The FBI Team Sent to ‘Exploit’ Protesters’ Phones in Portland
https://www.nybooks.com/daily/2020/10/08/the-fbi-team-sent-to-exploit-protesters-phones-in-portland
The FBI’s Washington, D.C., headquarters sent agents from its “Fly Team,” an elite counterterrorism unit, to Portland this summer during the second weekend in July. Their task was to interview arrested protesters and carry out the “initial exploitation of phones, or other communication devices,” according to FBI emails obtained through a public records request. It is unclear whether the Fly Team operation extended either past that weekend or beyond Portland, but the emails suggest that the FBI has been using counterterrorism tools and powers to map left-wing protest networks just months before an election whose result is likely to be delayed, if not challenged.
#usa #phone #exploit #protesters #cops #fbi
https://www.nybooks.com/daily/2020/10/08/the-fbi-team-sent-to-exploit-protesters-phones-in-portland
The FBI’s Washington, D.C., headquarters sent agents from its “Fly Team,” an elite counterterrorism unit, to Portland this summer during the second weekend in July. Their task was to interview arrested protesters and carry out the “initial exploitation of phones, or other communication devices,” according to FBI emails obtained through a public records request. It is unclear whether the Fly Team operation extended either past that weekend or beyond Portland, but the emails suggest that the FBI has been using counterterrorism tools and powers to map left-wing protest networks just months before an election whose result is likely to be delayed, if not challenged.
#usa #phone #exploit #protesters #cops #fbi
The New York Review of Books
The FBI Team Sent to ‘Exploit’ Protesters’ Phones in Portland | by Mattathias Schwartz | The New York Review of Books
The FBI’s Washington, D.C., headquarters sent agents from its “Fly Team,” an elite counterterrorism unit, to Portland this summer during the second weekend in July. Their task was to interview arrested protesters and carry out the “initial exploitation of…
Google made an app for creditors to lock you out of your financed phone if you don’t make payments
https://www.xda-developers.com/google-device-lock-controller-banks-payments/
#Google #lock #financed #phone
https://www.xda-developers.com/google-device-lock-controller-banks-payments/
#Google #lock #financed #phone
XDA Developers
Google made an app for creditors to lock you out of your financed phone if you don’t make payments [Updated]
Google made an app called Device Lock Controller for creditors like banks to remotely lock your financed device if you don't make payments.
Revealed: China suspected of spying on Americans via Caribbean phone networks
Security expert claims Chinese surveillance may have affected tens of thousands of Americans
China appears to have used mobile phone networks in the Caribbean to surveil US mobile phone subscribers as part of its espionage campaign against Americans, according to a mobile network security expert who has analysed sensitive signals data.
The findings paint an alarming picture of how China has allegedly exploited decades-old vulnerabilities in the global telecommunications network to route “active” surveillance attacks through telecoms operators.
The alleged attacks appear to be enabling China to target, track, and intercept phone communications of US phone subscribers, according to research and analysis by Gary Miller, a Washington state-based former mobile network security executive.
https://www.theguardian.com/us-news/2020/dec/15/revealed-china-suspected-of-spying-on-americans-via-caribbean-phone-networks
#China #US #mobile #phone #networks #intelligence #spy #surveillance
Security expert claims Chinese surveillance may have affected tens of thousands of Americans
China appears to have used mobile phone networks in the Caribbean to surveil US mobile phone subscribers as part of its espionage campaign against Americans, according to a mobile network security expert who has analysed sensitive signals data.
The findings paint an alarming picture of how China has allegedly exploited decades-old vulnerabilities in the global telecommunications network to route “active” surveillance attacks through telecoms operators.
The alleged attacks appear to be enabling China to target, track, and intercept phone communications of US phone subscribers, according to research and analysis by Gary Miller, a Washington state-based former mobile network security executive.
