NoGoolag
4.54K subscribers
13.1K photos
6.88K videos
587 files
14.1K links
Download Telegram
A Quick and Dirty Guide to Cell Phone Surveillance at Protests

As uprisings over police brutality and institutionalized racism have swept over the country, many people are facing the full might of law enforcement weaponry and surveillance for the first time. Whenever protesters, cell phones, and police are in the same place, protesters should worry about cell phone surveillance.

Often, security practitioners or other protesters respond to that worry with advice about the use of cell-site simulators (also known as a CSS, IMSI catcher, Stingray, Dirtbox, Hailstorm, fake base station, or Crossbow) by local law enforcement. But often this advice is misguided or rooted in a fundamental lack of understanding of what a cell-site simulator is, what it does, and how often they are used.

The bottom line is this:
there is very little concrete evidence of cell site simulators being used against protesters in the U.S. The threat of cell site simulators should not stop activists from voicing their dissent or using their phones. On the other hand, given that more than 85 local, state, and federal law enforcement agencies around the country have some type of CSS (some of which are used hundreds of times per year), it’s not unreasonable to include cell site simulators in your security plan if you are going to a protest and take some simple steps to protect yourself.

💡 Surveillance Self-Defense - Your Security Plan:
https://ssd.eff.org/en/module/your-security-plan

👉🏼 Read more:
https://www.eff.org/deeplinks/2020/06/quick-and-dirty-guide-cell-phone-surveillance-protests

#surveillance #police #usa #defence #phone #CSS #SecurityPlan
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
How Cops Can Secretly Track Your Phone

A guide to stingray surveillance technology, which may have been deployed at recent protests.

Since May, as protesters around the country have marched against police brutality and in support of the Black Lives Matter movement, activists have spotted a recurring presence in the skies: mysterious planes and helicopters hovering overhead, apparently conducting surveillance on protesters. A press release from the Justice Department at the end of May revealed that the Drug Enforcement Agency and U.S. Marshals Service were asked by the Justice Department to provide unspecified support to law enforcement during protests.

https://theintercept.com/2020/07/31/protests-surveillance-stingrays-dirtboxes-phone-tracking/

#us #phone #tracking #surveillance
NSA urges military personnel to turn off cellphone location data

The National Security Agency is urging US military and intelligence personnel to turn off location-sharing services on their cellphones to prevent security breaches.

The secretive intelligence agency warned in a bulletin Tuesday that the common app feature can pose a real threat to national security, The Wall Street Journal reported.

Location-sharing can be critical for the function of apps like Google Maps, but the information it collects about users’ whereabouts is also collected by tech companies that then sell the anonymized data to marketers and advertisers.

https://nypost.com/2020/08/04/nsa-presses-military-to-turn-off-cell-phone-location-data/

#us #NSA #military #phone #location
Thousands of Cheap Android Phones in Africa Were Pre-Installed With Malware

The hard-to-remove Triada malware was getting preinstalled on thousands of Tecno W2 handsets from a Chinese company called Transsion, according to security research from Upsteam Systems.

Thousands of cheap Android smartphones were getting sold in Africa with malware already pre-installed onboard, according to new security research.

On Monday, the mobile company Upstream Systems published a report on how a nasty malware strain known as Triada has been preying on low-income consumers in over a dozen African countries.

Usually malware ends up on an Android device after the owner installs a fake third-party app that contains malicious code. However, Upstream noticed the Triada malware was getting preinstalled on thousands of Tecno W2 handsets from a Chinese company called Transsion before getting sold to local consumers in countries such as Ethopia, Cameroon and Egypt.

https://www.pcmag.com/news/thousands-of-cheap-android-phones-in-africa-were-pre-installed-with-malware

#Africa #Transsion #Android #phone #malware
How Your Phone Is Used to Track You, and What You Can Do About It

Smartphone location data, often used by marketers, has been useful for studying the spread of the coronavirus. But the information raises troubling privacy questions.

