Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Can The NSA Really Track Turned-Off Cellphones?
Newest First  |  Oldest First  |  Threaded View
Councillor CarlC174
50%
50%
Councillor CarlC174,
User Rank: Apprentice
12/11/2014 | 3:20:36 AM
re: Can The NSA Really Track Turned-Off Cellphones?
There is a seperate battery which runs the GPS system on most phones, with the technology now days it is easy to find a phone that is turned off even with the battery out as GPS battery much harder to remove.

My advice leave your phone at home.
justanotherengineer
50%
50%
justanotherengineer,
User Rank: Apprentice
8/1/2013 | 6:30:18 PM
re: Can The NSA Really Track Turned-Off Cellphones?
Combine this with the recent 'apps' that use the accelerometer to determine when to take some pictures, and record some sounds (aka PlaceRaider) . . . and you have the ultimate in surveillance. People who voluntarily bug themselves.
Cara Latham
50%
50%
Cara Latham,
User Rank: Apprentice
7/28/2013 | 2:56:43 PM
re: Can The NSA Really Track Turned-Off Cellphones?
Exactly why their access -- or the potential they have to access it -- is worrisome.
moarsauce123
50%
50%
moarsauce123,
User Rank: Ninja
7/27/2013 | 10:36:38 AM
re: Can The NSA Really Track Turned-Off Cellphones?
Your interpretation of "doing something wrong" may fall inline with the popular definition, but governments consider things "wrong" for quite many reasons. I leave it up to you to spin that thought further on.
moarsauce123
50%
50%
moarsauce123,
User Rank: Ninja
7/27/2013 | 10:34:49 AM
re: Can The NSA Really Track Turned-Off Cellphones?
There is still the option to take a hammer. Any iPhone will be off for sure after that.
OtherJimDonahue
50%
50%
OtherJimDonahue,
User Rank: Apprentice
7/25/2013 | 6:29:38 PM
re: Can The NSA Really Track Turned-Off Cellphones?
This could have come in handy when I lost my cellphone last week.

Jim Donahue
Managing Editor
InformationWeek
Alex Kane Rudansky
50%
50%
Alex Kane Rudansky,
User Rank: Apprentice
7/25/2013 | 5:02:01 PM
re: Can The NSA Really Track Turned-Off Cellphones?
Cara, I agree. The element of choice is significant. While most Americans have nothing to hide, the idea that we have no control over what the government can access is concerning. Nordstrom's tracking is still concerning, but at least consumers can opt out.
MyW0r1d
50%
50%
MyW0r1d,
User Rank: Apprentice
7/25/2013 | 4:50:13 PM
re: Can The NSA Really Track Turned-Off Cellphones?
From the point of view of dropping added chips in a cell phone, sealed phones like the iPhone certainly make doing so much more time consuming. They also make removing the battery (ensuring off means off) logically impossible. Next DLP step to avoid corporate espionage, check your iPhones at the door before entering company strategy meetings. Wouldn't it be nice to have a meeting once again with everyone focused rather than distracted by texting, catching the latest news on their phone or forgetting to turn on the mute features?
Rick_in_WV2day
50%
50%
Rick_in_WV2day,
User Rank: Apprentice
7/25/2013 | 2:05:45 PM
re: Can The NSA Really Track Turned-Off Cellphones?
Even if your cell phone is turned of its still emitting a signal. So are your rfid chips in credit cards. 1984 just came a little too late but it's here to stay...
Cara Latham
50%
50%
Cara Latham,
User Rank: Apprentice
7/25/2013 | 1:38:18 PM
re: Can The NSA Really Track Turned-Off Cellphones?
The difference between retailers accessing my smartphone -- and only providing warning -- and the government accessing my phone is that I can choose whether or not to enter Nordstrom and be subjected to it. While I am certain that I am not doing anything that would set off alarms at the NSA, CIA, or any governmental agencies, the fact that the government can still have access to my phone without my having a say is unsettling.


Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19750
PUBLISHED: 2019-12-12
minerstat msOS before 2019-10-23 does not have a unique SSH key for each instance of the product.
CVE-2019-4606
PUBLISHED: 2019-12-12
IBM DB2 High Performance Unload load for LUW 6.1 and 6.5 could allow a local attacker to execute arbitrary code on the system, caused by an untrusted search path vulnerability. By using a executable file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-For...
CVE-2019-16246
PUBLISHED: 2019-12-12
Intesync Solismed 3.3sp1 allows Local File Inclusion (LFI), a different vulnerability than CVE-2019-15931. This leads to unauthenticated code execution.
CVE-2019-17358
PUBLISHED: 2019-12-12
Cacti through 1.2.7 is affected by multiple instances of lib/functions.php unsafe deserialization of user-controlled data to populate arrays. An authenticated attacker could use this to influence object data values and control actions taken by Cacti or potentially cause memory corruption in the PHP ...
CVE-2019-17428
PUBLISHED: 2019-12-12
An issue was discovered in Intesync Solismed 3.3sp1. An flaw in the encryption implementation exists, allowing for all encrypted data stored within the database to be decrypted.