• Home
  • Categories
    • Protection
    • Hostile Environment
    • Industry News
    • Intel
    • Career Advice
    • Surveillance
    • Cybersecurity
    • Maritime
    • Risk Management
    • Fitness
    • Medical
    • Training
    • Equipment
    • Reviews
  • Daily Briefing
  • Subscription
  • The Magazine
  • Podcast
  • Contribute
  • Advertise
  • Contact Us

Circuit Magazine

For Security & Protection Specialists

Get free circuit subscription with BBA membership
You are here: Home / Archives / The Silent Witness & Hacking

The Silent Witness & Hacking

The Silent Witness & Hacking

 

With the proliferation of mobile phones in the public domain, many myths surround the actual truth that lies behind this wireless technology and the inappropriate use of the word Hacking associated with them in recent times. In my past role in a Police Technical Support Unit, I have interrogated thousands of mobile phones associated with serious crime and kindred matters.

Silent hackers

 

From that experience, the views I hold, are mine alone, but are, in part, backed up by recent scientific research, to support the health issues surrounding, what I have called for many years “The Silent Witness”.

With the phrase used loosely by the media in recent times, namely, the words phone hacking, I will avoid any current cases when I refer to mobile hacking in this article, as they are clearly sub-judice.

Legal proceedings are forecast under the Metropolitan Police’s Operation WEETING which was set up at New Scotland Yard to investigate claims of intrusion on personal voice messages on mobile telephony by the media and others, and no reference to active cases will be mentioned in this article.

I will try and prove the operational health risks associated with using cellular phones in our area of expertise for long term security operations on you, the operator, and some of its operational weaknesses.

THE FACTS

Home Office figures, place up to 82% of children up to the age of 12 years of age owning a mobile phone, with some 56 million of this country’s 60 million people in possession of one or more activated handsets with an airtime provider in the UK.

These numbers could easily be replicated in the United States I am sure. This would show which mobile phone manufacturer leads the field in innovation and miniaturisation across the world, and the favoured model of choice.

This means that nearly everyone has a mobile phone or has access to one on our two continents for example.
The safety issues surrounding ongoing miniaturisation of mobile phones are evident. With the eradication of small antennaes on the outside of handsets, to compete with other manufacturers styling, new aerial technology has been employed internally, making the art of what antennaes need to do to transmit and receive information even more difficult.

The power now needed to connect and maintain invisible handshakes with digitised cell sites as you travel, have had to increase accordingly, and I will refer to the health risks associated with that invisible radiation later in this article.

I have often remarked to operatives on technical courses, “that if it is a transmitted signal, it can be intercepted”, and this analogy is very true whether the signal is an analogue one or indeed digital and/or encrypted, and should always be remembered, especially when the security of your Principal is paramount.

In keeping with this digital technology I will try and explain in plain speech how your cellular phone can now be secretly turned ON and allow an eavesdropper to actually overhear every conversation  you make in the close proximity to the phone, without you actually knowing that it has been turned ON.

The microphone technology used in mobile phones today allows the amplification of background noises to be louder than the spoken word to the silent listener on the other end. Always be mindful that even whispers are amplified and WILL be overheard clearly and easily by the other party monitoring the transmission.

Ambient noises or road noise are often responsible for what is blamed as ‘bad lines’ of communication as it overbears the spoken word due to the high and constant volume projected towards the microphone.
The myth is that there are no lines, and there are no typical landline based point to point wired technologies used in this powerful wireless system.

How many people ask at important security meetings or conferences that ALL mobile phones should be switched off?
Not many.
Not only should mobile phones be switched off, but also the batteries removed whilst important meetings are held, or even better, left in secure lockers outside of the meeting areas.

Why you may ask?

The reason, as I am sure you will be aware of,  is that nearly all mobile phones have direct access to emails, text messaging and web browsers now, in addition to live news updates, financial reports and the inevitable high quality built in cameras, which are improving and reducing in size every day.

