It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
According to a former drone operator for the military’s Joint Special Operations Command (JSOC) who also worked with the NSA, the agency often identifies targets based on controversial metadata analysis and cell-phone tracking technologies.
Rather than confirming a target’s identity with operatives or informants on the ground, the CIA or the U.S. military then orders a strike based on the activity and location of the mobile phone a person is believed to be using.
“People get hung up that there’s a targeted list of people,” he says. “It’s really like we’re targeting a cell phone. We’re not going after people – we’re going after their phones, in the hopes that the person on the other end of that missile is the bad guy.”
Even if a cell phone is completely turned off, law enforcement authorities can still listen in on the conversations that a suspect is having. All that is necessary is for the battery to still be in the cell phone. According to CNET News, the FBI can remotely activate the microphone on your cell phone and listen to whatever you are saying....
The FBI appears to have begun using a novel form of electronic surveillance in criminal investigations: remotely activating a mobile phone's microphone and using it to eavesdrop on nearby conversations. The technique is called a "roving bug," and was approved by top U.S. Department of Justice officials for use against members of a New York organized crime family who were wary of conventional surveillance techniques such as tailing a suspect or wiretapping him.
When you make a telephone call, it is never private. The reality is that the NSA has been monitoring all phone calls for years and years. According to USA Today, the NSA intends "to create a database of every call ever made".... The National Security Agency has been secretly collecting the phone call records of tens of millions of Americans, using data provided by AT&T, Verizon and BellSouth, people with direct knowledge of the arrangement told USA TODAY
Similar but limited tracking technology such as Spy Bubble allows for individuals to track their "cheating partners' every move" including remote downloads of SMS messages, emails and recorded conversations.
Having access to individuals within the Law enforcement services, take the following story as personal testimony.
A friend whom is in the upper echelons of the legal game and I regularly meet to discuss topics of mutual interest. This individual will simply refuse to even utter a word unless both our phone(s) are at least 30m away - preferably housed within a sealed compartment. This individual is by no means a conspiracy minded individual but is ACUTELY aware of the remote tracking and microphone activation technology available - because this individual uses the same technology on others as deemed necessary and it does not matter if your phone is on or off or even if your battery is dead - as long as it is in the phone!
Just remember, that little chip in your passport, for instance, holds a vast amount of data, requires no power source and can be scanned from a distance - what then do you suppose your phone can hold by way of data - to be accessed remotely - and even if the battery is dead now remember that it was at one stage fully charged up!!!
link to thread