Over 100 FREE Online Calculators

Wednesday, January 2, 2013

Skynet is Listening to Your Cell Phone

Who is Listening to Your Cell Phone?

By: Tuquyen Mach

Cell phones long ago ceased to be a luxury and became something we can't leave home without. But even when your device is idle or turned off, it's sending information about your location to a cell phone tower every seven seconds.

One thing most of us don't consider is access to that information isn't limited to your cell phone carrier.

"Police and the government can use that ping to track your whereabouts. There is no expectation of privacy in carrying that cell phone," said Savannah attorney Bates Lovett of Hunter Maclean. Lovett said carriers can give out this information without your knowledge or permission, and in some cases without a court order.

"They can pull your text messages. They can pull your search history. Those are the types of data and information that they're being able to pull off now that they don't always need a warrant for," said Lovett.

"They're going after one person but get information on anyone who was around a cell phone tower at a certain time. Even though they're investigating one person, they have information on hundreds or thousands of people," said Trevor Timm of the Electronic Frontier Foundation.

Who is Listening to Your Cell Phone?


Your Cell Phone Makes You A Prisoner Of A Digital World Where Virtually Anyone Can Hack You

If you own a cell phone, you might as well kiss your privacy goodbye. Cell phone companies know more about us than most of us would ever dare to imagine. Your cell phone company is tracking everywhere that you go and it is making a record of everything that you do with your phone.

Much worse, there is a good chance that your cell phone company has been selling this information to anyone that is willing to pay the price – including local law enforcement.

In addition, it is an open secret that the federal government monitors and records all cell phone calls. The “private conversation” that you are having with a friend today will be kept in federal government databanks for many years to come.

The truth is that by using a cell phone, you willingly make yourself a prisoner of a digital world where every move that you make and every conversation that you have is permanently recorded.

But it is not just cell phone companies and government agencies that you have to worry about.

As you will see at the end of this article, it is incredibly easy for any would-be stalker to hack you and track your every movement using your cell phone. In fact, many spyware programs allow hackers to listen to you through your cell phone even when your cell phone is turned off. Sadly, most cell phone users have absolutely no idea about any of this stuff.

Your phone company knows where you live, what websites you visit, what apps you download, what videos you like to watch, and even where you are. Now, some have begun selling that valuable information to the highest bidder.

In mid-October, Verizon Wireless changed its privacy policy to allow the company to record customers’ location data and Web browsing history, combine it with other personal information like age and gender, aggregate it with millions of other customers’ data, and sell it on an anonymous basis.

“Law enforcement tracking of cellphones, once the province mainly of federal agents, has become a powerful and widely used surveillance tool for local police officials, with hundreds of departments, large and small, often using it aggressively with little or no court oversight.”

“Cell carriers, staffed with special law enforcement liaison teams, charge police departments from a few hundred dollars for locating a phone to more than $2,200 for a full-scale wiretap of a suspect.”

So if you are breaking the law, your cell phone may be used to gather evidence and to track you down. In the United States, cell phone companies are required by law to be able to pinpoint the locations of their customers to within 100 meters.

Sometimes the police don’t even use the cell phone companies. Recently, the Wall Street Journal ran an article that discussed the capabilities of the “stingray devices” that many local law enforcement agencies are using now.

A “stingray device” acts like a cell phone tower and it can gather any information that a normal cell phone tower can.

You make a call on your cellphone thinking the only thing standing between you and the recipient of your call is your carrier’s cellphone tower. In fact, that tower your phone is connecting to just might be a boobytrap set up by law enforcement to ensnare your phone signals and maybe even the content of your calls.

So-called stingrays are one of the new high-tech tools that authorities are using to track and identify you. The devices, about the size of a suitcase, spoof a legitimate cellphone tower in order to trick nearby cellphones and other wireless communication devices into connecting to the tower, as they would to a real cellphone tower.

The government maintains that the stingrays don’t violate Fourth Amendment rights, since Americans don’t have a legitimate expectation of privacy for data sent from their mobile phones and other wireless devices to a cell tower.

The attitude that law enforcement agencies seem to have is that once we use a cell phone we are essentially willingly throwing our Fourth Amendment rights out the window.

In some areas of the United States, police are physically extracting data from cell phones any time they want as well. According to the ACLU, state police in Michigan have been using “extraction devices” to download data from the cell phones of motorists that they pull over. This is taking place even if the motorists that are pulled over are not accused of doing anything wrong.

The devices, sold by a company called Cellebrite, can download text messages, photos, video, and even GPS data from most brands of cell phones. The handheld machines have various interfaces to work with different models and can even bypass security passwords and access some information.


In April 2011, the Michigan chapter of the American Civil Liberties Union questioned whether Michigan State Police (MSP) troopers were using Cellebrite UFEDs to conduct unlawful searches of citizens' cell phones.

Following its refusal to grant the MCLU's 2008 Freedom of Information Act request unless the organization paid $544,000 to retrieve the reports, MSP issued a statement claiming that it honored the Fourth Amendment in searching mobile devices.

The FBI claims that it can demand to see your cell phone data whenever it would like to.

Not only that, the FBI has also been remotely activating the microphones on the cell phones of suspects that they want to listen to. This can be done even when the cell phone is turned off.

The FBI appears to have begun using a novel form of electronic surveillance in criminal investigations: remotely activating a mobile phone’s microphone and using it to eavesdrop on nearby conversations.

The technique is called a “roving bug,” and was approved by top U.S. Department of Justice officials for use against members of a New York organized crime family who were wary of conventional surveillance techniques such as tailing a suspect or wiretapping him.

