Cell Phone Spying: Is Your Life Being Monitored?


----------------

Cell Phone SpyingIt connects you to the world, but your cell phone could also be giving anyone from your boss to your wife a window into your every move.  The same technology that lets you stay in touch on-the-go can now let others tap into your private world — without you ever even suspecting something is awry.

The new generation

Long gone are the days of simple wiretapping, when the worst your phone could do was let someone listen in to your conversations.  The new generation of cell phone spying tools provides a lot more power.

Eavesdropping is easy.  All it takes is a two-minute software install and someone can record your calls and monitor your text messages.  They can even set up systems to be automatically alerted when you dial a certain number, then instantly patched into your conversation.  Anyone who can perform a basic internet search can find the tools and figure out how to do it in no time.

But the scarier stuff is what your phone can do when you aren’t even using it.  Let’s start with your location.

Simple surveillance

You don’t have to plant a CIA-style bug to conduct surveillance any more.  A service called World Tracker lets you use data from cell phone towers and GPS systems to pinpoint anyone’s exact whereabouts, any time — as long as they’ve got their phone on them.

All you have to do is log on to the web site and enter the target phone number.  The site sends a single text message to the phone that requires one response for confirmation.  Once the response is sent, you are locked in to their location and can track them step-by-step.  The response is only required the first time the phone is contacted, so you can imagine how easily it could be handled without the phone’s owner even knowing.

Once connected, the service shows you the exact location of the phone by the minute, conveniently pinpointed on a Google Map.  So far, the service is only available in the UK, but the company has indicated plans to expand its service to other countries soon.

Advanced eavesdropping

So you’ve figured out where someone is, but now you want to know what they’re actually doing.  Turns out you can listen in, even if they aren’t talking on their phone.

Dozens of programs are available that’ll turn any cell phone into a high-tech, long-range listening device.  And the scariest part?  They run virtually undetectable to the average eye.

Take, for example, Flexispy.  The service promises to let you “catch cheating wives or cheating husbands” and even “bug meeting rooms.”  Its tools use a phone’s microphone to let you hear essentially any conversations within earshot.  Once the program is installed, all you have to do is dial a number to tap into the phone’s mic and hear everything going on.  The phone won’t even ring, and its owner will have no idea you are virtually there at his side.

Recover deleted text messages (SMS) and last dialed numbers from any SIM cards and smart cards

Did you know that with the help of a simple, inexpensive device, anyone with access to your phone could read your private text messages (SMS), even if you have deleted them previously? This device can even recover contacts and a good number or previously dialed numbers.

Legal loopholes

You might be asking how this could possibly be legal.  Turns out, it isn’t – at least, not in the ways we just described.  Much like those fancy smoking devices designed “for tobacco use only,” the software itself gets by because of a disclaimer saying it doesn’t endorse any illegal use.

I did a little digging with our friends from Flexispy.  You won’t find it on the flashy front page, but buried a bit further in the site, the company says you’re fine to use their program only “on a phone that you own, for protecting your children,” or for purposes like “archiving data.”  It’s a bit of a contrast from the bold suggestions of “uncover[ing] employee espionage,” “catch[ing] cheating husbands,” and “bug[ging] meeting rooms” that fill the company’s materials.  After a little more explanation, their answer as to the legality of the service ends with a broad statement: “Please consult a qualified lawyer in your country for the correct answer to this question.”

Let me make it easier for you: Once you get into listening in to private conversations without either party’s consent, you’re treading rough water that could sweep you straight into jail.  Whether it’s an employee or a spouse on the receiving end of your mission, neither federal nor state privacy laws take violations lightly in America.  Getting caught could cost you several years behind bars, among other serious penalties.

Detecting and protecting

Finding spyware on your phone isn’t easy.  There are dozens of bug detectors available from surveillance companies, but the only true fix is taking your phone to your provider and having them wipe it out altogether.  That will restore the factory settings and clear out any hidden software that’s running on your phone.

Security experts say there may be some subtle signs your phone is invaded:

  • You seem to have trouble shutting it off, or it stays lit up after you’ve powered down.
  • The phone sometimes lights up when you aren’t making or receiving a call, or using any other function.
  • You regularly hear odd background noises or clicks when you’re on the phone.

Unfortunately, there isn’t much you can do to safeguard your cell just yet.  I’m sure it’s only a matter of time until we see McAfee-style programs to firewall your phone and keep intruders out.  For now, though, the only sure-fire form of protection is to keep a close guard on your phone.  Don’t accept Bluetooth connections unless you know what they are.  Most important, make sure no one has access to install something when you aren’t watching.  Otherwise, they may soon be watching you when you least expect it.

By JR Raphael
Contributing Writer, [GAS]





313 Responses to Cell Phone Spying: Is Your Life Being Monitored?

  1. Wow! I had no idea that kind of technology existed! This article is very informative without dabbling in scare tactics.

    • You can’t stop them from eavesdropping on your cell phone conversations — but who cares — do they really want to know what you had for dinner last night?

      Your cell phones have an RFID chip and can be used as a GPS tracking device to locate you anywhere in the world. That’s what they don’t want you to know. To stop this completely and cheaply, buy a piece of EMF shielding and wrap your cell phone, credit cards, driver’s license, ID cards and wallet — anything with an RFID chip. You’ll completely foil the tracking. They can’t track you.

      All techno-tracking comes to a halt for about $6.00.

        • How con I get the Item that will protect any of my tracking devices from being spied on. Also if you know of a (((REAL))) bluetoothe or any other type of cellphone tracking and intercepting infor device. Please contact me at the address above .thanx sexy geek

      • “To stop this completely and cheaply, buy a piece of EMF shielding and wrap your cell phone, credit cards, driver’s license, ID cards and wallet — anything with an RFID chip. You’ll completely foil the tracking. They can’t track you.”
        Yes, genius, let’s wrap our cell phones in EMF shielding, that *will* stop it from being tracked… And receiving any calls, text messages, making or sending either… Genius.

        • My passport and cards go into my portable Faraday cage; my cellphone is equipped from the manufacturer with an anti-tracking device. The button with red circle and line.

        • They can stil track you with your phone turned off. Cell phones emit a signal periodically even when turned off in order to update tower informatin. You’d have to remove the battery.

        • The EMF protector can only protect your RFID which wil lkeep it from working on your end as well, bluetooth will go right through that sucker. Dont listen to the people who are selling you gadgets that protect you from invaders. They make it seem like your the most important person in the world and there are people tracking you to come kill you. (If you are that guy you shouldnt own anything with a Mac address or IMEI, which is virtually no device thats any good these days). If you can still use your phone, you can ALWAYS be tracked. ALWAYS. Wireless communication does not work one way, its a two way thing. If you dont want to be tracked, dont do anything worth tracking while a trackable device is on you. You cant have your cake and eat it too. I wish you could but you cant. Whenever someone thinks a 6$ sheild will protect them from the world, I cringe at the false advertisers

      • I don’t know about Europe, but in the USA it’s not an RFID chip that does the tracking, it’s a mandatory (in phones sold after a certain date) GPS that us required by the E911 service. (911 is the emergency phone number that supposedly works anywhere in the USA, like 119 in China or 999 in the UK).

        Also, that EMF shielding will most likely keep you from receiving phone calls.

        • Can anyone tell me if it is possible for someone in the Ukraine to listen in on cell phone calls between two people in the US? I don’t understand how it could be possible, but a friend of mine has reason to believe IT IS occuring. Are hackers sophisticated enough to pull off something like this over such a long distance?

      • Don’t misunderstand technologies. RFID has nothing to do with this article. This is about software that anyone can download onto the mobile device, to remotely (trough the regular network) eavesdrop it. It has nothing to do with a big conspiracy nor nothing. If anyone within service providers want to eavesdrop you, they don’t need to patch your device.
        RFID is a low-range technology, since it needs to provide the power wirelessly to feed the device. RFID’s can only be tracked trough somekind of checkpoints, viz. building doors,etc.. but yes, I defend that RFID devices should have a disabling option, but that’s another matter.
        Greetz!

      • Stupid comment. Who cares whos eavesdropping on thier phone? Anyone that can think. They can steal your credit card # when you order something or all types of info used for ID theft, police state polices, ect. by listening even when your phone isn’t in use. RFID or location tracking is not even nearly as bad as the eavesdropping, and you said “who cares”. You’re either a kid or need to start using your brain. Don’t comment if you’re going to mislead people “friend”.

      • Can someone link to my phone by being near me and get my number? Had a weird situaion happen at the mall. A Person called me when I was at the mall and said they linked to my phone and were pranking me for the rest of the day. They were following me around the mall. They sounded like kids but now er days you can get alot of info on the intrnet. Has anyone heard of this

        • Organized stalking or gangstalking is a crime where every single area of the targeted victim’s life is compromised: First to go is the phone or computer. If someone hacked into your phone and then stalked you, you may already be a victim of this hate crime. Strangers are chosen based on if they are good people, educated, responsible, or happy. Its a lot more fun to watch such folks be destroyed. Organized stalking and gangstalking have websites. Look them up. If you are a victim there is help, support, and info. Mary

      • RFID is another issue altogether. RFID is very short range, it cannot be read by satellites or cell phone towers. But it can be used to track you. If you bought your shoes, for example, and paid with a credit card, and the shoes have a RFID chip embedded, then anywhere you go, every time you pass a RFID scanner, that info could be correlated and your movements tracked. Your cash purchases could be recorded as well. In theory, the technology could even be used in conjunction with ballot systems to record how you vote. Even without electronic ballots, if you feed your ballot into a scanner and a RFID reader is very close, your vote could be recorded if you anything on your person has a RFID and you purchased it with a credit card, AND OR if your card or drivers license or cell phone, or anything else identifying you has a RFID imbedded.

    • tracking via relays… doable, because it simply means getting the info from the phone services provider. but installing the software means the targeted phone has an operating system, right? so just use non-os phones, you don’t really need those functions… ;)
      btw, eavesdropping means getting free data transmission from the provider? i think i saw this question put a bit differently, but anyway, that would be a nice “unlimited free time” between mutually rigged phones :))

    • tracking via relays… doable, because it simply means getting the info from the phone services provider. but installing the software means the targeted phone has an operating system, right? so just use non-os phones, you don’t really need those functions… ;)
      btw, eavesdropping means getting free data transmission from the provider? i think i saw this question put a bit differently, but anyway, that would be a nice “unlimited free time” between mutually rigged phones :))

  2. Yea ive heard of this before. This is used alot by people wanting to listen into concerts for free. If you do a bit of digging on the internet you will find that there is similar tools that have been developed for hacking mobile phone cameras.

  3. Pingback: cryptogon.com » Archives » Cell Phone Spying: Is Your Life Being Monitored?

    • hey, ok, my mail is required to see many sites, but why my java security crashes when tryin to check out Flexispy, only after allowing the certificate, can I see the site???

      and.. cryptogon doesnt sound friendly, either.

  4. Sweet article. In the state where I live, the child support cops are using the cellphone signals to track down dead-beat dads. This trick has also been used to nab drug dealers and fortunately, save some lives of kidnapped people or adventurers lost in the forest.

  5. Pingback: BelchSpeak » Post Topic » CellPhone Spying- Are You Being Monitored?

  6. i am told the russian mobsters insist that you even take your battery out of your phone before they even let you through the door, this would explain it

  7. i am told the russian mobsters insist that you even take your battery out of your phone before they even let you through the door, this would explain it

  8. Get a Linux-based OpenMoko phone and you can setup selinux and other stuff that blocks this crap.

    • Hello,

      Please tell me where I can get an Open Moko phone and what company provides service for it? I would like to be able to talk on a cell phone without all the problems I have been having.
      Thanks.

  9. Get a Linux-based OpenMoko phone and you can setup selinux and other stuff that blocks this crap.

    • Hello,

      Please tell me where I can get an Open Moko phone and what company provides service for it? I would like to be able to talk on a cell phone without all the problems I have been having.

      Thanks.

  10. Pingback: RevolutionRadio.org » Blog Archive » Cell Phone Spying: Is Your Life Being Monitored?

  11. FYI: World tracker sends texts periodically to the phone to let the user know. That’s to avoid you borrowing someone’s phone and pairing it with World Tracker then giving them the phone back.

  12. FYI: World tracker sends texts periodically to the phone to let the user know. That's to avoid you borrowing someone's phone and pairing it with World Tracker then giving them the phone back.

  13. Pingback: MariukasM.LT » Mobilus šnipas: ar tavo gyvenimas kontroliuojamas?

  14. Pingback: Our Strange World - Your Portal to the Unknown » Cell Phone Spying: Is Your Life Being Monitored?

  15. Pingback: truthseeds.org » Blog Archive » truthseeds 5/9/08

  16. You can't stop them from eavesdropping on your cell phone conversations — but who cares — do they really want to know what you had for dinner last night?

    Your cell phones have an RFID chip and can be used as a GPS tracking device to locate you anywhere in the world. That's what they don't want you to know. To stop this completely and cheaply, buy a piece of EMF shielding and wrap your cell phone, credit cards, driver's license, ID cards and wallet — anything with an RFID chip. You'll completely foil the tracking. They can't track you.

    All techno-tracking comes to a halt for about $6.00.

      • How con I get the Item that will protect any of my tracking devices from being spied on. Also if you know of a (((REAL))) bluetoothe or any other type of cellphone tracking and intercepting infor device. Please contact me at the address above .thanx sexy geek

    • "To stop this completely and cheaply, buy a piece of EMF shielding and wrap your cell phone, credit cards, driver’s license, ID cards and wallet — anything with an RFID chip. You’ll completely foil the tracking. They can’t track you."

