Security From Electronic Monitoring, What to Look For

security

Today many of us are on an electronic leash of some kind, most of the day.  The most common being the cell phone, but it can be computers or video cams or even land line phone.  This leash means that we have a security issue.  Any of these devices can be used to monitor your activities.

In the old days servants made great spies, because they were around so much that people forgot about them and would talk in front to them, they became another piece of furniture.  Today we look at our electronic devices the same way.  They are always there and we don’t think about security.

Take the common cell phone, in just a few minutes search on the internet I found several sites that advertised  “powerful cell phone spy and tracking software that lets you monitor ALL the activities of any iPhone, Blackberry or Android phone”.  They even let someone  look at the GPS locator on your phone to determine your location.  Basically, they let someone see everything that goes on your phone; you have almost no personal security.

It is not as easy to listen to cell phones with a scanner as it used to be.  The new scanners block the cell phones bands and most phone calls are encrypted.  But it is still possible to listen to some calls if you have an old scanner.

So what do you do to keep people off your phone?  First of all, know where it is at and who has access to it.  Most of the apps have to be installed directly on to your phone and the installer has to have possession of the phone.  There are some newer apps that claim to allow monitoring with applications installed remotely into the phones.  But it is my understanding that these are hard to use and don’t work well.  But you never know what the government has, plus there is the NSA.

For the applications to work the phone has to have internet access, so some older phones are safer to use.  But still be careful monitoring techniques are always improving.

There are applications that lets someone listen in even if the phone is turned off.  If you are having a sensitive business or personal conversation with someone, the only safe thing to do is to remove the battery from your phone or better yet, set the phone down and walk away.

Your telephone landline is just as venerable, it can be easily bugged by anyone who goes on the internet and buys the equipment.  Law enforcement agencies can put a device know as a pen register on your phone that lists all the numbers you call.  This does not require a warrant.  Do not consider anything that you say on the telephone to be private.

Consider anything you type on your computer to be subject to outside monitoring.  Anything you ever put in an email can come back to haunt you.  Software is available that once installed lets someone else see everything you type and everywhere you go.  Most home computers can be hacked without to much trouble.  Anytime you open an attachment that you don’t recognize you might be installing a worm that sends out information from your computer.

Video cameras are everywhere and can be inside almost anything.  In some larger cities, just walking down the street you can be on camera for blocks or even miles from government and private security cameras. Just look up Spy shops or Nanny Cams on the internet, there are many different types of cameras installed in everything from smoke detectors to teddy bears.

Now I am not telling you this to help you break the law, but to help you protect your personal security and privacy. Consider what can happen if someone gains access to your bank accounts and other financial records.  Identity theft is a major problem, protect your personal information.  Be careful what say and where you say it.

Howard

Related posts:

This entry was posted in Operational Secrecy, security and tagged . Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *