Identifier, and lists Nextel Communications as the service provider, all of which would be unnecessary if a physical bug were being planted.

A BBC article from 2004 reported that intelligence agencies routinely employ the remote-activiation method. "A mobile sitting on the desk of a politician or businessman can act as a powerful, undetectable bug," the article said, "enabling them to be activated at a later date to pick up sounds even when the receiver is down."

For its part, Nextel said through spokesman Travis Sowders: "We're not aware of this investigation, and we weren't asked to participate."

Other mobile providers were reluctant to talk about this kind of surveillance. Verizon Wireless said only that it "works closely with law enforcement and public safety officials. When presented with legally authorized orders, we assist law enforcement in every way possible."

A Motorola representative said that "your best source in this case would be the FBI itself." Cingular, T-Mobile, and the CTIA trade association did not immediately respond to requests for comment.

Mobsters: The surveillance vanguard
This isn't the first time the federal government has pushed at the limits of electronic surveillance when investigating reputed mobsters.

 

In one case involving Nicodemo S. Scarfo, the alleged mastermind of a loan shark operation in New Jersey, the FBI found itself thwarted when Scarfo used Pretty Good Privacy software (PGP) to encode confidential business data.

So with a judge's approval, FBI agents repeatedly snuck into Scarfo's business to plant a keystroke logger and monitor its output.

Like Ardito's lawyers, Scarfo's defense attorneys argued that the then-novel technique was not legal and that the information gleaned through it could not be used. Also like Ardito, Scarfo's lawyers lost when a judge ruled in January 2002 that the evidence was admissible.

This week, Judge Kaplan in the southern district of New York concluded that the "roving bugs" were legally permitted to capture hundreds of hours of conversations because the FBI had obtained a court order and alternatives probably wouldn't work.

The FBI's "applications made a sufficient case for electronic surveillance," Kaplan wrote. "They indicated that alternative methods of investigation either had failed or were unlikely to produce results, in part because the subjects deliberately avoided government surveillance."

Bill Stollhans, president of the Private Investigators Association of Virginia, said such a technique would be legally reserved for police armed with court orders, not private investigators.

There is "no law that would allow me as a private investigator to use that type of technique," he said. "That is exclusively for law enforcement. It is not allowable or not legal in the private sector. No client of mine can ask me to overhear telephone or strictly oral conversations."

Surreptitious activation of built-in microphones by the FBI has been done before. A 2003 lawsuit revealed that the FBI was able to surreptitiously turn on the built-in microphones in automotive systems like General Motors' OnStar to snoop on passengers' conversations.

When FBI agents remotely activated the system and were listening in, passengers in the vehicle could not tell that their conversations were being monitored.

Malicious hackers have followed suit. A report last year said Spanish authorities had detained a man who write a Trojan horse that secretly activated a computer's video camera and forwarded him the recordings.

PBS News Hour - Documents Reveal NSA Can Crack Encryption

Techdirt - Ret. Director of the NSA "We Kill People Based on Metadata".

Michael Hayden Gleefully Admits: We Kill People Based On Metadata (via Techdirt)

Since the very first Snowden leak a year ago, one of the more common refrains from defenders of the program is "but it's just metadata, not actual content, so what's the big deal?" Beyond the fact that other programs do collect content, we've pointed…

By Michael Nash | | 1 comment | Read more

Think Pulling The Battery Is Enough To Protect Your Privacy??? Think Again!



By Michael Nash | | 0 comments | Read more

Endoacustica - At Least One Spyware Provider Openly Claims Phones Can Be Used To Eavesdrop Without The Battery.

 

Statement Below Is From Their Website www.endoacustica.com

 
Eavesdropping without battery
 
Even when the battery is taken out, the spy phone is still able to pick up sounds around it and transmit them.
This function is only available for law enforcement agencies.

Statement Above Is From Their Website www.endoacustica.com

This is only one of the many spyware providers on the internet.

 

Fox Ten News - It's not just the NSA, state and local authorities also use cell phones to track you without a warrant.

 

This country sure has changed a lot since I was a boy.

Total run time 1:55

Minnesota Law Enforcement Also Admits To Tracking Your Phone Without A Warrant!

1 2 3 Next »

Stay in the Loop

Call Us

We'd love to hear from you. Call us at 888-783-5502 and we'll be happy to answer any questions you have.

Latest Posts

  • This is an archive of educational materials relating to cell phones and privacy.

    There is a lot of information on this page so it can take a little while for all of it to load. Please be patient. In addition to the concerns about bureaucracy out of control, inexpensive Cell Phone Spyware is... read more

  • Your cell phone was designed to spy on you.
  • Associated Press - Cellphone operator reveals scale of gov't snooping

    Jun 6, 2:22 PM EDT Cellphone operator reveals scale of gov't snooping By DANICA KIRKA LONDON (AP) -- Government snooping into phone networks is extensive worldwide, one of the world's largest cellphone companies revealed Friday, saying that several countries demand... read more