      Yes, genius, let's wrap our cell phones in EMF shielding, that *will* stop it from being tracked… And receiving any calls, text messages, making or sending either… Genius.

      • My passport and cards go into my portable Faraday cage; my cellphone is equipped from the manufacturer with an anti-tracking device. The button with red circle and line.

      • They can stil track you with your phone turned off. Cell phones emit a signal periodically even when turned off in order to update tower informatin. You'd have to remove the battery.

      • The EMF protector can only protect your RFID which wil lkeep it from working on your end as well, bluetooth will go right through that sucker. Dont listen to the people who are selling you gadgets that protect you from invaders. They make it seem like your the most important person in the world and there are people tracking you to come kill you. (If you are that guy you shouldnt own anything with a Mac address or IMEI, which is virtually no device thats any good these days). If you can still use your phone, you can ALWAYS be tracked. ALWAYS. Wireless communication does not work one way, its a two way thing. If you dont want to be tracked, dont do anything worth tracking while a trackable device is on you. You cant have your cake and eat it too. I wish you could but you cant. Whenever someone thinks a 6$ sheild will protect them from the world, I cringe at the false advertisers

    • I don't know about Europe, but in the USA it's not an RFID chip that does the tracking, it's a mandatory (in phones sold after a certain date) GPS that us required by the E911 service. (911 is the emergency phone number that supposedly works anywhere in the USA, like 119 in China or 999 in the UK).

      Also, that EMF shielding will most likely keep you from receiving phone calls.

      • Can anyone tell me if it is possible for someone in the Ukraine to listen in on cell phone calls between two people in the US? I don't understand how it could be possible, but a friend of mine has reason to believe IT IS occuring. Are hackers sophisticated enough to pull off something like this over such a long distance?

    • Don't misunderstand technologies. RFID has nothing to do with this article. This is about software that anyone can download onto the mobile device, to remotely (trough the regular network) eavesdrop it. It has nothing to do with a big conspiracy nor nothing. If anyone within service providers want to eavesdrop you, they don't need to patch your device.

      RFID is a low-range technology, since it needs to provide the power wirelessly to feed the device. RFID's can only be tracked trough somekind of checkpoints, viz. building doors,etc.. but yes, I defend that RFID devices should have a disabling option, but that's another matter.

      Greetz!

    • Stupid comment. Who cares whos eavesdropping on thier phone? Anyone that can think. They can steal your credit card # when you order something or all types of info used for ID theft, police state polices, ect. by listening even when your phone isn't in use. RFID or location tracking is not even nearly as bad as the eavesdropping, and you said "who cares". You're either a kid or need to start using your brain. Don't comment if you're going to mislead people "friend".

    • Can someone link to my phone by being near me and get my number? Had a weird situaion happen at the mall. A Person called me when I was at the mall and said they linked to my phone and were pranking me for the rest of the day. They were following me around the mall. They sounded like kids but now er days you can get alot of info on the intrnet. Has anyone heard of this

      • Organized stalking or gangstalking is a crime where every single area of the targeted victim's life is compromised: First to go is the phone or computer. If someone hacked into your phone and then stalked you, you may already be a victim of this hate crime. Strangers are chosen based on if they are good people, educated, responsible, or happy. Its a lot more fun to watch such folks be destroyed. Organized stalking and gangstalking have websites. Look them up. If you are a victim there is help, support, and info. Mary

    • RFID is another issue altogether. RFID is very short range, it cannot be read by satellites or cell phone towers. But it can be used to track you. If you bought your shoes, for example, and paid with a credit card, and the shoes have a RFID chip embedded, then anywhere you go, every time you pass a RFID scanner, that info could be correlated and your movements tracked. Your cash purchases could be recorded as well. In theory, the technology could even be used in conjunction with ballot systems to record how you vote. Even without electronic ballots, if you feed your ballot into a scanner and a RFID reader is very close, your vote could be recorded if you anything on your person has a RFID and you purchased it with a credit card, AND OR if your card or drivers license or cell phone, or anything else identifying you has a RFID imbedded.

  17. Wow, where can I get this right now? With my job as a fugitive investigator, I could use this to catch the escaped rapist and fugitives from court.

      •  This is the problem with “legal and illegal” nowadays. We live in a
        world where the end really has come to justify the means. “If you don’t
        get caught doing it” and you aren’t trying to “use it in court as
        evidence”, they (interested parties) wouldn’t care if you used a psychic
        to get info that will allow resolution of a situation. With the stuff
        he’s doing, his job is just to find the already guilty party and bring
        them in. As long as he doesn’t divulge his tools, he’s pretty much safe.
        Not saying I condone it, just saying that “this is the world we live
        in” (Phil Collins said it better, though).

  18. Wow, where can I get this right now? With my job as a fugitive investigator, I could use this to catch the escaped rapist and fugitives from court.

  19. Organized criminals have known about this for years now. If a bunch of people the police have an interest in, they can prove later in court when and where the crooks met (from triangulating the cell masts where phones tell the system they close to, plus as someone said above, the cellphone is a neat bugging device when remotely switch into stealth listening mode. Crooks have different cellphones and change them often and whenever they meet, before leaving, they always remove their phone batteries. Your phone gives away your position to within a few feet nowadays. It doesn’t even have to have GPS installed.

    • But what is the cost on all this? where and how would i get more info into being able to track the person, hear or receive copies of text or numbers they are calling if possible. is it a device i can order, or go through someone else?

  20. Organized criminals have known about this for years now. If a bunch of people the police have an interest in, they can prove later in court when and where the crooks met (from triangulating the cell masts where phones tell the system they close to, plus as someone said above, the cellphone is a neat bugging device when remotely switch into stealth listening mode. Crooks have different cellphones and change them often and whenever they meet, before leaving, they always remove their phone batteries. Your phone gives away your position to within a few feet nowadays. It doesn't even have to have GPS installed.

    • But what is the cost on all this? where and how would i get more info into being able to track the person, hear or receive copies of text or numbers they are calling if possible. is it a device i can order, or go through someone else?

  21. Even if you take the battery out , the cell phone can still respond to a charging electromagnetic wave which will enable it to send out brief signals of its location and owner. Also the capacitor that holds a charge can keep specific circuits alive for quite some periods!

    • You must have failed Electrical Engineering? The Capacitor in a cell phone doesn’t hold near enough Energy to do this. And the Capacitor in a cell phone is ONLY for filtering for the most part. You’re trying to tell everyone that a device that has a capacitor with generally 0.1?F can power something for a long period of time. You would require more then one circuit to send out this “bursted signal” therefore under most logical circumstances this wouldn’t be feasible.

  22. Even if you take the battery out , the cell phone can still respond to a charging electromagnetic wave which will enable it to send out brief signals of its location and owner. Also the capacitor that holds a charge can keep specific circuits alive for quite some periods!

    • You must have failed Electrical Engineering? The Capacitor in a cell phone doesn't hold near enough Energy to do this. And the Capacitor in a cell phone is ONLY for filtering for the most part. You're trying to tell everyone that a device that has a capacitor with generally 0.1μF can power something for a long period of time. You would require more then one circuit to send out this "bursted signal" therefore under most logical circumstances this wouldn't be feasible.

  23. Pingback: links for 2008-05-11 « TheSurfersZone Random Access

  24. There is F-Secure Mobile and I have been using it for some time. Two products can be very helpfull F-Secure Mobile Anti-Virus(TM) and F-Secure Mobile Security(TM).

  25. There is F-Secure Mobile and I have been using it for some time. Two products can be very helpfull F-Secure Mobile Anti-Virus(TM) and F-Secure Mobile Security(TM).

  26. Pingback: links for 2008-05-11 | Yostivanich.com

  27. Is it “David Gerardo” or “David Geraldo”? Looks like the Q-waves being sent from CIA headquarters are working. That, or maybe they’ve found a way to send messages through your bong, pal.

    • Comment by Primordial Soup-Nazi
      “Is it “David Gerardo” or “David Geraldo”? Looks like the Q-waves being sent from CIA headquarters are working. That, or maybe they’ve found a way to send messages through your bong, pal.”

      My name is David Gerardo, and you gave yourself away by asking me that very detailed question “Pal”. I did actually have to debug their interface protocol, and yes I can still detect their monitoring despite the me helping them monitor me better :-). I have nothing to hide, that is why I helped them. That still doesn’t take away from the fact that series of laws have been broken by the fact that I am being monitored in this way. Q-waves, Standing waves or Horizontal I have found a way to stop Illegal monitoring and it can be proven scientifically. My question is…why would an American Patriot who put his “butt” on the line for our Country be treated this way? What would you do if you were being harrassed by unknown agencies (and yes I count at the very least 4)where IFF (identification friend or foe)is non-existant? I live in a foriegn country and travel around the World……where I have also had strange encounters. It is scary when our government can not even detect other monitoring methods and my family and I are being used as walking EM labs. Walk a mile in my shoes……and see if you can still go to work everyday, try and take care of your family and stay sane at the same time!

  28. Pingback: Cell Phone Spying « Jonathan Rogers’s Blog

  29. David Gerardo Hanysz,

    I bet your tinfoil hat and screendoor lined home won’t stop the beta waves from the SDI satellites under control of Homeland Security. In a recent photo of Conci Rice, I could see the small tracking box she uses to keep tabs on both you and the rest of your family.

    Why is it that paranoid dolts who believe the government can scan their brains with particle wave guns love to rant about it on the internet where their IP address can be traced to their home?

    Take your meds. If your’re not on meds, get on them.

    • “Comment by BelchSpeak
      2008-05-12 09:32:09
      David Gerardo Hanysz,

      I bet your tinfoil hat and screendoor lined home won’t stop the beta waves from the SDI satellites under control of Homeland Security. In a recent photo of Conci Rice, I could see the small tracking box she uses to keep tabs on both you and the rest of your family.

      Why is it that paranoid dolts who believe the government can scan their brains with particle wave guns love to rant about it on the internet where their IP address can be traced to their home?

      Take your meds. If your’re not on meds, get on them.”

      Let me put it this way, I know my I.P. address is known to whomever really want to find out what it is (There is no such thing as computer or I.T. Security) and I use my real name BECAUSE I have nothing to hide. I will undergo any type of drug induced, electronically monitored hypnosis initiated truth-analyzing test they have, but it has to include the Y…..(Why are you accusing me of whatever it may be,and how did you get that information?}. If you would have read my article thoroughly, then you know Y I won’t take their Med’s. (I have been given enough Med’s to last a lifetime and some facilitate the EM interfacing).

      These frequencies are measurable, just need to know which range is being used, autos can for them, auto-resonate the source and bingo, we’ve fixed the problem of illegal monitoring. If our home could switch from a double layered faraday shield to a antenna (outside layer) faraday shield {inside layer) using the right control circuits, parameters and hardware(openclosed relais for example), we could ensure that our private lives stay private.

      • Comment anyone?…..And, or, not, nand, nor, who{Hoot), what, where, when, How, Y, et al, etc.,Y Loop Function,?

        Apply this algorithm to all of your daily lives, to every single letter of the alphabets and numbers in your respective languages (Operating systems) while you are feeling, thinking, speaking, reacting, acting, Surviving upon, etc., correlated to the first language at the time and place (Location, location , location for the business minded )that you are speak of IT, (Neon Signs in the desert).

        Then you will be able to begin to interface with the multi-universes,((because it is an Electro Magnetic, Plasma conductive Universe, which is multiplied (by?), 4D, which can equal to Y, (which is also relative by the way)).

        REM (“Just for starters. up-starts AND,OR,NOT,AND NOR Inititial public offerings?).
        et whatever other criteria you want to add to this eQuation. What is your
        processing capability? Enter user name and password to access the DGH operating system AND don’t forget your HU 8 (human energy)portion, quotient, etc., etc., et al. (Whew….;-), Nuff written for now and I will await your reply.

  30. "Comment by BelchSpeak

    2008-05-12 09:32:09

    David Gerardo Hanysz,

    I bet your tinfoil hat and screendoor lined home won’t stop the beta waves from the SDI satellites under control of Homeland Security. In a recent photo of Conci Rice, I could see the small tracking box she uses to keep tabs on both you and the rest of your family.

    Why is it that paranoid dolts who believe the government can scan their brains with particle wave guns love to rant about it on the internet where their IP address can be traced to their home?

    Take your meds. If your’re not on meds, get on them."

    Let me put it this way, I know my I.P. address is known to whomever really want to find out what it is (There is no such thing as computer or I.T. Security) and I use my real name BECAUSE I have nothing to hide. I will undergo any type of drug induced, electronically monitored hypnosis initiated truth-analyzing test they have, but it has to include the Y…..(Why are you accusing me of whatever it may be,and how did you get that information?}. If you would have read my article thoroughly, then you know Y I won't take their Med's. (I have been given enough Med's to last a lifetime and some facilitate the EM interfacing).

    These frequencies are measurable, just need to know which range is being used, autos can for them, auto-resonate the source and bingo, we've fixed the problem of illegal monitoring. If our home could switch from a double layered faraday shield to a antenna (outside layer) faraday shield {inside layer) using the right control circuits, parameters and hardware(openclosed relais for example), we could ensure that our private lives stay private.

    • Comment anyone?…..And, or, not, nand, nor, who{Hoot), what, where, when, How, Y, et al, etc.,Y Loop Function,?

