After four months of harassing phone calls, Courtney Kuykendall was afraid to answer her cell phone. The Tacoma, Washington, teenager was receiving graphic, violent threats at all hours. And when she and her family changed their cell phone numbers and got new phones, the calls continued. Using deep scratchy voices, anonymous stalkers literally took control of the Kuykendall’s cell phones, repeatedly threatened Courtney with murder and rape, and began following the family’s every move. “They’re listening to us and recording us,” Courtney’s mother, Heather Kuykendall, told NBC’s Today Show. “We know that because they will record us and play it back as a voicemail.” How is something like this possible?oo

Just take a look on the internet. That’s where you’ll find the latest spy technology for cell phones. Spyware marketers claim you can tap into someone’s calls, read their text messages and track their movements “anywhere, anytime.” Security experts say it’s no internet hoax. “It’s real, and it is pretty creepy,” said Rick Mislan, a former military intelligence officer who now teaches cyber forensics at Purdue University’s Department of Computer and Information Technology.

Mislan has examined thousands of cell phones inside Purdue’s Cyber Forensics Lab, and he says spy software can now make even the most high-tech cell phone vulnerable. With the permission of WTHR producer Cyndee Hebert, 13 Investigates purchased and downloaded Spyware on her personal cell phone. Hebert agreed to be spied on – if the spy software lived up to its bold claims. The process of downloading the software took several attempts and a great deal of patience. But once the spy program was installed, Hebert’s phone could indeed be tapped into at any time – just as its distributor promised.

While Hebert was at home making phone calls to her family, investigative reporter Bob Segall was outside her house, listening to the conversations on his cell phone.

And there’s more – much more.

Every time Hebert made or received a phone call, Segall received an instant text message, telling him that Hebert was talking on her cell phone so that Segall could call in and listen. On his computer, Segall also got a copy of Hebert’s text messages and a list of phone numbers detailing each incoming and outgoing call to Hebert’s cell phone. And no matter where Hebert went with her phone, Segall received constant satellite updates on her location. He could literally track Hebert anywhere she went.

“It’s hard to believe you can do all that,” Hebert said when she saw the spy software in action. “I think that’s really scary.”
When spy software was installed onto Hebert’s phone, that phone became an instant spy device – even when the phone was not being used.

As Hebert’s cell phone was simply sitting on a table or attached to her purse, Segall could activate the speaker on the phone and secretly listen in to the phone’s surroundings. While Hebert was in a meeting on the 36th floor of a downtown Indianapolis building, Segall heard her conversations, even though he was four miles away. 13 Investigates found more than a dozen companies willing to sell this type of cell phone spy software, which ranges in price from $60 to $3,000. The majority of the companies are located in foreign countries such as Thailand, Taiwan and the United Kingdom. In 2003 and 2004, the FBI used cell phone spy software to eavesdrop on the conversations of organized crime families in New York, and it used those conversations in its federal prosecutions.

Private investigator Tim Wilcox says several federal agencies rely on cell phone spying technology to monitor suspected criminals, and he says private citizens are now using the technology, too.

“The technology is there. It’s been there a long time. It’s accessible, and it’s done all the time,” Wilcox said. And while some Spyware marketers claim their products can be used on any make and model of cell phone, Mislan says high-end cell phones that include internet access and online capability are particularly vulnerable to Spyware tapping. To limit the ability of others to download certain types of spyware onto your phone, choose a cell phone that is not internet-accessible.

Cripes what a nightmare. Read the article…it goes on to describe methods of protecting yourself, but I think it’s safe to say the bad guys will always be one step ahead of security experts. This should make one think twice about giving your 7 year old his/her own personal stalking device.

Based on WTHR’s test, here are some subtle signs that could suggest your cell phone is being secretly tapped:

– Cell phone battery is warm even when your phone has not been used
– Cell phone lights up at unexpected times, including occasions when phone is not in use
– Unexpected beep or click during phone conversation




  1. PMitchell says:

    But how do you get it on their phone?
    do they not have to willingly connect or install this

  2. Olo Baggins of Bywater says:

    spy software can now make even the most high-tech cell phone vulnerable.

    The most high-tech cell phones make spy software possible.

  3. Orangetiki says:

    My questions are 1) how does it get onto the phone itself? I can’t imagine people downloading a program onto their phone.

    2) To my information, every company has their own OS for their phones, unless your using something specific like windows mobile. Are these programs workable on multiple systems?

  4. Patrick says:

    #1 Yes, you do. Why you’d do it is beyond me.

  5. ethanol says:

    PMitchell(#1),
    Yes. Says so near the end of the article. Or the spy grabs your phone when you aren’t aware and then put it back…

  6. Bob and Weave says:

    Dude can I borrow your phone for a few minutes….who hasn’t done that? Also, how many of the more techincally inclined here have been asked to help setup a cell phone for a friend, mother, father, grandma…etc?

    Or a computer tech who has been given a computer and a phone by a customer to install internet browsing software….etc.

    I can think of more.

  7. Olo Baggins of Bywater says:

    I know a guy who put something like this on his wife’s phone and caught her cheating.

  8. Li says:

    This tapping capability was built into the last several generations of cell phones by congressional mandate, to help the three letter agencies spy on us.

    How long until congressional conversations start showing up on the internet, I wonder?

  9. scott says:

    And yet another reason why I just have a *phone*. You can’t install anything on it. It can barely do text messages and while it can surf the web you’d rather not. It just is a *phone*.

    As to how people get these things installed without their knowledge…iPhone apps anyone? People download anything and everything just like they keep opening email attachments and they just infect themselves.

