Jump to content
Main menu
Main menu
move to sidebar
hide
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Special pages
Niidae Wiki
Search
Search
Appearance
Create account
Log in
Personal tools
Create account
Log in
Pages for logged out editors
learn more
Contributions
Talk
Editing
Wiretapping
(section)
Page
Discussion
English
Read
Edit
View history
Tools
Tools
move to sidebar
hide
Actions
Read
Edit
View history
General
What links here
Related changes
Page information
Appearance
move to sidebar
hide
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Mobile phone=== The first generation mobile phones ({{circa|1978}} through 1990) could be easily monitored by anyone with a [[Scanner (radio)|'scanning all-band receiver']] because the system used an analog transmission system-like an ordinary radio transmitter. Instead, digital phones are harder to monitor because they use digitally encoded and compressed transmission. However the government can tap mobile phones with the cooperation of the phone company.<ref>{{Cite news |url=https://apnews.com/0538d9746fdd4126b0e700a963f92df4 |title=The price of surveillance: US gov't pays to snoop |last=Flaherty |first=Anne |date=2013-07-10 |work=AP News |access-date=2019-11-03 |publisher=Associated Press |location=Washington}}</ref> It is also possible for organizations with the correct technical equipment to monitor mobile phone communications and decrypt the audio.{{Citation needed|date=March 2019}} To the mobile phones in its vicinity, a device called an "[[IMSI-catcher]]" pretends to be a legitimate base station of the mobile phone network, thus subjecting the communication between the phone and the network to a [[man-in-the-middle attack]]. This is possible because, while the mobile phone has to authenticate itself to the mobile telephone network, the network does not authenticate itself to the phone.<ref>{{Cite web |url=https://www.networkworld.com/article/2171269/apple-ios-apps-subject-to-man-in-the-middle-attacks.html |title=Apple iOS Apps Subject to Man-in-the-Middle Attacks |last=Messmer |first=Ellen |date=2013-10-29 |website=Network World |access-date=2014-07-22}}</ref>{{Failed verification|date=November 2019}} There is no defense against IMSI-catcher based eavesdropping, except using end-to-end call encryption; products offering this feature, [[secure telephone]]s, are already beginning to appear on the market, though they tend to be expensive and incompatible with each other, which limits their proliferation.<ref>{{Cite thesis |last=Wang |first=Zidu |title=Crypto Phones |date=2007-12-07 |publisher=Ruhr University Bochum |url=http://www.slideshare.net/Garry54/crypto-phones |access-date=2014-07-22}}</ref>
Summary:
Please note that all contributions to Niidae Wiki may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Encyclopedia:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Search
Search
Editing
Wiretapping
(section)
Add topic