Fourth Amendment smart phones can help the JBTs send you to prison

Discussion in 'Bill of Rights' started by CATO, Mar 3, 2013.

  1. kellory

    kellory An unemployed Jester, is nobody's fool. Banned

    It doesn't matter what you use. As much as what they can use of your phone by remote. I know that 911gps can not be turned off. But I believe it is only active when the phone is turned on.
  2. brandonnash

    brandonnash Monkey

    I would imagine it would be worse since its more cloud based. They run the same sort of system as on PCs now. At least the base system of android is different. Still, you should be aware of any apps that have location features turned on.
  3. kellory

    kellory An unemployed Jester, is nobody's fool. Banned

    Such as Google maps, latitute, gas Buddy. Ect
  4. BTPost

    BTPost Stumpy Old Fart Snow Monkey Moderator

    Just a NOTE, here on ANY Cloud type OFFSITE Storage System... Your Personal Information is available to ALL FISA Agencies from Cloud based Storage, on Demand... OpSec says, this is A VERY BAD Policy, for anyone who cares about their Personal Privacy.... Just Say'n....
  5. DMGoddess

    DMGoddess Monkey+++

    Right, I'll check and turn of location information.
  6. DMGoddess

    DMGoddess Monkey+++

    Wonderful, well, I don't do much on it beyond weather and phone calls.
  7. melbo

    melbo Hunter Gatherer Administrator Founding Member

    That's why they drop them into Faraday bags upon seizure - can't have a remote wipe when you're trying to snoop
    Home page
  8. BTPost

    BTPost Stumpy Old Fart Snow Monkey Moderator

    Ah, but they have to take them out of the "Bag" to work with them, and the second they do so, and turn them on, they register with the local Cellsite, or WiFi Hotspot, and "Poof" they get Reset.... The only way around that is to do ALL the Work, in a Screen Room, and there are very FEW of those around, in Forensic Labs...
  9. -06

    -06 Monkey+++

    Big brother is taking big steps---George Orwell was a genius.
  10. -06

    -06 Monkey+++

    If I was a crook why would I use registered phones or even one?
    melbo likes this.
  11. melbo

    melbo Hunter Gatherer Administrator Founding Member

    Those bags allow work through them while protected. They even have a protected cord sleeve that allows a USB snooping cable to be inserted. Once the device is protected in that bag, I don't think you'll have a chance to remote wipe it.
  12. melbo

    melbo Hunter Gatherer Administrator Founding Member

    That's the problem with hard line privacy stances: I'm not a crook but don't like the idea of anyone snooping through my stuff.
  13. VisuTrac

    VisuTrac Ваша мать носит военные ботинки Site Supporter+++

    I still like my 1K solution. as in degrees F.
  14. CaboWabo5150

    CaboWabo5150 Lost in the woods

    I could be wrong, but I'm pretty sure it doesn't matter if they get physical possession or not. The only thing that would get them that they couldn't just get from your cell provider is any pictures that you took with it and haven't sent or emails or texts that have not yet been sent. Anything that has passed through a cell tower has been stored - for at least some period of time. I don't know if it's a short period ( 6 months or less ) or if they are storing the information ( emails, texts, location data ) permanently these days. What they admit to and what they actually do are never the same. Especially where .GOV is involved.

    Cellular provider data storage info from 2011...
  15. CATO

    CATO Monkey+++

    No need for possession . . . .

    Privacy Scandal: NSA Can Spy on Smart Phone Data - SPIEGEL ONLINE

    NSA Can Spy on Smart Phone Data
    SPIEGEL has learned from internal NSA documents that the US intelligence agency has the capability of tapping user data from the iPhone, devices using Android as well as BlackBerry, a system previously believed to be highly secure.

    The United States' National Security Agency intelligence-gathering operation is capable of accessing user data from smart phones from all leading manufacturers. Top secret NSA documents that SPIEGEL has seen explicitly note that the NSA can tap into such information on Apple iPhones, BlackBerry devices and Google's Android mobile operating system.

    The documents state that it is possible for the NSA to tap most sensitive data held on these smart phones, including contact lists, SMS traffic, notes and location information about where a user has been.

    The documents also indicate that the NSA has set up specific working groups to deal with each operating system, with the goal of gaining secret access to the data held on the phones.

    In the internal documents, experts boast about successful access to iPhone data in instances where the NSA is able to infiltrate the computer a person uses to sync their iPhone. Mini-programs, so-called "scripts," then enable additional access to at least 38 iPhone features.

