Risk
7/24/2013
10:54 AM
50%
50%

Can The NSA Really Track Turned-Off Cellphones?

It depends on semantics, security experts say. What's clear is that surveillance is becoming much more sophisticated.

Or for more proactive surveillance, someone could plant a bug on a phone. "The best way to track an 'off' phone is to -- secretly -- install a chip, connected to the phone's battery supply," Graham said. "Thus, even when the phone is 'off,' that added chip would still be 'on.' In this case, it's not really the phone itself that's being tracked, but that chip. As long as you had a battery, the same tracking technique would work for portable laptops, your shoe or even a gun." The Federal Bureau of Alcohol, Tobacco, and Firearms (ATF) attempted to use this technique as part of its Operation Fast and Furious gun-tracking program, "but the batteries drained too fast," Graham said. Obviously, secreting a chip on a phone, which needs to be regularly recharged by its user, would help avoid that type of problem.

But old phones may not actually turn off, even if they appear to be powered down. For example, Graham said many old "feature phones," even when they were switched off, would have a baseband processor power up every 10 minutes or so to retrieve SMS messages, but not phone calls. "The moral of this is that just because you define the phone as 'off' doesn't mean that it's 100% completely 'off' all the time," he said.

An intelligence agency that could exploit this technological caveat, of course, would be able to track targets without their knowledge, as the Post story makes clear. And thus an entire intelligence ecosystem grew up around related data-collection practices, fed in part by the NSA embedding so-called "tactical cryptologic support teams" within military units and tasking them with collecting data during missions.

Another program, dubbed the Geolocation Cell, or Geo Cell, involved a combined team from the NSA and the National Geospatial-Intelligence Agency. Its purpose was to track targets in real time -- motto: "We Track 'Em, You Whack 'Em" -- so they could be killed using drones.

Grisly stuff, but what about for the rest of us -- meaning, anyone who's not an Iraqi insurgent or suspected terrorist? Numerous NSA surveillance programs have recently come to light thanks to the leaks by former agency contractor Edward Snowden, a Booz Allen Hamilton employee who worked at an agency facility in Hawaii that processes intelligence from around the Pacific Rim. Some of the thousands of documents he removed reveal a panoply of obscurely named, and overlapping, surveillance programs with names such as PRISM (audio, email and video interception), Mainway (traffic analysis of cell phone calls), Marina (Internet traffic analysis) and Nucleon (telephone content interception). Do you now have to worry about the NSA being able to track you even when the cell phone in your pocket has supposedly been powered down?

Predictably, White House and intelligence officials argue that the NSA's surveillance programs are both lawful and designed to avoid collecting data on U.S. residents. Civil liberties advocates, however, have criticized the agency's approach of collecting all possible data, then using search algorithms to attempt to avoid retrieving information about Americans.

But the scale of the data collection and potential for abuse should give us pause. Furthermore, if the NSA can apply its advanced skills to intercept this type of data, it could presage more mundane efforts by companies to track consumers. To wit, the Economist recently reported that Nordstrom was testing a Wi-Fi tracking system from Euclid Analytics, designed to track shoppers who enter or pass by 17 of their stores. The system works by passively watching for smartphones' and laptops' Wi-Fi beacons, thus tracking people without their devices even logging into a store-controlled Wi-Fi network.

Nordstrom posted a public notice near its stores saying that people might be tracked via their smartphones. But should such practices be allowed -- warning or no? And how far of a step is it for retailers to amass data not just about consumers via Wi-Fi, but also about their digital wallets? Tracking people via their smartphones is no less ominous when it's being practiced by a retailer instead of the NSA.

In today's enterprise, the endpoint could be any number of devices operating in any number of locations. With endpoint technology changing so rapidly, what's the best approach to building an effective, enforceable endpoint security strategy that works across the enterprise? Download our Building And Enforcing An Endpoint Security Strategy report today. (Free registration required.)

Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Councillor CarlC174
50%
50%
Councillor CarlC174,
User Rank: Apprentice
12/11/2014 | 3:20:36 AM
re: Can The NSA Really Track Turned-Off Cellphones?
There is a seperate battery which runs the GPS system on most phones, with the technology now days it is easy to find a phone that is turned off even with the battery out as GPS battery much harder to remove.

