Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

FBI taps cell phone mic as eavesdropping tool
CNET News via ZDNet News ^ | December 1, 2006 | Declan McCullagh and Anne Broache

Posted on 12/03/2006 2:32:53 PM PST by ellery

The FBI appears to have begun using a novel form of electronic surveillance in criminal investigations: remotely activating a mobile phone's microphone and using it to eavesdrop on nearby conversations.

The technique is called a "roving bug," and was approved by top U.S. Department of Justice officials for use against members of a New York organized crime family who were wary of conventional surveillance techniques such as tailing a suspect or wiretapping him.

Nextel cell phones owned by two alleged mobsters, John Ardito and his attorney Peter Peluso, were used by the FBI to listen in on nearby conversations. The FBI views Ardito as one of the most powerful men in the Genovese family, a major part of the national Mafia.

The surveillance technique came to light in an opinion published this week by U.S. District Judge Lewis Kaplan. He ruled that the "roving bug" was legal because federal wiretapping law is broad enough to permit eavesdropping even of conversations that take place near a suspect's cell phone.

Kaplan's opinion said that the eavesdropping technique "functioned whether the phone was powered on or off." Some handsets can't be fully powered down without removing the battery; for instance, some Nokia models will wake up when turned off if an alarm is set.

While the Genovese crime family prosecution appears to be the first time a remote-eavesdropping mechanism has been used in a criminal case, the technique has been discussed in security circles for years.

The U.S. Commerce Department's security office warns that "a cellular telephone can be turned into a microphone and transmitter for the purpose of listening to conversations in the vicinity of the phone." An article in the Financial Times last year said mobile providers can "remotely install a piece of software on to any handset, without the owner's knowledge, which will activate the microphone even when its owner is not making a call."

Nextel and Samsung handsets and the Motorola Razr are especially vulnerable to software downloads that activate their microphones, said James Atkinson, a counter-surveillance consultant who has worked closely with government agencies. "They can be remotely accessed and made to transmit room audio all the time," he said. "You can do that without having physical access to the phone."

Because modern handsets are miniature computers, downloaded software could modify the usual interface that always displays when a call is in progress. The spyware could then place a call to the FBI and activate the microphone--all without the owner knowing it happened. (The FBI declined to comment on Friday.)

"If a phone has in fact been modified to act as a bug, the only way to counteract that is to either have a bugsweeper follow you around 24-7, which is not practical, or to peel the battery off the phone," Atkinson said. Security-conscious corporate executives routinely remove the batteries from their cell phones, he added.

FBI's physical bugs discovered The FBI's Joint Organized Crime Task Force, which includes members of the New York police department, had little luck with conventional surveillance of the Genovese family. They did have a confidential source who reported the suspects met at restaurants including Brunello Trattoria in New Rochelle, N.Y., which the FBI then bugged.

But in July 2003, Ardito and his crew discovered bugs in three restaurants, and the FBI quietly removed the rest. Conversations recounted in FBI affidavits show the men were also highly suspicious of being tailed by police and avoided conversations on cell phones whenever possible.

That led the FBI to resort to "roving bugs," first of Ardito's Nextel handset and then of Peluso's. U.S. District Judge Barbara Jones approved them in a series of orders in 2003 and 2004, and said she expected to "be advised of the locations" of the suspects when their conversations were recorded.

Details of how the Nextel bugs worked are sketchy. Court documents, including an affidavit (p1) and (p2) prepared by Assistant U.S. Attorney Jonathan Kolodner in September 2003, refer to them as a "listening device placed in the cellular telephone." That phrase could refer to software or hardware.

One private investigator interviewed by CNET News.com, Skipp Porteous of Sherlock Investigations in New York, said he believed the FBI planted a physical bug somewhere in the Nextel handset and did not remotely activate the microphone.

"They had to have physical possession of the phone to do it," Porteous said. "There are several ways that they could have gotten physical possession. Then they monitored the bug from fairly near by."

But other experts thought microphone activation is the more likely scenario, mostly because the battery in a tiny bug would not have lasted a year and because court documents say the bug works anywhere "within the United States"--in other words, outside the range of a nearby FBI agent armed with a radio receiver.

In addition, a paranoid Mafioso likely would be suspicious of any ploy to get him to hand over a cell phone so a bug could be planted. And Kolodner's affidavit seeking a court order lists Ardito's phone number, his 15-digit International Mobile Subscriber Identifier, and lists Nextel Communications as the service provider, all of which would be unnecessary if a physical bug were being planted.

A BBC article from 2004 reported that intelligence agencies routinely employ the remote-activiation method. "A mobile sitting on the desk of a politician or businessman can act as a powerful, undetectable bug," the article said, "enabling them to be activated at a later date to pick up sounds even when the receiver is down."

For its part, Nextel said through spokesman Travis Sowders: "We're not aware of this investigation, and we weren't asked to participate."

Other mobile providers were reluctant to talk about this kind of surveillance. Verizon Wireless said only that it "works closely with law enforcement and public safety officials. When presented with legally authorized orders, we assist law enforcement in every way possible."

A Motorola representative said that "your best source in this case would be the FBI itself." Cingular, T-Mobile, and the CTIA trade association did not immediately respond to requests for comment.

Mobsters: The surveillance vanguard This isn't the first time the federal government has pushed at the limits of electronic surveillance when investigating reputed mobsters.

In one case involving Nicodemo S. Scarfo, the alleged mastermind of a loan shark operation in New Jersey, the FBI found itself thwarted when Scarfo used Pretty Good Privacy software (PGP) to encode confidential business data.

So with a judge's approval, FBI agents repeatedly snuck into Scarfo's business to plant a keystroke logger and monitor its output.

Like Ardito's lawyers, Scarfo's defense attorneys argued that the then-novel technique was not legal and that the information gleaned through it could not be used. Also like Ardito, Scarfo's lawyers lost when a judge ruled in January 2002 that the evidence was admissible.

This week, Judge Kaplan in the southern district of New York concluded that the "roving bugs" were legally permitted to capture hundreds of hours of conversations because the FBI had obtained a court order and alternatives probably wouldn't work.

The FBI's "applications made a sufficient case for electronic surveillance," Kaplan wrote. "They indicated that alternative methods of investigation either had failed or were unlikely to produce results, in part because the subjects deliberately avoided government surveillance."

Bill Stollhans, president of the Private Investigators Association of Virginia, said such a technique would be legally reserved for police armed with court orders, not private investigators.

There is "no law that would allow me as a private investigator to use that type of technique," he said. "That is exclusively for law enforcement. It is not allowable or not legal in the private sector. No client of mine can ask me to overhear telephone or strictly oral conversations."

Surreptitious activation of built-in microphones by the FBI has been done before. A 2003 lawsuit revealed that the FBI was able to surreptitiously turn on the built-in microphones in automotive systems like General Motors' OnStar to snoop on passengers' conversations.

When FBI agents remotely activated the system and were listening in, passengers in the vehicle could not tell that their conversations were being monitored.

Malicious hackers have followed suit. A report last year said Spanish authorities had detained a man who write a Trojan horse that secretly activated a computer's video camera and forwarded him the recordings.


TOPICS: Constitution/Conservatism; Culture/Society; Front Page News; News/Current Events
KEYWORDS: bigbrother; fourthamendment; govwatch; privacy
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-79 next last
To: ryan125
better [to] have them listen then have them know where you are

Tower triangulation works pretty well, within 100 yards or so. You'd probaby be better off using a pay phone if you can still find one.

41 posted on 12/03/2006 5:12:01 PM PST by disclaimer
[ Post Reply | Private Reply | To 40 | View Replies]

To: ex 98C MI Dude
That is why I oppose the Patriot Act (I and II). It potentially places far too much power in the hands of people who don't have qualms about its use.