      Apply this algorithm to all of your daily lives, to every single letter of the alphabets and numbers in your respective languages (Operating systems) while you are feeling, thinking, speaking, reacting, acting, Surviving upon, etc., correlated to the first language at the time and place (Location, location , location for the business minded )that you are speak of IT, (Neon Signs in the desert).

      Then you will be able to begin to interface with the multi-universes,((because it is an Electro Magnetic, Plasma conductive Universe, which is multiplied (by?), 4D, which can equal to Y, (which is also relative by the way)).

      REM ("Just for starters. up-starts AND,OR,NOT,AND NOR Inititial public offerings?).

      et whatever other criteria you want to add to this eQuation. What is your

      processing capability? Enter user name and password to access the DGH operating system AND don’t forget your HU 8 (human energy)portion, quotient, etc., etc., et al. (Whew….;-), Nuff written for now and I will await your reply.

  31. Pingback: Cell Phone Security: Using your Phone to Monitor your Home

  32. “Pingback by Cell Phone Security: Using your Phone to Monitor your Home 2008-05-15 05:36:59
    […] your phone: its ability to keep your family safer. We’ve seen how cell phones can be used to let other people spy on you. This trick, though, turns the tables and lets you watch”

    I fully understand the safety aspect and the intended
    purpose of the monitoring however, I have a problem with this when my private sex life between my wife and I becomes “the best thing on T.V” and Radio used as a Psychological, Physiological EM warfare weapon against my Family, Children, Wives and myself. It can be used to terrorize, torment, blackmail, threaten and drive people literally insane. (“” Only, and, or, not, nand, nor, If””” we can not do reality checks ”

    This has got to be one of the most powerful weapons devised yet.….., Einstein once said that he knew “How” WWI and WWII were fought, he did “not” know “How” WWIII was going to be fought…. but he KNEW that WW IV would be fought with sticks and stones.

    That is pretty much how we are going to end up once they have “gotten” (German for gods) done scrambling our minds with the stuff they keep on trying to “download” into my mind.

    IF they can try to do this to me, what would stop them from doing this to ANYONE who “steps out of line and HOW ARE WE SUPPOSED TO KNOW WHO IS FRIEND OR FOE ?”. Sorry, just had to let that rant out out :-).

    Y does free will (Freedom of Thought)have to end? Y does the World have to end like this? Has this happened once already? (Look to ANCIENT Religions and Civilizations for that answer, they are our parents by the way).

  33. Pingback: Chicago's Favorite Podcast .:. VIKING YOUTH POWER HOUR .:. Chicago Podcasters With Nuts Like Mothballs

    • If someone can hear your conversations from your handset and connect your handset to theirs, will the service provider charge you for airtime used? After all, you are sending your conversation to someone.

      If the service provider doesn't charge you for airtime when someone is eavesdropping on you, then can't this easily installable software be used to acquire free cellphone service when installed on two or more handsets?

  34. If someone can hear your conversations from your handset and connect your handset to theirs, will the service provider charge you for airtime used? After all, you are sending your conversation to someone.

    If the service provider doesn’t charge you for airtime when someone is eavesdropping on you, then can’t this easily installable software be used to acquire free cellphone service when installed on two or more handsets?

  35. “Comment by joe public
    2008-05-17 02:37:54
    If someone can hear your conversations from your handset and connect your handset to theirs, will the service provider charge you for airtime used? After all, you are sending your conversation to someone.

    If the service provider doesn’t charge you for airtime when someone is eavesdropping on you, then can’t this easily installable software be used to acquire free cellphone service when installed on two or more handsets?”.

    Come on people. let’s not be so naive. I will take this one step further…. Elephants, the “Current” largest land Mammals on Earth communicate via Elf (Extremely low frequencies, Do you see the Metaphysical connection there?),:

    Extremely low frequency (ELF) is the US Navy and Soviet/Russian Navy to communicate with submerged submarines used the band of radio frequencies from 3 to 30 Hz. ELF.

    Explanation
    Because of the electrical conductivity of salt water, submarines are shielded from most electromagnetic communications. Signals in the ELF frequency range, however, can penetrate much deeper. Two factors limit the usefulness of ELF communications channels; the low data transmission rate of a few characters per minute, and to a lesser extent the one-way nature due to the impracticality of installing a huge transmitter on a submarine. Generally ELF signals were used to order a submarine to rise to a shallow depth where it could receive “some other form” of communication.

    The Ultra Low Frequency (ULF) is the frequency range between 300 hertz and 3 kilohertz. Many types of waves in the ULF frequency band can be observed in the “magnetosphere” and on the ground. These waves represent important physical processes in the near-Earth plasma environment. The speed of the ULF waves is often associated with the Alfven velocity that depends on the ambient magnetic field and plasma mass density.

    This band is used for communications in mines, as it can penetrate the earth. [1]

    Earthquakes
    Some monitoring stations have reported that a spike sometimes precedes earthquakes in ULF activity. A remarkable example of this occurred before the Loma Prieta Earthquake in California in 1989. Researchers are attempting to learn more about this correlation to find out whether this method can be used as part of an early warning system for earthquakes.

    Earth Mode Communications
    ULF has been used by the military for secure communications through the ground. NATO AGARD publications from the 1960s detailed many such systems, although one suspects the contents of the published papers left a lot unsaid about what actually was developed secretly for defense purposes. Communications through the ground using conduction fields is known as “Earth Mode” communications and was first used in WWI. Radio amateurs and electronics hobbyists have used this mode for limited range communications using audio power amplifiers connected to widely spaced electrode pairs hammered into the soil (telegraph anyone?). At the receiving end the signal is detected as a weak electric current between two further pairs of electrodes. Using weak signal reception methods with PC based DSP filtering with extremely narrow bandwidths it is possible to receive signals at a range of a few kilometers with a transmitting power of 10-100W and electrode spacing of around 10-50m.

    See also
    Voice frequency

    By changing the electrical conductivity of the air itself, (Air pollution), Worldwide agencies can exploit
    These types of air quality Pollution, Corruption by “Airplane Contrails mixed with Barium oxide ” and or Certain manufacturing air quality output levels et al, to increase air conductivity which could result in propagation of certain frequencies that could interface with our metabolisms. That means they don’t need cell phones or television, a satellite will do! The local cell phone, television microwave relay station or radar installations wave output transformed down to a certain area and your body frequency can do the job!

    How about creating an Earthquake at the nearest fault line at the push of a button? Where have you all been?
    Let’s take this horror scenario to the next step…
    ready for this? I DON’T THINK SO! How about resonating the SUN…ANYONE? with the right frequency and a Di-pole antenna, anyone could resonate the sun and cause a Solar Outburst that would devastate the EARTH. See Tesla.

    Talk about Sci-fi huh? Probable? you bet! It is only a matter of TIME. Oh shit, gave away another key. Somebody stop me!…. (Mask),:-).

    Consider this message as an initial countdown to Armageddon as there is no such thing as Information Technology security, Nuff said!

    • Oh my goodness. I am nowhere as intelligent as you are but I have been experiencing this personally for over a year. 24/7. No matter what room i am in, if i am outside or inside. Night and day. I have started to figure this out on my own but you have nailed what I am experiencing every second of my life. I feel like i am some “test”. No one will believe me and actually think i am crazy, it is horrible. I just live with it now and stay in silence. All I am is some housewife raising 2 kids but I definetely was able to figure out that something big and scary was happening to me. I just thought it was the military using me as practice..but it seems more than that..maybe not.
      Anyway, I am glad to know I am not crazy.
      Thank you!

  36. There is a technology available in Asia that allows you to overhear all conversation on a cell. It works that way, if you can access a SIM card from a cell phone, you can take the SIM to somebody and duplicate it. Bingo, the cell phone is yours now, you can completely hear all conversation in and out from the cell phone no matter how far the cell phone is.

    • There is technology available here in the us that allows you too overhear or lock into cell conversations..it been happening to me for the last two mounths…we did a survey job on an island ..50 million ..we were informed that we should not use our cell phones because the comp. could hear us ..also with hear with cell phones off. and the proved it to me ….and its still happening ..so i researched and found software called cell spy and others that work very well …just search spy equipment …cell spy will call the third phone everytime the target phone makes a call or receives a call..it is true..

      • I have a woman who regularly listens to my phone conversations reads all my text and views my call logs. This information is not private. I know she is doing it she has told people about conversations we have had. And she got the software right online. How do I protect myself and is there anyway to prove they are doing it?
        I understand by taking the battery out is one way. But she is a truly crazy person. And she wants to destroy me. Not sure why anyone has time to do that or why they would want to…..? But regaurdless how do I protect myself?

        • Hi Amie,
          Please call me about your situation. I’m a reporter for ABC News and would very much like to talk to you.
          323-671-5261.
          Thank you.

  37. There is a technology available in Asia that allows you to overhear all conversation on a cell. It works that way, if you can access a SIM card from a cell phone, you can take the SIM to somebody and duplicate it. Bingo, the cell phone is yours now, you can completely hear all conversation in and out from the cell phone no matter how far the cell phone is.

    • There is technology available here in the us that allows you too overhear or lock into cell conversations..it been happening to me for the last two mounths…we did a survey job on an island ..50 million ..we were informed that we should not use our cell phones because the comp. could hear us ..also with hear with cell phones off. and the proved it to me ….and its still happening ..so i researched and found software called cell spy and others that work very well …just search spy equipment …cell spy will call the third phone everytime the target phone makes a call or receives a call..it is true..

      • I have a woman who regularly listens to my phone conversations reads all my text and views my call logs. This information is not private. I know she is doing it she has told people about conversations we have had. And she got the software right online. How do I protect myself and is there anyway to prove they are doing it?

        I understand by taking the battery out is one way. But she is a truly crazy person. And she wants to destroy me. Not sure why anyone has time to do that or why they would want to…..? But regaurdless how do I protect myself?

        • Hi Amie,

          Please call me about your situation. I'm a reporter for ABC News and would very much like to talk to you.

          323-671-5261.

          Thank you.

  38. The Question is, when have we taken technology too far?
    Imagine if…one day mankind is wired like a cell phone
    with no off button and somebody was to make a copy of your “SIM”, that would mean they can see what you see, hear what you hear, feel what you feel and hear what you think 24/7.

    That is not the worst thing, Like a GPRS modem, they could download what ever they want to, tell your eyes not to see that oncoming truck on the wrong side of the road that you mysteriously wandered over onto….
    or not see an on rushing car whilst crossing the street.

    Like Bearden said, it is like going through a paradigm shift to understand what is truly possible with this type of technology, it boggles the mind!

  39. do I understand correctly that a target phone MUST have some sort of software downloaded on it before any conversations, background sounds, etc., can be overheard? that is, to date, there is no available technology exacting the “likeness” of GPS with the ability to track by cell phone number then locate a specific cell phone to also read that same cell phone’s SIM card accessing texts and/or listen in on conversations?

    • its been happening to me for a long time …and no you purchase the software on the internet ..no disk is sent..depending on the software you buy..some only link to bluetooth devices..some work even after your phone has been turned off. even after i disabled my bluetooth they were still able to listen..they my co workers three of them would tell me things i had said or did over the weekend .. started as a prank..got out of hand ..they can also read your text mea..and retreive phone contact list..and more ..i read about some of the software on the internet after searching a short time ..its sold a spy tool for people who think their mates are cheating..just search ‘listen in on cell calls’,’ spy equipment’ or cell spy..after downloading the software they are up and running in less then ten minutes..

  40. do I understand correctly that a target phone MUST have some sort of software downloaded on it before any conversations, background sounds, etc., can be overheard? that is, to date, there is no available technology exacting the "likeness" of GPS with the ability to track by cell phone number then locate a specific cell phone to also read that same cell phone's SIM card accessing texts and/or listen in on conversations?

    • its been happening to me for a long time …and no you purchase the software on the internet ..no disk is sent..depending on the software you buy..some only link to bluetooth devices..some work even after your phone has been turned off. even after i disabled my bluetooth they were still able to listen..they my co workers three of them would tell me things i had said or did over the weekend .. started as a prank..got out of hand ..they can also read your text mea..and retreive phone contact list..and more ..i read about some of the software on the internet after searching a short time ..its sold a spy tool for people who think their mates are cheating..just search 'listen in on cell calls',' spy equipment' or cell spy..after downloading the software they are up and running in less then ten minutes..

  41. Let me put it to you all this way, FORGET THE CELL PHONE,
    THEY DO NOT NEED A CELL PHONE ANYMORE! That is Sooooo yesteryear’s technology. Did you all happen to know that every living organisim has it’s own frequency? That frequency can be tapped into and used exactly like a cell phone (with some “Modifications”).

    Have any of you ever heard of Sir Rife? do a google search for “RIFE FREQUENCIES” and see what you get.
    If primative bacteria and Viruses have their own frequencies (and they are primative by the way), Y
    wouldn’t mankind? Ahhh jetz ja…eine insel!
    Wikipedia’s

    Definition of Frequencies:

    For cyclical processes, such as rotation, oscillations, or waves, frequency is defined as a number of cycles, or periods, per unit time. In physics and engineering disciplines, such as optics, acoustics, and radio, frequency is usually denoted by a Latin letter f or by a Greek letter ? (nu).

    In SI units, the unit of frequency is hertz (Hz), named after the German physicist Heinrich Hertz. For example, 1 Hz means that an event repeats once per second, 2 Hz is twice per second, and so on [1]. This unit was originally called a cycle per second (cps), which is still sometimes used. Heart rate and musical tempo are measured in beats per minute (BPM). Frequency of rotation is often expressed as a number of revolutions per minute (rpm). BPM and rpm values must be divided by 60 to obtain the corresponding value in Hz: thus, 60 BPM translates into 1 Hz.

