Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Silent SMS messages - secret tracking used by many SIS with legal loop hole
#1
GETTING THE MESSAGE? POLICE TRACK PHONES WITH SILENT SMS


[B]BY FABIEN SOYEZ ON JANUARY 27, 2012


[/B]

In June 2011, Colette Giudicelli, a senator representing the Maritime Alps region of France, wrote to Claude Gueant, the French Interior Minister:
Many foreign police and intelligence services use clandestine "Silent" SMS to locate suspects or missing persons. This method involves sending an SMS text message to the mobile phone of a suspect, an SMS that goes unnoticed and sends back a signal to the sender of the message. Colette Giudicelli would like to know whether this procedure has been used in France.
Seven months later, and there has still been no response from the French government. The subject might well have faded from memory, had it not been for the 28th Chaos Communication Congress, held in Berlin at the end of December. At the international hackers conference, the researcher and mobile security expert Karsten Nohl announced: "In Germany in 2010, police sent thousands of Silent SMS in order to locate suspects."
Also known as Flash-SMS, the Silent SMS uses an invisible return signal, or "ping". Developers from the Silent Services company, who created some of the first software for sending this type of SMS, explain:
The Silent SMS allows the user to send a message to another mobile without the knowledge of the recipient mobile's owner. The message is rejected by the recipient mobile, and leaves no trace. In return, the sender gets a message from a mobile operator confirming that the Silent SMS has been received.

Silent SMS were originally intended to allow operators to ascertain whether a mobile phone is switched on and to "test" the network, without alerting the users. But now, intelligence services and police have found some other uses for the system. Neil Croft, a graduate of the Department of Computer Science at the University of Pretoria in South Africa, explains:
Sending a Silent SMS is like sending a normal SMS, except that the mobile does not see the message it has received. The SMS's information is modified, within the data coding scheme, so that the user who receives the message doesn't notice anything. A Silent SMS can help police to detect a mobile without the person concerned being aware of the request.
Technical bit: in order to tamper with the SMS's information and make it silent, the security services go through a network for sending and receiving SMS known as an SMS gateway, such as theJataayu SMS gateway. This allows them to interconnect the processing and GSM systems. Neil Croft, now president of an SMS marketing company, explains:
These Silent SMS are also used by some hackers to organise attacks known as "distributed denial of service" (DDOS) attacks. These run down the battery on a mobile abnormally fast, rendering it unable to receive calls. Such a procedure is not expensive: to send one Silent SMS per second for one hour costs about €36 euros.
This method of mass sending appears to be widely used by these security services. In November 2011, Anna Conrad of the Die Linke (The Left) party in Germany, posed a written question (pdf) to her local state assembly concerning the use of Silent SMS by the German police. Her local assemblyresponded: in 2010, her state conducted 778 investigations and sent 256,000 Silent SMS.
Mathias Monroy, a journalist with Heise Online, argues this surveillance technology is flourishing largely as a result of a legal vacuum:
This is very problematic for privacy, because legally it is unclear whether or not a Silent SMS counts as a communication (…) The state found that it was not one, since there is no content. This is useful, because if it is not a communication, it does not fall under the framework of the inviolability of telecommunications described inArticle 10 of the German Constitution.

On December 6, the German Interior Minister Hans-Peter Friedrich announced that German police and intelligence had been sending an average of 440,000 Silent SMS a year since they began using the system.
After each SMS was sent, investigators went to the four German mobile operators Vodafone, E-Plus, O2 and T-Mobile in order to access the recipient's information. To aggregate this raw data provided by operators, the police use Koyote and rsCase, software supplied by Rola Security Solutions, a company that develops "software solutions for the police".
Smile, you're being tracked

Silent SMS allow the user to precisely locate a mobile phone by using the GSM network, as Karsten Nohl explains:
We can locate a user by identifying the three antennas closest to his mobile, then triangulating the distance according to the speed it takes for a signal to make a return trip. A mobile phone updates its presence on the network regularly, but when the person moves, the information is not updated immediately. By sending a Silent SMS, the location of the mobile is instantly updated. This is very useful because it allows you to locate someone at a given time, depending on the airwaves.

