One would be amazed at what is able to be done. The Fbi for one uses this software.It can be downloaded to the phone remotely. You can also listen in on the mic even when the phone is powered off! The Military can and does listen in to all conversations via landlines, radio and cellular real time. They can even tell what you type on your keyboard remotely.
Your tinfoil hat is loseOne would be amazed at what is able to be done. The Fbi for one uses this software.It can be downloaded to the phone remotely. You can also listen in on the mic even when the phone is powered off! The Military can and does listen in to all conversations via landlines, radio and cellular real time. They can even tell what you type on your keyboard remotely.
Although the tapping and cloning of phones is not uncommon, and it is known that nearly all communication is monitored and recorded, with what your proposing, would mean that in the military, is a massive call centre with enough staff to listen to the millions of phone calls made by US phone users at the same time in real time. I think not!
Now having the ability to do something like that is possible, and is more than likely done, and I would hate to think about the HDD capacity on those servers. Just think about the poor begger that's got to maintain them as well.
Wouldn't the iPhone need to be in jailbreak for this to work on it? Or am I wrong on this point?
Wouldn't the iPhone need to be in jailbreak for this to work on it? Or am I wrong on this point?
which to me, suggests that what I wrote was a sensible interpretation of what you said.The Military can and does listen in to all conversations via landlines, radio and cellular real time.
Source: http://en.wikipedia.org/wiki/SIM_cloningSIM cloning consists of duplicating the SIM card, which allows calls or other services to use the identification of the cloned SIM and to be charged to that account.
In the early 1990s, due to poor security, cloning was more common than it is today. Cloning has now been rendered more challenging technically (since physical access to the SIM card is now required, contrary to simply being within radio reach). The cards now perform security operations themselves on data buried within them.
SIM cloning is a great concern to security/police services since it renders GSM location-based service (LBS) unreliable when more than one handset uses the same SIM.
In the movie The Bourne Supremacy, the main character, Jason Bourne, clones a SIM card to enable him to listen in to calls to a U.S. official from the CIA. A realistic time for extracting the Ki from a SIM card is approximately 4-8 hours. There is 40% probability of damaging the card in the process. Additionally, the attacker must have pre-knowledge of the SIM card's PIN (CHV1).[citation needed]
A user of Woron Scan v1.05 has claimed scans in under 5 minutes. [1] Since that time, Woron Scan 1.09 has been released. An implementation in an FPGA would allow IMSI and Ki extraction in seconds if the algorithm scales similarly to DES. [2]
Cracking Ki by overhearing radio GSM traffic is difficult but not impossible (although illegal in the United States). In many countries GSM traffic is not encrypted, thus it is possible with proper equipment (a computer-based radio scanner (eg. USRP) and proper software).
The security has been improved with the newer generation of SIM cards to be used with 3GSM networks, known as USIMs. The new specification implements a new publicly announced algorithm (the KASUMI algorithm).
SIM cloning is also sometimes used to unlock phones from foreign providers for use on your home network; by using your Ki and switching between your IMSI and the IMSI that the phone expects the phone can be fooled into thinking that it has the SIM from its native provider (this is commonly done for Japanese phones as well as the iPhone before its software unlock was released).
I think yes, since it looks like the software they're referring to needs to be installed on the device and is entirely dependent on that, whereas I was thinking this was some external device they used.
This video is pretty silly, because it's like saying that if someone had physical access to your computer, they could install a keylogger and know all your passwords. Of course this is true, but they hide the fact that physical access to the phone is required. It's all just fear mongering.
This is my take on it. I feel that 99.9% of people have nothing to worry about. However if you leave any device unattended, someone COULD install monitoring software on it without you knowing.
Also, from what I am aware of, Echelon uses a computer algorithm to pick up key words in conversations. Depending on what you are looking for they could be: bomb, meet, etc. Then it flags, records and stores those convo's.
If the worst thing you say on your mobile is: "I love That 70's Show" (which should cause concern) then you shouldn't be too concerned.
If, however, you are a criminal or unfaithful partner, you should change your evil ways or be prepared to pay for your sins.
Hey what's wrong with That 70's Show?Saying "I love American Idol" is what should cause concern.
I see you and I feel you
Ok, you said this which to me, suggests that what I wrote was a sensible interpretation of what you said.
As for suggesting they don't record the conversations, what would be the point of listening if they don't have proof of it later on.
And as for the ability to remotely install software, personally, I don't believe that. Direct phone connection, yeah fine, but remotely....
And as for the tin hat comment, sounds apt, either you are a crackpot, OR you actually do something, in which case I doubt you should be writing it on the Internet...are the men in black suits there yet?
Also, if it were joe smith in the street, then yes, the device I would imagine it would need to be jailbroken. However, if it were "the man" then I doubt they would need Apple approval to install software on an un-jailbroken iPhone.
A good example of a phone that is being targetted a lot, as it's been in the press, is the Nokia 1100, which people are using to steal all kinds of information.
having been in the Military, now retired, I was in Comms. So I do know what i speak of. Im not here to convince people of anything, not my job.Just thought I would make some things aware. I know what Im allowed to say and what Im not allowed to say. Anything i have said can be found out with research. Most will not take the time to do it.
none of it is supposed to be sinister, nor top secret as far as the ability. Mostly the How and the equipment.
Firmware updates and etc can be downloaded thru the carrier over the air and it can be done without the customers knowledge. Most of the time a customer knows because he is asked to accept or reject the request to download to their device.
That being said, yes recordings are made of pertinent info or what may be pertinent info. A lot of what is monitored is target specific and not mass random recording and monitoring. I kinda thought the average person here would know this, guess not.
No big conspiracy, been going on for years and will continue to go on. With the crowd that hangs here I really thought most people would know but then again, most here may be really young, probably never been in the Military etc etc.
For perspective, the SR-71 Blackbird built in 1964 had stealth tech, flew at 3.2 mach at 80,000 feet and had the radar image of a door.
Imagine what we have out there today?