Microphone blocker

Last updated

A microphone blocker is a phone microphone connector used to trick feature phones that have a physical microphone switch to disconnect the microphone. Microphone blockers won't operate on smartphones or laptops because the microphone is controlled with software rather than a physical switch.

Contents

Safety test

Hardware devices should always be tested if it is controlled by software which renders a microphone blocker useless. This can simply be done by plugging a headset or a microphone to the jack try to activate the internal microphone (eg with speaker mode on smartphones or feature phones and speak near the phone while keeping the microphone at distance or plugged), or any program that always will use the internal microphone for other hardware devices like laptops.

Working alternatives for modern hardware devices

Smartphone incompatibility

Microphone blockers, including commercial microphone blockers with an integrated circuit marketed to provide "extra security", are not useful for smartphones because it is controlled entirely by software. It can be demonstrated by connecting a microphone blocker to a smartphone, and make a phone call with speaker mode which will also active the internal microphone.

However, although they would work, there are further problems:

Feature phone compatibility

3.5mm TRRS phone connector with CTIA standard 3.5mm TRRS phone connector with CTIA standard.png
3.5mm TRRS phone connector with CTIA standard

A phone connector without a microphone channel cannot be used as a microphone blocker because it will not deactivate the external microphone. Three- or four-conductor (TRS or TRRS) 2.5 mm and 3.5 mm sockets are common on older cell phones and newer smartphones respectively, providing mono (three conductor) or stereo (four conductor) sound and a microphone input, together with signaling (e.g., push a button to answer a call).

Older hardware devices

CTIA/AHJ is the de facto TRRS standard. OMTP was mostly used on older hardware devices. However, the old mobile phones have a 2.5 mm jack connectors socket and cannot be used with modern microphone blockers that are typically 3.5 mm, but old mobile phones are notorious for their low security of the hardware itself. If a CTIA headset is connected to a mobile phone with OMTP interface, the external microphone will stay active. There, internal microphone will only be active when holding the microphone key on the headset. [7] A standard TCIA/AHJ TRRS microphone blocker cannot be used with OMTP socket hardware devices and it is recommended to test all microphone blockers to make sure they really work.

Operation

Microphone blockers disable the internal microphone by tricking the device into believing an external microphone is connected. [8] A 3.5 mm microphone blocker with just TS channel is enough to disconnect the internal microphone, but most commercial microphone blockers have TRRS connections which in theory makes them headset blockers that in smartphones also disconnect the internal speaker in media player software because they will try to connect to the headphones, while ringtones, and alarms, will functioning as normal because they will use both the internal speaker and the external speaker(s).

Successful operation of a microphone blocker depends on the internal scheme of the mobile device, which may fully block the microphone without possibility of recovering data, or just disregard the signal from internal microphone with the possibility of recording if needed.

Issues

Some devices allow internal and external microphone works simultaneously or may not recognize when an external microphone is connected.

Types

Microphone blocking plug

A microphone blocking plug. Microphone blocker.jpg
A microphone blocking plug.

A microphone blocking plug is a phone connector with a microphone channel that cannot be used due to the plugged end. Some products are shipped with a female connectors (with a keychain hole, or a small strap attached directly to smartphone cases) to prevent loss when the male connector is detached. A mobile phone charm (especially with TRS connector instead of a rubber plug) can be used to conceal a dummy blocker.

A microphone blocking plug can be used to debug software-defined radio that demands a connector to be plugged but they cannot be used to stream radio due to its low antenna efficiency.

Common products that can be used as microphone blockers:

It's possible that microphone connectors without a microphone circuit like the above solutions offer low security, because when you plug a connector that has no microphone or microphone circuit, software has the ability to override the default behavior.

Microphone blocking adapter

Headset with an integrated microphone blocker also exist, allowing users to use the headphones (ie. for listening to music) without risking being eavesdropped. Microphone blocking adapters are phone connectors adapters with a microphone channel and a mechanism that produces a false positive signal simulating a connected microphone. This mechanism cannot be built by pairing multiple connectors: a headset connected to a 3.5 mm TRRS headset extension cable adapter further connected to a 3.5 TRS headphone cable adapter won't trick a connected mobile phone to disconnect its external microphone.

