BartBlog

March 11, 2008

ABOUT THAT CLICKING ON YOUR PHONE

Filed under: Uncategorized — kerry @ 11:51 am

about-that-clicking-on-your-phone.jpg

The FBI is hell on catching HOOKERS and ANTI-WAR GRANNIES and locking them up. 

To bad they aren’t as gung-ho on the war mongers and crooks in government. 

Anyone remember OSAMA?

EXCERPT FROM AN ARTICLE THAT EVERYONE

WHO VALUES PRIVACY SHOULD READ;

So what does it take to be an Ericsson Spook?

Not much really. Unlike real spooks who put their lives on the line, these creeps work in the comfort of an office where they easily get lost in muddled thinking and on top of all that probably get paid more for only being able to read data logs. Thanks to the digital revolution and the paranoia from September 11th, telecommunications companies have this wonderful suite of software to track and record everything you do on a network (fixed line, mobile, radio, and internet). It’s so easy, here’s a brief rundown.

  • Billing System
    Also reveals who your contacts are, when you call them and how often.
  • Recording System
    This simply records all your communications – voice, SMS/MMS, internet activity. It’s usually kept for a week unless other arrangements are made. Data can be “lifted” without anyone knowing about it.
  • Tracking System
    This is a log of the base stations your mobile phone has binded to and with what strength. Using simple algebra can pinpoint your location reasonably accurately and also the route you have taken your phone. (I also read somewhere that satellites can track SIM cards, but I’m not yet convinced this is really plausible).And the little known sneaky systems
  • Hot Microphone
    Some mobile phones allow the carrier to discreetly turn on their microphones – even when the phone is switched off!
  • Record Mode
    With the increasing memory now available in mobile phones, some phones employ smarts that allow the carrier to capture and record video and voice now then upload it all when convenient – all without the user ever knowing about it. This is related to the above as it’s only a simple case of playing with the phones low level drivers and processors.
  • Conference Call
    Next time you’re at a coffee shop making a discreet call on your mobile, the person at the other table may have tuned into your conversation using priviliged access to conference call technology.
  • Speech Recognition
    As your communications are captured in digital form, a computer processes them for key words. If you don’t believe me say “George Bush is the Terrorist” on your next call.
  • Network Tree
    This technique had it’s origins in tracking organised crime. But technology has made it so easy that now you can pin point which of Beryl’s friends will make the fresh lamingtons at the next lawn bowls tournament.

And it seems to be getting worse with the momentum of paranoid delusionists feeding into itself to create even more funding for even more integrated surveillance programs. Just look at CALEA, Xcipio/SS8, etc. When I made known how much one of the abovementioned lame arse spooks was earning, a secret investigation was launched into how I hacked the system to get that information. All the Ericsson spyware went into focus on my laptop to try and capture this imagined breach of security, even the abovementioned aircon precious executive got involved. After a week, a feeler was sent to me to ask the direct question on how I got that information. The answer was a revelation – he prints his invoices on the shared office printer.

What a monument to muddled delusionist thinking.

Ok, so now I have Telco Spook knowledge, what can I do with it?

Well, if you find yourself working in the industry, you can take advantage of systems that were designed without much internal security or accountability and mine through the data. Unlike the accountable security enforcement agencies who need to show real justifications to access this information, the telco spook’s role is there to simply maintain/manage these systems and while there can do the following:

  • Tune into stockbrokers, or CEO’s involved in buyouts/mergers to play the stock market and win big.
  • Tune into sexy or celebrity women (otherwise known as stalking, yes they are deprived).
  • Scan for lewd MMS photos (This is already a documented breach within Telstra).
  • Tune into real estate agents or sellers/buyers and never lose out.
  • And it can get even more sinister.
  • Tune into organised crime and reap the benefits by selling information.

But don’t these self-righteous do-gooders mean well?

Precisely the reason to be concerned, remember that I lost my job to unscrupulous actions by corrupt Ericsson spooks. These nerds lack real world experience and obviously if they think of themselves as holier than thou then my response is it’s only a matter of time. Nothing beats a jail sentence as a deterrent from doing illegal things, unfortunately the law can’t keep up with the pace of technological change and the changing role of surveillance that the telco industry now finds thrusted upon itself.

My how things have changed at Ericsson Australia.

The whole thing here   http://erijustice.atspace.com/

No Comments

No comments yet.

RSS feed for comments on this post.

Sorry, the comment form is closed at this time.

Powered by WordPress