Richardcyoung.com

  • Home
  • Debbie Young
  • Jimmy Buffett
  • Key West
  • Your Survival Guy
  • How We Are Different
  • Paris
  • About Us
    • Foundation Principles
    • Contributors
  • Investing
    • You’ve Read The Last Issue of Intelligence Report, Now What?
  • The Great Reset
  • The Swiss Way
  • My Rifles
  • Dividends and Compounding
  • Your Security
  • Dick Young
  • Dick’s R&B Top 100
  • Liberty & Freedom Map
  • Bank Credit & Money
  • Your Survival Guy’s Super States
  • NNT & Cholesterol
  • Your Health
  • Ron Paul
  • US Treasury Yield Curve: My Favorite Investor Tool
  • Anti-Gun Control
  • Anti-Digital Currency
  • Joel Salatin & Alfie Oakes
  • World Gold Mine Production
  • Fidelity & Wellington Since 1971
  • Hillsdale College
  • Babson College
  • Artificial Intelligence Opposed
  • Contact Us

Beware: Your Cell Phone Could be a Mobile Spy Station

August 8, 2013 By The Editors

Edward Snowden’s leaks have rocked the international community for the past two weeks and fired up a debate about U.S. government surveillance of citizens’ phone calls and internet browsing data. Cell phones have long been the subject of hacking, and in recent weeks with the NSA accusations coming to light, methods of protecting your privacy have been much discussed. Your privacy is easily penetrated. One tactic used by hackers called repackaging, in which a malware writer takes a legitimate application, modifies it to include malicious code, then republishes it to an app market is a danger to cell phone users. The repackaging technique is highly effective because it is often difficult for users to tell the difference between a legitimate app and its malicious, repackaged counterpart. Even the novice techie could turn your cell phone into a mobile spy station in as little as 5 minutes. With the help of easily obtained Mobile Spy Software applications like StealthGenie, MobileSpy, and Flexispy, hackers can access cell phone call logs, text messages, emails, GPS location data, and even remotely activate a cell phone’s video camera and microphone.

How can you protect yourself? Stick it in the fridge? This technique was used by Edward Snowden. While it is not perfect, it does offer limited protection from RF. However, fridges are not perfect faraday cages and do not block all audio. Therefore, they are not recommended for extremely critical situations. A stylish alternative is to use a stainless steel cocktail shaker. Another alternative would be to use the OFF Pocket™. You simply place your phone inside the case, close it, and your phone is now OFF. Untrackable. Unreachable. Unbreachable.

The OFF Pocket has been extensively tested on all major networks, including Verizon, AT&T, T-Mobile, and Sprint. It is compatible with all mobile phone hardware including but not limited to iPhones, Android, Blackberrys, Nokia as well as all modern phone operating systems.

The OFF Pocket™ uses the principle of a faraday cage to block all radio signals from entering and exiting the case. Your phone contains an antennae that communicates with cell towers and GPS systems. Both of these signals, radio waves in the 2.4GHz spectrum, are blocked by the metallized fabric in the case.

Signs Your Infected

  • Shorter-than-normal battery life could signal a problem
  • Sudden increases in data usage
  • Programs take longer to load or the apps don’t seem as responsive
  • Rogue Apps – They start up on their own.

Tips to Stay Safe

As the frequency of mobile threats increase, people can take measures to stay safe while using their smartphones

  • Only download apps from trusted sources, such as reputable app stores and download sites. Remember to look at the developer name, reviews, and star ratings.
  • After clicking on a web link, pay close attention to the address to make sure it matches the website it claims to be if you are asked to enter account or login information.
  • Set a password on your mobile device so that if it is lost or stolen, your data is difficult to access.
  • Download a mobile security tool that scans every app you download for malware and spyware and can help you locate a lost or stolen device. For extra protection, make sure your security app can also protect from unsafe websites.
  • Be alert for unusual behaviors on your phone, which could be a sign that it is infected. These behaviors may include unusual text messages, strange charges to the phone bill, and suddenly decreased battery life.
  • Make sure to download firmware updates as soon as they are available for your device.

Related Posts

  • Beware Pension Liabilities
  • A Spy Behind Enemy Lines
  • Congress's Phone Lines Maxed Out
  • Author
  • Recent Posts
The Editors
The Editors
The Editors
Latest posts by The Editors (see all)
  • Russian Black Sea Fleet Decimated - May 6, 2025
  • Houthis Target Israel Again - May 5, 2025
  • What Happens when AI Makes Things Up? - April 24, 2025

Dick Young’s Must Reads

  • Russian Black Sea Fleet Decimated
  • Why Black Lives Matter Needs to Be Shut Down
  • CONSTITUTIONAL CARRY: Alabama Becomes 22nd Permitless Carry State
  • When Is the Best Time for You to Do This?
  • A NEW CONTRACT WITH AMERICA: Rick Scott Finally Gives the GOP Something to Run On
  • Soros’s Open Society Foundation, Charles Koch Team Up
  • FARM AMERICA: New York City’s Finest Cheesemongers
  • Yes! Money Can Bring You Happiness
  • Conflict Between Democratic Sovereignty and Transnational Progressivism (Globalism)
  • In Chicago, Education Connects the Dots

Compensation was paid to utilize rankings. Click here to read full disclosure.

RSS Youngresearch.com

  • Survive
  • GLE Advances ‘Holy Grail’ of Enrichment
  • Reusable Hypersonic Era Takes Off Again
  • Fusion Milestone: ITER Magnet System Finished
  • More Young Adults Diagnosed with Cancer
  • May RAGE Gauge: Survive
  • US May Ease Global AI Chip Export Limits
  • Energy Dominance: DOE Outlines FY2026 Budget Under Trump Directive
  • Manufacturing Shines Amid Broader U.S. Productivity Decline
  • Ghost Ships on Radar: China’s New Tech Mimics Entire Navy Fleets

RSS Yoursurvivalguy.com

  • Survive
  • Investing Mistakes to Avoid: #1 Y-O-U
  • Mike Rowe Keeping Families Together
  • May RAGE Gauge: Survive
  • Investing Mistakes to Avoid: #2 Tomorrowland
  • Drone Wars: US and China Showcase Next-Gen Microwave Weapons
  • Solving America’s Missile Shortage
  • BUILDING A GO BAG: Taking Action Is Hard
  • “Investors Need to Beat Back This Mighty Foe,” Dick Young
  • Why the Push for Low Rates?

US Treasury Yield Curve: My Favorite Investor Tool

My Key West Garden Office

Your Retirement Life: Traveling the Efficient Frontier

Live a Long Life

Your Survival Guy’s Mt. Rushmore of Investing Legends

“Then One Day the Grandfather was Gone”

Copyright © 2025 | Terms & Conditions | About Us | Dick Young | Archives