It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
mysterioustranger
reply to post by rangerdanger
Well...they can activate a mic thats set to OFF and still listen. Like a phone even though it is off....they just enable it from their end...and thats been widely discussed here on ATS previously.
Oh. And if you have a webcam? At least turn it off too...and put a piece of heavy tape over the lens . And NOT clear scotch tape!!
edit on 09-22-2013 by mysterioustranger because: spell
mysterioustranger
reply to post by CallYourBluff
Therein is the issue...they dont NEED to "turn it on" to active the disconnected unit.
A disconnected "off" from the source unit can still be utilized. As in a spkr lying on the ground. There are ways to activate it from a remote source ie: power, signal.
We knew this back in the 1980's when the CIA's nefarious methods became newsworthy when they were trying to locate the Iranian Hostages, and we learned they were using phones that were turned off.
You didnt? Its not me, its old news.
I can't be wrong because I never said anything about phone spying. I am telling you what is true as far as computer security goes.
mysterioustranger
reply to post by CallYourBluff
Wrong. Here from C/Net in 2006, and the methods go back for cameras as well to 1986 during the Iranian Hostage crisis and CIA surveillance techniques.
FBI taps cell phone mic as eavesdropping tool
December 1, 2006 2:20 PM PST
news.cnet.com...
The FBI appears to have begun using a novel form of electronic surveillance in criminal investigations: remotely activating a mobile phone's microphone and using it to eavesdrop on nearby conversations.
The technique is called a "roving bug," and was approved by top U.S. Department of Justice officials for use against members of a New York organized crime family who were wary of conventional surveillance techniques such as tailing a suspect or wiretapping him.
Nextel cell phones owned by two alleged mobsters, John Ardito and his attorney Peter Peluso, were used by the FBI to listen in on nearby conversations. The FBI views Ardito as one of the most powerful men in the Genovese family, a major part of the national Mafia.
The surveillance technique came to light in an opinion published this week by U.S. District Judge Lewis Kaplan. He ruled that the "roving bug" was legal because federal wiretapping law is broad enough to permit eavesdropping even of conversations that take place near a suspect's cell phone.
Kaplan's opinion said that the eavesdropping technique "functioned whether the phone was powered on or off."
Not sure about the phones but definitely not with computers. A well maintained computer will always be secure, otherwise cyber security companies would be obsolete. The exploits you talk of are conspiracy nonsense. In the world of computers it's very easy to monitor all ingoing and outgoing traffic.