>From - Sat Mar 02 00:57:23 2024
Received: by 10.210.142.6 with SMTP id p6mr236010ebd.1.1248476053159;
Fri, 24 Jul 2009 15:54:13 -0700 (PDT)
Return-Path: <Socal..._at_aol.com>
Received: from imo-m12.mail.aol.com (imo-m12.mx.aol.com [64.12.143.100])
by gmr-mx.google.com with ESMTP id 15si699842ewy.0.2009.07.24.15.54.12;
Fri, 24 Jul 2009 15:54:13 -0700 (PDT)
Received-SPF: pass (google.com: domain of Socal..._at_aol.com designates 64.12.143.100 as permitted sender) client-ip=64.12.143.100;
Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of Socal..._at_aol.com designates 64.12.143.100 as permitted sender) smtp.mail=Socal..._at_aol.com
Received: from imo-da03.mx.aol.com (imo-da03.mx.aol.com [205.188.169.201]) by imo-m12.mail.aol.com (v107.10) with ESMTP id RELAYIN2-34a6a3b693a2; Fri, 24 Jul 2009 18:53:29 -0400
Received: from Socal..._at_aol.com
by imo-da03.mx.aol.com (mail_out_v40_r1.5.) id r.cf1.59153273 (29282)
for <TSCM-..._at_googlegroups.com>; Fri, 24 Jul 2009 18:53:34 -0400 (EDT)
Received: from [192.168.0.4] (ip70-187-179-83.oc.oc.cox.net [70.187.179.83]) by ciabeta-da02.mx.aol.com (v124.15) with ESMTP id MAILCIABETADA024-72624a6a3b6912b; Fri, 24 Jul 2009 18:53:31 -0400
Date: Fri, 24 Jul 2009 15:53:30 -0700
Subject: Free Quarterly Newsletter to Discuss New Trends in Wiretapping and
Eavesdropping
Message-ID: <4B176A56.5619.4A12.AC88.92EB57C18104_at_aol.com>
MIME-Version: 1.0 (Generated by Pantomime 1.2.0)
From: socalsweeps <socal..._at_aol.com>
To: TSCM-L2006_at_googlegroups.com
X-Mailer: Pantomime (ADM 351)
Content-Type: multipart/alternative;
boundary="=_D64036EE.12B1.4DEB.A1AA.3D22EB4E9AC7_at_aol.com"
X-AOL-IP: 205.188.169.201
X-Spam-Flag:NO
--=_D64036EE.12B1.4DEB.A1AA.3D22EB4E9AC7_at_aol.com
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="iso-8859-1"
http://news.prnewswire.com/ViewContent.aspx?ACCT=3D109&STORY=3D/www/story/0=
7-22-2009/0005064114&EDATE=3D
McCann Global, a National Leading Countermeasures Firm, Announces a Quarter=
ly Newsletter to Discuss New Trends in Unauthorized Wiretapping and Eavesdr=
opping
=A0
HOUSTON, July 22 /PRNewswire/ -- This quarter's topic is "Cellular Phone Wi=
retapping and Eavesdropping." Two forms of cellular "snooping" are common t=
oday:
SIM Cards: Reading standard and deleted numbers and text messages from SIM =
cards
Smart Phones: The newest form of cellular snooping using Smart Phones such =
as iPhone, BlackBerry, and others that allow active wiretapping and live un=
detected cellular eavesdropping
A few points and countermeasures for each:
SIM Cards:
How is it done:=A0The SIM card is removed from the phone and the card is re=
ad using a device that is easily purchased on the Internet for less than $2=
00.00. SIM card readers work with most GSM cellular phones and the phone re=
cord and text messages are stored, in most cases, even when the person beli=
eves they have deleted the messages. Information that is able to be retriev=
ed can be extensive, including time, date, number called/texted, and the ex=
act content of the sending and receiving messages.
Countermeasures:=A0Typically software used to read SIM cards also includes =
a feature to "wipe" the SIM card. The SIM cards also work on a limited stor=
age, so once you exceed the maximum storage of the card, the newest message=
will remove the oldest message. A point of reference, the SIM cards have c=
ontinued to expand in size to support the use of photos so storage can be s=
ignificant.
Smart Phones:
How is it done:=A0The phone is accessed and a software program is downloade=
d. The software program is quick to download and easy to install. It is als=
o difficult to detect on the device. This software allows the person wishin=
g to "tap" the phone to not only listen to active calls, but they can also =
use the phone as a listening device or "room bug."
The software on the installed phone is controlled remotely via another smar=
t device or computer. The "bugged" phone can be programmed to alert the eav=
esdropper so that they can listen in to the private call.
This software is cheap and easily purchased on the Internet, for under $50.=
00. The software is also easy to set up and is designed for the layperson t=
o use.
Countermeasures:=A0In most cases, but not all, you must have access to the =
phone to download the software, so putting a lock-out code on the keypad wi=
ll help. Second, if you think your phone has been compromised, changing the=
SIM card can also be an effective method of removing the software. Turning=
the phone "off" is not an answer, because the software can turn the phone =
"on" remotely. Removing the battery is a best answer when you want to make =
sure that the phone is not being used against you.
A good overview can be found in this news report from NBC
News:=A0http://ww=
w.youtube.com/watch?v=3D4i7vXSazuFc
About McCann Global:=A0
http://www.mccannglobal.com
McCann Global's clients define markets. Our clients keep moving forward, gr=
owing, reaching into new areas. We stand shoulder to shoulder with our clie=
nts acting as their trusted right hand. We combine decades of law enforceme=
nt experience with over 25 years of private sector experience. Our unique e=
xperience gives us a unique insight on how we can best serve our private se=
ctor clients.
McCann Global's reach is extensive in the markets that we serve. Our princi=
pals have held senior public and private sector positions in the security i=
ndustry for decades. McCann Global's reach is also well beyond our regional=
areas of New York and Houston. For over four decades, McCann Global's prin=
cipals have worked directly with the national and international public and =
private sector, and current and former law enforcement personnel. McCann Gl=
obal has the contacts that matter and the relationships with former and cur=
rent senior and local personnel in key cities and counties around the world=
.
McCann Global groups its services into two key deliverables: Keeping our cl=
ients Informed and Secured. We call it McCann Global IS. Call us today to f=
ind out how we can serve you.
Informed:
Backgrounds
Due Diligence
Investigations
Secured:
Security and Risk Assessments
TSCM: Countermeasures
Physical Protection
Asset Protection
To register for the newsletter, email us at=A0in..._at_mccannglobal.com
Phone: 800-713-7670
This release was issued through eReleases(TM). For more information, visit=
=A0
http://www.ereleases.com.
--=_D64036EE.12B1.4DEB.A1AA.3D22EB4E9AC7_at_aol.com
Content-Type: text/html; charset="us-ascii"
<html><head></head><body name="Mail Message Editor"><div><span class="Apple-style-span" style="font-size: 12px; ">
http://news.prnewswire.com/ViewContent.aspx?ACCT=109&STORY=/www/story/07-22-2009/0005064114&EDATE=</span></div><div><br></div><div></div><div><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: 14px; "><table border="0" cellpadding="0" cellspacing="0" style="width: 776px; background-color: rgb(255, 255, 255); border-right-color: black; border-right-style: solid; border-right-width: thin; border-left-color: black; border-left-style: solid; border-left-width: thin; "><tbody><tr valign="top"><td align="left" style="width: 775px; "><br></td></tr><tr><td><br></td></tr><tr><td align="left" style="width: 775px; "><table width="720" cellspacing="0" cellpadding="0" border="0"><tbody></tbody></table><table width="649" border="0"><tbody><tr><td colspan="7"><table width="649" cellspacing="0" cellpadding="0" border="0"><tbody><tr><td><div id="ucContent_headline"
class="headline" style="font-size: 14px; font-weight: bold; color: rgb(0, 0, 0); padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 5px; "><b>McCann Global, a National Leading Countermeasures Firm, Announces a Quarterly Newsletter to Discuss New Trends in Unauthorized Wiretapping and Eavesdropping</b></div></td></tr></tbody></table></td></tr><tr><td><table width="649" border="0"><tbody><tr id="ucContent_trSubHead"><td colspan="3" style="width: 645px; padding-bottom: 8px; "><div id="ucContent_div_subHeadline" class="releaseContent" style="font-size: 12px; color: rgb(0, 0, 0); font-family: Arial; padding-left: 3px; text-align: left; "> </div></td></tr><tr><td colspan="3" style="width: 645px; "><div id="ucContent_div_StoryContent" class="releaseContent" style="font-size: 12px; color: rgb(0, 0, 0); font-family: Arial; padding-left: 5px; vertical-align: top; "><storycontent><p></p><p>HOUSTON, July 22 /PRNewswire/ -- This quarter's topic is "Cellular Phone Wiretapping and Eavesdropping.
