Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
You have to install the software on it, which would mean for the methods shown, you'd need to have a jailbroken phone, presumably?
Would the extra info show up on teh usre's cell phone bill anyway?
 
Very real

One would be amazed at what is able to be done. The Fbi for one uses this software.It can be downloaded to the phone remotely. You can also listen in on the mic even when the phone is powered off! The Military can and does listen in to all conversations via landlines, radio and cellular real time. They can even tell what you type on your keyboard remotely.
 
Radiation from normal screens, that can be picked up to recreate whats on the screen is another one - technology has been out there for a while.
 
One would be amazed at what is able to be done. The Fbi for one uses this software.It can be downloaded to the phone remotely. You can also listen in on the mic even when the phone is powered off! The Military can and does listen in to all conversations via landlines, radio and cellular real time. They can even tell what you type on your keyboard remotely.

Although the tapping and cloning of phones is not uncommon, and it is known that nearly all communication is monitored and recorded, with what your proposing, would mean that in the military, is a massive call centre with enough staff to listen to the millions of phone calls made by US phone users at the same time in real time. I think not!

Now having the ability to do something like that is possible, and is more than likely done, and I would hate to think about the HDD capacity on those servers. Just think about the poor begger that's got to maintain them as well.
 
One would be amazed at what is able to be done. The Fbi for one uses this software.It can be downloaded to the phone remotely. You can also listen in on the mic even when the phone is powered off! The Military can and does listen in to all conversations via landlines, radio and cellular real time. They can even tell what you type on your keyboard remotely.
Your tinfoil hat is lose ;)
ECHELON (i think this is what your referring to) has been spoken about for decades. I'd bet under the guise of Home Land security th
.... no carrier
 
Although the tapping and cloning of phones is not uncommon, and it is known that nearly all communication is monitored and recorded, with what your proposing, would mean that in the military, is a massive call centre with enough staff to listen to the millions of phone calls made by US phone users at the same time in real time. I think not!

Now having the ability to do something like that is possible, and is more than likely done, and I would hate to think about the HDD capacity on those servers. Just think about the poor begger that's got to maintain them as well.

To be clear, they have the ability to do this and do so on a daily basis. They do not have a call center that monitors all communications 24/7. Nor do gjey store all this either not sure why you thought all that That is crazy and this is no tin foil hat theory. I know what im talking about. These communications are monitered from airplanes, sats and from the ground from vehicles.

Most civillians know very little the capabilities that are had by our military. It should help you feel safer. Not creepy.
 
Wouldn't the iPhone need to be in jailbreak for this to work on it? Or am I wrong on this point?
 
Wouldn't the iPhone need to be in jailbreak for this to work on it? Or am I wrong on this point?

I think yes, since it looks like the software they're referring to needs to be installed on the device and is entirely dependent on that, whereas I was thinking this was some external device they used.

This video is pretty silly, because it's like saying that if someone had physical access to your computer, they could install a keylogger and know all your passwords. Of course this is true, but they hide the fact that physical access to the phone is required. It's all just fear mongering.
 
Ok, you said this
The Military can and does listen in to all conversations via landlines, radio and cellular real time.
which to me, suggests that what I wrote was a sensible interpretation of what you said.

As for suggesting they don't record the conversations, what would be the point of listening if they don't have proof of it later on.

And as for the ability to remotely install software, personally, I don't believe that. Direct phone connection, yeah fine, but remotely....

And as for the tin hat comment, sounds apt, either you are a crackpot, OR you actually do something, in which case I doubt you should be writing it on the Internet...are the men in black suits there yet?

Also, if it were joe smith in the street, then yes, the device I would imagine it would need to be jailbroken. However, if it were "the man" then I doubt they would need Apple approval to install software on an un-jailbroken iPhone.

A good example of a phone that is being targetted a lot, as it's been in the press, is the Nokia 1100, which people are using to steal all kinds of information.
 
I agree, I think it is fear mongering.

However, check out this article from Wikipedia:

SIM cloning consists of duplicating the SIM card, which allows calls or other services to use the identification of the cloned SIM and to be charged to that account.

In the early 1990s, due to poor security, cloning was more common than it is today. Cloning has now been rendered more challenging technically (since physical access to the SIM card is now required, contrary to simply being within radio reach). The cards now perform security operations themselves on data buried within them.

SIM cloning is a great concern to security/police services since it renders GSM location-based service (LBS) unreliable when more than one handset uses the same SIM.

In the movie The Bourne Supremacy, the main character, Jason Bourne, clones a SIM card to enable him to listen in to calls to a U.S. official from the CIA. A realistic time for extracting the Ki from a SIM card is approximately 4-8 hours. There is 40% probability of damaging the card in the process. Additionally, the attacker must have pre-knowledge of the SIM card's PIN (CHV1).[citation needed]

A user of Woron Scan v1.05 has claimed scans in under 5 minutes. [1] Since that time, Woron Scan 1.09 has been released. An implementation in an FPGA would allow IMSI and Ki extraction in seconds if the algorithm scales similarly to DES. [2]

Cracking Ki by overhearing radio GSM traffic is difficult but not impossible (although illegal in the United States). In many countries GSM traffic is not encrypted, thus it is possible with proper equipment (a computer-based radio scanner (eg. USRP) and proper software).

The security has been improved with the newer generation of SIM cards to be used with 3GSM networks, known as USIMs. The new specification implements a new publicly announced algorithm (the KASUMI algorithm).