    The documents suggest the intelligence specialists have also had similar success in hacking into BlackBerrys. A 2009 NSA document states that it can "see and read SMS traffic." It also notes there was a period in 2009 when the NSA was temporarily unable to access BlackBerry devices. After the Canadian company acquired another firm the same year, it changed the way in compresses its data. But in March 2010, the department responsible at Britain's GCHQ intelligence agency declared in a top secret document it had regained access to BlackBerry data and celebrated with the word, "champagne!"

    The documents also state that the NSA has succeeded in accessing the BlackBerry mail system, which is known to be very secure. This could mark a huge setback for the company, which has always claimed that its mail system is uncrackable.

    In response to questions from SPIEGEL, BlackBerry officials stated, "It is not for us to comment on media reports regarding alleged government surveillance of telecommunications traffic." The company said it had not programmed a "'back door' pipeline to our platform."

    The material viewed by SPIEGEL suggests that the spying on smart phones has not been a mass phenomenon. It has been targeted, in some cases in an individually tailored manner and without the knowledge of the smart phone companies.

    Correction: The original version of this news story was adapted from a SPIEGEL press release on Saturday that did not include information attributing the March 2010 document cited in the original to Britain's GCHQ intelligence agency. This important information has been added, and the full English version of the article has since been posted online.

  16. -06

    -06 Monkey+++

    Wonder what George Orwell (1984) would think about the world today? Remember "double talk" and war is peace/peace is war?
    AmericanRedoubt1776 likes this.
  17. melbo

    melbo Hunter Gatherer Administrator Founding Member

    We need a 'dislike' button
  18. -06

    -06 Monkey+++

    We need fewer idiots pushing party line buttons in the voting booths. We had 300 dead people voting in the last election.
    AmericanRedoubt1776 likes this.
  19. VisuTrac

    VisuTrac Ваша мать носит военные ботинки Site Supporter+++

    The iPhone5S: $299 for 32GB, $399 for 64GB, cost of creating an international fingerprint database? Priceless.

    I think the NSA is going to love this new phone.

    Wonder when the DNA sampling app is going to appear?
    AmericanRedoubt1776 likes this.
  20. CATO

    CATO Monkey+++


    NSA calls iPhone users ‘zombies’ and Steve Jobs ‘Big Brother’ | VentureBeat

    NSA calls iPhone users ‘zombies’ and Steve Jobs ‘Big Brother’
    September 9, 2013 10:50 AM
    John Koetsier

    Nov. 12 - 13, 2013
    San Francisco, CA
    Tickets On Sale Now
    Steve Jobs is Big Brother, and all the iPhone-buying public are just zombies, according to internal NSA documents detailing what the agency has been working on in terms of cracking smartphones and extracting personal information, social connections, location information, and more.

    Don’t worry, Android fans, you’re on the target list too.

    According tofresh documentsfrom super-leaker Edward Snowden, the NSA targeted smartphones as a massive windfall of sensitive data that new device users were creating, storing, and ultimately unwittingly sharing with the U.S. spy agency that has been embroiled in controversy ever since Snowden first started leaking details aboutPrismandXKeyScoreand other secretive government agency spy technologies.

    Here’s “big brother,” according to one leaked NSA presentation:

    Steven Jobs as Big Brother, according to the NSA

    And, Apple’s paying customers were seen in the eyes of the NSA as idiotic willing participants in their own downfall. One slide in the NSA presentation identifies them derogatorily as “zombies:”

    image-541976-galleryv9-tixi. According to the leaked documents, the NSA started working on ways to crack smartphones — including the supposedly secure BlackBerry and Android — basically as soon as the smartphone revolution kicked into high gear five years ago. By cracking mobile operating systems and eavesdropping on mobile communications, the NSA has acquired private and sensitive images and data, such as a iPhone picture of a foreign government official who took selfies while watching TV, and a picture of an unknown man, apparently an Afghani fighter, in the mountains of Afghanistan.

    And remember iPhone’s location bug? That enabled tracking of people over extended periods of time before being fixed by Apple in mid 2011.

    If BlackBerry and iOS have had the NSA’s full attention, global leader Android, which isparticularly strong in Asia, Africa, Eastern Europe, and South America, is not far behind. Special teams of NSA agents began intensively examining Google’s mobile operating system in 2010, according to the documents. Perhaps the NSA will label those users droids.

    Land of the free and the home of the brave? Our tax dollars at work.

    One the one hand I’m almost glad that Steve Jobs is not alive to see how he’s been portrayed, and to see how the company he founded and the tools he created to build and extend human capability are being used to control and spy and invade privacy. On the other hand I wish Jobs was alive, because he would certainly do something at Apple to at least make it harder for the NSA to treat Apple’s customers as their own private data cash cows.
    Yard Dart likes this.
survivalmonkey SSL seal warrant canary