Cell Phone Surveillance
   HOME

TheInfoList



OR:

Cellphone surveillance (also known as cellphone spying) may involve tracking,
bugging A covert listening device, more commonly known as a bug or a wire, is usually a combination of a miniature radio transmitter with a microphone. The use of bugs, called bugging, or wiretapping is a common technique in surveillance, espionage and ...
, monitoring,
eavesdropping Eavesdropping is the act of secretly or stealthily listening to the private conversation or communications of others without their consent in order to gather information. Etymology The verb ''eavesdrop'' is a back-formation from the noun ''eave ...
, and recording conversations and text messages on
mobile phone A mobile phone or cell phone is a portable telephone that allows users to make and receive calls over a radio frequency link while moving within a designated telephone service area, unlike fixed-location phones ( landline phones). This rad ...
s. It also encompasses the monitoring of people's movements, which can be tracked using mobile phone signals when phones are turned on.


Mass cellphone surveillance


Stingray devices

StingRay devices are a technology that mimics a cellphone tower, causing nearby cellphones to connect and pass data through them instead of legitimate towers. This process is invisible to the end-user and allows the device operator full access to any communicated data. They are also capable of capturing information from phones of bystanders. This technology is a form of
man-in-the-middle attack In cryptography and computer security, a man-in-the-middle (MITM) attack, or on-path attack, is a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communi ...
. StingRays are used by law enforcement agencies to track people's movements, and intercept and record conversations, names, phone numbers and text messages from mobile phones. Their use entails the monitoring and collection of data from all mobile phones within a target area. Law enforcement agencies in
Northern California Northern California (commonly shortened to NorCal) is a geocultural region that comprises the northern portion of the U.S. state of California, spanning the northernmost 48 of the state's List of counties in California, 58 counties. Northern Ca ...
that have purchased StingRay devices include the
Oakland Police Department The Oakland Police Department (OPD) is a law enforcement agency responsible for policing the city of Oakland, California, United States. As of May 2021, the department employed 709 sworn officers and 371 civilian employees. The department is div ...
,
San Francisco Police Department The San Francisco Police Department (SFPD) is the Municipal police, municipal law enforcement agency of the San Francisco, City and County of San Francisco, as well as San Francisco International Airport in San Mateo County, California, San Ma ...
,
Sacramento County Sheriff's Department The Sacramento County Sheriff's Office (SSO), is a local law enforcement agency that serves Sacramento County, California. It provides general-service law enforcement to unincorporated areas of Sacramento County, as well as incorporated cities ...
,
San Jose Police Department The San Jose Police Department (SJPD) is the police agency for San Jose, California. The San Jose Police Department is led by Chief of Police Paul Joseph. The department makes its calls for service available to the public; it is the first Am ...
and Fremont Police Department. The Fremont Police Department's use of a StingRay device is in a partnership with the Oakland Police Department and Alameda County District Attorney's Office.
End-to-end encryption End-to-end encryption (E2EE) is a method of implementing a secure communication system where only communicating users can participate. No one else, including the system provider, telecom providers, Internet providers or malicious actors, can ...
such as
Signal A signal is both the process and the result of transmission of data over some media accomplished by embedding some variation. Signals are important in multiple subject fields including signal processing, information theory and biology. In ...
protects message and call traffic against StingRay devices using
cryptographic Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or '' -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adversarial behavior. More gen ...
strategies.


Dirtbox (DRT box)

Dirtbox is a technology similar to Stingrays that are usually mounted on aerial vehicles that can mimic
cell site A cell site, cell phone tower, cell base tower, or cellular base station is a cellular frequencies, cellular-enabled mobile device site where antenna (electronics), antennas and electronic communications equipment are placed (typically on a Rad ...
s and also jam signals. The device uses an
IMSI-catcher An international mobile subscriber identity (IMSI) catcher is a telephone eavesdropping device used for intercepting mobile phone traffic and tracking location data of mobile phone users. Essentially a "fake" mobile tower acting between the targ ...
and is claimed to be able to bypass cryptographic encryption by getting IMSI numbers and ESNs (
electronic serial number Electronic serial numbers (ESNs) were created by the U.S. Federal Communications Commission (FCC) to uniquely identify mobile devices, from the days of Advanced Mobile Phone System, AMPS in the United States starting in the early 1980s. The adminis ...
s).


Tower dumps

A tower dump is the sharing of identifying information by a
cell tower A cell site, cell phone tower, cell base tower, or cellular base station is a cellular-enabled mobile device site where antennas and electronic communications equipment are placed (typically on a radio mast, tower, or other raised structure) ...
operator, which can be used to identify where a given individual was at a certain time. As mobile phone users move, their devices will connect to nearby cell towers in order to maintain a strong signal even while the phone is not actively in use. These towers record identifying information about cellphones connected to them which then can be used to track individuals. In most of the United States, police can get many kinds of cellphone data without obtaining a warrant. Law-enforcement records show police can use initial data from a tower dump to ask for another court order for more information, including addresses, billing records and logs of calls, texts and locations.


