imc indymedia

Los Angeles Indymedia : Activist News

white themeblack themered themetheme help
About Us Contact Us Calendar Publish RSS
Features
latest news
best of news
syndication
commentary


KILLRADIO

VozMob

ABCF LA

A-Infos Radio

Indymedia On Air

Dope-X-Resistance-LA List

LAAMN List




IMC Network:

Original Cities

www.indymedia.org africa: ambazonia canarias estrecho / madiaq kenya nigeria south africa canada: hamilton london, ontario maritimes montreal ontario ottawa quebec thunder bay vancouver victoria windsor winnipeg east asia: burma jakarta japan korea manila qc europe: abruzzo alacant andorra antwerpen armenia athens austria barcelona belarus belgium belgrade bristol brussels bulgaria calabria croatia cyprus emilia-romagna estrecho / madiaq euskal herria galiza germany grenoble hungary ireland istanbul italy la plana liege liguria lille linksunten lombardia london madrid malta marseille nantes napoli netherlands nice northern england norway oost-vlaanderen paris/Île-de-france patras piemonte poland portugal roma romania russia saint-petersburg scotland sverige switzerland thessaloniki torun toscana toulouse ukraine united kingdom valencia latin america: argentina bolivia chiapas chile chile sur cmi brasil colombia ecuador mexico peru puerto rico qollasuyu rosario santiago tijuana uruguay valparaiso venezuela venezuela oceania: adelaide aotearoa brisbane burma darwin jakarta manila melbourne perth qc sydney south asia: india mumbai united states: arizona arkansas asheville atlanta austin baltimore big muddy binghamton boston buffalo charlottesville chicago cleveland colorado columbus dc hawaii houston hudson mohawk kansas city la madison maine miami michigan milwaukee minneapolis/st. paul new hampshire new jersey new mexico new orleans north carolina north texas nyc oklahoma philadelphia pittsburgh portland richmond rochester rogue valley saint louis san diego san francisco san francisco bay area santa barbara santa cruz, ca sarasota seattle tampa bay tennessee urbana-champaign vermont western mass worcester west asia: armenia beirut israel palestine process: fbi/legal updates mailing lists process & imc docs tech volunteer projects: print radio satellite tv video regions: oceania united states topics: biotech

Surviving Cities

www.indymedia.org africa: canada: quebec east asia: japan europe: athens barcelona belgium bristol brussels cyprus germany grenoble ireland istanbul lille linksunten nantes netherlands norway portugal united kingdom latin america: argentina cmi brasil rosario oceania: aotearoa united states: austin big muddy binghamton boston chicago columbus la michigan nyc portland rochester saint louis san diego san francisco bay area santa cruz, ca tennessee urbana-champaign worcester west asia: palestine process: fbi/legal updates process & imc docs projects: radio satellite tv
printable version - js reader version - view hidden posts - tags and related articles

Phone Privacy?

by anonymous Tuesday, Sep. 19, 2017 at 1:42 PM

I'm guessing the big-dogs probably have a way to make private phone calls; so I'm wondering what kind of person I should ask about the successful methods. I mean, I could ask a PI, get to know a phone company technician and offer an honorarium for good info, etc. I'll bet some people still have privacy. How can I approach such people and ask the right questions?

A burner-phone is an obvious choice; but unless you want to throw these away after every phone call, I think a little more effort is required. An idea I came up with a few years ago is SIM-Swapping. Let's say all-my-friends and I go out and buy a bunch of pre-paid SIM cards, that can be refilled with cash vouchers and then just swap them with each other? There is also software available for smartphones and there are purpose-built non-smartphones (the kinds with real buttons) that allow the user to manually or automatically set, on each reboot, the IMEI number. This may technically be illegal, in some jurisdictions, but these apps and phones exist; and since SIM cards became universally adopted, the theft of someone else's minutes is no longer a possibility. This is now only an administrative-law issue, where it is prohibited; and the violators people who are willing to risk being prosecuted, to take-back their privacy. So, now that I have the two most common attack-vectors covered; what are the others? I'm guessing voice-recognition. I have been told openly by people who should know, that it is. So to cut the third tentacle off of this octopus, how do you defeat voice-recognition? How does voice recognition software work? What are its vulnerablilities?

