Crimson Publishers Publish With Us Reprints e-Books Video articles

Full Text

COJ Electronics & Communications

Smart Phones and Surveillance Methods

Christos Beretas*

Information Technology Specialist, Member of Alpha Beta Kappa Honor Society, USA

*Corresponding author: Christos Beretas, Information Technology Specialist, Member of Alpha Beta Kappa Honor Society, Alpha of Ohio, USA

Submission: March 30, 2019;Published: May 13, 2019

DOI: 10.31031/COJEC.2019.01.000522

ISSN 2640-9739
Volume1 Issue5


I decided to touch on a sensitive issue, so topical and important, which is about everyday life of all of us, I am talking about the smart phones, small smart phones, these small but powerful computers that everybody use them every day by doing more internet browsing rather than doing calls. The questions that arise about the security of smart phones are many, for example: may someone watch us? may the government hear what we saying and what messages we send? may they know our position? let’s analyze the issue below.

When referring to a smart phone surveillance, we refer to 3 spy methods, which are:

A. Signal interception over the air & man in the middle attack.

B. Hardware circuit.

C. Spy phone application.

The first case above to do requires expensive equipment that is not legally sold on the market to be purchased by an interested customers, there are various approaches to lowcost material, but these tapping systems are cumbersome and complex in their operation if we think the advent of 3G/4G networks that offer more security than the old 2G these cheap eavesdropper devices are partly useless and I say in partly because we should think that in smart phones devices in the choice of the network allows the following option 4G/3G/2G which means that where there is no 4G/3G network coverage the smart phone will operate on the 2G network and this is a security hole as the network is over vulnerable to cheap type of interceptor devices since the 2G network encryption algorithm provide low security [1]. An expensive stolen state equipment would also be useless since its use keys that should be renewed regularly. Thus, state-owned services that have legal co-op equipment have the ability to make legitimate signal interception, here at this point, someone might think of this, an employee who has access to the system could be tapping someone else phone? the answer I believe is aware of it. Legally signal interception systems are divided into 2 categories, those located in central buildings where sometimes require the assistance of the telecom provider and the base stations where, depending on the needs of the service, they move.

The second case above could be said to be based on the ignorance of the user, I say ignorance because in this case the smart phone has to be opened and a microchip is placed inside, which will collect everything and send it back to the interested person device data usage either when the smart phone is in close proximity to a mobile transceiver, the connection is made and the data is transferred [2]. Detecting such a microchip is very difficult, and with the breakthrough of Internet of Things this technology is evolving. That’s why we need to buy smart phones from trusted places, also a smart phone that is a gift from someone is an easy way to deceive, but not always.

The third case is the simplest and most widespread, based on the naive and ignorant of user about the security and use of smart phone and applications. The rules are simple.

A. Do not leave the smart phone exposed to third parties.

B. Do not open messages that do not know.

C. Do not click hyperlinks that do not know.

D. Do not open files from strangers.

E. Your smart phone is not as safe as you may believe.

Generally, the signs that your smart phone is being taped are:

A. The battery ends quickly after data is being used continuously, so check the applications. It can also be a coincidence.

B. Interrupting calls while talking, also this could cause by interference in the connection, changing location and trying again may be interference only at that place.

C. Noise during speech, this is a sign of a conference, but keep in mind that with professional signal interception devices there is no noise, also the noise someone may hear may be either a device damage or is from Interference.

D. The smart phone is warm, this meaning several processes are running, check the device.

E. The smart phone crashes and becomes slow, this is due also to other reasons, depending on the smart phone and depending on the monitoring software sometimes the monitoring software is “heavy”, and the smart phone cannot respond.

F. Text messages that are received by irrelevant numbers, messages you have sent, and the recipient has received a different message than you sent should be suspected of monitoring or network interference that may be due to other infections.

G. The smart phone works alone and does not turn off. Surveillance spy software do not allow the user to have full control over the device for the simple reason that they are trying to keep the spy software on the device.

The above are the basic rules that apply, continue reading.

A. Surveillance software do not appear in installed applications.

B. Resetting to factory settings may not permanently eliminate the surveillance software.

C. Scrambled applications are easily localized, while welldesigned applications run on Stealth Mode and are extremely difficult to detect even with anti-malware control.

D. A smart phone surveillance software can be downloaded to the smart phone through another application.


Buying a smart phone from a trusted place we are protected from the second case above. A smart phone that could work exclusively on 4G/3G and not 2G networks would be the best. If we imagine a mobile phone, not a smart phone that could work exclusively on 4G/3G networks rather than 2G, the third case above will be eliminated. Communications security should in no way be taken safe.


  1. Kevin DM (2011) Is my cell phone bugged?
  2. John M (2015) How to hack a cell phone.

© 2019 Christos Beretas. This is an open access article distributed under the terms of the Creative Commons Attribution License , which permits unrestricted use, distribution, and build upon your work non-commercially.