Page 1 of 3 123 LastLast
Results 1 to 10 of 24

Thread: Keywords Used On Phone

  1. #1
    Senior Member
    Join Date
    Jun 2003
    Posts
    119

    Question Keywords Used On Phone

    This Question is mostly for phreakers then hackers. Have you ever saw the movie Enemy Of The State. Well in that movie The NSA has a system that automatically taps a persons phone when certain keywords are used. For example ...nucluer bomb..president...terrorist..attack planned.

    I was wondering does the NSA or the government really have the tech. to do things like this.And if you don't know about the Patriotic Act which was passed right after 9/11 you might want to look into that too.
    [glowpurple]The inside secrets of big buisness are being leaked onto the Net - (who\'s fault is that ) - Me[/glowpurple] http://www.AntiOnline.com/sig.php?imageid=419

  2. #2
    Senior Member
    Join Date
    Aug 2001
    Posts
    100
    if you are interested in such systems visit this website. quite a lot information about spying systems....

    http://archive.aclu.org/echelonwatch/networks.html

    hmm, reading through this can make you schizophrenic...
    \"Knowledge is the Real Power\"

  3. #3
    Senior Member
    Join Date
    Jun 2003
    Posts
    119
    if you are interested in such systems visit this website. quite a lot information about spying systems....
    I am not really interested in the systems. I was just seeing if anyone is aware of tech like this. Also I think it's an invasion of privacy.

    Cheers
    [glowpurple]The inside secrets of big buisness are being leaked onto the Net - (who\'s fault is that ) - Me[/glowpurple] http://www.AntiOnline.com/sig.php?imageid=419

  4. #4
    Senior Member
    Join Date
    Jul 2003
    Posts
    634
    yea this system called echelon its a very very clever system

    heres a link i found on google

    http://www.heise.de/tp/english/inhalt/te/6929/1.html

    do you remember in the news a while back during the afganistan thing that they located a senior member Al-Quader, by intercepting his mobile phone call, then they matched the voice against a know voice print of his and then located once they knew it was him by triangulating the signal, clever stuff

    so yes they do have the technology and it is implemented,

    i2c

  5. #5
    Member
    Join Date
    Jul 2003
    Posts
    80
    I'm not exactly sure it's possible to tap into someone's phone when they say a keyword, but it is possible to hack into someone's cellphone...

    BD]Hobbit
    http://www.AntiOnline.com/sig.php?imageid=442
    You need people of intelligence on this sort of quest...

  6. #6
    Senior Member
    Join Date
    Jan 2002
    Posts
    1,207
    I'm sure the technology exists to detect keywords in phone calls, however I find it unlikely that they can afford to put it on every phone line in the world, much less hire all the people they'd need to listen to the phone calls to filter out the false positives.

    I can't see how their technology can do much better of detecting the words "Nuclear bomb" on the phone

    Plus also, radio triangulation has nothing to do with keyword listening, it's a much more basic technique and has been used for at least 60 years.

    I think they would have found Bin Laden much better from his satellite phone if they hadn't announced to the world's media that that's what they were doing.

  7. #7
    I heard about them doing this with email as well

    so what would happen if you set up like a hundred free email accounts with email fwdin' set up so something like

    account1 -> account2 -> account3 (etc etc etc) account100 -> account1

    so that when you send an email into the loop it automatically keeps fwdin' itself thro the loop continuosly & wrote something in the email that would trigger the tracking system

    would it pick it up and flag it every time?

    v_Ln

  8. #8
    Senior Member
    Join Date
    Oct 2001
    Posts
    872
    By: slarty
    however I find it unlikely that they can afford to put it on every phone line in the world
    What if part of your phone line had this system already implemented (how do you know the government wasn't trying to tap phones the second day Bell showed them to the world?). So regardless, every phone line you buy will be capable for tapping... spooky, ain't it?
    ...This Space For Rent.

    -[WebCarnage]

  9. #9
    Senior Member
    Join Date
    Jun 2003
    Posts
    119
    This was on the website that i2c gave.

    Echelon is a system used by the United States National Security Agency (NSA) to intercept and process international communications passing via communications satellites. It is one part of a global surveillance systems that is now over 50 years old. Other parts of the same system intercept messages from the Internet, from undersea cables, from radio transmissions, from secret equipment installed inside embassies, or use orbiting satellites to monitor signals anywhere on the earth's surface. The system includes stations run by Britain, Canada, Australia and New Zealand, in addition to those operated by the United States. Although some Australian and British stations do the same job as America's Echelon sites, they are not necessarily called "Echelon" stations. But they all form part of the same integrated global network using the same equipment and methods to extract information and intelligence illicitly from millions of messages every day, all over the world.
    Now thats frekin freaky.....
    [glowpurple]The inside secrets of big buisness are being leaked onto the Net - (who\'s fault is that ) - Me[/glowpurple] http://www.AntiOnline.com/sig.php?imageid=419

  10. #10
    rebmeM roineS enilnOitnA steve.milner's Avatar
    Join Date
    Jul 2003
    Posts
    1,021
    Originally posted here by valhallen
    I heard about them doing this with email as well
    The other thing to do is place a load of 'keywords' as additional X-headers in every email you send.

    If the 'powers that be' want to spend their time and resources reading every tiny bit of drivel I email, then good luck to them.

    Don't fight the system with encryption, because that's just a technology race which at some time in the future (often sooner than thought) your mail's readable. If it's encrypted then it must be worth reading, right.

    Hide it in plain sight. Remember the best place to hide a pebble is on a beach with shed loads of other pebbles, not in a large and very well locked chest sitting on the beach.

    Steve
    IT, e-commerce, Retail, Programme & Project Management, EPoS, Supply Chain and Logistic Services. Yorkshire. http://www.bigi.uk.com

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •