Greek, U.S. Officials Tapped For Years 236
Bruce Schneier posts on a story being reported in the Seattle Intelligencer. Greek and U.S. officials in Greece apparently had their phones tapped for over a year before the 2004 Olympics. From the article: "It was not known who was responsible for the taps, which numbered about 100 and included Greek Prime Minister Costas Caramanlis and his wife, and the ministers of foreign affairs, defense, public order and justice. Most of Greece's top military and police officers were also targeted, as were foreign ministry officials and a U.S. embassy number. Also tapped were some journalists and human rights activists." Schneier gives a bit of technical background on how the tapping was accomplished.
Well duh (Score:3, Interesting)
Re:Well duh (Score:5, Insightful)
Really, though, is this such a surprise? I'd think a foreign government would have to be bloody daft to accept any sort of tech built in the US where any sensitive communication is going to take place. You can make a no-click phone tap from a modem; you think that the US government can't do better? Or do you think that the Bush admin has the scruples not to tap its allies?
Re:Well duh (Score:5, Informative)
For the curious, here's a list [rcfp.org] of how each of the fifty U.S. states handle tape recording of telephone calls.
Re:Well duh (Score:2)
Under the statute, consent is not required for the taping of a non-electronic communication uttered by a person who does not have a reasonable expectation of privacy in that communication. See definition of "oral communication," Texas Code Crim. Pro. Art. 18.20.
Now, I wonder just how closely they define "electronic communication"? Ignoring the fact that even a basic Bell telephone is electronic communication (as is a tape
Re:Well duh (Score:2)
The way I understand it (IANAL, but am married to one), IP telephony and PBX calls can be recorded without notification to the person you are talking to, as they're still defined, rather loosely I'd say, as voice traffic. Now, whether or not this remains the case once elected officials start looking more closely at IP telephony due to the screams and howls of their well-funded telco lobbyists remains to be seen. I have a sneaky suspicion that the people who are most likely object to one-way recording are
Re:Well duh (Score:2, Informative)
Wonder no longer.
From Article 18.20 of the Texas Code of Criminal Procedure:
"(15) "Electronic communication" means a transfer of signs, signals,
writing, images, sounds, data, or intelligence of any nature
transmitted in whole or in part by a wire, radio, electromagnetic,
photoelectronic, or photo-optical system. The term does not
include:
(A) a wire or oral communication;
(B) a communication made through a tone-only paging device; or
(C) a co
Re:Well duh (Score:2)
Re:Well duh (Score:2)
Re:Well duh (Score:2)
I don't see why you think our government was doing the tapping. Every country spies on every other country - in recent years just off the top of my head I can think of incidents where the US government was spied on by Russia, France, the Phillipines, China, and Israel. Those were efforts that were discovered by the FBI - I'm sure they're just the tip of the iceberg.
I'm sure the US embassy already has recording devices on all the
Re:Well duh (Score:2)
Made in the US? Vodafone? (Score:2)
Re:Well duh (Score:2)
Exactly. And it's not just foreign officials. A friend of mine worked for the SNP, a Scottish political party. They were warned on the first day that their phones were tapped and they should watch what is said.
The only scandal about Watergate was that they got caught.
Or do you think that the Bush admin has the scruples not to tap its allies?
It's not a parisan
Re:Well duh (Score:2)
Yes, this has gone on for a long time, including financing of political groups. However, Greece is a NATO member and thus a close ally to USA, but is still treated ths way. Just imagine (or better, re
Re:Well duh (Score:2)
There is no indication the US was even involved, it could just be corporate spying, what is different between spyware on a computer and spyware on
Re:Well duh (Score:2)
Re:Well duh (Score:2)
Geek phones tapped? (Score:3, Funny)
"Geek U.S. Officials Tapped For Years"?
I dunno...maybe that's just because I was on \. I was thinking that.
-TLAY
Re:Geek phones tapped? (Score:4, Funny)
I seriously doubt geek anythings but especially geek government officials would be getting tapped on a regular basis.
Re:Geek phones tapped? (Score:2)
I'd hit it.
I'd hit it like the fist of an angry God.
Re:Geek phones tapped? (Score:2)
Re:Geek phones tapped? (Score:2)
"Geek U.S. Officials Tapped For Years"?
No, but at first I thought its too bad how broke they are, and maybe they should be given a raise?
Re:Geek phones tapped? (Score:2)
Close, I came up with:
"Geeky U.S. Officials Trapped For Years".
Words are fun. =)
Court?? (Score:2)
Re:Court?? (Score:2)
Re:Court?? (Score:2)
I knew you could.
Re:Court?? (Score:2)
It's called anti-semitism. Get over it.
Re:Court?? (Score:2)
Of course Israel has a vested interested in what happens during the Olympics in Greece. What do you think would have happened to the Israeli athletes in Munich if Israeli intelligence had an inside line on what the Germans were planning?
Furthermore, you poison the well. Saying something about Israel that isn't glowing and praiseful is not antisemitism. Saying something about Israel slaughtering Palestinians is not an
Re:Court?? (Score:2)
What's to stop Vodaphone from doing this with all of their phones? I imagine a few corporate executives would be looking long and hard at their mobile phones if they knew they were potentially tapped at purchase. The possibilites for corporate espionage are limitless, but perhaps the discovery of a few unauthorized corporate wiretaps is what it'll take to make people take a harder look at warrantless wiretapping in general.
Why can't we have... (Score:3, Insightful)
Actually the idea is as old as the MAD magazine, but with today's technology it could be implemented using public keys and a tiny modem in the headset.
voice -> data -> public-key encrypted data -> voice.
Ta-da!
Re:Why can't we have... (Score:2, Insightful)
1. Build encryptor for phones to hide nefarious deeds
2. Authorities take interest in you
3. Authorities tap your phone and find out that they can't decode your speech data
4. Authorities go "
At this point you are effectively putting head to head two computer systems:
1) The *hand held* device that you built to encode and decode speach in *real time* in order to hide what
Re:Why can't we have... (Score:3, Interesting)
Several problems with this objection. First of all STU phones have existed for years (and they keep replacing them with STU I, STU II, STU III etc) -- well because the keep gettin
Re:Why can't we have... (Score:2)
The more general point I was trying to make (and badly) was that if the authorities are interested in you, then they will bring to bare on you as many resources as matches their interest. And that any small, portable device will never be a match for a much larger, more powerful device.
Hiding your voice as another type of data
Re:Why can't we have... (Score:3, Insightful)
Re:Why can't we have... (Score:2)
Re:Why can't we have... (Score:2)
That's OK, because at least that would stop them from potentially filtering phonecalls "en masse" thru stuff like Echelon [wikipedia.org].
Re:Why can't we have... (Score:3, Interesting)
Or just put someone hear you when you are talking.
Or look at other information about you to see if you are worth listening to.
Or ask a bunch of folks about you.
Or feed you some information about something nefarious and see if you use encryption to relay it to someone.
It is way too easy to put your faith in high tech cryptography and high tech cryptanalysis, when old fashioned methods w
Re:Why can't we have... (Score:2)
So if I were a terrorist, I would use encryption and draw attention to my traffic, leading to further analysis.
And if I were an ordinary citizen, I would not normally use encryption (except perhaps for commercial secrets which I don't want *foreign* agencies grabbing) because I don't want to make the legitimate job of tracking terrorists harder. Unlike
Re:Why can't we have... (Score:2)
It does amaze me how quickly Americans have concluded that the terrorist threat is minor. Al Qaeda is very smart to launch their attacks elsewhere now and wait until they have something really nasty, like a nuke, before they attack us again. They didn't anticipate the ferocity of our first response. But they do study history, and know that the decadent we
Re:Why can't we have... (Score:2)
I find this one of the most annoying arguments around. It is, to put it simply, ignorant or stupid - take your pick. Or to be mo
Re:Why can't we have... (Score:2)
Re:Why can't we have... (Score:3, Informative)
Re:Why can't we have... (Score:2)
Re:Why can't we have... (Score:2)
The whole thing is done in public, with intense media coverage and participation. The Powers that Be and the Powers that Wish to Be participate openly in the proceedings, and each faction's ouster plans are hotly debated at all levels of our society for months and even years preceding an ouster event.
Re:Why can't we have... (Score:3, Interesting)
You mean that the Democratic and Republican parties are not more than 8 years old?
All that happens here in the US is that the two political parties trade off every several years. Currently, laws are written in private closed door sessions, when they are not directly written by the corporate interests themselves. Case in point, the recent consumer bankrupcy bill. It was literally writte
Re:Why can't we have... (Score:2)
LOL. (Score:2)
Give you a bunch of cards saying "pick a card any card, but just one...".
It doesn't matter which card you pick, your choice already has been predetermined.
This is especially true in the US, since the top US politicians need lot of money to get anywhere in politics (unlike in some other countries where this is regulated, and so it is a bit harder).
