Big Brother is Not the Only One Listening!

CellPhoneSpy.jpgby Bill Conkis – Sassy’s Computers, Inc.

What if I told you I could hear everything you were saying in your house, your car, or wherever you are, and I could track your every move on my computer? What if I told you I could do all this from miles away? What if I told you I could do this without spending money on expensive equipment? Do I have your attention yet?

This technology has been used for years by the FBI to nab criminals. A “roving bug” implanted in the cell phone can transmit not just private phone conversations, but conversations by others in the vicinity, to listeners far away. As reported Dec. 1, 2006, by Declan McCullagh and Anne Broache, staff writers for CNET News, “Nextel cell phones owned by two alleged mobsters, John Ardito and his attorney Peter Peluso, were used by the FBI to listen in on nearby conversations.” (http://news.cnet.com/2100-1029_3-6140191.html )

 

The technology uses software programs that can be installed in ten
minutes and is generally undetectable. The programs, which can be
downloaded free (in most cases) from the Internet, are designed to
flash the firmware’s read-only memory (ROM) of the cell phone. This
action essentially gives the cell phone a new instruction that allows
the would-be spy full control of your cellular phone. The user will be
able to read your text messages, eavesdrop on your calls, turn on the
cell’s microphone when you are not using it so as to listen into any
room or car conversation, and track your movements via computer using
the phone’s built-in GPS unit.

Because the software is easily available on the Internet, Big Brother
may not be the only one listening to you. About a year ago a former
employee used this technology to eavesdrop on me, though he is unaware
that I know what he did. To see a report from NBC’s Today show go to
www.youtube.com/watch?v=uCyKcoDaofg . You’ll be shocked.

The new wireless Bluetooth cell phone headsets or ear pieces are very
easy to compromise; an eavesdropper doesn’t even have to have access to
your phone itself to bug you. Today contributor Mike Celizic, wrote and
presented “Privacy pirates: Bluetooth’s hidden danger”
(www.msnbc.msn.com/id/20264578/ ) that aired August 14, 2007; it’s well
worth reading and watching.

How can you tell if your phone is comprised?
If your phone is warm even if you have not been using it could be a
sign that it was activated without your knowledge while someone
listened into your conversations. Similarly, someone might be
eavesdropping if your battery keeps draining down when the phone has
not been used. And if you hear a buzzing noise coming from the phone
when you’re near an audio speaker, the feedback may indicate you’re
being bugged.

What can you do to protect yourself?
First, be aware that simply changing the phone number will not help,
nor will turning it off. The bug continues working even if you power
down to recharge.

Second, take sensible precautionary measures: Do not leave your phone
out where anyone can get to it; this includes your kids or their
friends. Do not leave your phone in your purse or drawer at work unless
you can lock it up. Otherwise, lock it in your car where nobody
(including employers and even fellow employees) can get to it.
Remember, it takes only ten short minutes to compromise your phone.

Third, the only protections against a compromised phone are removing
the battery or replacing the phone. Nothing else will do it.

Many people don’t worry about their privacy being compromised. “I have
nothing to hide,” they say. But privacy is freedom, the same freedom
our forefathers, and the “Greatest Generation,” veterans of every
stripe, and all those who love our country, have fought for. Freedom is
our guarantee, our right as Americans.

The old saying, “Knowledge is power,” used to mean only that education
makes a person strong. But nowadays, it can also mean that those with
unauthorized knowledge about our private lives have power over us.

Are you listening?

The hackers are!