More and more of us are interested in discovering how to conduct surveillance, monitor or spy on a cell phone. Perhaps we want to learn what our some of our friends, family members, work colleagues or business partners are doing on the cell phone they use. The technology to eavesdrop on the activity of a mobile device is now widely available as specialized software to be installed on the target unit.
A mobile device is truly a revolutionary tool that has changed the way we live, work and play. It may surprise some people that, globally, the 500 million mobile phone units sold during 2011 rocketed past the number of PCs sold. This trend will at least continue if not accelerate.
In short, the Smartphone is invaluable for modern life. By the same token, for someone who wants to spy on you, the device is a godsend. For them, the mobile device can be the ultimate snooping platform because it is always with you and always powered on.
Hacking of mobile devices has generally lagged behind the pace of personal computer hacking. This is now changing. Many white hat and black hat techniques to hack mobile devices have emerged in the last year or two. Black hat, or illegitimate, methods generally cause the cell phone to crash, to be bombarded by a flood of unwanted SMS text messages or to be in some other way physically impair in its normal operation. White hat methods however, techniques referred to by this note, are largely undetectable.
Black hat hackers have demonstrated it is possible to design remote access tools (RATs) to eavesdrop a mobile device on a so-called drive-by basis. A typical attack by black hat malware code might proceed as follows. First, a text message is sent to the mobile disguised as a message from the telco carrier. The message requests the device user to perform a system update by clicking on a web link supplied in the message. Next, once the link is clicked, the malware is delivered to the unit. It attacks the root access privileges causing the device to crash. Third, the malware instructs the device to automatically reboot and then hijacks the device.
Current surveillance software is so smart that it can monitor multiple types of cell phone activity. The list is quite comprehensive. It includes emails, calls, web site browsing history, photos and videos taken by the device, and instant messages. Moreover, the monitoring software is very affordable and easy to purchase, install and operate.
In past years, the white hat spying of a mobile device was a difficult, messy hassle. This is no longer true. The difficulty was mainly due to the installation of the surveillance software on the target unit being very time consuming, often requiring an hour or more and substantial or complex technical adjustments.
New versions of surveillance software eliminate these barriers. The new software products are much more efficient. They require literally just a handful of minutes and virtually no technical expertise to install. After the monitoring software is successfully installed on the target device, it becomes possible to spy on a cell phone through a web site operated by the software supplier.