https://www.theguardian.com/us-news/2020/dec/15/revealed-china-suspected-of-spying-on-americans-via-caribbean-phone-networks
#China #US #mobile #phone #networks #intelligence #spy #surveillance
the Guardian
Revealed: China suspected of spying on Americans via Caribbean phone networks
Security expert claims Chinese surveillance may have affected tens of thousands of Americans
Find lost phone
Finder
Remote mobile phone searching via SMS-requests
https://f-droid.org/app/ru.seva.finder
Simple sms remote
Control your device by sending text messages https://f-droid.org/app/tranquvis.simplesmsremote
Flyve MDM Agent
Manage and secure effectively your mobile devices and applications
https://f-droid.org/app/org.flyve.mdm.agent.mqtt
FIND3 Scanner
Scan Bluetooth and WiFi for FIND3
https://f-droid.org/app/com.internalpositioning.find3.find3app
Prey
https://github.com/prey/prey-android-client
https://play.google.com/store/apps/details?id=com.prey
PhoneTrack Nextcloud application
https://apps.nextcloud.com/apps/phonetrack
Traccar open source GPS tracking system
https://github.com/traccar/traccar/blob/master/README.md
Ulogger
https://github.com/bfabiszewski/ulogger-android
#find #lost #phone #device
Finder
Remote mobile phone searching via SMS-requests
https://f-droid.org/app/ru.seva.finder
Simple sms remote
Control your device by sending text messages https://f-droid.org/app/tranquvis.simplesmsremote
Flyve MDM Agent
Manage and secure effectively your mobile devices and applications
https://f-droid.org/app/org.flyve.mdm.agent.mqtt
FIND3 Scanner
Scan Bluetooth and WiFi for FIND3
https://f-droid.org/app/com.internalpositioning.find3.find3app
Prey
https://github.com/prey/prey-android-client
https://play.google.com/store/apps/details?id=com.prey
PhoneTrack Nextcloud application
https://apps.nextcloud.com/apps/phonetrack
Traccar open source GPS tracking system
https://github.com/traccar/traccar/blob/master/README.md
Ulogger
https://github.com/bfabiszewski/ulogger-android
#find #lost #phone #device
Forwarded from BlackBox (Security) Archiv
pgpp-arxiv20.pdf
7.1 MB
Pretty Good Phone Privacy
To receive service in today’s cellular architecture, phones uniquely identify themselves to towers and thus to operators. This is now a cause of major privacy violations, as operators sell and leak identity and location data of hundreds of millionsof mobile users.
In this paper, we take an end-to-end perspective on thecellular architecture and find key points of decoupling that enable us to protect user identity and location privacy with no changes to physical infrastructure, no added latency, and no requirement of direct cooperation from existing operators.
https://raghavan.usc.edu/papers/pgpp-arxiv20.pdf
#phone #privacy #study #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
To receive service in today’s cellular architecture, phones uniquely identify themselves to towers and thus to operators. This is now a cause of major privacy violations, as operators sell and leak identity and location data of hundreds of millionsof mobile users.
In this paper, we take an end-to-end perspective on thecellular architecture and find key points of decoupling that enable us to protect user identity and location privacy with no changes to physical infrastructure, no added latency, and no requirement of direct cooperation from existing operators.
https://raghavan.usc.edu/papers/pgpp-arxiv20.pdf
#phone #privacy #study #pdf
📡@cRyPtHoN_INFOSEC_FR
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_DE
📡@BlackBox_Archiv
📡@NoGoolag
Loans that hijack your phone are coming to India
Lenders are turning to coercive loan apps that shut down smartphones if customers fall behind on payments.
Last December, 28-year-old Roshan Zameer was gripped with panic. His phone had suddenly stopped working. As an electrical repairman in the outskirts of Bangalore, Zameer needed to make a call to check if the main electricity line was turned off before he started work at a building: information crucial to his safety. A message appeared on his screen: “Pls pay the amt via online through our website to unlock your device.” His Samsung Galaxy A71 phone was then blocked by a pre-installed app, restricting access to all of his phone’s functions, including the ability to make phone calls.
Zameer had bought the cellphone secondhand online in August. The original owner, it turns out, purchased it with the promise of paying off the device through equated monthly installments (EMI), a fixed payment schedule. Zameer didn’t know the phone was on a payment plan until the day after he bought it. 15 days after he purchased it, the device automatically locked and alerted him that he was roughly $40 behind. He’s been stuck paying monthly installments ever since.
https://restofworld.org/2021/loans-that-hijack-your-phone-are-coming-to-india/
#India #loans #phone #hijack #privacy
Lenders are turning to coercive loan apps that shut down smartphones if customers fall behind on payments.
Last December, 28-year-old Roshan Zameer was gripped with panic. His phone had suddenly stopped working. As an electrical repairman in the outskirts of Bangalore, Zameer needed to make a call to check if the main electricity line was turned off before he started work at a building: information crucial to his safety. A message appeared on his screen: “Pls pay the amt via online through our website to unlock your device.” His Samsung Galaxy A71 phone was then blocked by a pre-installed app, restricting access to all of his phone’s functions, including the ability to make phone calls.