Due to this capability of direct access to the World’s Internet, data is exchanged in an invisible handshake between these wireless technologies. Every large mobile phone manufacturer is currently working overtime to produce the ultimate computer interface built into a mobile phone in the smallest package available, and many model changes occur in a short space of time, using the iPad and iPhone as examples.

Therefore, it can be concluded that the common programmable language that cellular phones share across the world between handset and computers can be intercepted quite easily.

Computers are regularly “hacked” into regardless of any in built protection technologies applied to them, and there is a steady stream of highly intelligent people, including Government Agencies that carry out  this work legally on behalf of that old umbrella of……….‘National Security’!!

It therefore follows that there will be illegal users with the same knowledge and experience trying to access telephony and the intelligence from such interceptions, as shown in recent hacking scandals on a lower scale, here in the UK and the U.S that inevitably reaches the public’s ears.

The press and the general freelance paparazzi have always used techniques to locate and intercept well-known individuals. The days of endless hours of following such individuals have long gone.
Using mobile phones and magnetic devices deployed on vehicles which supply locations on easy to read FREE or Pay As You Go mapping, are currently, completely outside of any legal  framework  when used in this way by these “media” or other private investigative agencies.

This can then be compared with the use of such devices, by say Government Departments who have to be authorised by the Surveillance Commissioners who are the legal body in the UK who apply the Regulation of Investigatory Powers Act (RIPA) in such use of sophisticated covert equipment by the Law Enforcement communities and Government departments.

Everyone outside of that framework who is caught, merely attracts the wroth of the Human Rights Act, Article 8, “the right to privacy” or Criminal Damage, or indeed Vehicle Interference as the Regulatory legislation to counter these practices if discovered!!

The recent Hacking scandal, will I feel, ultimately attract unnecessary legislation being applied to us in the private security sector, due to the totally inappropriate use by a few who will eventually be prosecuted!!!

Many mobile phones, whilst reporting to cell sites as you enter them, provide adequate locations of your actual handset on their own.

However, nearly all tracking devices now incorporate GSM/GPRS and GPS together, resulting in each complimenting each other when one system fails, an example being, no satellite signal due to obstructions or parked in multi storey car parks out of satellite view.

The unit would then use the remaining technologies combined, to pinpoint the tracking device.  Because many tracking units now have GSM as their on board backup, it therefore follows that microphones can be attached as well, so the spoken word can be remotely accessed from anywhere in the world.

Unlike computers, mobile phones DO NOT have firewalls.  How many people actually, even now, type in passwords to protect the entry to their phones? Not many. It has been deemed an unnecessary delay to our busy and active lives in the security marketplace.

It may only be deemed as a stalling tactic, but passwords do frustrate the casual thief and are the first line of defence, and would have prevented much of what has now been deemed the “Hacking of Mobile Phones”.
In simple terms, owners have not password protected their voicemail access from those who may have been provided with the handset number by whatever means, resulting in the illegal listening of voicemail messages.

NEW EMERGING THREATS

A new threat exists as I alluded to earlier, where a virus called the “Cell Finity Bug” which uses an access code which calls the infected handset silently, with no ringtone, and secretly turns on the microphone. The phones screen does not illuminate either, and what is worse, there is NO record of the callers details retained in the phones memory.

This bug also then recovers ALL the stored contact list details and repeats the formula with all your associates in the memory without their knowledge. A hidden text message simply operates those handsets without the user being made aware of them.

THE ANSWER

Do not become complacent and discuss SECRET or HIGHLY CONFIDENTIAL information on mobile phones. And especially those that have direct access to the internet.

You may be familiar with the recent interception by the American Intelligence agencies of a Blackberry which held sensitive Intelligence being used by the French Secret Service. This then surely raises more questions than answers, and how these alleged “secure” pieces of equipment could be hacked!!

