LE SIM Card Cloning - Survivalist Forum
Survivalist Forum

Advertise Here

Go Back   Survivalist Forum > >
Articles Classifieds Donations Gallery Groups Links Store Survival Files


Notices

The Tech Zone Discussion on computers, software and games.

Advertise Here
Reply
 
Thread Tools Display Modes
Old 09-26-2020, 02:46 PM
Asag's Avatar
Asag Asag is offline
D. Gibbons is a bad man
 
Join Date: Dec 2013
Posts: 5,417
Thanks: 2,163
Thanked 4,853 Times in 2,529 Posts
Default LE SIM Card Cloning



Advertise Here

OK folks now doubts you will have issues with the source and the context but its a heads up on personal information security in light of current LE practices.


https://theintercept.com/2020/09/25/...protect-phone/
Quick reply to this message
The Following User Says Thank You to Asag For This Useful Post:
Old 09-26-2020, 04:36 PM
PSYOP Soldier's Avatar
PSYOP Soldier PSYOP Soldier is offline
Lux in Tenebris
 
Join Date: Jul 2010
Posts: 6,573
Thanks: 7,137
Thanked 11,082 Times in 4,047 Posts
Default

yup..lock that **** down and if you are going to use a phone for stealth comms go buy and older burner iphone...

make sure you do not tx/rx w normal phone in the presence of burner and get an rfid signal blocker bag for phones too....

I make sure my phone and sd cards are locked and encrypted in case some LEO decides to try to grab data physically or thru the various mobile cell cloning/mining set ups..
Quick reply to this message
The Following 4 Users Say Thank You to PSYOP Soldier For This Useful Post:
Old 10-01-2020, 12:50 PM
windexsunday windexsunday is offline
Junior Member
 
Join Date: Mar 2013
Posts: 101
Thanks: 77
Thanked 100 Times in 56 Posts
Default

Quote:
…the Justice Department used “a sophisticated cell phone cloning attack—the details of which remain classified—to intercept protesters’ phone communications” in Portland this summer…
If it is classified sophisticated attack how do they know if any of the techniques in the article will work to thwart it?

-ws
Quick reply to this message
The Following User Says Thank You to windexsunday For This Useful Post:
Sponsored Links
Advertisement
 
Old 10-01-2020, 02:39 PM
Asag's Avatar
Asag Asag is offline
D. Gibbons is a bad man
 
Join Date: Dec 2013
Posts: 5,417
Thanks: 2,163
Thanked 4,853 Times in 2,529 Posts
Default

Quote:
Originally Posted by windexsunday View Post
If it is classified sophisticated attack how do they know if any of the techniques in the article will work to thwart it?

-ws
The mitigationís described are best practical effort and everyone should be making it as difficult as possible for opportunistic LE info gathering and intercept.
Quick reply to this message
Old 10-01-2020, 09:48 PM
Exarmyguy Exarmyguy is offline
Survivor
 
Join Date: Oct 2014
Location: Within view of the Pacific Ocean
Posts: 5,591
Thanks: 7,139
Thanked 12,209 Times in 3,827 Posts
Default

The hospital porter staff just got issued knew IPhones and chucked out their old Blackberrys. I scooped one out of the disposal bin and am going to use it for a burner phone .
Quick reply to this message
The Following User Says Thank You to Exarmyguy For This Useful Post:
Old 10-01-2020, 10:03 PM
rriley rriley is offline
Survivor
 
Join Date: Jul 2013
Posts: 2,421
Thanks: 0
Thanked 2,735 Times in 1,347 Posts
Default

If the government really wants to intercept your cell phone activity they will be able to do it. No telecommunications are perfectly secure any more.
Quick reply to this message
The Following User Says Thank You to rriley For This Useful Post:
Old 10-02-2020, 01:16 AM
Asag's Avatar
Asag Asag is offline
D. Gibbons is a bad man
 
Join Date: Dec 2013
Posts: 5,417
Thanks: 2,163
Thanked 4,853 Times in 2,529 Posts
Default

