Tapping Cell Phones

cellphoneLast week at an identity theft speech for the Department of Defense, I met two soldiers who alerted me to the new security risk of Cell Phone Tapping. SigInt (or signal interception) has long been a part of warfare and espionage. But the possibilities erupt with the advent of cell phone tapping. Imagine the conversation of a soldier being overheard by the enemy – deployment details, troop locations, command structure, strategic and tactical information. The prospect is terrifying for our national security.

This week, I was asked to help with a case of domestic abuse: the husband had installed Cell Phone Tapping Software (like computer spyware or keyloggers) on his wife’s phone prior to their divorce. During the divorce proceedings, he listened to every conversation, read every email and text sent from her phone, and could even control her calendar and applications (thanks to iPhone Tapping Software). Because of GPS tracking, he always knew where she was. When she switched to a new phone number and iPhone, iTunes must have synced the malicious software to the new phone along with all of the legitimate programs – allowing the abusive husband access to the new phone and continue stalking her. Cell phone tapping software allows the user to perform all of these tasks without your ever knowing it:

  • Silently record the entire text of all SMS text messages (allowing them to read all of your incoming and outgoing text messages)
  • Log information about each call (so that they know who you called, when and for how long)
  • Provide actual GPS positions (so that they know where you are anytime your phone is on)
  • Receive a text message when someone uses the cell phone so that the spy can call in and listen to everything being said (every conversation you have can be overheard and recorded)
  • Turn the cell phone into a remote listening device, even when the phone is not open or in use (allowing the spy to listen in on conversations anytime your cell phone is near)

Shortly after the identity theft speech,  I ran into this video from WTHR Indianapolis about tapping cell phones that corroborates all that I had learned – make sure you watch through to the end (you may need to double click to play the file):

If you are having trouble viewing the video, or want to see it in the original, please view their entire news story on Cell Phone Tapping.

Tapping a cell phone is quite easy with the right software (which can be purchased very inexpensively and legally). You see, the software was designed for “legitimate” purposes:

  • parents who want to track their child’s usage and text messages
  • husbands & wives who want to determine if their spouse is cheating on them.
  • businesses that need to enforce Acceptable Use in Vehicle Policies on company-provided phones or track their employees by GPS
  • law enforcement officials use the software to catch child predators
  • You can also back up your own cell activity as a record of all important text conversations and travels.

And now cell phone tapping software is being used by stalkers, hackers and identity thieves for around the clock surveillance.

Cell Phone Tapping Solutions

Until there is a better solution, your options are minimal:

  1. Password protect your cell phone so that only you have access (this isn’t as safe as it sounds, but it’s a start).
  2. Don’t allow anyone to have physical access to your cell phone if you think they have a reason to tap your communications (competitors, angry spouses, ex-partners, etc.).
  3. Consider turning off the GPS function when you don’t need it. This makes it harder for someone to track your location.
  4. Consider pulling the battery out of the phone if you are in a conversation where you do not want to be heard.
  5. Keep your eye open for software that detects spyware on your phone.
  6. If you have a cell phone issued by your company, they probably reserve the right to monitor your location and potentially to intercept your communications. Watch what you say.
  7. If you are in the military and feel like your phone is tapped, alert your S2 or InfoSec contact.
  8. Check back here frequently so that I can keep you posted on the latest developments.

John Sileo became America’s leading Identity Theft Speaker & Expert after he lost his business and more than $300,000 to identity theft and data breach. His clients include the Department of Defense, Pfizer and the FDIC. To learn about having John speak at your next event, contact his office on 800.258.8076. Follow John on: Twitter, YouTube, LinkedIn.

 

Posted by John Sileo, Identity Theft Speaker in Identity Theft Prevention and tagged , , , .

5 Responses to Tapping Cell Phones

  1. Andi: September 23, 2009 at 12:02 am

    I am always amazed at how much I learn by reading John’s blog. It’s hard to feel safe in today’s world–and yet when I read John’s blog I feel that there is action I can take to protect myself.

    I have recommended this site to everyone I know. Thank you for the great information!

  2. Cristen Payor: December 21, 2009 at 3:53 am

    Interesting read. There is currently quite a lot of information around this subject around and about on the net and some are most defintely better than others. You have caught the detail here just right which makes for a refreshing change – thanks.

  3. Remote Phone Spy: March 20, 2012 at 1:36 am

    Thanks for sharing this information. I think this spying software is very helpful and great as mobile phones are very popular in these days.These software helps parents to keep an eye on the children.

  4. carolyn Roe: February 24, 2013 at 2:28 pm

    John I have had terrible problems with a neighbor to the point I would not put any thing past her and the attorney that put her in the home litterly four feet from my property line.II have had to call the police several times and when having a conversation on the cell abouy my home security there would be a response by neighbor with in minutes of some other threatening –. How can I document to proceed with this leagelly.

  5. carolyn Roe: February 24, 2013 at 2:29 pm

    John Tis is happening to me How can I prove it to document and get help with the law

Leave a Reply