The programs to ‘puncture’ any mobile phone alarm Spanish managers

If you hear interference on your mobile when it is turned off, if you notice that it heats up excessively or that the battery lasts less and less, then it may be that your mobile is bugged. In the same way, they are not only accessing their calls, their WhatsApp or emails, but they are using it as a microphone to listen to their daily conversations, those of the offline world… The most striking thing is that we are not talking about science fiction. It is easier than we imagine. Techniques for intercepting communications are proliferating and, not surprisingly, concern for improving security is also growing. .

Imitating a secret agent costs just 1,149 euros. It is the amount that must be paid in a physical store for the software that gives access to all the content of another smartphone. All you have to do is install the program on the mobile of the person you want to spy on and, from there, enter with a password to a website where all the audio recordings of the calls, messages, emails and even the pages you visit appear. the victim when browsing.

Only if that person resets the terminal for some reason and restores the factory settings will the trace be lost… until the hacker accesses that mobile again and reinstalls the program in question. Would an antivirus protect against these attacks? The truth is that it would not help, because spyware has a super administrator level, so the antivirus does not take it as an intruder. The system works with any operator, with few exceptions, such as version 8.3 of iOS. It is enough that the free call waiting and multi-conference services are activated -Movistar brings it activated by default, while in Vodafone and Orange they must be activated and it can only be done if the line is contracted-.

See also  Correos scans all letters and packages sent in Spain

Without a trace

The spy program includes a mobile phone that is used to activate the spy phone’s microphone and thus listen to what is happening near the terminal. The victim does not detect that call -it does not ring, nor does the screen turn on- and the microphone is simply activated. “It is then when, as is logical, if time is abused, the mobile heats up and can lead the spy to become suspicious,” the seller tells us. Doesn’t leave a trace? Calls from the hacked phone will not appear on the bill for the hacked terminal, but instead there is a record that the Police can access after the corresponding complaint.

In the course of this investigation, the agents will try to locate the phone that has been used as an intermediary or hook, which by the way has an unidentified SIM from Lebara, the kind that call shops sell -a curious legal loophole, because it can be used without first notify user data-. The offender will also be able to delete this software remotely to clean up the footprint as much as possible and try to go unpunished.

From the spy items store they insist that carrying out this type of action is harshly punished by law. This is established in article 197 of the Criminal Code: “Whoever, to discover the secrets or violate the privacy of another, without their consent, seizes their papers, letters, email messages or any other documents or personal effects or intercepts their telecommunications or use technical devices for listening, transmission, recording or reproduction of sound or image, or any other communication signal, will be punished with prison sentences of one to four years and a fine of twelve to 24 months”.

See also  What if Alcampo bought Carrefour? This would be the panorama of supermarkets in Spain

If the pirate is not satisfied with spying, but also disseminates that material, the penalties increase: “The prison sentence of two to five years will be imposed if the data or facts discovered or the images captured are disseminated, revealed or transferred to third parties. “.

The seller explains to us that this system is legal if we make it clear to the other person that they are being spied on. In fact, many companies decide to use it on the phones of salespeople, who know they are being monitored. These tools are very useful for them either to check what their relationship with customers is like or to keep a record of all conversations in the event of any problem that may exist.

by court order

Thus, as is well known, the only legal way by which it is authorized to intercept communications without notifying the victim is through judicial authorization. When there is an investigation underway, the magistrate can request that the terminals of the alleged criminals be tapped. The subject is not trivial at all. And, in fact, it is estimated that in Spain each year between 4,000 and 5,000 lines are hacked for different reasons. An example: the judge of Lugo, Pilar de Lara, within the framework of the Pokémon and Manga operations, ordered the puncture of 200 lines of politicians, businessmen… The result? One hundred defendants.

In recent days it has been announced that the United States is reviewing its policy of interception of communications between mobile phones, dismissed by many as unconstitutional for violating those basic rights to privacy… A panel of judges of the Second Court of Appeals has ruled that the The program that the National Security Agency (NSA) had been developing in this regard was not authorized by Congress in the Patriot Act.

See also  How is hydrogen obtained? The future of the battery car, under review

Everything revealed by Eduard Snowden continues to raise blisters. Suffice it to recall the rivers of ink spilled when it was discovered that President Barack Obama’s intelligence services did not skimp when it came to intercepting communications even from his European partners, including German Chancellor Angela Merkel herself. There was also a lot of talk then about which terminal was more secure, with devices that have a superior encryption system for telephone calls.

.

Loading Facebook Comments ...
Loading Disqus Comments ...