iSpy

iSpy

Phone-tapping and listening bugs are methods used for spying. How else does the US National Security Agency (NSA) eavesdrop on its targets?

Elizabeth Law speaks to experts, including Madrid-based security expert Raul Siles, who outline a few common ways phone surveillance can happen and what can be done to secure mobile devices.

Direct to phone

This happens when connecting to an unsecured public network, using Wi-Fi or Bluetooth, which allows anyone to be connected in the network.

On a wireless network, a hacker with the right programme can access one's phone and duplicate the phone's contents or even implant a software that could monitor the phone's activity.

Similarly, this occurs on Bluetooth connections, especially when connecting to an unknown device.

Waves

Mobile phones can connect to a network through 2G, 3G and 4G.

In the latter two, which are newer technologies, the phone will try to authenticate the network, ensuring that transmitters really belong to telecommunications companies.

But in the case of a 2G network, a hacker can dupe the phone into "believing" it is connected to a base station (or telephone tower) when it is in fact connected to a hacker's system. This allows them to access information on the phone, eavesdrop and even send messages as the user.

Even on a 3G/4G network, especially in small cities, hackers can create "noise" in the frequency, which forces phones to be on the 2G network, allowing hackers to easily access one's phone.

Some older models of Blackberry smartphones allowed users to be exclusively on a 3G network. But as more users are concerned about battery life, most new models only allow users to turn off the 3/4G function.

Solution

One of the solutions is to use Voice over Internet Protocol (VoIP), which allows phone calls and texting to be made through the Internet instead of the public telephone network.

A popular example is Skype. There are also companies offering encrypted voice services, or secured lines for phone calls that cannot be tapped into.

But as more governments are putting pressure on such companies to share their users' information, most have shut down in order to not compromise user privacy.

Raul's three tips:

1. Disable Wi-Fi and Bluetooth when not in use.

This is especially if one's phone is set to automatically connect to wireless networks. According to Mr Siles, many have misconceptions that Bluetooth has a range of about 10m, and Wi-Fi about 250m.

Experiments, though, have shown Bluetooth devices being able to connect at a range of 2km, while Wi-Fi can reach a range of 250km, about the distance from Singapore to Malacca.

2. Choose your Wi-Fi networks carefully.

Do not join an unfamiliar wireless network, especially if it's unsecured. All a hacker needs to do to get into one's phone is to be on the same wireless network. With our phones getting increasingly complex, tapping a phone is now more like hacking into a computer.

3. Be mindful of what applications you download.

Some applications may look attractive, but think twice if they come from a relatively unknown company.

Much like fraudulent software on computers, firms now use phone applications like a Trojan horse, which would transmit user data and phone activity to the hackers.

NSA'S 3 primary sources of intelligence

Half of the intelligence information which is supplied to the White House every morning comes from the NSA. Based in Fort Meade, Maryland, with an annual budget of US$10.8 billion (S$13.5 billion), NSA boasts ground agents, tracking ships and listening posts to unmanned aerial vehicles (UAVs) and reconnaissance satellites.

1. Human intelligence (HUMINT)

Spies, moles, agents and double agents are part of NSA's 35,000-strong workforce. It is also the largest employer of mathematicians in the US.

2. Signals intelligence (SIGINT)

Gathering of intel through eavesdropping, listening posts, hacking, wire and phone tapping and decryption devices.

3. Electronic intelligence (ELINT)

Gathering of intel using assets like tracking ships, spy planes, drones and spy satellites.


Get The New Paper for more stories.

This website is best viewed using the latest versions of web browsers.