YNOT
  • Industry News
    • Adult Business News
    • Adult Novelty News
    • YNOT Magazine
    • EU News
    • Opinions
    • Picture Galleries
  • PR Wire
    • Adult Company News
    • Adult Retail News
    • Adult Talent News
    • Adult Videos News
  • Industry Guides
    • Adult Affiliate Guide
    • Affiliate Marketing for Beginners
    • Top Adult Traffic Networks
    • Top Adult PR Agents
    • Funding an Adult Business
  • Business Directory
    • View Categories
    • View Listings
    • Submit Listing
  • Newsletters
  • Login with YNOT ID

Feds Free to Engage in Warrantless Cell Tracking

Posted On 19 Nov 2008
By : admin

WASHINGTON, DC — Think your cellular use is safe from prying eyes who that haven’t obtained a warrant up front?Think again.

On Tuesday, the American Civil Liberties Union revealed it has obtained documents indicating the FBI has been engaging in wholesale cellular phone tracking without judicial oversight or operator complicity. The practice is facilitated by powers granted the FBI under the Foreign Intelligence Surveillance Act.

Using a technology called Triggerfish — which has nothing to do with colorful marine life — federal agents establish base stations that mimic cellular service providers’ signals, thereby tricking nearby handsets into identifying themselves. Even more chilling: a Triggerfish deployment can be set to screen for particular handset characteristics or just grab every piece of data within grabbing range and analyze it all later.

What makes all this amazingly simple snooping amazingly simple is that when the GSM cellular standard — upon which most U.S. networks rely — was developed, designers didn’t consider two-way authentication necessary. Evidently, the notion that someone might create a fake base station and use it to invade subscribers’ privacy didn’t occur to them. Even worse, there’s a gaping loophole in the GSM’s security protocol that allows Triggerfish deployments to request unique subscriber ID codes, called IMSIs, and actually receive them, thereby walking all over privacy and information security understandings subscribers have with their providers.

The 3G GSM standard, currently beginning deployment, requires base stations to authenticate themselves, so 3G phones on 3G networks are not subject to Triggerfish assault.

  • google-share
Previous Story

Australian Sex Party to Launch Thursday

Next Story

Week of Sacred Sex Coming to End for Congregation

Leave a Reply Cancel reply

You must be logged in to post a comment.

Sponsor

YNOT Shoot Me

YNOTShootMe.com has exclusive pics from adult industry business events. Check it out!

YNOT Directory

  • Clickadu – Your trusted traffic souce
    Marketing & Traffic Services
  • Dating Factory
    Dating Affiliate Programs
  • Online Gifts Shop
    Other Professional Services
  • Premiere Listing

    imaXcash — Dating Affiliate Network

    More Details

RECENT

POPULAR

COMMENTS

Comic Wyatt Feegrado Guests on Matt Slayer's 'And Now We Drink'

Posted On 05 Nov 2025
Pineapple Support

Duke Tax Joins Pineapple Support As Supporter-Level Sponsor

Posted On 05 Nov 2025

Britanicamask Launches New Official Website Showcasing Rapidly Rising Modeling Brand

Posted On 05 Nov 2025

Vanessa, Meet Vivid

Posted On 29 Sep 2014
Laila Mickelwaite and Exodus Cry

Laila Mickelwaite, Exodus Cry and their Crusade Against Porn

Posted On 03 May 2021

Someone puts Gal Gadot in one of your vids? Take it down!

Posted On 13 Dec 2017

Hoping viewers can also enjoy a spooky...

Posted On 24 Oct 2023

now a days these type of games will get...

Posted On 17 Jul 2023

good move from adent. these type of...

Posted On 06 Jul 2023

Sponsor

Sitemap
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.