SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Windows Vista
MSFT 506.99-1.5%Nov 5 3:59 PM EST

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
From: sammy™ -_-3/24/2007 3:01:49 AM
  Read Replies (1) of 1939
 
The past months have seen many reports on a new cell phone tapping tactic -- the "roving bug":

* USA Today: Your cellphone is more powerful than you probably know usatoday.com

* CNet News.com: FBI taps cell phone mic as eavesdropping tool news.com.com

* ABC News: Can You Hear Me Now? blogs.abcnews.com

ftp://ftp.3gpp.org/Specs/2000-12/R1999/33_series/33106-310.zip These documents [zip files] explain how the cellular network are setup to allow Law Enforcement Agencies (LEA) to tap a cellular telephone and the data or text it transmits
Here are some interesting quotes from those documents:
* To be effective, interception must take place without the knowledge of either party to the communication. Therefore, decryption must also take place without either party being aware that it is happening.
* No indication shall be given to any person except authorised [sic] personnel that the intercept function has been activated on a target.
* The invocation of lawful interception shall not alter the operation of a target's services or provide indication to any party involved in communication with the target.
* ...it shall be a national option as to whether the network provides the CC (Content of Communication) to the agency decrypted, or encrypted with a key available to the agency.

gsm-security.net
blogs.forum.nokia.com
-------------------------------------------------
Name: Trace.Registry.Spam Blocker Utility
Registry traces are known references of Spyware/Adware which are stored in the Windows registry database. Traces may be auto-run keys which make Spyware/Adware run automatically on Windows startup. Traces may also be registrations of Spyware/Adware DLL files which are registered to hijack the Windows Explorer or the web browser.

Important:

Traces can not be harmful by definition. They are only some kind of helpers to enable Malware to be installed and run on your computer.

emsisoft.com Blocker Utility

Can't Remove Spam Blocker Utility, won't allow me on the internet
bleepingcomputer.com
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext