Cellphone surveillance

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
diagram showing people speaking on cellphones, their signals passing through a van, before being passed to a legitimate cell tower.
Diagram showing the operation of a StingRay device for cellphone surveillance.

Cellphone surveillance (also known as cellphone spying) may involve the tracking, bugging, monitoring, interception and recording of conversations and text messages on mobile phones.[1] It also encompasses the monitoring of people's movements, which can be tracked using mobile phone signals when phones are turned on.[2]

Mass cellphone surveillance[edit]

Stingray devices[edit]

StingRay devices are a technology which mimics a cellphone tower, causing nearby cellphones to connect and pass data through them instead of legitimate towers[3]. This is invisible to the end-user, and allows the operator of the device full access to any communicated data.[3] This is a form of Man-in-the-middle attack.[4]

StingRays are used by law enforcement agencies to track people's movements, and intercept and record conversations, names, phone numbers and text messages from mobile phones.[1] Their use entails the monitoring and collection of data from all mobile phones within a target area.[1] Law enforcement agencies in Northern California that have purchased StingRay devices include the Oakland Police Department, San Francisco Police Department, Sacramento County Sheriff's Department, San Jose Police Department and the Fremont Police Department.[1] The Fremont Police Department's use of a StingRay device is in a partnership with the Oakland Police Department and the Alameda County District Attorney's Office.[1]

End-to-end encryption such as Signal Messenger protects traffic against stingray devices via cryptographic strategies.[5]

image of a cell tower
A typical cell tower mounted on electric lines.

Tower dumps[edit]

A tower dump is the sharing of identifying information by a cell tower operator, which can be used to identify where a given individual was at a certain time.[6][7] As mobile phone users move, their devices will connect to nearby cell towers in order to maintain a strong signal even while the phone is not actively in use.[8][7] These towers record identifying information about cellphones connected to them which then can be used to track individuals.[6][7]

In most of the United States, police can get many kinds of cellphone data without obtaining a warrant. Law-enforcement records show, police can use initial data from a tower dump to ask for another court order for more information, including addresses, billing records and logs of calls, texts and locations.[7]

Targeted surveillance[edit]

Software vulnerabilities[edit]

Cellphone bugs can be created by disabling the ringing feature on a mobile phone, allowing a caller to call a phone to access its microphone and listening. One example of this was the group FaceTime bug.

In the United States, the FBI has used "roving bugs", which entails the activation of microphones on mobile phones to enable the monitoring of conversations.[9]

Cellphone spying software[edit]

Cellphone spying software[10] is a type of cellphone bugging, tracking, and monitoring software that is surreptitiously installed on mobile phones. This software can enable conversations to be heard and recorded from phones upon which it is installed.[11] Cellphone spying software can be downloaded onto cellphones.[12] Cellphone spying software enables the monitoring or stalking of a target cellphone from a remote location with some of the following techniques:[13]

  • Allowing remote observation of the target cellphone position in real-time on a map
  • Remotely enabling microphones to capture and forward conversations. Microphones can be activated during a call or when the phone is on standby for capturing conversations near the cellphone.
  • Receiving remote alerts and/or text messages each time somebody dials a number on the cellphone
  • Remotely reading text messages and call logs

Cellphone spying software can enable microphones on mobile phones when phones are not being used, and can be installed by mobile providers.[9]

Bugging[edit]

Intentionally hiding a cell phone in a location is a bugging technique. Some hidden cellphone bugs rely on Wifi hotspots, rather than cellular data, where the tracker rootkit software periodically "wakes up" and signs into a public wifi hotspot to upload tracker data onto a public internet server.

