Minnesota

Re: The Gov and surveillance
mrtally 1497 reads
posted

Which is why I removed my OnStar fuse the day I bought the car.

cleavers2113 reads

We all know now how Spitzer got his butt in a jam, but I was listening to a DA saying that even he knew the laws, he did not know all the technology advances that have been made. I was thinking of all the electronic surveillance that was going on in this case.

So, yesterday I remembered an article that was sent to me last fall…I think. I will only include the part named “roving bug”…it makes you think.

The Roving Bug
In November of 2006, Louis Kaplan, a US District Judge in the Southern District of New York, issued an opinion regarding the legality of electronic surveillance measures that had been used during the three-year investigation of 34 defendants of the Genovese organized crime family. The opinion was unique in that it, for the first time, publicity shed light on a little known surveillance capability that is inherent in cell phone technology, and that few outside of security circles, knew about. From Judge Kaplan's opinion:
2. The Roving Intercepts
a. Ardito's Cellular Telephone
Based on physical surveillance and the conversations previously
intercepted, the FBI learned that Ardito's crew no longer conducted
meetings exclusively at the four restaurants, but met also in 12
additional restaurants, automobiles, Ardito's home, an auto store, an
insurance office, a jewelry store, a doctor's office, a boat, and
public streets.
The government applied for a "roving bug," that is, the interception
of Ardito's conversations at locations that were "not practical" to
specify, as authorized by 18 U.S.C. § 2518(11)(a). Judge Jones
granted the application, authorizing continued interception at the
four restaurants and the installation of a listening device in
Ardito's cellular telephone. The device functioned whether the phone
was powered on or off, intercepting conversations within its range
wherever it happened to be.


It is the final sentence in this portion of Judge Kaplan's opinion that opened up to the public the fact that cell phones can be used as listening devices, whether they are on or off, and more importantly, even when they are not being used to make or receive a call.


When this opinion and the surveillance capability it exposed became public, privacy advocates, technology experts, and some in the media began to delve more deeply into the subject. What they learned and have since exposed is startling.
It turns out that the phrase "installation of a listening device" used in Judge Kaplan's decision, does not refer to the physical placement of a listening or transmitting device into a suspect's telephone. Rather it refers to computer code, software, that can be remotely sent to a cell phone, and that once activated, will turn the microphone of that cell phone on and basically turn that cell phone into a high quality bugging device that will transmit everything that it's microphone picks up without the knowledge of the person carrying the phone. The FBI (or agency conducting the surveillance) never needs to physically touch or come into the possession of the phone. Nor is there any indication to the user that the phone is actively transmitting what it picks up“—it does not come on or otherwise indicate that it is operating.


How It works
Modern cell phones have the capability of receiving email, traffic updates, news reports and more. They also have the capability to download software programs that can affect how they operate, add features and services, and enhance the their usability and convenience. On the downside however it is this ability to download software that is now starting give rise to the first generation of cell phone computer viruses that are popping up around the world.
Cell phones are basically miniature computers that are controlled by software programs. These programs control the operation of the cell phone and how it interacts with the cellular network. In order for the network to maintain its integrity there is built into cell phones the ability to do remote diagnostics and maintenance tasks on the programming of the cell phone. These tasks operate in the "control channel" of the cell phone, which operates in the background and is not accessible to the user.


A specific maintenance command can be sent from the cellular carrier network to the cell phone to place the phone into "diagnostic mode." That diagnostic mode activates the cell phone's microphone but does not give any indication on the cell phone screen display or audio tone output that the microphone is active and the cell phone transmitting. It is this diagnostic mode that law enforcement agencies use to turn a cell phone into a "roving bug."


An interesting side note to this capability is that it also exists in automotive systems such as General Motor's OnStar. That ability was disclosed in a 2003 lawsuit heard before the 9th circuit Court of Appeals in California. From that lawsuit, (No. 02-15635 D.C. No. CV-01-01495-LDG Opinion):
One feature of the system allows the company to open a cellular connection to a vehicle and listen to oral communications within the car. This feature is part of a stolen vehicle recovery mode that provides assistance to car owners and law enforcement authorities in locating and retrieving stolen cars. The same technology that permits the interception of the conversations of thieves absconding with the car also permits eavesdropping on conversations within the vehicle.
The Federal Bureau of Investigation, realizing that the system can be used as a roving "bug" and following the procedures mandated for "bugging" private individuals suspected of criminal activity, sought and obtained a series of court orders requiring the company to assist in intercepting conversations taking place in a car equipped with the system. The company challenges the court's authority to order the use of the company's equipment, facilities, system, and employees. The question for decision is whether the statute governing private parties' obligations to assist the federal government in intercepting communications permits such an order.


