29 avril 2017 par maty185
How The CIA Can Send A Drone After Any Mobile Phone
New revelations from the CIA’s killer UAV program show how the agency is able to lock Predator drones on targets through their mobile phones–even after they have turned their phones off.
By: Neal Ungerleider
Since 2001, armed Predator drones have been used by the CIA in many foreign nations to attack individuals on the ground. There’s a new revelation about them, too: In some cases, the NSA helped the CIA find targets by locking onto their powered-off mobile phones. Even when phones have their batteries removed, it appears the NSA still has the ability to locate them.
Buried inside a Washington Post story by Dana Priest is the following tidbit: http://www.washingtonpost.com/world/national-security/nsa-growth-fueled-by-need-to-target-terrorists/2013/07/21/24c93cf4-f0b1-11e2-bed3-b9b6fe264871_story.html
By September 2004, a new NSA technique enabled the agency to find cellphones even when they were turned off. JSOC troops called this « The Find, » and it gave them thousands of new targets, including members of a burgeoning al-Qaeda-sponsored insurgency in Iraq, according to members of the unit.
At the same time, the NSA developed a new computer linkup called the Real Time Regional Gateway into which the military and intelligence officers could feed every bit of data or seized documents and get back a phone number or list of potential targets. It also allowed commanders to see, on a screen, every type of surveillance available in a given territory.
« The Find, » the Post article says, is run by a team in the basement of the NSA’s headquarters whose job is to track the location of mobile phones in real time. Because many phones have chips that stay on even after a battery has been removed, tracking powered-down phones is within the realm of possibility.
The revelations fit right in with the Edward Snowden disclosures http://www.fastcompany.com/3012556/the-code-war/how-the-nsa-monitors-americas-phone-traffic , but the NSA isn’t the only one tracking phones: Other government agencies and private companies regularly track them without warrants or court orders as well. http://www.fastcompany.com/1777443/using-cell-phone-tracking-data-pinpoint-relief-after-disasters
***Why Snowden Asked Visitors in Hong Kong to Refrigerate Their Phones
By HEATHER MURPHY
« Blocking data transmission, of course, is a different issue from muffling audio. Although a thick refrigerator door is good at masking sound (as anyone who has lost a cat inside one knows), soundproofing is not necessarily integral to its design. An ideal refrigerator for a person on the run would be one that functioned as an acoustic anechoic chamber — a sort of Faraday cage for sound — meaning that not one hint of a syllable could make it from the Pepsi-laden kitchen table to the phone in the veggie crisper. Given that refrigerators’ insulation levels vary, however, from an audio perspective, burying the phone in a pile of clothes one room over, Mr. Harvey suggested, might be a more reliable solution for someone seeking to subvert prying ears.
Those new to these issues are most likely asking the question – why not just ask everyone to turn off his phone and remove the batteries? Beyond the fact that many phones these days do not easily enable battery removal, identifying a pure off is complicated.
“A lot of modern devices (not just phones) do have states that are somewhere in between fully on and fully off, where some circuits
are powered up and others are powered down,” Seth Schoen, senior staff technologist at the Electronic Frontier Foundation, a civil liberties group that focuses on rights in the online world, explained by e-mail. (Snowden appears to be a supporter of the organization, as he was photographed with an E.F.F. sticker on his laptop.) “These modes often allow the device to wake up autonomously if certain conditions are met, such as pressing a certain key or even receiving certain data over the Internet on a wired Ethernet connection (known as ‘wake-on-LAN’).”
Battery removal can be equally deceptive. Even once one figures out how to extract the primary battery, there may be additional power sources within the apparatus. “Some phones use an additional battery for memory management; it’s unclear whether this battery could be used by logging and/or tracking systems such as Carrier IQ,” Mr. Harvey explained, referring to software that monitors mobile phone users. http://thelede.blogs.nytimes.com/2013/06/25/why-snowdens-visitors-put-their-phones-in-the-fridge/?_r=1
Video satirique des gars de Joy Camp: http://www.youtube.com/watch?v=fst7j_VjPds