Targeted surveillance


Software vulnerabilities

Cellphone bugs can be created by disabling the ringing feature on a mobile phone, allowing a caller to call a phone to access its microphone and listening. One example of this was the group FaceTime bug. This bug enables people to eavesdrop on conversations without calls being answered by the recipient. In the United States, the
FBI The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
has used "roving bugs", which entails the activation of microphones on mobile phones to the monitoring of conversations.


Cellphone spying software

Cellphone spying software is a type of cellphone bugging, tracking, and monitoring software that is surreptitiously installed on mobile phones. This software can enable conversations to be heard and recorded from phones upon which it is installed. Cellphone spying software can be downloaded onto cellphones. Cellphone spying software enables the monitoring or
stalking Stalking is unwanted and/or repeated surveillance or contact by an individual or group toward another person. Stalking behaviors are interrelated to harassment and intimidation and may include following the victim in person or monitorin ...
of a target cellphone from a remote location with some of the following techniques:News report
WTHR WTHR (channel 13) is a television station in Indianapolis, Indiana, United States, affiliated with NBC. It is owned by Tegna Inc. alongside low-power broadcasting#Television, low-power, Class A television service, Class A MeTV affiliate WALV-CD ( ...
News. (YouTube video)
* Allowing remote observation of the target cellphone position in real-time on a map * Remotely enabling microphones to capture and forward conversations. Microphones can be activated during a call or when the phone is on standby for capturing conversations near the cellphone. * Receiving remote alerts and/or text messages each time somebody dials a number on the cellphone * Remotely reading text messages and call logs Cellphone spying software can enable microphones on mobile phones when phones are not being used, and can be installed by mobile providers.


Bugging

Intentionally hiding a cell phone in a location is a bugging technique. Some hidden cellphone bugs rely on
Wi-Fi Wi-Fi () is a family of wireless network protocols based on the IEEE 802.11 family of standards, which are commonly used for Wireless LAN, local area networking of devices and Internet access, allowing nearby digital devices to exchange data by ...
hotspots Hotspot, Hot Spot or Hot spot may refer to: Places * Hot Spot, Kentucky, a community in the United States Arts, entertainment, and media Fictional entities * Hot Spot (comics), a name for the DC Comics character Isaiah Crockett * Hot Spot (Tr ...
, rather than cellular data, where the tracker
rootkit A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the exist ...
software periodically "wakes up" and signs into a public Wi-Fi hotspot to upload tracker data onto a public internet server.


Lawful interception

Governments may sometimes legally monitor mobile phone communications - a procedure known as lawful interception. In the United States, the government pays phone companies directly to record and collect cellular communications from specified individuals. U.S.
law enforcement agencies A law enforcement agency (LEA) is any government agency responsible for law enforcement within a specific jurisdiction through the employment and deployment of law enforcement officers and their resources. The most common type of law enforcement ...
can also legally track the movements of people from their mobile phone signals upon obtaining a court order to do so.


Real-time location data

In 2018, United States cellphone carriers that sell customers' real-time location data -
AT&T AT&T Inc., an abbreviation for its predecessor's former name, the American Telephone and Telegraph Company, is an American multinational telecommunications holding company headquartered at Whitacre Tower in Downtown Dallas, Texas. It is the w ...
,
Verizon Verizon Communications Inc. ( ), is an American telecommunications company headquartered in New York City. It is the world's second-largest telecommunications company by revenue and its mobile network is the largest wireless carrier in the ...
,
T-Mobile T-Mobile is the brand of telecommunications by Deutsche Telekom Deutsche Telekom AG (, ; often just Telekom, DTAG or DT; stylised as ·T·) is a partially state-owned German telecommunications company headquartered in Bonn and the largest telec ...
, and Sprint- publicly stated they would cease those data sales because the
FCC The Federal Communications Commission (FCC) is an independent agency of the United States government that regulates communications by radio, television, wire, internet, wi-fi, satellite, and cable across the United States. The FCC maintains ju ...
found the companies had been negligent in protecting the personal privacy of their customers' data. Location aggregators, bounty hunters, and others including law enforcement agencies that did not obtain search warrants used that information. FCC Chairman
Ajit Pai Ajit Varadaraj Pai (; born January 10, 1973) is an American lawyer who served as chairman of the Federal Communications Commission (FCC) from 2017 to 2021. He became a partner at the private-equity firm Searchlight Capital in April 2021. He bec ...
concluded that carriers had apparently violated federal law. However, in 2019, the carriers were continuing to sell real-time location data. In late February 2020, the FCC was seeking fines on the carriers in the case.