    The period is usually denoted as T, and is the reciprocal of the frequency f:
    The SI unit for period is the second (s).

    If you have read this article from the beginning, then you know that we transmit frequencies just by thinking.
    (Thinking controls hearing, sight, taste, movement, feelings, etc,.). We are walking transmitters! A sensitive satellite could pick out our bodily signatures where ever we are, now that my friends is Big brother old school style. Think about it.

    • How do you live your day to day life? Are you constantly going around worrying about the g-mans brainwave scanner devices? YES we emit unique frequencies, but they are so low powered that you’d have to be less than one meter away to be able to pick them up.

      So please David, as a request from another human transmitter :P

      Throw away tour tinfoil hat. Seriously.

    • {{We are walking transmitters! A sensitive satellite could pick out our bodily signatures where ever we are, now that my friends is Big brother old school style. Think about it.}}

      Sounds like you just proved an ancient theory about God’s ability to know everything about you. Everything you have ever said or done or thought of, God himself Knows.
      There’s something worry about! Forget about this other petty garbage! Now sleep tight kiddies.

    • I happen to know the military was experimenting with human resonance “death waves”.

      Whether or not it became that sound weapon that showed up at the recent G-20 meet or was seen in NYC at a protest is unknown to me

      What was the freq they were using? This is an easy one if you know of what you speak

  42. Pingback: Controversy Erupts Over Secret Cell Phone Tracking

  43. Where can you buy software online that allows you to plug in a certain number you want to hear all the calls that are incoming and outgoing to. I dont care about other calls incoming or outgoing I just want to be able to hear all calls that come from a certain number or are dials out to that number.

  44. Where can you buy software online that allows you to plug in a certain number you want to hear all the calls that are incoming and outgoing to. I dont care about other calls incoming or outgoing I just want to be able to hear all calls that come from a certain number or are dials out to that number.

  45. How do you live your day to day life? Are you constantly going around worrying about the g-mans brainwave scanner devices? YES we emit unique frequencies, but they are so low powered that you'd have to be less than one meter away to be able to pick them up.

    So please David, as a request from another human transmitter :P

    Throw away tour tinfoil hat. Seriously.

  46. i know theres a lot of people out there that say who cares.the same as when a cop pulls you over and wants to search your car.he says if you have nothing to hide its not a problem.[his exscuse with out a cause].well thats not the way this country was formed and the list is endless why we have the rights we have in this country[USA]..i better stop before i get carried away.WAKE UP PEOPLE.they can make phones that dont track,they can make comp. that dont get viruses.dah dah dah.why do you think they,[gov]wants to free up all the air waves[rf]frequencies and make us all go digital.wheres choice wheres privacy.we will sure know when its all gone!!

  47. i know theres a lot of people out there that say who cares.the same as when a cop pulls you over and wants to search your car.he says if you have nothing to hide its not a problem.[his exscuse with out a cause].well thats not the way this country was formed and the list is endless why we have the rights we have in this country[USA]..i better stop before i get carried away.WAKE UP PEOPLE.they can make phones that dont track,they can make comp. that dont get viruses.dah dah dah.why do you think they,[gov]wants to free up all the air waves[rf]frequencies and make us all go digital.wheres choice wheres privacy.we will sure know when its all gone!!

  48. Pingback: On Message with Ben Gross » Blog Archive » Security link roundup 7/28/08

  49. That is a very good question. I continue to go to
    work and support my family, (As long as I can) the difference is in Knowing that it is happening :-). I am not worried about the FEDS; I am worried about us losing our Country. As Benjamin Franklin once said, “Let’s see how LONG we can keep it” when he was referring to our new Republic. The U.S. is not the only Country with this
    Technology, I THINK we are behind the curve ball on this one.

    I don’t walk around with a tin foil hat. I remember that I have to keep my feet on the ground and live one day at a time lest we be like them. (Reality checks my friend.. my reality zero sum checks :-).

  50. That is a very good question. I continue to go to

    work and support my family, (As long as I can) the difference is in Knowing that it is happening :-). I am not worried about the FEDS; I am worried about us losing our Country. As Benjamin Franklin once said, "Let's see how LONG we can keep it" when he was referring to our new Republic. The U.S. is not the only Country with this

    Technology, I THINK we are behind the curve ball on this one.

    I don't walk around with a tin foil hat. I remember that I have to keep my feet on the ground and live one day at a time lest we be like them. (Reality checks my friend.. my reality zero sum checks :-).

  51. I’d like to purchase a phone thAT IS CAPAble of all of the aforemeanioned. Purchasing a new phone is no problem as lon as I’m told the best brand for my needs and then someone to help and guarentee, all of the said applications. Thank you J.Badalot

  52. FlexiSpy is probably the most common cellphone spy software out there now and it seems to work exactly as advertised. Pretty simple…inexpensive…and very effective.

  53. FlexiSpy is probably the most common cellphone spy software out there now and it seems to work exactly as advertised. Pretty simple…inexpensive…and very effective.

  54. I’m willing to bet that David has one helluva Y2K kit left over at his basement…err, I mean radiation fallout shelter.

  55. I'm willing to bet that David has one helluva Y2K kit left over at his basement…err, I mean radiation fallout shelter.

  56. Pingback: GAS’s Most Popular Stories of 2008

  57. my daughter has had text messages that she has saved removed from her cell phone. How can she prove someone is tapping her phone and actually removing messages that were sent to her.

    please advise.

    thank you

    • go to you tmobile website change your password to get in.change you phone number too.dont click on text you dont know that went you get hack in too cell you, it happened to me.go to your tmobile website where you all text and picture are and change the password .and change your voice mail password.dont let noone know your voicemail password.when you phone is hack or have a bug,you can hear while you talking clicking noises,background,or this noise shhhhhhhhhh.you can heard ppl talking in your line voicesor sound that you are in 3 way call like a you have your microphone on.that some symptom

  58. Pingback: Spyware - BlackBerryForums.com : Your Number One BlackBerry Community

  59. “Comment by anon
    2008-06-20 04:14:40

    They can stil track you with your phone turned off. Cell phones emit a signal periodically even when turned off in order to update tower informatin. You’d have to remove the battery.” No they don’t. Leave your phone next to an amplifier sound-system, and wait till that transmission…and wait…and wait…

    Lol. You, david, are very funny. First of all, your frequency definition has nothing to do with the real one, that you actually quoted from wikipedia, but seems that you haven’t read it.
    First of all, I encourage you to read (and learn) some electromagnetic theory books (oh…sorry. I forgot that ‘The Man’ has erased some Maxwell laws, that enable them to spy on us).
    Well, that’s true that every molecule emits/absorbs electromagnetic radiation. The light itself, for example. Anything that has color, for example, a green leaf, is reflecting most of the green, and absorbing the majority of the remaining visible spectrum (including other invisible parts, of course). The point on electromagnetic emanation starts when the atoms ou molecules vibrate, or electrons “dissipate” power in form of EMR (Electromagnetic radiation). Every moving charge creates a electromagnetic wave (not necessarily with a frequency, since it could be just a punctual move, provoking a momentary variation on the magnetic field). If there’s nothing between you, and the “observer”, when i mean nothing, i mean vacuum, then yes. it is possible that it tracks (some of) the radiation emitted from your atoms. But when a lot of stuff is between the observer and the observed, the noise surpasses the “data” emitted, so it gets unreachable. By your posts, i’ve seen that’s pointless to argue with you, since you have your closed belief, but notice one thing. In the net, you can find everything you want to “feed” your need to confirm that there’s someone watching you. And you’ll get worse of your psychic disease. But i inform you that there’s no one watching you, pal. you know why? because no one is going to spend resources/time on a guy that’s already self-distracted on conspiracy issues, and learning wrong stuff just to feed that conspiracy-dependency, forgetting the real social problems. You are already off the game pal.

  60. “Comment by anon
    2008-06-20 04:14:40

    They can stil track you with your phone turned off. Cell phones emit a signal periodically even when turned off in order to update tower informatin.” No they don’t. Leave your phone next to an amplifier sound-system, and wait till that transmission…and wait…and wait…

    Lol. You, david, are very funny. First of all, your frequency definition has nothing to do with the real one, that you actually quoted from wikipedia, but seems that you haven’t read it.
    First of all, I encourage you to read (and learn) some electromagnetic theory books (oh…sorry. I forgot that ‘The Man’ has erased some Maxwell laws, that enable them to spy on us).
    Well, that’s true that every molecule emits/absorbs electromagnetic radiation. The light itself, for example. Anything that has color, for example, a green leaf, is reflecting most of the green, and absorbing the majority of the remaining visible spectrum (including other invisible parts, of course). The point on electromagnetic emanation starts when the atoms ou molecules vibrate, or electrons “dissipate” power in form of EMR (Electromagnetic radiation). Every moving charge creates a electromagnetic wave (not necessarily with a frequency, since it could be just a punctual move, provoking a momentary variation on the magnetic field). If there’s nothing between you, and the “observer”, when i mean nothing, i mean vacuum, then yes. it is possible that it tracks (some of) the radiation emitted from your atoms. But when a lot of stuff is between the observer and the observed, the noise surpasses the “data” emitted, so it gets unreachable. By your posts, i’ve seen that’s pointless to argue with you, since you have your closed belief, but notice one thing. In the net, you can find everything you want to “feed” your need to confirm that there’s someone watching you. And you’ll get worse of your psychic disease. But i inform you that there’s no one watching you, pal. you know why? because no one is going to spend resources/time on a guy that’s already self-distracted on conspiracy issues, and learning wrong stuff just to feed that conspiracy-dependency, forgetting the real social problems. You are already off the game pal.

  61. "Comment by anon

    2008-06-20 04:14:40

    They can stil track you with your phone turned off. Cell phones emit a signal periodically even when turned off in order to update tower informatin. You’d have to remove the battery." No they don't. Leave your phone next to an amplifier sound-system, and wait till that transmission…and wait…and wait…

    Lol. You, david, are very funny. First of all, your frequency definition has nothing to do with the real one, that you actually quoted from wikipedia, but seems that you haven't read it.

    First of all, I encourage you to read (and learn) some electromagnetic theory books (oh…sorry. I forgot that 'The Man' has erased some Maxwell laws, that enable them to spy on us).

    Well, that's true that every molecule emits/absorbs electromagnetic radiation. The light itself, for example. Anything that has color, for example, a green leaf, is reflecting most of the green, and absorbing the majority of the remaining visible spectrum (including other invisible parts, of course). The point on electromagnetic emanation starts when the atoms ou molecules vibrate, or electrons "dissipate" power in form of EMR (Electromagnetic radiation). Every moving charge creates a electromagnetic wave (not necessarily with a frequency, since it could be just a punctual move, provoking a momentary variation on the magnetic field). If there's nothing between you, and the "observer", when i mean nothing, i mean vacuum, then yes. it is possible that it tracks (some of) the radiation emitted from your atoms. But when a lot of stuff is between the observer and the observed, the noise surpasses the "data" emitted, so it gets unreachable. By your posts, i've seen that's pointless to argue with you, since you have your closed belief, but notice one thing. In the net, you can find everything you want to "feed" your need to confirm that there's someone watching you. And you'll get worse of your psychic disease. But i inform you that there's no one watching you, pal. you know why? because no one is going to spend resources/time on a guy that's already self-distracted on conspiracy issues, and learning wrong stuff just to feed that conspiracy-dependency, forgetting the real social problems. You are already off the game pal.

  62. I’ve heard that there are cellular phones that have a feature that makes them undetectable and your location cant be traced. does anyone know the brand and where i can get a unit?

  63. I've heard that there are cellular phones that have a feature that makes them undetectable and your location cant be traced. does anyone know the brand and where i can get a unit?

  64. get a life david, who want to spend 3 to 7 yrs in jail to learn phone Ispy stuff. what are you trying to be ? ummm bond. Agent james Bond. yor arse butt gonna land in the jail big time while some horny loft waiting for you to break your virgin sweet. wise up david and get serious. Sheeeeeezz

  65. get a life david, who want to spend 3 to 7 yrs in jail to learn phone Ispy stuff. what are you trying to be ? ummm bond. Agent james Bond. yor arse butt gonna land in the jail big time while some horny loft waiting for you to break your virgin sweet. wise up david and get serious. Sheeeeeezz

  66. get a life david, who want to spend 3 to 7 yrs in jail to learn phone Ispy stuff. what are you trying to be ? ummm bond. Agent james Bond. yor arse butt gonna land in the jail big time while some horny loft waiting for you to break your virgin sweet. wise up david and get serious. Sheeeeeezz

  67. 3 questions:
    1- my wife is in the philippines. We are on Skype, Her cell phone is on the Comp table near the keyboard, I hear a series of beeps (da dada da, dada da…etc) and then an SMS or a call comes thru. So I hear it b4 she does. Sometimes I hear it and she says there’s nothing (i.e. no ringtone sounds). Odd. I mean 8 x it is an SMS/Call…2x it’s nothing. No other cell phones are close, and no other cell phones in the house 30 feet away are receiving texts or calls when her phone “misses”.
    Anyway just curious, comments please?

    2- GPS tracking in the philippines, both carriers SMART and GLOBE are 3G. We use a SIM card that you put money on as you want. Not a “plan”. Anyone know what service (flexiSpy perhaps) works there? Will their GPS tracking track real time on a map like Google maps or Mapquest etc….?

