Security Flaws Allow Wiretaps to be Evaded 191
An anonymous reader writes "The New York Times is reporting that a team of researchers led by Matt Blaze has discovered that technology used for decades by law enforcement agents to wiretap telephones has a security flaw that allows the person being wiretapped to stop the recorder remotely. It is also possible to falsify the numbers dialed. The flaws are detailed in a paper being published by the IEEE. Someone who thinks he's being wiretapped can apparently just send a low tone down the line that turns off the recorder. The link has a demo."
Is this is a big deal? (Score:2, Insightful)
Re:Is this is a big deal? (Score:5, Insightful)
But sometimes... (Score:5, Interesting)
Re:But sometimes... (Score:2, Insightful)
Smart move if you can get away with it.
LI (lawful intercept) costs many millions every year. The general trend (amongst the larger police states at least) has been to "mitigate" this cost by simply legislating that the carriers must provide these services and must provide them at no cost to the requestor. This leaves the carriers eating a great whacking cost for the privilege being throw
Re:But sometimes... (Score:2)
Supposedly, a similar thing happened in the U.S. and Canada a while back. In this case, the respective governemnts did pay for the wiretapping service but due to a bug in the telcos software, the customer was char
Re:Is this is a big deal? (Score:2)
Better hope then that the powers-that-be don't read Slashdot
Re:Is this is a big deal? (Score:2)
Re:Is this is a big deal? (Score:3, Insightful)
Where's the big deal?
except (Score:2)
As soon as the equipment starts getting gaps in it, they will replace it with newer equipment.
It might work once, but that ahd be the only time you give away in clues/evidence on the phone line.
Re:Is this is a big deal? (Score:5, Insightful)
Do you want the truth?
You can't handle the truth!
The truth is that in the current environment, you can't trust anything. Use your PC to scramble the call. If its that sensitive, anything else is foolish. Or use a one-time pad to encode it.
Think of it, if you were the "powers that be", isn't this how you'd do it?
quickest way to Cuba (Score:5, Funny)
Re:quickest way to Cuba (Score:2)
Re:quickest way to Cuba (Score:2)
In other news... (Score:5, Insightful)
I mean, any dolt can PGP [pgp.com] or GnuPG [gnupg.org] encrypt a message or just hand deliver messages. Things like wiretaps are good for the duller knives in the drawer. We should still use them to "grab the low hanging fruit" and look elsewhere to capture the rest.
If a person knows he's being wire tapped, he won't say anything incriminating anyway, and if the feds/cops don't get what they want over the phone, they'll just bug some offices instead.
Re:In other news... (Score:3, Informative)
Seriously, if I were planning a crime or terrorist act, you bet your ass I would encode all communication in some way -- whether it be encrypted emails or just a word code system over the phone that changes each time. This is similar to the Cold War days, when spies would leave innocent-looking messages in public places. Essentially, a non-computerized version of steganography.
Where there is a will, there is a way. Where there is a stupid or lazy criminal, there is a prison sentence.
Re:In other news... (Score:5, Funny)
Re:In other news... (Score:3, Insightful)
Sending encrypted e-mails, for example, when nobody else in the world is doing so, is like putting a huge sign on your front lawn saying, "INTRIGUING SECRETS ARE GOING ON IN HERE!".
Remember that cryptography is only one link in the information security chain, and that everything has to get back to plaintext eventually. Once the feds are interested in your dat
Re:In other news... (Score:2)
Re:In other news... (Score:2)
Perhaps an organization could use the AA*s to work around this ? Person A shares some files that have names that vaguely represents some movies or songs produced at some point in history. Person B infiltrates AA*s and sends the command to act by sending a Cease and Desi
Re:In other news... (Score:2)
Well, there's ways to get around that. You can set up a chain of nym servers that have everything PGP encrypted and headers stripped as it bounces all over the world. VERY hard to trace...
