Skip to content or view mobile version

Home | Mobile | Editorial | Mission | Privacy | About | Contact | Help | Security | Support

A network of individuals, independent and alternative media activists and organisations, offering grassroots, non-corporate, non-commercial coverage of important social and political issues.

Mobile Phones Are Bugs

phones off! | 12.02.2007 12:59 | Repression | Technology

this is old news but the debate continues

For those who still don't believe it is possible to be bugged even when you are not using your mobile phone there is plenting of info showing this is the case going back several years.

one such article reprinted here from FT.

" more significantly they can also remotely install a piece of software on to any handset, without the owner's knowledge, which will activate the microphone even when its owner is not making a call, giving security services the perfect bugging device. "We have inadvertently started carrying our own trackable ID card in the form of the mobile phone," said Sandra Bell, head of the homeland security department at the Royal United Services Institute."

Financial Times

Use of mobile helped police keep tabs on suspect and brother

By Mark Odell,Telecoms Correspondent

Published: August 2 2005 02:00 | Last updated: August 2 2005 02:00

The arrest of Hamdi Adus Issac, who goes by the name of Hussain Osman, is the latest in a long line of police investigations helped by the suspect's use of a mobile telephone.

Italian police revealed yesterday that the initial tip that allowed them to track Mr Issac's cell phone came from their British counterparts.

On July 26, the UK authorities notified those in Italy that a suspect going by the name of Hussain Osman had left the UK.

The next day the cell telephone that British police had linked to the suspect was switched to the Italian telephone system. On July 28, police discovered the destination of Mr Issac and his brother was put under surveillance in Rome.

Once police or the security services know the mobile phone number of a suspect, they can ask the mobile operator to track the individual.

As long as the handset is switched on the telephone can be tracked across any mobile network in real time.

By using no more than three mobile telephone masts or base stations - a process known as triangulation - it is possible to pin down the location of an individual in high density urban areas to between two and three metres. Crucial to this triangulation is the proximity to each other of the three base stations, but on average the standard deviation is no more than 25 metres.

If ordered to do so, mobile telephone operators can also tap any calls, but more significantly they can also remotely install a piece of software on to any handset, without the owner's knowledge, which will activate the microphone even when its owner is not making a call, giving security services the perfect bugging device. "We have inadvertently started carrying our own trackable ID card in the form of the mobile phone," said Sandra Bell, head of the homeland security department at the Royal United Services Institute.

The UK security services have used mobile telephone records to trap IRA terrorists in the past and the police have been helped in solving high-profile murders and abductions too.

The most recent high-profile Italian investigation using telephone records prior to the arrest of Mr Issac is that of Antonio Fazio, Italy's central bank governor, who is under fire over his alleged bias in handling an Italian bank take-over battle.

Copyright The Financial Times Limited 2007

phones off!

Comments

Hide 2 hidden comments or hide all comments

stick to the fax...

12.02.2007 16:20

"but more significantly they can also remotely install a piece of software on to any handset, without the owner's knowledge"

This would be significant, were it actually true. There are some handsets that can have software remotely installed but they are not compatible with UK networks, and even in the US they are not common.

believe the media


What if it is switched off?

12.02.2007 17:35

Presumably the phone can't be tracked or bugged if it is switched off.

Harry


Mines in the bin

12.02.2007 17:58

as the bill bugged me.

Sting


reactivate at own risk

12.02.2007 19:48

de-activate =
Take the battery out =
Unbugged!

more here  http://www.freebeagles.org/articles/mobile_phones.html#4

De-activate


Again no !

13.02.2007 01:01

de-activate =
Take the battery out =
Unbugged!



No, no, no. I've a tawdry electronics qualificatiion but I could bug your phone even with the battery out if I had access to it for 5 minutes. If you want to discuss anything of importance, leave your phones out of ear-shot. Don't be paranoid, be rational. A small cell in a phone can be used to temporarily replace your 'battery'.

drawnIn


To Harry

13.02.2007 15:45

Yes Harry phones can be tracked when they are switched off.

A mobile phone obsessed society like ours (which didn't exist 15 years ago) is open
to bugging - tracking - and any other shit the State deems necessary (waste of time).
What the fuck do people talk about all the time on their mobiles anyway?

A created need for mobile phones has led us all into a big brother scenario which can be avoided - chuck the fucking things in the river!!