SIM cloning is also sometimes used to unlock phones from foreign providers for use on your home network; by using your Ki and switching between your IMSI and the IMSI that the phone expects the phone can be fooled into thinking that it has the SIM from its native provider (this is commonly done for Japanese phones as well as the iPhone before its software unlock was released).
Source: http://en.wikipedia.org/wiki/SIM_cloning
 
I think yes, since it looks like the software they're referring to needs to be installed on the device and is entirely dependent on that, whereas I was thinking this was some external device they used.

This video is pretty silly, because it's like saying that if someone had physical access to your computer, they could install a keylogger and know all your passwords. Of course this is true, but they hide the fact that physical access to the phone is required. It's all just fear mongering.

This is my take on it. I feel that 99.9% of people have nothing to worry about. However if you leave any device unattended, someone COULD install monitoring software on it without you knowing.

Also, from what I am aware of, Echelon uses a computer algorithm to pick up key words in conversations. Depending on what you are looking for they could be: bomb, meet, etc. Then it flags, records and stores those convo's.

If the worst thing you say on your mobile is: "I love That 70's Show" (which should cause concern) then you shouldn't be too concerned.
If, however, you are a criminal or unfaithful partner, you should change your evil ways or be prepared to pay for your sins.
 
This is my take on it. I feel that 99.9% of people have nothing to worry about. However if you leave any device unattended, someone COULD install monitoring software on it without you knowing.

Also, from what I am aware of, Echelon uses a computer algorithm to pick up key words in conversations. Depending on what you are looking for they could be: bomb, meet, etc. Then it flags, records and stores those convo's.

If the worst thing you say on your mobile is: "I love That 70's Show" (which should cause concern) then you shouldn't be too concerned.
If, however, you are a criminal or unfaithful partner, you should change your evil ways or be prepared to pay for your sins.

Hey what's wrong with That 70's Show? :confused: Saying "I love American Idol" is what should cause concern.
 
Ok, you said this which to me, suggests that what I wrote was a sensible interpretation of what you said.

As for suggesting they don't record the conversations, what would be the point of listening if they don't have proof of it later on.


And as for the ability to remotely install software, personally, I don't believe that. Direct phone connection, yeah fine, but remotely....

And as for the tin hat comment, sounds apt, either you are a crackpot, OR you actually do something, in which case I doubt you should be writing it on the Internet...are the men in black suits there yet?

Also, if it were joe smith in the street, then yes, the device I would imagine it would need to be jailbroken. However, if it were "the man" then I doubt they would need Apple approval to install software on an un-jailbroken iPhone.

A good example of a phone that is being targetted a lot, as it's been in the press, is the Nokia 1100, which people are using to steal all kinds of information.

having been in the Military, now retired, I was in Comms. So I do know what i speak of. Im not here to convince people of anything, not my job.Just thought I would make some things aware. I know what Im allowed to say and what Im not allowed to say. Anything i have said can be found out with research. Most will not take the time to do it.

none of it is supposed to be sinister, nor top secret as far as the ability. Mostly the How and the equipment.

Firmware updates and etc can be downloaded thru the carrier over the air and it can be done without the customers knowledge. Most of the time a customer knows because he is asked to accept or reject the request to download to their device.

That being said, yes recordings are made of pertinent info or what may be pertinent info. A lot of what is monitored is target specific and not mass random recording and monitoring. I kinda thought the average person here would know this, guess not.

No big conspiracy, been going on for years and will continue to go on. With the crowd that hangs here I really thought most people would know but then again, most here may be really young, probably never been in the Military etc etc.

For perspective, the SR-71 Blackbird built in 1964 had stealth tech, flew at 3.2 mach at 80,000 feet and had the radar image of a door.

Imagine what we have out there today?
 
having been in the Military, now retired, I was in Comms. So I do know what i speak of. Im not here to convince people of anything, not my job.Just thought I would make some things aware. I know what Im allowed to say and what Im not allowed to say. Anything i have said can be found out with research. Most will not take the time to do it.

none of it is supposed to be sinister, nor top secret as far as the ability. Mostly the How and the equipment.

Firmware updates and etc can be downloaded thru the carrier over the air and it can be done without the customers knowledge. Most of the time a customer knows because he is asked to accept or reject the request to download to their device.

That being said, yes recordings are made of pertinent info or what may be pertinent info. A lot of what is monitored is target specific and not mass random recording and monitoring. I kinda thought the average person here would know this, guess not.

No big conspiracy, been going on for years and will continue to go on. With the crowd that hangs here I really thought most people would know but then again, most here may be really young, probably never been in the Military etc etc.

For perspective, the SR-71 Blackbird built in 1964 had stealth tech, flew at 3.2 mach at 80,000 feet and had the radar image of a door.

Imagine what we have out there today?

I didn't comment on what was permantely retained. I merely commented on the fact that they must record the conversations that are monitored. It does make sense that only the relevant sections are kept for x amount of time. And no, I didn't think that everyone was recorded on mass, I would imagine there would be a number of factors preventing this.

I do however disagree with your comment regarding remote software installation. I would imagine that this is only available on newer devices, and wouldn't be possible on older phones.

I can only imagine what we have today, and to be honest, I imagine it is fairly scary, but, as they say, ignorance is bliss, and I am happy with that
 
Here is the site that was shown on the video:

http://www.flexispy.com/ They even have it for the iPhone

I like how the video says take your battery out to protect yourself... they don't know the iPhone :D

I have a passcode set for my phone and it locks after 15 mins and when I am out I set it to lock after a 1 min in some cases. I also don't leave my cell phone out in the open.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.