Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Each phone takes time to be detected, identified, and tampered with. So it may make sense to activate a new burner phone, talk about something sensitive, and destroy it right afterwards, before the law enforcement understands what phone was that.


When I worked in a wireless repair shop in early 2000's, we handled the local FBI field office account. Field agents would come in and I'd chat them up as they sat and waited for me to fix their phones.

This was also around the time remote meth labs were getting really common out in rural areas. Multiple agents were talking about how frustrated they were with getting access to burner phones since most of the companies were resellers. They said by the time they got a warrant to start recording the devices, they were already dead.

I guess the bad guys knew their burner phones were only good for about two to three months tops. That was usually the timeframe from when the FBI got a read on a line, saw a judge and got the warrant processed, to contacting the carrier and getting access.

Sounds like whatever was hampering them in the past has been fixed.


In The Wire, Lester sells Bernard tapped burners. It's the only way they could get up on the burners before they were thrown away.

There are a tonne of reddit links on this one so I'll leave it to the Interested Reader.


Call me paranoid but I would assume that intelligence services keep a special eye on newly activated non-smartphones.


Ability to detect and correlate these switches has been documented in Snowden leaks years ago.


Sure, but can they get a warrant and tap it in <24 hours? IDK, but that sure raises the barrier to entry.


When have intelligence services used warrants? They gather evidence illegally and pass it to law enforcement who then do parallel construction.


Whenever they don't want Congress up their ass. Four things can simultaneously be true, despite seeming contradictory:

1) Prudent opsec against nation-state adversaries dictates that you assume 0 time for them to have a tap on a device.

2) In reality, it takes >0 time, because people processes aren't instantaneous.

3) Intelligence services sometimes break the letter of the law.

4) Intelligence services usually follow the law, because it's less hassle.


> Whenever they don't want Congress up their ass.

That's not really a problem when intelligence services can just "remind" any would-be annoying congress person that they have endless amounts of data showing exactly what they and their family members have been doing and could plant whatever they want into the data they already have.

One of the things that finally convinced Snowden to give up everything he had in order to tell the American people that the NSA was violating their constitutional rights was when he watched NSA director James Clapper outright lie right to the faces of congress. After the truth came to light, do you think Mr. Clapper faced any meaningful consequences for that? Nope. Can you guess why not?

Intelligence services are too powerful to be held accountable by anyone. They'll do whatever they want.


I guess Clapper needs to see consequences.

I think I got hacked for trying to run for Congress.

"If video games have taught me anything, it's that if you encounter enemies then you're going the right way." - Ali G

lol




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: