Cell Phone Tapping Solutions

Last week at an identity theft speech for the Department of Defense, I met two soldiers who alerted me to the new security risk of Cell Phone Tapping. SigInt (or signal interception) has long been a part of warfare and espionage. But the possibilities erupt with the advent of cell phone tapping. Imagine the conversation of a soldier being overheard by the enemy – deployment details, troop locations, command structure, strategic and tactical information. The prospect is terrifying for our national security.

This week, I was asked to help with a case of domestic abuse: the husband had installed Cell Phone Tapping Software (like computer spyware or keyloggers) on his wife’s phone prior to their divorce. During the divorce proceedings, he listened to every conversation, read every email and text sent from her phone, and could even control her calendar and applications (thanks to iPhone Tapping Software). Because of GPS tracking, he always knew where she was. When she switched to a new phone number and iPhone, iTunes must have synced the malicious software to the new phone along with all of the legitimate programs – allowing the abusive husband access to the new phone and continue stalking her. Cell phone tapping software allows the user to perform all of these tasks without your ever knowing it:

  • Silently record the entire text of all SMS text messages (allowing them to read all of your incoming and outgoing text messages)
  • Log information about each call (so that they know who you called, when and for how long)
  • Provide actual GPS positions (so that they know where you are anytime your phone is on)
  • Receive a text message when someone uses the cell phone so that the spy can call in and listen to everything being said (every conversation you have can be overheard and recorded)
  • Turn the cell phone into a remote listening device, even when the phone is not open or in use (allowing the spy to listen in on conversations anytime your cell phone is near)

Shortly after the identity theft speech,  I ran into this video from WTHR Indianapolis about tapping cell phones that corroborates all that I had learned – make sure you watch through to the end (you may need to double click to play the file):

If you are having trouble viewing the video, or want to see it in the original, please view their entire news story on Cell Phone Tapping.

Tapping a cell phone is quite easy with the right software (which can be purchased very inexpensively and legally). You see, the software was designed for “legitimate” purposes:

  • parents who want to track their child’s usage and text messages
  • husbands & wives who want to determine if their spouse is cheating on them.
  • businesses that need to enforce Acceptable Use in Vehicle Policies on company-provided phones or track their employees by GPS
  • law enforcement officials use the software to catch child predators
  • You can also back up your own cell activity as a record of all important text conversations and travels.

And now cell phone tapping software is being used by stalkers, hackers and identity thieves for around the clock surveillance.

Cell Phone Tapping Solutions

Until there is a better solution, your options are minimal:

  1. Password protect your cell phone so that only you have access (this isn’t as safe as it sounds, but it’s a start).
  2. Don’t allow anyone to have physical access to your cell phone if you think they have a reason to tap your communications (competitors, angry spouses, ex-partners, etc.).
  3. Consider turning off the GPS function when you don’t need it. This makes it harder for someone to track your location.
  4. Consider pulling the battery out of the phone if you are in a conversation where you do not want to be heard.
  5. Keep your eye open for software that detects spyware on your phone.
  6. If you have a cell phone issued by your company, they probably reserve the right to monitor your location and potentially to intercept your communications. Watch what you say.
  7. If you are in the military and feel like your phone is tapped, alert your S2 or InfoSec contact.
  8. Check back here frequently so that I can keep you posted on the latest developments.

John Sileo is an an award-winning author and keynote speaker on identity theft, internet privacy, fraud training & technology defense. John specializes in making security entertaining, so that it works. John is CEO of The Sileo Group, whose clients include the Pentagon, Visa, Homeland Security & Pfizer. John’s body of work includes appearances on 60 Minutes, Rachael Ray, Anderson Cooper & Fox Business. Contact him directly on 800.258.8076.

8 replies
  1. Andi
    Andi says:

    I am always amazed at how much I learn by reading John’s blog. It’s hard to feel safe in today’s world–and yet when I read John’s blog I feel that there is action I can take to protect myself.

    I have recommended this site to everyone I know. Thank you for the great information!

  2. Cristen Payor
    Cristen Payor says:

    Interesting read. There is currently quite a lot of information around this subject around and about on the net and some are most defintely better than others. You have caught the detail here just right which makes for a refreshing change – thanks.

  3. Remote Phone Spy
    Remote Phone Spy says:

    Thanks for sharing this information. I think this spying software is very helpful and great as mobile phones are very popular in these days.These software helps parents to keep an eye on the children.

  4. Remote Phone Spy
    Remote Phone Spy says:

    Thanks for sharing this information. I think this spying software is very helpful and great as mobile phones are very popular in these days.These software helps parents to keep an eye on the children.

  5. carolyn Roe
    carolyn Roe says:

    John I have had terrible problems with a neighbor to the point I would not put any thing past her and the attorney that put her in the home litterly four feet from my property line.II have had to call the police several times and when having a conversation on the cell abouy my home security there would be a response by neighbor with in minutes of some other threatening –. How can I document to proceed with this leagelly.

  6. carolyn Roe
    carolyn Roe says:

    John I have had terrible problems with a neighbor to the point I would not put any thing past her and the attorney that put her in the home litterly four feet from my property line.II have had to call the police several times and when having a conversation on the cell abouy my home security there would be a response by neighbor with in minutes of some other threatening –. How can I document to proceed with this leagelly.

Comments are closed.