    3-Can I use FlexiSpy and listen in on her phone (My phone by the way, I bought it and let her use it, so no legal issues here) from the usa? how much will it cost? I guess I need to be there to download the software to the phone that shes using…then can I travel and still have the ability to listen in if i want? or receive text copies?

    Thanks guys, you all seem to be up on this type of information. I know about triangulation and GPS tracking etc. I helped to install the E911 compliance in the USA.
    Steve

  68. It’s funny that if the police need to search for someone they have to go through red tape in order get permission to home in on a signal assuming the person has the phone on him. Whereas with this crap certain people can do whatever the hell they feel like. We need to thank the politicians and police chiefs for not considering this a issue until it happens to them or their familys.

  69. It's funny that if the police need to search for someone they have to go through red tape in order get permission to home in on a signal assuming the person has the phone on him. Whereas with this crap certain people can do whatever the hell they feel like. We need to thank the politicians and police chiefs for not considering this a issue until it happens to them or their familys.

  70. I was shocked to see that in the US I could see (on the monthly statement) every location (towns, states) of a person that I would exchange text-messages or had phone conversations with. What I want to know is: do French or German – Western European – subscribers have, that service? Would they know from which country their friend is sending messages? Thanks in advance!

  71. I was shocked to see that in the US I could see (on the monthly statement) every location (towns, states) of a person that I would exchange text-messages or had phone conversations with. What I want to know is: do French or German – Western European – subscribers have, that service? Would they know from which country their friend is sending messages? Thanks in advance!

  72. This is the gayest thing I’ve ever heard of. Why is this freakin invented. My dang dad has it. It’s terrible. It’s for over controlling parents. It’s gonna suck when I turn 18 for them :)

    • they can even after your 18, as long as you are on there cell plan. I suggest blocking softwarwe

  73. This is the gayest thing I've ever heard of. Why is this freakin invented. My dang dad has it. It's terrible. It's for over controlling parents. It's gonna suck when I turn 18 for them :)

  74. can anybody advise me on indian law on spying mobile… i know its bad to spy some1’s privacy, but its more painfull when getting cheated… and also i ordered estealth and got cheated, they had billed me twice and have not sent me the software(which people say doesnt work). and so i lost my money, and even if claim a dispute, estealth will charge me. and also i dont know about the indian law. also i need to know am i being cheated by my wife. pls help me…

  75. I have a serious questions in regards to cell location and conversation spying, and I suspect they used some sort of cell-phone location device to find me. Perhpaps someone can help me in understanding if this was at least possible.

    I was attacked and beaten-up severely by some white-collar types. I had met them in NY at a cocktail party hosted by a friend. One man in the group asked if I would join them at a latenight party following–I declined.

    During the conversation with these men, they asked for my Cell Phone Number AND who my carrier was (such as ATT or T-mobile). I thought this was a very strange question, but answered none-the-less.

    I left the party with no thought of every seeing or bumping into these men again.

    18 days later, around 11pm at night, I was walking 2 blocks from a restraunt to a girlfriends’ condo, when I was savagely attaked by these men. They left me for dead in the middle of a dark street.

    The question is obvious…could they use the information I provided, (My cell number and the Cellular Carrier such as T-Mobile or ATT) to track my location?

    Is this simple to do?

    Any information will be greatly appreciated.

    Kind regards,

    Tasha

  76. I have a serious questions in regards to cell location and conversation spying, and I suspect they used some sort of cell-phone location device to find me. Perhpaps someone can help me in understanding if this was at least possible.

    I was attacked and beaten-up severely by some white-collar types. I had met them in NY at a cocktail party hosted by a friend. One man in the group asked if I would join them at a latenight party following–I declined.

    During the conversation with these men, they asked for my Cell Phone Number AND who my carrier was (such as ATT or T-mobile). I thought this was a very strange question, but answered none-the-less.

    I left the party with no thought of every seeing or bumping into these men again.

    18 days later, around 11pm at night, I was walking 2 blocks from a restraunt to a girlfriends' condo, when I was savagely attaked by these men. They left me for dead in the middle of a dark street.

    The question is obvious…could they use the information I provided, (My cell number and the Cellular Carrier such as T-Mobile or ATT) to track my location?

    Is this simple to do?

    Any information will be greatly appreciated.

    Kind regards,

    Tasha

  77. my friend think tht tht her mobile is being tapped..n how can u help her out because that person is troubling her a lot.there is no one to believe her..how can she help her..

  78. my friend think tht tht her mobile is being tapped..n how can u help her out because that person is troubling her a lot.there is no one to believe her..how can she help her..

  79. Hey, they found a lady in her mini van four days after she went off a bridge and into a lake… by locating her cell phone…
    yep… bottom of a lake, underwater, after four (4) days… clearly taking out the battery does not make it safe… they can still track you…

    so for those little “outings” where you do not want to be tracked but don’t want to leave your phone at home…
    take out the battery and wrap your phone in foil and you are relatively “safe”…

    But also keep in mind that most cars now have GPS built in… they can be tracked just as easily as a cell phone…

    Fletcher…

  80. Hey, they found a lady in her mini van four days after she went off a bridge and into a lake… by locating her cell phone…

    yep… bottom of a lake, underwater, after four (4) days… clearly taking out the battery does not make it safe… they can still track you…

    so for those little "outings" where you do not want to be tracked but don't want to leave your phone at home…

    take out the battery and wrap your phone in foil and you are relatively "safe"…

    But also keep in mind that most cars now have GPS built in… they can be tracked just as easily as a cell phone…

    Fletcher…

  81. my take on this is to use an unsophisticated un-smartphone.

    These spyware work on on complex OS such as symbian, blackberry, windows mobile and Mac OSX on iPhone. They may not work on vanilla phones such as the cheaper LG / Samsung phones. Plus older the phone (monochrome screen?) – the better!

    I guess I would know.

    take care…

  82. my take on this is to use an unsophisticated un-smartphone.

    These spyware work on on complex OS such as symbian, blackberry, windows mobile and Mac OSX on iPhone. They may not work on vanilla phones such as the cheaper LG / Samsung phones. Plus older the phone (monochrome screen?) – the better!

    I guess I would know.

    take care…

  83. {{We are walking transmitters! A sensitive satellite could pick out our bodily signatures where ever we are, now that my friends is Big brother old school style. Think about it.}}

    Sounds like you just proved an ancient theory about God's ability to know everything about you. Everything you have ever said or done or thought of, God himself Knows.

    There's something worry about! Forget about this other petty garbage! Now sleep tight kiddies.

  84. You really believe there is still privacy these days? Common, they can read our e-mails, listen our conversations and find us everywhere.

  85. You really believe there is still privacy these days? Common, they can read our e-mails, listen our conversations and find us everywhere.

  86. Pingback: Los Cuatro Ojos » Just More Stuff

  87. Oh my goodness. I am nowhere as intelligent as you are but I have been experiencing this personally for over a year. 24/7. No matter what room i am in, if i am outside or inside. Night and day. I have started to figure this out on my own but you have nailed what I am experiencing every second of my life. I feel like i am some "test". No one will believe me and actually think i am crazy, it is horrible. I just live with it now and stay in silence. All I am is some housewife raising 2 kids but I definetely was able to figure out that something big and scary was happening to me. I just thought it was the military using me as practice..but it seems more than that..maybe not.

    Anyway, I am glad to know I am not crazy.

    Thank you!

  88. What I hate the most about this whole thing is that any ex boyfriend who has a grudge against you, can find out all sorts of embarassing things about you, like how much you paid for the QVC ring you bought, or that you called a Keen Psychic and talked about him. This happened to me once. I called a psychic and she asked a name of my ex, I used a different name, she told me some stuff about him which was way off but I expected that because I know psychics aren’t real. The same day, my ex had his friend call me back and ask me if I am a Psychic and he used a part of my conversation with the one from Keen, but made it sound like he had a problem and needed help. I was in shock. I knew that my ex was listening to every word of my conversation with that weird, gypsy woman. What’s worse, is that he was using parts of my conversation to tease me. And only God knows what other conversations he could have heard me having with people, and relatives. I thought that getting a prepaid phone would help, but his friend keeps calling me and harassing me from time to time and the last time I got angry and told him to go f himself and to never call me again. He called back and called me a b*tch. He said that like it’s an insult… LOL! Yes, Rob, honney, I know I am! And thank you for the compliment! Seriously though, I never consented to this. Am I supposed to keep my phone off at all times now? What if I’m expecting an important phone call? Would changing my number again help? Anyone know?

  89. What I hate the most about this whole thing is that any ex boyfriend who has a grudge against you, can find out all sorts of embarassing things about you, like how much you paid for the QVC ring you bought, or that you called a Keen Psychic and talked about him. This happened to me once. I called a psychic and she asked a name of my ex, I used a different name, she told me some stuff about him which was way off but I expected that because I know psychics aren't real. The same day, my ex had his friend call me back and ask me if I am a Psychic and he used a part of my conversation with the one from Keen, but made it sound like he had a problem and needed help. I was in shock. I knew that my ex was listening to every word of my conversation with that weird, gypsy woman. What's worse, is that he was using parts of my conversation to tease me. And only God knows what other conversations he could have heard me having with people, and relatives. I thought that getting a prepaid phone would help, but his friend keeps calling me and harassing me from time to time and the last time I got angry and told him to go f himself and to never call me again. He called back and called me a b*tch. He said that like it's an insult… LOL! Yes, Rob, honney, I know I am! And thank you for the compliment! Seriously though, I never consented to this. Am I supposed to keep my phone off at all times now? What if I'm expecting an important phone call? Would changing my number again help? Anyone know?

  90. This is a great article. I have been listened to in my car and in my home for at least 20 years. I have had numerous phones, but it continues. Now, I am even being followed. I am trying to learn how to help myself. I filed a police report. I have even heard myself talking on the phone and having that conversation transferred to my friend in another state. I was told that these listeners want to drag my name in the mud. If they have not done it in all these years, I wonder why they continue to listen. I was told by a so-called friend, who knows the stalker, what I should do when he comes to rape me. I am being stalked, and I cannot do anything about it. I want to learn how to detect bugs and get rid of codes sent to my phones. Once each time I dialed a certain friend, a strange man would answer. I played around with my phone until I found a peculiar code that I did not understand. I deleted it and the phone began to ring my friend again. Another time, I picked up my cell phone and heard the sounds that were in the house the night before. I would like to know how to stop their busting into the phone. A static sound comes on the line, then an awful male voice booms in. That is one way they get into the phone when they don’t have the number. After that, they can hear all the conversations on that phone. Thanks for this article.

    • Willarean, these technologies are used by the 'law,' and the 'law' goes on about its business, while rapists and murderers utilize the technology to bug normal people like you. They probably monitor all of these chat rooms too. You're making a mistake if you think you can trust anyone on earth outside of family.

      • Sometimes I think cell phone's are powered by brains. jajajajaja Funny it only cuts off when my a** does not care jajajajaja

  91. This is a great article. I have been listened to in my car and in my home for at least 20 years. I have had numerous phones, but it continues. Now, I am even being followed. I am trying to learn how to help myself. I filed a police report. I have even heard myself talking on the phone and having that conversation transferred to my friend in another state. I was told that these listeners want to drag my name in the mud. If they have not done it in all these years, I wonder why they continue to listen. I was told by a so-called friend, who knows the stalker, what I should do when he comes to rape me. I am being stalked, and I cannot do anything about it. I want to learn how to detect bugs and get rid of codes sent to my phones. Once each time I dialed a certain friend, a strange man would answer. I played around with my phone until I found a peculiar code that I did not understand. I deleted it and the phone began to ring my friend again. Another time, I picked up my cell phone and heard the sounds that were in the house the night before. I would like to know how to stop their busting into the phone. A static sound comes on the line, then an awful male voice booms in. That is one way they get into the phone when they don't have the number. After that, they can hear all the conversations on that phone. Thanks for this article.

  92. ATTENTION EVERYBODY WHO COMMENTED!!! None of you have EVER been spied on or tracked, EVER. There are no programs on your phone, there is nobody watching you. You are not that important. Get over yourself and get on with your life. Seek therapy if needed. If you think that nobody believes you, its because they are smarter and more rational than you, they understand that you are a nobody and that no one is spying on you. You are your biggest enemy, wasting your life thinking about something that doesn’t exist and never will. Now go be somebody!

    • bs..i know for a fact …that my co workers ..some work compeditors have got my contact list off my phone ..read my comments further up…search the internet for ‘listen in on cell calls’, ‘spy equipment’ or cell spy’

  93. LIFE becomes a mockery of LIFE once free will has been taken away, What do you all not understand about that? It is, was and allways will be a part of our greatest gift. The end can not be far, how many times do we have to start over untill we realize that? DGH.

  94. LIFE becomes a mockery of LIFE once free will has been taken away, What do you all not understand about that? It is, was and allways will be a part of our greatest gift. The end can not be far, how many times do we have to start over untill we realize that? DGH.

  95. THIS IS DISGUSTING & PATHETIC! Why are you people wasting your lives searching out & finding things about people that you really don’t want to know?? Stop being so nosey & get your own lifves. Technology like this makes me feel uncomfortable to be living during this generation.

    • I totally agree.
      I was Generation X, I couldn't believe how sad and small people my age were.
      Then the Internet got really big, and now I just feel sorry for other mopes who are addicted to 21st century stalking, spying, and psycopathic torture porn.

