It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Originally posted by sv_gravity 800
reply to post by mblahnikluver
lol... i could do that to you about 6 years ago bro.....
picture now. 2010, this isn't 2004 anymore... web cams are old school bro.
The FBI appears to have begun using a novel form of electronic surveillance in criminal investigations: remotely activating a mobile phone's microphone and using it to eavesdrop on nearby conversations.
The technique is called a "roving bug," and was approved by top U.S. Department of Justice officials for use against members of a New York organized crime family who were wary of conventional surveillance techniques such as tailing a suspect or wiretapping him.
Nextel cell phones owned by two alleged mobsters, John Ardito and his attorney Peter Peluso, were used by the FBI to listen in on nearby conversations. The FBI views Ardito as one of the most powerful men in the Genovese family, a major part of the national Mafia.
The surveillance technique came to light in an opinion published this week by U.S. District Judge Lewis Kaplan. He ruled that the "roving bug" was legal because federal wiretapping law is broad enough to permit eavesdropping even of conversations that take place near a suspect's cell phone.
Kaplan's opinion said that the eavesdropping technique "functioned whether the phone was powered on or off." Some handsets can't be fully powered down without removing the battery; for instance, some Nokia models will wake up when turned off if an alarm is set.
...
The U.S. Commerce Department's security office warns that "a cellular telephone can be turned into a microphone and transmitter for the purpose of listening to conversations in the vicinity of the phone." An article in the Financial Times last year said mobile providers can "remotely install a piece of software on to any handset, without the owner's knowledge, which will activate the microphone even when its owner is not making a call."
Nextel and Samsung handsets and the Motorola Razr are especially vulnerable to software downloads that activate their microphones, said James Atkinson, a counter-surveillance consultant who has worked closely with government agencies. "They can be remotely accessed and made to transmit room audio all the time," he said. "You can do that without having physical access to the phone."
Because modern handsets are miniature computers, downloaded software could modify the usual interface that always displays when a call is in progress. The spyware could then place a call to the FBI and activate the microphone--all without the owner knowing it happened. (The FBI declined to comment on Friday.)
...
Details of how the Nextel bugs worked are sketchy. Court documents, including an affidavit (p1) and (p2) prepared by Assistant U.S. Attorney Jonathan Kolodner in September 2003, refer to them as a "listening device placed in the cellular telephone." That phrase could refer to software or hardware.
...
Other mobile providers were reluctant to talk about this kind of surveillance. Verizon Wireless said only that it "works closely with law enforcement and public safety officials. When presented with legally authorized orders, we assist law enforcement in every way possible."
Originally posted by ninthaxis
reply to post by sv_gravity 800
Lets cut the insults and get into some real substance gravity. First off, you have provided no proof of your claims that such finger print technology can be installed in a functioning cell phone. You said there is no reason for you to provide proof. If you are going to make outrageous claims, provide supporting evidence to back it up.
Second, do not insult my technological knowledge because wikipedia supports your claim. It is IMPOSSIBLE to install a software or hardware component that cannot be discovered by someone. Yes, I said IMPOSSIBLE! That is not an outrageous claim of an ignorant individual but a fact. No matter how well someone "hides" a piece of hardware or software, the fact that it is on that cell phone makes it discoverable. So the operating system can't detect the software, big deal. No one trying to discover the workings of their cell phone is going to go through the operating system. Regardless of how well you hide this piece of software/hardware, it is still broadcasting information out on whatever network you happen to be on, whether its a local wi-fi connection or the cell company you get coverage from. That will be the first thing that clues someone into the fact that there is something interesting on the phone.
Again, please try to provide some support of your theory instead of belittling the people you are so eager to debate with. If such technology exists, show us!
Originally posted by OnceReturned
It seems to me that such tech would require both hardware and software components on every single phone. I don't think that normal touch screen sensors have the resolution to read fingerprints. In fact I'm sure they don't. If additional fingerprinting hardware were in the phones, it would not escape the engineers and workers who make the phones, and it would probably not escape the hackers who mess with the phone. That's too many civilians to keep quiet. I think that alone makes it highyl unlikely.
But, I probably would have said the same thing about the FBI using your phone to listen to your conversations even when the phone is off, yet they have admitted to having the ability to do this, and they have done it:
The FBI appears to have begun using a novel form of electronic surveillance in criminal investigations: remotely activating a mobile phone's microphone and using it to eavesdrop on nearby conversations.
The technique is called a "roving bug," and was approved by top U.S. Department of Justice officials for use against members of a New York organized crime family who were wary of conventional surveillance techniques such as tailing a suspect or wiretapping him.
Nextel cell phones owned by two alleged mobsters, John Ardito and his attorney Peter Peluso, were used by the FBI to listen in on nearby conversations. The FBI views Ardito as one of the most powerful men in the Genovese family, a major part of the national Mafia.
The surveillance technique came to light in an opinion published this week by U.S. District Judge Lewis Kaplan. He ruled that the "roving bug" was legal because federal wiretapping law is broad enough to permit eavesdropping even of conversations that take place near a suspect's cell phone.
Kaplan's opinion said that the eavesdropping technique "functioned whether the phone was powered on or off." Some handsets can't be fully powered down without removing the battery; for instance, some Nokia models will wake up when turned off if an alarm is set.
...
The U.S. Commerce Department's security office warns that "a cellular telephone can be turned into a microphone and transmitter for the purpose of listening to conversations in the vicinity of the phone." An article in the Financial Times last year said mobile providers can "remotely install a piece of software on to any handset, without the owner's knowledge, which will activate the microphone even when its owner is not making a call."
Nextel and Samsung handsets and the Motorola Razr are especially vulnerable to software downloads that activate their microphones, said James Atkinson, a counter-surveillance consultant who has worked closely with government agencies. "They can be remotely accessed and made to transmit room audio all the time," he said. "You can do that without having physical access to the phone."
Because modern handsets are miniature computers, downloaded software could modify the usual interface that always displays when a call is in progress. The spyware could then place a call to the FBI and activate the microphone--all without the owner knowing it happened. (The FBI declined to comment on Friday.)
...
Details of how the Nextel bugs worked are sketchy. Court documents, including an affidavit (p1) and (p2) prepared by Assistant U.S. Attorney Jonathan Kolodner in September 2003, refer to them as a "listening device placed in the cellular telephone." That phrase could refer to software or hardware.
...
Other mobile providers were reluctant to talk about this kind of surveillance. Verizon Wireless said only that it "works closely with law enforcement and public safety officials. When presented with legally authorized orders, we assist law enforcement in every way possible."
Source
Yikes. You could be right. Although I would assume that they already think that you are wherever your phone is, at least when the phone is being used, which means they can tell where you are without having to fingerprint you.
And in direct contradiction to my claim in the first paragraph that the standard tech is not up to the job, here is a new phone that can, in fact, read prints:
Sharp's Next Gen Mobiles to pack print reading tech
Similar Article about the Sharp tech
Originally posted by jaden_x
Well, if you look at how most touchscreens out now work, you can start to see how this claim would start to crumble.
electronics.howstuffworks.com...
think about a bunch of little buttons behind a thin layer of plastic, as you move your finger across, you're pushing down on different buttons at different locations on the screen, and that gives you the data.
something like that just isn't precise enough to read fingerprints, at least not with most touchscreens, but there might special ones, specifically designed to do so.