The various companies (or rich) will sponsor (pick) the politicians from _any_ of the parties, who they thi
Organized Crime? (Score:5, Interesting)
I wouldn't be surpriesd if organized crime here in the US hadn't figured out a way to tap into people's phone calls. The telepone companies don't seem to care who listens to our phone calls anymore.
It's time for end to end encryption of all communications. We should get an SSL session from one handset to the other.
Re:Organized Crime? (Score:2, Informative)
Something else that the fine article fails to mention is that the cells that the eavesdroppers used were spotted and all of them are very close and around the US embassy and most of the embassy people live in that area. There isn't any real doubt in Greece that the US embassy was at least involved.
From an anonymous gree
Re:Organized Crime? (Score:2)
These "targets" tend to more imply government. Leaving the question of "which one". Of course it could be that organised crime put the taps in on behalf of a government...
Re:Organized Crime? (Score:2)
Another possibility is that following the money leads somewhere which it would be politically incorrect to accuse.
I wouldn't be surpriesd if organized crime here in the US hadn't figured out a way to tap into people's phone call
From Vodaphone Customer Service (Score:2)
"Hello, Vodaphone Greece. Yeah, I've got a complaint about my service. I think someone's tapping my phone. How can I tell? Every time I talk to my wife I hear heavy breathing that isn't hers, if you know what I mean..."
First rule of phone tapping: (Score:5, Insightful)
"Omykod, neighbor, I just discovered a webcame in MY shower, too! Chekkidout!"
"Wow dude, someone put that same keylogger on my laptop, too! Here it is, right in the process list on my Windows Task Manager!"
"Greek Allies: Thank you for sharing your concerns that we were behind the recent suspicious rerouting of cell phone calls made by your top government officials. As you can see from the attached mobile phone company records, our embassy has been a victim of this heinous eavesdropping as well. We look forward to working with you to find the Real Perpetrators. Sincerely, CIA Field Chief -REDACTED-"
Re:First rule of phone tapping: (Score:2, Insightful)
Re:First rule of phone tapping: (Score:2)
Like they weren't being tapped already? (Score:3, Informative)
Note to self: two tinfoil hat posts in one sitting... I need to cut back on the Mt. Dews after lunchtime
Re:Like they weren't being tapped already? (Score:2)
AC wrote: If Echelon exists then why did Bush need to order illegal wiretaps of U.S. citizens calling overseas?
If you've read up on Echelon, you know it is designed to catch everything. It's almost like a huge crop harvest. You grab all of the crop and then pick out your prize specimens to enter in the county fair. Likewise, you sift through an enormous mish mash of communications traffic looking for something that stands out as informative and/or requiring some sort of action. If you've ever worked in th
Comment removed (Score:3, Insightful)
Turkish intelligence services? (Score:2)
I sure hope not, the last thing we need more sabre rattling in the Balkans.
Not the whole story... (Score:5, Interesting)
1) The software used was developed by Vodafone's major supplier,
Ericsson. It was installed although Vodafone does not own any licenses
to use it.
http://news.kathimerini.gr/4dcgi/_w_articles_poli
2) Vodafone was notified by a Reseller, Q-Telecoms, about delays in
text message delivery, after which they undertook an ad-hoc analysis.
They found the software, supposedly a remotely activated Trojan (how
the hell could a Trojan get onto an SMS gateway?), by sheer luck, and
then disconnected the computer from the network.
3) The day after (2) the local security manager was discovered dead.
"Suicide", don't you know.
4) Ta Nea (http://digital.tanea.gr/ [tanea.gr]) are claiming it was the CIA,
since the remote proxy used for collecting data appeared to lie in the
vicinity of the American and / or British embassies. How amateurish is
that? Their motive was "Anti-Terrorism" before, during and evidently
also after the 2004 Olympics, which is no doubt why the list of
mobiles being tracked also included those of some prominent, and very
very active (if you follow the news about bombs and firebombs at Greek
banks and ministries, you'll know what I mean) anarchists (not
commies, much more left wing than those boy-scouts).
So long,
Re:Not the whole story... (Score:2)
As an anarchist, I am offended by that.
Re:Not the whole story... (Score:2)
Anarchists are the extreme of Libertarianism.
Re:Not the whole story... (Score:2)
Re:Not the whole story... (Score:2)
It does seem that the extreme of either end is a dictatorship ... and the dictatorships resemble each other it seems. Probably the reason is that the real spectrum is about human mindsets. I recently saw a documentary series on the origins of the 3 religions of Abraham: Judaism, Christianity and Islam. And the thing that struck me, and the narrator, was that in all the people who were interviewed the major difference was not between the religions but between the tolerant and the intolerant in the same reli
Re:Not the whole story... (Score:2)
I have heard this described this as the "line" being more of a circle, hence going very far left or very far right winds up in the same place.
