" It should come as no surprise that cellphone calls may be tapped by law enforcement. But authorities also can use cellphones to eavesdrop on suspects, even when the devices are off. The FBI converted the Nextel cellphones of two alleged New York mobsters into "roving bugs," microphones that relayed conversations when the phones seemed to be inactive, according to recent court documents. Authorities won't reveal how they did this. But a countersurveillance expert said Nextel, Motorola Razr and Samsung 900 series cellphones can be reprogrammed over the air, using methods meant for delivering upgrades and maintenance. It's called "flashing the firmware," said James Atkinson, a consultant for the Granite Island Group in Massachusetts. "These are very powerful phones, but all that power comes with a price. By allowing ring tones and stock quotes and all this other stuff, you also give someone a way to get into your phones," Atkinson said. Privacy advocates called such use of roving bugs intrusive and illegal. Webcams and microphones on home computers soon may be fair game for remote-control gumshoes, too, they said. "This is a kind of surveillance we've never really seen before. The government can and will exploit whatever technology is available to achieve their surveillance goals. This is of particular concern, considering the proliferation of microphones and cameras in the products we own," said Kevin Bankston, a lawyer for the Electronic Frontier Foundation. Converting cellphones into stealth microphones violates the Fourth Amendment protection against overly broad searches, Bankston said. FBI spokesman James Margolin said the bureau's use of roving bugs is monitored closely by the courts. "The operative thing for any concerned citizen is, we only do this when we get authorization from the judiciary, when we meet the probable-cause threshold," he said. Legally, he said, bugging cellphones differs little from placing microphones "in a chair or a wall or behind a picture." "It's not a situation where we just turn the tape on and we gather everything," Margolin said. "By law, we only listen to what the warrant authorizes us to listen to." However, hackers probably can pull this off, too, said Lauren Weinstein, who warned of the possibility in 1999 on his online Privacy Forum. "A lot of people know an awful lot about the inner workings of these phones," he said. The roving bugs came to light last month in an opinion by U.S. District Judge Lewis Kaplan in New York. Kaplan's opinion, reported online by CNET, upheld FBI bugging of cellphones used by John "Buster" Ardito, allegedly a high-ranking member of the Genovese crime family, and his lawyer and associate, Peter Peluso. A listening device in Ardito's phone "functioned whether the phone was powered on or off, intercepting conversations within its range wherever it happened to be," Kaplan wrote. Investigators got permission for the bug from another judge in 2003, after learning that Ardito's associates had discovered FBI bugs planted in restaurants where they gathered. A spokeswoman for the U.S. Attorney's Office in the Southern District of New York declined to comment. Margolin declined to say if an eavesdropping device was planted in Ardito's cellphone or if agents remotely programmed the phone for real-time eavesdropping or for recording audio to transmit at specified times. "For obvious reasons, we don't discuss what we are or are not capable of doing, technologically," Margolin said. Sprint Nextel spokesman Mark Elliott said the company cooperates with authorities when they have warrants and subpoenas. "In this case, we were not aware of any investigation and were not asked to participate," Elliott said. Samsung spokesman Jose Cardona said he had not heard of any privacy issues with 900 series phones. Nextel phones are made by Motorola, which also makes the popular Razr. Motorola spokeswoman Molly Sheehan said the company's phones were not designed or intended to violate privacy rights or laws, "and Motorola neither supports nor condones such use." She referred further questions to the FBI. While all commercial mobile services can be tapped, Nextel is the easiest because its network uses a technology called TDMA, said the Granite Island Group's Atkinson, who was trained by the government and advises corporations about security. TDMA conveys a constant audio stream to cell towers. That stream can be monitored surreptitiously with another Nextel phone, Atkinson said. A walkie-talkie feature has made Nextel popular with businesses. But Atkinson said more convenience can mean less security. That goes for Nextel-toting FBI agents, too, he said. If they gather in Washington, "I can tell you from a few blocks away where the FBI agents are, and how far apart they're sitting in the building." Asked if the FBI uses Nextel phones, spokeswoman Cathy Milhoan said, "We use a variety of phones and providers." Atkinson said the only sure way to shield a mobile phone from the prying ears of police, hackers and jealous spouses is to remove the battery. But don't get ____y. "A smart eavesdropper will bug the battery," he said. " quote from www.infowars.com
Wirelessly posted (Walkguru's: LG-CU500 Obigo/WAP2.0 Profile/MIDP-2.0 Configuration/CLDC-1.1 UP.Link/6.3.0.0.0) Hmmm, i dont know about that.
