Your mobile phone, "Spy," .. Beware of it
London - «Al -Quds Al -Arabi»: The mobile phones that every person in his pocket became a very effective way to spy on him without knowing, as many do not know the size of the monitoring that a person can be exposed to through the phone he holds, especially if it is a "smart phone “Like“ iPhone ”and“ Galaxy ”and other similar species. Communications and information technology experts say that many parties are able to spy on individuals through their mobile phones, where the espionage process is not already limited to listening to the phone calls that a person is conducting, or Reading the short text messages that he receives or sends, but rather extends to knowing his whereabouts and his moves, and seeing his email that he uses through the mobile phone, leading to listening to his words and the dialogues that he is conducting in his public life without using the phone, and during the times that it is not The phone in it works. According to the expert on communications and information technology, Harun Mir, the security services in any country in the world are able to call the phone calls made by anyone, in addition to the messages The short text that he sent or received is easily easily and without the need for a long time as it was previously. Mir, who runs a technical company in South Africa, says to “Al -Quds Al -Arabi” that the process of monitoring via mobile phones is not limited to calls and messages, so the location of the existence can be determined The person through his mobile phone, and the mobile phone can be converted to a reception device that sends the sound from his surroundings to the side that you want, without the phone owner feel that what he holds is only a "spy piece that records the sound and sends it." He says that the identity of the owner of the phone can be identified Through another phone, he explains this by saying that «some people carry two phones for the purposes of security hedging, and as it can be spying through one of them, but the truth is that it can be easily through vibrations to know the phones surrounding the target phone, and through these surrounding phones a identity is determined The person who uses the two phones. ”
Monitoring methods
There are different forms to monitor individuals through mobile phones, but the main ways of this are three: monitoring of the segment (the phone line) device monitoring, monitoring by name. First: Through the SIM Card segment, the person can be located accurately, seeing the export and import numbers, listening to the recorded calls, issued and received messages, and seeing all the files on the phone also even if they were previously deleted, that these capabilities are available to the provider The main service, that is, the telecommunications company that provides the user with the service, usually this information is very confidential, and even employees are not able to access it, but the prevailing belief is that the security services in any country you benefit from. Second: Monitoring the mobile device: the process of monitoring the device is an order It is very easy for any security apparatus in any country, as it is possible to know the number of the device called the Serial Number, provided that knowing this number requires the use of the company that sold the device to the target person provided that it has been confirmed by the identity of the buyer. As for the other means of spying through the device, which is the most dangerous, it is that someone who wants to spy can access the device and then return it to the target person, in which case all the possibilities become possible, to the "booby -trap" of the same device and convert it into a bomb as Israel did. When she assassinated the martyr Yahya Ayyash by a mobile phone device. Third: monitoring by name, in which case the person’s name is inserted into the system in the company equipped with the service, so the full information appears from him and all the numbers that bear his name, and through which the records of each number can be viewed But this method assumes that the target person uses phone numbers registered in his name at the telecommunications company.
What do security and intelligence services do?
The security services and intelligence agencies have two methods of espionage, according to what experts say in information security, the first, which is that a specific person is targeted to know his movements, calls, secrets and activities, and in this case his phone numbers, and the phones that he uses and then targeted. As for the second method, which is the most widespread and most popular in the world, it is also the easiest, where "keywords" are determined and through these words the search is done from time to time, such as if the American security services search for the word (bin Laden), and then review lists The phone calls and text messages in which the word received, and the calls are listened to the subject of doubt after that, or reading the doubtful text messages that they contain information.
Spy across (WiFi)
Communications and Information Technology experts say that the WiFi networks that provide some users with the Internet represent an additional penetration and spy, as many people link their phones with them during their presence in cafes or public places, which makes them possible prey during the link to these networks. The (WiFi) networks lack many safety and protection standards, as the manager or owner of this network can easily enter the phone or the associated device, and then see its content, copy or penetration. During the connection of the WiFi network, some can penetrate some Applications installed on the mobile phone device, including chat applications such as "WhatsApp", which is considered one of the easiest penetration programs compared to others. According to computer and communications experts, there are no safe communication in the world, and there is no full safety on the Internet, whether it is the Internet service Pour into a computer or a mobile phone.
Mohamed Ayesh