Share

How to Avoid Mobile Phone Eavesdroppers

Most people realize that mobile and on-line communications aren’t secure. But what if, for example, you need to communicate with a business partner to share confidential information and you can’t meet in person? There are steps you can take to minimize the risk of being targeted by thieves or others who wish to violate your right to privacy.

Below I list one way to, at least temporarily, avoid mobile phone hackers, snoopers, and thieves.

  1. Anonymously pay cash for a used, unlocked i-Phone from E-bay, Craigslist, or elsewhere–make sure you have zero relationship with the seller.
  2. Restore it to factory settings.
  3. Buy a pre-paid SIM card with cash. Install it in the i-Phone. Use the SIM card/associated cellular service only one time to set up secure chat apps, such as Signal (see below). From that point on, avoid using cell service with this i-Phone and SIM card–only use public Wi-Fi, preferably a safe distance from your residence or office.
  4. Create an anonymous e-mail account using a public (or one not linked to you in any way) computer, such as at an Internet cafe or public library. This is used to get an anonymous i-Tunes account.
  5. Buy an i-Tunes gift card with cash. This is used to download secure chat apps, such as Signal. Only communicate using secure chat apps.
  6. Purchase (with a gift card you buy with cash) and download a VPN (virtual private network) from Private Internet Access https://www.privateinternetaccess.com or another trusted VPN service. Always use the VPN while using the phone.
  7. Keep Wi-Fi and phone turned off when you aren’t using it.

These steps will make it a lot more difficult for eavesdroppers to track you and, or steal your proprietary information.

Note: If you are involved in illegal activity, U.S. federal agencies will be able to surveil you no matter what you do. The above steps are for those who are trying to keep their legitimate and legal communications private.

If you avoid illegal activity but three-letter agency bureaucrats (or security industry contractors, or others) are abusing their power and eavesdropping on your private communications for personal gain, you may want to hire a good “white hat hacker” to try to track down the offender.

To determine if your computer system or phone has been modified (e.g., covert installation of a key logger program), search the Internet for “Has my computer system (or mobile phone) been modified?” or “How to determine if I’ve been hacked?” You’ll find step-by-step instructions (complex and time consuming, but worth it) to determine if you’ve been hacked.

The results of the queries may yield hacking programs on your system such as “com.spsecure.euseragent.plist” which is Spector Pro, a type of monitoring software. Hire an ethical, white hat hacker to review the list of the programs from your queries.

If you find that you’ve been hacked, avoid removing the hacking program until you’ve contacted the police and a lawyer and they document evidence of the illegal act.

Alternatively, you may want to keep the monitoring program on your system to mislead the watchers, making them believe you’re unaware of it, while using an alternative system for private communications. 

Just like tapping someone’s land-line phone, hacking into another person’s private affairs via their mobile phone or computer, including the implementation of monitoring and key-logger software, violates eavesdropping laws in the United States and is a felony offense.

Block or mislead snoopers with the advice above to limit your risk and keep your affairs private.

Copyright © 2019 Scott Petullo

Leave a Reply

Your email address will not be published. Required fields are marked *