  96. THIS IS DISGUSTING & PATHETIC! Why are you people wasting your lives searching out & finding things about people that you really don't want to know?? Stop being so nosey & get your own lifves. Technology like this makes me feel uncomfortable to be living during this generation.

  97. this is a little bit scary, considering i have an iphone. does anyone here know exactly how the software is installed? does it need to be synced to a computer/laptop? i’m guessing yes. this makes me a little paranoid lol.

  98. this is a little bit scary, considering i have an iphone. does anyone here know exactly how the software is installed? does it need to be synced to a computer/laptop? i'm guessing yes. this makes me a little paranoid lol.

  99. The google maps application is now being used in the U.S…. my sister typed in my phone number into the application the other day and it gave her a pin point on a map of where I was. It even showed the outside of the building and where in the building I was. She paid $10 for the software through her cell phone provider. SCARY!

  100. The google maps application is now being used in the U.S…. my sister typed in my phone number into the application the other day and it gave her a pin point on a map of where I was. It even showed the outside of the building and where in the building I was. She paid $10 for the software through her cell phone provider. SCARY!

  101. How do you thwart someone who is spying in on your cell phone without you having to change your number?

  102. How do you thwart someone who is spying in on your cell phone without you having to change your number?

  103. My friend, has been seperated from her Very abusive husband, he has previously Tried GPS on her phone, and having her vehicle stolen.(to install tracking I believe).He owns a business, and her phone is registered under the business name. Her and I have been texting daily, discussing options for her to escape. He has beaten and threatened to kill her, and get custody of the children. Red flags have gone up recently, when we have had voice conversations,and virtually minutes later, he is calling my cell with threats. Tonight as we were talking we both noticed audible clicks, (similar to a call coming in click). I am now fairly certain he is monitoring the calls and txts, and I am gravely concerned for her safety. She has a Blackberry, what is the best course of action to take? Get another phone? Please advise, this is a critical life/death situation.

    • getting another phone may work for a while ..its been happing to me ..and i had the phone company reset my phone …and i turned my phone bluetooth off ..did not work ..not only that with some software they can hear you even if your phone is off..search internet for ‘cell spy’ spy equipment or cell spy….you will see…i have tried everything ..i have come with nothing as of this date…

    • seriously if its that intense, leave the city…the country even. delete facebook, twitter, myspace, whatever social networking sites used, get a new phone with a new carrier and a new account number, change your name, your email, make sure that your company knows of the situation and doesn’t release any information whether you’re in the building or not, cell phone numbers, if youre on lunch, even if you are an employee there or not. whatever you gotta do to distance yourself from someone crazy like that would clearly be worth it.

      stuff like that is crazy. i cant believe privacy is so easily breached. people should be able to protect themselves from stalkers. it may be conveinient to check where friends are via GPS software mentioned in the comment from the brother & sister situation for 10$… it would be great to just click a few buttons and see if any of my friends were nearby if im out, but at the same time, super creepy if someone was using technology to stalk you and potentially cause harm… so creepy.
      *shudders* good luck with that.
      <3 k.

  104. bs..i know for a fact …that my co workers ..some work compeditors have got my contact list off my phone ..read my comments further up…search the internet for 'listen in on cell calls', 'spy equipment' or cell spy'

  105. getting another phone may work for a while ..its been happing to me ..and i had the phone company reset my phone …and i turned my phone bluetooth off ..did not work ..not only that with some software they can hear you even if your phone is off..search internet for 'cell spy' spy equipment or cell spy….you will see…i have tried everything ..i have come with nothing as of this date…

  106. I am not going to comment because my PC will be tracked, they will get my address at the boatyard and kill me!!!
    LOL XXX

  107. I am not going to comment because my PC will be tracked, they will get my address at the boatyard and kill me!!!

    LOL XXX

  108. HMMMMMMM!! Think about this one, people. If your cell phone and its mic and camera are all “tappable”, why couldn’t your cable tv box, analog-digital tv converter box, or your satellite reciever all be “tappable” as well? The answer is “THEY CAN!” In fact, those devices have been used for nearly three decades for exactly that purpose. That cover on that capability was nearly blown during the collapse of the Soviet Union. In Romania, it was widely publicized that telephones, televisions, and other hardwired bugs were all being monitored at underground facilities which were invaded and destroyed by citizens after the government fell there. In the US, we think our government would never, but the truth of the matter is that our government was only prevented from tapping our phones without a warrant by the Privacy Act of 1973. They were never prevented by law from using other tappable electronic devices, because nobody believed those devices to be tappable at that time. If you check, you will see that the first cable television networks came into being shortly after the passage of the Privacy Act. What most think is a one-way connection to your television is actually a transmit/receive connection into your living room and the rest of your home.

    THINK ABOUT THAT FOR A MINUTE…..

    • In addition to the above, some of you may recall just a couple of years ago Congress and the US Department of Justice were at odds over whether or not internet access in general was tappable without a warrant. The DOJ said it was not, because it was covered under the Privacy Act of 1973. If you read further, the DOJ actually said that if Congress were to extend the Privacy Act to protect internet traffic and communication, many of their long-term monitoring operations would be detrimentally effected. It argued that access to the internet – even when connected via dial-up or dsl through telephone lines – was much like cb or ham radio communication – it should be considered as in the public domain and without expectation of or right to personal privacy.

    • In addition to the above, some of you may recall just a couple of years ago Congress and the US Department of Justice were at odds over whether or not internet access in general was tappable without a warrant. The DOJ said it was not, because it was covered under the Privacy Act of 1973. If you read further, the DOJ actually said that if Congress were to extend the Privacy Act to protect internet traffic and communication, many of their long-term monitoring operations would be detrimentally effected. It argued that access to the internet – even when connected via dial-up or dsl through telephone lines – was much like cb or ham radio communication – it should be considered as in the public domain and without expectation of or right to personal privacy.

  109. In addition to the above, some of you may recall just a couple of years ago Congress and the US Department of Justice were at odds over whether or not internet access in general was tappable without a warrant. The DOJ said it was not, because it was covered under the Privacy Act of 1973. If you read further, the DOJ actually said that if Congress were to extend the Privacy Act to protect internet traffic and communication, many of their long-term monitoring operations would be detrimentally effected. It argued that access to the internet – even when connected via dial-up or dsl through telephone lines – was much like cb or ham radio communication – it should be considered as in the public domain and without expectation of or right to personal privacy.

  110. ummmm creepy very creepy…. I had some number I didn’t know call my phone and was just breathing in the mouth piece…. then I had someone following me in a car all the way to my home…….. I don’t like knowing that some little puke face can sit there and listen in to my conversations, my text messages etc… including when my phone isn’t in use…. some people are really sick and twisted…. but how are you supposed to remove a battery with the iPhone?? it’s built in!….. Is anybody really safe anymore with all this bulls*t happening?????

  111. ummmm creepy very creepy…. I had some number I didn't know call my phone and was just breathing in the mouth piece…. then I had someone following me in a car all the way to my home…….. I don't like knowing that some little puke face can sit there and listen in to my conversations, my text messages etc… including when my phone isn't in use…. some people are really sick and twisted…. but how are you supposed to remove a battery with the iPhone?? it's built in!….. Is anybody really safe anymore with all this bulls*t happening?????

  112. I happen to know the military was experimenting with human resonance "death waves".

    Whether or not it became that sound weapon that showed up at the recent G-20 meet or was seen in NYC at a protest is unknown to me

    What was the freq they were using? This is an easy one if you know of what you speak

  113. seriously if its that intense, leave the city…the country even. delete facebook, twitter, myspace, whatever social networking sites used, get a new phone with a new carrier and a new account number, change your name, your email, make sure that your company knows of the situation and doesn't release any information whether you're in the building or not, cell phone numbers, if youre on lunch, even if you are an employee there or not. whatever you gotta do to distance yourself from someone crazy like that would clearly be worth it.

    stuff like that is crazy. i cant believe privacy is so easily breached. people should be able to protect themselves from stalkers. it may be conveinient to check where friends are via GPS software mentioned in the comment from the brother & sister situation for 10$… it would be great to just click a few buttons and see if any of my friends were nearby if im out, but at the same time, super creepy if someone was using technology to stalk you and potentially cause harm… so creepy.

    *shudders* good luck with that.

    <3 k.

  114. go to you tmobile website change your password to get in.change you phone number too.dont click on text you dont know that went you get hack in too cell you, it happened to me.go to your tmobile website where you all text and picture are and change the password .and change your voice mail password.dont let noone know your voicemail password.when you phone is hack or have a bug,you can hear while you talking clicking noises,background,or this noise shhhhhhhhhh.you can heard ppl talking in your line voicesor sound that you are in 3 way call like a you have your microphone on.that some symptom

  115. If I have a verizon wireless LG ENV 3 that I suspect has some eavesdropping software put on it. I’m not worried about being tracked, only being listened too. If I go to the verizon store and get a new phone but it is the same number and service and everything, would the software be disabled?

  116. If I have a verizon wireless LG ENV 3 that I suspect has some eavesdropping software put on it. I'm not worried about being tracked, only being listened too. If I go to the verizon store and get a new phone but it is the same number and service and everything, would the software be disabled?

  117. Interesting article here. Its in my view that there are Radio Waves (frequencies..asked Kenneth and he declared it too) at very low levels are being used to follow the phone to anywhere in the world. Your article stated that the Sim Card needs to be inserted and/or the battery needs to be hooked up in order for it to work, however, inserting the battery and powering it up for normal use uses a different level of frequency before it actually is put to use. So, whatever the weather, day or night, , 24/7,365 non-stop evaluation is possible..you would need the equipment that can read radio waves..differing levels. Radio companies have the technologies, the special forces have the equipment, the rogues on the street have them too. They say evil comes in three’s..there are lots more, eye-opening things that seem so basic one could kick themselves silly not knowing them. Hope you are not bugged by this..on the other hand if you are..then how do you get rid of them?

  118. Interesting article here. Its in my view that there are Radio Waves (frequencies..asked Kenneth and he declared it too) at very low levels are being used to follow the phone to anywhere in the world. Your article stated that the Sim Card needs to be inserted and/or the battery needs to be hooked up in order for it to work, however, inserting the battery and powering it up for normal use uses a different level of frequency before it actually is put to use. So, whatever the weather, day or night, , 24/7,365 non-stop evaluation is possible..you would need the equipment that can read radio waves..differing levels. Radio companies have the technologies, the special forces have the equipment, the rogues on the street have them too. They say evil comes in three's..there are lots more, eye-opening things that seem so basic one could kick themselves silly not knowing them. Hope you are not bugged by this..on the other hand if you are..then how do you get rid of them?

  119. Disclosure…. I work for att mobility tech support.

    Dont want to be tracked monitored etc? GET A TRACK PHONE and be really really careful who you call with it.

    Yes Cell phones do “ping” the network in on or off state. The CIA learned this the hard way conducting a rendition in Italy bout 6 yrs ago, its all over the net. Most newer model tier 2 phones (medium cost) have GPS capability which can be manipulated.

    Some devices have a auto delete feature for SMS and MMS messages. Once the device mem is full the individual SMS and MMS get deleted to make way for incoming content.

    Abusers and Harrassers….. REPORT THEM TO THE POLICE and get a Restraining Order. After all the tracks of thier behavior are right there on your device.

    And please dont call ATT about the govt tracking you… if the government as decided to track you….there isnt a damn thing a technician at ATT can do for you. I suggest you call your congressman….

  120. Disclosure…. I work for att mobility tech support.

    Dont want to be tracked monitored etc? GET A TRACK PHONE and be really really careful who you call with it.

    Yes Cell phones do "ping" the network in on or off state. The CIA learned this the hard way conducting a rendition in Italy bout 6 yrs ago, its all over the net. Most newer model tier 2 phones (medium cost) have GPS capability which can be manipulated.

    Some devices have a auto delete feature for SMS and MMS messages. Once the device mem is full the individual SMS and MMS get deleted to make way for incoming content.

    Abusers and Harrassers….. REPORT THEM TO THE POLICE and get a Restraining Order. After all the tracks of thier behavior are right there on your device.

    And please dont call ATT about the govt tracking you… if the government as decided to track you….there isnt a damn thing a technician at ATT can do for you. I suggest you call your congressman….

  121. Any info on Iphone spying? Can someone view every website you visit even though you’ve erased your history? My phone is passcode locked however nothing is safe anymore.

  122. Any info on Iphone spying? Can someone view every website you visit even though you've erased your history? My phone is passcode locked however nothing is safe anymore.

  123. Okay I’m not exactly the brightest crayon in the box so must of what you guys are rambling on about I don’t understand! I definitely know something is up btw (I’m 17) & my ex bf was 20 & I got a restraining order against him & I swear I think he has hacked into my phone sometimes when I go in my phone book all of my numbers rearrange their self its usually only for a split sec but still! & then sometime after I snap a pic or vid & go back to view it before it lets me view it says please wait accessing device!wtf? I don’t wanna sound like a psycho but I’m really scared if anyone knows how I could find out if its really happening & how I could stop it I would deeply appreciate it,
    btw my company is teen mobile & I have a motorolla razor

  124. Okay I'm not exactly the brightest crayon in the box so must of what you guys are rambling on about I don't understand! I definitely know something is up btw (I'm 17) & my ex bf was 20 & I got a restraining order against him & I swear I think he has hacked into my phone sometimes when I go in my phone book all of my numbers rearrange their self its usually only for a split sec but still! & then sometime after I snap a pic or vid & go back to view it before it lets me view it says please wait accessing device!wtf? I don't wanna sound like a psycho but I'm really scared if anyone knows how I could find out if its really happening & how I could stop it I would deeply appreciate it,

    btw my company is teen mobile & I have a motorolla razor

  125. hey, ok, my mail is required to see many sites, but why my java security crashes when tryin to check out Flexispy, only after allowing the certificate, can I see the site???
    and.. cryptogon doesnt sound friendly, either.

