Cell phone spying: James Bond cool or cyberstalking tool?

spy-phone.jpg

Security researchers masked as hackers have begun to show the world the many vulnerabilities in smart phones. MWR InfoSecurity recently cooked up a Palm Pre bug which allowed them to turn the Pre into a James Bond-like device. According to Belfast Telegraph, MWR also discovered a flaw in Google's Android phone that would allow attackers to collect all the information stored in the phone's browser, such as browser history, passwords and usernames.

In the coming years, more vulnerabilities will be discovered by security researchers and hackers. Phones may be used to conduct espionage or personal blackmail. Yet it does not take a hacker to turn your smartphone against you or to spy on you. These spy gadget "tools" have been around for years. They could be used by bosses or by a suspicious significant other.

iPhone Spy Stick is a "recovery tool" that captures all deleted information from an iPhone. That means all photos, GPS coordinates, maps, web browser history, texts, calendar, voice memos, and appointments. Basically if it existed on an iPhone with an iOS 3.2.1 or earlier, any sneaky nontechnical person with money to burn could use your iPhone against you.

There is a GSM Listening Device that is no larger than a coin. It has an unlimited range, allowing "spies" to call from any phone and start listening immediately to a conversation anywhere in the world. It is slightly larger than a coin, has the capability to listen in for 6-8 hours and has a charge that will last for 6 days on standby.

The Cell Phone Sim Card Spy reads deleted text messages from any SIM card. There is also an industrial-strength SIM Card spy, the Deep Forensics Elite Edition. Another example is Mobile Spy; it leaves no trace once installed and allows up to three phones to be spied upon, texts, video, photos, and calls.

In fact, there are thousands of search engine hits for cell phone surveillance software. To term this type of spying as James Bond-like makes it sound cool. The truth is, it's not cool; it's cyberstalking. The Department of Justice reported electronic monitoring was used to stalk 1 in 13 victims.

Although it is often recommended that you don't let your phone out of your sight, spyware in the form of a trojan can be downloaded via browsing a malicious site or opening an infected email. The list goes on and on just like it does for how a computer can be infected. After all, your phone is tiny computer.

Most of us have our cell phones nearby. If a person were spying on you, that individual could hear what is being said wherever you are . . . not just when you are making a call. If the camera was activated, it could be used to watch you. The more capabilities your smart phone has, such as GPS, the more those extras could be utilized to spy on you.

Makeuseof points out signs to tell if your cell phone is tapped, but several of those could happen on about anyone's phone. If you notice your phone lighting up, shutting down, installing programs or other bizarre activity, you may have a problem. If you haven't used your mobile phone recently, but the battery temperature is warm like were using it, that is a potential sign that your cell phone is being used to spy upon you. Taking out your battery should stop anyone from spying on you from your phone.

If you are creeped out now, you might like this? It's not using your cell phone against you, but using what appears to be a cell phone as personal protection. This may look like a cell phone, but it's actually a 180,000 volt stun gun. It also has a 130 decibel siren alarm.

The video below talks of cell phone spying. If you are being cyberstalked, contact the National Center for Victims of Crimes.

Computerworld's IT Salary Survey 2017 results
Shop Tech Products at Amazon