Microphone blocking Devices (Mic-Lock)

Mic-Lock microphone blockers were designed and created by Ric Ralston, a global data communication and server design expert, to provide innovative safeguards to electronic devices, prevent unauthorized access to personal information, and support data privacy rights.

Using a Metal Oxide Semiconductor Field Effect Transistor (MOSFET), Mic-Lock can mimic the expected signal of a microphone. Once the blocker is plugged, it provides the signal of silence back to the device – effectively blocking all audio sounds from being leaked to cyber invaders. It cuts the sound right at the source. Mic-Lock works on various electronic devices (laptops, PCs, tablets, and smartphones) and all operating systems, including iOS, Mac, Windows, Linux, and Android.

Mic-Lock microphone blockers is a U.S. Patented technology that passed all required tests as a "Method and Apparatus for Disabling an Audio Input". [9]

Mic-Lock can be distinguished as the genuine, patented Mic-Lock product from imitators or fakes by the size and existence of a housing that will contain the MOSFET semiconductor. [10]

Mic-Lock products were mentioned, reviewed & recommended by many giant tech experts like PCmag , Komando, ZDnet, AVbuyersclub and many more. [11]

[12] [13] [14] [15] [16]

Applications

This section describes use for both microphone blocking plugs and adapters.

Use

Eavesdropping protection for feature phones

A microphone blocker is a cheap, simple accessory that provides countersurveillance against eavesdropping, for example recording eavesdropping from interception (like cellphone surveillance), or phone hacking, but it doesn't work on smartphones because they are controlled by software. However, there are a variety of computing vulnerabilities like proprietary software and firmware, backdoors, hardware security bugs, hardware backdoors, hardware Trojans, spyware, and malware programs that can turn on a mobile device's microphone remotely, and the vast majority of devices do not have internal hardware protection to prevent eavesdropping. Most antivirus software, and anti-spying software does not guarantee that the microphone will be fully blocked or disabled and can even be prevented doing so by spyware and malware that are constantly changing and improving.

Leaked documents codenamed Vault 7 and dated from 2013 to 2016, described the capabilities of the United States Central Intelligence Agency (CIA) to perform electronic surveillance and cyber warfare, including the ability to compromise the operating systems of most smartphones, turning them into permanent listening devices. [17] [18] [19] Millions of smartphones could also be vulnerable to software cracking via accelerometers. [20] [21]

A new acoustic cryptanalysis technique discovered by a research team at Israel's Ben-Gurion University Cybersecurity Research Center allows data to be extracted using a computer's speakers and headphones.[ citation needed ] Forbes published a report stating that researchers found a way to see information being displayed, by using microphone, with 96.5% accuracy. [22]

Pocket dialing protection

A microphone blocker is useful to prevent a mobile phone against audio interception from pocket dialing.

Abuse

Social engineering

A person can wiretap conversations from persons they with social engineering have deceived that microphone blockers are safe to use with smartphones.[ citation needed ] This can in theory be exploited by companies that manufacture and sell commercial microphone blockers if they require a mobile phone number when people order their products or ask for support.

Related Research Articles

<span class="mw-page-title-main">Headphones</span> Device placed near the ears that plays sound

Headphones are a pair of small loudspeaker drivers worn on or around the head over a user's ears. They are electroacoustic transducers, which convert an electrical signal to a corresponding sound. Headphones let a single user listen to an audio source privately, in contrast to a loudspeaker, which emits sound into the open air for anyone nearby to hear. Headphones are also known as earphones or, colloquially, cans. Circumaural and supra-aural headphones use a band over the top of the head to hold the speakers in place. Another type, known as earbuds or earpieces, consists of individual units that plug into the user's ear canal. A third type are bone conduction headphones, which typically wrap around the back of the head and rest in front of the ear canal, leaving the ear canal open. In the context of telecommunication, a headset is a combination of a headphone and microphone.

<span class="mw-page-title-main">Handsfree</span>

Handsfree is an adjective describing equipment that can be used without the use of hands or, in a wider sense, equipment which needs only limited use of hands, or for which the controls are positioned so that the hand can occupy themselves with another task without needing to hunt far afield for the controls.

