MacNN Forums (http://forums.macnn.com/)
-   Tech News (http://forums.macnn.com/tech-news/)
-   -   FBI able to remotely activate, record audio from Android devices, PCs (http://forums.macnn.com/113/tech-news/502747/fbi-able-remotely-activate-record-audio/)

 
NewsPoster Aug 2, 2013 01:15 PM
FBI able to remotely activate, record audio from Android devices, PCs
The <a href="http://macnn.com/rd/291052==http://www.electronista.com/articles/12/05/23/dcac.in.quantico.will.allow.fbi.to.increase.intern et.monitoring/" rel='nofollow'>Federal Bureau of Investigation</a> is able to listen into and record conversations through microphones connected to computers, as well as through Android smartphones, according to a report. The bureau is said to have used hacking tools, including spyware and <a href="http://macnn.com/rd/291053==http://www.electronista.com/articles/13/07/25/flaw.quickly.exploited.by.hostile.actors.more.to.c ome/" rel='nofollow'>other malware</a>, that it has purchased from individuals and hacker collectives to gain access to mobile devices, in order to eavesdrop.<br />
<br />
The report by the <em>Wall Street Journal</em> <a href="http://macnn.com/rd/291046==http://online.wsj.com/article_email/SB10001424127887323997004578641993388259674-lMyQjAxMTAzMDAwMTEwNDEyWj.html" rel='nofollow' target="_self" title="">claims</a> that the FBI uses these hacking tools under court orders, in order to intercept communications that cannot normally be wiretapped. The process, known as "going dark" by law enforcement, not only uses bought hacking tools but also those of the FBI's own creation. The FBI "hires people who have hacking skill, and they purchase tools that are capable of doing these things," a former agency official within the FBI's cyber division told the report, though the source stresses that such surveillance methods are used when "you don't have any other choice." <br />
<br />
The extent of intrusions and methods is largely unknown, though there have been instances where they have surfaced. A keylogger was installed on a mobster's computer in 2001 in order to gain a password used to protect a document, with defendant Nicodemo Scarfo Jr. later being convicted. The methods used are also not restricted to online attacks over e-mail or malicious URLs, as it is claimed that in some cases FBI technicians have gained physical access to offline or well-protected computers, installing malicious software using a USB thumb drive. <br />
<br />
The FBI has a history of technology-based surveillance. It has also previously asked Internet companies to provide <a href="http://macnn.com/rd/291047==http://www.electronista.com/articles/12/05/04/bureau.seeking.support.for.mandatory.backdoors/" rel='nofollow'>surveillance backdoors</a>, stands to benefit <a href="http://macnn.com/rd/291048==http://www.electronista.com/articles/13/06/28/bill.motion.postponed.until.at.least.september.whi te.house.still.may.veto/" rel='nofollow'>from CISPA</a>, and is also involved in the <a href="http://macnn.com/rd/291049==http://www.electronista.com/articles/13/07/01/slides.showing.data.collection.workflow.accompanie d.by.embassy.spying.claims/" rel='nofollow'>ongoing PRISM scandal</a> alongside the NSA. While PRISM is effectively the ongoing collection of online and telecommunications data, the monitoring of individuals directly through notebooks and smartphones is only performed on a case-by-case basis, and extremely sparingly. <br />
<br />
Civil-liberties organizations believe that the hacking tools could be misused by bureau staff, with the American Civil Liberties Union asking for a debate on possible legal guidelines for the practice. "People should understand that local cops are going to be hacking into surveillance targets," said principal ACLU technologist Christopher Soghoian, who will be talking at <a href="http://macnn.com/rd/291050==https://www.defcon.org/" rel='nofollow'>DefCon</a> later today about the law enforcement hacker tool industry. <br />
<br />
Senior counsel at Perkins Coie LLP Mark Eckenwiler states that search warrants are required to retrieve files from a computer, and that ongoing surveillance would require a similar strict standard of adherence, similar to that of wiretaps. Eckenwiler, previously an authority on federal criminal surveillance law for the Justice Department, also suggests that the requirements from a court would be lower for metadata-based surveillance, which would usually consist of information that certain parties communicated but not what the messages were about, especially if done without physical access to the system. <br />
<br />
While the report mentions Android smartphones, it is not clear if anything similar is being orchestrated on iOS devices, though <a href="http://macnn.com/rd/291051==http://www.macnn.com/articles/13/05/07/trojan.horse.points.to.non.functional.webpage.part .of.sound.file/" rel='nofollow'>this is unlikely</a>. Operating systems of notebooks were also not disclosed in the story.
 
All times are GMT -4. The time now is 12:03 AM.

Copyright © 2005-2007 MacNN. All rights reserved.
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2014, vBulletin Solutions, Inc.


Content Relevant URLs by vBSEO 3.3.2