19 Spyware Tips – Warning Signs
Cell phones have secret lives. When we are not using them, they chitchat with their masters at cell phone central, periodically transmitting messages like, “I’m here! I’m ready to accept a call.” They also download e-mail and news, adjust their transmitter power settings, and switch cell sites automatically. Depending upon the make, model, and type of apps loaded onto the phone, the phone may be handling other chores as well. In short, your phone transmits when you are not using it, and this is perfectly normal.
A number of other types of transmissions, however, are not normal. They may indicate that someone is receiving private information directly from your phone.
Many of the following clues have one thing in common: They indicate that your phone is transmitting when you are not using it.
- Your phone’s battery life suddenly decreases.
- Your phone periodically lights up for no apparent reason.
- Your phone is unusually warm when you are not using it.
- Your phone bill shows a spike in SMS (short message service), text, or data usage.
- Odd background noises or clicking can be heard during calls.
- Friends often say your phone was busy or jumped straight to voice mail, when you know you were not using it.
- Your phone beeps for no apparent reason.
- Your Call Duration log shows entries that don’t make sense to you.
- Features of your phone that you didn’t activate, such as call forwarding, are on.
- Your phone frequently displays error messages such as “App Closed: Main” (or similar).
- Your phone frequently displays “Message stuck in outbox” errors.
- Your phone is slow to respond to keypad entries.
- “No SMS credit” messages appear on the screen.
- Your phone is receiving odd text messages (example: <*#83><2125551212><d>).
- The Web icon appears for no apparent reason.
- You notice weird additions in your phone’s Applications menu.
- Your phone does not turn off as quickly as it once did.
- Specific details of your calls are being mentioned to you by others.
- Your phone shows frequent phone transmissions when you are not using your phone.
Detecting an increase in transmissions is the biggest clue that your cell phone is infected with spyware. The phone must transmit when it sends information back to the spy: your texts. Your e-mails. Data about who you called, when, and for how long. It will also be transmitting when your spy has called your phone and has silently turned on the microphone to listen to what you are doing.
15 Spyware Tips – Prevention
Dealing with a spyware privacy invasion on your mobile communications device is a draining experience, both emotionally and time-wise. You don’t want to go through this again. Following these few simple rules will help prevent future spyware attacks. It is also a good list to share with friends to help keep them safe.
- Do not jailbreak your phone’s operating system software. This is your first line of defense against spyware attacks.
- Do not let your new phone out of your possession. It takes a snoop only minutes to activate spyware on your phone or pull your SIM card to read the information stored on it (contacts, etc.).
- Do not put a new SIM card into your old phone. This will not solve the problem. Some spyware has the capability to detect new SIM cards and will report the new phone number to the spy immediately, thus continuing your privacy problems.
- Do not sync a new device with the old device’s contacts/apps backup file. Syncing could bring your problem back to life. You may have backed up the spyware. Delete the backup. Start fresh.
- Use your mobile device’s password feature.
- Set your device to lock after the shortest time of inactivity
- Use your SIM card’s password PIN feature to prevent unauthorized access to stored information. Here is how this security feature works: If your PIN is entered incorrectly three times, the SIM card is blocked. You can then unblock it only by entering a personal unblocking code (PUC) provided by the service operator. If the PUC is entered incorrectly ten times, your SIM card will be permanently blocked and you will have to buy a new SIM card.
- Do not store any confidential information on your mobile device that you cannot afford to lose. Assume there is a possibility your phone will be stolen, lost, hacked, or infected with spyware.
- Never use any wireless device to access your bank and credit card accounts. This includes your wireless laptop and iPad devices as well.
- Keep current on your software updates. They frequently include security-related improvements.
- Download e-mail attachments only if you trust the source. Your basic policy should be “Unknown? Leave it alone.” Free ring tones, songs, and games fall into this category. Even if your source is a trusted friend, he or she may unknowingly be passing along spyware or other forms of malware. Ask yourself, “Do I really need this?”
- Never install pirated software on your cell phone.
- Monitor the Usage log built into your device. Write down the usage at the beginning and end of the day. Keep an eye out for unexplained spikes in usage (both text and voice). This chore may be made easier with a utility usage app that logs and charts usage for you. Search your app store’s Utility section using the search term “usage.” Some apps will automatically notify you when a threshold limit is exceeded.
- Turn off your mobile devices when you are not using them. It sounds simple, but surprisingly, most people leave their devices on. If you can remove the battery, do that as well.
- Consider purchasing a second phone that no one else knows about. Keep it hidden, and use it only for your most important calls. Remember to turn off the caller ID function.
Bonus for you
These security tips will also help protect you from the many nonspyware, but still harmful, mobile device viruses and Trojans out there. Some are known for sending mass SMS texts and expensive MMS (multimedia) messages; manipulating your desktop; adding weird icons; or opening up your Contacts file for harvesting. All this can dramatically drain your battery, your phone bill, and your patience! Others are just malicious—they have no purpose other than to disrupt your life. Called “malware,” these programs attack the phone’s operating system and can shut the phone down completely.
Kevin D. Murray CPP, CISM, CFE is a business counterespionage consultant and TSCM specialist with over four decades of experience.
Murray Associates is an independent security consulting firm, providing eavesdropping detection and counterespionage services to business, government and at-risk individuals.
Headquartered in the New York metropolitan area, a Murray Associates team can assist you quickly, anywhere in the United States, and internationally.