  126. tracking via relays… doable, because it simply means getting the info from the phone services provider. but installing the software means the targeted phone has an operating system, right? so just use non-os phones, you don't really need those functions… ;)

    btw, eavesdropping means getting free data transmission from the provider? i think i saw this question put a bit differently, but anyway, that would be a nice "unlimited free time" between mutually rigged phones :))

  127. listen, I’m a scary guy, with a sordid history and the looks and intelligence to match. The best thing to me is being scarier than the boogie man. If someone wants to cause a problem with me, they will have one hell of a psycho on their hands who has no problem taking a few pages out of the kgb’s playbook.
    I don’t give a bleep if anyone hears what I am saying because I am not selling drugs “@ the moment ;)” and if someone comes back @ me with the things I have said on the phone they are instantly interrogated and will be lucky and thankful to escape w/their lives.
    Feel lucky? Try 2 mug/roll this one ;)….

  128. Psychosis can be earned and that’s when it gives you tremendous clarity, intelligence and power

  129. listen, I'm a scary guy, with a sordid history and the looks and intelligence to match. The best thing to me is being scarier than the boogie man. If someone wants to cause a problem with me, they will have one hell of a psycho on their hands who has no problem taking a few pages out of the kgb's playbook.

    I don't give a bleep if anyone hears what I am saying because I am not selling drugs "@ the moment ;)" and if someone comes back @ me with the things I have said on the phone they are instantly interrogated and will be lucky and thankful to escape w/their lives.

    Feel lucky? Try 2 mug/roll this one ;)….

  130. Is cell phone spying illegal and who would a person contact to file a complaint? I know for a fact my NOT SOON ENOUGH TO BE EX-son in law did this to my phone, and probably my daughter’s. Verizon fraud department is who told me that is probably what was going on, but when I went to the Verizon store they acted like I was crazy. I had all the signs – phone lighting up for no reason, battery dying quickly, clicking noises when I talked on the phone, and he knew things that my daughter had only texted to me. Even with all of the “evidence”, it was hard for me to believe, but I got a new phone and number anyway. Then, as if to rub it in my face, the SOL sends me a message with a facebook page for my grandsons (whom he is not allowed contact except 2 hours/week supervised by CPS because he is a PSYCHO) with photos on it that had only been on my cell phone, and I had never sent them to anyone or downloaded them anywhere!!! This is proof, right? And I want to know who to contact to prosecute this Satan’s spawn! Any help would be GREATLY appreciated!

  131. Is cell phone spying illegal and who would a person contact to file a complaint? I know for a fact my NOT SOON ENOUGH TO BE EX-son in law did this to my phone, and probably my daughter's. Verizon fraud department is who told me that is probably what was going on, but when I went to the Verizon store they acted like I was crazy. I had all the signs – phone lighting up for no reason, battery dying quickly, clicking noises when I talked on the phone, and he knew things that my daughter had only texted to me. Even with all of the "evidence", it was hard for me to believe, but I got a new phone and number anyway. Then, as if to rub it in my face, the SOL sends me a message with a facebook page for my grandsons (whom he is not allowed contact except 2 hours/week supervised by CPS because he is a PSYCHO) with photos on it that had only been on my cell phone, and I had never sent them to anyone or downloaded them anywhere!!! This is proof, right? And I want to know who to contact to prosecute this Satan's spawn! Any help would be GREATLY appreciated!

  132. Oh yes they are listening to us through our cell phones. I was waiting for my at&t plan to expire to get different cell phones. Finally the plan expired got some cheap pre paid phones and within a week all the cell phones in the house were infected. They must of kept one of my friend’s or family member number as a contact, to find out our new numbers. These people are sick they been listening to us for aprox 4 years, they make fun of everything they hear even when phones are not being used, it’s like having a mic on all the time. Now as soon as we get home we peel off the battery, remove the sim card and keep them far away from us, in another room. I got infected while I was participating in a forum online. I made a friend there, I send her an e-mail letting her know my cell number, they propably were hacking me and saw my info there or I got infected through my friend. They were also listening on her too, she ended up moving to another state because these people were letting her know, that they even knew what she was wearing for the day. Police treated me like this was not possible and beside the people were from another state, they just could not help me. I suggest everyone peel off those batteries, and when you are using your cell phone don’t talk private stuff like social security numbers, credit card info, because you never know…

  133. Oh yes they are listening to us through our cell phones. I was waiting for my at&t plan to expire to get different cell phones. Finally the plan expired got some cheap pre paid phones and within a week all the cell phones in the house were infected. They must of kept one of my friend's or family member number as a contact, to find out our new numbers. These people are sick they been listening to us for aprox 4 years, they make fun of everything they hear even when phones are not being used, it's like having a mic on all the time. Now as soon as we get home we peel off the battery, remove the sim card and keep them far away from us, in another room. I got infected while I was participating in a forum online. I made a friend there, I send her an e-mail letting her know my cell number, they propably were hacking me and saw my info there or I got infected through my friend. They were also listening on her too, she ended up moving to another state because these people were letting her know, that they even knew what she was wearing for the day. Police treated me like this was not possible and beside the people were from another state, they just could not help me. I suggest everyone peel off those batteries, and when you are using your cell phone don't talk private stuff like social security numbers, credit card info, because you never know…

  134. Anyone who thinks their cell phone transmission is safe is in for a rude awakening. Everyone here at the John R. Carlisle Institute has installed a new cell phone fire wall to protect against that situation. Especially after those guys just released the code to unlock the encryption recently.

    John R. Carlisle

  135. This is an interesting article; I think the question that most should be asking is:
    Not if this is it possible, but who is really at risk of being a target for this type of activity?
    Maybe someone in an abusive relationship or with an overly jealous partner, someone who is going through a divorce, someone who has knowledge that others may regard as of value, someone involved in criminal activities or even someone in the media spotlight.
    This is not a conclusive list, just hopefully thought provoking. If I were to find myself in this situation, I would be inclined to take the advice of “Enemy Of The State” who posted on May 27 2009.
    The level of technology that is available to the man on the street is now close to that of Government agencies only a few years ago, that said, it mostly relies on the target having reasonably high-end equipment. The only real way to be 100% sure is to stop carrying a mobile phone, the next best is to use a very basic handset, preferably one that is at least five or more years old.

  136. This is an interesting article; I think the question that most should be asking is:

    Not if this is it possible, but who is really at risk of being a target for this type of activity?

    Maybe someone in an abusive relationship or with an overly jealous partner, someone who is going through a divorce, someone who has knowledge that others may regard as of value, someone involved in criminal activities or even someone in the media spotlight.

    This is not a conclusive list, just hopefully thought provoking. If I were to find myself in this situation, I would be inclined to take the advice of “Enemy Of The State” who posted on May 27 2009.

    The level of technology that is available to the man on the street is now close to that of Government agencies only a few years ago, that said, it mostly relies on the target having reasonably high-end equipment. The only real way to be 100% sure is to stop carrying a mobile phone, the next best is to use a very basic handset, preferably one that is at least five or more years old.

  137. I know that my cell phone is being tapped illegally. I am suing a major company and ever since I filed suit I have heard the clicks on my phone-this has been going on about a year. I have recently found out that my cell phone provider is not allowing this to happen, so it is obviously someone with some sophisticated software or equipment. My question is this: How can I find out WHO is responsible for this? Is there some software I can purchase to find this information out? I NEED to find out who is doing this. Any help on this subject would be greatly appreciated.

  138. I know that my cell phone is being tapped illegally. I am suing a major company and ever since I filed suit I have heard the clicks on my phone-this has been going on about a year. I have recently found out that my cell phone provider is not allowing this to happen, so it is obviously someone with some sophisticated software or equipment. My question is this: How can I find out WHO is responsible for this? Is there some software I can purchase to find this information out? I NEED to find out who is doing this. Any help on this subject would be greatly appreciated.

  139. Stop hacking on david you morons. If your so smart then why are there hundreds of TI,s. I have been harrassed with 24/7 forced telepathy. They take turns insulting and belittleing me non stop. They always like to say things that will have the impact they want.Like its not a free country anymore. Are you familiar with all of the CULT groups of history. Well my perps also did scientology auditing non stop. They want to do the reverse of dianetics, black dianetics to plant thier thetans and memes… But i just keep my hopes and faith in humanity on the whole… They hide and they are very careful not to get sloppy and caught…..Years of constant psychic driving remotely along with every type of psychic harrassment… It can and does drive a lot of people to insanity and suicide. Here in the midwest its the war on drugs newest program… Evil cult groups will blame the good intentioned church groups for thier crimes… Sneaky way to persecute christians… They helped form the tax free govt. grant programs that good FBO,s get involved in… The DEA,s program [weed and seed] along with churches and citizencorp,americorps,infragaurd, homeland security…..Read about it before you go disrespecting poor david.. Its true as you will ever know. Like hitlers plan was…

  140. Stop hacking on david you morons. If your so smart then why are there hundreds of TI,s. I have been harrassed with 24/7 forced telepathy. They take turns insulting and belittleing me non stop. They always like to say things that will have the impact they want.Like its not a free country anymore. Are you familiar with all of the CULT groups of history. Well my perps also did scientology auditing non stop. They want to do the reverse of dianetics, black dianetics to plant thier thetans and memes… But i just keep my hopes and faith in humanity on the whole… They hide and they are very careful not to get sloppy and caught…..Years of constant psychic driving remotely along with every type of psychic harrassment… It can and does drive a lot of people to insanity and suicide. Here in the midwest its the war on drugs newest program… Evil cult groups will blame the good intentioned church groups for thier crimes… Sneaky way to persecute christians… They helped form the tax free govt. grant programs that good FBO,s get involved in… The DEA,s program [weed and seed] along with churches and citizencorp,americorps,infragaurd, homeland security…..Read about it before you go disrespecting poor david.. Its true as you will ever know. Like hitlers plan was…

  141. My wife is cheating on me can anyone out there help me with how to acquire one phone spy software? Please I’m serious I need help!

  142. I thought it was only the government that had this type of software..It is concerning that the price we pay for all the technology we have is with our privacy being exposed.

    Looks like im back to using the old pager and phonebox!

    Very good article. A real eye opener. Thanks.

  143. I thought it was only the government that had this type of software..It is concerning that the price we pay for all the technology we have is with our privacy being exposed.

    Looks like im back to using the old pager and phonebox!

    Very good article. A real eye opener. Thanks.

  144. Listen people. I have been working for Siemens cellular for 10 years writing software for the base stations. Your cell phone cant be contacted when its switched off. That story about removing the battery is an urban legend. When you switch on your phone the first thing that happens is a call to register your nearest cell tower in the database. Before that call happens your whereabouts are NOT known. Your cell phone is DEAD when it is switched off. When it is switched on there are periodic data exchanges to check that your phone didn't die in the meanwhile. Switching your phone off normally removes you from that database. I can only speak for normal cell phones. Any person that says you have to remove the battery is talking utter and complete nonsense.

  145. Dear Andries

    I had boght a cell phone from a person at the past.But some times later he wanted me giving back the phone for a special reason.I accepted that and gave him the phone back without sim card. Then he brought the phone and said everything is ok.But I am suspecting on that someone listens my phonecalls now. I have rigid evidence to approve that. So I want to know that is it possible to hack the phone without sim card ?

    best wishes ,
    Oral

  146. Dear Andries

    I had boght a cell phone from a person at the past.But some times later he wanted me giving back the phone for a special reason.I accepted that and gave him the phone back without sim card. Then he brought the phone and said everything is ok.But I am suspecting on that someone listens my phonecalls now. I have rigid evidence to approve that. So I want to know that is it possible to hack the phone without sim card ?

    best wishes ,

    Oral

  147. Oral, Yes it is very possible. The base stations use both your telephone number as well as your IMEI number to identify your calls. The IMEI number is a hardware number that identifies your cell phone regardless of the sim. Sorry.

  148. Oral, Yes it is very possible. The base stations use both your telephone number as well as your IMEI number to identify your calls. The IMEI number is a hardware number that identifies your cell phone regardless of the sim. Sorry.

  149. Can a cell phone be alerted when a number has been dialed or texted from another phone?

  150. What is a good siftware to be used in the US? Also, what if I don’t have access to the “target phone”, is there something available?

  151. What is a good siftware to be used in the US? Also, what if I don't have access to the "target phone", is there something available?

  152. IF you didnt know you could do this stuff YEARS ago then you arent as geeky as you think you are. For god’s sake Google Latitude is in the same league and no one has gone mental. Privacy is for the nervous.

  153. IF you didnt know you could do this stuff YEARS ago then you arent as geeky as you think you are. For god's sake Google Latitude is in the same league and no one has gone mental. Privacy is for the nervous.

  154. Other than your location, which is traceable through the cell towers and GPS system (nothing new at all), the only way people can spy on your phone is if SOMETHING IS INSTALLED ON IT that gives them access. That’s really tough to do without your permission – not completely impossible, but tough.

    And it’s no different than with computers. Someone needs to put a “virus” of some sort on your phone. You can easily avoid that if you never purchase apps from un-trusted sources (like the app stores available to hacked/jail-broken phones or the open app store(s) available for Android). Also, don’t let anyone you don’t completely trust borrow your phone for a while to use or service. Put a lock code on your phone so somebody can’t do anything to it if they find it when it’s locked.

