wiretap

Latest

  • Show floor video: Ambrosia Software talks apps and games

    by 
    Victor Agreda Jr
    Victor Agreda Jr
    01.24.2008

    Mike spoke to Ambrosia Software founder Andrew Welch about their newest app, WireTap Studio. Andrew gave us a few clues as to what to expect in the next version of Snapz Pro, and had a little criticism for Apple regarding games on the Mac.Also available on: YouTube, Metacafe, DailyMotion, Blip.tv and Crackle

  • Rootkit hack taps Greek prime minister's phone

    by 
    Joshua Topolsky
    Joshua Topolsky
    07.13.2007

    In 2005, Greek authorities discovered a plot hatched and executed by unknown sources which allowed the tapping of wireless phones on the Vodafone network belonging to the country's Prime Minister and other top officials, making it one of the furthest reaching covert infiltrations of a government in history. A recent report from IEEE Spectrum shows that the tap was made possible by a 6,500 line piece of code called a rootkit, the first-ever to be embedded in a phone switch's OS. The complex hack took advantage of aging phone systems by disabling transaction logs on calls and allowing call monitoring on four switches within the teleco's computers, thus sending the call to another phone for monitoring (similar to a legal wiretap). The spies covered their tracks by creating patches on the system which routed the calls around logging software which would have alerted admins, and were only discovered when they tried to update their software. The case clearly exposes holes in call security amongst providers (due largely in part to outdated systems), and suggests the possibility that this kind of thing could easily happen again... to you![Via textually]

  • Korean carriers to offer anti-eavesdropping service

    by 
    Darren Murph
    Darren Murph
    01.16.2007

    Just as Japan announces that it'll pretty much have an eye on every single cellphone user in the nation, Korea is going against the grain somewhat by offering up an anti-eavesdropping service on users' handsets. SK Telecom, KTF, and LG Telecom will all be offering private long code service, a digital encryption system to keep voice snoopers at bay, and will dub the service "Voice Private." Marketed primarily towards people of utmost importance, such as politicians, public officials, journalists (ahem), and CEOs, the luxury will purportedly operate on any mobile phone and will cost between W1,500 ($1.60) and W2,000 ($2.13). Interestingly, it wasn't noted if these fees were a monthly charge (less likely) or a per-call exaction (more likely), but regardless, the service should go live just as soon as the Ministry of Information and Communication approves it.

  • FBI taps cellphone mics to eavesdrop on criminals

    by 
    Darren Murph
    Darren Murph
    12.03.2006

    While we figured the NYPD could just install Magic Message Mirrors in every mafia hotspot in the Manhattan area, the Genovese family has proven quite the eagle-eyed bunch when it comes to spotting wiretaps, tailing, and other (failed) attempts of bugging their conversations. In order to tap into critical conversations by known mafioso and other, less glamorous criminals, police are utilizing a "roving bug" technique which remotely activates the microphone of a crime lord's cellie, giving the boys in blue convenient access to their secret agenda(s). The presumably controversial tapping was recently approved by top US DoJ officials "for use against members of a New York organized crime family who were wary of conventional surveillance techniques." Software hacks (and actual phones, too) have previously allowed such dodgy eavesdropping to occur, with "Nextel, Samsung, and Motorola" handsets proving particularly vulnerable, but this widespread approach in tracking down criminal conversations could hopefully pinpoint future targets where prior attempts failed. Of course, if mafia members hit the internet every now and then, they're probably removing those batteries right about now anyway.

  • VoIP wiretapping required, deal sealed

    by 
    Ryan Block
    Ryan Block
    06.10.2006

    When we last checked in, the FCC had given the ok on wiretapping commercial VoIP providers; this decision, of course, went straight to appeals, as we'd hope and expect. We're sorry to report, however, the case which  appeared before the Court of Appeals for the District of Columbia Circuit has officially been settled upon, and it's been decided that we'll continue to live under the provisions outlined in the Communications Assistance for Law Enforcement Act (CALEA). As upheld in a 2-to-1 decision, companies like Vonage and Skype would have to open up to authorized government intrusion, the same as any landline phone provider -- private networks (like those on college campuses), however, will theoretically remain legally secure from the wiretaps. Kind of a bummer, but we're not gonna lose too much sleep over this one; we all know how easy it is to secure P2P VoIP, and really the law's only effectively leveling consumer landline VoIP with analog landline telephony and cellphone calling with regard to wiretaps, so it's almost more about upholding status quo than breaching civil liberties. So, everybody know how to create an SSH tunnel yet?