Could the FBI be listening to you right now?

If there is a cell phone in the room they could be.

But some other federal agencies listen to a lot more cell phone calls than the FBI does.

It has been an open secret for a long time that the federal government monitors and records all cell phone calls that are made for national security reasons.

In fact, the federal government is even trying to collect records for calls that have been made in the distant past. Accordingto USA Today, the goal is “to create a database of every call ever made”

The National Security Agency has been secretly collecting the phone call records of tens of millions of Americans, using data provided by AT&T, Verizon and BellSouth, people with direct knowledge of the arrangement told USA TODAY.

n addition, the federal government has been constructing the largest data center in the history of the world out in the Utah desert.


This data center will be used to house an almost unimaginable amount of digital data (including your cell phone calls.

Under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade.

Its purpose:

To intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks. The heavily fortified $2 billion center should be up and running in September 2013. (666?)

Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.”

But isn’t it illegal for the federal government to intercept our phone calls?

Well, the cold, hard reality of the matter is that they use all kinds of loopholes and legal technicalities to get around that.

For example, if a call is “intercepted” outside of the United States and then routed to a government building inside the United States that is considered to be okay.

Increasingly, governments around the world are using cell phones to hunt down people that they do not like and haul them off to prison.

Most Americans don’t need to worry about getting hauled off to prison for political or religious reasons at this point, but there is another aspect of cell phone security that could potentially affect all of us.

Most Americans are completely unaware of what stalkers can potentially do if they are able to hack into a cell phone. For example, did you know that spyware can make it possible for a stalker to monitor where you are 24 hours a day and listen to everything that you say even when your cell phone is turned off?

Spyware marketers claim you can tap into someone’s calls, read their text messages and track their movements “anywhere, anytime.” They say you can “catch a cheating spouse”, protect your children from an evil babysitter and “hear what your boss is saying about you.” And while you’re spying on others, the Spyware companies say “no one will ever know” because it’s supposed to be “completely invisible” with “absolutely no trace.”

Security experts say it’s no internet hoax.

“It’s real, and it is pretty creepy,” said Rick Mislan, a former military intelligence officer who now teaches cyber forensics at Purdue University’s Department of Computer and Information Technology.

Mislan has examined thousands of cell phones inside Purdue’s Cyber Forensics Lab, and he says spy software can now make even the most high-tech cell phone vulnerable.

Tapping your cell phone, how anyone can do it. What stalkers can do to your cell phone/ US gov etc. Watch Video, Click Link Here

Are you starting to see how your cell phone makes you a prisoner of a digital world?

The police can listen to you and track you any time that they want to.

The federal government can listen to you and track you any time that they want to.

Big corporations can buy all of the personal information that cell phones gather any time that they want to from certain cell phone companies.

Stalkers can listen to you and track you 24 hours a day if they are able to hack in to your cell phone somehow.

If you own a cell phone and you still want to have some privacy, then you need to take the battery completely out of the cell phone when you are not using it.

Unfortunately, as our world becomes even more interconnected and even more dependent on technology, the amount of privacy we all have is likely to continue to decrease.

A digital Big Brother control grid is being constructed all around us, and in the future that control grid could potentially be used for very malevolent purposes.


So let us be as wise as serpents and innocent as doves.

Your Cell Phone Makes You A Prisoner Of A Digital World Where Virtually Anyone Can Hack You


(When it comes to personal survival you need to be aware of the "cell phone enemy". This device along with various other mobile devices constantly tracks your every move. These devices can be turned on at will to record your conversations. These devices read your email and text messages. These devices send info to anyone about your purchases etc. These devices can be used to listen in to what you are saying when you are not using them. These devices can be used to watch what you are doing when you are not using them. These devices can be used to watch what you are doing when you are using them. They monitor you as you move from place to place.

Mobile devices are mobile spys. You are "wired" into the "skynet" grid and your don't know it.

The only way to keep the spy from knowing what you are doing is to take the battery out of the phone and go off grid.

Also the same spy is listening/trasmitting info from your desktop about what you are doing.

I am thinking about only using my cell phone to make less calls and then take the battery out so less information is being transmitted about where I am, what I am saying and doing.

I think it would even be a good idea to tell certain people about certain times when my cell phone will be on so they can call me. If its off they can just leave me a message that I will listen to along with everybody else.

Less "grid ie skynet" time is better.

Sky Net?????

It is starting to be humans vs the mobile device sky net machines for real!

Use the US mail as much as possible. Its slower but the contents of your letter is not transmitted to everyone. Only where the letter originated and its path to its destination are. The postal service tracks its every move.




(This will not erase the built in spyware written into the andriod or iphone operating systems.)

It will just mean LESS DATA ABOUT WHERE YOU HAVE BEEN and what you are doing will be sent to the "sky net" data base.

Seems unreal I know but this article is true. Become aware and get off the grid as much as possible. Break the habit of relying on the "skynet" grid for everything!


(I recently got a small dynamo flashlight. It has no batteries. By using your hand to move the small dynamo electical power is stored in the small flashlight to keep 2 leds burning for an hour.

I can see a small dynamo being incorporated into mobile devices to gereate a small amount of power to be stored within the mobile device even though it has no batteries installed!!!!

JUST THE MOVEMENT on your hip etc could generated small amounts of power, enough to allow the government or a hacker to spy on you even though you had removed the batteries.

This would allow for your mobile device to be turned on remotely even though IT HAD NO BATTERIES INSTALLED!

A real possibility!)
Story Reports

No comments: