[4 / 0 / ?]
Quoted By:
iSpy
Phone-tapping and listening bugs are methods used for spying. How else does the US National Security Agency (NSA) eavesdrop on its targets? Here are the outline a few common ways phone surveillance can happen and what can be done to secure mobile devices.
DIRECT TO PHONE
This happens when connecting to an unsecured public network, using Wi-Fi or Bluetooth, which allows anyone to be connected in the network. On a wireless network, a hacker with the right programme can access one's phone and duplicate the phone's contents or even plant a software that could monitor the phone's activity .
Similarly, this occurs on Bluetooth connections, especially when connecting to an unknown device.
WAVES
Mobile phones can connect to a network through 2G, 3G and 4G.
In the latter two, which are newer technologies, the phone will try to authenticate the network, ensuring that transmitters really belong to telecommunications companies.
But in the case of a 2G network, a hacker can dupe the phone into "believing" it is connected to a base station (or telephone tower) when it is in fact connected to a hacker's system. This allows them to access information on the phone, eavesdrop and even send messages as the user. Even on a 3G/4G network, especially in small cities, hackers can create "noise" in the frequency, which forces phones to be on the 2G network, allowing hackers to easily access one's
phone.
Some older models of Blackberry smartphones allowed users to be exclusively on a 3G network. But as more users are concerned about battery life, most new models only allow users to turn off the 3/4G function.
SOLUTION
One of the solutions is to use Voice over Internet Protocol (VoIP), which allows phone calls and texting to be made through the Internet instead of the public telephone network. A popular example is Skype. There are also companies offering encrypted voice services, or secured lines for phone calls that cannot be tapped into.
But as more governments are putting pressure on such companies to share their users' information, most have shut down in order to not compromise user privacy.
THREE TIPS
1. Disable WI·Fi and Bluetooth when not in use. This is especially if one's phone is set to automatically connect to wireless networks. Many have misconceptions that Bluetooth has a range of about 10m, and WiFi about 250m.
Experiments, though, have shown Bluetooth devices being able to connect at a range of 2km, while Wi-Fi can reach a range of 250km.
2. Choose your WI-FI networks carefully
Do not join an unfamiliar wireless network, especially if it's unsecured. All a hacker needs to do to get into one's phone is to be on the same wireless network.
With our phones getting increasingly complex, tapping a phone is now more like hacking into a computer.
3. Be mindful of what applications you download
Some applications may look attractive, but think twice if they come from a relatively unknown company. Much like fraudulent software on computers, firms now use phone applications like a Trojan horse, which would transmit user data and phone activity to the hackers.
NSA'S PRIMARY SOURCES OF INTELLIGENCE
Half of the intelligence information which is supplied to the White House every morning comes from the NSA. Based in Fort Meade, Maryland, with an annual budget of US$10.8 billion, NSA boasts ground agents, tracking ships and listening
posts to unmanned aerial vehicles (UAVs) and reconnaissance satellites.
1.Human Intelligence (HUMINT)
Spies, moles, agents and double agents are part of NSA's 35,000-strong workforce. It is also the largest employer of mathematicians in the US.
2. Signals Intelligence (SIGINT)
Gathering of intel through eavesdropping, listening posts, hacking, wire and phone tapping and decryption devices.
e.g : Spy satellite
3. Electronic Intelligence (ELINT)
Gathering of intel using assets like tracking ships, spy planes, drones and spy satellites.
e.g : RC-135 reconnaisance plane, Global Hawk drone
HOW THE NSA'S PRISM PROGRAM WORKS
Targets foreigners by collecting intelligence from tech giants such as Google and Microsoft. lt also collects e-mails, voice, text and video chats of Americans "incidentally" conversing with a foreign target overseas.
Search
An NSA analyst types one or more search terms, or "selectors".
Tasking
Search request can be sent to multiple sources like a private company and to an NSA access point that taps into the main Internet gateway switches. Tasking at a tech giant is routed to FBI equipment.
Other spy programs
Collects metadata* Includes Upstream, which taps into Internet and telephone networks. Some data comes from telcos.
Results
Data is processed by NSA's Printaura, an automated "traffic cop" system. NSA processes at least 11 types of electronic communications.
A search may yield e-malls, logln credentials, metadata, stored flies and videos. Processed data is sent back to the analyst who made the tasking.
* Metadata: Records of people, locations, equipment, dates and durations of communications.
