Page 28 - index
P. 28







The challenges of mobile technologies


By Milica Djekic



The mobile technologies can offer many advantages such as a phone call communication, text
messaging, the Internet connection, smart applications management and much more. As they may
provide you all these benefits, they can also be a great source of threats and risks to their users.
For instance, the majority of cell phones could be tracked through their calls, SMS or GPS
capabilities. These may open many possibilities to potential security concerns, so it’s getting
obvious that these emerging technologies could find their applications within the crime’s or terrorist
organizations.

The capabilities of mobile technologies

In this context, when we talk about mobile technologies, we would mention the capabilities that cell
phones can offer to us as well as discuss some potential drawbacks correlated to this area. First,
the main advantage of your cell phone is that you can make a call. The evidence that the phone call
has been made are normally available through different sorts of listings.

Also, the fact is the majority of the international as well as case calls have been monitored and
recorded. The reasons for these are mainly linked to the security’s requirements.

Next, the modern cell phones may provide you with the well-known texting capabilities as well as
many Internet connection options. Through the investigation process as well as the international
security’s operations, these cell phone’s capabilities could be tracked. As it’s obvious, this may be
so useful to crime’s and terrorist groups due to they may track your cell phone’s activities so easily
as well.

Finally, everyone got aware of possible cell phone’s tracing option which is possible if your battery
is inside your device. The tools that can support you in this are publicly available for free
everywhere on the web. Hope it’s getting clear how greatly these can threaten someone’s business,
property or even life.

The security’s concerns in this emerging field

When we say that your cell phone is so suitable to its phone calls, SMS messaging, Internet
communication or GPS locating, we would suggest that as it’s convenient to its users – it can be so
helpful to security’s threats that are in possession of some of many cell phone’s activities tracking
applications.

If we have in mind that those phone’s activities trackers are available almost everywhere and all the
threat needs to know is to download such a tool and review some of many online tutorials or the
other web resources in order to get a necessary skill, it’s getting so obvious how these mobile
technologies advantages could be used for dark purposes.

For instance, if someone gets the information about your cell phone’s number coping with the SIM
card’s details, such a person can easily get an access to your phone’s calls, text messages, GPS
location or some Internet activities. If that person is a security’s threat, you would find that you are in

28 Cyber Warnings E-Magazine – October 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   23   24   25   26   27   28   29   30   31   32   33