Zameer had bought the cellphone secondhand online in August. The original owner, it turns out, purchased it with the promise of paying off the device through equated monthly installments (EMI), a fixed payment schedule. Zameer didn’t know the phone was on a payment plan until the day after he bought it. 15 days after he purchased it, the device automatically locked and alerted him that he was roughly $40 behind. He’s been stuck paying monthly installments ever since.
https://restofworld.org/2021/loans-that-hijack-your-phone-are-coming-to-india/
#India #loans #phone #hijack #privacy
Rest of World
Loans that hijack your phone are coming to India
Lenders are turning to coercive loan apps that shut down smartphones if customers fall behind on payments.
Broken-Phone-Recovery
A #guide how to #backup data from your locked android #phone if you broke your #screen (and more)
https://github.com/v1nc/Broken-Phone-Recovery
A #guide how to #backup data from your locked android #phone if you broke your #screen (and more)
https://github.com/v1nc/Broken-Phone-Recovery
GitHub
GitHub - v1nc/Broken-Phone-Recovery: Data Recovery from your broken Android phone
Data Recovery from your broken Android phone. Contribute to v1nc/Broken-Phone-Recovery development by creating an account on GitHub.
Forwarded from BlackBox (Security) Archiv
recycled-numbers-latest.pdf
347.8 KB
Security and Privacy Risks of Number Recycling at Mobile Carriers in the United States
35 million phone numbers are disconnected in the U.S. every year. Standard industry practice is to reassign those numbers to other subscribers. But this leads to many types of security and privacy risks, which our study analyzes rigorously.
https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf
https://recyclednumbers.cs.princeton.edu/
#security #privacy #phone #number #recycling #usa #mobile #carriers #pdf
📡 @nogoolag 📡 @blackbox_archiv
35 million phone numbers are disconnected in the U.S. every year. Standard industry practice is to reassign those numbers to other subscribers. But this leads to many types of security and privacy risks, which our study analyzes rigorously.
https://recyclednumbers.cs.princeton.edu/assets/recycled-numbers-latest.pdf
https://recyclednumbers.cs.princeton.edu/
#security #privacy #phone #number #recycling #usa #mobile #carriers #pdf
📡 @nogoolag 📡 @blackbox_archiv
Red
Redirect outgoing calls to Signal/Telegram/Threema.
Tiny app to redirect outgoing calls to Signal/Telegram/Threema if available.
You can cancel redirection by clicking on "Redirecting to.." popup.
Download - https://github.com/x13a/Red/releases
https://github.com/x13a/Red
#new #phone
@foss_Android
Redirect outgoing calls to Signal/Telegram/Threema.
Tiny app to redirect outgoing calls to Signal/Telegram/Threema if available.
You can cancel redirection by clicking on "Redirecting to.." popup.
Download - https://github.com/x13a/Red/releases
https://github.com/x13a/Red
#new #phone
@foss_Android
Media is too big
VIEW IN TELEGRAM
Assange once said, “A mobile phone is a tracking device that also makes calls”. He’s not wrong. There are countless ways that phones track our movements, and one of them is via WiFi probe requests.
In this video we explain how your phone automatically connects to your WiFi whenever you return home or to your favorite coffee shop, and why it leaves your device vulnerable to all kinds of attacks and surveillance -- it can allow people to maliciously intercept your internet traffic, track you, or find out personal information about you.
Main takeaways:
Turn your WiFi OFF when you're not using it
Don't automatically connect to WiFi networks
Forget networks after joining them
Keep your OS and device updated https://youtu.be/poaqwozBqHY
@GeopoliticsAndEmpire
#wifi #phone
In this video we explain how your phone automatically connects to your WiFi whenever you return home or to your favorite coffee shop, and why it leaves your device vulnerable to all kinds of attacks and surveillance -- it can allow people to maliciously intercept your internet traffic, track you, or find out personal information about you.
Main takeaways:
Turn your WiFi OFF when you're not using it
Don't automatically connect to WiFi networks
Forget networks after joining them
Keep your OS and device updated https://youtu.be/poaqwozBqHY
@GeopoliticsAndEmpire
#wifi #phone