The leader in Eavesdropping Detection
and Counterespionage Consulting services
for business & government, since 1978.
Not for sale to the general public.
Available as a consulting supplement for our clients.
Limited time offer. Patent pending.
Licensing opportunity available.
SpyWarn Anti-Spyware Kit for Smartphones™
A unique security protocol to increase privacy.
Also makes a thoughtful and welcome gift.
1. SPYWARN MicSpike™
Your phone cannot be used for remote eavesdropping if the microphone is disabled.
Plug the MicSpike™ into the earphone jack when you need privacy.
The phone senses the plug's electronics and is tricked into thinking the MicSpike™ is an external microphone. Your internal microphone remains unusable until you remove your MicSpike™.
Use the SpyWarn MicSpike™ in these situations too:
• At confidential business meetings.
Have meeting participants to plug their cell phones during meetings. The Spywarn MicSpike™ will not prevent them from receiving and answering important emails and text messages.
• High security areas.
In areas where photos, recordings and phone calls are not allowed, security or reception can place a seal over the visitor's phone camera lens. A second seal is used to secure a MicSpike™ plug in the earphone jack. The serial numbers are recorded. When the visitor departs the area, seal integrity is checked, and the MicSpike™ plug is retrieved.
SpyWarn MicSpikes™ come individually, or in sets of 25 for boardroom / conference room use.
2. SPYWARN THERMAL SENSOR™
When your phone is transmitting or recharging it warms up. This is normal. However, if your phone warms up when you are not using it, suspect it has been activated by spyware, remote baseband hacking, or a denial of service Silent SMS attack.
The sensor adheres to the back of the phone. The three indicators turn slowly from black to red, one by one, as the phone's temperature rises.
Some phones may only illuminate the first indicator. Other phones may illuminate all three. Any unexpected rise in temperature is suspicious.
• The SpyWarn Thermal Sensor™ is used under very controlled conditions – when the phone is at room temperature (68º-74º F / 20º-23.3º C). Its detection capability declines when the ambient temperature is outside of this range.
• If you the phone has been used recently, or was in your pocket, it may take a while for it to reach room temperature.
• A change in any indicator's brightness (especially a 50% increase) is meaningful, assuming the ambient temperature is stable.
• Due to the variety of materials used in phones, the transfer of heat to the sensor will vary. Metals transfer heat faster than plastics, for example. Sensor response time will always lag real time events. Temperature may continue to rise even after a transmission ends. The important point is that a rise in temperature was sensed while you were not using the phone.
• The sensor is sensitive to the sun's harmful ultra-violet rays. Avoiding bright sunlight will extend the sensor's lifespan.
Most phones heat up unevenly across their surfaces. Exact spots and temperature vary with different models.
Before permanently attaching the sensor, conduct a few tests to determine the best location for placement. Tip: We can check your phone with our thermal imaging camera to find the best spot during our next visit with you.
A. Make sure the phone is at or near room temperature, turned on, and ready to receive a call. Place it face down on a table.
B. Lay the SpyWarn Thermal Sensor™ flat on the back of the phone; on top of the battery is usually a good location. You may want to temporarily tape down so that it makes good contact. Wait a minute. If the sensor illuminates you may be over a naturally warm circuit board. Move the sensor to a new location and wait for the red to disappear.
C. Make a call between your phone and another phone. Keep the connection open. Place your phone on the table, face down, with the thermal sensor laying flat on the back. As your phone warms, you should see the first indicator slowly turn red. If so, this is a good location for the sensor. If not, try another spot.
D. When you are satisfied the sensor is properly placed, permanently attach it to the rear of your phone.
When you are not using your phone leave it nearby, face down, and occasionally look at the strip. If you notice a red indicators have increased in number, and/or brightness, it is likely you phone has been activated.
Additional SpyWarn Thermal Sensors™ are available individually to our clients, at cost.
3. SPYWARN SECURITY SEAL™
SpyWarn Security Seals™ prevent secret removal of your SIM and SD memory cards for snooping or planting of spyware programs.
Phone SIM and SD memory cards contain a wealth of information: contacts, calls made, recent SMS text messages, photos, music, email, etc. SD memory cards can also store apps, including spyware apps.
How would you know if someone removed your SIM or SD cards; even if only for a few minutes?
Easy. Place a SpyWarn Security Seal™ over them.
The SpyWarn Anti-Spyware Kit for Smartphones™ contains two one-time-use high security seals, and also two wipe pads.
1. Clean the phone's surface with a wipe pad. Remove all grease and dirt. The seals require a clean surface for proper adhesion.
2. Peal off the seal's backing and very carefully apply them.
Try not to touch the adhesive. Do not try to reposition the seal.
A wipe pad may also be used to remove adhesive residue should you want to remove a seal or thermal sensor later.
Tip: Do not try to affix any part of the seal to your phone's glass screen. It will not stick. On iPhones, line up the top of the seal with the FLAT edge of the bezel. Fold the seal over to the back of the phone (as seen in the picture above).
Our seals have a semi-transparent hologram embedded in them for extra security. For super security and privacy, invisible ink is used for the lettering. Lettering only appears when illuminated with a UV black light (sold separately). Each seal has its own unique serial number.
Should someone try to remove the seal, it will self-destruct. It can not be put back in place again.
Place the seals over your SIM card slot (make sure the surface is grease-free and otherwise clean) If your phone has an SD memory card, place a seal over it too. The seals may be trimmed to size.
If you notice a seal is missing or appears damaged you will know someone has violated your phone.
Just having your cards sealed puts your snoop on notice that you are watching. This acts as a powerful deterrent against tampering.
SpyWarn Security Seals™ may be used to seal other smooth surfaced items, too...
• liquor and gun cabinets
• office and hotel room doors
• equipment cabinets
• desk phones
• desks, filing cabinets
• plastic boxes holding emergency keys
• computers / laptops - deter and detect...
-- lid lifting,
-- case opening,
-- camera use,
-- or insertion of unauthorized USB devices and CDs.
Use SpyWarn Security Seals™ in high-security locations.
When photos, recordings and phone calls are not allowed, a security officer or receptionist places a seal over the camera lens on the visitor's phone. A second seal is used to secure a SpyWarn Microphone Disabler™ plug in the earphone jack. The serial numbers are recorded.
When the visitor departs the area, seal integrity is checked, and the SpyWarn Microphone Disabler™ plug is retrieved.
Additional SpyWarn Security Seals™, Wipe Pads and Mini UV Black Lights for reading serial numbers are available individually to our clients, at cost.
SPYWARN™ Book & App
(FREE to clients)
Everything you need to know to keep your communications private.
Comes with a SpyWarn Mobile™ transmission sensor (for checking older phones only).
More information at: IsMyCellPhoneBugged.com
• SpyWarn™ 2.0 (app) (FREE to clients)
"The antivirus industry has a dirty little secret: its products are often not very good at stopping viruses." The New York Times
Common anti-spyware apps are ineffective. They only look for known viruses. New and well-hidden spyware goes unnoticed.
SpyWarn™ 2.0 is different. It spots infections by detecting what the spyware is doing.
And, ALL spyware is doing something.
SpyWarn™ 2.0 also detects remote baseband eavesdropping, something no other anti-spyware app even tries to do.
TIPS ABOUT PRE-BUGGED SPYPHONES
• Do not accept a phone given as a gift.
• Make sure your phone isn’t swapped with a spyphone. Mark your current cell phone so that you can identify it as yours. A subtle scratch mark or an invisible UV paint mark should do it. The SpyWarn Security Seal™ is also an excellent indicator by itself.
• Be suspicious if people tell you your phone was busy when you know you were not using it. Note: Some spyphone models won’t be busy when in spy mode due to dual phone numbers on their SIM cards. Your phone’s radio transmission will still be detectable, however. The SpyWarn Thermal Sensor™ and/or the SpyWarn™ Android app help detect unauthorized transmissions.
• Note unusually short battery life. This, plus the phone feeling warmer than usual, may indicate that the phone was being used in eavesdropping mode (assuming your battery is in good health otherwise).
TIPS ABOUT PREVENTING SPYWARE INFECTIONS
• Never loan your phone to someone else.
