Skip to main content

How to break people privacy with mobile phone

Source of photo: Internet


Kimmo Huosionmaa

How to break people privacy with mobile telephone is easier than you might think. Spy programs are only modified versions of normal programs what are commonly use with every day communication between people. One good idea to download spyware to some persons cellphone is basis with strong identification. When people whose SIM card is in so called observation list is taking any mobile telephone his application shop will replace by version what involves only those spy programs. Those programs just don't looks like spyware, and they are "spy versions" of normal WhatsAPs or some style of programs. What makes that kind of software a spying tool, is that there is involved an "stealth" mode in those tools.


That means that those programs doesn't show icons when they are sending data to eavesdroppers, who wants to monitor some people. GPS systems will make that eavesdropping more effective, because observer can filter information what he or she collects, and he can connect surveillance on only when target meets some other person or goes to interesting places, and this minimizes collection of unnecessary information, what makes eavesdropping more effective because hard disks won't fill with traffic noise or other kind of information what slows down checks of tapes.


Also everybody can get software what copy writes document straight from speech. And in every mobile telephone has this kind of tool, and spy can connect his or her telephone to computer where tape is, and after that this application will make documents for that person. And after that he or she can only make text clean and easier to read with text editor.¨That makes reading of documents easier when they are written with properly language.


But there is another way to modify cellphone for spy tool. It needs only connect that equipment with powerful microphones. Those very sensitive laser- or aimed microphones can catch people speech even kilometer distance. And that makes possible just to connect mobile telephone to that microphone, and that scenario might eavesdropper use speech to text application, when he or she makes records and documents in same time.


If that malware user gets full control of that cellphone, can this person use Bluetooth or other kind of communication. In that scenario spy or observer might connect this cellphone secretly with other small intelligence equipment. Those systems are equipped with very long living battery what are normally use with pacemakers and those miniature microphones might implanted to people teeth, and equipped with  small flash memories. When those equipment will get radio signal they will send that information via cellphone to satellite. That will happen with modified GPS-transmitters what send also location information but also that spy data what is interested by persons who secretly  monitors people





Comments

Popular posts from this blog

MIT's tractor beam can make the new types of SASER systems possible

   "This chip-based "tractor-beam," which uses an intensely focused beam of light to capture and manipulate biological particles without damaging the cells, could help biologists study the mechanisms of diseases."(Interesting Engineering, MIT’s Star Wars-inspired ‘tractor beam’ uses light to capture, manipulate cells) MIT's tractor beam can make the new types of SASER systems possible. The tractor beam just hovers the nanoparticle in air or medium, and then the laser or some other electromagnetic system transports oscillation into those particles. The ability to make cells and other particles hover in the system makes it possible to create particles whose energy level or resonance frequencies are accurately calculated things.  That thing makes it possible to create things that transmit wave movement accurately and cleanly. This is one version of the use of a tractor beam. Modern tractor beams are like acoustic tweezers where sound waves lock the object in its cr

The new observations tell that the thunderstorms form gamma-rays. That could make gamma-ray lasers possible.

  "An illustration of NASA’s research plane ER-2 flying over thunderstorms. Credit: University of Bergen / Mount Visual (CC BY 4.0), edited" (ScitechDaily, Surprising Discovery: NASA’s Retrofitted U2 Spy Plane Reveals Tropical Lightning Storms Are Radioactive) The new observations tell that the thunderstorms form gamma-rays. That could make gamma-ray lasers possible. The process has been observed by the NASA (Lockheed) ER-2 research plane, which is a modified U-2 spy plane. The gamma-ray formation in thunderstorms. Where lightning and electric fields release electrons that impact the air molecules and water droplets is an interesting thing. That thing opens the route to solving many mysteries.  "The general physics behind how thunderstorms create high-energy flashes of gamma radiation is not a mystery. As thunderstorms develop, swirling drafts drive water droplets, hail, and ice into a mixture that creates an electric charge much like rubbing a balloon on your shirt. Pos

Chinese innovations and space lasers are interesting combinations.

Above: "Tiangong is China's operational space station located in low Earth orbit. (Image credit: Alejomiranda via Getty Images)" (Scpace.com, China's space station, Tiangong: A complete guide) Chinese are close to making nuclear-powered spacecraft.  Almost every day, we can read about Chinese technical advances. So are, the Chinese more innovative than Western people? Or is there some kind of difference in culture and morale between Western and Chinese societies? The Chinese superiority in hypersonic technology is one of the things that tells something about the Chinese way of making things.  In China, the mission means. And the only thing that means is mission. That means that things like budgets and safety orders are far different from Western standards. If some project serves the Chinese communist party and PLA (People's Liberation Army) that guarantees unlimited resources for those projects. Chinese authorities must not care about the public opinion.  If we th