top
International
International
Indybay
Indybay
Indybay
Regions
Indybay Regions North Coast Central Valley North Bay East Bay South Bay San Francisco Peninsula Santa Cruz IMC - Independent Media Center for the Monterey Bay Area North Coast Central Valley North Bay East Bay South Bay San Francisco Peninsula Santa Cruz IMC - Independent Media Center for the Monterey Bay Area California United States International Americas Haiti Iraq Palestine Afghanistan
Topics
Newswire
Features
From the Open-Publishing Calendar
From the Open-Publishing Newswire
Indybay Feature

Phone Privacy?

by anonymous
I'm guessing the big-dogs probably have a way to make private phone calls; so I'm wondering what kind of person I should ask about the successful methods. I mean, I could ask a PI, get to know a phone company technician and offer an honorarium for good info, etc. I'll bet some people still have privacy. How can I approach such people and ask the right questions?
I'm guessing the big-dogs probably have a way to make private phone calls; so I'm wondering what kind of person I should ask about the successful methods. I mean, I could ask a PI, get to know a phone company technician and offer an honorarium for good info, etc. I'll bet some people still have privacy. How can I approach such people and ask the right questions?

A burner-phone is a obvious choice; but unless you want to throw these away after every phone call, I think a little more effort is required. An idea I came up with a few years ago is SIM-Swapping. Let's say all-my-friends and I go out and buy a bunch of pre-paid SIM cards, that can be refilled with cash vouchers and then just swap them with each other? There is also software available for smartphones and there are purpose-built non-smartphones (the kinds with real buttons) that allow the user to manually or automatically set, on each reboot, the IMEI number. This may technically be illegal, in some jurisdictions, but these apps and phones exist; and since SIM cards became universally adopted, the theft of someone elses minutes is no longer a possibility. This is now only an administrative-law issue, where it is prohibited; and the violators people who are willing to risk being prosecuted to take-back their privacy. So, now that I have the two most common attack-vectors covered; what are the others? I'm guessing voice-recognition. I have been told openly by people who should know, that it is. So to cut the third tentacle off of this octopus, how do you defeat voice-recognition? How does voice recognition software work? What are its vulnerablilities?

After spending at least a year researching every lame technology I could find on ebay, amazon and every spy-shop I could find that the technology really didn't exist, or knowledge of its existence was being strenuously suppressed. So, I decided to punt and came up with the following untried idea. What if I were to take a text -to-speech application like "Dragon-Naturally-Speaking" and write a shell-script that would take the resulting text file and reconvert it back-to-speech in real-time, deleting the original text file, in the process? Using one of the per-programmed "voices" available in the app? Would this sound real-enough to the monitoring software or human-operator to avoid triggering further scrutiny? I suspect I could get something like this running on a laptop; and it would probably be slow, at least in the alpha development phase. Now supposing I get this far, what else should I do?

There are two other attack vectors I can think of, location and contacts. All phones, smart and legacy can be located by cell-tower. Smart phones additionally explicitly provide location information to the network, based on GPS, unless this feature is manually turned off. So is there a way to force my phone, smart or legacy, to connect to a non-local cell tower? Of course, this will have to be within the maximum operating range of the phone itself, assuming no external signal amplification. Maybe, I can even create some kind of mixer, so that my signal gets mixed with all my friend's signals (maybe the whole neighborhood's) before going to the cell tower; and then groups of friends could collaborate with groups of friends, so a mixer is always near by? A confederation perhaps?

Ok, so lets say we have location licked, the last attack vector I can think of is my contact-list, the people I normally call. So, the determined hacker-spy-etc, is monitoring the phones of one-or-all of my contacts, waiting for me to call. Until my contact answers, I've beaten monitoring of my phone "number" by SIM-CARD swapping, monitoring of my "phone" by changing my IMEI, monitoring of my location, by turning-off GPS and by signal mixing before-the-tower, now my friend answers his phone. So, now I've beaten voice recognition, by changing my voice to sound like the cutest highschool cheerleader ever. So, the knucklehead monitoring the call is falling-in-love with me. Now my contact and I need a way to disguise what we're talking about, not so much to disguise the content of the call, but to disguise the identity of the caller (me). Now, we have to be Navajo-Code-Talkers, on top of everything previously mentioned. The only other thing I can think off to add to this mix is end-to-end encryption, which probably can't be relied on anymore because the government NOW has 2048qbit-quantum-computers from D-Wave-Systems of Canada, specifically the D2000.

https://www.dwavesys.com/
We are 100% volunteer and depend on your participation to sustain our efforts!

Donate

$200.00 donated
in the past month

Get Involved

If you'd like to help with maintaining or developing the website, contact us.

Publish

Publish your stories and upcoming events on Indybay.

IMC Network