    I think I’m pretty safe.

  10. Improbus says:

    There’s an app for that. Jeez.

  11. Olo Baggins of Bywater says:

    Scott, same here. I have an old POS Samsung that’s small, battery lasts forever, no camera, works great, and replacements on ebay cost $15.

  12. HumongousEgo says:

    My cell phone in on the bottom Lake Superior, where it belongs. If there’s any spyware on it, someone is spying on the lake trout.

  13. dogday says:

    Makes me want to buy a Net10 or Tracfone with cash. Put the battery in only when you need to make calls.

  14. Rick's Cafe says:

    Yeah, kind of takes away from the fear factor when you find out that it could take up to half an hour to install the software (varies with phone). And that one could easily track the install by looking at their phone bill.

    Unless you don’t bother with an itemized phone bill and are in the habit of leaving your phone laying around so someone famous will use it to take a lot of pictures of all his famous friends…just like on TV.

  15. ethanol says:

    Scott (#9),
    Don’t be delusional about how *safe* you are with a regular old phone.
    http://unterzuber.com/tap.html
    http://bugsweeps.com/info/ways_to_tap_telephone.html

  16. ECA says:

    Some of you may not know this,
    Some may not understand this..
    THAT ISNT A CELLPHONE.
    That is a Pentium computer you/she is carrying around. And the PHONE part isnt independent of the SYSTEM.
    A cellphone makes PHONE CALLS ONLY..
    It dont take pictures.
    It dont keep a data base of your music.
    It doent run APP’s..

    Even cellphones can be tapped. but with alot more effort. But having a computer in your hands makes it EASY.
    Some person sends you an APPLICATION and you click RUN…you are all screw’d. thats what friends are for.

    You have a computer, you are carrying around with you..WHAT is the STANDARD of keeping a SAFE computer?! NO INPUT. The only things installed are what YOU(not friends) install on it, and you have FULL assurance that ITS CLEAN.

    NOW for the conspiracy part..
    AS with computers.
    WHO wants the money, MAKES the virus, to SELL you the FIX.
    IF this type of problem WASNT out there, then SOME ONE wouldnt get paid to fix it.
    And who would want a phone that the PARTS/sections of Phone/computer/MP3 player/MOVIE player were all compartmentalized?? The computer part COULDNT/wouldnt see the phone USE unless you told it to. AND then it could only dial a number, NOT watch what was happening with the PHONE PART ONLY.

  17. tom says:

    For those who want to look at the actual software:

    http://flexispy.com/spyphone-call-interceptor-gps-tracker-symbian.htm

  18. Olo Baggins of Bywater says:

    #15…I think Scott meant he has a regular ‘cell phone’, one without all the extras.

  19. jccalhoun says:

    This might be little more than hysterical sensationalistic reporting by the local news (shocking to think, I know!). I searched for “Courtney Kuykendall” and came up with a story on ABC http://abcnews.go.com/TheLaw/Story?id=3312813&page=1
    from that story: “The police say they are stumped, but they have not ruled out the possibility that the alleged victims are making the whole thing up.”
    “Most of the harassment appears directed at Courtney Kuykendall, police said, adding that most, but not all, of the calls have been traced back to her phone.

    Police are not calling the 16-year-old a suspect, though the unusual tale has raised some eyebrows. “It wouldn’t be prudent not to look internally” at the family, said Ed Troyer, a Pierce County Sheriff’s Department detective.”

    The comments on that story are pretty entertaining too. One poster claims that he/she has been harassed by the computer since 2005 even when the computer is off. ..I think the only thing off is that person is off the medication…

  20. jccalhoun says:

    Oh, and more evidence this story is just being brought up again because the local news wanted to get some ratings? ABC’s story was originally posted June 25, 2007

  21. Benjamin says:

    No word on how to delete or detect it. I don’t imagine that the software could work on both Palm, Windows, Symbion, and Blackberry.

  22. eaze says:

    for those that think your safe with an old school phone, your wrong. your safe against the noobs that buy other people’s h4xing software but yout not safe against the smart guys or the 3 letter guys. all that is done at the network layer, they can still track you, intecept calls as well as make calls from your number to their own premium numbers without your knowledge for their profit (if theyre that low level). they can even see through your camera and listen through your microphone even if you think the phone is off by calling it from special authorised numbers which is transparent to the user besides them maybe noticing a diference in battery life. the only advantage to having an old school phone is that they dont have a camera to look through.

  23. diecapsdie says:

    @#16 ECA:

    Easy on the caps there, chief.

  24. grammarnazi says:

    #17

    English, motherfucker, do you speak it?
    http://www.wikihow.com/Use-You%27re-and-Your

  25. grammarnazi says:

    I meant #22
    sorry…

  26. deowll says:

    The original post may have been a fake but the software is real.

    It may not be all that smart to have a smart phone.

    Sure they can tap a dumb phone but it does take more work and they are limited by what it can’t do.

  27. Patrick says:

    # 22 eaze said, “they can even see through your camera and listen through your microphone even if you think the phone is off”

    Loosen, the tinfoil hat.

  28. Don Quixote says:

    So is Apple going to do commercials about how it’s phone is more secure than the others. Being #1 in a market does have it’s trials doesn’t it Stevo.

  29. Patrick says:

    # 28 Don Quixote said, “Being #1 in a market does have it’s trials doesn’t it Stevo.”

    Huh? iphones probably account for about 1% of cell phones in use…

  30. Amy Hass says:

    The sites dedicated to spying on peoples cell phones are incredible and a little scary. Thanks for the great post.


1

Bad Behavior has blocked 5633 access attempts in the last 7 days.