Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $9.99/month after trial. Cancel anytime.

Make Your Smartphone 007 Smart
Make Your Smartphone 007 Smart
Make Your Smartphone 007 Smart
Ebook56 pages39 minutes

Make Your Smartphone 007 Smart

Rating: 4 out of 5 stars

4/5

()

Read preview

About this ebook

The smartphone in your pocket can easily be turned into a high-tech spy tool and counter-surveillance device to rival anything that Ian Fleming’s Q might have dreamt up.

You can communicate secretly, browse the web anonymously, access the Deep Web and hidden networks, view banned content, download privately and continue using Twitter and Facebook if their services are ever blocked locally.

Conversely, mobile devices are not secure unless you make them so. If somebody wants to know where you are at this precise moment, your smartphone will tell them – even if it is turned off.

The push by the commercial world and more recently by law enforcement and surveillance agencies to monitor all we do has led to a counter-revolution. The Mobile Internet has evolved and so has its counter-surveillance tools.

Rather like spies in a James Bond movie, mobile users have an array of digital tools to call upon, both to mask their identity and to provide real confidence that their correspondence, data and contacts are secure.

There are smartphone apps that let you see in the dark or measure the height of a building. You can film and record without being rumbled; send emails, PMs and SMS that cannot be intercepted or read. You can even take over and control many public and private security cameras.

LanguageEnglish
PublisherConrad Jaeger
Release dateDec 13, 2016
ISBN9781370004027
Make Your Smartphone 007 Smart
Author

Conrad Jaeger

Deep Web Guides - inter-active guides to the Deep Web

Read more from Conrad Jaeger

Related to Make Your Smartphone 007 Smart

Related ebooks

Security For You

View More

Related articles

Reviews for Make Your Smartphone 007 Smart

Rating: 4.214285714285714 out of 5 stars
4/5

14 ratings1 review

What did you think?

Tap to rate

Review must be at least 10 words

  • Rating: 5 out of 5 stars
    5/5
    i liked it when you were on my mind i

    1 person found this helpful

Book preview

Make Your Smartphone 007 Smart - Conrad Jaeger

Make Your Smartphone 007 Smart

By Conrad Jaeger

v 4:1

Published at Smashwords

Copyright Alan Pearce 2016

ISBN: 9781370004027

© Alan Pearce November 2016

alanpearce.com

Updated December 2016

Table of Contents

Introduction

1. Clear Out, Load Up, Lock Down, Run Silent

2. Keeping out the Spies

3. High-Level Threats

4. Counter-Intrusion

5. Accessing Hidden Networks

---Using Tor

---Entry Points

6. Secure Communication

7. Secret Messaging

8. Usenet Newsgroups

9. Portable Apps

10. 007 Apps

11. IP Cameras

Learn How to Protect Yourself in the Digital Age

Disclaimer

This book is for educational purposes only. In no way is it the intention of the author, publishers or distributors to encourage anyone to do anything illegal. The author, publishers and distributors accept no liability for anything that happens in any way connected with the reading, possession or use of this book.

Don’t even think about it.

A technical aside

The Deep Web addresses marked listed here can only be opened with Tor-Firefox browser, which you will learn to configure later.

Free, open source software is generally preferable to the paid-for variety because it can be tested by developers and any logging devices or backdoors can be identified.

Be alert that no single system or piece of software is 100% secure or safe.

Introduction

The smartphone in your pocket can easily be turned into a high-tech spy tool and counter-surveillance device to rival anything that Ian Fleming’s Q might have dreamt up.

You can communicate secretly, browse the web anonymously, access the Deep Web and hidden networks, view banned content, download privately, and continue using Twitter and Facebook if their services are ever blocked locally. You can even take over and control many public and private security cameras.

Conversely, mobile devices are not secure unless you make them so. If somebody wants to know where you are at this precise moment, your smartphone or tablet will tell them – even if they are turned off.

Mobile espionage, long the preserve of law enforcement and specialized investigators, has now evolved into a fully-fledged cybercrime industry. In 2011, Kaspersky Labs detected nearly 5,300 new malicious programs for all mobile platforms. By the end of 2012, the number exceeded six million – the vast majority aimed at Android. Today, that number is almost impossible to count.

When it comes to securing your system, there are several concerns – ad networks, cybercriminals, stalkers, malicious trolls, law enforcement, intelligence agencies and corporate spies – and they all use similar techniques. Generally, they do this by so-called social engineering, the art of playing on peoples’ gullibility or natural desire to please. They do this by enticing

Enjoying the preview?
Page 1 of 1