Source of photo: Internet |
Kimmo Huosionmaa
How to break people privacy with mobile telephone is easier than you might think. Spy programs are only modified versions of normal programs what are commonly use with every day communication between people. One good idea to download spyware to some persons cellphone is basis with strong identification. When people whose SIM card is in so called observation list is taking any mobile telephone his application shop will replace by version what involves only those spy programs. Those programs just don't looks like spyware, and they are "spy versions" of normal WhatsAPs or some style of programs. What makes that kind of software a spying tool, is that there is involved an "stealth" mode in those tools.
That means that those programs doesn't show icons when they are sending data to eavesdroppers, who wants to monitor some people. GPS systems will make that eavesdropping more effective, because observer can filter information what he or she collects, and he can connect surveillance on only when target meets some other person or goes to interesting places, and this minimizes collection of unnecessary information, what makes eavesdropping more effective because hard disks won't fill with traffic noise or other kind of information what slows down checks of tapes.
Also everybody can get software what copy writes document straight from speech. And in every mobile telephone has this kind of tool, and spy can connect his or her telephone to computer where tape is, and after that this application will make documents for that person. And after that he or she can only make text clean and easier to read with text editor.¨That makes reading of documents easier when they are written with properly language.
But there is another way to modify cellphone for spy tool. It needs only connect that equipment with powerful microphones. Those very sensitive laser- or aimed microphones can catch people speech even kilometer distance. And that makes possible just to connect mobile telephone to that microphone, and that scenario might eavesdropper use speech to text application, when he or she makes records and documents in same time.
If that malware user gets full control of that cellphone, can this person use Bluetooth or other kind of communication. In that scenario spy or observer might connect this cellphone secretly with other small intelligence equipment. Those systems are equipped with very long living battery what are normally use with pacemakers and those miniature microphones might implanted to people teeth, and equipped with small flash memories. When those equipment will get radio signal they will send that information via cellphone to satellite. That will happen with modified GPS-transmitters what send also location information but also that spy data what is interested by persons who secretly monitors people
Comments
Post a Comment