Stories
Slash Boxes
Comments

SoylentNews is people

posted by CoolHand on Thursday April 30 2015, @02:32PM   Printer-friendly
from the this-explains-why-we-never-have-bars dept.

The US government will be forced to explain why its cell network kill-switch plans should be kept secret today.

Under Standard Operating Procedure (SOP) 303, the US government – in particular the Department of Homeland Security (DHS) – is allowed to shutdown cellphone service anywhere in the country, and even across an entire city if it feels there is a crisis situation.

However, the actual content of the policy remains secret, raising fears that it is open to abuse. For example, it's not clear who is authorized to make such a decision nor under what circumstances.

There are also groups concerned that killing of cellphone service during an emergency could make things worse.

In a frequently quoted example, San Francisco's rail system BART flipped a cell network kill-switch in several subway stations in 2011 amid a protest over a BART cop who shot and killed a drunk homeless man ( http://www.theregister.co.uk/2011/08/12/bart_polioce_cut_mobile_phone_service/ ). Charles Hill allegedly threw a knife at an officer before the police opened fire.

The fact that the network shutdown was ordered against a public demonstration raised immediate concerns over how the policy is written and implemented.

In February 2013, sparked by the BART event and a refusal by the DHS to release the policy under a Freedom of Information Act request, the Electronic Privacy Information Center (EPIC) sued the DHS ( https://regmedia.co.uk/2015/04/27/epic-case-dhs-phone-kill-switch.pdf ) [PDF] in order to get it to disclose the details.

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Interesting) by ikanreed on Thursday April 30 2015, @03:53PM

    by ikanreed (3164) Subscriber Badge on Thursday April 30 2015, @03:53PM (#177126) Journal

    Sure, in theory. But as a de facto risk, we've seen tons of IEDs detonated by cell signal abroad as part of the Iraq and Afghanistan insurgencies.

    Because building a radio is actually hard and time consuming. Not to mention that signal processessing is actually an advanced skill, and distinguishing an arbitrary signal from background noise is so complicated many people get PhDs focused on that. And the FCC would be able to tell where you were when you set it off, if you're working on an unoccupied spectrum.

    Compare that to reconnecting the wires from the vibration motor of a cell phone to a detonator, which is something you can do with almost no training and in the space of an hour.

    Yeah, it makes sense to kill cell towers in the fantasy land where they somehow know a bomb is rigged to be detonated ahead of time.

    Starting Score:    1  point
    Moderation   +1  
       Interesting=1, Total=1
    Extra 'Interesting' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   3  
  • (Score: 2) by bob_super on Thursday April 30 2015, @05:34PM

    by bob_super (1357) on Thursday April 30 2015, @05:34PM (#177174)

    What's the range of cheap two-way radios? Here is your receiver with source untraceable. To avoid mistriggers, just add off-the-shelf pattern recognition, like "god hate fags" in morse code

    • (Score: 2) by ikanreed on Thursday April 30 2015, @05:40PM

      by ikanreed (3164) Subscriber Badge on Thursday April 30 2015, @05:40PM (#177178) Journal

      "of the shelf pattern recognition" isn't exactly as easy and anonymous to come by as prepaid cellphones.

      • (Score: 4, Insightful) by urza9814 on Thursday April 30 2015, @06:04PM

        by urza9814 (3954) on Thursday April 30 2015, @06:04PM (#177190) Journal

        "of the shelf pattern recognition" isn't exactly as easy and anonymous to come by as prepaid cellphones.

        Yup. It's so difficult you'd probably have to spend a whole *twenty dollars* for FRS/GMRS walkie-talkies from K-Mart! Most of them have a calling or paging features, and many of them have vibration motors or flashing lights or something that responds specifically to that call signal. Granted, it's always possible that someone else will have a similar radio and send the signal prematurely, but that seems pretty unlikely.

  • (Score: 4, Insightful) by MrGuy on Thursday April 30 2015, @05:53PM

    by MrGuy (1007) on Thursday April 30 2015, @05:53PM (#177183)

    And the FCC would be able to tell where you were when you set it off, if you're working on an unoccupied spectrum.

    Agree with everything else you said, but I find this one hard to believe. You're saying there are existing directional, log-keeping, antennae with sufficient density to locate someone sending a single pulse transmission in a typically-unused frequency band that they'd have no reason to expect traffic on?

    I'm not saying that absolutely no one would pick up such a transmission, but getting a reasonable localization beyond "somewhere in the New York City area" seems hard.

    • (Score: 2) by ikanreed on Thursday April 30 2015, @06:03PM

      by ikanreed (3164) Subscriber Badge on Thursday April 30 2015, @06:03PM (#177189) Journal

      Well, that's fair.

    • (Score: 3, Informative) by kaszz on Thursday April 30 2015, @11:03PM

      by kaszz (4211) on Thursday April 30 2015, @11:03PM (#177303) Journal

      Trilateration will find most radio transmitter with high precision. The question is to what extent that kind of listening is still done. Because you need to sample a wide bandwidth in the general area or miss it. Something that costs power (watts) and money.

  • (Score: 1) by anubi on Friday May 01 2015, @05:39AM

    by anubi (2828) on Friday May 01 2015, @05:39AM (#177373) Journal

    Compare that to reconnecting the wires from the vibration motor of a cell phone to a detonator, which is something you can do with almost no training and in the space of an hour.

    That is not feasible in the United States.

    Telemarketers.

    Just takes one of those to ruin your whole day!

    --
    "Prove all things; hold fast that which is good." [KJV: I Thessalonians 5:21]
    • (Score: 2) by Spook brat on Friday May 01 2015, @04:35PM

      by Spook brat (775) on Friday May 01 2015, @04:35PM (#177504) Journal

      So, WalMart selling lists of recently-activated prepaid cell phones to telemarketers isn't a scummy, money-grubbing move; instead, it's a critical part of our anti-terrorism effort!

      All right, then, carry on.

      *Note: I have no evidence WalMart is doing so, they're just a convenient punching bag

      --
      Travel the galaxy! Meet fascinating life forms... And kill them [schlockmercenary.com]
      • (Score: 1) by anubi on Saturday May 02 2015, @12:17AM

        by anubi (2828) on Saturday May 02 2015, @12:17AM (#177691) Journal

        I have been told telemarketers are using - on the ground tier - "war games" type dialers that machine-gun style dial up every number in an exchange just to see if a human head will take the call. That's those calls that ring and when you pick up and say "hello", you get a dead line. It now has your number and the fact it got a human head on that number in that time window.

        Once finding a human head that answers the telemarketing call, it will then route you to the next available telemarketer, however the human head soon senses it has been duped and it hangs up. No biggie, though. The number and time it was answered is now logged. It will now be shared and that number can expect a barrage of repeat calls from co-operatives of telemarketers sharing databases.

        I have been told this technique is called a " Dial-a-head" ( or " Dial ahead ") . Using a machine ( that works very cheaply ) to dial ahead and blaze a trail of humans that will personally take a call is a very cost effective way of making dialing lists for subsequent telemarketing activity. They now have the universe of numbers filtered by which numbers at which time has been answered by an actual human head. By cross-correlating that number with other databases, they can get names and personal information which is used in the telemarketing effort to use a rapid-fire barrage of small-talk then trick the unsuspecting human that picked up the call into agreeing to some commitment, or at least extracting yet more information for their database.

        I now whitelist my phone for this reason. If its someone not on the whitelist, they get the answering machine. The dial-aheads recognize answering machines because the machines always emit a lengthy spiel of reply, whereas a human always answers in "hello?"...pause ... "hello?" ... hangup. Once you get on those calling lists, it is hard to get off, as it costs them nothing to place calls.

        --
        "Prove all things; hold fast that which is good." [KJV: I Thessalonians 5:21]