Ah the sound of sanity. It amazes me how many "conservatives" were/are so willing to sign over their freedoms in the name of security.

"They who would give up an essential liberty for temporary security, deserve neither liberty or security." Benjamin Franklin

Pandora's box was opened. Good luck ever closing it again.

42 posted on 12/03/2006 5:22:35 PM PST by mgstarr
[ Post Reply | Private Reply | To 18 | View Replies]

To: ellery

43 posted on 12/03/2006 6:03:25 PM PST by Darth Republican
[ Post Reply | Private Reply | To 1 | View Replies]

To: Right Wing Assault

or simply buy the readily available jamming device.


44 posted on 12/03/2006 6:13:04 PM PST by longtermmemmory (VOTE! http://www.senate.gov and http://www.house.gov)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Nathan Zachary

How about the electronic impulses from your computer?

How about the lasers that detect vibration in windows?

How about the private companies that collect your data?


If Disney can sell parental super supervising cell phones for your kids, then that same data is available for purchase.

If Bill and Hillary Clinton can abscond with FBI files and use the IRS to go after people, then privacy is an issue of who is in power not the tools.

Would we rather this be in the hands of conservatives or leftists or third wayists or John Kerry or Al Gore or Hitlary?

The courts can and do not protect us from any of this.


45 posted on 12/03/2006 6:24:58 PM PST by longtermmemmory (VOTE! http://www.senate.gov and http://www.house.gov)
[ Post Reply | Private Reply | To 37 | View Replies]

To: longtermmemmory
How about the electronic impulses from your computer?

As a matter of fact, the video board in your computer is a great transmitter.

Search using the word "TEMPEST".

What's on your computer screen can be seen from up to 5 miles away.

46 posted on 12/03/2006 6:34:56 PM PST by Mogger (Independence, better fuel economy and performance with American made synthetic oil.)
[ Post Reply | Private Reply | To 45 | View Replies]

To: ellery

Ooooh aaaahhh....


47 posted on 12/03/2006 6:42:23 PM PST by dr_who_2
[ Post Reply | Private Reply | To 1 | View Replies]

To: mgstarr

Franklin also said "a small leak will sink a great ship." ;)


48 posted on 12/03/2006 6:55:53 PM PST by sageb1 (This is the Final Crusade. There are only 2 sides. Pick one.)
[ Post Reply | Private Reply | To 42 | View Replies]

To: Nathan Zachary
As far as police or some secret government organization wanting to see through the walls of your house or listen to you, they have been able to do that for decades.

Doesn't mean I have to feel happy about it or facilitate their access in any way. Also, it's worth resisting because government's nature is such that they'll extend their abilities steadily in this area, so I champion anyone who makes it easier for me to safeguard my privacy.

49 posted on 12/04/2006 12:42:37 AM PST by Androcles (All your typos are belong to us)
[ Post Reply | Private Reply | To 37 | View Replies]

To: ellery; Abram; albertp; AlexandriaDuke; Alexander Rubin; Allosaurs_r_us; Americanwolf; ...
Libertarian ping! To be added or removed from my ping list freepmail me or post a message here.
50 posted on 12/04/2006 7:52:47 AM PST by traviskicks (http://www.neoperspectives.com/optimism_nov8th.htm)
[ Post Reply | Private Reply | To 3 | View Replies]

To: ellery
As described in detail by Travis McGee in his novel Enemies, Foreign and Domestic.

At least one of the passages describing such cell phone capabilities is available for reading in the free sampler for thew book, about halfway down.


51 posted on 12/04/2006 9:47:28 AM PST by archy (I am General Tso. This is my Chief of Staff, Colonel Sanders....)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ellery

When I was in the USAF, the Comm people always told us that the GCB's (Godless Commie B*stards) could listen in on our beepers and walkie-talkies so we left them outside classified briefings. Now I know they weren't over-reacting.