Electronic Counter Measures, or Bug sweeps should always be encouraged, prior to any important meeting taking place. All mobile phones should be switched off, and batteries removed.

My advice to you all, concerned in security, is that NO mobile telephony equipment or laptops whether fitted with WIFI or not should be taken into sensitive meetings, all should be safely stored away from the meeting venue to provide that essential security to you and your client.

ECM equipment should be left on during meetings, to instantly highlight any Cellular transmissions or secret handshakes to any transmittable device being activated and turned on remotely. In the case of cellular phones (DTMF) Dialled Tone Multiple Frequencies, pulses will therefore be detected by the use of such equipment, covering the entire (RF) Radio Frequency spectrum, and will provide reassurance to sensitive operations or meetings.

RADIATION

I care not for so called “EXPERTS” stating that using a mobile phone for long duration’s against the head has no long term effects. Mobile phones emit signals via radio waves, which are comprised of Radio-Frequency (RF) energy, a form of electromagnetic radiation.

Therefore long term use of such a device in my submission, against the head is dangerous. Many manufacturers and Governments alike cannot afford to provide the real truth about the dangers of mobile phones, as the revenue provided by their continued and popular use, sustains many economies in vast sums of cash, and taxes applied to them, or not as the case may be!!!

It is not simply a means to scare monger when I raise this issue, but common sense should prevail, which should also be applied alongside all microwave technology and the inherent risks associated with that.

If it is dangerous to be near microwave technology and the “stepped up” power radiated to ensure its effectiveness in transmitting video or audio over long distances, it is certainly dangerous to transmit it next to the human body in general terms. The power output of any transmitter is wholly relevant to the risks associated with it.

So often, news articles with Government findings appear stating that either the hands free kits are safe, or then there is contrary publicity to say they are not, should make you realise, they themselves are uncertain of its true damaging potential to us mortal humans. It is over time that answers will be forthcoming, and the truth will be released as such as illnesses occurring around disturbance of vision, and unexplained headaches unfold.

The truth is as I have explained, if you have to use mobile phones, use them in short bursts, and try to keep them away from your head for long durations, and DO always try to utilise hands free devices, where no earpiece is used, in that way all bases are covered, and as the truth comes out, which will be several years of detailed study and monitoring, it will be seen that they do have an element of high risk attached to their continuous use.

For your children’s sake, whose skull thickness would not have reached its full development if they are under 12 years of age, and use mobile phones frequently, make them aware of the possible hazards that are associated with them, and that Silent Witness…………….radiation!!!.

Always, remember the simple phrase: “ If its transmittable, it is interceptable”.

 

Gil Boyd B.E.M formally a Principal Technical Officer, covering all aspects of covert technology within the Serious and Organised Crime Unit for a UK Police Force is now the Technical Director of The British Security Association.
www.britishsecurityassociation.com

Buy The Latest Issue

Sign Up For News and Updates

We respect your privacy and will not share your information with anyone.
We will only message you when we have something relevant and of value to share with you.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Issue

Circuit magazine cover issue 55

Issue 55

Buy Now

Latest Industry News

Industry News October 2020

We cast our eye over the main stories impacting the security industry. Here’s what’s appeared on the radar since the last issue.

Security industry News Brought to you by the Circuit Magazine

Industry News

We cast our eye over the main stories impacting the security industry, including, Kanye West’s former bodyguard is calling the rapper a “bully” and is threatening to sue for damages after West accused him of breaking a confidentiality agreement.

Industry News

We cast our eye over the main stories impacting the security industry. Here’s what’s appeared on the radar since the last issue.

Security industry News Brought to you by the Circuit Magazine

Security Industry Association Announces New SIA Women in Security Scholarship Opportunity

“The SIA Women in Security Forum works to grow and retain leaders in the security industry,” said Gloria Salmeron, director of human resources at Brivo and co-chair of the scholarship committee. “With the addition of this new scholarship, we look forward to helping bring opportunities for further education and advancement to as wide a spectrum of people as possible and inviting individuals to participate in the Women in Security Forum.”