As researchers and journalists try to understand how the coronavirus pandemic is affecting people’s behavior, they have repeatedly relied on location information from smartphones. The data allows for an expansive look at the movements of millions of people, but it raises troublesome questions about privacy.

In several articles, The New York Times has used location data provided by a company called Cuebiq, which analyzes data for advertisers and marketers. This data comes from smartphone users who have agreed to share their locations with certain apps, such as ones that provide weather alerts or information on local gas stations.

https://www.nytimes.com/2020/08/19/technology/smartphone-location-tracking-opt-out.html

#phone #location #privacy #surveillance
Wyden and Warren Demand Investigation into IRS Warrantless Location Tracking

A unit of the IRS previously bought access to location data harvested from ordinary apps installed on peoples’ phones to try and identify individuals.

Ron Wyden and Elizabeth Warren want a formal investigation into the IRS' use of smartphone location data to track Americans without a warrant.

On Thursday, the two Senators sent a letter to the body tasked with oversight of the IRS demanding it investigate how a section of the IRS bought access to this data.

The news highlights the continued tread of law enforcement agencies obtaining location data that would ordinarily require a warrant to do, by simply purchasing the data from commercial providers instead.

https://www.vice.com/en_us/article/xg8by3/irs-phone-tracking-warrant-wyden-warren

#US #IRS #phone #tracking #privacy #surveillance
Media is too big
VIEW IN TELEGRAM
Betrusted

https://betrusted.io

A prototype security-foccussed open-software/hardware device (akin to a PDA) for delegating your sensitive information and tasks to. It has a microkernel and userspace in rust and the development version uses a reconfigurable FPGA instead of a CPU.

Betrusted is a secure and private communications system. It gives users an evidence-based reason to believe that private matters are kept private.

Betrusted is more than just an app, and more than just a gadget – it is a co-designed hardware + software solution that provides safe defaults for everyday users. It’s also open source, empowering advanced users to analyze, extend and explore this secure mobile computer.


#betrusted #mobile #phone #alternatives
The FBI Team Sent to ‘Exploit’ Protesters’ Phones in Portland

https://www.nybooks.com/daily/2020/10/08/the-fbi-team-sent-to-exploit-protesters-phones-in-portland

The FBI’s Washington, D.C., headquarters sent agents from its “Fly Team,” an elite counterterrorism unit, to Portland this summer during the second weekend in July. Their task was to interview arrested protesters and carry out the “initial exploitation of phones, or other communication devices,” according to FBI emails obtained through a public records request. It is unclear whether the Fly Team operation extended either past that weekend or beyond Portland, but the emails suggest that the FBI has been using counterterrorism tools and powers to map left-wing protest networks just months before an election whose result is likely to be delayed, if not challenged.


#usa #phone #exploit #protesters #cops #fbi
Revealed: China suspected of spying on Americans via Caribbean phone networks

Security expert claims Chinese surveillance may have affected tens of thousands of Americans

China appears to have used mobile phone networks in the Caribbean to surveil US mobile phone subscribers as part of its espionage campaign against Americans, according to a mobile network security expert who has analysed sensitive signals data.

The findings paint an alarming picture of how China has allegedly exploited decades-old vulnerabilities in the global telecommunications network to route “active” surveillance attacks through telecoms operators.

The alleged attacks appear to be enabling China to target, track, and intercept phone communications of US phone subscribers, according to research and analysis by Gary Miller, a Washington state-based former mobile network security executive.

https://www.theguardian.com/us-news/2020/dec/15/revealed-china-suspected-of-spying-on-americans-via-caribbean-phone-networks

#China #US #mobile #phone #networks #intelligence #spy #surveillance
Find lost phone

Finder
Remote mobile phone searching via SMS-requests
https://f-droid.org/app/ru.seva.finder

Simple sms remote
Control your device by sending text messages https://f-droid.org/app/tranquvis.simplesmsremote

Flyve MDM Agent
Manage and secure effectively your mobile devices and applications
https://f-droid.org/app/org.flyve.mdm.agent.mqtt

