Go Back  PPRuNe Forums > PPRuNe Social > Jet Blast
Reload this Page >

Be careful using your smartphone: the devil may be listening!

Jet Blast Topics that don't fit the other forums. Rules of Engagement apply.

Be careful using your smartphone: the devil may be listening!

Reply

Old 9th Jan 2019, 00:46
  #1 (permalink)  
Thread Starter
 
Join Date: Oct 2003
Location: Canada
Posts: 1,843
Be careful using your smartphone: the devil may be listening!

https://www.bbc.com/news/blogs-trending-46794556
rotornut is offline  
Reply With Quote
Old 9th Jan 2019, 01:12
  #2 (permalink)  
 
Join Date: May 2004
Location: Москва/Ташкент
Age: 49
Posts: 756
I spent some time with some software called IDA PRO reverse engineering the Qualcomm Hexagon baseband on Android devices..... spent many months churning through a lot of undocumented code in my spare time (yes, I am pretty sad before you ask, ask Mrs Flash or little flash).

My contention was that when your smartphone is inactive (with power) and camped on a cell (i.e. in an unused state) I'd take a damned good educated guess the baseband could be flipped (remotely) to take audio/video without user intervention (subsystem privileged paths lead from these sensors to the baseband without AOSP getting in the way) when your device is inactive, I sort of lost interest and other work commitments came up, but I still reckon this may well be the case, one day soon I may very well return to it.

It may not be the devil listening (or watching), but GCHQ or the NSA certainly may very well be ))
flash8 is offline  
Reply With Quote
Old 9th Jan 2019, 09:57
  #3 (permalink)  
Gnome de PPRuNe
 
Join Date: Jan 2002
Location: Too close to Croydon for comfort
Age: 54
Posts: 5,062
I thought antichrist was spelt f a c e b o o k, so I think he is on to something there.
treadigraph is offline  
Reply With Quote
Old 9th Jan 2019, 10:23
  #4 (permalink)  
 
Join Date: Oct 2002
Location: West Wiltshire, UK
Age: 66
Posts: 369
I witnessed a demonstration by an pretty good IT chap showing how it was relatively easy to activate the mic on a smartphone without the user being aware. It was part of a demonstration to show how insecure some devices were and why we (as in the government) should exercise caution when seeking to adopt new technology. If we had the ability to do this ten years ago, then I don't doubt that every other major state also knows how to do it.
VP959 is online now  
Reply With Quote
Old 9th Jan 2019, 12:14
  #5 (permalink)  
 
Join Date: Nov 2008
Location: Darkest Surrey
Posts: 5,212
If they can activate your Mic they can also activate your camera.

I think the Patriarch calls it correctly even though many will disagree. People rely on their devices for news or what purports to be news.

We have seen Social media being used to forment unrest be it Tunisia, London riots 2011 and lots of other examples. Now this is against a Government or Establishment. It doesn't require a huge move from it being used for that to being switched and used against a group of people.

Rwanda 1990's the media was used to forment genocide against people, these days just use social media to spark the outrage and fan the flames.
racedo is online now  
Reply With Quote
Old 9th Jan 2019, 13:25
  #6 (permalink)  
 
Join Date: Aug 1999
Location: In the pension queue, Lancashire, UK
Age: 75
Posts: 206
It may not be the devil listening (or watching), but GCHQ or the NSA certainly may very well be ))
I acquired a new phone a few months ago - a Huawei. It's very good but a bit slow as all the calls are routed via Beijing.

GG
Groundgripper is offline  
Reply With Quote
Old 9th Jan 2019, 13:54
  #7 (permalink)  
 
Join Date: May 2004
Location: Москва/Ташкент
Age: 49
Posts: 756
Actually didn't want to imply it was just GCHQ and the NSA, likely all states of course, and I am talking about monitoring the device whilst no calls are active (i.e. could be sitting on your desk).

As for "tapping" active calls I'd safely assume *all* your voice/data traffic is meta-analysed at best, additionally neural processing of closed loops etc that allows apparently disparate relationships between third-parties to be made (i.e. Joe (on a cheap Gizitron 1234) calls Fred today who two years ago called Ahmad in FarAwayLand who made a call to the UK six months ago to an individual who was in close physical contact to Joe in Manchester and also was using a Giztron 1234 mobile that was network initialised around the same time as Joe's) - I made that one up on the fly and can think of far more complex node/edge analysis that they likely perform.

Once that connection is made (with Metadata) expect all traffic to be deeply scrutinised... but for the most part your call is likely just processed in an abstract way until some interesting pattern is detected.

You know why IMEI* changing was outlawed in the late 90's with heavy draconian sentences? Most thought it was to prevent the proliferation of stolen phones (unlikely for various reasons), I thought so too at the time (gullible). I now suspect (90%+ confidence) that it was because it would screw up state surveillance of mobiles big-time (the whole show depends on IMEI and to a lesser extent IMSI).

*Think of this in a simple way as the phones serial number.
flash8 is offline  
Reply With Quote
Old 9th Jan 2019, 18:19
  #8 (permalink)  
 
Join Date: Nov 2008
Location: Darkest Surrey
Posts: 5,212
Originally Posted by flash8 View Post
You know why IMEI* changing was outlawed in the late 90's with heavy draconian sentences? Most thought it was to prevent the proliferation of stolen phones (unlikely for various reasons), I thought so too at the time (gullible). I now suspect (90%+ confidence) that it was because it would screw up state surveillance of mobiles big-time (the whole show depends on IMEI and to a lesser extent IMSI).

*Think of this in a simple way as the phones serial number.
MS didn't buy Skype because it was good business, getting access to it meant lots of new "targets".
racedo is online now  
Reply With Quote
Old 10th Jan 2019, 08:48
  #9 (permalink)  
Paid...Persona Grata
 
Join Date: Aug 2004
Location: Between BHX and EMA
Age: 73
Posts: 235
Looks like 1984 is coming, about 40 years later than predicted.
UniFoxOs is offline  
Reply With Quote
Old 10th Jan 2019, 09:01
  #10 (permalink)  
 
Join Date: May 2012
Location: Moscow region
Age: 60
Posts: 478
Originally Posted by UniFoxOs View Post
Looks like 1984 is coming, about 40 years later than predicted.
Orwell has already come, now the question is how soon will Bradbury arrive with his 451F ?
A_Van is offline  
Reply With Quote
Old 10th Jan 2019, 09:25
  #11 (permalink)  
 
Join Date: Apr 1998
Location: Mesopotamos
Posts: 1,132
"expect all traffic to be deeply scrutinised" - You forgot to add - forever!
AI is the tool used for troweling through lots of data, and as algorithms change the data is often reprocessed and will never go away.

My post will probably get flagged for saying this, but as many already know, the phone network was by design built to also spy on its users by "authorised" personnel. Having worked for the telcos twice I harbour a very low opinion of what those retards get up to.
cattletruck is offline  
Reply With Quote

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are Off
Pingbacks are Off
Refbacks are Off


Thread Tools
Search this Thread

Contact Us Archive Advertising Cookie Policy Privacy Statement Terms of Service