Page 29 - index
P. 29
a serious trouble. The legal permission to do the phone’s activities monitoring and recording got
authorities only and every individual doing so on his own behalf is breaking the law.
Also, these sorts of security’s concerns are usually an introduction to some more severe criminal or
terrorist offences and their purpose is to gather enough information to an illegal group which would
use them to make a plan about their future crime’s actions.
Practically, mobile technologies may be used for different sorts of stalking activities as well as
information gathering operations. Non-rarely, these activities leave the serious consequences.
Some practical examples and possible scenarios
We all are witnessing the scenarios by which some organized crime or terrorist group committed the
horrible crime and behind everything was a carefully planned and prepared action relying on the
pervious information collection through the cyber means. The easiest way to find someone is
through his cell phone. Someone’s phone number could be obtained through a well-coordinated
hacker’s attack.
Once you get those SIM card’s details, you can track such a person’s phone calls, text messages
and GPS location or simply hack his cell phone if it is online. It’s a serious security’s concern if
someone tracks you for a long period of time and gets familiar with your habits, businesses or
plans.
Here, we would not make any recommendations which tools could be the most suitable for an illegal
phone’s activities tracking. It’s obvious they can be so simply found through the web search. The
only thing we would highlight here is that if you decide to do so, you would leave a trace within a
cyberspace, so a good investigation would certainly find the evidence you left.
Could we get protected from these threats and how?
If we talk about the protection from these sorts of threats, it’s clear there is no absolute protection in
terms of possible prevention from a breach. The cryptography could be assumed as one of the
effective methods, but as it’s known – every algorithm can be broken sooner or later, depending on
an invested time and effort.
So, as many experts suggest we should try to accept that the breach has occurred and keep
dealing with such a situation.
About the Author
Since Milica Djekic graduated at the Department of Control Engineering at
University of Belgrade, Serbia, she’s been an engineer with a passion for
cryptography, cyber security, and wireless systems. Milica is a researcher from
Subotica, Serbia. She also serves as a Reviewer at the Journal of Computer
Sciences and Applications. She writes for Australian and American security
magazines. She is a volunteer with the American corner of Subotica as well as a
lecturer with the local engineering society.
29 Cyber Warnings E-Magazine – October 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide