Six signs wiretapping phone + forum
First, some quotes from the forum, my favorite:
"Little precautions for those who want to escape all the same.
If you change Simcoe, and change the phone (IMEI They'll find immediately and begin to listen to). You all still find a subscriber you are calling. If you change your phone, sdelayte what would your friends or relatives, too, have changed the phone, and be sure to register for other passport, or again will fail again, or do not call them) well, and at this stage you can find. (Do not call from the apartment to which you are using normal (old) phone, if you strongly want to compute the coordinates of the previous phone they really have to sweat because it is not so easy to make but it is possible)
Every room you are typing in the database operators fixed location of the phone up to 5 meters where the phone. And Investigators in the room with direct access to databases. "
" all talk and listens, and listens well tested machine that is specifically making devices just for certain words or phrases or a specific tone, and so the conversation turns autosaving and only then signal to people about it so I imagine it is about presenting "
" The man is "to develop" The special services, no matter what, SVR, FSB, the Interior Ministry, Federal Drug Control Service, etc. At this Human accumulate material that is mined in various ways, surveillance, wiretapping, etc. At such events give permission only Prosecutors or the Court, because it violated certain constitutional rights of the suspect's rights! And only when the collection of materials prove indirect guilt, only then accuse!
This is a very long process. ... If you are not connected with drug trafficking in ammunition, explosives and weapons, money laundering, major financial frauds and machinations of real estate, human trafficking and child trafficking in human organs, prostitution and pimps do not take bribes, etc. YOU HAVE NOTHING TO WORRY, let them check you and your dossier received information that YOU-law abiding citizen! "
"Especially for paranoids does not explain the secret Old. To listen to and archive all year - you need a server the size of the sun, and then up to a certain time, but also when to reap a terrible loss. What would listen for keywords automatically - there is - you do not care one hundred peddesyat tysch million employees, that will make a decision. Because the words bomb, terrorist, garbage, and I do all ssuka wetting said every second. Play by gamers simple method. Near you parked car, in which there are cells of the big three (according to this we have few operators - what would a pancake for them at least keep an eye on) Honeycomb or put your operator. Your phone automatically starts taking immediate honeycomb - in the car - and with cells taken all the traffic. Decisions are really made sometimes retroactively, but that's because we live a little behind civilization. If you're reading this - you're obviously not a candidate for bugging you or interesting all this (like me) - or if you really lack of knowledge about what is the traffic, disk space, and cellular networks. Encrypt useless - it's money spent nowhere. Because of the encryption, I now Blackberry can not buy - a good phone, but its use can not allow in Russia because of the good protection from eavesdropping. Believe me, everything that you write and think about it - so far from the truth, that simply is yes as well, what do you think so, because if you know the truth, think - And fuck if we live. For all much easier. And with the wiretapping as well. For example, during the fighting in Georgia have used NATO's proponents - so that if War and the bombing - Kicks fucking phone away - otherwise this place would be a crater. Initiator is not a secret - a device that makes sending Reverse phone signal so well without batteries - many of them have backup power supplies. The most realistic way to protect what it Communication - vindous Mobile with Skype - There is no battery, he really is dead, although it is still a question, because the signal can carry and power module for GSM. The bandits used in the methods of interception by Conventional paper request a chief commander of the seals,:))) if you do not understand this sentence, then your idea of \u200b\u200ba country in which we live - at 90 s :)))"
"Sami cops and phone numbers almost every week, I was. Because the watch and for them (because they too are doing mischief (judges, prosecutors, lawyers, opera)), and for those for whom they are chasing. "
" I think the author of this article only scare mobile phone users, and do not represent the essence of what is happening in the mobile world. Hacking cell phone - it's time consuming and sometimes without productive work, which is often not successful cracker. Now try explain why:
1.If your phone is not a smartphone, that is, has no operating system type: symbian, android, WidowsMobile. Then the probability that you overhear = 0.Vredonosnaya program must either transmit a conversation over the Internet, which requires a high speed connection. Either stored in memory to record the call number. Understand, for nokia 1100 - is on the brink of fantasy.
2. It should be noted that the screen can light up a mobile icon "open padlock" - this means that your mobile operator does not encrypt your conversation. This does not mean that you listen, it only warns you that in this region better than smaller ones gab!. Open padlock icon may appear for example when a subscriber in the conduct of certain important political events.
3. Not worth INCLUDE bluetooth, if you do not wake them to enjoy! And do not accept files from strangers. Here's an example on an escalator in the subway, I found in the zone of radio visibility about 30 mobile devices! I tried to upload a file to a random device from the list, and I did it! ", Which means that owners of phones with joy accept incoming files! (I warn you, this could end badly.) Download and look at that program's ability to bluetooth explorer.
4. OFF GPS IrDA 3G can those who have 4g connection. and do not use them unnecessarily.
5. Your Simca registered to YOU? or you gave it to a friend? It is worth thinking about what he gave it to you with the uneasy nameriyanemi. Perhaps mobile phone operator watching you and for your movements, and it all turns out legally by the operator, but it is illegal on the part of your friend. Here's how I remember the operator MTS provides this service for monitoring the movement of children. Parents, respectively, sit at home and watch the movement of dear child. Remember your (new) one can also follow you as you watch the kids!
6. There is also a google - Locator, the program is also absolutely legal, but is used in illegal purposes. And at least register in any of these GEO-services, even if you asked a friend or girlfriend.
7. All about SMS know it? Comes SMS: "Mom went to the hospital, roll the money in this room!" Oh YES! Who would not bite on the word MAMA - it's sacred! Be careful with the number of which came SMS can not my mother! And you thereby attackers ENTERED's gullible. "
8. Is there a phone? Know how to use it! JAVA can also be dangerous, especially if it is allowed to do what you want. Here is a story that happened to me: Here I climbed on the mobile Internet, and download the application EroPocker or something like that. (Can not remember.) Well, in short, set to run, And there, in short naked Chicks with breast 4th in size and is burning the Next button ... So I click OK on a mobile phone, there is a slit babischa is, well, I'm shorter than OK again, then again OK OK OK .... And then the fun part: getting out a message, warning: "to send an SMS??" and allow the application access to a phone? "And I still shake the OK button in the inertia, so naked aunts watch! Well, in short naotpravlyal SMS at 1550 rubles .... That was ass, guys, do not step these rake! "
" You are here specifically to each other noodles hang or what? "Bugs" in the phones is the last century. I tell you, as a man whose six months' bodies, "Look, state: it was without any "bugs". I do not know how to do it, but to me then my conversation three months ago gave a record to listen to, and another stated: what are you doing so much talking about? Tired of all nights to listen!
At that time my phone all clicked, gurgled, the link is broken, buggy.
So, anyone should listen to without bugs, with the latest technology. "
Get access to the cell phone to listen to it, actually not so difficult. However, there are ways to prevent the invasion of their privacy.
Taken from here: http://www.digimedia.ru/articles/digital-tales/bezopasnost/mobilnaya-svyaz/shest-priznakov-proslushki-mobilnogo-telefona/
«Ruformator presents translation of an article portal Makeuseof.com , you can use to determine "under the hood" you or not.
cell phone is all of us. When was the last time you leave the house without a mobile phone? Surely this was an accident. It is no secret that we use the phone very often, we actually depend on them and on their opportunities.
We are not trying to scare you, but do you know how easy it is to access it from? If someone wants to listen to your conversations, read the SMS-message and follow you on a GPS - it would do so.
There are many reasons why a person wants to eavesdrop on foreign phone calls. This could be an interesting boss a jealous husband, "burglar" or phone bully.
Watch for someone's phone number without the permission of the owner is illegal, but it happens. Optional, that this happens to you, but if you suspect that someone reads your SMS-correspondence and listened to the conversation, here are some helpful tips on how to calculate villain.
Battery temperature
One of the possible indicators of the presence of "wiretapping" - a battery. Feel your phone while you are not using - If he will be warm or even hot, it means that he is still in use. Keep in mind that heat is primarily from overuse. Battery may be hot only if the phone is used for some time.
Phone discharged very quickly
charge your mobile phone more than usual - get another sign of potential danger. If you have not used the gadget more than usual, it is possible that your phone used by someone without your knowledge. When the mobile phone is tapped, it loses its battery much faster. Listening on mobile phone continuously record the conversation in the room, even if it looks as though it lies idle.
You can use the application BatteryLife LX or Battery LED for iPhone , to track the rate of battery discharge.
Note: cell phones tend to lose the maximum level of the battery over time. If your phone over a year, then the battery capacity will steadily decrease, depending on usage.
Delay off
When you switch off your phone and watch the big delay, lighting, burning for a long time, or simply refusing to turn off the phone, it is it is possible that you're on the hook. Always alert to atypical behavior of the phone. Although the described problems may be caused by malfunctioning hardware or software phone software.
Strange Activity
When your phone is working, is it possible that he had suddenly lit backlight, itself set some applications, there is a spontaneous shutdown? Strange behavior may signal the fact that someone is remotely controlling the device. Incidentally, it may also occur due to interference during transmission.
background noise
When you talk, the phone "on prowhisper" can create interference. Something like echo, discharges of electricity, clicks - these sounds may be caused by environmental noise when connected ... or that someone you listens. If you hear a pulsating noise from your phone when you're not using it - it could be a serious problem.
Interference
If you use your phone in close proximity to other electronic devices (like TV) and it causes interference to them, then this may be due the presence of foreign devices into the body mobile. In most cases, interference - this is normal, but if it happens in those moments when you do not use phone, then it may well mean that you are "under the hood."
Become dezinformatorom
If you suspect that your telephone conversation bugged or written by someone who you know, you can try to misinform the spy in order to accurately confirm this suspicion. Tell someone you trust, their "secret" personal information over the phone. If you find later that the outsiders are found, it could be the answer "yes".
Get help
If you have reason to believe that your phone is bugged, ask for help. The police - is also an option since they have the equipment which you can check the phone, but this way you have to go only if you are sure that you listen
Conclusion
We again emphasize that the chance of being someone "hooked" is very small. Most of the problems described above can be attributed to poor communication, the old battery "Glitches" firmware - but there are those signs, which in any case, you should pay attention. If you - Good Samaritan, then you have all the chances that your phone is clean.
If you want to be safe, you should lock your phone password and keep it with you all the time. If you are not using it - Remove the battery from the unit to be exactly sure of what you do not listen. By the way, listening is not necessarily intelligence. And this kind of wiretapping - Not their method of work. There are many systems capture absolutely all traffic (voice, data). In Russia, this development was called СОРМ .
0 comments:
Post a Comment