![]() |
[america.aljazeera.com] |
"For years, cops and other government authorities all over the world have been using phone hacking technology provided by Cellebrite to unlock phones and obtain the data within. And the company has been keen on keeping the use of its technology “hush hush.”
"As part of the deal with government agencies, Cellebrite asks users to keep its tech — and the fact that they used it — secret, TechCrunch has learned.
"This request concerns legal experts who argue that powerful technology like the one Cellebrite builds and sells, and how it gets used by law enforcement agencies, ought to be public and scrutinized.
"In a leaked training video for law enforcement customers that was obtained by TechCrunch, a senior Cellebrite employee tells customers that “ultimately, you’ve extracted the data, it’s the data that solves the crime, how you got in, let’s try to keep that as hush hush as possible.”
Notably, while I was investigating Intelligence vulnerabilities at the Pentagon in 1990 (three years after Jonathon Pollard's conviction for spying for the KGB and Israel], I learned that LTG Sidney T Weinstein [then US Army Deputy Chief of Staff for Intelligence] had granted an Israeli company a contract to "secure US Military Intelligence data and communications"!
Thus, Israeli Intelligence then had access to ALL Military Intelligence data.
As you may recall, NSA's mission was to spy on foreign powers, both enemy and friendly, to assure US national security. However, after 9/11 [well, in reality, long before], NSA began spying on US citizenry; they started with Congress and political candidates, and moved from there down to Joe the Plumber -- for no other reason than that they could.
![]() |
NSA [aka: Puzzle Palace] |
With all their whiz-bang hardware and software, they still can't break most encrypted communications since the protective technology is much stronger than NSA's hacking capabilities.
[Recently, rumors of a Chinese deciphering app have floated -- without confirmation]
NSA focuses on clear, open text communications which they can gather in huge volume, store in massive vaults, and then sort -- very efficiently by computers. That helps analysts, but leaves the barrier of access to the really good intelligence.
So, NSA turns inward, to collect all the metadata on American citizens which DHS has now declared as "potential terrorists". The definition of "terrorist" has now been adjusted to cover anyone who is critical of the government -- especially the President.
![]() |
Local Cops/CHP Now Have NSA Tools |
NSA, via DHS, has now assumed a training and support mission to local police forces monitor the local population; of late, DHS has "showered more than $35 Billion on states and localities for 'terrorism prevention'." Sadly, Congress has now passed a bill to legitimize police access to the private communications of citizens.
In the story linked to this blog, we learn that police are now using NSA equipment at the local level to not only track citizen telecommunications, but to disrupt, re-route, and block telecommunications -- particularly cell phones.
![]() |
Harris StingRay II |
2) Writing Metadata to internal storage [e.g., boosting power to extend the transmission range to assist monitoring of the call; making it easy to track.
3) Tracking and Locating the cell phone or compatible cellular device even when the device is turned off.
4) Denial of Service [DOS], or blocking of all transmissions while the StingRay conducts its surveillance.
5) Interception of Communications Content by simulating a cell site which forces a connection with the target device [cell phone] to
a) conduct "GSM Target Key Extraction" to obtain the target device encryption key
b) download the target device's IMSI and other identifying data;
c) simulates the target device to connect to the legitimate service provider;
d) forwards signals between the target device and the legitimate cell site -- while decrypting
and recording the communications content
Police say they purchase these systems to "detect mobile phone detonated bombs like those used in Middle East IEDs".
Chicago spent $150,000 on StingRay equipment; Harris has also peddled its equipment to San Francisco, Takoma, and Miami, but they will not disclose the purpose for which their equipment is being used.
Local law enforcement and the federal government have blocked judicial enforcement simply by refusing to turn over records demanded by the courts. In one case, when the court demanded police documents, the US Marshalls Service seized the records to ensure the court could not access them.
The term "above the law" has taken on a completely new meaning!