If you're really paranoid...you don't even have the emails come to you via email...last stop has each message, still encrypted, and posted to a USENET group...they would have a hard time finding who got the message from there
Re:In other news... (Score:2)
Or just breaking into your house and copying the contents of your hard drive. MI5 used to do it in the 60's and 70's all the time to keep upto date with communist party goings on. Highly illegal of course and it wouldn't be admissable in court but once they know what (and when) your doing it would be easy to catch you in the act, so to speak. If 'they' want to know what your doing chances are they'
4-5-4-1-oh-oh-oh (Score:2)
He'll know the code is broken.
Tell him the dog is turning red.
Re:In other news... (Score:5, Insightful)
The only groups these wiretaps hurt are the law-abiding citizens. The smart (read: dangerous) criminals have it all figured out-- Prepaid cell phones.
Pre-paid cell phones are literally disposable, one-use toys to the bad guys. You don't even need a fake ID, just cash, and not all that much at that. How can they tap your phone when you use a different phone for each call? The best they could do is tap all the pre-paid phones and listen to every conversation out there -- good luck with that! (wanna bet the NSA is big into voice recognition?)
Re:In other news... (Score:2)
But for how long will this be an option? Where I live, even pre-paid phones have to be registered, before they are activated!
Re:In other news... (Score:2)
Re:In other news... (Score:3, Informative)
For the sake of free communication, I hope this stays like that in the UK then.
On a sidenote, there were some interesting papers published at this years Cyber Safety conference [ox.ac.uk]. Especially interesting in our context: Prepaid Mobile Phones: the Anonymity Question [ox.ac.uk] by Gordon Gow.
Who ya gonna call? (Score:3, Insightful)
You don't need to tap the prepaids, you just need to tap the numbers that the prepai
High tech phone number exchange devices (Score:2)
Very cheap, if the alternative is going to jail.
Re:In other news... (Score:3, Interesting)
At a recent IEEE conference, I noticed a large number of researchers' topics concerned voice recongition and voice synthesis.
Although I'm not sure for who they were working or from where the funding came. (Plus, it was an international conference).
THEY DO RECORD ALL CALLS (Score:2)
They use a filename DB scheme to store the id/date/phnum in the filename it self.
150m customers, * 48hrs = 1 days worth of profits to buy the fileserver.
If you want secure comms, go use an underwater pen/pad and do it when in the pool or beach under water.
No one, even flipper will be able to see it.
Re:In other news... (Score:4, Informative)
Re:In other news... (Score:2)
So simply encrypt the address or phone number too, and no one will know who you're talking to. See, security is easy if you think logically :).
Re:In other news... (Score:5, Interesting)
Re:In other news... (Score:3, Insightful)
Caller: Yo. It's me.
>CARRIER LOST
Furthermore, the FBI has insane bugging technologies. Forget wiretaps. If they really want to get you, they'll stick parabolic or laser mikes all around you. Or bug your car and office or simply follow you around and take pictures of all your friends who they then bug and wiretap. Or what they really do is catch an associate on a felony and
Feature, not a bug... (Score:3, Insightful)
Re:Feature, not a bug... (Score:2, Funny)
RTFA and all that (Score:5, Insightful)
A spokeswoman for the F.B.I. said "we're aware of the possibility" that older wiretap systems may be foiled through the techniques described in the paper. Catherine Milhoan, the spokeswoman, said after consulting with bureau wiretap experts that the vulnerability existed in only about 10 percent of state and federal wiretaps today. (emphasis added)
So basically it is a minority of antiquated equipment that is vulnerable. Moreover, the person being wiretapped probably doesn't know what system is being used. It is not going to be possible to know, with any assurance, that you have actually defeated the system.
What this probably means is that the FBI will phase out these older systems a little faster than they intended to (mostly due to the publicity-- they were probably already aware of this vulnerability, but didn't care much because "the bad guys" were not aware of it).