After spending at least a year researching every lame technology I could find on ebay, amazon and every spy-shop I could find, I came to the conclusion that, the technology really didn't exist, or knowledge of its existence was being strenuously suppressed. So, I decided to "punt" and came up with the following "untried" idea. What if I were to take a text-to-speech application like "Dragon-Naturally-Speaking" and write a shell-script that would take the resulting text file and reconvert it back-to-speech in real-time, deleting the original text file, in the process, using one of the pre-programmed "voices" available in the app? Would this sound real-enough to the monitoring software or human-operator to avoid triggering further scrutiny? I suspect I could get something like this running on a laptop; and it would probably be slow, at least in the alpha development phase. Now supposing I get this far, what else should I do?

There are two other attack vectors I can think of, location and contacts. All phones, smart and legacy can be located by cell-tower. Smart phones, additionally, explicitly provide location information to the network, based on GPS, unless this feature is manually turned off. So is there a way to force my phone, smart or legacy, to connect to a non-local cell tower? Of course, this will have to be within the maximum operating range of the phone itself, assuming no external signal amplification. Maybe, I can even create some kind of mixer, so that my signal gets mixed with all my friend's signals (maybe the whole neighborhood's) before going to the cell tower; and then groups of friends could collaborate with groups of friends, so a mixer is always near by? A confederation perhaps?

Ok, so lets say we have location licked, the last attack vector I can think of is my contact-list, the people I normally call. So, the determined hacker-spy-etc, is monitoring the phones of one-or-all of my contacts, waiting for me to call. Until my contact answers, I've beaten monitoring of my phone "number" by SIM-CARD swapping, monitoring of my "phone" by changing my IMEI, monitoring of my location, by turning-off GPS and by signal mixing before-the-tower, now my friend answers his phone. So, now I beat voice recognition, by changing my voice to sound like the cutest highschool cheerleader ever; and the knucklehead monitoring the call is falling-in-love with me... Now my contact and I need a way to disguise what we're talking about, not so much to disguise the content of the call, but to disguise the identity of the caller (me). Now, we have to be Navajo-Code-Talkers, on top of everything previously mentioned. The only other thing I can think off to add to this mix is end-to-end encryption, which probably can't be relied on anymore because the government NOW has 2048qbit-quantum-computers from D-Wave-Systems of Canada, specifically the D2000.

https://www.dwavesys.com/

Also see:

https://www.youtube.com/watch?v=60OkanvToFI

Now, let's again suppose, that we've beaten all of the technical hurdles above, the final obstacle to overcome is "social-engineering." Let's face it MOST humans are sell-outs; and for a very low wage at that. Very often, the only motivations necessary are currying favor, with the authorities, or getting an advantage over a co-worker. The "Four-City-Survey" of Holocaust survivors in Germany after WWII, documented the motivations stated above as the MAIN reasons German nationals turned in their Jewish neighbors and co-workers to the Gestapo. I've read similar accounts of domestic servants turning-in their employers during the "Spanish Inquistion." It's the same in every age. My own "informal" statisics reveal that in excess of 50% of the population can be motivated in this way. Actually, the percentage is much greater. This was confirmed to me, by a "professional." The movie "Gangs-Of-New-York" had one of its characters state, "You can always hire one-half of the poor to murder the other half. This is a true statement. So the final and most important thing to do is make sure you surround yourself with good people; but this is extremely difficult to do, because truely moral people, who live in the agora, are in a very small minority. Most of the time we have to deal with "rats."

And lastly, if you employ servants, pay them and screen them well; and always be-on-the-lookout for "tradecraft." Get rid of these characters quickly.