I recently saw a documentary series on the origins of the 3 religions of Abraham: Judaism, Christianity and Islam. And the thing that struck me, and the narrator, was that in all the people who were interviewed the major difference was not between t
No. (Score:2)
Re:No. (Score:2)
Re:No. (Score:2)
The things government can provide which are of potential benefit are standard weights & measures and enforcement of contracts.
The former is explicitally in the US Constitution as a government function. Anyway fiat money is in no way essential to government anyway.
Re:No. (Score:2)
We know who did it (Score:4, Funny)
Oh! (Score:2, Funny)
"Stop poking me. Stop poking me. Stop poking me. Seriously, stop poking me."
Anyone with real knowledge about phone tapping? (Score:3, Interesting)
Now, thanks to the wonder of Slashdot, I can ask multiple people who may know something about this.
1) Is this story believable?
2) Do you hear "clicks" if your phone line is being tapped?
3) Can any private organization arrange to have another wire leading from another phone?
Re:Anyone with real knowledge about phone tapping? (Score:3, Informative)
1) Is this story b
Fasten your seatbelts! (Score:2, Interesting)
A lot of you zombies think it's some good-hearted organization for finding lost puppies, but part of the Iraq-war intel came from there. And it stretches back all the way....I suppose to the Bay of Pigs or so.
It's not new; it's just new to you...part of how the world has always worked. Don't panic.
to find out who did it (Score:2)
headlines? (Score:2)
suicide, destruction of software (Score:2)
Unbelievable. (Score:2)
Move along, nothing to see here...
Yeah right...
Re:Interesting (Score:3, Insightful)
Re:Interesting (Score:3, Informative)
>
>That was clever. How did they get access to the phones to flash the programming? Phones worked fine otherwise. Makes me think someone had access to them at the factory. How else would they be able to get the source. Or would they need it?
One of three ways:
1) A backdoor in phones for snooping; either placed there by design/regulation in concert with the manufacturer, or slipped in by means of
Re:Interesting (Score:4, Informative)
Re:Interesting (Score:2)
From the article:
Roussopoulos said the surveillance was carried out through spy software installed in the central system of Vodafone, the mobile telephony provider that served the targets.
Re:Interesting (Score:5, Interesting)
They didn't have to.
They (whoever "they" is) did it all from the telephone company switch.
This is exactly the same mechanism that is used for "proper" (IE: court ordered, law enforcement initiated) taps.
A command is issued in the switch that makes any future calls to or from the "target" phone part of a conference. The 3rd party in the conference would normally be a one-way audio device, that is connected to the police recording equipment.
In this case, it appears that the monitoring party was another cell phone (a pre-paid one, hard to track down who it belongs to).
The "hack" in this case, is really just an un-authorized use of an existing function in the telephone switching platform. It only takes a couple of commands, from a login with appropriate permissions, to do this.
All that stuff in the movies "..what was that, did you hear a click?" is bogus. I've been involved in a lot of testing of these and you can't tell that there's anything out of the ordinary going on.
Re:Interesting (Score:2, Interesting)
Re:Interesting (Score:3, Interesting)
The collection of Ericsson cell phone switches that I am currently sitting beside (4 of them) have a lot of features available in them, that
Re:Interesting (Score:5, Interesting)
Never underestimate the power of even a simple device to spy. My favorite spy tool of all time was a plaque given to the US Embassy at Moscow by the Soviets in 1946. The US inspected it and determined that there was absolutely no way it could be bugged. It was
Re:Interesting (Score:2, Informative)
Re:Interesting (Score:2)
Consider that today's copiers (and printers) are all digital and that it would be pretty trivial to have them store copies to flash memory for easy retrieval, either by a tech "running diagnostics" or over the wire or even wireless. (Heck, many copiers already have the built-in smarts to disallow copying/
Re:Interesting (Score:2)
That is... really ingenious.
Sorta reminds me of the 'sniffing' devices they hung from spy planes in Vietnam, that were supposed to detect traces of ammonia that would eminate from bomb-making facilities. They ended up bombing a lot of empty forest, with buckets of piss adorning the branches...
misdirected post (Score:2)
Re:A few questions for Bush (Score:3, Insightful)
Gods don't kill people, people with gods kill people.
