"There are probably 100 such sites" known to security officials at
Verizon Wireless that offer to sell phone records, said Jeffrey
Nelson, a company spokesman, who said Verizon is always trying to
respond to abusive practices. He said that the company views all such
activity as illegal and that "we have historically, and will continue
to, change policies to reflect the changing nature of criminal
activity," though he declined to be specific.
http://www.washingtonpost.com/wp-dyn/content/article/2005/07/07/AR2005070701862_pf.html
It seems that at this time the content of SMS (which is 'dialed' not
'spoken' soes not require a serach warrant:
Issue is in litigation:
"Judge Smith correctly recognized that the privacy protections for
your phone calls shouldn't depend on whether the information you are
communicating is spoken or dialed,
Those decisions revealed that government investigators had routinely
been tracking cell phones for years without getting warrants based on
frivolous legal arguments.
July 21, 2006
Judge's Refusal to Dismiss EFF's Spying Case Sets Stage for Congressional Showdown
Ruling Comes as Senators Consider Dramatic Changes to Surveillance Law
https://www.eff.org/news/archives/2006_07.php
Currently, law is not clear:
WASHINGTON, D.C. -- The cell-phone industry and privacy advocates are
calling on Congress to clarify the widespread police practice of using
mobile phones to track suspects without probable cause
http://www.wired.com/news/politics/privacy/0,70829-0.html
There are other possibilities:
First, if your boss provides your super-phone you should be aware of
the possibility of monitoring. For more information see our Fact Sheet
7on workplace monitoring available at
www.privacyrights.org/fs/fs7-work.htm.
The second precaution to keep in mind is that when you synchronize
your cell phone with your computer you are putting both devices at
risk for viruses. Similar to precautions you would take with personal
computer use, do not open unfamiliar attachments or files on your
phone because they are likely to be harmful. Currently, cell phone
viruses are designed in such a way that they can only infect your
phone if you click "yes" to a request to install a document or
application, such as games, pictures, songs, or ringtones. You should
only download documents or applications from trusted sources.
If your cell phone becomes infected because of the Bluetooth feature,..
http://www.privacyrights.org/fs/fs2b-cellprivacy.htm
First Trojan Spy for Symbian Phones
http://www.edu-cyberpg.com/Technology/cell_phone.html
Finally, the content of the message is encrypted, - but encryption can be broken
Researchers Crack Code In Cell Phones
by John Markoff Issue: Encryption : New York Times (D1,D5)
<http://www.nytimes.com/library/tech/98/04/biztech/articles/14phone.html>
Description: A group of Univ. of California computer researchers
announced Monday that they had successfully cracked the world's most
widely used encryption code that is designed to prevent the cloning of
digital cellular phones.
http://www.edu-cyberpg.com/Technology/cell_phone.html
The last option (cracking the encryption) is unlikely in a case of a domestic
problem - unless she happens to be dating someone at the NSA :-)
This applies to digital cell phones; the older analog phone calls were
intercepted easier:
http://www.efc.ca/pages/media/cnet.25jun99.html
Hedgie |
Clarification of Answer by
hedgie-ga
on
01 Aug 2006 19:59 PDT
cescoffy-ga
When you say:
"something that would let her see my phone ID even if I tried to hide
it from my phone.
Is this so?"
Do you mean: can she see ID of your phone, on her phone (or scanner) when you
call a third person? Or when you call her with display of your ID switched off?
Do you call from the same location (same house) where she is?
It is not possible to determine exactly what is going on, without much more
data and inspection of the actual phone. I can only tell you in general how
the cell phone works:
Whenever you make a call, IMEI of your phone is transmitted (even if your
ID display is hidden). IMEI is identification number of the handset,
independent of the SIM. This number is 'hardwired' to the handset,
same for
pre-paid SIMs or subscription. It is necessary for operator to route the calls.
Details:
IMEI is short for International Mobile Equipment Identity, a unique
number given to every single mobile phone, typically found behind the
battery.
The IMEI (International Mobile Equipment Identity) number can be
displayed on most phones by dialing the code *# 06 #.
[
http://www.gsm-security.net/faq/find-imei-international-mobile-equipment-identity-gsm.shtml
]
brackets [ ... ] are used to indicate long URLs (web-addresses) -
whole inside of the bracket needs to be pasted.
So, answer is yes. It is physically possible to identify the phone - but
it is not something a normal customer can do.
Naturally, operator has the record of the IMEIs and the records can indicate
that different SIMS were used in the same handset.
Concerning:
" I called her cell using a SIM card from another network .."
Imagine that someone would make threatening or blackmail phone call to
a 'victim' using an anonymous (prepaid) SIM. Law enforcement can in such a
case obtain the records and identify the perpetrator. Normally, it requires
a court order. In US, mobile phones also use GSP to determine your location.
see:
http://answers.google.com/answers/threadview?id=449852
I repeat - this information is not available to a customer, but can
be made available to law enforcement agency. One hopes it still
requires a court order.
Somewhat more accessible to the public is the GSM scanner. GSM is
using (three microwave bands) of the spectrum. Scanner will not
decode the content,, but can
determine that someone in the house is making a call. It is normally used by
a trained test technician.
Example:
The Seven.Five Multi-Band, Multi-Technology RF Scanner, from Comarco,
Inc. through its Wireless Test Solutions (WTS) group, is the most
advanced and accurate scanner for wireless field-test applications.
http://www.3g.co.uk/PR/May2003/5337.htm
http://www.zk.com/support/release_info.html
So, (as in any 'secure' transmission) question is not 'is it possible?'
but 'how hard it is?' 'how much time and resources is available' to break
the privacy of a transmission.
For normal, day to day, typical conversations, GSM communication can
be considered private.
For extra security businesses use scrambled phones.
http://www.pimall.com/NAIS/cordless.html
http://www.privacy.org/pi/reports/bug_off.html
http://www.tscm.com/stu.html
Another general rule is: If you have 'physical control of the device' e.g.
computer - you can break (almost) any protection scheme. Erased
memory can be read etc. It is an issue of time and money and
expertise.
It just is unlikely that anyone would go the trouble to use those methods and
measures in mundane case of a marital spat or divorce.
To see if physical security of the phone was compromised (if something was
installed into the phone) you would need a phone itself examined by
an technician. An expert technican. There is a number of covert
listening devices
on the market.
http://en.wikipedia.org/wiki/Covert_listening_device
Hedgie
|