Lawful interception[edit]

Governments may sometimes legally monitor mobile phone communications - a procedure known as lawful interception.[14]

In the United States the government pays phone companies directly to record and collect cellular communications from specified individuals.[14] US Law enforcement agencies can also legally track the movements of people from their mobile phone signals upon obtaining a court order to do so.[2]

Occurrences[edit]

In 2005, the prime minister of Greece was advised that his, over 100 dignitaries', and the mayor of Athens' mobile phones were bugged.[11] Kostas Tsalikidis, a Vodafone-Panafon employee, was implicated in the matter as using his position as head of the company's network planning to assist in the bugging.[11] Tsalikidis was found hanged in his apartment the day before the leaders were notified about the bugging, which was reported as "an apparent suicide."[15][16][17][18]

Security holes within Signalling System No. 7 (SS7), called Common Channel Signalling System 7 (CCSS7) in the US and Common Channel Interoffice Signaling 7 (CCIS7) in the UK, were demonstrated at Chaos Communication Congress, Hamburg in 2014.[19][20]

Detection[edit]

Some indications of possible cellphone surveillance occurring may include a mobile phone waking up unexpectedly, using a lot of the CPU when on idle or when not in use, hearing clicking or beeping sounds when conversations are occurring and the circuit board of the phone being warm despite the phone not being used.[26][34][43]

Prevention[edit]

Preventative measures against cellphone surveillance include not losing or allowing strangers to use a mobile phone and the utilization of an access password.[12][13] Turning off and then also removing the battery from a phone when not in use is another technique.[12][13] Jamming or a Faraday cage may also work, the latter obviating removal of the battery. Another solution is cellphone with physical (electric) switch, or isolated electronic switch that disconnects microphone, camera without bypass, meaning switch can be operated by user only - no software can connect it back.

See also[edit]

References[edit]

