• The Cell Phone as Spy Device

    From warmfuzzy@700:100/37 to All on Fri Sep 20 03:23:48 2024

    The Cell Phone on The Table (Audio Bug)
    ----------

    Most people have cell phones. Actually, most everyone has a cell phone of some shape or form. These cell phones are everywhere... in your pocket, on the table during a meal, sitting somewhere in the room that you are in all of the time. They are so common that people think nothing of them. People even bring their phones to business meetings, conferences, strategy sessions, just about everywhere. Because they are so common they attract little attention and go unnoticed. In some vicinities they require you to turn off your cell phones, but as many tech savvy people know, a smart phone is never really off.

    So what if people used cell phones as spy devices to record all sorts of things. It is a bug in plain sight, without people considering the re-purposing of such devices for malevolent purposes. That fellow employee may be a spy recording all the conversations around them. During a TSCM (technical surveillance counter-measures) sweep they look for devices squawking on frequencies other than the cell phone frequencies, since the cell phone bands are always crowded. The next time you go to a coffee shop or donut store take note of all the people that have their phones either in use or on the table. They are so common that people have been come to expect their presence.

    The cell phone (spy device) can be used in two modes, the first being having a live cell phone connection to the receiving end of the surveilled conversation, or and more secure a method is just to have the device record the conversation onto the phone's microSD card, which the spy can go through while at home and sort out their recordings in private. The day of the body wire to record conversations has ended. This type of recording out-modes the former methods. It is more clandestine, easy to use, non-intrusive, and more generally effective. Lark The Narq is much harder to expose as a narq because of this change in kit that people carry around with them all day every day. Even at the end of the day when that cell phone is put on the night stand, you may have your night time conversations recorded. Phones can be easily made to appear to be turned off, but one can never tell for certain that a phone is actually off. The phone may have a reasonable safety to it if its a "flip phone," where you can actually remove its battery, but that would look rather odd.

    So the next time that you're at your local watering hole, communist meetings at a college, or some sort of shady situation just remember, that phone in
    the room may be doing more than waiting for a call. You may be dealing with a modern surveillance device. Intriguing 'eh? This is a real thing. Be wary that you are not a target of such surveillance.

    Cheers!
    -warmfuzzy

    --- Mystic BBS v1.12 A49 2023/04/30 (Linux/64)
    * Origin: thE qUAntUm wOrmhOlE, rAmsgAtE, uK. bbs.erb.pw (700:100/37)
  • From k9zw@700:100/69 to warmfuzzy on Fri Sep 20 06:58:33 2024
    On 20 Sep 2024, warmfuzzy said the following...


    The Cell Phone on The Table (Audio Bug)
    ----------


    More than an audio bug

    They are location transponders (much like the transponder in an airplane)

    Cells also can have their other sensors exploited

    Ditto for watch versions

    Back to audio, with microphones being included at board level in everything from Nest Thermostats to the new kitchen appliances you just installed, well you have a polyphonic bug setup right there.

    --- Steve K9ZW via SPOT BBS

    --- Mystic BBS v1.12 A48 2022/07/15 (Linux/64)
    * Origin: SPOT BBS / k9zw (700:100/69)
  • From roman@700:100/69 to k9zw on Fri Sep 20 16:52:04 2024
    Old push buttons phones also spy devices?

    --- Mystic BBS v1.12 A48 2022/07/15 (Linux/64)
    * Origin: SPOT BBS / k9zw (700:100/69)
  • From k9zw@700:100/69 to roman on Fri Sep 20 23:14:01 2024
    On 20 Sep 2024, roman said the following...

    Old push buttons phones also spy devices?

    Depending on the system and what access the listening side has to which parts, it can be.

    There is lots of information on touch-tone phone exploits.

    --- Steve K9ZW via SPOT BBS

    --- Mystic BBS v1.12 A48 2022/07/15 (Linux/64)
    * Origin: SPOT BBS / k9zw (700:100/69)