Skip to content

FBI and NSA can remotely activate Android and PC Laptop Microphones to Record Conversations ๐Ÿ˜Ž๐Ÿ‘€ ๐Ÿ˜Ž๐Ÿ‘€ ๐Ÿ˜Ž๐Ÿ‘€ ๐Ÿ˜Ž๐Ÿ‘€ ๐Ÿ˜Ž

January 25, 2015

๐Ÿ˜Ž๐Ÿ‘€ FBI and NSA can remotely activate Android and PC Laptop Microphones to Record Conversations. We discussed whether the new Microsoft Kinect could be used as an NSA spying tool. When it comes to microphones in Android Cell phones and PC Laptop computers, though, surveillance might not be a theoretical question.

๐Ÿ˜Ž๐Ÿ‘€ The Wall Street Journal reports that the FBI and the NSA can already remotely activate all these Microphones to record Conversations. The question is will these Hacker Surveillance Tools be used without anyone knowing, without a court order, or "probable cause." Remember the US Constitution’s 4th Amendment, an important part of our Bill of Rights.

๐Ÿ˜Ž๐Ÿ‘€ Law-enforcement officials in the U.S. have expanded the use of Hacker Surveillance Tools routinely used by computer Hackers to gather information on suspects, bringing the criminal wiretap into the cyber age. The problem who is Watching the folks using these Hacker Surveillance Tools, and who is watching the watchers regarding these Hacker Surveillance Tools.

๐Ÿ˜Ž๐Ÿ‘€ The Oversight Problem. These Agencies, FBI, NSA, CIA, DOD, DOJ, IRS to name a few, are becoming Huge and Arrogant. When agency heads and department managers are called before Congress, we hear lots of "I don’t know…" and "I am not aware of this…" responses to questions. So forget about Congressional Oversight checking on Government Abuses. These Agencies have too many layers of of folks that Congressional Hearings cannot penetrate. Therefore the US public obtains awareness of possible abuses by Whistle Blowers.

๐Ÿ˜Ž๐Ÿ‘€ Federal agencies have largely remain Silent about these Capabilities; however, court documents and interviews with people involved in the programs, provide new details about the use of these cyber-hacking tools, including spyware delivered to computers and phones through email or Web links, techniques more commonly associated with common PC Computer Viruses, and PC security attacks by cyber-criminals.

๐Ÿ˜Ž๐Ÿ‘€ The FBI has been hiring people who have advanced hacking skill, and they purchase tools that are capable of doing these cyber-things… says a former official in the agency’s cyber division.

๐Ÿ˜Ž๐Ÿ‘€ People familiar with the Federal Bureau of Investigation’s programs say that the use of hacking tools under court orders has grown as agents seek to keep up with suspects who use new communications technology, including some types of online chat and encryption tools. The use of such communications, which can’t be wiretapped like a phone, is called "going dark" among law enforcement. A spokeswoman for the FBI declined to comment on this topic.

๐Ÿ˜Ž๐Ÿ‘€ The FBI develops some hacking tools internally and purchases others tools from the private sector, likely underground hackers. With such technology, Govenment Agencies can remotely activate the microphones in phones running Google’s Android software to record conversations, one former U.S. official said. This listening techniques can do the same to Microphones in PC Laptops without the user knowing, the person said. Google declined to comment.

๐Ÿ˜Ž๐Ÿ‘€ For the record, if Government Agencies and Cyber Hackers can turn on you PC Computer’s and your Android Cell Phone’s Microphones, those same Hackers can Turn ON your PC’s Video Cameras and Mic’s, and Turn ON your Android’s Video Cameras and Mic’s, Watching and Hearing what you are doing in the privacy of your home or anywhere, all in HDTV resolution.

๐Ÿ˜Ž๐Ÿ‘€ The bureau typically uses hacking in cases involving organized crime, child pornography or counterterrorism, a former U.S. official said. It is loath to use these tools when investigating hackers, out of fear that the hacker-suspect will discover the surveillance and publicize the techniques, the official said.

๐Ÿ˜Ž๐Ÿ‘€ The FBI, NSA, CIA, DOD have been developing hacking tools for decades, but rarely discloses these techniques publicly in fear of Public Outcry.

๐Ÿ˜Ž๐Ÿ‘€ 10 Famous Hackers and Hacks. While widely used, the term hacker is not always applied as it should be. In the hacking community in particular, there can be stark divisions between hackers โ€“ people immensely skilled at navigating computer systems and diagnosing security flaws, and crackers, those who use their hacking knowledge for malicious gain. This same dichotomy is sometimes represented by the terms white hat and black hat. A white hat hacker, for example, may be someone hired by a company to break into its computer network in order to find vulnerabilities. A black hat hacker is someone on the outside who would break into a system in order to cause damage or for financial gain.