Product Review earHero

Product Review – Ear Hero

Designed by an audiologist, earHero’s speakers are so tiny they will never block your ear canal giving you the ability to literally talk on a separate phone without removing the earHero tactical earpiece from either ear.

You can literally hear whisper level sounds from yards away, while identifying the sounds’ precise location. The earHero tactical headsets have wires so thin and clear, they are virtually undetectable, and the design is so comfortable, you’ll barely know the earpiece is there.

Introduction to Cybersecurity Part 4

Insecure Smart Houses

They are only of limited relevance today, but as the technologies involved become more widespread and implemented into every facet of life they will only become more prevalent. While it sounds like the stuff of science fiction, these threats exist now and are not going to go away.

For simplicity, we’ll say that a ‘smart’ device is anything which connects to the internet (or a network) and is not intended to be a computer interface. Intended is the key word there, as many of these devices are insecure for the simple reason that they are a computer. The problem is that it is now cheaper and easier to put a general purpose computer into a device and run some software to, for example, turn lights on and off than it is to design a single-purpose lightbulb which also connects to a network.

Behavioral Analysis

Turning Habitual Habits into a Positive

Being an instructor for Tony Scotti’s Vehicle Dynamics Institute has forwarded the opportunity to observe how a large section of professionals interact and function from different niches of the industry. Military, transnational EP teams, US based teams, Federal LEO’s or with civilians this theme shows through. Even in the larger training arena the change can be seen as more of the schools are starting to focus on classes or blocks of instruction such as client management and behavioral analysis. The discussion forms are flooded with conversations relating to how to work in a team dynamic. It doesn’t matter if its a 28 day school or a three day school, they will be touching on and teaching these topics.

Global Risk

Global Situation report provided by Stratfor

Global Situation Report October, 2020

Having informed insight in today’s increasingly complex international environment is more important than ever. That’s why we’ve partnered with Stratfor, the worlds leading geopolitical intelligence platform, to bring readers regular analysis and accurate forecasting of global trends from someone you can trust.

Popular Tags

Afghanistan armed attack Bodyguard Bodyguarding Celebrity client Close Protection Close Protection Officer Elijah Shaw Executive Executive Protection fight firearm gun Intelligence Iraq Law Enforcement Medical military News online police Prevention professional protect protection PTSD Risk Risk Assessment Risk Management Safety Security Security Incidents Security Industry Authority SIA Social Media Surveillance terror Terrorism terrorist Threat train Training VIP

On The Frontline

Keeping Your Edge, Politics as Un-usual

Here’s a question:  How do you express something special and meaningful that has occurred during your time in the … >>>

Working Girl: Female Bodyguards

I've been traveling around the UK on a CP job for the past few months but was also lucky enough to be part of the … >>>

The Death of Journalist Marie Colvin

Why media management has to be held accountable (young journalists and freelancers also take note): Much has been made … >>>

Follow us

  • Email
  • Facebook
  • Twitter

From The Archives

THE NEW Open Source Intelligence

We all hear about this OSINT malarkey but searching the Internet for information is much much more than just dropping a … >>>

The New Bodyguard

The New Bodyguard By Kevin Horak It has been a pleasure to read and review this book, which is a fantastic read, … >>>

Fit for Purpose – Packing for Adventure

In this article, we're going to pick back up on the Adventure series, which we started in Issue 51 (Mindset, Ideas, and … >>>

Security Considerations – Rio 2016

      The eyes of the world will soon be on Rio as Brazil hosts the Olympic Games. Almost half a … >>>

  • Terms And Conditions
  • Magazines
  • Privacy Policy
  • Archives

© 2021 Circuit Magazine · Rainmaker Platform

This website or its third-party tools use cookies which are necessary to its functioning and required to improve your experience. By clicking the consent button, you agree to allow the site to use, collect and/or store cookies.
I accept