Occurrences

In 2005, the
prime minister of Greece The prime minister of the Hellenic Republic (), usually referred to as the prime minister of Greece (), is the head of government of the Greece, Hellenic Republic and the leader of the Cabinet of Greece, Greek Cabinet. The officeholder's of ...
was advised that his, over 100 dignitaries', and the mayor of Athens' mobile phones were bugged.
Kostas Tsalikidis Kostas or Costas () is a Greek given name and surname. As a given name, it can be a hypocorism for Konstantinos (Constantine). Given name * Costas Andreou, Greek musician * Kostas Antetokounmpo (born 1997), Greek basketball player * Costas Azari ...
, a Vodafone-Panafon employee, was implicated in the matter as using his position as head of the company's network planning to assist in the bugging. Tsalikidis was found hanged in his apartment the day before the leaders were notified about the bugging, which was reported as "an apparent suicide." Security holes within
Signalling System No. 7 Signalling System No. 7 (SS7) is a set of telephony signaling protocols developed in the 1970s that is used to setup and teardown telephone calls on most parts of the global public switched telephone network (PSTN). The protocol also performs ...
(SS7), called Common Channel Signalling System 7 (CCSS7) in the US and Common Channel Interoffice Signaling 7 (CCIS7) in the UK, were demonstrated at
Chaos Communication Congress The Chaos Communication Congress is an annual hacker conference organized by the Chaos Computer Club. The congress features a variety of lectures and workshops on technical and political issues related to security, cryptography, privacy and ...
, Hamburg in 2014. During the
coronavirus Coronaviruses are a group of related RNA viruses that cause diseases in mammals and birds. In humans and birds, they cause respiratory tract infections that can range from mild to lethal. Mild illnesses in humans include some cases of the comm ...
pandemic
Israel Israel, officially the State of Israel, is a country in West Asia. It Borders of Israel, shares borders with Lebanon to the north, Syria to the north-east, Jordan to the east, Egypt to the south-west, and the Mediterranean Sea to the west. Isr ...
authorized its internal security service,
Shin Bet The Israel Security Agency (ISA; , (GSS); ), better known by the Hebrew acronyms, acronyms Shabak (; ; ) or Shin Bet (from the abbreviation of , "Security Service"), is Israel's internal Security agency, security service. Its motto is "''Magen ...
, to use its access to historic cellphone metadata to engage in
location tracking A positioning system is a system for determining the position of an object in space. Positioning system technologies exist ranging from interplanetary coverage with meter accuracy to workspace and laboratory coverage with sub-millimeter accuracy. ...
of COVID-19 carriers.


Detection

Some indications of possible cellphone surveillance occurring may include a mobile phone waking up unexpectedly, using a lot of battery power when on idle or when not in use, hearing clicking or beeping sounds when conversations are occurring and the circuit board of the phone being warm despite the phone not being used. However, sophisticated surveillance methods can be completely invisible to the user and may be able to evade detection techniques currently employed by security researchers and ecosystem providers.


Prevention

Preventive measures against cellphone surveillance include not losing or allowing strangers to use a mobile phone and the utilization of an access password. Another technique would be turning off the phone and then also removing the battery when not in use. Jamming devices or a
Faraday cage A Faraday cage or Faraday shield is an enclosure used to block some electromagnetic fields. A Faraday shield may be formed by a continuous covering of conductive material, or in the case of a Faraday cage, by a mesh of such materials. Faraday cag ...
may also work, the latter obviating removal of the battery


See also

*
Bluesnarfing Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often between phones, desktops, laptops, and PDAs (personal digital assistant). This allows access to calendars, contact lists, email ...
* ''
Carpenter v. United States ''Carpenter v. United States'', , is a landmark United States Supreme Court case concerning the privacy of historical cell site location information (CSLI). The Court held that government entities violate the Fourth Amendment to the United State ...
'' * Carrier IQ * Cellphone jammer *
Cyber stalking Cyberstalking is the use of the Internet or other electronic means to stalking, stalk or harass an individual, group, or organization. It may include false accusations, defamation, slander and libel. It may also include Surveillance, monitoring ...
*
Mobile security Mobile security, or mobile device security, is the protection of smartphones, tablets, and laptops from threats associated with wireless computing. It has become increasingly important in mobile computing. The Information security, security of pe ...
*
Security switch A security switch is a hardware device designed to protect computers, laptops, smartphones and similar devices from unauthorized access or operation, distinct from a virtual security switch which offers software protection. Security switches shoul ...
*
Surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing, or directing. This can include observation from a distance by means of electronic equipment, such as ...
*
Telephone tapping Wiretapping, also known as wire tapping or telephone tapping, is the monitoring of telephone and Internet-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitoring connecti ...
*
Triggerfish (surveillance) Triggerfish describes a technology of cell phone phone tapping, interception and surveillance using a mobile cellular base station (microcell or picocell). The devices are also known as cell-site simulators or digital analyzers. Device capability ...
* Vault 7 *
Virtual private network Virtual private network (VPN) is a network architecture for virtually extending a private network (i.e. any computer network which is not the public Internet) across one or multiple other networks which are either untrusted (as they are not con ...
* Voice activated recorders


References

{{Portal bar, Telecommunication Cybercrime Cyberattacks Espionage Surveillance * Mobile phones