After four months of harassing phone calls, Courtney Kuykendall was afraid to answer her cell phone. The Tacoma, Washington, teenager was receiving graphic, violent threats at all hours. And when she and her family changed their cell phone numbers and got new phones, the calls continued. Using deep scratchy voices, anonymous stalkers literally took control of the Kuykendall’s cell phones, repeatedly threatened Courtney with murder and rape, and began following the family’s every move. “They’re listening to us and recording us,” Courtney’s mother, Heather Kuykendall, told NBC’s Today Show. “We know that because they will record us and play it back as a voicemail.” How is something like this possible?oo

Just take a look on the internet. That’s where you’ll find the latest spy technology for cell phones. Spyware marketers claim you can tap into someone’s calls, read their text messages and track their movements “anywhere, anytime.” Security experts say it’s no internet hoax. “It’s real, and it is pretty creepy,” said Rick Mislan, a former military intelligence officer who now teaches cyber forensics at Purdue University’s Department of Computer and Information Technology.

Mislan has examined thousands of cell phones inside Purdue’s Cyber Forensics Lab, and he says spy software can now make even the most high-tech cell phone vulnerable. With the permission of WTHR producer Cyndee Hebert, 13 Investigates purchased and downloaded Spyware on her personal cell phone. Hebert agreed to be spied on – if the spy software lived up to its bold claims. The process of downloading the software took several attempts and a great deal of patience. But once the spy program was installed, Hebert’s phone could indeed be tapped into at any time – just as its distributor promised.

While Hebert was at home making phone calls to her family, investigative reporter Bob Segall was outside her house, listening to the conversations on his cell phone.

And there’s more – much more.

Every time Hebert made or received a phone call, Segall received an instant text message, telling him that Hebert was talking on her cell phone so that Segall could call in and listen. On his computer, Segall also got a copy of Hebert’s text messages and a list of phone numbers detailing each incoming and outgoing call to Hebert’s cell phone. And no matter where Hebert went with her phone, Segall received constant satellite updates on her location. He could literally track Hebert anywhere she went.

“It’s hard to believe you can do all that,” Hebert said when she saw the spy software in action. “I think that’s really scary.”
When spy software was installed onto Hebert’s phone, that phone became an instant spy device – even when the phone was not being used.

As Hebert’s cell phone was simply sitting on a table or attached to her purse, Segall could activate the speaker on the phone and secretly listen in to the phone’s surroundings. While Hebert was in a meeting on the 36th floor of a downtown Indianapolis building, Segall heard her conversations, even though he was four miles away. 13 Investigates found more than a dozen companies willing to sell this type of cell phone spy software, which ranges in price from $60 to $3,000. The majority of the companies are located in foreign countries such as Thailand, Taiwan and the United Kingdom. In 2003 and 2004, the FBI used cell phone spy software to eavesdrop on the conversations of organized crime families in New York, and it used those conversations in its federal prosecutions.

Private investigator Tim Wilcox says several federal agencies rely on cell phone spying technology to monitor suspected criminals, and he says private citizens are now using the technology, too.

“The technology is there. It’s been there a long time. It’s accessible, and it’s done all the time,” Wilcox said. And while some Spyware marketers claim their products can be used on any make and model of cell phone, Mislan says high-end cell phones that include internet access and online capability are particularly vulnerable to Spyware tapping. To limit the ability of others to download certain types of spyware onto your phone, choose a cell phone that is not internet-accessible.

Cripes what a nightmare. Read the article…it goes on to describe methods of protecting yourself, but I think it’s safe to say the bad guys will always be one step ahead of security experts. This should make one think twice about giving your 7 year old his/her own personal stalking device.

Based on WTHR’s test, here are some subtle signs that could suggest your cell phone is being secretly tapped:

– Cell phone battery is warm even when your phone has not been used
– Cell phone lights up at unexpected times, including occasions when phone is not in use
– Unexpected beep or click during phone conversation




  1. sitriped,lol says:

    cameras, speakers, low budget vs. high budget, network levels, conspiracies, inevitability and your initial opponent down to my own mind.

    Thank you, I shall extract wisely


2

Bad Behavior has blocked 5636 access attempts in the last 7 days.