Michael Cohen had 16 Cell Phones Seized by the FBI

I’m jealous! Security experts often advise politicians, business executives, movie stars, professional athletes, and others to always have a second cell phone in addition to their primary phone. The second phone, sometimes called “a burner phone,” should receive little use. The owner is advised to use it only when he or she might want to hide something from law enforcement personnel or Border Patrol or perhaps is in danger of having news reporters or business competitors snooping through the person’s affairs. In fact, another good use might be to hide something from a curious spouse!

If the owner’s primary phone is later examined by someone else, the text messages, installed apps, and recent phone call information contained within the burner phone will not be found. Hiding a second phone that is used only for highly-sensitive purposes can be a big help when it comes to keeping secrets.

However, we may have a new record in burner phones! Michael Cohen, President Trump’s personal lawyer, reportedly had as many as 16 cell phones when the FBI raided Cohen’s home, office and hotel room!

Continue reading

Without Encryption, It’s So Easy for Anyone to Eavesdrop on Your Phone Calls

An interesting article by Dennis Peng can be found in the Ooma Blog. The article talks mostly about hackers and governments listening to your cell phone and wired telephone calls. Amongst other things, the article states, “There is a backdoor built into every cell phone call. It can be accessed by intelligence agencies, hackers, or anyone with your telephone number.”

As to old-fashioned wired telephones, Peng writes, “Every day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications,” reports the Washington Post.

The article may be found at: http://bit.ly/2I7DY8W.

How to Fight Mass Surveillance even though Congress just Reauthorized It

Bruce Schneier is a security technologist and a lecturer at the Kennedy School of Government at Harvard University. He is also the Chief Technical Officer at IBM Resilient, a fellow at Harvard’s Berkman Center, and a board member of EFF. Indeed, he is one of the leading experts in the field of computer security. He recently published an article in The Washington Post that describes the problems and the risks recently created when President Trump signed the renewal of Section 702, making domestic mass surveillance a permanent part of U.S. law. You can read his article at: http://wapo.st/2CnE7SD.

Why Do You Have Two Telephone Numbers? Use an Amazon Echo Instead.

According to a recently published U.S. Health Department report at http://bit.ly/2icwvuw, 50.8 percent of American homes don’t have a landline telephone. Instead, the residents use a cellphone as their only phone or use a computerized VoIP phone or other, alternative telephone device. The number of landlines in homes has declined in recent years and apparently will continue to fall. There’s simply no need to have both an old-fashioned wired home phone and a cellphone. Having duplicate phones is unnecessary and expensive.

Perhaps even worse is the difficulty of anyone trying to call you when you have two or more telephone numbers. If they know you well, perhaps they know to call one number during certain hours of the day and a different number at other times. If they don’t reach you on the first number (and they should be able to do so), the caller then has to know to call a second number.

I have been using a cell phone as my only telephone number for several years. However, I recently slid backwards: I added a second “phone” in my home. Admittedly, it is not a normal telephone. I use it mostly for outgoing calls, so my callers never need to be concerned with which number is needed to call me. The new “phone” provides high-quality audio, a built-in speakerphone, and, if appropriate hardware is used on both ends of the conversation, video calling. The new device also performs many other functions besides making telephone calls. Best of all, there is no need for telephone wires connected to the house nor for a monthly bill from the local telephone company. In fact, my new device provides free calls after the hardware has been purchased.

Continue reading

Volunteers Around the World Build Surveillance-Free Cellular Network Called ‘Sopranica’

Most people in the United States—and increasingly, around the world—carry the most sophisticated surveillance devices ever created in their pockets day in and day out. Although smartphones have enabled governments and corporations to track our movements and monitor our conversations with unprecedented ease, these devices are also an incredibly useful personal tool and have become an indispensable part of modern life.

Sopranica is a do-it-yourself grass roots project to create a competitive community-oriented cell phone network. “Sopranica is a project intended to replace all aspects of the existing cell phone network with their freedom-respecting equivalents,” says Denver Gingerich, the programmer behind Sopranica. “Taking out all the basement firmware on the cellphone, the towers that track your location, the payment methods that track who you are and who owns the number, and replacing it so we can have the same functionality without having to give up all the privacy that we have to give up right now. At a high level, it’s about running community networks instead of having companies control the cell towers that we connect to.”

Continue reading

Microsoft Is Using Cortana To Read Your Private Skype Conversations

Are you using Skype? If so, perhaps you should switch to something that is more secure.

Brian Fagioli shares a report from BetaNews:

“So, here’s the deal, folks. In order for this magical “in-context” technology to work, Cortana is constantly reading your private conversations. If you use Skype on mobile to discuss private matters with your friends or family, Cortana is constantly analyzing what you type. Talking about secret business plans with a colleague? Yup, Microsoft’s assistant is reading those too. Don’t misunderstand — I am not saying Microsoft has malicious intent by adding Cortana to Skype; the company could have good intentions. With that said, there is the potential for abuse. Microsoft could use Cortana’s analysis to spy on you for things like advertising or worse, and that stinks. Is it really worth the risk to have smart replies and suggested calendar entries? I don’t know about you, but I’d rather not have my Skype conversations read by Microsoft.”

Brian Fagioli’s complete report may be found at: https://slashdot.org/~BrianFagioli.

Court rules Stingray use Without a Warrant Violates Fourth Amendment

The Washington DC Court of Appeals overturned a Superior Court conviction of a man who was located by police using a cell-site simulator, or Stingray. The court ruled that the defendant’s Fourth Amendment rights were violated when law enforcement tracked down the suspect using his own cell phone without a warrant.

Stingrays work by pretending to be a cell tower and once they’re brought close enough to a particular phone, that phone pings a signal off of them. The Stingray then grabs onto that signal and allows whoever’s using it to locate the phone in question. These sorts of devices are used by a number of different agencies including the FBI, ICE, the IRS as well as police officers. However, those agencies will no longer be able to (legally) use the devices.

Continue reading