Is My Cell Phone Bugged? “Everything you need to know to know to keep your mobile communications private.”
Thank you for purchasing (or considering the purchase of), “Is My Cell Phone Bugged.” A SpyWarn™ Mobile Sensor is mentioned in the book as an aid to detecting spyware on your phone. Technology has advanced a bit since the book was written. The SpyWarn™ Mobile Sensor was designed before recent transmission types were invented. The SpyWarn™ Mobile Sensor is no longer effective and is replaced by a self-timing method, and an automatic Android app evaluation, SpyWarn 2.0.
Self-timing Spyware Detection Technique
• Turn off Wi-Fi and Bluetooth.
• Turn off all apps. You don’t want legitimate app transmissions to be mistaken as spyware transmissions.
• Place your phone close to an AM radio, or other piece of electronic equipment with an ampliﬁer. Listen for the noise the phone makes when it transmits.
Sample GSM transmission noise…
Sample CDMA2000 transmission noise.
• Keep track of the amount of time the phone transmits during a given period of time, as mentioned in the book.
This stopwatch will make your observation easier and more accurate.
To change hours and minutes (hh:mm) to all minutes… hours x 60 + minutes = all minutes
This handy Time Calculator adds and subtracts hours and minutes.
SpyWarn 2.0™ – Automatic Spyware Evaluation App – Android
If you have an Android phone, an app version of the test—SpyWarn 2.0™—automates the entire testing process for you. As a book buyer you may have the app free of charge. Purchase it from Google Play. Send in your receipt number and purchase date, and we will process a refund.
If you like the app, please write a positive review. If not, please tell us so we can improve it.
iPhones cannot be inspected with an app. Apple’s iOS does not allow it. Inspect iPhones use the timing method mentioned above, or simply reload the iOS software as that will wipe out any spyware.
Links, Definitions & Bonus Information
AMPS, apps, Analog Transmission , Bluetooth, Cellular / Mobile Telephone, Circumstantial Evidence, CDMA, VAR, Cordless Headset, Cordless Telephone, DECT & DECT 6.0, Digital Transmission, DSS, FHSS, GSM Bug, GPRS , GPS, GSM, IMTS, Jailbreak, Malware, MMS, MTS, Pico-cell, TDMA, Trojan Horse, SIM, SMS, Spread Spectrum, Spyware, vCard, VoIP, UMTS, Wi-Fi Phone.
Telecom Glossary (5800 more definitions)
For a full forensic exam of your smartphone, tablet, or other personal electronics item, you may want to contact: Black Swan Digital Forensics.
Authentication & Encrypton
General: Password (MSCHAPv2), RSASecurID, x.509 Digital Certificates, Shared secret 802.1x authentication: EAP-TLS, EAP-TTLS, EAP-SIM, PEAP, LEAP, SafeNet
Bluetooth hacking video. Bluetooth automobile eavesdropping info.
Bluetooth Hacks: Bluejacking, BlueSnarfing, BlueBugging, HeloMoto, BlueSmack, and BlueSniping
Bluetooth Security: Guide to Bluetooth Security,
Cell Phones, Dumb
Dumb cell phones can not hold spyware, cannot GPS track and do not have Bluetooth capabilities. The least expensive way to assure you will not be tracked, eavesdropped, or have your information stolen by spyware is to use a dumb cell phone. Sources: BM70, Kyocera Marbl K127, Motorola W260g, Motorola C139, more
Cell Phones, Encrypted
Blackphone, Sectera, CryptoPhone, TopSec Mobile
Cell Phones, Encryption Software
SilentCircle, PhoneCrypt, Cellcrypt
Cell Phones, Security
Office of Technology Assessment / Congress of the US,
Developing an Effective Corporate Mobile Policy by BlackBerry
Cell Phones, Shielding Bags
eBay.com, faradaybag.com, yondr
SIM Card Readers
Cell Phones, Spy Tools
Spyware vendors, GSM bugs on eBay, GSM Bugs on the Internet
Cell Phones, Spyware Protection Apps
New York Times story about spyware protection apps.
SpyWarn™, Norton, F-Secure, Kaspersky, Lookout
Cordless Phone Frequencies – 900MHz, 1.9 GHz, 2.4GHz, 5.8GHz (with explanation)
Secure Network Communications: VPN (and see below), SSL/TLS, WPA / WPA2 / WPA3
Secure Platform Foundations: Runtime Protection, Mandatory Code Signing, Secure Authentication Framework, VPN protocols: Cisco IPSec, L2TP/IPSec, PPTP
Government Reports & Laws
The Wire and Electronic Communications Interception and Interception of Oral Communications Act (formally known as the “Title III” Wiretap Act, 18 U.S.C §§ 2510-2520)
Cell Phones as Tracking Devices, By M. Wesley Clark, J.D., LL.M.
Cell Phone Technology and Physical Surveillance, By M. Wesley Clark, J.D., LL.M.
• 1978 Foreign Intelligence Surveillance Act (“FISA”, 50 U.S.C 1801 et seq)
• The Electronic Communications Privacy Act of 1986 (“ECPA”, 18 U.S.C 2701)
• Communications Assistance for Law Enforcement Act (“CALEA”, Public Law 103–414, 47 U.S.C. 1001–1010)
• USA Patriot Act
State Electronic Surveillance Laws, with links (sign-in required)
“A Practical Guide to Taping Phone Calls and In-Person Conversations in the 50 States and D.C.” The Reporters Committee for Freedom of the Press
How Governments Locate & Track Cell Phones – Article 1, Article 2, Article 3
Murray Associates – Spyware Detection Clues
Apple: iOS Security
UV paint for ID marking your phone.
Reinstalling cell phone software.
The Gift of Fear and Other Survival Signals that Protect Us From Violence, by Gavin de Becker
DFI News Digital Forensic Investigator®
Background sounds: Subtle audio loops to play while conducting Duty Cycle tests on your cell phone:
Airport Sounds II
People Talking II
Crowd Talking Outdoors
Internet sound samples. Recorded sound. The Alibi CD.
Virtual Private Networks (VPN)
Contains detailed information, advice and recommendations.
Links to youtube.com videos on how cell phone spyware works.
Murray Associates is an independent security consulting firm, providing eavesdropping detection and counterespionage services to business, government and at-risk individuals.
Headquartered in the New York metropolitan area, a Murray Associates team can assist you quickly, anywhere in the United States, and internationally.
• More security tips, spy and privacy news at spybusters.blogspot.com. Be sure to sign up for the free email updates.
• Concerned about Spy Cameras? Learn how to detect them.