Re:RTFA and all that (Score:4, Informative)
In other words: Most of the time, in current conditions, this will work.
Re:RTFA and all that (Score:2)
i know i would use them if the feds would try to snoop me. (and no, these are not so easy to hack/crack as it seems on the tv
now i'm gonna have to check when was the last time when i used a wire phone
50cent , put this in a rap song (Score:2)
That way, with it being played somewhere, sometime it will always trigger a 'off mode'
buwahhahahha
Re:RTFA and all that (Score:2)
Do you see that word "today"? (emphasis added)
URLs for the REAL papers say lots more. (Score:5, Informative)
Basically, there's a fairly high proportion of the wiretapping gear that's actually deployed is vulnerable, in spite of what the police PR folks say, and it's much easier to hack the pen-register technology (though probably impossible to prevent the phone company from giving a direct billing database feed to the Feds, which you probably can't hack.)
Yeah, and they wouldn't lie (Score:2)
So basically it is a minority of antiquated equipment that is vulnerable. Moreover, the person being wiretapped probably doesn't know what system is being used. It is not going to
Is this like a default password... (Score:4, Interesting)
Off-Hook detectors and DTMF variability (Score:4, Interesting)
But wiretappers don't just record voice, they record dialed numbers and caller-id. The other set of flaws, which you can read about in the longer PDF paper, depend on the fact that DTMF detectors are usually analog devices with a certain amount of sensitivity, and in general the phone switch and the wiretapper's equipment won't be the same. So you can find out how far off to bend your touchtones and have the phone switch still listen to you, and then you can send touchtones in-spec or out-of-spec to confuse the wiretapper's equipment, which can't tell whether the phone switch is or is not listening to the numbers you can dial. If it's more sensitive than the phone switch, you can send bogus digits that the wiretapper will record and the phone switch will ignore - but if it's less sensitive, and you're sending your digits just at the edge of the phone switch's range, the wiretapper won't see them.
You can play similar games with CallerID, giving the wiretapper lots of entertaining stuff to listen to when you're not on the phone.
Re:Is this like a default password... (Score:2)
I would never do phreaking. I have no will to do it, and I respect the laws of my country (America). I'm sure that over 90% of the phreaking stuff in the A.Cookbook d
In other news... (Score:5, Insightful)
Re:In other news... (Score:2)
Re:In other news... (Score:2)
Let me get this straight... (Score:5, Funny)
High frequency tones turn off teenagers.
Low frequency tones turn of the NSA.
Slashdotter vocal tones turn off women.
Did I miss anything?
Re:Let me get this straight... (Score:2, Funny)
Re:Let me get this straight... (Score:2)
Bad news for voice over IP (Score:3, Funny)
Would you rely on this? (Score:2)
Would you rely on this? Particularly given the probability that, if it is a FBI wiretap, it is only going to work one time out of ten?
Better question: (Score:2)
Flipped bits (was Re:Would you rely on this?) (Score:2)
Between NSA, the FBI, and various unnamed DoD agencies are now considerably overworked monitoring their (subjugated) citizens. Merely changing the logic on their surveillance equipment to specifically monitor POTS communications with the low amplitude low octave "C" being broadcast (to shut off their bugs) would certainly free up some manpower and equipment to focus on the "professional" terrorists using voice encryption or other high tech methods. Only "newbie" suicide bomber wannabes would ma
Wanna get rid of a wiretap on your phone? (Score:5, Funny)
Oh, yeah, guess I forgot a step: flee the country, because they'll be after your ass now!
Re:Wanna get rid of a wiretap on your phone? (Score:2)
Well
What kinda protection do those lines offer to stupid amounts of power going thr
Re:Wanna get rid of a wiretap on your phone? (Score:3, Funny)
Why yes, I do enjoy playing with Tesla coils. Why do you ask?
