Posted on 08/03/2013 11:06:50 AM PDT by Red in Blue PA
A former U.S. official told The Journal that some of the technology allows the FBI to remotely activate the microphones in phones running on Google Inc.'s Android software to record conversations.
(Excerpt) Read more at foxnews.mobi ...
Yeah, all that sophisticated technology developed by STASI and KGB for nothing these days.
And you wondered why they make them so you can’t remove the battery. < /tinfoil >
you’re not understanding.
the information they gathered would never be used anywhere in proximity to the judicial system
BUT... it would be used to tip them off who they should monitor more closely through ‘legal’ channels... so they could get a warrant and bring charges.
in the rare circumstance they gathered something that was immediately actionable (someone was about to deliver a bomb or something)... they would just take out the target and claim terrorist threat. no evidence or warrant needed.
you get it
Your phone is a bug that you keep charged for them.
Of course, if you are going to have a conversation that you don’t want listened to, put your phone in a bag or box with a cheap radio playing some awful music.
Or you can always just disconnect the battery... but that’s more work.
All showmanship
yes, they will gather all information... targeting no one in particular... and thereby be legal. just like scanning license plates on the roads
the interesting tidbit will come later.
once they have the massive datastore in utah being filled with decades of live data... there will come a day when it is common practice for a warrant to be issued to pull all the data associated with a defendant and submitted into evidence.
your life in review...
your fate in the balance...
your life at the mercy of your overlords
what could possibly go wrong
I wonder if any statute of limitations stuff can come up? Cause surely they’ll eventually expand using it from ‘terrorism’ to any lower felony or complaint.. Copyright stuff, saying something negative about someone, and so on.
They’ll have everything you did and lay it all down. If they find some political group they don’t like that you’ve ever talked to or gone to their site, they’ll label you a dissident or terrorist. Down the road of course, once you’ve really pissed them off by voting the wrong way or something.
They don’t turn everybody’s microphone on. They are targeting troublemakers and they have not gotten a named warrant. You can count on it. The other ubiquitous recording of metadata (supposedly) doesn’t include the message body ( but it does - illegally). They are all liars.
From Jim Morrison (The Doors):
THE MOVIE
The movie will begin in five moments
The mindless voice announced
All those unseated will await the next show.
We filed slowly, languidly into the hall
The auditorium was vast and silent
As we seated and were darkened, the voice continued.
The program for this evening is not new
You’ve seen this entertainment through and through
You’ve seen your birth your life and death
you might recall all of the rest
Did you have a good world when you died?
Enough to base a movie on?.
I’m getting out of here.
“Where are you going?”
To the other side of morning.
“Please don’t chase the clouds, pagodas”
“It’s alright, all your friends are here.”
When can I meet them?
“After you’ve eaten.”
I’m not hungry.
“Uh, we meant beaten.”
My children might become parents.
The service provider wasn't mentioned by name (likely Onstar), but the use of the service without permission or warrant was considered a denial of the service the provider was supposed to be providing, and the hack may have rendered the service provider unable to provide the service they were selling. The 'evidence', iirc, was thrown out as an illegal wiretap.
We have decided it is time to learn an obscure language other than english. If nothing else, it could give us a tactical advantage in close quarters, and a modicum of privacy in the open.
I suppose Basque or an obscure language would be good, too.
lol. I am imagining FR full of Klingon posts
Looked at your FR homepage... I like it :-)
What do you do? I’m in embedded systems.
Remember that a smartphone can be operated out-of-band.
The normal cell frequencies are far too cluttered to be useful for surreptitious monitoring... sending data out as normal cell data is far too risky for serious work.
NY Times story
Village yutes create their own language
http://www.nytimes.com/2013/07/16/science/linguist-finds-a-language-in-its-infancy.html?_r=0
thx
over the years I’ve focused on many different areas... from UI, server, distributed near real time, to embedded. these days, mesh networks and distributed systems are my focus as well as anything extremely large scale
as such, an agent running on the phone monitoring sounds about right. it’d be the right way to solve the problem, uploading when local wifi is available and all has been quiet for a while (emergency mode would also be built in if the agent determined potentially ‘blowing cover’ was warranted)
Cellphones with custom firmware makes for a great ad-hoc mesh network.
Remember that there are at least four NRO sats in geosynchronous orbit with large dishes that are used to pick up things like a cellphone operated out-of-band. The gain is so great on those birds that the phone only needs to put out a few milliwatts for solid reception... the full 600mw is overkill.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.