THE TRUTH DENIED Cell Phone Users need to reevaluate cell phone usage.
It’s nothing new that commercial spyware is being used by law enforcement and security intelligence in countries around the world. For the most part, the public accepts the strange reality of Cybercrimes as well as identity theft and public unease appears to be minimal. Conversely, this explains why the habits conducted by internet and cell phone users is generally not one of caution; that is until the dirty deed actually happens to them. For those savvier users, it’s apparent that we worry about rogue attacks and data mining thieves who literally want to steal away our identity. In addition, a bigger threat seems to be lurking in the underbelly of the internet. Is the government spying on us and if they are, why? WikiLeaks released story about how the Government Is Spying On You Through Your iPhone WikiLeaks began publishing The Spy Files in 2011 and has consistently claimed that the government has infected thousands of computers and cell phones with malicious software and over 160 intelligence contractors in the mass surveillance industry are involved.
One of many examples of the spy malware is the FinFisher Trojan, which is government spyware that is installed via a phony iTunes update. How many of you have iTunes? Meanwhile hundreds of thousands of cell phone users claim that not only have they found bugs in their phones (Apple & Android alike) , they can prove that they are being tracked via legal applications better known as APPS. Unfortunately, the end user has no idea that they are being monitored or tracked.
“In my opinion, the public is being preyed upon by software developers who are aligned with the Department of Defense, lured into app stores that serve as spyware for the government. Reasons are infinitum. “ THE TRUTH DENIED
Here is a video that should explain some of the happenings around the world, detailing how some apps can be a bad idea. The front and rear cameras, microphone, text messages and phone call logs were able to be remotely accessed.
“While the app icon was visible on my phone, there is a disguised version available with the innocuous title “system framework”. Apart from the icon there were no other signs my phone was compromised.”
ABC News has chosen not to name the app used in the (following) experiment, but it is available on the Android app store and is just one of many apps available. “Using nearby Wi-Fi points and GPS data, my location could be tracked. Where I live, where I work and where I get my morning coffee was all visible.”- Reporter Elise Worthington
“I had no idea how easily my phone could be controlled remotely to see, hear and record what I said, everywhere I went and everything I did.”
“I consented to having the app downloaded and I knew I could be monitored at any time, but I wasn’t aware of exactly when I was being watched. And as I went about my usual morning routine, I soon forgot my phone was spying on me.”
“In the Netherlands, 300 police reports a week are filed for smartphone-theft.” 2.1 million Americans had phones stolen in 2013, according to a nationally representative survey conducted by the Consumer Reports National Research Center. (Another 3.1 million smartphones were lost.)”
Be sure to watch the following video entitled Short Film: Find my Phone – Subtitled
Any questions? Check the Reddit AmA: https://redd.it/5jg18f The short documentary ‘Find My Phone’ follows a stolen phone’s second life by means of using spyware. Although you’ll meet the person behind the theft up close and personal, the question remains: how well can you actually get to know someone when you base yourself on the information retrieved from their phone? Do you want the full story behind the film? You can contact me in order to answer all of your questions by means of an interview (I’m proficient in Dutch and English), or to invite me to a film festival. To use this video in a commercial player or in broadcasts, please email firstname.lastname@example.org email@example.com
Be sure to check out Peter Kirby’s latest article :
To determine some of the federal investigative law enforcement agencies that may be appropriate for reporting certain kinds of crime, please refer to the following table or visit https://www.justice.gov/criminal-ccips/reporting-computer-internet-related-or-intellectual-property-crime
|Type of Crime||Appropriate federal investigative law enforcement agencies|
|Computer intrusion (i.e. hacking)|
|Counterfeiting of currency|
|Child Pornography or Exploitation|
|Child Exploitation and Internet Fraud matters that have a mail nexus|
|Internet fraud and SPAM|
|Internet bomb threats|
|Trafficking in explosive or incendiary devices or firearms over the Internet|
Do you feel that you are a product of spying or gangstalking?