Re:Wanna get rid of a wiretap on your phone? (Score:3, Funny)
I, for one, welcome security flaws (Score:5, Interesting)
These sorts of mistakes can be dangerous. Imagine the above example--I'm some bigshot business-guy. I own a publicly traded company. The FBI inadvertently taps my phone and learns that someone at the company I work for has just invented something that will make the company a ton of money. Do you really think those agents aren't going to call up their stock-brokers and say, "BUY! BUY! BUY!" (Or, assume the other direction, if you prefer)
Frankly, yes. I want to make it difficult for the government to wiretap it's citizens. I want somebody to look at the evidence that has been accumulated and act as my representative to say, "Hey, wait. Just because he encrypts his phone calls doesn't mean he's a terrorist." I want somebody to second-guess these guys.
The story of the gutsy cop who goes against procedure to nab the bad guys before they enact their evil deeds is a great movie. But it's not real life--remember, in most cases we get the see the bad guys planning their acts in the movies so we know who the bad guy is. Reality is not that cut-and-dried.
In short, I'm more worried about the government abusing it's power than of the terrorists blowing up a building. That happens alot more often.
Re:I, for one, welcome security flaws (Score:4, Informative)
Listen, I hate the concept of a police state and wiretapping as much as the next guy, but this is a dumb defense. The SEC investigates transactions like that for a reason. "Gee, these two FBI agents who've never bothered to invest more than $10,000 in any single company, suddenly bought $400,000 worth of shares of this company at the perfect time and made $15,000,000. They might've been ridiculously lucky. Or more likely they might've had insider information. Let's look a little closer, shall we?"
The stock market is like the world's biggest casino, and the SEC is certainly no less watchful and no less hesitant to break your legs if you try to cheat them.
Re:I, for one, welcome security flaws (Score:2)
Re:I, for one, welcome security flaws (Score:2)
Also why do you assume that the CEO is doing anything wrong, he simply makes a hypothetical case (one which I doubt would happen because I would hope that the agents have more of a moral fiber then that) that the CEO is overheard by agents that tapped the wrong phone line. He could be ov
Re:I, for one, welcome security flaws (Score:2)
Re:I, for one, welcome security flaws (Score:2, Insightful)
You here demonstrate you have no idea what a publicly traded company actually is.
Don't use in-band signalling/control (Score:2, Insightful)
Re:Don't use in-band signalling/control (Score:2)
*low tone from tapped phone* => \*low tone from tapped phone*
I wonder if .... (Score:5, Interesting)
http://www.newsmax.com/archives/articles/2001/12/
U.S. Police and Intelligence Hit by Spy Network
Charles R. Smith
Wednesday, Dec. 19, 2001
Spies Tap Police and Government Phones
In the wake of the Sept. 11 terrorist attack, the FBI has stumbled on the largest espionage ring ever discovered inside the United States. The U.S. Justice Department is now holding nearly 100 Israeli citizens with direct ties to foreign military, criminal and intelligence services.
The spy ring reportedly includes employees of two Israeli-owned companies that currently perform almost all the official wiretaps for U.S. local, state and federal law enforcement.
The U.S. law enforcement wiretaps, authorized by the Communications Assistance for Law Enforcement Act (CALEA), appear to have been breached by organized crime units working inside Israel and the Israeli intelligence service, Mossad.
Both Attorney General John Ashcroft and FBI Director Robert Mueller were warned on Oct. 18 in a hand-delivered letter from local, state and federal law enforcement officials. The warning stated, "Law enforcement's current electronic surveillance capabilities are less effective today than they were at the time CALEA was enacted."
It's a trap! (Score:5, Funny)
Re:It's a trap! (Score:2)
Double-edged sword (Score:4, Insightful)
I feel safer already....
Re:Double-edged sword (Score:3, Insightful)
Moral of the story, dont waste your time with a person just because they want a little privacy.
Re:Double-edged sword (Score:2, Funny)
What if Barry White makes a call - does that count as a low tone?