52 posted on 12/04/2006 9:51:09 AM PST by CholeraJoe (Spork weasels ain't afraid of nuthin' but running out of sardines.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Rb ver. 2.0

Is it that bad?


53 posted on 12/04/2006 9:55:36 AM PST by Fierce Allegiance (SAY NO TO RUDY!)
[ Post Reply | Private Reply | To 16 | View Replies]

To: Nathan Zachary
They can only determine your location within the radius of the cell tower, which could be anywhere within a 25 mile radius depending on how far apart towers are from each other in the area.

It's not like they can drop a bomb on you.

Caucasus/Russia/Central Asia

High tech hit on "president"


Abdul-Khalim Saidullayev, the Chechen rebel "president" killed Saturday by pro-Russian forces, was the fourth pro-independence leader of the Muslim province to be killed in more than a decade of conflict with Moscow. Saidullayev's precedessor, Aslan Maskhadov, was also killed by pro-Russian forces in Chechnya on March 8, 2005. His death came after those of Akhmad Kadyrov, Zelimkhan Yandarbiyev and Djokhar Dudayev. Maskhadov was killed after a battle with Russian forces in the Chechen village of Tolstoi-Yurt after he was, according to Russian officials, trapped in a bunker under a house there.

Dudayev's killing, in April 1996, resulted from a bizarre blend of high technology and long-distance military intelligence as the Russian air force finally got their man after several attempts. Dudayev, 52, was in the village of Gekhi-Chu, about 30 kilometers southwest of the capital Grozny, when he answered a satellite telephone call from a Russian politician in Moscow who was ostensibly acting as a go-between in impending peace negotiations. But minutes later, two missiles exploded at the exact spot where he was standing and he died of his injuries shortly afterwards. Russian authorities at the time confirmed that the missiles had been guided to their target by the signal emitted by Dudayev's satellite phone.

Previous attempts by the air force to eliminate the man whose proud boast was "I have only one bodyguard - Allah," had failed as Dudayev had hung up too quickly. Dudayev had been elected president in October 1991 and proclaimed unilateral Chechen independence the following month.


54 posted on 12/04/2006 9:58:39 AM PST by archy (I am General Tso. This is my Chief of Staff, Colonel Sanders....)
[ Post Reply | Private Reply | To 19 | View Replies]

To: Prodigal Son
 There used to be a freeper who posted under the handle of a John D MacDonald fiction hero. He wrote a book. It had something like this in it.

 

Travis McGee?

55 posted on 12/04/2006 10:00:05 AM PST by zeugma (I reject your reality and substitute my own in its place. (http://www.zprc.org/))
[ Post Reply | Private Reply | To 25 | View Replies]

To: mgstarr
Ah the sound of sanity. It amazes me how many "conservatives" were/are so willing to sign over their freedoms in the name of security.

Ditto 

56 posted on 12/04/2006 10:02:42 AM PST by zeugma (I reject your reality and substitute my own in its place. (http://www.zprc.org/))
[ Post Reply | Private Reply | To 42 | View Replies]

To: K4Harty

And Nokia and Motorola and.....


57 posted on 12/04/2006 10:04:20 AM PST by NotJustAnotherPrettyFace
[ Post Reply | Private Reply | To 2 | View Replies]

To: ex 98C MI Dude

The Founding Fathers could never have envisioned a world with cell phones.


58 posted on 12/04/2006 10:05:57 AM PST by NotJustAnotherPrettyFace
[ Post Reply | Private Reply | To 18 | View Replies]

To: ellery

No thanks. I don't trust government with this much power.


59 posted on 12/04/2006 10:07:21 AM PST by mysterio
[ Post Reply | Private Reply | To 1 | View Replies]

To: Fierce Allegiance

A culinary crime worthy of imprisonment.


60 posted on 12/04/2006 10:10:52 AM PST by Rb ver. 2.0
[ Post Reply | Private Reply | To 53 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-79 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson