The federal agents who arrested Ghislaine Maxwell found a cellphone wrapped in tin foil inside of her New Hampshire home in “a misguided effort to evade detection,” prosecutors said Monday.
https://www.nbcnews.com/news/us-news/gh ... n-n1233674
Thanks to eyeball08,Wondergirly,bofh,johnstevens77,Bhoddhisatva, for Donating to support the site
The federal agents who arrested Ghislaine Maxwell found a cellphone wrapped in tin foil inside of her New Hampshire home in “a misguided effort to evade detection,” prosecutors said Monday.
AleisterCrowley wrote:It would work if it formed an effective Faraday shield - no radio, no detection
AleisterCrowley wrote:It would work if it formed an effective Faraday shield - no radio, no detection
With older phones the highly technical 'remove the battery' worked fine
I'm nervous about smartphones with soft power switches, they are always up to something even when 'off'
gryffron wrote:A Faraday cage must be earthed. Otherwise you are just making a large aerial.
..
Gryff
neversay wrote:AleisterCrowley wrote:It would work if it formed an effective Faraday shield - no radio, no detection
With older phones the highly technical 'remove the battery' worked fine
I'm nervous about smartphones with soft power switches, they are always up to something even when 'off'
Good point. And the battery on mine (Samsung S10) is sealed-in.
Paupertas wrote:I'm just interested in why wrapping a phone in tin foil to evade it being detected is 'misguided' - I thought that this would workThe federal agents who arrested Ghislaine Maxwell found a cellphone wrapped in tin foil inside of her New Hampshire home in “a misguided effort to evade detection,” prosecutors said Monday.
https://www.nbcnews.com/news/us-news/gh ... n-n1233674
bungeejumper wrote:Well, that's what he said anyway. Something about how each phone handset has a unique identity, sort of like an RFID tag that can be read from a distance if you used the right scanner. It was all well above my non-techie pay grade. Ring any bells?
BJ
bungeejumper wrote: if you used the right scanner
gryffron wrote:You can spoof a mobile by providing the only available base station and shutting off all the others nearby. So it HAS to route its calls via the station you are monitoring. This may be done for hostage/terrorist situations, but unlikely to be practical for everyday criminality.
bungeejumper wrote:Well, that's what he said anyway. Something about how each phone handset has a unique identity, sort of like an RFID tag that can be read from a distance if you used the right scanner. It was all well above my non-techie pay grade. Ring any bells?
BJ
UncleEbenezer wrote:Every network device has its unique hardware identity.
gryffron wrote:UncleEbenezer wrote:Every network device has its unique hardware identity.
Yes. But in the case of cheap tacky disposable mobiles, is this ID in the phone or the SIM? I suspect the latter. Can't see any reason to put one in the former, since it can't work on its own.
Gryff
servodude wrote:
Everything sending data will have a MAC address (Media Access Control) and this is what you normally allow/ban on your router to prevent people using it who might have your password. These are assumed to be unique for the purposes of the network routing - but in practice they are trivial to change or misrepresent: if you've got WPS enabled on your router and I've tried to use it to find the password, I'll know the MAC address of everything connected.
The network will know what a device reports for all of the relevant identifiers above
Users browsing this forum: No registered users and 41 guests