• Never let someone install a free ring tone, wallpaper, a “cool app” or an e-mail attachment they just sent you.
• Do not download an app, wallpaper, ring tones, etc., offered in an unsolicited text message or e-mail. (If you want this doodad, obtain it from the website after verifying that the provider is legitimate.)
• Use the most restrictive of your phone’s settings for apps and Internet access.
• Never let your phone out of your possession, ever.
• Do not jailbreak your phone. (Note: According to http://en.wikipedia.org/wiki/IOS_jailbreaking, “jailbreaking” is a process that allows iPad, iPhone, and iPod Touch users to run third-party, unsigned code on their devices by unlocking the operating system and allowing the user root access.)
• Lock your phone with a password. Keep it private. Change it occasionally.
• Do not use your old SIM card in your new phone. Conversely, do not put a new SIM card into your old phone. (Some spyware has the capability of detecting a SIM card swap and will immediately report your new phone number to the spy.)
• Limit the number of apps you download to the essentials. (Spyware has been known to masquerade as a “fun app.” Downloading a spyware app is an easy mistake to make—more so on some mobile operating systems than others, due to varying degrees of oversight by the system developers. Not all apps are well-screened by the app stores for spyware.)
• Inexpensive cell phones without extra connectivity do not have the capacity to hold spyware.
• Keep your phone turned off as much as possible, if practical.
• Change phones, SIM cards, and carriers once in a while.
TIPS FOR DETERRING FUTURE SPYWARE INFECTIONS
• Do not jailbreak your phone’s operating system software. This is your first line of defense against spyware attacks.
• Do not let your new phone out of your possession. It takes a snoop only minutes to activate spyware on your phone or pull your SIM card to read the information stored on it (contacts, etc.).
• Do not put a new SIM card into your old phone. This will not solve the problem. Some spyware has the capability to detect new SIM cards and will report the new phone number to the spy immediately, thus continuing your privacy problems.
• Do not sync a new device with the old device’s contacts/apps backup file. Syncing could bring your problem back to life. You may have backed up the spyware. Delete the backup. Start fresh.
Use your mobile device’s password feature.
• Set your device to lock after the shortest time of inactivity period.
• Use your SIM card’s password PIN feature to prevent unauthorized access to stored information.
Here is how this security feature works: If your PIN is entered incorrectly three times, the SIM card is blocked. You can then unblock it only by entering a personal unblocking code (PUC) provided by the service operator. If the PUC is entered incorrectly ten times, your SIM card will be permanently blocked and you will have to buy a new SIM card.
• Do not store any confidential information on your mobile device that you cannot afford to lose. Assume there is a possibility your phone will be stolen, lost, hacked, or infected with spyware.
• Never use any wireless device to access your bank and credit card accounts. This includes your wireless laptop and iPad devices as well.
• Keep current on your software updates. They frequently include security-related improvements.
• Download e-mail attachments only if you trust the source. Your basic policy should be “Unknown? Leave it alone.” Free ring tones, songs, and games fall into this category. Even if your source is a trusted friend, he or she may unknowingly be passing along spyware or other forms of malware.
Ask yourself, “Do I really need this?”
• Never install pirated software on your cell phone.
• Monitor the Usage log built into your device. Write down the usage at the beginning and end of the day. Keep an eye out for unexplained spikes in usage (both text and voice). This chore is made easier with a utility usage app that logs and charts usage for you. The SpyWarn™ Android app can help with this.
• Turn off your mobile devices when you are not using them. It sounds simple, but surprisingly, most people leave their devices on. If you can remove the battery, do that as well.
• Consider purchasing a second phone that no one else knows about. Keep it hidden, and use it only for your most important calls. Remember to turn off the caller ID function.
• If your phone supports dual calling, turn it off until you are positive your phone is not infected with spyware. This is the feature which allows a spy to eavesdrop on your phone calls in real-time.
• If your phone supports GPS, turn it off until you are positive your phone is not infected with spyware. This is the feature which allows a spy to track your location.
• Keep Wi-Fi and Bluetooth turned off until you need them.