๐Ÿ˜Ž๐Ÿ‘€ Although these various definitions exist, the term hacker is now largely a stand-in for anyone who breaks into computer networks, and it often carries a negative connotation. Some have broken the law in their careers, but many have also gone on to have productive (and legal) roles in the computer industry. Those that have broken the law have complex legal cases, and their motives are not necessarily malicious. In this article, we’ll look at several famous hackers of all stripes. The term hacker commonly refers to anyone who unlawfully breaks into computer networks, and it often carries a negative connotation.

๐Ÿ˜Ž๐Ÿ‘€ 1. Kevin Mitnick. Not all hackers break the law and even fewer become the targets of FBI manhunts. But Kevin Mitnick was jailed twice โ€“ first in 1988, and then, after a plea bargain, from 1995 until 2000. For three years, he wasn’t allowed to the use the Internet. He managed to send and receive e-mail by having his girlfriend do all the clicking and typing; Mitnick just watched the screen .

๐Ÿ˜Ž๐Ÿ‘€ Mitnick often trumpeted himself more as a "social engineer" than a hacker. He said he preferred to use "persuasion, influence and manipulation" in order to solicit information from influential people โ€“ e.g. someone with access to a tech firm’s computer network, which didn’t require writing new software or otherwise breaking codes to get into a network .

๐Ÿ˜Ž๐Ÿ‘€ Mitnick has been the subject of several books, including "Takedown," which was made into a movie, and he even appeared in an episode of the TV show "Alias." Since regaining his computer privileges, he has started his own security-consulting firm, in addition to making rounds on the public speaking circuit. Hacker Kevin Mitnick was jailed twice for his crimes, once in 1988, and then again from 1995 to 2000.

๐Ÿ˜Ž๐Ÿ‘€ 2. Kevin Poulsen. Like Kevin Mitnick, Kevin Poulsen was hunted by the FBI and was the subject of a book "The Watchman: The Twisted Life and Crimes of Serial Hacker Kevin Poulsen" chronicling his hacking exploits. And like Mitnick, Poulsen eventually went straight, giving up hacking.

๐Ÿ˜Ž๐Ÿ‘€ But before Poulsen rediscovered the right side of the law, he accrued a litany of hacking exploits, some of them illegal. While still a child, he learned how to whistle into a payphone in order to get free calls (he channeled the sound through his braces). He hacked a radio station’s phone lines in order to win a call-in contest whose prize was a Porsche. He eventually earned the distinction of being the first hacker charged with espionage after he allegedly stole classified information from the Air Force . Other charges against him include hacking into Pacific Bell. Eventually he was sentenced to 51 months for his crimes.. Since giving up hacking, Poulsen has become a journalist, working as a senior editor at Wired magazine, where he often writes about hackers. It may be a clichรฉ, but many hackers do go by nicknames. Poulsen’s was Dark Dante.

๐Ÿ˜Ž๐Ÿ‘€ 3. Adrian Lamo. Earlier on in his hacking career, Adrian Lamo was something of a good Samaritan, known by the moniker "the homeless hacker" because he sometimes took up residence in abandoned buildings. As a hacker, Lamo broke into the networks of a number of major companies โ€“ Excite@Home, MCI WorldCom, Yahoo, Microsoft and Google โ€“ but he often contacted the companies and told them about the security holes. In some cases, he also helped them fix these holes without accepting any compensation .

๐Ÿ˜Ž๐Ÿ‘€ He finally got into trouble when he hacked into The New York Times โ€“ from a computer at a Kinko’s โ€“ in 2003. He found a trove of information there, including personal details on thousands of people who had written for the paper, including celebrities and ex-presidents. To avoid jail time, he negotiated a plea bargain that included six months of house arrest .

๐Ÿ˜Ž๐Ÿ‘€ In recent years, Lamo has been in the news for reporting Bradley Manning to police. Manning, a U.S. Army private first class, allegedly funneled thousands of classified documents to the whistleblower organization WikiLeaks and then contacted Lamo, who said that Manning boasted about his actions. Lamo’s role in the affair, in which he presented himself as a journalist, has attracted some controversy . Hackers’ Diagnosed. In April 2010, Lamo was diagnosed with Asperger’s, an autism-spectrum disorder commonly associated with people of high intelligence who have difficulty socializing .

๐Ÿ˜Ž๐Ÿ‘€ 4. Gary McKinnon. Like Adrian Lamo, Gary McKinnon has been diagnosed with Asperger’s syndrome. This Scottish hacker’s supporters have protested plans for the U.K. government to extradite him to the United States to face trial for allegedly hacking into U.S. government computers. Those working on McKinnon’s behalf worry that he is "too psychologically fragile" and may commit suicide . His case has contributed to a serious debate about the U.K.’s extradition policies.

