The SINGLE Most Important Step to Protect Yourself from Government Spying
June 24th, 2013
Reader Views: 2,071
Given that the NSA is tapping into your phone calls and spying on your Internet activities, you might have switched to a search engine which isÂ more privacy-conscious.
You might have started using encrypted communications.Â After all,Â NSA whistleblower Edward SnowdenÂ and the leading electronic privacy group â theÂ Electronic Frontier FoundationÂ â say that encryption helps to protect privacy.Â Â On the other hand,Â Tech Dirt points out that the NSAÂ might consider you suspicious if you encrypt information, and so hold onto your data until they can decrypt it.
The above are all issues about which you are at least somewhat aware.
But there is a giant type of snooping which you probably donât even know about.Â Specifically, ABC NewsÂ reportedÂ in 2006:
Cell phone users, beware.Â The FBI can listen to everything you say, even when the cell phone is turned off. A recent court ruling in a case against the Genovese crime family revealed that the FBI has the ability from a remote location to activate a cell phone and turn its microphone into a listening device that transmits to an FBI listening post, a method known as a âroving bug.â
Experts say the only way to defeat it is to remove the cell phone battery.
âThe FBI can access cell phones and modify them remotely without ever having to physically handle them,âÂ James Atkinson, a counterintelligence security consultant, told ABC News.Â âAny recently manufactured cell phone has a built-in tracking device, which can allow eavesdroppers to pinpoint someoneâs location to within just a few feet,â he added.
According to the recent court ruling by U.S. District Court Judge Lewis Kaplan,Â âThe device functioned whether the phone was powered on or off, intercepting conversations within its range wherever it happened to be.âÂ
âThe courts have given law enforcement a blank check for surveillance,â Richard Rehbock, attorney for defendant John Ardito, told ABC News.
âBig Brother is upon usâŠ1984 happened a long time ago,â he said, referring to the George Orwell futuristic novel â1984,â which described a society whose members were closely watched by those in power and was published in 1949.
CNETÂ notedÂ the same year:
The U.S. Commerce Departmentâs security officeÂ warnsÂ that âa cellular telephone can be turned into a microphone and transmitter for the purpose of listening to conversations in the vicinity of the phone.â AnÂ articleÂ in theÂ Financial TimesÂ last year said mobile providers can âremotely install a piece of software on to any handset, without the ownerâs knowledge, which will activate the microphone even when its owner is not making a call.â
Because modern handsets are miniature computers, downloaded software could modify the usual interface that always displays when a call is in progress. The spyware could then place a call to the FBI and activate the microphoneâall without the owner knowing it happened.
A BBCÂ articleÂ from 2004 reported thatÂ intelligence agencies routinely employ the remote-activiation method. âA mobile sitting on the desk of a politician or businessman can act as a powerful, undetectable bug,â the article said, âenabling them to be activated at a later date to pick up sounds even when the receiver is down.â
Given that theÂ AmericanÂ andÂ BritishÂ intelligence agencies are trying tap every single communication, some rogue agency or contractor might be tapping your phone âŠ even when itâs off.
Indeed, evenÂ privateÂ hackers might be listening in. Specifically, private parties without security clearance may beÂ activating your microphone or camera without your knowledge.
Indeed, commercially-available,Â off-the-shelf softwareÂ allows people to spy on you:
YourÂ iPhone, orÂ other brand of smartphoneÂ is spying onÂ virtually everything you doÂ (ProPublica notes: âThatâs No Phone. Thatâs My Trackerâ) âŠ and sending the information to private companies.
And CNETÂ pointed outÂ 7 years ago:
Malicious hackers have followed suit. AÂ reportÂ last year said Spanish authorities had detained a man who write a Trojan horse thatÂ secretly activated a computerâs video camera and forwarded him the recordings.
So the single most important step to protect yourself from government â or private â spying is to remember that your conservations might not be private when your cellphone is nearby âŠ even if it is turned off.
Note:Â If you have a microphone in your car, that might also open you up to snoopers. As CNETÂ points out:
Surreptitious activation of built-in microphones by the FBI has been done before. AÂ 2003 lawsuitÂ revealed that the FBI was able to surreptitiously turn on the built-in microphones in automotive systems like General Motorsâ OnStar to snoop on passengersâ conversations.
When FBI agents remotely activated the system and were listening in, passengers in the vehicle could not tell that their conversations were being monitored.
And Fox news notes that the government isÂ insisting that âblack boxesâ be installed in carsÂ to track your location.
AndÂ see this.
Delivered by The Daily Sheeple
Contributed by Washingtons Blog of washingtonsblog.com.
Please share: Spread the word to sheeple far and wide
Leave A Comment...
The Daily Sheeple Home Page