Re:Double-edged sword (Score:2)
Why should I be worried about a wiretap? (Score:2)
ccccccccc [click]
i'm too newschool for tinfoil (Score:2)
see, i've always thought the holy grail of righteous anonymity was some black magic combination of phreaking, hacking, and maybe something to do with ham radio; never thought a tinfoil hat was the way to go. ^_-
Re:i'm too newschool for tinfoil (Score:2)
Comment removed (Score:4, Insightful)
Re: (Score:2)
Yeah, right... (Score:5, Funny)
[low hum down a phone line]
"Hello. Is that you Omar?"
"Why, yes it is Osama. How are you today? And what's the weather like like in your donkey burrow in Yemen? The weather's great here in Florida. My view from the Delano Hotel's room window is fabulous - I am also ordering martinis like James Bond."
"Yes, yes... quit your bragging. Just because you weren't born with the most recognisable stripey beard in the world... Now can we please start planning our next atrocity?"
"Ah yes. It is pleasing that we can freely discuss our locations and plans now that the engineers of the American military-industrial complex have told us how to easily counteract their most sophisticated surveillance. Their foolishness in revealing this technique to the entire world, via the internet, has allowed us to dispense with our counter-surveillance training, techniques, and equipment. It is truly a golden age for violent reactionaries wishing to impose a totalitarian pseudotheocracy on the idol-worshipping, hemp-smoking, fornicating, soulless infidels!"
"Wait! Who THE FUCK did you say told you this would work?!"
"Yes, the Americans. They said we'd be safe if we did this. How typically naive of them. Their destruction is assured!"
Re:Yeah, right... (Score:2)
ThinkGeek (Score:3, Funny)
Asterisk (Score:2)
Anybody have code for it?
The trouble is being able to start the tone at the desired time. One would rather not need to be seated at the console I think. I guess you could swipe DTMF, but that has problems.
Re:Asterisk (Score:2)
Oh, good call.
"The trouble is being able to start the tone at the desired time."
Nothing some silence at the beggining of the MP3 or whatever couldn't fix. But does it really need to start at the right time? Isn't the presence of the tone enough?
Re:Asterisk (Score:2)
quick fix (Score:2, Funny)
I believe this was designed for specific use (Score:2)
GWB: You know this Sadam guy is pretty bad dude, I think we need to, wait just a second BZZZZZ
Re:I believe this was designed for specific use (Score:2)
The only reason they are releasing this... (Score:2)
In-band signaling (Score:2)
Am I the only one who thinks of Cap'n Crunch [wikipedia.org]?
demo link (Score:4, Funny)
Hey, it works! I tried the demo and a few minutes later the big black van parked out front drove away...
Feature, not a flaw - although poorly implemented. (Score:2)
As an individual, once I make the decision not to be spied upon, that decision outweighs any interest "society" has in spying upon me. Hence (as an example) strong encryption is an absolute right.
If this wiretap system has a feature that allows the individual to disable that, the the developers of the system are to be commended - even if their implementation is weak.
A better implementation would interr
O-oh (Score:2)
Blatant misinformation (Score:2)
Clever plan (Score:3, Funny)
So who makes one that's not vulnerable? (Score:2)
Wiretapping is mostly done by Verisign (Score:4, Informative)
Since this works through SS7, and full call-control information is available, it's immune to any in-band tones.
See this old Slashdot article [slashdot.org] with more links.
Re:Oh please (Score:2)
Re:Parabolic microphones, bypass legal limits? (Score:2)
You would not expect anyone to hear you with your windows shut.
While this may be a legalistic argument, it is technically untrue. Laser bugs directed at (closed) windows can very easily fetch all the vibrations from inside the room. This is widely known, and there are some devices you can attach to the glass to introduce enough interference. Oh, and these devices are not very effective, since laser bug experts often just focus/direct the beam towards other reflective surfaces within the room itself (mir