๐Ÿ˜Ž๐Ÿ‘€ McKinnon is under suspicion for hacking into U.S. government computer networks in late 2001 and early 2002, in what’s been called a historic breach of security . A British court judgment accuses McKinnon of infiltrating 97 computers, installing hacking software, deleting important files and stealing information . He confessed that he left a threatening note on one Army computer, in which he identified himself by the name "SOLO." McKinnon has admitted to the hacks and said he thought he could find evidence that United States was covering up the existence of UFOs. His case remains ongoing. Gary McKinnon is accused of hacking into U.S. government computer networks in late 2001 and early 2002.

๐Ÿ˜Ž๐Ÿ‘€ 5. Robert Tappan Morris. Robert Tappan Morris is now a tenured professor at MIT Computer Science and Artificial Intelligence Laboratory, but he has a colorful history as one of the computer world’s most renowned hackers. In 1988, while still an undergraduate at Cornell, Morris released into the wild what may have been the first computer "worm," a virus that went on to infect 6,000 Unix-based computers. Many of these machines suffered serious damage.

๐Ÿ˜Ž๐Ÿ‘€ Although Morris claimed that he was only trying to measure the "size" of the then-embryonic Internet, the government eventually decided to prosecute him. He became the first person convicted under the 1986 Federal Computer Fraud and Abuse Act . Because of the novelty of the case and Morris’ claim that he didn’t intend to cause any damage, a debate ensued about whether he deserved prison time. Eventually a judge sentenced Morris to three years probation and ordered him to pay a fine and perform 400 hours of community service.

๐Ÿ˜Ž๐Ÿ‘€ A Hacking Convention. Since 1993, the DEFCON conference has been one of the world’s largest gatherings of hackers. The event features lectures, hacking contests and other events, and is attended by many well-known hackers and computer-security specialists.

๐Ÿ˜Ž๐Ÿ‘€ 6. John Draper. While many hackers go mainstream and open consulting firms or become university professors, some never quite get there, and wind up in prison or somewhere else on society’s margins. John Draper is one such person. After serving as a radar technician in the Air Force in the mid-1960s, Draper began tinkering with the phone system, learning its intricacies, its internal codes (including, allegedly, a code that allowed him to get President Nixon on the phone) and how to hack the system for free calls.

๐Ÿ˜Ž๐Ÿ‘€ For his exploits, he became known as a "phone freak," adopting the name after finding a toy whistle in a cereal box and learning that the whistle could be used to imitate telephone tones. Later, Draper linked up with Steve Wozniak, co-founder of Apple, and also wrote one of the first word processing programs eventually picked up by Apple and IBM. But his eccentric behavior, poor business sense and bad luck hampered his ability to make money and to stay in a job for long. In the late 1970s, he served two stints in prison for phone fraud.

๐Ÿ˜Ž๐Ÿ‘€ Over the years, some of Draper’s more successful Silicon Valley friends, like Wozniak, have tried to help him, but his record and behavior make him difficult to employ. A 2007 newspaper article described Draper as living in a decrepit, one-room apartment, having almost no teeth, and getting by either on the kindness of friends or occasional programming gigs .

๐Ÿ˜Ž๐Ÿ‘€ 7. The Masters of Deception. The Masters of Deception (MOD) was a group of hackers based in New York who, in the late 1980s, went on a hacking spree, taking particular advantage of the country’s phone system in order to hack into various corporate and government networks.

๐Ÿ˜Ž๐Ÿ‘€ Although members of the MOD were top-notch hackers, their big mistake likely came when they engaged in a rivalry with the Legion of Doom (LOD). The battle between the two came to be known as the Great Hacker War, although the conflict allegedly started when one LOD member used a disparaging racial epithet in reference to an MOD member. What followed was a back-and-forth battle between the hacking groups, which also involved LOD members providing security advice to corporations that MOD had targeted.

๐Ÿ˜Ž๐Ÿ‘€ Eventually, five members of MOD pled guilty to various crimes, and four spent brief periods in jail. The groups’ members dispersed, and many found work for technology and security firms. Their story has been chronicled in many articles and books, including one whose title says it all: "Masters of Deception: The Gang That Ruled Cyberspace."

๐Ÿ˜Ž๐Ÿ‘€ 8. Matthew Bevan and Richard Pryce. Some hackers steal information or money, or damage or hijack systems, but few hackers can claim to have nearly started a war. But in 1996, Matthew Bevan and Richard Pryce were accused of just that by the U.S. government. Bevan and Pryce, who are both British, were arrested separately, several months apart, for trying to break into U.S. military systems.

