Secrets on the Airwaves-Privacy and CellPhones

Read Time:3 Minute, 10 Second

Cell phones are everywhere today. It is amazing how fast that cell phones have changed from luxury item to basic need. I personally have seen a 6 year old with his own IPhone pressing the screen, texting with a blaze of finger movement.

But cell phone use does have a hidden cost when it comes to privacy. In fact, they are one of the most blatant privacy violators of them all.

The operation of the cell phone requires it to be in constant 2 way communication between the user and the cell phone network. The cell phone pings a signal out, even when not in use, to let the cell tower know where its position is at all times.

This cell phone ping can be used to find the location of the phone, and the user, by triangulation. In addition, all new cell phones have a built-in GPS device so its location can be determined to within 6 feet or so.

The location of every cell phone is kept in computer records as the phone travels throughout the cell network. This information can be viewed online by anyone on the Internet, in real time, and requires only a password to access this database. Think that this information is not being used? Sprints database alone got “Pinged” over 8 million times in 2009.

Information that is personal on your cell phone is actually stored in 2 places, the phone that you carry AND the cell phone carrier computer system. The reason for this is that whenever you have messages being sent to your phone and the phone cannot be contacted, the messages will not be lost. The messages are also stored in the cell phone service providers computers, just waiting until your phone becomes available again so they can be sent.

Great for not losing messages but it also means that if anybody gains access to the service providers computer system, they can retrieve all of the messages, pictures, and videos that you have ever received or sent.

This is how some of the celebrities and politicians have gotten into embarrassing situations. The information was not actually stolen off their phone, it was taken from the cell phone service providers computers.

When Barack Obama was sworn in as President, his security team refused to let him keep his BlackBerry because of the privacy and security issues. Eventually a compromise was reached, but it further illustrates how compromising cell phones can be.

A big scandal that has just occurred in Mexico is just now in the news. The Mexican government had asked everyone to register their phones, but many refused, citing fears of spying or other misuse of the data. It turns out they were right. Millions of cell phone users data was discovered for sale at a Mexico City flea market.

Another way that technology is being used to circumvent privacy is a program that can be remotely uploaded to your phone, without your knowledge, that will cause the microphone to activate,turning your phone into a remotely controlled listening device. The program also disables the off switch in a deceptive way. When the off switch is pressed, the program controls the phone to make it seem like is has been shut off but the microphone is still active.

This technology is called Roving Bug and has been used to prosecute and convict several people, especially in organized crime investigations. But it is a program that can be used by anyone of sufficient technical skill and determination.

Cell Phone Usage (USA Subscribers)

Cell phones are a great tool in keeping us connected at all times. But as with other technologies that are becoming more prevalent in our lives, it can be a double edged sword.

Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %
0 0 votes
Article Rating
Subscribe
Notify of

12 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
13 years ago

I am not a number I am a free man.

13 years ago

Don’t believe it. If it was true I’d have been arrested years ago!…;-)

Reply to  fourdinners
13 years ago

Ahhh, 4D, maybe you were arrested years ago. Didn’t you watch “The Prisoner” series on the boob toob?

Randal Graves
13 years ago

This is why I still use aluminum cans and string.

Reply to  Randal Graves
13 years ago

Funny Randal! Maybe the best way to go as well.

I like to text when I drive, but I skip the cell phone and only use one finger to do it. They seem to get the message.

13 years ago

Your can actually purchase technology on the web now that allows you to place a small program in the cell phone and you can monitor phone calls, text message, e mails, and GPS locations over the internet. So if you want to keep up with what you kids, spouse, employee, boss, etc are up to give a new phone, esp a Blackberry (pre-loaded of course).

Reply to  Lazersedge
13 years ago

There are also ways to remotely download that program or something like it into a phone without the person knowing it.
Disturbing actually.

13 years ago

The forces fighting the US in Afghanistan and along the Pakistan tribal border lands, are supposed to communicate with each other by cell phone and lap top. The Roving Bug would be a perfect military weapon.

Reply to  Holte Ender
13 years ago

Good point Holte.

But it is the old double edged sword cutting back again. For about 30 bucks, militants can buy software that allows them to intercept the video feed from the drones because it is unencrypted.

http://www.wired.com/dangerroom/2009/12/not-just-drones-militants-can-snoop-on-most-us-warplanes/

-Sepp
13 years ago

Buy a “throw away” phone!

osori
13 years ago

Thanks Krell,
I’m enjoying this informative series.Cellular providers also monitor and store call data (voice/internet/radio/data) for maintenance and billing purposes, just as in storing text messages for very valid reasons but also another potential area of abuse.
I don’t know man, at some point do we draw a line or do we just throw our hands up and abdicate all sense of self and all expectation of privacy?
Good stuff man.

Reply to  osori
13 years ago

Thanks Oso. You make a good point in that the service providers do have to keep records for billing of customers, etc.

The big questions for this technology and the other technologies mentioned in this privacy posts.. “Who’s the gatekeeper? ”

What stands between the use of information gathered and the third party that wants to use it for something else?

It could be a legitimate like law enforcement or it could be a hacker or a company wanting to advertise to a particular audience or someone wanting to steal an identity.

Previous post Religion Screws Society!
Next post The Ghetto Economist and Dulce on Too Big To Fail
12
0
Would love your thoughts, please comment.x
()
x