<span class="mw-page-title-main">Phone connector (audio)</span> Family of connectors typically used for analog signals

A phone connector is a family of cylindrically-shaped electrical connectors primarily for analog audio signals. Invented in the late 19th century for telephone switchboards, the phone connector remains in use for interfacing wired audio equipment, such as headphones, speakers, microphones, mixing consoles, and electronic musical instruments. A male connector, is mated into a female connector, though other terminology is used.

<span class="mw-page-title-main">VoIP phone</span> Phone using one or more VoIP technologies

A VoIP phone or IP phone uses voice over IP technologies for placing and transmitting telephone calls over an IP network, such as the Internet. This is in contrast to a standard phone which uses the traditional public switched telephone network (PSTN).

Various accessories for the PlayStation 3 video game console have been produced by Sony and third-party companies. These include controllers, audio and video input devices like microphones, video cameras, and cables for better sound and picture quality.

<span class="mw-page-title-main">Nokia 6120 classic</span> Mobile phone model

The Nokia 6120 classic is a mid-range smartphone from Nokia that was announced on 17 April 2007. It runs on Symbian v9.2 with a S60 3rd Edition FP1 user interface.

<span class="mw-page-title-main">Audio headset</span> Telephone or computer accessory

A headset is a combination of headphone and microphone. Headsets connect over a telephone or to a computer, allowing the user to speak and listen while keeping both hands free. They are commonly used in customer service and technical support centers, where employees can converse with customers while typing information into a computer. They are also common among computer gamers and let them talk with each other and hear others while using their keyboards and mice to play the game.

<span class="mw-page-title-main">Mobile phone accessories</span> Accessories for mobile phones

Mobile accessories include any hardware that is not integral to the operation of a mobile smartphone as designed by the manufacturer. Its purpose is to protect the mobile from being damaged or to use for more convenient use of the mobile. People can choose whether to use these accessories for their mobile, as they are not a necessity.

<span class="mw-page-title-main">Apple headphones</span> Lineup of products manufactured by Apple, Inc.

Apple Inc. has produced and sold headphones since 2001, available for standalone purchase and bundled with iPhone and iPod products. Apple's current product line consists of EarPods, AirPods and AirPods Pro, and AirPods Max.

<span class="mw-page-title-main">Dongle</span> Small piece of computer hardware

A dongle is a small piece of computer hardware that connects to a port on another device to provide it with additional functionality, or enable a pass-through to such a device that adds functionality.

Mobile security, or mobile device security, is the protection of smartphones, tablets, and laptops from threats associated with wireless computing. It has become increasingly important in mobile computing. The security of personal and business information now stored on smartphones is of particular concern.

<span class="mw-page-title-main">Y-cable</span> Cable with three ends

A Y-cable, Y cable, or splitter cable is a cable with three ends: one common end and two other ends. The Y-cable can resemble the Latin letter "Y".

<span class="mw-page-title-main">USB-C</span> 24-pin USB connector system

USB-C, or USB Type-C, is a connector that supersedes previous USB connectors and can carry audio and/or video data, e.g. to drive multiple displays, or transfer data, e.g. to store a backup to an external drive, and providing/receiving power, such as to power a laptop or a mobile phone. It is applied not only by USB technology, but also by other protocols, including Thunderbolt, PCIe, HDMI, DisplayPort, and others. It is extensible to support future standards.

<span class="mw-page-title-main">Neptune Pine</span>

The Neptune Pine is an unlocked GSM standalone, full featured smartwatch developed by Canadian consumer electronics and wearable technology company Neptune. It was announced in January 2013 by Simon Tian and launched in November 2013 on Kickstarter. Within 27 hours, the campaign had reached its funding goal of $100,000, and ultimately went on to raise more than $800,000 in 30 days, becoming the highest-funded Canadian Kickstarter campaign at the time.

<span class="mw-page-title-main">Lenovo Phab 2 Pro</span> Android smartphone

The Phab 2 Pro is an Android smartphone in a phablet form factor, developed and produced by Lenovo and first released in November of 2016 at an MSRP of US$499. The device is notable for being the first consumer smartphone to support Google Tango augmented reality (AR) technology.

