<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic The Evolution of Technical Eavesdropping in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/The-Evolution-of-Technical-Eavesdropping/m-p/31842#M2152</link>
    <description>&lt;P&gt;You are a world traveler. You are tech savoy. Your IT and CI people are sharp. They provide you with a "burner phone" to travel with.&amp;nbsp;Passing through international customs is no big deal right? Think again. That is precisely where you get tagged for in-country surveillance.&amp;nbsp;Are you safe? Who's listening?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are a number of possible methods that intelligence agencies or sophisticated corporate competitors can take to install spyware on burner phones for the purposes of eavesdropping:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Malicious carrier updates&lt;/LI&gt;&lt;LI&gt;Radio frequency (RF) hacking&lt;/LI&gt;&lt;LI&gt;Physical installation by customs agents&lt;/LI&gt;&lt;LI&gt;Fake cell towers&lt;/LI&gt;&lt;LI&gt;Infections via hotel WiFi&lt;/LI&gt;&lt;LI&gt;Evil maid attacks&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;We need to rethink how we use phones in country in those meetings where we are making big deals. Here are a few &lt;A href="https://www.helpnetsecurity.com/2020/01/07/burner-phones-eavesdropping-risk/" target="_blank" rel="noopener"&gt;tips&lt;/A&gt;:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Invest in an anti-surveillance case for the burner phone that masks the surrounding audio in the vicinity of the phone, preventing spies listening on the other end from gaining any meaningful information.&lt;/LI&gt;&lt;LI&gt;Purchase a burner phone that features a hardware kill switch for shutting off the microphones when not needed.&lt;/LI&gt;&lt;LI&gt;If telephone calls aren’t necessary, physically disconnect the microphones within the burner phone&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;The theft of files and emails at the hands of foreign agents gets all the attention, but face-to-face conversations in the presence of a compromised smartphone can reveal information that’s just as valuable. It’s important for security teams to recognize this emerging threat and take the proper precautions.&lt;/P&gt;</description>
    <pubDate>Mon, 09 Oct 2023 09:24:56 GMT</pubDate>
    <dc:creator>AppDefects</dc:creator>
    <dc:date>2023-10-09T09:24:56Z</dc:date>
    <item>
      <title>The Evolution of Technical Eavesdropping</title>
      <link>https://community.isc2.org/t5/Tech-Talk/The-Evolution-of-Technical-Eavesdropping/m-p/31842#M2152</link>
      <description>&lt;P&gt;You are a world traveler. You are tech savoy. Your IT and CI people are sharp. They provide you with a "burner phone" to travel with.&amp;nbsp;Passing through international customs is no big deal right? Think again. That is precisely where you get tagged for in-country surveillance.&amp;nbsp;Are you safe? Who's listening?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are a number of possible methods that intelligence agencies or sophisticated corporate competitors can take to install spyware on burner phones for the purposes of eavesdropping:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Malicious carrier updates&lt;/LI&gt;&lt;LI&gt;Radio frequency (RF) hacking&lt;/LI&gt;&lt;LI&gt;Physical installation by customs agents&lt;/LI&gt;&lt;LI&gt;Fake cell towers&lt;/LI&gt;&lt;LI&gt;Infections via hotel WiFi&lt;/LI&gt;&lt;LI&gt;Evil maid attacks&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;We need to rethink how we use phones in country in those meetings where we are making big deals. Here are a few &lt;A href="https://www.helpnetsecurity.com/2020/01/07/burner-phones-eavesdropping-risk/" target="_blank" rel="noopener"&gt;tips&lt;/A&gt;:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Invest in an anti-surveillance case for the burner phone that masks the surrounding audio in the vicinity of the phone, preventing spies listening on the other end from gaining any meaningful information.&lt;/LI&gt;&lt;LI&gt;Purchase a burner phone that features a hardware kill switch for shutting off the microphones when not needed.&lt;/LI&gt;&lt;LI&gt;If telephone calls aren’t necessary, physically disconnect the microphones within the burner phone&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;The theft of files and emails at the hands of foreign agents gets all the attention, but face-to-face conversations in the presence of a compromised smartphone can reveal information that’s just as valuable. It’s important for security teams to recognize this emerging threat and take the proper precautions.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:24:56 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/The-Evolution-of-Technical-Eavesdropping/m-p/31842#M2152</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2023-10-09T09:24:56Z</dc:date>
    </item>
    <item>
      <title>Re: The Evolution of Technical Eavesdropping</title>
      <link>https://community.isc2.org/t5/Tech-Talk/The-Evolution-of-Technical-Eavesdropping/m-p/31918#M2161</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/887781263"&gt;@AppDefects&lt;/a&gt;I have to fully endorse what you have stated, even in Western Samoa, they have an economy based on mobile phones and transferring money - and yes fake mobile cell towers have been set up for example and also in other Pacific Islands in the region.&amp;nbsp; A mobile phone is such a utilitarian device these days, everyone forgets it also a carrier of malware, a tracking device and full of embedded electronics - which as you stated can be turned into a passive listening device, where ever you are.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then add the convenient apps people download as well like WhatsApp and they expect some privacy and security - hmmm I don't think so.&amp;nbsp; I particularly like the statement on the web site, Security is in our DNA - but who owns it?&amp;nbsp; Yes, you all know.&amp;nbsp; There are far better applications for this like "Signal", but even these are not NATO rated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Other devices to watch out for the Smartwatches and any other convenient nice looking smart ware that adorns a lot of peoples bodies.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jan 2020 19:00:40 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/The-Evolution-of-Technical-Eavesdropping/m-p/31918#M2161</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2020-01-22T19:00:40Z</dc:date>
    </item>
  </channel>
</rss>