๐Ÿ˜Ž๐Ÿ‘€ Bevan was a 21-year-old IT worker at the time and went by the hacker alias "Kuji," while Pryce was only 17 and known as "Datastream Cowboy" . According to a U.S. government report, the two allegedly worked together for several months, first establishing an electronic beachhead on a computer system located at Griffiss Air Force Base, in New York. They then installed password-collecting programs and began hacking their way into other government systems.

๐Ÿ˜Ž๐Ÿ‘€ After discovering the intrusions, U.S. officials became especially alarmed when they found that the duo may have infiltrated a North Korean system during an especially tenuous time of negotiations with that country over its nuclear-weapons program. Because the intrusion came via a hijacked U.S. government computer, it could’ve been construed as an act of war. Ultimately it was discovered that the hack in question had targeted a South Korean government agency .

๐Ÿ˜Ž๐Ÿ‘€ 9. Jonathan James. By age 16, Jonathan James had already achieved renowned hacker status by becoming the first juvenile hacker to be sentenced to juvenile detention for 6 months in 2000 . Going by the alias "cOmrade," James was charged with hacking into computer systems belonging to NASA and the Department of Defense. His hacks were harmless, but he stole information and the security breaches required extensive downtime in order to secure the systems, which cost tens of thousands of dollars.

๐Ÿ˜Ž๐Ÿ‘€ James’ father supported his son, saying that he hadn’t caused any damage and had exposed security flaws . Unfortunately, after leaving the juvenile institution, James’ troubles continued when he tested positive for drugs. And when his mother died when he was 18, that left him alone with her house and little motivation to work, a recipe for hacking.

๐Ÿ˜Ž๐Ÿ‘€ In 2008, government agents raided his house as part of an investigation into what was then called the largest identity theft case in U.S. history . James and others were suspected of hacking into the systems of many large businesses and stealing information as part of an identity and credit-card theft ring that had netted millions of dollars. Two weeks after the raid, James committed suicide. He left a suicide note explaining that, while he considered himself innocent, he believed that because of his past notoriety, federal authorities would pin the blame on him rather than other guilty parties.

๐Ÿ˜Ž๐Ÿ‘€ 10. Albert "segvec" Gonzalez. In 2009, Albert Gonzalez pleaded guilty to hacking into numerous companies’ computer systems in connection with the so-called TJX identity theft ring โ€“ the same series of crimes that led to the raid on Jonathan James’ house. The group that Gonzalez was a part of stole 36 million credit card numbers from TJX, which owns TJ Maxx and other large stores, although 70 percent or so of these cards were expired . Still, the costs to the companies responding to the attacks were immense; TJX alone spent more than $170 million .

๐Ÿ˜Ž๐Ÿ‘€ What’s particularly strange about Gonzalez’s case is that for years he worked as an informant for the secret service, providing information on other credit card thieves. However, by continuing and even expanding his criminal behavior, he left himself open to prosecution and was eventually sentenced to 20 years in prison . Several other men also were sentenced to prison time for their participation in the ring, although Gonzalez’s sentence remains the longest ever handed down to a hacker in the United States.

Pleased you are reading, as our readers ๐Ÿ“š thousands world-wide, give motivation ๐Ÿ“ข for new topics published every day. Spread the Word ๐Ÿ“ฌ to your friends, family, and associates; simply forward ๐Ÿ“ฎ the link below, post it on your Facebook and Twitter Pages for their review,, anyone may subscribe, its secure, confidential, as every time ๐Ÿ“… I publish a story ๐Ÿ“ the WordPress system {not I} sends ๐Ÿ“ฌ a reminder to you with a link to my new Article:

Perspective: These articles are created to inform a diverse audience, whether it be photography, digital cameras, lenses, Image editing, Apps, Smartphones, iPads, iPhones, Laptops and related products, Health & Wellness, or any news-worthy topic. The purpose is to inform, from sources that are believed to be reliable, and stimulate Dialogue.

To learn more about what else we do, take a moment and visit these links, browse around. We are pleased with over 22 million visits in recent years: For Health & Wellness; If digital Imaging is of interest, I teach a course named "Principles of Digital Imaging and Post Image Processing" as an Adjunct Prof at FAU:

When I do what I do… I usually do it here.

  1. Hi I am so delighted I found your blog, I really found you by accident, while I was looking on
    Askjeeve for something else, Regardless I am here now and would just like to say thanks for a
    marvelous post and a all round exciting blog (I also love the theme/design), I donโ€™t hae time to rerad through it aall at the
    minute but I have book-marked it and also addedd your RSS feeds,
    so when I have time I will be back to read more,
    Please do keep up the great jo.

    • Thank you for your kind remarks. Pass our web-Page to your friends, family and on your Social networks. The More Readers we have the more I write. we have over 23,000 readers, and want to get to 50k. with your help… JimW

Trackbacks & Pingbacks

  1. Gary McKinnon UFO Hacker Interview | Talesfromthelou's Blog

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: