{"id":2146,"date":"2014-06-25T06:07:13","date_gmt":"2014-06-25T10:07:13","guid":{"rendered":"http:\/\/vweisfeld.com\/?p=2146"},"modified":"2014-07-10T06:16:40","modified_gmt":"2014-07-10T10:16:40","slug":"youve-been-hacked","status":"publish","type":"post","link":"https:\/\/vweisfeld.com\/?p=2146","title":{"rendered":"You\u2019ve Been Hacked!"},"content":{"rendered":"<div id=\"attachment_2085\" style=\"width: 234px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/i0.wp.com\/vweisfeld.com\/wp-content\/uploads\/2012\/10\/UncleSamListensIn_converted-1.jpg\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-2085\" class=\"size-medium wp-image-2085\" src=\"https:\/\/i0.wp.com\/vweisfeld.com\/wp-content\/uploads\/2012\/10\/UncleSamListensIn_converted-1-224x300.jpg?resize=224%2C300\" alt=\"government spying, cell phone, mobile phone, law enforcement surveillance\" width=\"224\" height=\"300\" srcset=\"https:\/\/i0.wp.com\/vweisfeld.com\/wp-content\/uploads\/2012\/10\/UncleSamListensIn_converted-1.jpg?resize=224%2C300&amp;ssl=1 224w, https:\/\/i0.wp.com\/vweisfeld.com\/wp-content\/uploads\/2012\/10\/UncleSamListensIn_converted-1.jpg?resize=767%2C1024&amp;ssl=1 767w, https:\/\/i0.wp.com\/vweisfeld.com\/wp-content\/uploads\/2012\/10\/UncleSamListensIn_converted-1.jpg?w=1535&amp;ssl=1 1535w, https:\/\/i0.wp.com\/vweisfeld.com\/wp-content\/uploads\/2012\/10\/UncleSamListensIn_converted-1.jpg?w=1168&amp;ssl=1 1168w\" sizes=\"auto, (max-width: 224px) 100vw, 224px\" \/><\/a><p id=\"caption-attachment-2085\" class=\"wp-caption-text\">(photo: upload.wikimedia.org)<\/p><\/div>\n<p>So how do cops and spooks steal data from your mobile phone, anyway? Research teams at the Kaspersky Lab in Russia and Toronto\u2019s Citizen Lab independently analyzed a digital surveillance tool created by the Italian Company, <a href=\"http:\/\/www.hackingteam.com\/index.php\/remote-control-system\">Hacking Team<\/a> (do watch this marketing video if you want something to think about), which more than 60 government worldwide use to snatch and record mobile phone data. The tool\u2019s components have been designed to target Android, iOS, Windows Mobile, and BlackBerry users\u2014one of whom is probably you.<\/p>\n<p>According to a lengthy <a href=\"http:\/\/www.wired.com\/2014\/06\/remote-control-system-phone-surveillance\/\">Wired<\/a> article by Kim Zetter, here\u2019s what the Hacking Team\u2019s tool can do: collect your emails, text messages, call history, and address books; log keystrokes, reveal where you\u2019ve searched, and take screenshots; record audio of calls and the ambient sounds in the room where the phone is; and use the phone\u2019s camera to take pictures of the surroundings. No surprise, the tool can use the phone\u2019s GPS system to locate it (and probably, you, too). In other words, the tool can do with the phone pretty much everything you can.<\/p>\n<p>What\u2019s new about these revelations is that this is the first time these techniques have been reverse-engineered to reveal how they really work, including how they protect themselves from detection. Here\u2019s a blog post about these discoveries from Russian researcher <a href=\"http:\/\/www.securelist.com\/en\/blog\/8231\/HackingTeam_2_0_The_Story_Goes_Mobile\">Sergey Golovanov<\/a>.<\/p>\n<div id=\"attachment_2079\" style=\"width: 310px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/i0.wp.com\/vweisfeld.com\/wp-content\/uploads\/2012\/10\/6339221005_084ca4bdb9_z_converted.jpg\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-2079\" class=\"size-medium wp-image-2079\" src=\"https:\/\/i0.wp.com\/vweisfeld.com\/wp-content\/uploads\/2012\/10\/6339221005_084ca4bdb9_z_converted-300x199.jpg?resize=300%2C199\" alt=\"film noir, spies\" width=\"300\" height=\"199\" srcset=\"https:\/\/i0.wp.com\/vweisfeld.com\/wp-content\/uploads\/2012\/10\/6339221005_084ca4bdb9_z_converted.jpg?resize=300%2C199&amp;ssl=1 300w, https:\/\/i0.wp.com\/vweisfeld.com\/wp-content\/uploads\/2012\/10\/6339221005_084ca4bdb9_z_converted.jpg?resize=450%2C300&amp;ssl=1 450w, https:\/\/i0.wp.com\/vweisfeld.com\/wp-content\/uploads\/2012\/10\/6339221005_084ca4bdb9_z_converted.jpg?w=640&amp;ssl=1 640w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-2079\" class=\"wp-caption-text\">(photo: c1.staticflickr.com)<\/p><\/div>\n<p>Spies following each other through the wetly reflecting nighttime alleys of Eastern Europe will be relegated to <em>film noir<\/em>, since the above functions let a tracker follow you to that screening of <em>1984<\/em> and home again from some remote center. Most countries using this technology have one or two command-and-control centers to monitor multiple targets and conduct surveillance. The nation with by far the most such centers? The United States, with 64.