SOURCE: THE WASHINGTON POST & THE NEW YORK TIMES
Phone-tapping and listening bugs are methods used for spying. How else does the US National Security Agency (NSA) eavesdrop on its targets? Here are the outline a few common ways phone surveillance can happen and what can be done to secure mobile devices.
DIRECT TO PHONE
This happens when connecting to an unsecured public network, using Wi-Fi or Bluetooth, which allows anyone to be connected in the network. On a wireless network, a hacker with the right programme can access one's phone and duplicate the phone's contents or even plant a software that could monitor the phone's activity .
Similarly, this occurs on Bluetooth connections, especially when connecting to an unknown device.
WAVES
Mobile phones can connect to a network through 2G, 3G and 4G.
In the latter two, which are newer technologies, the phone will try to authenticate the network, ensuring that transmitters really belong to telecommunications companies.
But in the case of a 2G network, a hacker can dupe the phone into "believing" it is connected to a base station (or telephone tower) when it is in fact connected to a hacker's system. This allows them to access information on the phone, eavesdrop and even send messages as the user. Even on a 3G/4G network, especially in small cities, hackers can create "noise" in the frequency, which forces phones to be on the 2G network, allowing hackers to easily access one's
phone.
Some older models of Blackberry smartphones allowed users to be exclusively on a 3G network. But as more users are concerned about battery life, most new models only allow users to turn off the 3/4G function.
SOLUTION
One of the solutions is to use Voice over Internet Protocol (VoIP), which allows phone calls and texting to be made through the Internet instead of the public telephone network. A popular example is Skype. There are also companies offering encrypted voice services, or secured lines for phone calls that cannot be tapped into.
But as more governments are putting pressure on such companies to share their users' information, most have shut down in order to not compromise user privacy.
THREE TIPS
1. Disable WI·Fi and Bluetooth when not in use. This is especially if one's phone is set to automatically connect to wireless networks. Many have misconceptions that Bluetooth has a range of about 10m, and WiFi about 250m.
Experiments, though, have shown Bluetooth devices being able to connect at a range of 2km, while Wi-Fi can reach a range of 250km.
2. Choose your WI-FI networks carefully
Do not join an unfamiliar wireless network, especially if it's unsecured. All a hacker needs to do to get into one's phone is to be on the same wireless network.
With our phones getting increasingly complex, tapping a phone is now more like hacking into a computer.
3. Be mindful of what applications you download
Some applications may look attractive, but think twice if they come from a relatively unknown company. Much like fraudulent software on computers, firms now use phone applications like a Trojan horse, which would transmit user data and phone activity to the hackers.
NSA'S PRIMARY SOURCES OF INTELLIGENCE
Half of the intelligence information which is supplied to the White House every morning comes from the NSA. Based in Fort Meade, Maryland, with an annual budget of US$10.8 billion, NSA boasts ground agents, tracking ships and listening
posts to unmanned aerial vehicles (UAVs) and reconnaissance satellites.
1.Human Intelligence (HUMINT)
Spies, moles, agents and double agents are part of NSA's 35,000-strong workforce. It is also the largest employer of mathematicians in the US.
2. Signals Intelligence (SIGINT)
Gathering of intel through eavesdropping, listening posts, hacking, wire and phone tapping and decryption devices.
e.g : Spy satellite
3. Electronic Intelligence (ELINT)
Gathering of intel using assets like tracking ships, spy planes, drones and spy satellites.
e.g : RC-135 reconnaisance plane, Global Hawk drone
HOW THE NSA'S PRISM PROGRAM WORKS
Targets foreigners by collecting intelligence from tech giants such as Google and Microsoft. lt also collects e-mails, voice, text and video chats of Americans "incidentally" conversing with a foreign target overseas.
Search
An NSA analyst types one or more search terms, or "selectors".
Tasking
Search request can be sent to multiple sources like a private company and to an NSA access point that taps into the main Internet gateway switches. Tasking at a tech giant is routed to FBI equipment.
Other spy programs
Collects metadata* Includes Upstream, which taps into Internet and telephone networks. Some data comes from telcos.
Results
Data is processed by NSA's Printaura, an automated "traffic cop" system. NSA processes at least 11 types of electronic communications.
A search may yield e-malls, logln credentials, metadata, stored flies and videos. Processed data is sent back to the analyst who made the tasking.
* Metadata: Records of people, locations, equipment, dates and durations of communications.
SOURCE: THE WASHINGTON POST & THE NEW YORK TIMES