Those crazy super religious communists and facists! Killing all those millions of people in the name of Jesus! The mass murders of the 20th century, Stalin, Hitler, Pol Pot etc etc all were religious zealots!
Oh... wait a second. Erhh...
Re:So? (Score:5, Insightful)
It's interesting in many ways :
- it confirms what was previously just expected/suspected.
- The way in which it was done ( by installing software on the carrier's cell network that 'conferenced in prepaid phones' ) is definitely interesting.
- It was discovered.
Oh, and I've not read this anywhere else, but there's a post here which gives a few other details, including the mysterious "suicide" of one of the local security officials... not that I can tell you that it's anything real other than some radom dude posted something here, but still, that's interesting too, especially if true.
Anyway, I find it much more interesting than another RIM article or another CSS&HTML book review.
Re:So? (Score:2, Interesting)
> which gives a few other details, including the mysterious
> "suicide" of one of the local security officials... not that I can
> tell you that it's anything real other than some radom dude posted
> something here
The story of the Vodafone employee who was found dead two days after the discovery of the "spyware" has been in the TV news here (in Greece) and in some online news reports too. There was a "thorough investigation" by a
Re:So? (Score:2)
Re:Who fucking cares? (Score:5, Insightful)
Once upon a time, there was a dike. It was just a simple dike, nothing special. The dike was built, as dikes are, to stop water from flowing all over. One day though, someone decided to break a little bit of the dike. Nothing too drastic. Just a little water flowing out. What's the harm, y'know? In fact, it's helpful to the people nearby, since they get some free water! Thus, the whole wasn't fixed. But this little hole soon started to get larger. Alright...well the people are getting more free water now! But this hole kept on getting larger. Eventually, the hole was so large that the dike was of no use anymore. All the people who were getting free water could now be found under that water.
Now, to come back to the topic at hand: What happens when the government finds out that it is "okay" to eavesdrop on its own citizens? That the people don't care one bit about the whole thing. The government starts to do it more often. Eventually, it is too large to stop. I could very well bring up the Nazis, but I'd prefer to not violate Godwin's law.
Stories such as these raise awareness to the fact. I remember reading a comment earlier today about how the RIAA was purposely initiating frivolous lawsuits (Such as suing the person who never used a computer.) simply to remind people that they are still actively hunting those 'evil pirates.' The more people are aware, the more they participate. For example, in the late-1700s and early-1800s, the literacy rate throughout Europe started to rise. At the same time, the level of participation within politics also rose. One of the primary causes of the French Revolution (and the Terror that followed) was the use of newspapers to raise awareness amongst the populace.
Nowadays, awareness is the first step toward action.
Re:Who fucking cares? (Score:2)
That said, I'm not quite sure why you bring up the right to bear arms. I'm supposing that you simply cast me as someone who would be against it due to my previous post? On the contrary, I'm very well for the right to bear arms. The best way to stop a police state is with weapons. That is a case where you need quick action, for if the police state is allowed to continue for long, the people will be indoctrined towards it and would thus r
I care, and so should you? (Score:2)
Suppose someone has an embarassing (though legal) secret? The person listening could easily blackmail the individual. Or worse yet, what if it's a business conversation, and someone listening could easily profit? You don't think the US listens to other countries business communications, and passes the info to US corporations? Or other countries would spy on the US? Interesting...
I'm convinced you're either a troll, or just incredibly
Re:I care, and so should you? (Score:2)
Precedent counts for something (Score:3, Insightful)
It's not like the Executive Branch has just asserted its right to basically do what it pleases in the name of fighting terrorism, is it?
I understand your list of usual suspects, but something on the level of what's described doesn't sound like the Russians. Why would t
I think it was CIA (Score:4, Insightful)
I reckon that's either to test it, or so it could be denied later ('well we were bugged too').
If it was Israel, China etc, I bet they'd bug all the western embassies - it would just be an extra line in a configuration file.
Plus I know a few Ericsson switch engineers and they are all US or UK contract staff which rules out China or Russia to me (but maybe that has changed, maybe Ericsson use Russian staff now?) and Turkey Cyprus or Albania, forget it! Where would they get switch engineers from?
I hate to jump to conclusions too, but it looks highly likely, especially given the domestic spying without warrant in the USA, and the UN Kofi Annan spying incident, and the claimed kidnapping of Greek citizens by US & UK agencies.
Re:True, but... (Score:2)
Because it's such a long shot. Your assuming a person will defect from the monitoring country, that the spy will call just 1 Embassy (not any other government or USA consulate), that the defector will call ahead of time instead of just walking in, that you will learn enough to be useful and that (since Greece is