Dog n Bone Mast


Out of curiosity...

13.02.2007 18:03

cn you explain to me how you would track a mobile phone which is switched off and hasn't been tampered with?

sceptic


But really

14.02.2007 16:35

tracking and bugging while phone on = yes
tracking and bugging while phone 'off' and battery in place = yes
tracking and bugging while phone off and battery removed = no

okay, so somebody could tamper with your phone if they had physical access for long enough and insert a separate bug or tracking device with it's own (limited) power supply. but mobile phones have zero extra space inside them for any additional battery of significant size to be added so forget the idea that they will continue to operate when you remove the battery. as for backup cells used to keep the memory in place while you swap the main battery - they are tiny and not powerful enough to do anything beyond maintaining the memory.

lets be realistic about this phone stuff.

1. they ARE tracking devices and that requires nothing beyond access to the computer systems of your phone network which all intelligence agencies would have and any decent private investigator would also be able to access that information given time.

2. they ARE means to identify associates and networks of association, either via physical access to your phone and it's phonebook and calls register or remotely either hacking your phone via bluetooth or the network, or once again through the data retained by your mobile phone network operator.

3. they COULD BE bugs in real time. possible but unlikely in most cases unless you are being investigated for your mafia or Al Qaeda links. your phones 'talk time' due to limited battery life is the limiting factor here. if your phone was remotely turned into a transmitter the battery would go flat much much faster than you expected - within hours rather than days.

4. turning the phone off DOES NOTHING do defend you as 'off' is merely the equivalent of standby and the software in the phone can continue to periodically report to the nearest cell repeater or switch itself to transmit without you being aware, if that's what somebody really wanted.

5. taking the battery out IS a practical defense. backup battery cells are tiny by comparison and configured to maintain memory functions date/time etc while the main battery is changed. while they could theoretically be used to power the transmitter, it could only do so for a very limited period of time, probably less than a minute.

6. knowledge IS useful, paranoia IS NOT

another view


really you idiot

15.02.2007 10:31

"but mobile phones have zero extra space inside them for any additional battery of significant size to be added so forget the idea that they will continue to operate when you remove the battery...."

When talking about security it is somewhat suspicious that you talk as if you are an expert when you obviously know nothing.

The argument there is no space in a mobile phone to place a backup cell is simply wrong for most phones, especially the older, bulkier phones most activists can afford. Open one up and see. Perhaps you don't know how small a power source can be. as it would easy to recharge this back up cell, or more likely a high charge capacitor, from the normal battery. A 'super cap' capacitor can maintain it's power for years, be recharged thousands of times, can power your phone and come in sizes small enough to fit inside even the tightest phone. A super cap can even be screen-printed flatly by a 1st year student onto the cover of your phone.

"taking the battery out IS a practical defense. backup battery cells are tiny by comparison and configured to maintain memory functions date/time etc while the main battery is changed. while they could theoretically be used to power the transmitter, it could only do so for a very limited period of time, probably less than a minute"

What an idiot you are, calling other people paranoid while pretending to be an expert on their security. If you think knowledge is useful then why not do five minutes research even if you can't be bothered getting an electronics qualification ? The cell or cap wouldn't need to power the transmitter to act as a bugging device, in fact that could be a giveaway through the heat it would generate, it could simply act as a recorder to be transmitted when the main battery is reinstalled.

Also, do you really know the history of every phone in your group ? You get functional mobile phones that fire bullets. These are obviously built for that purpose rather than tampered with but since activists have been removing their batteries for years, do you really think it is beyond the wit of security services to

Why distrust everyone carrying phones with their cells in only to risk allowing them to carry the phones with the battery out ? If everyone is going to the hassle of taking their batteries out then why not dump them all in a bag 20m away ? And while you are at it, dump every other piece of electronics you are carrying too. Only careless idiots and agents accuse careful activists of being parnoid.

drawnIn
- Homepage: http://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html


leave the phones at home

15.02.2007 12:22

"cn you explain to me how you would track a mobile phone which is switched off and hasn't been tampered with?"
There is a difference between switched off and unpowered. Think of it being in standby mode when you 'turn it off', in other words only parts of the circuitry are off.

"There are some handsets that can have software remotely installed but they are not compatible with UK networks, and even in the US they are not common."

