Being spied on? It may be easier than you think….

by | Aug 17, 2009 | jahlberg

Not for the paranoid, but you may want to read some of the easy ways people can watch you and your information. Many of the items on the list I was aware of but quite a few I was not and found them intriguing. Good thing I’m not paranoid.

I’ve always known there was a way to remotely access someones cell phone and turn it on for real time audio and even video (think CSI), but now I know it is true and I bet you do not even need to load software on it to work in many cases (they are all web based nowadays and always on and connected….).

—————————————
10 Ways Your Voice and Data Can Be Spied on

By Tim Greene

Mon, July 27, 2009 — Network World — Attackers seeking to do harm or mischief to networks work with an ever expanding arsenal of tools that sometimes seem to be the stuff of spy fiction, but they are all too real.

Here are 10 cloak-and-dagger ways, legal and illegal, to secretly tap into networks and computers to capture data and conversations.

1. Wireless keyboard eavesdropping: Remote-exploit.org has released an open source hardware design and accompanying software for a device that captures then decrypts signals from wireless keyboards. The device uses a wireless receiver that can be concealed in clothing or disguised as a common object that could be left on a desk near a PC to pick up signals.

Called Keykeriki, the technology targets 27MHz wireless keyboards to exploit insecurities that remote-expoit.org discovered earlier. The company plans to build and sell the hardware.

2. Wired keyboard eavesdropping: Electromagnetic pulses that keyboards make to signal what key is being hit travel through the grounding system of the keyboard and the computer itself as well as the ground for the electrical wiring in the building where the computer is plugged in.

Probes placed on the ground for the electric wiring can pick up these electromagnetic fluctuations, and they can be captured and translated into characters. The potential for this type of eavesdropping has been known for decades, and many experts believe spy agencies have refined techniques that make it practical. Andrea Barisani and Daniele Bianco, researchers for network security consultancy Inverse Path, are presenting their quick-and-dirty research on the topic at this year’s Black Hat USA conference in the hopes of sparking more public research of these techniques.

3. Laptop eavesdropping via lasers: Bouncing lasers off laptops and capturing the vibrations made as keys are struck give attackers enough data to deduce what is being typed. Each key makes a unique set of vibrations different from any other. The space bar makes an even more unique set, Barisani and Bianco say.

Language analysis software can help determine which set of vibrations correspond to which key, and if the attacker knows the language being used, the message can be exposed, they say.

4. Commercial keyloggers: Early keyloggers were devices attached in-line with keyboards, but they advanced to software tools that grab keystrokes and store or send them to an attack server. Commercial versions have the software loaded on memory sticks that can dump the software on a computer and then be reinserted later to download the collected data.

5. Cell phones as remotely activated bugs: Software loaded onto certain models of cell phones can silence the ringers and cut off the light displays that would normally be triggered when calls are made to them. The caller can then listen in on conversations in the room where the phone is located.

According to press reports, the FBI received court permission to use this technique to spy on suspected Mafia members in New York.

6. Cell phone SIM card compromise: If attackers can get possession of a cell phone briefly, they can use commercially available software to download and read SIM cards and their store of phone numbers, call logs, SMS messages, photos and so on.
For instance
PhoneFile Pro is software on a USB stick that claims to enable both the download and the display of the data.

7. Law enforcement wiretapping based on voice print: Phone company voice switches include software that can search all conversations going through it for voices that match sets of voiceprints. Whenever the switch makes a match, it can trigger a recording of the conversation and alert law enforcement officials, says James Atkinson, an expert in technical surveillance countermeasures.

The feature is designed to support communications assistance for law enforcement (CALEA) — the law that requires phone companies to provide wiretapping access under court order to specific communications traffic.

8. Remote capture of computer data: Under a sketchy technique called Computer and Internet Protocol Address Verifier (CIPAV), the FBI has remotely tracked down data about individual computers.

Details of the technology have never been publicly revealed, but they were used to track down high-school students who sent e-mail bomb threats. CIPAV grabs IP and MAC addresses, running processes, visited Web sites, versions of operating systems, registered owner and logging of computers the target computers connect to. It is believed the software that does this is dropped in via exploiting instant messaging.

9. Cable TV as an exploitable network: Because most cable TV networks are essentially hubbed, any node can monitor any other node’s traffic, says James Atkinson, an expert in technical surveillance countermeasures. By and large security is rudimentary and the encryption used could be hacked by someone with basic technical skills and readily available decryption tools, he says.

10. Cell phone monitoring: Commercially available software claims to capture cell phone conversations and texting. Attackers need to get physical access to the phone to upload the software that enables this.

There are several commercial brands on the market, but there are also online complaints that the software doesn’t work as advertised or is more complicated to use than the vendors let on.

—————–

 

 

 

 

John Ahlberg
CEO, Waident

CIO in the corporate world and now for Waident clients. John injects order and technology into business process to keep employees productive, enterprises running, and data safe.

Subscribe


Related posts

Why Backups And MFA Are So Important For Ransomware

Why Backups And MFA Are So Important For Ransomware

Two of the simplest and cheapest ways to protect your company from a ransomware attack are Multifactor Authentication and a fresh backup. Here's why.   Back up everything! You are not invulnerable. Catastrophicdata loss can happen to you - one worm or Trojanis...

3 Security Vulnerabilities You Don’t Realize You Have

3 Security Vulnerabilities You Don’t Realize You Have

These days security is not something you "should be doing someday". Security is something that is critical to your company and needs to be managed every day and updated regularly. If you need a place to start (it is never too late) you can focus on the Top 5 Security...

Documentation – Your IT “Canary in a Coal Mine”

Documentation – Your IT “Canary in a Coal Mine”

I consistently hear the same technology concerns from business owners and executives: they don’t know what they don’t know. Do they have the right IT team in place (internal or outsourced)? Do they have the optimal technology solutions for their business? How, they...

Subscribe to our blog!

Get our latest thinking to keep your people productive, your enterprise running, and your data safe.

Share This