"
Two forms of cellular "snooping" are common today:</p><p></p><ul><li>SIM Cards: Reading standard and deleted numbers and text messages from SIM cards<br></li></ul><p></p><ul><li>Smart Phones: The newest form of cellular snooping using Smart Phones such as iPhone, BlackBerry, and others that allow active wiretapping and live undetected cellular eavesdropping<br></li></ul><p></p><p>A few points and countermeasures for each:</p><p></p><p><b>SIM Cards:</b></p><p></p><p><b><i>How is it done:</i></b> The SIM card is removed from the phone and the card is read using a device that is easily purchased on the Internet for less than $200.00. SIM card readers work with most GSM cellular phones and the phone record and text messages are stored, in most cases, even when the person believes they have deleted the messages. Information that is able to be retrieved can be extensive, including time, date, number called/texted, and the exact content of the sending and receiving messages.</p><p></p><p><b><i>Countermeasures
:</i></b> Typically software used to read SIM cards also includes a feature to "wipe" the SIM card. The SIM cards also work on a limited storage, so once you exceed the maximum storage of the card, the newest message will remove the oldest message. A point of reference, the SIM cards have continued to expand in size to support the use of photos so storage can be significant.</p><p></p><p><b>Smart Phones:</b></p><p></p><p><b><i>How is it done:</i></b> The phone is accessed and a software program is downloaded. The software program is quick to download and easy to install. It is also difficult to detect on the device. This software allows the person wishing to "tap" the phone to not only listen to active calls, but they can also use the phone as a listening device or "room bug."</p><p></p><p>The software on the installed phone is controlled remotely via another smart device or computer. The "bugged" phone can be programmed to alert the eavesdropper so that they can listen in to the private call.</p><
p
></p><p>This software is cheap and easily purchased on the Internet, for under $50.00. The software is also easy to set up and is designed for the layperson to use.</p><p></p><p><b><i>Countermeasures:</i></b> In most cases, but not all, you must have access to the phone to download the software, so putting a lock-out code on the keypad will help. Second, if you think your phone has been compromised, changing the SIM card can also be an effective method of removing the software. Turning the phone "off" is not an answer, because the software can turn the phone "on" remotely. Removing the battery is a best answer when you want to make sure that the phone is not being used against you.</p><p></p><p>A good overview can be found in this news report from NBC News: http://www.youtube.com/watch?v=4i7vXSazuFc" target="_new" style="text-decorati
on: none; font-weight: bold; color: rgb(51, 102, 153); ">
http://www.youtube.com/watch?v=4i7vXSazuFc</a></u></p><p></p><p><b>About McCann Global:</b> <a href="
http://www.mccannglobal.com/" target="_new" style="text-decoration: none; font-weight: bold; color: rgb(51, 102, 153); "><u></u></a><u><a href="
http://www.mccannglobal.com/" target="_new" style="text-decoration: none; font-weight: bold; color: rgb(51, 102, 153); ">
http://www.mccannglobal.com</a></u></p><p></p><p>McCann Global's clients define markets. Our clients keep moving forward, growing, reaching into new areas. We stand shoulder to shoulder with our clients acting as their trusted right hand. We combine decades of law enforcement experience with over 25 years of private sector experience. Our unique experience gives us a unique insight on how we can best serve our private sector clients.</p><p></p><p>McCann Global's reach is extensive in the markets that we serve. Our principals have held senior public and private sector positions in the secu
r
ity industry for decades. McCann Global's reach is also well beyond our regional areas of New York and Houston. For over four decades, McCann Global's principals have worked directly with the national and international public and private sector, and current and former law enforcement personnel. McCann Global has the contacts that matter and the relationships with former and current senior and local personnel in key cities and counties around the world.</p><p></p><p>McCann Global groups its services into two key deliverables: Keeping our clients Informed and Secured. We call it McCann Global IS. Call us today to find out how we can serve you.</p><p></p><p><b>Informed:</b></p><p></p><pre> Backgrounds
Due Diligence
Investigations
</pre><p></p><p><b>Secured:</b></p><p></p><pre> Security and Risk Assessments
TSCM: Countermeasures
Physical Protection
Asset Protection
</pre><p></p><p>To register for the newsletter, email us at <a href="mailto:in..._at_mccannglobal.com" style="text-decoration: none; font-weight: bold; color: rgb(51, 102, 153); ">in..._at_mccannglobal.com</a></p><p></p><p>Phone: 800-713-7670</p><p></p><p></p><p>This release was issued through eReleases(TM). For more information, visit <a href="
http://www.ereleases.com/" target="_new" style="text-decoration: none; font-weight: bold; color: rgb(51, 102, 153); "><u></u></a><u><a href="
http://www.ereleases.com/" target="_new" style="text-decoration: none; font-weight: bold; color: rgb(51, 102, 153); ">
http://www.ereleases.com</a></u>.</p></storycontent></div></td></tr></tbody></table></td></tr></tbody></table></td></tr></tbody></table></span></div><div class="aol_ad_footer" id="u4B176A5656194A12AC8892EB57C18104"></div></body></html>
--=_D64036EE.12B1.4DEB.A1AA.3D22EB4E9AC7_at_aol.com--
Received on Sat Mar 02 2024 - 00:57:23 CST