General Discussion
Related: Editorials & Other Articles, Issue Forums, Alliance Forums, Region ForumsEXCLUSIVE: Intelligence had hot mic hack on Russian Kislyak's phone.
LOL. BUSTED!! I wonder if Jeff Sessions knew about this?
Not to mention candidate Donald Trump?
And everyone else in the Trump campaign meeting with the Russian spymaster?
Link to tweet
Russian Ambassador Sergei Kislyaks phone was both hacked and turned into a hot mike for recording conversations by a Five Eyes intelligence agency .....
... a similar SS7 exploit as that used by consent on the phones of James Comey, and other FBI agents, by the FBI and Justice Department, was placed on the phone of Sergei Kislyak most certainly without consent and that the Russian Ambassador to the US not only had his phone bugged, but that his phone was being used as a microphone to record those with whom he was speaking.
Sources do not say when the exploit was placed on Kislyaks phone. One source speculated that Ambassador Kislyak had only survived in his position in America because of optics.
The Five Eyes intelligence agreement prevents members of the worlds premier intelligence alliance America, Australia, Canada, New Zealand and the United Kingdom from spying on each others territories and citizens. However, crucially, embassies, such as those of Ecuador in London and Russia in Washington DC, are regarded as sovereign territory of their native countries. The NSA is free to spy within the Ecuadorean embassy in London, and GCHQ, its British equivalent, is free to spy within Russias embassy in DC. ...........
The Velveteen Ocelot
(115,586 posts)I'll believe it when it turns up in a reputable news source.
L. Coyote
(51,129 posts)jmg257
(11,996 posts)L. Coyote
(51,129 posts)jmg257
(11,996 posts)DefenseLawyer
(11,101 posts)Brother Buzz
(36,375 posts)I said "Be careful his bowtie is really a camera"
Me.
(35,454 posts)Especially in light of the slip Franken made on Tweety the other night.
awesomerwb1
(4,265 posts)Not a Mensch fan at all. However I've heard she's been right before BUT, I just hope this one is true.
Me.
(35,454 posts)Senator Al Franken said on Hardball that evidence of a potential third meeting between Kislyak and Sessions includes intercepted communications.
http://www.msnbc.com/hardball/watch/franken-they-ve-intercepted-contacts-with-kislyak-965823043697
L. Coyote
(51,129 posts)The timing of the leaks from British intelligence and other Europeans seems to be timed to out the LIARS in the Trump Admin. When Flynn was getting away with lying, BOOM.
I love how first they wait for the perjury, then whack the lying troll.
Me.
(35,454 posts)That the other intelligence agencies had had enough and were going all in/to do their part and help bring 45 & Company down.
furtheradu
(1,865 posts)Although I've thought it, many times. I'm out of wifi, couldn't watch video, but this seems to be BIG news, & no one reporting this?
I HOPE(!) Sen. Al doesn't get in trouble for disclosing it.
Thanks for this post.
Me.
(35,454 posts)furtheradu
(1,865 posts)L. Coyote
(51,129 posts)and the speculation is that Trump was picked up when he phoned in. I think this is what Franken is talking about, the stuff that was in the news and not some classified intelligence. Franken isn't getting intelligence briefings other than what the entire committee he is on gets.
Link to tweet
furtheradu
(1,865 posts)By the way, where is kushner lately? I get suspicious when he &/or trump kids are "quiet".
Thanks again.
Achilleaze
(15,543 posts)It's hard to keep up with all these elements.
CottonBear
(21,596 posts)Me.
(35,454 posts)DanTex
(20,709 posts)L. Coyote
(51,129 posts)Louise Mensch has been breaking the #TrumpRussia story for nearly a year now.
And she nailed it way ahead of the M$M because she has great sources in the IC.
Too bad people did not listen to her before they voted! Here you go, election day:
FBI has FISA warrant for Trump secret server connected to Russia.
MineralMan
(146,254 posts)I thought we had learned that by now. It could be true. It could be totally made-up. Without corroboration, it is just something an unreliable blogger has said.
meow2u3
(24,759 posts)Louise Mensch is playing us for fools by planting those false stories, as if liberals were as gullible as the Trumpanzees.
R B Garr
(16,950 posts)Sally Yates got fired for -- reporting to the White House the intelligence they had on Flynn and how it was captured. Some of what Mensch says matches what we already know and has been reported on, so some of it is at least worthwhile to look into. Not all of it is woo.
L. Coyote
(51,129 posts)snooper2
(30,151 posts)Trekologer
(996 posts)DefenseLawyer
(11,101 posts)But I really find it hard to believe that the Russian Ambassador would be using a cell phone. Forget a SS7 hack, anybody with a Stingray could potentially listen in.
L. Coyote
(51,129 posts)It is a method to access a secured device, "a telephony signaling protocol used by over 800 telecommunication companies" so maybe Louise could figure it out somehow???
Hackers exploit SS7 vulnerability to bypass two-factor authentication and drain bank accounts
The SS7 security hole has been known for years
By Rob Thubron on May 5, 2017
snooper2
(30,151 posts)Can't be TCAP right, maybe MAP eh?
Trekologer
(996 posts)The SS7 vulnerability you linked could potentially affect 2FA using SMS messages (not an app, like Google Authenticator).
It doesn't allow one to turn a cell phone into a hot Mike.
L. Coyote
(51,129 posts)It is a method of hacking. What you do after you get past the authentication is a secondary question. SS7 is a protocol to communicate with a phone with an exploited vulnerability. No one is claiming it is a method of turning on the microphone, just a method to hack a phone.
Trekologer
(996 posts)Signaling System 7 is a way that telephone networks communicate with each other. While the growth of using SIP for voice peering has reduced SS7s use when it comes to landline based service, mobile phone networks still use SS7 almost exclusively to talk with each other.
The SS7 exploit that you reverted to in the previous reply takes advantage of that network to network interface. A nefarious actor, with access to the SS7 network, could tell your mobile phone carrier that your phone is roaming on their network and get your calls and texts forwarded to it. That's how the 2FA issue works. Now, you need more than just the phone number to do this, you need the IMEI and ICCID from the SIM card.
What the SS7 exploit doesn't allow is to is the things that Louise Mench's article says: turn the phone into a "hot mic" or even listen into calls. While there could be a vulnerability on the handset to allow that, it wouldn't be put on with SS7 and the lawful intercept (wiretapping) is done a different way.
FreepFryer
(7,077 posts)Kaleva
(36,248 posts)Nevernose
(13,081 posts)Is being spied on, as much as possible, by as many intelligence agencies as possible. The same goes for Americans.
L. Coyote
(51,129 posts)We have a new re-alignment happening in American politics, patriots versus traitors. Those who fear this just delay the day we rid ourselves of the traitors.
It isn't easy fro some people to rise above partisanship. Those seem people are often the hugest critics of the Rs who don't do so.
trueblue2007
(17,193 posts)Me.
(35,454 posts)They found a server in 45's office that was connected to a Russian Bank
L. Coyote
(51,129 posts)Me.
(35,454 posts)Thanks
L. Coyote
(51,129 posts)L. Coyote
(51,129 posts)wiggs
(7,809 posts)all her sources 100% reliable? Maybe not. Most seem to be.
So I look at her claims as very interesting but not gospel. If I were an investigator, I would use her sources/blog in combination with what else I know and either dismiss or follow up. Either way is useful...pieces of a puzzle...interesting if they fit, interesting if they don't.
And that's what I'll do as an occasional reader. Maybe in this case, there are recordings and that's the bottom line. Perhaps the method of recording isn't right...perhaps the person hacked isn't right...perhaps the technique isn't named correctly. But this counts as 'smoke' in my book, worthy of remembering and following up.