YNOT
  • Home
  • Industry News
    • Adult Business News
    • Adult Novelty News
    • YNOT Magazine
    • EU News
    • Opinions
    • Picture Galleries
  • PR Wire
    • Adult Company News
    • Adult Retail News
    • Adult Talent News
    • Adult Videos News
  • Podcasts
  • Industry Guides
    • Adult Affiliate Guide
    • Affiliate Marketing for Beginners
    • Top Adult Traffic Networks
    • Top Adult PR Agents
    • Funding an Adult Business
  • Business Directory
    • View Categories
    • View Listings
    • Submit Listing
  • Newsletters
  • Industry Events
    • Events Calendar
    • YNOT Cam Awards | Hollywood
    • YNOT Awards | Prague
    • YNOT Cammunity
    • YNOT Summit
    • YNOT Reunion
  • Login with YNOT ID

Feds Free to Engage in Warrantless Cell Tracking

Posted On 19 Nov 2008
By : admin

WASHINGTON, DC — Think your cellular use is safe from prying eyes who that haven’t obtained a warrant up front?Think again.

On Tuesday, the American Civil Liberties Union revealed it has obtained documents indicating the FBI has been engaging in wholesale cellular phone tracking without judicial oversight or operator complicity. The practice is facilitated by powers granted the FBI under the Foreign Intelligence Surveillance Act.

Using a technology called Triggerfish — which has nothing to do with colorful marine life — federal agents establish base stations that mimic cellular service providers’ signals, thereby tricking nearby handsets into identifying themselves. Even more chilling: a Triggerfish deployment can be set to screen for particular handset characteristics or just grab every piece of data within grabbing range and analyze it all later.

What makes all this amazingly simple snooping amazingly simple is that when the GSM cellular standard — upon which most U.S. networks rely — was developed, designers didn’t consider two-way authentication necessary. Evidently, the notion that someone might create a fake base station and use it to invade subscribers’ privacy didn’t occur to them. Even worse, there’s a gaping loophole in the GSM’s security protocol that allows Triggerfish deployments to request unique subscriber ID codes, called IMSIs, and actually receive them, thereby walking all over privacy and information security understandings subscribers have with their providers.

The 3G GSM standard, currently beginning deployment, requires base stations to authenticate themselves, so 3G phones on 3G networks are not subject to Triggerfish assault.

  • google-share
Previous Story

Australian Sex Party to Launch Thursday

Next Story

Week of Sacred Sex Coming to End for Congregation

Leave a Reply Cancel reply

You must be logged in to post a comment.

Sponsor

YNOT Shoot Me

YNOTShootMe.com has exclusive pics from adult industry business events. Check it out!

YNOT Directory

  • imaXcash — Dating Affiliate Network
    Dating Affiliate Programs
  • Ero Advertising
    Marketing & Traffic Services
  • 69 Cash
    Dating Affiliate Programs
  • Premiere Listing

    Mail Value Profits

    More Details

RECENT

POPULAR

COMMENTS

ChickPass Amateurs Drops Two "Try-A-Dick" Scenes with Karma Blay

Posted On 06 Jun 2025

Parker Savage Makes His See Him Fuck Debut

Posted On 06 Jun 2025

Erika Icon Scores June Cover of ASN Mag & Feature

Posted On 06 Jun 2025

Vanessa, Meet Vivid

Posted On 29 Sep 2014
Laila Mickelwaite and Exodus Cry

Laila Mickelwaite, Exodus Cry and their Crusade Against Porn

Posted On 03 May 2021

Sex Toy Collective Dildo Sculptor

Posted On 19 Mar 2019

Find a good sex toy is now a problem,...

Posted On 18 Mar 2024

Thanks to the variety of sex toys, I can...

Posted On 02 Feb 2024

I understand the concerns about...

Posted On 05 Jan 2024

Sponsor

Sitemap
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.OkPrivacy Policy