“Cell-Finity” and Cell Phone Bugs
How "Cell-Finity" and "Roving" Bugs Actually Operate
Computers and cell phones have become almost indistinguishable from each other. Today's cell phones offer access to email, web browsing, countless apps, text messaging, live streaming news, sports and financial reports and built-in video cameras, and much more. The list continues to grow with each new development.
Many of these developments were made possible when cell phones were given the capability to connect to the Internet. This allowed the exchange of data from phone to Internet and back from Internet to phone and led to all the interactive features of present mobile phones.
The entire telecommunication industry is now in frantic competition to incorporate as many computer features into each new cell phone as possible. The once humble single-purpose cellular telephone has truly become an all-purpose pocket computer.
The Common Background of Computer Viruses and Cell Phone Bugs
Cell phones and computers share a common language. Not necessarily the exact same programming language, but a language that both understand and communicate with. This allows the free flow of data between computer and cell phone. Unfortunately, there are individuals (and firms) that have now adapted this technology for unethical and in many cases completely illegal uses.
As you are undoubtedly aware, computers are regularly hacked into for a variety of purposes. However, Eavesdroppers have now succeeded in utilizing the same hacking technology to transform the cell phone into an incredible Eavesdropping Device.
Unscrupulous, but undeniably competent hackers can now hack into any computer that is connected to the Internet. And whether or not you actually use your Cell Phone to access the Internet, you must keep in mind that if your phone has the capability of receiving email, it is connected to the Internet.
Also, it is actually easier to electronically break into a cell phone because most cell phones do not have firewalls or even rudimentary security features. You may check your computer for viruses, spyware, set up firewalls etc., but do you have take the most minimal precautions with your cell phone? If you're like most, you take no precautions at all, and that is the precisely the behavior the Eavesdropper seizes on.
Seeing the flaws in the system, hackers devised a virus dubbed the "Cell-Finity" Bug. (Many variations and updates have since emerged but the "Cell-Finity" was one of the first.) When an Eavesdropper (using a secret access code) calls an infected cell phone, the phone does not ring, but the phone's microphone is secretly turned on. The phone's screen does not display the call, nor is any record saved in the log.
The Eavesdropper can now Listen-In and even record all sounds and voices within 10 feet of the Cell Phone that you mistakenly thought was "inactive". There is absolutely no way of knowing that you are being spied upon.
The "Cell-Finity" Bug is a computer program and is spread in the same manner as the destructive computer viruses now so common on the Internet. It can then monitor not only all your conversations, but also is able to spy on your text messages.
Even if the newly infected owners do not use text messaging, their phones still have text messaging capability. And, their phones still can be "bugged" through an inconspicuous text message that they received without their knowledge.
In this manner the Cell Phone Spy program can become active in your phone and can monitor your conversations and text messages without you ever becoming aware of it . . . that is, until the Eavesdropper has obtained the information he, or she, wants and chooses to make you aware of it. Of course, at that point, it is too late.
Find it Hard to Believe?
If you find it difficult to believe that invasive computer technology has now gone this far . . . below you will find word for word excerpts from a few paragraphs of an actual advertisement for a "Cell-Finity" type Telephone Eavesdropping Device that has been displayed and openly offered for sale on the Internet.
". . . you can listen to room conversations when you are away . . . call the phone using a special access number, it automatically answers without any ringing . . . allows you to listen discreetly to what is going on up to 5 meters away from the phone . . . there is no record of the call received . . . calls and receives calls just like any other cell phone . . . ."
For some time now, government agencies have also been using variations of this technology to eavesdrop upon a number of individuals.
Yes, "Cell-Finity" and "Roving" type Listening Devices possess devastating capabilities. And, as you can see from the above Internet advertisement, they are now easily available to any individual so inclined.