Eavesdropping on City Hall- Phone System Used for Wiretapping

Former Lake Station mayor had secretly recorded approximately 425,000 calls between Oct. 12, 2011, and Aug. 13, 2015, and continued the activity even after being released on bond as his federal corruption cases were pending. An audit of your phone system operations can help reveal potential misuse such as this. Almost all telecom systems in use today have features that can allow various forms of eavesdropping to take place.

By |2016-12-16T20:23:31-05:00September 5th, 2016|

Anti-Spy-Phone attachment being developed by Snowden and Huang

Edward Snowden and Andrew Huang are designing a device to help protect smartphones from eavesdropping.

Whether you are a journalist worried about government control, or anyone with confidential conversations, their idea could help protect your phone. Edward Snowden expressed the concern that sophisticated malware could control your phone to make it transmit information when you are not aware, even […]

By |2016-12-16T20:23:32-05:00July 21st, 2016|

Tech alert: Manipulating phone commands by distorted audio and radio transmission.

Techniques that can hijack “always listening” features.

Electronic Voice Image

by Charles Patterson

The introduction of voice recognition to numerous devices and phone apps adds a new security element to consider. Google Now (“OK Google”), Siri, Cortana, and the Amazon Echo are working their way into our lives. Can voice control be surreptitiously used for […]

By |2016-12-16T20:23:32-05:00July 16th, 2016|

Tech alert: Hacking Siri or Google Now through radio waves

Researchers in France have found that by beaming radio waves at the headset wire attached to a smart phone, they can modulate the radio waves to cause the signals in the headset wires to interpret it as voice, thus triggering the voice commands of Siri or Google Now services.

A lot of things have to be right […]

By |2016-12-16T20:23:39-05:00October 15th, 2015|

Hacked phone systems lead to credit card fraud

Phone system and voicemail hacking have been going on ever since they were invented it seems. Recent attacks, though, show a new level of complexity and severity.

THEN

In the 80’s hackers would get hold of DISA numbers (Direct Inward System Access- numbers that were often used to allow remote workers make long distance calls on a company’s phone account). These […]

By |2016-12-16T20:23:42-05:00February 6th, 2015|

Voicemail hacks still prevalent, causing fraudulent phone charges to small businesses.

There are a number of reasons to try to keep your voicemail secure. The most significant may be to prevent theft of information. Celebrities and politicians could be the most obvious targets, the escapades of reporters working for Rupert Murdoch’s News of the World are testament to this (see Hack Attack). Business leaders and decision […]

By |2014-09-02T12:41:54-04:00September 2nd, 2014|

Backdoors to stored phone recordings.

Listening-Recording-Device

“Calls may be monitored for quality assurance…” but also for other reasons such as legal documentation or emergency services and 911 calls. Call recordings can exist for a number of legitimate purposes, using a variety of means and equipment. Not many use actual tape anymore, it […]

By |2016-12-16T20:23:49-05:00May 29th, 2014|
Go to Top