<span class="mw-page-title-main">Librem 5</span> Linux based 2020 Smartphone

The Librem 5 is a smartphone manufactured by Purism that is part of their Librem line of products. The phone is designed with the goal of using free software whenever possible, includes PureOS, a Linux operating system, by default, and as of 2021 is the only smartphone recommended by the Free Software Foundation. Like other Librem products, the Librem 5 focuses on privacy and freedom, and includes features like hardware kill switches, and easily-replaceable components. Its name, with a numerical "5", refers to its screen size, and not a release version. After an announcement on 24 August 2017, the distribution of developer kits and limited pre-release models occurred throughout 2019 and most of 2020. The first mass-production version of the Librem 5 was shipped on 18 November 2020.

The iPhone's hardware is designed by Apple Inc. Apple directly sub-contracts hardware production to external OEM companies, maintaining a high degree of control over the end product.

References

  1. Watercutter, Angela (26 May 2016). "Watch Edward Snowden Teach Vice How to Make a Phone 'Go Black'". Wired.
  2. Gibbs, Samuel (13 September 2016). "iPhone 7 review roundup: how big a problem is the absent headphone jack?". The Guardian.
  3. Kastrenakes, Jacob (8 September 2016). "The biggest winner from removing the headphone jack is Apple". The Verge.
  4. "Apple was Granted 56 Patents today covering Wireless Charging for iDevices and Vehicles, Privacy Displays, Apple Watch & more". Patently Apple.
  5. Gilmer, Marcus. "New Apple patent is another hint that it may ditch iPhone's Lightning Port". Mashable.
  6. Fuller, John, How Bluetooth Surveillance Works, http://electronics.howstuffworks.com/bluetooth-surveillance1.htm
  7. "Linx:What is your mobile phone headset jack standard: OMTP or CTIA?-Headset OEM|Earphone Factory|Headphone Supplier —China LINX CO,.LTD". www.headphonefactory.net.
  8. Greenberg, Andy (9 December 2017). "How to Disable the Mics on Your MacBook and iPhone". Wired via www.wired.com.
  9. "Mic-Lock®️ Patents". mic-lock.com. Retrieved 2023-12-29.
  10. "Mic-Lock Patented Ensures Privacy on Every Device - Beware of Cheap Co". mic-lock.com. 2022-02-28. Retrieved 2023-12-29.
  11. "Mic-Lock Patented Ensures Privacy on Every Device - Beware of Cheap Co". mic-lock.com. 2022-02-28. Retrieved 2023-12-29.
  12. "AV Buyer's Club Recommends Mic-Lock for Audio Security". mic-lock.com. 2021-12-05. Retrieved 2023-12-29.
  13. "SecuringAV: The iPhone Spyware Vulnerability – rAVe [PUBS]". www.ravepubs.com. Retrieved 2023-12-29.
  14. Khoury, Albert (2021-02-23). "How to make sure Big Tech really isn't listening". Komando.com. Retrieved 2023-12-29.
  15. "Keep It Secret, Keep It Safe: The Best Privacy-Minded Gifts for Your Paranoid Pals". PCMAG. Retrieved 2023-12-29.
  16. "Top gadgets for the security and privacy conscious (or the super paranoid!)". ZDNET. Retrieved 2023-12-29.
  17. "the CIA Can Hack Your Phone, PC, and TV (Says WikiLeaks), WIRED".
  18. "Vault 7: Wikileaks reveals details of CIA's hacks of Android, iPhone Windows, Linux, MacOS, and even Samsung TVs - Computing". computing.co.uk. 7 March 2017.
  19. "WikiLeaks just revealed the horrifying secret inside your phone and TV" . The Independent. 7 March 2017. Archived from the original on 2022-05-14.
  20. Dockrill, Peter (2017-03-18). "Millions of Smartphones Could Be Vulnerable to Hacking Via Sound Waves". ScienceAlert. Retrieved 2019-03-13.
  21. Nordrum, Amy (2017-03-17). "Smartphone Accelerometers Can Be Fooled by Sound Waves". IEEE Spectrum: Technology, Engineering, and Science News. Retrieved 2019-03-13.
  22. Mathews, Lee (2018-08-31). "Now Hackers Can Spy On You By Listening To Your Screen". Forbes. Retrieved 2019-03-13.