Think there might be someone listening in?Get in Touch »
Mobile phone voice mail hacking occurs when a hacker dials into retrieve voice mail messages from phones which still have factory set PIN numbers.
A survey done recently showed that less than half of all customers in the survey used keypad locks or passwords to secure their mobile phones. Have you changed yours?
Mobile phones themselves could be used as bugging devices. They can be programmed not to vibrate, ring or show any outward signs that they are being called. They then auto-answer and the caller can listen in to conversation within the room.
This type of attack can either be done on a target phone which the buggist would then leave somewhere in the vicinity of the conversation they are targeting. Or it could be done illicitly by sending someone an email or text with an attachment which, once opened, would download the necessary software onto the target phone. The phone can then be controlled by the hacker who can then remotely switch it on and be listened to from any other mobile phone anywhere in world.
In addition, a report by Computerworld claims that some new smartphone apps are using your phones microphone and camera to gather creepy data about you! A new class of app has emerged that uses the microphone built into your phone as a covert listening device. The apps try to alleviate privacy concerns by saying they only record sound patterns, not actual sounds or conversations. But in the end, the technology is there, and it’s being used to some extent.
As a precaution you should take care when downloading apps as you could easily download malware and only download from your service providers website. An be cautious of using Wi-Fi connections. Unsecured networks could mean that someone else using that network could see what you’re doing on your phone.
Even when a GSM function is disabled on a smartphone, the in-built camera can still be used as an eavesdropping device.
Smartphones can be used to record videos/photos, stealing product information prototypes etc. As it is impossible buy a mobile phone without a camera, this is a concern which should not be ignored.
GSM bugs use mobile phone networks to enable the user to dial in to the bug from anywhere in the world in order to listen in to what is going on around the unit. Dial in to the bug from anywhere in the world and listen in to what is going on around it. The microphone is very powerful and will pick up conversations and background noises.
A GSM bug can be a small black box that can be discreetly hidden in a room or it can be a purpose built device such as a mains adaptor, a power strip adaptor, a PC mouse or a phone charger for example. These are everyday objects that one would expect to find in an office.
Two terms which are often interchanged but in fact refer to two separate types of attack are Bug and Tap. The differences are:
This is a device placed on the telephone system and is designed to intercept telephone conversations. I.e. if no call is in place then the tap is inactive.
This form of attack is a modification of the analogue telephone unit itself. As previously described, when the telephone line is active, the DC voltage on the line drops and audio is passed along the line. When the receiver is replaced, the hookswitch is opened and the voltage goes high and no audio will pass down the line. In a hookswitch bypass attack, the telephone hookswitch is modified so it appears to be in an off hook (line active) condition, even with the receiver (handset) still on hook. The disadvantage with this is that the telephone, when dialled in to, would appear to be in use. A more advanced attack would be to modify the hookswitch circuitry such that the voltage was dropped sufficiently for the equipment to make the microphone and line active and therefore pass audio. But, at the same time not dropping the voltage low enough for the phone to appear engaged (busy) if anyone were to dial into it.
This is a simple attack whereby a microphone (either the telephone mic or a secondary microphone installed by the attacker) is connected to a pair of wires and the unit thereby used to monitor room audio and pass it to a distant listening post situated somewhere on the line.
Similar to the Passive attack described above but used in a digital telephone. This would require the appropriate audio decoder to be used dependant on the make/model of the telephone being attacked.
A free space transmitter is very similar to that used as a room bug but is concealed within the telephone equipment itself. This type of attack could use its own microphone or it may utilise telephone’s microphone.
Carrier current is a method of low power AM radio transmission that uses the AC electrical system of a building to propagate a medium frequency AM signal to a relatively small area, such as a building or a group of buildings. In the some countries, carrier current stations do not require a broadcasting license.
An infinity transmitter (also known as a harmonica bug) is a surveillance device used to covertly monitor conversation in a room through a telephone line. Its name derives from the fact that, by using a telephone line as a transmitter, it can work at an infinite distance, unlike other bugging devices that have only a finite signal range. The alternative name 'harmonica bug' refers to the fact that such devices were originally activated using the tone produced by a harmonica. Not to be confused with mobile telephone type of bugs e.g. GSM bugs.
A RF(Radio Frequency) bug involves the placing of a radio transmitter in a room. One of the most infamous examples of the use of a RF bug is the “Great Seal Bug” story, when in 1952 a RF listening device was found in a carved wooden seal that had been presented to the US Embassy in Moscow and had hung in the Embassy since 1946. RF bugs can be incredibly small and can be concealed in just about anything including skirting boards, picture frames, plugs etc. Radio frequencies are given off by nearly all spying devices, and these radio frequencies can be detected with the proper equipment. Different types of bugs give off a large range of frequencies and specialist equipment is required to check the entire RF spectrum. Basic RF detectors, that can be purchased relatively cheaply, will only be able to detect limited frequencies and will give you a false sense of security.
A hidden camera is a still video camera used to film people without their knowledge. The camera is "hidden" because it is either not visible to the subject being filmed, or is disguised as another object. Hidden cameras have become popular for Business surveillance, and can be built into common household objects such as smoke detectors, clock radio, motion detectors and mobile phones. Hidden cameras may also be used commercially or industrially as security cameras.