As noted earlier, the ability of cellular phones to be turned into bugs has long been known in security and government circles. The Department of Commerce - NOAA website itself (http://www.wrc.noaa.gov/wrso/security_guide/cellular.htm) gives the following warning to it's employees:
Vulnerability to Being Used as a Microphone
A cellular telephone can be turned into a microphone and transmitter for the purpose of listening to conversations in the vicinity of the phone....When this is done, conversations in the immediate area of the telephone can be monitored over the voice channel.
The user doesn't know the telephone is....transmitting all nearby sounds until he or she tries to place a call. Then, before the cellular telephone can be used to place calls, the unit has to be cycled off and then back on again. This threat is the reason why cellular telephones are often prohibited in areas where classified or sensitive discussions are held.

This is beyond perverted. It's one thing for the Gov't. to have the capability to seek out terrorist and drug dealing activity; they shouldn't have the right to eavesdrop on the average citizen seeking a little dalliance.

This is hardly the "average citizen" we're talking about.  

I don't think we 'regular' hobbyists have a whole lot to worry about - using the means of TER to vet out who is safe to see.  Unless maybe there is a soon-to-be ex-spouse in the picture.  Then I guess all bets are off.

Here's another opinion piece on the general topic of prostitution and "morality politics" that I thought was worth a read...
by Glenn Greenwald (via Salon).



-- Modified on 3/12/2008 2:52:28 PM

Good info Cleavers -

It's important to remember that "Spitzer (or Swallows)" was *not* implicated as the result of an investigation of a high-class Pro ring, but rather the opposite.  The Feds were investigating Spitzer on 'suspicion of bribery,' - tracing all his financial records - and that is how they discovered he was banging Pro's, not the other way around.  

Whether this was a legitimate investigation based on actual, verifiable allegations or a witch hunt created by his political enemies, I'm not sure.  But with the Atty General firing scandal and the push by the current administration for unlimited warrantless wiretapping, I tend to believe the latter.  At any rate, he should have known better than to leave that money-transfer paper trail.

Interesting article on the Freakonomics blog today- A Call Girl’s View of the Spitzer Affair (link below)

All the better argument for a throwaway cell and cash transactions only.



cleavers1866 reads

I’ll bet you in the negotiations that are going on right now, that the Gov. is going to sing about this agency. It seems like this agency was a higher end agency that probably had other high-end clients…everybody remember NY confidential…it is going to be interesting LOL

Back to the cell phone issue, I know that you could just remove the battery and your phone should not be able to transmit any signal. But last year, I did build a Faraday cage for my cell phone. They are really easy to make, I had some dense copper mesh that I molded into an outside container. Put some adhesive bubble wrap inside that to protect the phone from abuse. I could use mylar or for you sportsman…a space blanket. So, I can pop the phone in this small box and no signal can transmit.

A lot of “secure” buildings are in a Faraday cage, also communication centers.


-- Modified on 3/12/2008 2:04:22 PM

-- Modified on 3/12/2008 4:24:06 PM

Cool - I only call providers from my "highly secured" tinfoil office, lol.

I think you are making a much bigger deal out of this than necessary there Professor Gag-it.

Cell phones are simply a not very new type of communication and wiretaps are a not very new method of surveillance.  Any type of network can be monitored for activity.

You could go ahead and describe the technical intricacies of two tin cans and a string and it would be just as boring.



cleavers1286 reads

Wow, Professor Gag-it is the nicest thing somebody has said about me. It is usually something like ~%$^&*#(*…well you know.

I know that I was going overboard, but I love trying to mess with the people who are in control. LOL Especially when both major parties are doing the SOS. LOL

BTW, this image was my latest experiment ;)


-- Modified on 3/12/2008 9:36:30 PM

mrtally1498 reads

Which is why I removed my OnStar fuse the day I bought the car.

Which is why it is very important to not allow one branch of the government essentially unlimited authority to listen in on whomever they want.  There were very good reasons why the Constitution established the separation of powers and those reasons are every bit as valid today.

BTW, if the government really wanted to crack down on this, they could arrest an awful lot of us.  After all, we sit here and talk about it and write detailed descriptions on an essentially public forum.  Our best defense is that most of the time LE really has far bigger problems to deal with.

Technology changes, but the issue remains the same.

Register Now!