10-09-2013 03:04 PM
Solved! Go to Solution.
I'm rockin the BlackBerry DTEK60, Passport, Z30, Z10, Q10, BlackBerry Mini Stereo Speaker, 64 gig PlayBook,BT Headset HS-700
10-09-2013 03:37 PM
not sure if any government will comment on what they can access
most people would not even be on their list unless you have something to worth their interest
BESAdmin's, please make a signature with your BES environment info.
BES 12 and BES 5.0.4 with Exchange 2010 and SQL 2012 Hyper V
10-09-2013 03:53 PM
10-09-2013 04:40 PM
10-09-2013 06:18 PM
Having been to most of the foundries around the world I can say that this is feasibly possible but almost certainly impractical. It would need collusion on a wideworld scale to implement.
Any suspicion of a phone doing this would result in it being ripped open, the tops taken off the chips, and probes inserted by surveillance and chip design experts.
What is possible is for your position to be ascertained from a phone and for a phone to be cloned and calls intercepted. If you are talking in to the phone the call can also be intercepted at the service provider end and from recent leaks it's a certainty that governments are doing this, with the US seeming to be one of the worst (or most efficient) with massive mainframes sifting through all calls for trigger key words.
Unfortunately this is the world we live in now.
Hope your dinner party went well and that you kept your dinner talk away from dangerous subjects.
10-09-2013 07:04 PM
10-10-2013 01:59 AM - edited 10-10-2013 02:06 AM
When you are not using the phone, that is when the phone is not in a phone call the microphone circuits are actually muted, and so is the speaker.
If someone wanted to use the phone as a bug, they would have to actually open the phone and somehow install an additional circuit board that can work as an independent transmitter, or independent device that can dial out to a specific location via the mobile network on its own account. This would be very difficult to do since these phones are very cramped for space inside, and the circuit interface is extremely complex.
Back in the early 1970's we used to see on some movies where spys would plant a bug of some type at the phone jack, or inside of the person's telephone set. The bug normally used the power from the phone connection to run. We used to see this in some spy movies.
The other way is for someone to install a malicious monitoring software in to the phone that in the background can call out to a location for monitoring ambiant sounds picked up by the phone's microphone. With the Blackberry phone system by how it functions and with its security this would be a very difficult feat, and I doubt it has ever been done with the Blackberry phone. The only way a malicious software can get in to a Blackberry is if the user installed it himself. Installing unauthorized software is of a high risk for this.
It is possible however to have logs of your phone calls if your service provider keeps logs of the numbers that you called and that called you. By request through a court order (in US, Canada, and all of Europe), the authorities can do a wire tap, and or ask for the user logs.
In the case of taping mobile phones this would have to be done at the telephone companies facilities using the proper decoding. The conversation and control packets broadcasted by your phone would be overly difficult to intercept. I believe the Blackberry conversations and emails are encrypted when sent from the phone via the carrier's network. This is a huge reason why I only use a Blackberry for business.
10-10-2013 04:06 AM