FIND3 Scanner
Scan Bluetooth and WiFi for FIND3
https://f-droid.org/app/com.internalpositioning.find3.find3app

Prey
https://github.com/prey/prey-android-client
https://play.google.com/store/apps/details?id=com.prey

PhoneTrack Nextcloud application
https://apps.nextcloud.com/apps/phonetrack

Traccar open source GPS tracking system
https://github.com/traccar/traccar/blob/master/README.md

Ulogger
https://github.com/bfabiszewski/ulogger-android


#find #lost #phone #device
pgpp-arxiv20.pdf
7.1 MB
Pretty Good Phone Privacy

To receive service in today’s cellular architecture, phones uniquely identify themselves to towers and thus to operators. This is now a cause of major privacy violations, as operators sell and leak identity and location data of hundreds of millionsof mobile users.

In this paper, we take an end-to-end perspective on thecellular architecture and find key points of decoupling that enable us to protect user identity and location privacy with no changes to physical infrastructure, no added latency, and no requirement of direct cooperation from existing operators.

https://raghavan.usc.edu/papers/pgpp-arxiv20.pdf

#phone #privacy #study #pdf
📡@cRyPtHoN_INFOSEC_FR
📡
@cRyPtHoN_INFOSEC_EN
📡
@cRyPtHoN_INFOSEC_DE
📡
@BlackBox_Archiv
📡
@NoGoolag
Loans that hijack your phone are coming to India

Lenders are turning to coercive loan apps that shut down smartphones if customers fall behind on payments.

Last December, 28-year-old Roshan Zameer was gripped with panic. His phone had suddenly stopped working. As an electrical repairman in the outskirts of Bangalore, Zameer needed to make a call to check if the main electricity line was turned off before he started work at a building: information crucial to his safety. A message appeared on his screen: “Pls pay the amt via online through our website to unlock your device.” His Samsung Galaxy A71 phone was then blocked by a pre-installed app, restricting access to all of his phone’s functions, including the ability to make phone calls.

Zameer had bought the cellphone secondhand online in August. The original owner, it turns out, purchased it with the promise of paying off the device through equated monthly installments (EMI), a fixed payment schedule. Zameer didn’t know the phone was on a payment plan until the day after he bought it. 15 days after he purchased it, the device automatically locked and alerted him that he was roughly $40 behind. He’s been stuck paying monthly installments ever since.

https://restofworld.org/2021/loans-that-hijack-your-phone-are-coming-to-india/

#India #loans #phone #hijack #privacy
recycled-numbers-latest.pdf
347.8 KB
Security and Privacy Risks of Number Recycling at Mobile Carriers in the United States

35 million
phone numbers are disconnected in the U.S. every year. Standard industry practice is to reassign those numbers to other subscribers. But this leads to many types of security and privacy risks, which our study analyzes rigorously.

https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf

https://recyclednumbers.cs.princeton.edu/

#security #privacy #phone #number #recycling #usa #mobile #carriers #pdf
📡 @nogoolag 📡 @blackbox_archiv
Red
Redirect outgoing calls to Signal/Telegram/Threema.

Tiny app to redirect outgoing calls to Signal/Telegram/Threema if available.
You can cancel redirection by clicking on "Redirecting to.." popup.

Download - https://github.com/x13a/Red/releases

https://github.com/x13a/Red

#new #phone

@foss_Android
Media is too big
VIEW IN TELEGRAM
Assange once said, “A mobile phone is a tracking device that also makes calls”. He’s not wrong. There are countless ways that phones track our movements, and one of them is via WiFi probe requests.

In this video we explain how your phone automatically connects to your WiFi whenever you return home or to your favorite coffee shop, and why it leaves your device vulnerable to all kinds of attacks and surveillance -- it can allow people to maliciously intercept your internet traffic, track you, or find out personal information about you.

Main takeaways:
Turn your WiFi OFF when you're not using it
Don't automatically connect to WiFi networks
Forget networks after joining them
Keep your OS and device updated https://youtu.be/poaqwozBqHY

@GeopoliticsAndEmpire
#wifi #phone