Report this post as:

LATEST COMMENTS ABOUT THIS ARTICLE
Listed below are the 10 latest comments of 1 posted about this article.
These comments are anonymously submitted by the website visitors.
TITLE AUTHOR DATE
I\'m using signal Me Friday, Sep. 22, 2017 at 12:32 AM

Local News

Change Links September 2018 posted S02 10:22PM

More Scandals Rock Southern California Nuke Plant San Onofre A30 11:09PM

Site Outage Friday A30 3:49PM

Change Links August 2018 A14 1:56AM

Setback for Developer of SC Farm Land A12 11:09PM

More problems at Shutdown San Onofre Nuke J29 10:40PM

Change Links 2018 July posted J09 8:27PM

More Pix: "Families Belong Together," Pasadena J02 7:16PM

"Families Belong Together" March, Pasadena J02 7:08PM

Short Report on the Families Belong Together Protest in Los Angeles J30 11:26PM

Summer 2018 National Immigrant Solidarity Network News Alert! J11 6:58AM

Watch the Debate: Excluded Candidates for Governor of California M31 5:20AM

Change Links June 2018 posted M28 7:41AM

The Montrose Peace Vigil at 12 Years M22 8:01PM

Unity Archive Project M21 9:42AM

Dianne Feinstein's Promotion of War, Secret Animal Abuse, Military Profiteering, Censorshi M17 10:22PM

CA Senate Bill 1303 would require an independent coroner rather than being part of police M10 9:08PM

Three years after OC snitch scandal, no charges filed against sheriffs deputies M10 8:57PM

California police agencies violate Brown Act (open meetings) M02 8:31PM

Insane Company Wants To Send Nuke Plant Waste To New Mexico A29 11:47PM

Change Links May 2018 A27 8:40AM

Worker-Owned Car Wash on Vermont Closed A27 5:37AM

GUIDE TO REBEL CITY LOS ANGELES AVAILABLE A13 12:39AM

lausd whistle blower A11 6:58AM

Website Upgrade A10 10:02AM

Help KCET and UCLA identify 60s-70s Chicano images A04 8:02PM

UCLA Luskin: Casting Youth Justice in a Different Light A02 6:58PM

Change Links April 2018 A01 6:27PM

More Local News...

Other/Breaking News

Finance Capitalism and the Digital Economy S21 4:45PM

Muselières syndicales, muselières patronales S21 7:19AM

Jeff Bezos, Amazon, The Washington Post, Whole Foods, Etc S21 2:50AM

Why Choose Nut Milk Over Cows' Milk S21 1:01AM

Antrhopocène, le grand effondrement S19 9:53AM

Creative Destruction Hack Diamonds Windows/iOS/Android - Creative Destruction Generator S19 12:51AM

Abolir l'économie S18 11:18AM

The Dictatorship of Corporations S17 5:26PM

18 Lethal Consequences Of Hunting S17 3:13PM

Paraphysique de l'outplacement déontologue S15 6:51AM

Creative Destruction Hack Mod Generator S15 3:49AM

Shopping du bashing S14 8:42AM

After Lehman Brothers, Experts Say Global Financial Crisis Can Happen Again S13 8:28PM

“Animaniacs in Concert!” Starring Voice Legend Rob Paulsen S12 9:30PM

Probabilités de fin d'humanité S12 6:49AM

Florida Area of Migrant Farmworkers Denied Right to Construct Health Clinic near NaplesCIW S11 2:57AM

Propagande de virus, virus de propagande S10 7:34AM

Steer clear of work morality! S09 12:10PM

Sweatshop Lodge Ceremony Continues in US Fed Prisons Led by Inmates S08 6:17PM

Paraphysique de l'origami S08 7:11AM

The Shortwave Report 09/07/18 Listen Globally! S06 11:23PM

August 2018 Honduras Coup update S06 12:28PM

Du réussissement putréfié S06 10:55AM

Brett Kavanaugh Filled The 5th Circuit With Execution Judges S06 6:14AM

Log S06 4:25AM

Augusta Georgia Woman Gets 5 Year Prison Sentence for Writing About Russians Crime Acts S05 8:29AM

Paraphysique de contextualité S05 8:29AM

Crisis Regulation in Global Capitalism S03 3:39PM

More Breaking News...
© 2000-2018 Los Angeles Independent Media Center. Unless otherwise stated by the author, all content is free for non-commercial reuse, reprint, and rebroadcast, on the net and elsewhere. Opinions are those of the contributors and are not necessarily endorsed by the Los Angeles Independent Media Center. Running sf-active v0.9.4 Disclaimer | Privacy