Sponsor Robert Siciliano as he runs the Boston Marathon for Miles for Miracles, Children's Hospital Boston
ROBERT SICILIANO is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds.

FREE EBOOK

Check here if you're human

Sponsors

Stalkers Exploiting Mobile Phones

0
Pin It

Mobile phone GPS (global positioning system) is often accurate in less than 100 feet. Many mobile apps work with GPS to inform you of local restaurants, banks, gas stations and attractions. Mobile phone GPS is also being used for driving navigation too, but I don’t find it as effective.

In this amazing age of progressive technology the uses seem unlimited. The good guy often finds out what he can do to improve his life with technology and the bad guy uses it to ruin others.

A U.S. Justice Department report last year estimated that more than 25,000 adults in the U.S. are victims of GPS stalking annually, including by cell phone.

The Wall Street Journal reports “The Federal Communications Commission required U.S. cellular providers to make at least 95% of the phones in their networks traceable by satellite or other technologies by the end of 2005. The agency’s intention was to make it easier for people in emergencies to get help. GPS chips send signals to satellites that enable police and rescue workers to locate a person.”

Mobile phone GPS can generally be activated in 2 ways. First, phone carriers offer a service to track the phone for a monthly fee. The service acts to find the phone if it’s lost or to be used by parent or a spouse to keep tabs on their families. Employers often activate GPS to locate employees. Once activated the carrier sends a text message to the phone alerting the person they are being tracked via the phones GPS. The person paying the bill who is responsible for the contract is usually the person who can turn on tracking.

Second, mobile phone spyware. Software is installed on the phone that allows for another level of “keeping tabs”. The software will locate the phone via GPS and also keep track of all the text messages and phone calls too. In this scenario spyware is most often installed manually by someone who has access to the device. Otherwise in rare instances it can be installed remotely.

“Stalkers” who use the phones GPS are usually someone close to the victim like a family member or ex- boyfriend/girlfriend that has the capability of turning on tracking.

If you suspect your phone’s GPS has been activated by the carrier then call to find out. If you don’t’ like the feature turned on, request it be turned off or get another phone under your own name. If you believe the phone has been compromised by spyware then call your carrier and request they walk you through the process of reinstalling the phones operating system. This will wipe away any spyware that tracks via GPS.

Robert Siciliano personal security expert to Home Security Source discussing mobile phone spyware on Good Morning America. Disclosures.

About the Author
ROBERT SICILIANO, CEO of IDTheftSecurity.com is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds. His "tell it like it is" style is sought after by major media outlets, executives in the C-Suite of leading corporations, meeting planners, and community leaders to get the straight talk they need to stay safe in a world in which physical and virtual crime is commonplace. Siciliano is accessible, real, professional, and ready to weigh in and comment at a moment's notice on breaking news.

Similar Posts

  • Geolocation Technology; Please Stalk and Rob Me
    Technology is meant to make life easier, safer and in some cases fun-er. Geolocation is supposed to make you save a few bucks on discounts when you “check in” at participating retail stores and gather “points”. It is also supposed to tell your friends and followers via geo-tagging that you just snapped a photo somewhere. 
  • Mobile Phones Being Hacked and Cloned
    Cloning occurs when hackers scan the airwaves to obtain SIM card information, electronic serial numbers and mobile identification numbers, and then using that data on other phones. Cloning can happen anywhere, anytime that you’re using your phone. The bad guy simply uses an interceptor, hardware, and software to make a phone exactly like yours. A few years
  • Mobile Phone Security Under Attack
    As mobile Internet usage continues its rapid growth, cyber criminals are expected to pay more attention to this sector. Mobile device platforms compete for content creators’ latest innovations, which often require more and more device access. As applications and other content are more widely distributed, security breaches will be inevitable. The speed of technological advancement and
  • Mobile Phone Spyware Resellers Arrested
    Spyware is sold legally in the United States. This software records chats, emails, websites visited, usernames and passwords, and basically everything a person does on that PC. Some spyware programs can record everything in a video file that can then be accessed remotely. This is all perfectly legal as long as the PC’s owner is the
  • Mobile Phone Operating System Insecurity
    As more online retailers introduce mobile ecommerce applications, criminal hackers are taking notice. Existing mobile operating systems are under attack and, like standard PC operating systems, they sometimes fail to provide the necessary security to support a payment application. Current research is primarily geared towards securing mobile payments, but there is a lack of coordination between

Leave a Comment

You must be logged in to post a comment.

Xtreme School

Featured in

Anderson Cooper John Stossel Robert Siciliano Featured in
Browse by Month

Browse by Category