Quote:
Originally Posted by rriley View Post
If the government really wants to intercept your cell phone activity they will be able to do it. No telecommunications are perfectly secure any more.
No one actually believes they are but you can do a little to make the governments job just a little bit harder to invade your privacy.
Quick reply to this message
Old 10-02-2020, 01:43 AM
Central Scrutinizer's Avatar
Central Scrutinizer Central Scrutinizer is offline
"TURGID FLUX"
 
Join Date: Jul 2016
Location: Tennessee
Posts: 5,142
Thanks: 6,118
Thanked 4,920 Times in 2,583 Posts
Default

There is no technical advice, no APP that can protect you carrying a modern device, none at all.

If you are going to be at a protest you should not be carrying a smartphone, tablet, FitBit, Apple Watch, Ear Buds or any other networked electronic device. Even that fancy wifi toaster in your camper. You will be tracked, you will be carrying personal information subject to seizure. It is not enough to leave it in your parked vehicle. That **** should be left at home as if you never left home.

I actually left my phone at home today on a long errand which left me feeling a bit odd. I have an "antique" dumb phone, that still has GPS.

I did have a mobile radio in case I needed to contact someone. It is technology that cannot be easily tracked.

If you need communications for an activity your best bet is to use commercial gear like surplus police radios that have encryption. You can buy these cheaply and a Key Variable loader is $200-300 for 56BIT DES which is sufficient if you change keys frequently and use random frequencies at random locations. Your range is 1 to 5 miles depending upon terrain.

If you rely on FRS/GMRS/MURS or even out of the box BaoFeng radios all of the traffic at an event on all channels can be monitored in bulk using software defined radio hardware and even if encrypted, be post processed. do not use personal identifiers, "handles" or convey any information that can be useful later.
Quick reply to this message
The Following 2 Users Say Thank You to Central Scrutinizer For This Useful Post:
Old 10-02-2020, 01:52 AM
Central Scrutinizer's Avatar
Central Scrutinizer Central Scrutinizer is offline
"TURGID FLUX"
 
Join Date: Jul 2016
Location: Tennessee
Posts: 5,142
Thanks: 6,118
Thanked 4,920 Times in 2,583 Posts
Default

Quote:
Originally Posted by windexsunday View Post
If it is classified sophisticated attack how do they know if any of the techniques in the article will work to thwart it?

-ws
Exactly. You can expect that the NSA is light years ahead of commercial technology in capabilities to intercept and decrypt. They actually have SPIES planted inside the R&D, Ops and manufacturing of these products. They have connections inside Academia and even fund the research. If you think the Russians and Chinese are sneaky, look closer at home.
Quick reply to this message
The Following 2 Users Say Thank You to Central Scrutinizer For This Useful Post:
Reply

Bookmarks



Quick Reply
Message:
Options

Register Now

In order to be able to post messages on the Survivalist Forum forums, you must first register.
Please enter your desired user name, your email address and other required details in the form below.
User Name:
Password
Please enter a password for your user account. Note that passwords are case-sensitive.
Password:
Confirm Password:
Email Address
Please enter a valid email address for yourself.
Email Address:

Log-in

Human Verification

In order to verify that you are a human and not a spam bot, please enter the answer into the following box below based on the instructions contained in the graphic.



Thread Tools
Display Modes

Posting Rules
You may post new threads
You may post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT -5. The time now is 06:49 AM.


Powered by vBulletin®
Copyright ©2000 - 2020, vBulletin Solutions, Inc.
Search Engine Optimisation provided by DragonByte SEO (Lite) - vBulletin Mods & Addons Copyright © 2020 DragonByte Technologies Ltd.
vBulletin Security provided by vBSecurity v2.2.2 (Pro) - vBulletin Mods & Addons Copyright © 2020 DragonByte Technologies Ltd.
Copyright © Kevin Felts 2006 - 2015,
Green theme by http://www.themesbydesign.net