Unless you are a phone manufacturer coder or can provide convincing links then forgive me if I take this with a pinch of salt. Considering nearly all commercial computer software gets pssed through the NSA for 'approval', it would be trusting to assume phone companies don't do the same.

If all you are doing is sit-downs and blocks, then don't worry too much. If you are risking prison time then only talk through passed notes to people you trust and make sure they are burned. Hezbullah leaders don't use mobiles since the Israelis either plant bombs in them to blow their heads off or use the signal to guide in missiles. Rich criminals who need mobiles keep a big stack of them and chuck them away regularly. Mafia dons just write notes - even that isn't fool proof, one was caught by his laundry list recently.

The very fact several activists phone all suddenly converge and then get turned off should be indicating to the authorities that something is up. Good practice eliminates doubt. Leave your mobile at home.

drawnIn


Hidden Comment

This posting has been hidden because it breaches the Indymedia UK (IMC UK) Editorial Guidelines.

IMC UK is an interactive site offering inclusive participation. All postings to the open publishing newswire are the responsibility of the individual authors and not of IMC UK. Although IMC UK volunteers attempt to ensure accuracy of the newswire, they take no responsibility legal or otherwise for the contents of the open publishing site. Mention of external web sites or services is for information purposes only and constitutes neither an endorsement nor a recommendation.

drawnln, you're talking bollocks.

15.02.2007 22:52

A 'super cap' will not contain enough energy to transmit any kind of signal for more than a few seconds.

Suppose you had a 1 farad capacity charged to 5V, That contains 12.5J of energy. Your mobile transmits at say 1W. It would last for ... 12.5 seconds - ignoring the fact that the voltage drop of capacitor is very different from that of a battery.

And no, you can't print screenprint them. 1F capacitors are about the size of 3 10p pieces stacked together.

And when the phone is switched off, IT DOES NOT TRANSMIT. The battery would be flat in no time if it did. That's why when you switch on, you have to wait for it to find a signal. If it's not transmitting, it can't be located.

sceptic


Hidden Comment

This posting has been hidden because it breaches the Indymedia UK (IMC UK) Editorial Guidelines.

IMC UK is an interactive site offering inclusive participation. All postings to the open publishing newswire are the responsibility of the individual authors and not of IMC UK. Although IMC UK volunteers attempt to ensure accuracy of the newswire, they take no responsibility legal or otherwise for the contents of the open publishing site. Mention of external web sites or services is for information purposes only and constitutes neither an endorsement nor a recommendation.

Sceptics comment should be unhidden

26.02.2007 19:11

Standard screen printed super-capacitor
Standard screen printed super-capacitor

Since he is just humiliating himself.

 http://www.indymedia.org.uk/en/2007/02/362098.html?c=all
>drawnln, you're talking bollocks. 15.02.2007 22:52 Sceptic
>A 'super cap' will not contain enough energy to transmit any kind of signal for more than a few seconds.

I don't believe you are right, or even technically qualified to comment Sceptic.


>It would last for ... 12.5 seconds - ignoring the fact that the voltage drop of capacitor is very different from that of a battery.

You are ignoring quite a few facts. Firstly, your figures are suppostitional, misinformed and plain wrong. Rathe than give you a physics lesson, let me accept your figure of 12.5 seconds transmission. That is plenty time to identify you to a base station and call a number.
Besides, you are missing the point that the message could be recorded and sent after.


>And no, you can't print screenprint them. 1F capacitors are about the size of 3 10p pieces stacked together.

For someone who pretends to be so well informed it is amazing you are so inaccurate, and you seem to fail to even understand what a basic capacitor is. Of course you can screen-print them. And your dimensions are laughable. Let me quote a bog-standard, generic, off the shelf capacitor manufacturer.  http://www.cellergy.co.il/

"Low tech screen printing is used for producing High tech Super Capacitors at low standard components prices."

drawnIn


Hide 2 hidden comments or hide all comments

Upcoming Coverage
View and post events
Upcoming Events UK
24th October, London: 2015 London Anarchist Bookfair
2nd - 8th November: Wrexham, Wales, UK & Everywhere: Week of Action Against the North Wales Prison & the Prison Industrial Complex. Cymraeg: Wythnos o Weithredu yn Erbyn Carchar Gogledd Cymru

Ongoing UK
Every Tuesday 6pm-8pm, Yorkshire: Demo/vigil at NSA/NRO Menwith Hill US Spy Base More info: CAAB.

