Personality, Compatibility, and Personal Timing Are Measurable With Comprehensive Handwriting Analysis, Astrology, and Numerology

Home  |  Blog
Sign up for your free 17 Tips to Help You Reduce Business and Personal Related Risk
  • Reduce Wasted Time and Monetary Loss
  • Minimize Squandered Opportunities
  • Avoid Unsafe and Unreliable People
 
These 17 tips involving background checks, security investigations, personality assessment, forecasting, and cyclical timing analysis will help you greatly reduce your overall risk, save time and money, and gain more peace of mind in your business, career, or personal life.
 
Name
E-mail
You may easily unsubscribe at any time and we
don't share or sell e-mail lists
 

Posts Tagged ‘block snoopers’

How to Avoid Mobile Phone Eavesdroppers

Sunday, February 3rd, 2019
Share Button

Most people realize that mobile and on-line communications aren’t secure. But what if, for example, you need to communicate with a business partner to share confidential information and you can’t meet in person? There are steps you can take to minimize the risk of being targeted by thieves or others who wish to violate your right to privacy.

Below I list one way to, at least temporarily, avoid mobile phone hackers, snoopers, and thieves.

  1. Anonymously pay cash for a used, unlocked i-Phone from E-bay, Craigslist, or elsewhere–make sure you have zero relationship with the seller.
  2. Restore it to factory settings.
  3. Buy a pre-paid SIM card with cash. Install it in the i-Phone. Use the SIM card/associated cellular service only one time to set up secure chat apps, such as Signal (see below). From that point on, avoid using cell service with this i-Phone and SIM card–only use public Wi-Fi, preferably a safe distance from your residence or office.
  4. Create an anonymous e-mail account using a public (or one not linked to you in any way) computer, such as at an Internet cafe or public library. This is used to get an anonymous i-Tunes account.
  5. Buy an i-Tunes gift card with cash. This is used to download secure chat apps, such as Signal. Only communicate using secure chat apps.
  6. Purchase (with a gift card you buy with cash) and download a VPN (virtual private network) from Private Internet Access https://www.privateinternetaccess.com or another trusted VPN service. Always use the VPN while using the phone.
  7. Keep Wi-Fi and phone turned off when you aren’t using it.

These steps will make it a lot more difficult for eavesdroppers to track you and, or steal your proprietary information.

Note: If you are involved in illegal activity, U.S. federal agencies will be able to surveil you no matter what you do. The above steps are for those who are trying to keep their legitimate and legal communications private.

If you avoid illegal activity but three-letter agency bureaucrats (or security industry contractors, or others) are abusing their power and eavesdropping on your private communications for personal gain, you may want to hire a good “white hat hacker” to try to track down the offender.

To determine if your computer system or phone has been modified (e.g., covert installation of a key logger program), search the Internet for “Has my computer system (or mobile phone) been modified?” or “How to determine if I’ve been hacked?” You’ll find step-by-step instructions (complex and time consuming, but worth it) to determine if you’ve been hacked.

The results of the queries may yield hacking programs on your system such as “com.spsecure.euseragent.plist” which is Spector Pro, a type of monitoring software. Hire an ethical, white hat hacker to review the list of the programs from your queries.

If you find that you’ve been hacked, avoid removing the hacking program until you’ve contacted the police and a lawyer and they document evidence of the illegal act.

Alternatively, you may want to keep the monitoring program on your system to mislead the watchers, making them believe you’re unaware of it, while using an alternative system for private communications. 

Just like tapping someone’s land-line phone, hacking into another person’s private affairs via their mobile phone or computer, including the implementation of monitoring and key-logger software, violates eavesdropping laws in the United States and is a felony offense.

Block or mislead snoopers with the advice above to limit your risk and keep your affairs private.

Copyright © 2019 Scott Petullo