The SINGLE Most Important Step to Protect Yourself from Government Spying
June 24th, 2013
Reader Views: 2,102
Given that the NSA is tapping into your phone calls and spying on your Internet activities, you might have switched to a search engine which is¬†more privacy-conscious.
You might have started using encrypted communications.¬† After all,¬†NSA whistleblower Edward Snowden¬†and the leading electronic privacy group ‚Äď the¬†Electronic Frontier Foundation¬†‚Äď say that encryption helps to protect privacy.¬†¬† On the other hand,¬† Tech Dirt points out that the NSA¬†might consider you suspicious if you encrypt information, and so hold onto your data until they can decrypt it.
The above are all issues about which you are at least somewhat aware.
But there is a giant type of snooping which you probably don‚Äôt even know about.¬† Specifically, ABC News¬†reported¬†in 2006:
Cell phone users, beware.¬† The FBI can listen to everything you say, even when the cell phone is turned off. A recent court ruling in a case against the Genovese crime family revealed that the FBI has the ability from a remote location to activate a cell phone and turn its microphone into a listening device that transmits to an FBI listening post, a method known as a ‚Äúroving bug.‚ÄĚ
Experts say the only way to defeat it is to remove the cell phone battery.
‚ÄúThe FBI can access cell phones and modify them remotely without ever having to physically handle them,‚ÄĚ¬†James Atkinson, a counterintelligence security consultant, told ABC News.¬† ‚ÄúAny recently manufactured cell phone has a built-in tracking device, which can allow eavesdroppers to pinpoint someone‚Äôs location to within just a few feet,‚ÄĚ he added.
According to the recent court ruling by U.S. District Court Judge Lewis Kaplan,¬†‚ÄúThe device functioned whether the phone was powered on or off, intercepting conversations within its range wherever it happened to be.‚ÄĚ¬†
‚ÄúThe courts have given law enforcement a blank check for surveillance,‚ÄĚ Richard Rehbock, attorney for defendant John Ardito, told ABC News.
‚ÄúBig Brother is upon us‚Ä¶1984 happened a long time ago,‚ÄĚ he said, referring to the George Orwell futuristic novel ‚Äú1984,‚ÄĚ which described a society whose members were closely watched by those in power and was published in 1949.
CNET¬†noted¬†the same year:
The U.S. Commerce Department‚Äôs security office¬†warns¬†that ‚Äúa cellular telephone can be turned into a microphone and transmitter for the purpose of listening to conversations in the vicinity of the phone.‚ÄĚ An¬†article¬†in the¬†Financial Times¬†last year said mobile providers can ‚Äúremotely install a piece of software on to any handset, without the owner‚Äôs knowledge, which will activate the microphone even when its owner is not making a call.‚ÄĚ
Because modern handsets are miniature computers, downloaded software could modify the usual interface that always displays when a call is in progress. The spyware could then place a call to the FBI and activate the microphone‚Äďall without the owner knowing it happened.
A BBC¬†article¬†from 2004 reported that¬†intelligence agencies routinely employ the remote-activiation method. ‚ÄúA mobile sitting on the desk of a politician or businessman can act as a powerful, undetectable bug,‚ÄĚ the article said, ‚Äúenabling them to be activated at a later date to pick up sounds even when the receiver is down.‚ÄĚ
Given that the¬†American¬†and¬†British¬†intelligence agencies are trying tap every single communication, some rogue agency or contractor might be tapping your phone ‚Ä¶ even when it‚Äôs off.
Indeed, even¬†private¬†hackers might be listening in. Specifically, private parties without security clearance may be¬†activating your microphone or camera without your knowledge.
Indeed, commercially-available,¬†off-the-shelf software¬†allows people to spy on you:
Your¬†iPhone, or¬†other brand of smartphone¬†is spying on¬†virtually everything you do¬†(ProPublica notes: ‚ÄúThat‚Äôs No Phone. That‚Äôs My Tracker‚Äú) ‚Ä¶ and sending the information to private companies.
And CNET¬†pointed out¬†7 years ago:
Malicious hackers have followed suit. A¬†report¬†last year said Spanish authorities had detained a man who write a Trojan horse that¬†secretly activated a computer‚Äôs video camera and forwarded him the recordings.
So the single most important step to protect yourself from government ‚Äď or private ‚Äď spying is to remember that your conservations might not be private when your cellphone is nearby ‚Ä¶ even if it is turned off.
Note:¬† If you have a microphone in your car, that might also open you up to snoopers. As CNET¬†points out:
Surreptitious activation of built-in microphones by the FBI has been done before. A¬†2003 lawsuit¬†revealed that the FBI was able to surreptitiously turn on the built-in microphones in automotive systems like General Motors‚Äô OnStar to snoop on passengers‚Äô conversations.
When FBI agents remotely activated the system and were listening in, passengers in the vehicle could not tell that their conversations were being monitored.
And Fox news notes that the government is¬†insisting that ‚Äúblack boxes‚ÄĚ be installed in cars¬†to track your location.
Delivered by The Daily Sheeple
Contributed by Washingtons Blog of washingtonsblog.com.
Please share: Spread the word to sheeple far and wide
Leave A Comment...
The Daily Sheeple Home Page