  1. ^ a b c d e Bott, Michael; Jensen, Thom (March 6, 2014). "9 Calif. law enforcement agencies connected to cellphone spying technology". ABC News, News10. Archived from the original on 24 March 2014. Retrieved 26 March 2014.
  2. ^ a b Richtel, Matt (December 10, 2005). "Live Tracking of Mobile Phones Prompts Court Fights on Privacy" (PDF). The New York Times. Retrieved 26 March 2014.
  3. ^ a b Valentino-DeVries, Jennifer (2011-09-22). "'Stingray' Phone Tracker Fuels Constitutional Clash". Wall Street Journal. ISSN 0099-9660. Retrieved 2019-11-07.
  4. ^ "5G Is Here—and Still Vulnerable to Stingray Surveillance". Wired. ISSN 1059-1028. Retrieved 2019-11-07.
  5. ^ Grauer, Yael (2017-03-08). "WikiLeaks Says the CIA Can "Bypass" Secure Messaging Apps Like Signal. What Does That Mean?". Slate Magazine. Retrieved 2019-11-07.
  6. ^ a b Williams, Katie Bo (2017-08-24). "Verizon reports spike in government requests for cell 'tower dumps'". TheHill. Retrieved 2019-11-07.
  7. ^ a b c d John Kelly (13 June 2014). "Cellphone data spying: It's not just the NSA". USA today.
  8. ^ "Giz Explains: How Cell Towers Work". Gizmodo. Retrieved 2019-11-07.
  9. ^ a b McCullagh, Declan; Broache, Anne (December 1, 2006). "FBI taps cell phone mic as eavesdropping tool". CNET. Retrieved 26 March 2014.
  10. ^ "Cell Phone Spying Software". Cell Phone Spying.
  11. ^ a b c V., Prevelakis; D., Spinellis (July 2007). "The Athens Affair". Volume:44, Issue: 7. IEEE Spectrum. pp. 26–33. Retrieved 26 March 2014. (subscription required)
  12. ^ a b c d Segall, Bob (June 29, 2009). "Tapping your cell phone". WTHR13 News (NBC). Retrieved 26 March 2014.
  13. ^ a b c News report. WTHR News. (YouTube video)
  14. ^ a b "The price of surveillance: US gov't pays to snoop". AP NEWS. Retrieved 2019-11-11.
  15. ^ Bamford2015-09-29T02:01:02+00:00, James BamfordJames. "Did a Rogue NSA Operation Cause the Death of a Greek Telecom Employee?". The Intercept. Retrieved 7 June 2017.
  16. ^ "Story of the Greek Wiretapping Scandal - Schneier on Security". www.schneier.com. Retrieved 7 June 2017.
  17. ^ "Software engineer?s body exhumed, results in a month - Kathimerini". ekathimerini.com. Retrieved 7 June 2017.
  18. ^ "Ericsson's Greek branch fined over wire-tapping scandal". thelocal.se. 6 September 2007. Retrieved 7 June 2017.
  19. ^ Gibbs, Samuel (19 April 2016). "SS7 hack explained: what can you do about it?". Retrieved 7 June 2017 – via The Guardian.
  20. ^ a b Zetter, Kim. "The Critical Hole at the Heart of Our Cell Phone Networks". wired.com. Retrieved 7 June 2017.
  21. ^ "Common security vulnerabilities of mobile devices - Information Age". information-age.com. 21 February 2017. Retrieved 7 June 2017.
  22. ^ https://www.us-cert.gov/sites/default/files/publications/cyber_threats-to_mobile_phones.pdf
  23. ^ "Hackers Can Control Your Phone Using a Tool That's Already Built Into It - WIRED". www.wired.com. Retrieved 7 June 2017.
  24. ^ http://www.jsums.edu/research/files/2013/06/Cell-Phone-Vulnerabilities-1.pdf?x52307
  25. ^ "Baseband vulnerability could mean undetectable, unblockable attacks on mobile phones". Boing Boing. Retrieved 7 June 2017.
  26. ^ [12][21][20][22][23][24][25]
  27. ^ "So Hey You Should Stop Using Texts for Two-Factor Authentication - WIRED". www.wired.com. Retrieved 7 June 2017.
  28. ^ "How to Protect Yourself from SS7 and Other Cellular Network Vulnerabilities". blackberry.com. Retrieved 7 June 2017.
  29. ^ Beekman, Jethro G.; Thompson, Christopher. "Breaking Cell Phone Authentication: Vulnerabilities in AKA, IMS and Android". CiteSeerX 10.1.1.368.2999. Cite journal requires |journal= (help)
  30. ^ "Security Vulnerabilities in Mobile MAC Randomization - Schneier on Security". www.schneier.com. Retrieved 7 June 2017.
  31. ^ Newman, Lily Hay. "A Cell Network Flaw Lets Hackers Drain Bank Accounts. Here's How to Fix It". wired.com. Retrieved 7 June 2017.
  32. ^ "iPhone spying flaw: What you need to know about Apple's critical security update". telegraph.co.uk. Retrieved 7 June 2017.
  33. ^ Perlroth, Nicole (25 August 2016). "IPhone Users Urged to Update Software After Security Flaws Are Found". Retrieved 7 June 2017 – via NYTimes.com.
  34. ^ [27][28][29][30][31][32][33]
  35. ^ Barrett, Brian. "Update Your iPhone Right Now". wired.com. Retrieved 7 June 2017.
  36. ^ Kelly, Heather (25 August 2016). "iPhone vulnerability used to target journalists, aid workers". CNNMoney. Retrieved 7 June 2017.
  37. ^ Heisler, Yoni (8 March 2017). "Apple responds to CIA iPhone exploits uncovered in new WikiLeaks data dump". bgr.com. Retrieved 7 June 2017.
  38. ^ "Current Activity - US-CERT". www.us-cert.gov. Retrieved 7 June 2017.
  39. ^ Ivy. "Apple: iOS 10.3.1 fixes WLAN security vulnerabilities". cubot.net. Retrieved 7 June 2017.
  40. ^ "iOS 10.3.2 arrives with nearly two dozen security fixes". arstechnica.com. Retrieved 7 June 2017.
  41. ^ "NVD - Home". nvd.nist.gov. Retrieved 7 June 2017.
  42. ^ "Apple users advised to update their software now, as new security patches released". welivesecurity.com. 16 May 2017. Retrieved 7 June 2017.
  43. ^ [35][36][37][38][39][40][41][42]

https://mfggang.com/read-messages/how-to-read-texts-from-another-phone/