<\/p>\n<p>The genie is out of the bottle, however, and \u201cThis type of exceptionally invasive toolkit, once a costly boutique capability deployed by intelligence communities and militaries, is now being marketed for targeting everyday criminality and \u2018security threats,\u2019\u201d say Citizen Lab researchers. Inevitably, people who shouldn\u2019t have it, will.<\/p>\n<h6 class=\"zemanta-related-title\" style=\"font-size: 1em;\">Related articles<\/h6>\n<ul class=\"zemanta-article-ul zemanta-article-ul-image\" style=\"margin: 0; padding: 0; overflow: hidden;\">\n<li class=\"zemanta-article-ul-li-image zemanta-article-ul-li\" style=\"padding: 0; background: none; list-style: none; display: block; float: left; vertical-align: top; text-align: left; width: 84px; font-size: 11px; margin: 2px 10px 10px 2px;\"><a style=\"box-shadow: 0px 0px 4px #999; padding: 2px; display: block; border-radius: 2px; text-decoration: none;\" href=\"http:\/\/motherboard.vice.com\/read\/police-grade-mobile-spyware-is-spreading-through-saudi-arabia-and-beyond\" target=\"_blank\"><img data-recalc-dims=\"1\" decoding=\"async\" style=\"padding: 0; margin: 0; border: 0; display: block; width: 80px; max-width: 100%;\" src=\"https:\/\/i0.wp.com\/i.zemanta.com\/280709763_80_80.jpg?w=584\" alt=\"\" \/><\/a><a style=\"display: block; overflow: hidden; text-decoration: none; line-height: 12pt; height: 83px; padding: 5px 2px 0 2px; background-image: none;\" href=\"http:\/\/motherboard.vice.com\/read\/police-grade-mobile-spyware-is-spreading-through-saudi-arabia-and-beyond\" target=\"_blank\">Police-Grade Mobile Spyware Is Spreading Through Saudi Arabia (and Beyond)<\/a><\/li>\n<li class=\"zemanta-article-ul-li-image zemanta-article-ul-li\" style=\"padding: 0; background: none; list-style: none; display: block; float: left; vertical-align: top; text-align: left; width: 84px; font-size: 11px; margin: 2px 10px 10px 2px;\"><a style=\"box-shadow: 0px 0px 4px #999; padding: 2px; display: block; border-radius: 2px; text-decoration: none;\" href=\"http:\/\/phys.org\/news\/2014-06-eyes-experts-reveal-police-hacking.html\" target=\"_blank\"><img data-recalc-dims=\"1\" decoding=\"async\" style=\"padding: 0; margin: 0; border: 0; display: block; width: 80px; max-width: 100%;\" src=\"https:\/\/i0.wp.com\/i.zemanta.com\/280640954_80_80.jpg?w=584\" alt=\"\" \/><\/a><a style=\"display: block; overflow: hidden; text-decoration: none; line-height: 12pt; height: 83px; padding: 5px 2px 0 2px; background-image: none;\" href=\"http:\/\/phys.org\/news\/2014-06-eyes-experts-reveal-police-hacking.html\" target=\"_blank\">Eyes on you: Experts reveal police hacking methods<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>So how do cops and spooks steal data from your mobile phone, anyway? Research teams at the Kaspersky Lab in Russia and Toronto\u2019s Citizen Lab independently analyzed a digital surveillance tool created by the Italian Company, Hacking Team (do watch &hellip; <a href=\"https:\/\/vweisfeld.com\/?p=2146\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[193,35,186,104],"tags":[416],"class_list":["post-2146","post","type-post","status-publish","format-standard","hentry","category-espionage","category-real-life","category-technology","category-the-morgue","tag-real-life"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2NkiT-yC","_links":{"self":[{"href":"https:\/\/vweisfeld.com\/index.php?rest_route=\/wp\/v2\/posts\/2146","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vweisfeld.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vweisfeld.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vweisfeld.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/vweisfeld.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2146"}],"version-history":[{"count":1,"href":"https:\/\/vweisfeld.com\/index.php?rest_route=\/wp\/v2\/posts\/2146\/revisions"}],"predecessor-version":[{"id":2147,"href":"https:\/\/vweisfeld.com\/index.php?rest_route=\/wp\/v2\/posts\/2146\/revisions\/2147"}],"wp:attachment":[{"href":"https:\/\/vweisfeld.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2146"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vweisfeld.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2146"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vweisfeld.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2146"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}