Wow, sending an OTA update to make the phone still give a signal while it's off. That's sick & unbelievable that someone found a way to do this. If I was ever a criminal, guess I wouldn't want one of the 3 listed phones, but hey if I don't have anything to hide, not a problem. This may make terrorist's around the world nervous, hearing this can be done & wonder if this wasn't meant to be released yet, since it sounds fairly new.
Their are a lot more phones that can do OTA updates then those listed. The fact that this can be done doesn't scare me. It's the fact that we have a government who abuses its powers.
There must be parts of the phone that require power all the time & this must be how they get the OTA update to activate the phone without anyone knowing about it. I do agree bobolito, removing the battery would be the only option if you are someone who is trying to hide for a reason.
The simplest answer is usually the one that works. I'll be sure to keep this article in mind next time I plan out my next big heist.
Most electronic devices nowadays use a soft-switch which merely puts devices in standby mode rather than completely turn them off. Back in the early 80's most devices used a hard switch which actually cut all power to the device, but during the 80s this started to change with the use of integrated circuits, fuzzy logic, and digital components. When a device is in standby most or all of its visual indications that it is on are turned off and only certain elemental components are kept powered for different reasons even though the device appears to be off. For instance, home stereos, televisions, cable/satellite boxes, VCR/DVD players, etc. are just a few examples of devices that remain in standby. This is how your cable and satellite boxes receive software updates and transmit PPV subscription information back to the service provider. And let's not even mention your computer; thanks to standby mode we can now setup our computers so that they can be powered on via a dialup modem or even through the Internet. On cell phones it is possible to have preset alarms that go off even if the phone is powered off. Obviously, the date and time must be kept running for this to happen which means the phone's clock is still on while the phone is apparently powered off. In addition, you need some software and hardware running to actually tell the rest of the phone to turn on when the alarm time arrives. I am not sure this is how the OTA arrives since prior to the OTA the phone has no Tx/Rx capability when powered off. The OTA would get programmed on the network so that whenever the phone is powered on it will download its instructions automatically so that the next time the user powers it off it will then maintain its Tx/Rx capabilities active fooling the user into believing the phone is powered off. But now that they published this article, a savvy user who can read this will get smart and remove the battery. Good idea....but that could still be useless if the OTA instructs the phone to remain active making the user believe the phone is in Airplane mode.
Very cool, I for one will give the FBI a big hi five and hope they keep up the good work, keep the bad guys on their toes!!!!
The above statement leads me to believe that it would actually be essentially turning on a muted speaker phone while the phone is on but not in use versus actually using the TX/RX capabilities when the phone is powered off.
I think turning on this capability will certainly make batteries run out much quicker than usual, unless the FBI can selectively turn on/off the microphones whenever they want. Let's not forget that the phone's transmitter also must be active to send the sound captured by the microphone. If the battery runs out quicker than usual, the user will probably realize there's something wrong immediately. But who knows? there are other ways I can think of the FBI can do this. How about instructing the phone to merely record conversations into its built-in memory and then automatically transmit those conversations later on when the phone is back on or on a set schedule? This way they can obtain conversations even if the user goes into a basement where there's no signal! and let's not forget that the phones can triangulate its position or use A-GPS and then transmit that location information along the recording and sugar-coat it with a timestamp!
There is one other way that they can do it to (I've seen it personally), the battery itself has a bug planted in it so the "phone doesn't have to be powered up.