    I imagine, too, that it’s just a matter of time before phones start coming with beefed up security and anti-virus apps become available or included.

    Just be aware and stay vigilant and cautious, without getting overly paranoid, and you’ll be just fine and can go on enjoying your life.

  155. Other than your location, which is traceable through the cell towers and GPS system (nothing new at all), the only way people can spy on your phone is if SOMETHING IS INSTALLED ON IT that gives them access. That's really tough to do without your permission – not completely impossible, but tough.

    And it's no different than with computers. Someone needs to put a "virus" of some sort on your phone. You can easily avoid that if you never purchase apps from un-trusted sources (like the app stores available to hacked/jail-broken phones or the open app store(s) available for Android). Also, don't let anyone you don't completely trust borrow your phone for a while to use or service. Put a lock code on your phone so somebody can't do anything to it if they find it when it's locked.

    I imagine, too, that it's just a matter of time before phones start coming with beefed up security and anti-virus apps become available or included.

    Just be aware and stay vigilant and cautious, without getting overly paranoid, and you'll be just fine and can go on enjoying your life.

  156. you say you know how to fix illegal monitoring….i am walking in your shoes and having difficult time with people believing this can even happen including proper authorities as you’ve said don’t have knowledge. im certain i can empathize with you as you said it quite well. how can we work, raise family and stay in sane when your every move is a ‘sick individuals’ form of control. any help would be appreciated so i can stop the pattern. thank you.

  157. you say you know how to fix illegal monitoring….i am walking in your shoes and having difficult time with people believing this can even happen including proper authorities as you've said don't have knowledge. im certain i can empathize with you as you said it quite well. how can we work, raise family and stay in sane when your every move is a 'sick individuals' form of control. any help would be appreciated so i can stop the pattern. thank you.

    • like i said earlier the more they stalk invade privacy the more research you should do and tell no one play dumb do what they do but do it better a step ahead write it all down document it tell one person you trust all thats going on depending on the reasons why they would find you interesting enough to stalk, if its life threating take names stalk them track them involve few people and look at it as a compliment that people care enough to do this more than likely there on drugs which makes the organized stalking more fun meth users love these games and once you are aware of the tactics technologies and peoplee involved you fish let em bite and then decide what you want to do for retaliation, dont be scared be smart dont involve pigs it will only make a mess messier have fun with it all you who are tripping out wondering what to do need to see past your nose take the shit out your eyes and realize that there is a solution to these problems it is easy just keep quiet bribe people lure them paly the game or use payphones change email acounts use the computer at the libary ive been stalked by people i think of as freinds and they think im clueless but in reality i no ther every move, im one hundred percent sure you can track listen monitor peoplles daily activities via cell phones computers etc ive got video pics journals proof that this is alll true and even a website with the names and methods and activities of my stalkers and i work full time it doesnt take much effort just a little patience manipulation and bribes to find out whats whos whys and weres and better technology and the rest is self explanitory. my story involves a great group of lowlife tweakers and an ex gf who is a prostitute a man i still have respect for and see as a father figure that is dangerous if gets angry and others that pretend to be freinds but really collaberate together and try to infilltrate my real freinds coworkers etc this is real shit no joke and someday ill publish it and let expose the reality of the cell computer gps eavesdropping sick game for what it is and hopefully my documentation of all this will will bring me fortune and fame and expose thes lames that are involved for what they really are dumb jobless lifeless meth addicts that have nothing better to do than try to outsmart a drunken roofer with a make fun out of a weird crazy unbeliveable movie like drama scenario that in the end will be there downfall cause no matter what it will all come out in the wash as long as they wana play im more than happy to keep documenting there methods and stay a step ahead relay all my goodies to trusted few and laugh as we review the past eleven months of there tweaked out lil game that is why im writing this cause they read it via remote viewing as i write it and send it to the trusted few to enjoy another episode of a day in my stalked life paul rosa and the rest of the crew go to bed stop playing yourselfs cause if it dont stop you will will will lose all respect from the few respectable people you no. goodnite now im going for a walk to the school get your binoculars and hide in the bushess as i have a frend recording you stalking me to add to my library of stalkers gone bad on drugs. lol goodnite haha there all going to laugh at u in the end

    • like i said earlier the more they stalk invade privacy the more research you should do and tell no one play dumb do what they do but do it better a step ahead write it all down document it tell one person you trust all thats going on depending on the reasons why they would find you interesting enough to stalk, if its life threating take names stalk them track them involve few people and look at it as a compliment that people care enough to do this more than likely there on drugs which makes the organized stalking more fun meth users love these games and once you are aware of the tactics technologies and peoplee involved you fish let em bite and then decide what you want to do for retaliation, dont be scared be smart dont involve pigs it will only make a mess messier have fun with it all you who are tripping out wondering what to do need to see past your nose take the shit out your eyes and realize that there is a solution to these problems it is easy just keep quiet bribe people lure them paly the game or use payphones change email acounts use the computer at the libary ive been stalked by people i think of as freinds and they think im clueless but in reality i no ther every move, im one hundred percent sure you can track listen monitor peoplles daily activities via cell phones computers etc ive got video pics journals proof that this is alll true and even a website with the names and methods and activities of my stalkers and i work full time it doesnt take much effort just a little patience manipulation and bribes to find out whats whos whys and weres and better technology and the rest is self explanitory. my story involves a great group of lowlife tweakers and an ex gf who is a prostitute a man i still have respect for and see as a father figure that is dangerous if gets angry and others that pretend to be freinds but really collaberate together and try to infilltrate my real freinds coworkers etc this is real shit no joke and someday ill publish it and let expose the reality of the cell computer gps eavesdropping sick game for what it is and hopefully my documentation of all this will will bring me fortune and fame and expose thes lames that are involved for what they really are dumb jobless lifeless meth addicts that have nothing better to do than try to outsmart a drunken roofer with a make fun out of a weird crazy unbeliveable movie like drama scenario that in the end will be there downfall cause no matter what it will all come out in the wash as long as they wana play im more than happy to keep documenting there methods and stay a step ahead relay all my goodies to trusted few and laugh as we review the past eleven months of there tweaked out lil game that is why im writing this cause they read it via remote viewing as i write it and send it to the trusted few to enjoy another episode of a day in my stalked life paul rosa and the rest of the crew go to bed stop playing yourselfs cause if it dont stop you will will will lose all respect from the few respectable people you no. goodnite now im going for a walk to the school get your binoculars and hide in the bushess as i have a frend recording you stalking me to add to my library of stalkers gone bad on drugs. lol goodnite haha there all going to laugh at u in the end

  158. YESSSS!!!!!! This happened to me. It is a method of control, harassment and attempted humiliation.

    • if you think your cell, computer or anything else is being tapped monitored etc, lure them by sending false texts emails conversations lead them the wrong direction if your smart and there truely stalking you set em up lead them with false info get them were you want em be pateint, keep quiet and flip the script i am doing it right now outsmart the stalkers dumbasses

  159. YESSSS!!!!!! This happened to me. It is a method of control, harassment and attempted humiliation.

    • if you think your cell, computer or anything else is being tapped monitored etc, lure them by sending false texts emails conversations lead them the wrong direction if your smart and there truely stalking you set em up lead them with false info get them were you want em be pateint, keep quiet and flip the script i am doing it right now outsmart the stalkers dumbasses

  160. How is it that people are recieving texts from my cell number and it is not me sending them but records show it is from my phone?

  161. How is it that people are recieving texts from my cell number and it is not me sending them but records show it is from my phone?

  162. i consider it was a bit rushed, and omitted some options that not many people discuss about. Everyone is aware of that the majority new smartphones have internet, so why present that primary perform at its bear minimum. Scroll up scroll down zoom in zoom out. Actually? which new phone doesnt try this? How bout speak about how the text rearranges itsself. Additionally the texting, very poor review. Why didnt you mention you should utilize the mic and text along with your voice? Overlooked ALOT of different extra essential features

  163. i consider it was a bit rushed, and omitted some options that not many people discuss about. Everyone is aware of that the majority new smartphones have internet, so why present that primary perform at its bear minimum. Scroll up scroll down zoom in zoom out. Actually? which new phone doesnt try this? How bout speak about how the text rearranges itsself. Additionally the texting, very poor review. Why didnt you mention you should utilize the mic and text along with your voice? Overlooked ALOT of different extra essential features

  164. There are already Firewall, Anti-spyware, Anti-spam, and Antivirus programs for smartphones from many companies, such as Symantec (Norton), AVIRA, NOD32, etc. Not for cellphones though.

  165. My friend has a man that has been trying to get her to date him for months. For reasons that don't matter, she has repeatedly refused his offers. Well, her phone was stolen and he offered her a phone to use until she could afford to buy a new one. It was a different kind of phone than she had before. It would shut off and light up when it was not in use, when I would talk to her her end echoed so bad I could hardly understand what she was saying. The battery would run down fast. Someone told her that they suspected that it was bugged she called verizon and they restored it back to factory settings and she continued to use it for a couple more weeks until she bought a new verizon phone. Now the screen on her new touch phone is glitching….would that man need to get his hands on the new phone to infect it???? And does restoring to factory settings get rid of a bug in a cell phone, also, can her phone be infected by his text messages or any other way besides having it in his possession????
    PLEASE…someone answer my questions…I feel like this man is dangerous and has this young girl totally fooled.

  166. im from the philippines…can you hear the conversation in other country,,using this spy phone??

  167. I was being spied for almost a yr now :-( everytime i hear a click when i am talking on the phone I just turn it off. Until I found out this article. I was really shocked. I couldn't even imagine that they can still listen to you even your phone is turned off already.

    Is it 100 percent sure that they can no longer listen to you if the battery is being removed?

  168. Is it possible for someone to retrieve your information from your phone if your bluetooth is turned off

  169. You can file a lawsuit or something, there are laws in many countries that prohibit and punish this kind of privacy violation (unless you live in a muslim country where women are as human as a chair). I'd personally get a divorce, whoever spies on you like that is either too sick or doesn't trust you at all – he's not husband material.

  170. Threatens to kill you and your children. Now why the hell haven't you gone to the police or gotten the f*ck out of that house? Use your head.

    Your excuse would probably be "but I love him" and bla bla bla, but he has serious problems and NEEDS help. Death threats aren't normal! Do yourself a favor and go to the police, tell them your problems and ask them how to stop this. DO SOMETHING! Your CHILDREN are in danger with a devious man who a) spied on his wife and b) threatens her and her children. Do you love your kids? Are you worried about their welfare? Doesn't sound like it. Bad mom.

    • I agree. I have a husband who also purchased the spyware from Blueware. He claims that he has proof that I have cheated on him which I find interesting because I never have. As a result, he became more and more psysically abusive and has threatened to either kill or beat me to a pulp. I left him and am currently filing for a divorce. It's not worth it…especially when there are children involved!!!!

      I don't understand why this type of software is openly available to the public. Someone with a mental disorder (which my husband was also diagnosed with) can take innocent words and twist them. There is a warning from the software company informing people, if they are not the owner of the phone, spying is considered an offence. However, noone checks. Will there only be proper restrictions after someone gets murdered as a result?

  171. My phone was hijacked by my sister just in the past year. I had att for service. It was doing just as this article said a monitored phone would act. It would turn on even though I had powered it off. It would light up all by itself as if it were in use. When I'd be talking to someone, often my phone would drop calls, so I'd call them back, when I did, I could hear an echo, and/or I would hear some background noises that didn't make sense.

    She also hijacked BOTH, my laptop & desktop computers too. She was intercepting my emails, and I suspect she was even able to alter things I wrote, because my mom would sometimes tell me that my emails hurt her feelings, when I wrote nothing that should have hurt. Her hacking my computers has rendered almost both computers useless. The desktop crashed, when I tried to reinstall them to factory settings. It won't even load up now. I now have a new computer, but I never use the laptop for internet access for fear that she can still access it.

    Why, you may ask? I haven't a clue. Except my eyes have been opened to her being envious of the close and respected relationship with our parents.(she & her husb didn't bcuz of their many hair-brained get-rich-quick schemes that often crossed the borders of morals and/or legal ramifications.) THEN, while I lived with them for almost 2 years, at their request mind you. They started to systematically poison me, and then began to drive the wedges between me, our folks, and other siblings. What can I say, she's a sociopath. I had no clue until I lived with them. All true, blood tests confirmed it all.

    I have since dumped att, and have kept my phone nbs & email address as privately as possible. The detectives told me that people murder for 3 reasons, love, money or jealousy. I think they took out a life insurance policy on me(there's the money), They "worship" money.(there's the love), and they tried to destroy me completely to obtain our parents approvals(there's the jealousy).
    I even found evidence that she had been taking my stories and turning making them to be her own writings! SO, guard your phones. NEVER let anyone use your phone outside of your presence.

  172. This is an invasion of privacy…and I'm livid that someone could actually do this to me! How can someone protect themselves from this? There has to be a way! This is insane!!!

  173. My phone is unresponsive. Previously it lit up from time to time when I wasn't even touching it. Now I cant even use the phone. It starts up normally and I see the home screen but none of the buttons beside on/off work. If someone calls I cannot accept it or decline it. Just before this happened I was told during conversations that the other person kept hearing numbers being dialed and when the call ended my phone had stuff like "++##pp#+" on it as though I had really dialed it. This is scaring me!