This technique is much more effective than a simple cellular location (Cell ID), as François-Bernard Huyghe, a researcher at IRIS, sets out:
This is the only instantaneous and practical method to track a mobile constantly when it's not in use. We're talking then about geopositioning rather than geolocation. After that, either the police track the information via the operators, or private companies process the data and, for example, refer the investigator to a map where the movements of the monitored phone appear in real time.
The benefits of Silent SMS don't stop there: by sending a large number of these SMS, security services can also disrupt the mobile or remotely reactivate its signal and wear out the battery. A spokesman for the German Interior Ministry tells OWNI:
German police and intelligence services use Silent SMS to reactivate inactive mobile phones and refine the geolocation of a suspect, for example when they move during an interview. The Silent SMS is a valuable investigative tool, which is used only as part of a telecommunications surveillance operation sanctioned by a judge, in a specific case, without violating the fundamental right to protection of privacy.

Remote reactivation

In France, police and intelligence services work with Deveryware, a "geolocation operator". Deveryware also market a "geolocation employee punchcard", the Geohub, to businesses.
Deveryware combine cellular localization, GPS, and other "real-time location" techniques. Questioned by OWNI whether Silent SMS were one of these techniques, the company's response was evasive:
Regretfully we are unable to provide an answer, given the confidentiality imposed on us by legal requisitions.
Deveryware's applications enable investigators to map and compile a history of a suspect's movements. Laurent Ysern, head of investigations for SGP Police, states:
All investigative services have access to the Deveryware platform. With this system, one can follow a person without having to be behind them. There's no need for shadowing, so less staff and equipment needs to be mobilized.
While in Germany the Ministry of the Interior responded within 48 hours, the French government remains strangely silent. There has been one single response, from the Press Department of the National Police:
Unfortunately, no one at the PJ (Police Judiciare) or the public safety office is willing to comment on the subject, these are investigative techniques …
Silence too from the French telecoms operators SFR and Bouygues Telecom. Sebastien Crozier, a union delegate at France Telecom-Orange, says:
Operators always collaborate with the police, it's a public service obligation: they act in accordance with judicial requests…There is no definitive method, sending SMS is one of the methods used to geolocate a user. We mainly use this technique to "reactivate" the phone.

By 2013, the use of these surveillance methods is expected to reach an industrial scale. The Department of Justice will set up, with the help of the arms company Thales, a new national platform of judicial interception (PNIJ), which is expected to centralize all legal interception, i.e, phone-tapping, but also summons such as requests for cell location. Sebastien Crozier remarks:
This interface between police officers and operators will streamline court costs and reduce processing costs by half, because until now summons have been handled station by station…There will be more applications, but it will be less expensive for operators like the police.
http://owni.eu/2012/01/27/silent-sms-ger...everyware/

"The philosophers have only interpreted the world, in various ways. The point, however, is to change it." Karl Marx

"He would, wouldn't he?" Mandy Rice-Davies. When asked in court whether she knew that Lord Astor had denied having sex with her.

“I think it would be a good idea” Ghandi, when asked about Western Civilisation.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  What Is America’s Secret Space Shuttle For? Peter Lemkin 0 42,630 12-05-2017, 05:25 PM
Last Post: Peter Lemkin
  The Creation of Synthetic Humans in Secret by Harvard David Guyatt 0 6,953 05-06-2016, 11:34 AM
Last Post: David Guyatt
  Secret EU Plan for Police to Stop Cars by Remote Deactivation David Guyatt 1 3,568 30-01-2014, 12:02 PM
Last Post: David Guyatt
  Declassified papers show plutonium fall-out from French tests of 60s and 70s was kept secret Magda Hassan 2 3,337 04-07-2013, 05:18 PM
Last Post: David Guyatt
  The new super-duper secret pilotless drone David Guyatt 7 4,307 16-06-2013, 08:04 AM
Last Post: David Guyatt
  Secret UK uranium enrichment plant closed over safety fears Jan Klimkowski 1 2,463 25-01-2013, 06:42 AM
Last Post: Peter Lemkin
  A History of Secret Human Experimentations from ter Bernice Moore 11 8,611 29-04-2012, 05:04 AM
Last Post: Lauren Johnson
  Our Galaxy's Black Hole Has the 'Munchies' Bernice Moore 0 2,025 16-12-2011, 02:19 PM
Last Post: Bernice Moore
  Secret Data and Keystroke-Logging Software Revealed on Millions of Smartphones Magda Hassan 0 2,321 01-12-2011, 12:46 AM
Last Post: Magda Hassan
  Cia threat tracking technology fascinating and creepy . Bernice Moore 0 2,556 29-11-2011, 01:54 PM
Last Post: Bernice Moore

Forum Jump:


Users browsing this thread: 1 Guest(s)