Skip to main content

Is My Cell Phone Bugged Logo Is My Cell Phone Bugged? “Everything you need to know to know to keep your mobile communications private.”

Book Update

Is My Cell Phone Bugged? Book Cover

Thank you for purchasing (or considering the purchase of), “Is My Cell Phone Bugged.” A SpyWarn™ Mobile Sensor is mentioned in the book as an aid to detecting spyware on your phone. Technology has advanced a bit since the book was written. The SpyWarn™ Mobile Sensor was designed before recent transmission types were invented. The SpyWarn™ Mobile Sensor is no longer effective and is replaced by a self-timing method, and an automatic Android app evaluation, SpyWarn 2.0.

Self-timing Spyware Detection Technique

• Turn off Wi-Fi and Bluetooth.
• Turn off all apps. You don’t want legitimate app transmissions to be mistaken as spyware transmissions.
• Place your phone close to an AM radio, or other piece of electronic equipment with an amplifier. Listen for the noise the phone makes when it transmits.

Sample GSM transmission noise…

Sample CDMA2000 transmission noise.

• Keep track of the amount of time the phone transmits during a given period of time, as mentioned in the book.

Is My Cell Phone Bugged Timer

This stopwatch will make your observation easier and more accurate.

Math Help
To change hours and minutes (hh:mm) to all minutes… hours x 60 + minutes = all minutes

This handy Time Calculator adds and subtracts hours and minutes.

SpyWarn 2.0™ – Automatic Spyware Evaluation App – Android

If you have an Android phone, an app version of the test—SpyWarn 2.0™—automates the entire testing process for you. As a book buyer you may have the app free of charge. Purchase it from Google Play. Send in your receipt number and purchase date, and we will process a refund.

If you like the app, please write a positive review. If not, please tell us so we can improve it.

iPhones cannot be inspected with an app. Apple’s iOS does not allow it. Inspect iPhones use the timing method mentioned above, or simply reload the iOS software as that will wipe out any spyware.

Links, Definitions & Bonus Information

Book Glossary

AMPS, apps, Analog Transmission , Bluetooth, Cellular / Mobile Telephone, Circumstantial Evidence, CDMA, VAR, Cordless Headset, Cordless Telephone, DECT & DECT 6.0, Digital Transmission, DSS, FHSS, GSM Bug, GPRS , GPS, GSM, IMTS, Jailbreak, Malware, MMS, MTS, Pico-cell, TDMA, Trojan Horse, SIM, SMS, Spread Spectrum, Spyware, vCard, VoIP, UMTS, Wi-Fi Phone.
Telecom Glossary (5800 more definitions)

Additional Assistance

For a full forensic exam of your smartphone, tablet, or other personal electronics item, you may want to contact: Black Swan Digital Forensics.

Authentication & Encrypton

General: Password (MSCHAPv2), RSASecurID, x.509 Digital Certificates, Shared secret 802.1x authentication: EAP-TLS, EAP-TTLS, EAP-SIM, PEAP, LEAP, SafeNet


Bluetooth hacking video. Bluetooth automobile eavesdropping info.

Bluetooth Hacks: Bluejacking, BlueSnarfing, BlueBugging, HeloMoto, BlueSmack, and BlueSniping

Bluetooth Security: Guide to Bluetooth Security,

Cell Phones, Dumb

Dumb cell phones can not hold spyware, cannot GPS track and do not have Bluetooth capabilities. The least expensive way to assure you will not be tracked, eavesdropped, or have your information stolen by spyware is to use a dumb cell phone. Sources: BM70, Kyocera Marbl K127, Motorola W260g, Motorola C139, more

Cell Phones, Encrypted

Blackphone, Sectera, CryptoPhone, TopSec Mobile

Cell Phones, Encryption Software

SilentCircle, PhoneCrypt, Cellcrypt

Cell Phones, Security

Office of Technology Assessment / Congress of the US,

Developing an Effective Corporate Mobile Policy by BlackBerry

Cell Phones, Shielding Bags,, yondr

SIM Card Readers

google search

Cell Phones, Spy Tools

Spyware vendors, GSM bugs on eBay, GSM Bugs on the Internet

Cell Phones, Spyware Protection Apps

New York Times story about spyware protection apps.

SpyWarn™, Norton, F-Secure, Kaspersky, Lookout

Cordless Phones

Cordless Phone Frequencies – 900MHz, 1.9 GHz, 2.4GHz, 5.8GHz (with explanation)


Secure Network Communications: VPN (and see below), SSL/TLS, WPA / WPA2 / WPA3

Secure Platform Foundations: Runtime Protection, Mandatory Code Signing, Secure Authentication Framework, VPN protocols: Cisco IPSec, L2TP/IPSec, PPTP

Government Reports & Laws

The Wire and Electronic Communications Interception and Interception of Oral Communications Act (formally known as the “Title III” Wiretap Act, 18 U.S.C §§ 2510-2520)

Cell Phones as Tracking Devices, By M. Wesley Clark, J.D., LL.M.

Cell Phone Technology and Physical Surveillance, By M. Wesley Clark, J.D., LL.M.
NOTE: This link will automatically download an FBI Law Enforcement Bulletin entitled, may06leb_revised.pdf. The article appears in this pdf.

1978 Foreign Intelligence Surveillance Act (“FISA”, 50 U.S.C 1801 et seq)

The Electronic Communications Privacy Act of 1986 (“ECPA”, 18 U.S.C 2701)

Communications Assistance for Law Enforcement Act (“CALEA”, Public Law 103–414, 47 U.S.C. 1001–1010)

• USA Patriot Act

State Electronic Surveillance Laws, with links (sign-in required)

A Practical Guide to Taping Phone Calls and In-Person Conversations in the 50 States and D.C.” The Reporters Committee for Freedom of the Press

How Governments Locate & Track Cell Phones – Article 1, Article 2, Article 3

Bonus Resources

Murray Associates – Spyware Detection Clues

Apple: iOS Security

Mosquito Ring Tones

UV paint for ID marking your phone.

Reinstalling cell phone software.

The Gift of Fear and Other Survival Signals that Protect Us From Violence, by Gavin de Becker

DFI News Digital Forensic Investigator®


Background sounds: Subtle audio loops to play while conducting Duty Cycle tests on your cell phone:

Quiet Bus


Quiet Airplane

Highway Sounds

Rain Forest

Amusement Park

Airport Sounds

Airport Sounds II

People Talking

People Talking II

Highway Traffic

Crowd Talking Outdoors


Local Traffic

Internet sound samples. Recorded sound. The Alibi CD.

Virtual Private Networks (VPN)
Contains detailed information, advice and recommendations.

YouTube Videos

Links to videos on how cell phone spyware works.


Murray Associates is an independent security consulting firm, providing eavesdropping detection and counterespionage services to business, government and at-risk individuals.

Headquartered in the New York metropolitan area, a Murray Associates team can assist you quickly, anywhere in the United States, and internationally.

• More security tips, spy and privacy news at Be sure to sign up for the free email updates.
• Concerned about Spy Cameras? Learn how to detect them.


Helpful? Please let others know.


Helpful? Please help others.

Follow by Email