My advice leave your phone at home.
justanotherengineer
50%
50%
justanotherengineer,
User Rank: Apprentice
8/1/2013 | 6:30:18 PM
re: Can The NSA Really Track Turned-Off Cellphones?
Combine this with the recent 'apps' that use the accelerometer to determine when to take some pictures, and record some sounds (aka PlaceRaider) . . . and you have the ultimate in surveillance. People who voluntarily bug themselves.
Cara Latham
50%
50%
Cara Latham,
User Rank: Apprentice
7/28/2013 | 2:56:43 PM
re: Can The NSA Really Track Turned-Off Cellphones?
Exactly why their access -- or the potential they have to access it -- is worrisome.
moarsauce123
50%
50%
moarsauce123,
User Rank: Apprentice
7/27/2013 | 10:36:38 AM
re: Can The NSA Really Track Turned-Off Cellphones?
Your interpretation of "doing something wrong" may fall inline with the popular definition, but governments consider things "wrong" for quite many reasons. I leave it up to you to spin that thought further on.
moarsauce123
50%
50%
moarsauce123,
User Rank: Apprentice
7/27/2013 | 10:34:49 AM
re: Can The NSA Really Track Turned-Off Cellphones?
There is still the option to take a hammer. Any iPhone will be off for sure after that.
OtherJimDonahue
50%
50%
OtherJimDonahue,
User Rank: Apprentice
7/25/2013 | 6:29:38 PM
re: Can The NSA Really Track Turned-Off Cellphones?
This could have come in handy when I lost my cellphone last week.

Jim Donahue
Managing Editor
InformationWeek
Alex Kane Rudansky
50%
50%
Alex Kane Rudansky,
User Rank: Apprentice
7/25/2013 | 5:02:01 PM
re: Can The NSA Really Track Turned-Off Cellphones?
Cara, I agree. The element of choice is significant. While most Americans have nothing to hide, the idea that we have no control over what the government can access is concerning. Nordstrom's tracking is still concerning, but at least consumers can opt out.
MyW0r1d
50%
50%
MyW0r1d,
User Rank: Apprentice
7/25/2013 | 4:50:13 PM
re: Can The NSA Really Track Turned-Off Cellphones?
From the point of view of dropping added chips in a cell phone, sealed phones like the iPhone certainly make doing so much more time consuming. They also make removing the battery (ensuring off means off) logically impossible. Next DLP step to avoid corporate espionage, check your iPhones at the door before entering company strategy meetings. Wouldn't it be nice to have a meeting once again with everyone focused rather than distracted by texting, catching the latest news on their phone or forgetting to turn on the mute features?
Rick_in_WV2day
50%
50%
Rick_in_WV2day,
User Rank: Apprentice
7/25/2013 | 2:05:45 PM
re: Can The NSA Really Track Turned-Off Cellphones?
Even if your cell phone is turned of its still emitting a signal. So are your rfid chips in credit cards. 1984 just came a little too late but it's here to stay...
Cara Latham
50%
50%
Cara Latham,
User Rank: Apprentice
7/25/2013 | 1:38:18 PM
re: Can The NSA Really Track Turned-Off Cellphones?
The difference between retailers accessing my smartphone -- and only providing warning -- and the government accessing my phone is that I can choose whether or not to enter Nordstrom and be subjected to it. While I am certain that I am not doing anything that would set off alarms at the NSA, CIA, or any governmental agencies, the fact that the government can still have access to my phone without my having a say is unsettling.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8891
Published: 2015-03-06
Unspecified vulnerability in the Java Virtual Machine (JVM) in IBM SDK, Java Technology Edition 5.0 before SR16-FP9, 6 before SR16-FP3, 6R1 before SR8-FP3, 7 before SR8-FP10, and 7R1 before SR2-FP10 allows remote attackers to escape the Java sandbox and execute arbitrary code via unspecified vectors...

CVE-2014-8892
Published: 2015-03-06
Unspecified vulnerability in the Java Virtual Machine (JVM) in IBM SDK, Java Technology Edition 5.0 before SR16-FP9, 6 before SR16-FP3, 6R1 before SR8-FP3, 7 before SR8-FP10, and 7R1 before SR2-FP10 allows remote attackers to bypass intended access permissions and obtain sensitive information via un...

CVE-2015-1170
Published: 2015-03-06
The NVIDIA Display Driver R304 before 309.08, R340 before 341.44, R343 before 345.20, and R346 before 347.52 does not properly validate local client impersonation levels when performing a "kernel administrator check," which allows local users to gain administrator privileges via unspecified API call...

CVE-2015-1637
Published: 2015-03-06
Schannel (aka Secure Channel) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly restrict TLS state transitions, which makes it easier for r...

CVE-2014-2130
Published: 2015-03-05
Cisco Secure Access Control Server (ACS) provides an unintentional administration web interface based on Apache Tomcat, which allows remote authenticated users to modify application files and configuration files, and consequently execute arbitrary code, by leveraging administrative privileges, aka B...

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.