Every Tuesday, UK & worldwide: Counter Terror Tuesdays. Call the US Embassy nearest to you to protest Obama's Terror Tuesdays. More info here

Every day, London: Vigil for Julian Assange outside Ecuadorian Embassy

Parliament Sq Protest: see topic page
Ongoing Global
Rossport, Ireland: see topic page
Israel-Palestine: Israel Indymedia | Palestine Indymedia
Oaxaca: Chiapas Indymedia
Regions
All Regions
Birmingham
Cambridge
Liverpool
London
Oxford
Sheffield
South Coast
Wales
World
Other Local IMCs
Bristol/South West
Nottingham
Scotland
Social Media
You can follow @ukindymedia on indy.im and Twitter. We are working on a Twitter policy. We do not use Facebook, and advise you not to either.
Support Us
We need help paying the bills for hosting this site, please consider supporting us financially.
Other Media Projects
Schnews
Dissident Island Radio
Corporate Watch
Media Lens
VisionOnTV
Earth First! Action Update
Earth First! Action Reports
Topics
All Topics
Afghanistan
Analysis
Animal Liberation
Anti-Nuclear
Anti-militarism
Anti-racism
Bio-technology
Climate Chaos
Culture
Ecology
Education
Energy Crisis
Fracking
Free Spaces
Gender
Globalisation
Health
History
Indymedia
Iraq
Migration
Ocean Defence
Other Press
Palestine
Policing
Public sector cuts
Repression
Social Struggles
Technology
Terror War
Workers' Movements
Zapatista
Major Reports
NATO 2014
G8 2013
Workfare
2011 Census Resistance
Occupy Everywhere
August Riots
Dale Farm
J30 Strike
Flotilla to Gaza
Mayday 2010
Tar Sands
G20 London Summit
University Occupations for Gaza
Guantanamo
Indymedia Server Seizure
COP15 Climate Summit 2009
Carmel Agrexco
G8 Japan 2008
SHAC
Stop Sequani
Stop RWB
Climate Camp 2008
Oaxaca Uprising
Rossport Solidarity
Smash EDO
SOCPA
Past Major Reports
Encrypted Page
You are viewing this page using an encrypted connection. If you bookmark this page or send its address in an email you might want to use the un-encrypted address of this page.
If you recieved a warning about an untrusted root certificate please install the CAcert root certificate, for more information see the security page.

Global IMC Network


www.indymedia.org

Projects
print
radio
satellite tv
video

Africa

Europe
antwerpen
armenia
athens
austria
barcelona
belarus
belgium
belgrade
brussels
bulgaria
calabria
croatia
cyprus
emilia-romagna
estrecho / madiaq
galiza
germany
grenoble
hungary
ireland
istanbul
italy
la plana
liege
liguria
lille
linksunten
lombardia
madrid
malta
marseille
nantes
napoli
netherlands
northern england
nottingham imc
paris/île-de-france
patras
piemonte
poland
portugal
roma
romania
russia
sardegna
scotland
sverige
switzerland
torun
toscana
ukraine
united kingdom
valencia

Latin America
argentina
bolivia
chiapas
chile
chile sur
cmi brasil
cmi sucre
colombia
ecuador
mexico
peru
puerto rico
qollasuyu
rosario
santiago
tijuana
uruguay
valparaiso
venezuela

Oceania
aotearoa
brisbane
burma
darwin
jakarta
manila
melbourne
perth
qc
sydney

South Asia
india


United States
arizona
arkansas
asheville
atlanta
Austin
binghamton
boston
buffalo
chicago
cleveland
colorado
columbus
dc
hawaii
houston
hudson mohawk
kansas city
la
madison
maine
miami
michigan
milwaukee
minneapolis/st. paul
new hampshire
new jersey
new mexico
new orleans
north carolina
north texas
nyc
oklahoma
philadelphia
pittsburgh
portland
richmond
rochester
rogue valley
saint louis
san diego
san francisco
san francisco bay area
santa barbara
santa cruz, ca
sarasota
seattle
tampa bay
united states
urbana-champaign
vermont
western mass
worcester

West Asia
Armenia
Beirut
Israel
Palestine

Topics
biotech

Process
fbi/legal updates
mailing lists
process & imc docs
tech