Recently two soldiers alerted me to the new security risk of cell phone tapping. SigInt, or signal interception, has long been a part of warfare and espionage, but the possibilities erupt with the advent of cell phone tapping. Imagine the conversation of a soldier being overheard by the enemy – deployment details, troop locations, command structure and strategic and tactical information would all be at risk. The prospect is terrifying for our national security.
The prospect is also terrifying on a personal level. Recently I was asked to help with a case of domestic abuse: the husband had installed cell phone tapping software (like computer spyware or keyloggers) on his wife’s phone prior to their divorce. During the divorce proceedings, he listened to every conversation, read every email and text sent from her phone, and could even control her calendar and applications (thanks to iPhone tapping software). Because of GPS tracking, he always knew where she was. When she switched to a new phone number and iPhone, iTunes must have synced the malicious software to the new phone along with all of the legitimate programs, which allowed the abusive husband to access the new phone and continue stalking her.
Cell phone tapping software allows the user to perform all of the following tasks without your ever knowing it:
• Silently record all SMS text messages (allowing them to read all of your incoming and outgoing text messages)
• Log information about each call (so that they know who you called, when and for how long)
• Obtain actual GPS positions (so that they know where you are anytime your phone is on)
• Receive a text message when someone uses your cell phone so that the spy can call in and listen to everything being said (every conversation you have can be overheard and recorded)
• Turn the cell phone into a remote listening device, even when the phone is not open or in use (allowing the spy to listen in on conversations anytime your cell phone is near)
The following video (from WTHR Indianapolis) about tapping cell phones corroborates all that I have learned. Make sure you watch through to the end (you may need to double click to play the file): http://www.sileo.com/tapping-cell-phones/.
Tapping a cell phone is quite easy with the right software, which can be purchased very inexpensively and legally. You see, the software was designed for “legitimateapostrophe purposes:
• Parents who want to track their child’s usage and text messages
• Husbands and wives who want to determine if their spouse is cheating on them.
• Businesses that need to enforce Acceptable Use in Vehicle Policies on company-provided phones or track their employees by GPS
• Law enforcement officials use the software to catch child predators
It also enables you to back up your own cell activity as a record of all important text conversations and travels. Now, however, cell phone tapping software is being used by stalkers, hackers and identity thieves for around the clock surveillance. There are minimal options for resolving a problem with cell phone tapping, but until there is a better solution here are a few tips to follow:
• Password protect your cell phone so that only you have access (this isn’t as safe as it sounds, but it’s a start).
• Don’t allow anyone to have physical access to your cell phone if you think they have a reason to tap your communications (competitors, angry spouses, ex-partners, etc.).
• Consider turning off the GPS function when you don’t need it. This makes it harder for someone to track your location.
• Consider pulling the battery out of the phone if you are in a conversation where you do not want to be heard.
• Keep your eye open for software that detects spyware on your phone.
• If you have a cell phone issued by your company, they probably reserve the right to monitor your location and potentially to intercept your communications. Watch what you say.
• If you are in the military and feel like your phone is tapped, alert your S2 or InfoSec contact.
About the Author:
John Sileo became Americaapostrophes leading Identity Theft Speaker & Expert after he lost his business and more than $300,000 to identity theft and data breach. His clients include the Department of Defense, Pfizer and the FDIC. To learn more about how to bulletproof yourself and your business visit Johnapostrophes blog at Sileo.com. To book John at your next event, visit http://www.thinklikeaspy.com/.