Make Your Smartphone 007 Smart
4/5
()
About this ebook
The smartphone in your pocket can easily be turned into a high-tech spy tool and counter-surveillance device to rival anything that Ian Fleming’s Q might have dreamt up.
You can communicate secretly, browse the web anonymously, access the Deep Web and hidden networks, view banned content, download privately and continue using Twitter and Facebook if their services are ever blocked locally.
Conversely, mobile devices are not secure unless you make them so. If somebody wants to know where you are at this precise moment, your smartphone will tell them – even if it is turned off.
The push by the commercial world and more recently by law enforcement and surveillance agencies to monitor all we do has led to a counter-revolution. The Mobile Internet has evolved and so has its counter-surveillance tools.
Rather like spies in a James Bond movie, mobile users have an array of digital tools to call upon, both to mask their identity and to provide real confidence that their correspondence, data and contacts are secure.
There are smartphone apps that let you see in the dark or measure the height of a building. You can film and record without being rumbled; send emails, PMs and SMS that cannot be intercepted or read. You can even take over and control many public and private security cameras.
Conrad Jaeger
Deep Web Guides - inter-active guides to the Deep Web
Read more from Conrad Jaeger
Enter the Dark Net – The Internet’s Greatest Secret Rating: 4 out of 5 stars4/5Deep Web Secrecy and Security: an inter-active guide to the Deep Web and beyond Rating: 4 out of 5 stars4/5
Related to Make Your Smartphone 007 Smart
Related ebooks
Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5How Not To Use Your Smartphone Rating: 5 out of 5 stars5/5Ultimate guide for being anonymous: Avoiding prison time for fun and profit Rating: 5 out of 5 stars5/5The Darknet Superpack Rating: 0 out of 5 stars0 ratingsWireless Hacking 101 Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Wifi Hacking Strategy & Ideas Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar: Hacking the Planet, #1 Rating: 5 out of 5 stars5/5Deep Web for Journalists: Comms, Counter-Surveillance, Search Rating: 5 out of 5 stars5/5Hacking: 10 Easy Beginners Tutorials on How to Hack Plus Basic Security Tips Rating: 0 out of 5 stars0 ratingsHacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar: A Step by Step Process for Breaking into a BANK Rating: 5 out of 5 stars5/5Tor and the Deep Web Rating: 0 out of 5 stars0 ratingsHacking Rating: 3 out of 5 stars3/5How to Investigate Like a Rockstar: Hacking the Planet Rating: 0 out of 5 stars0 ratingsHackercool Sept 2016: 0, #0 Rating: 5 out of 5 stars5/5Cyber Security for Beginners: How to Become a Cybersecurity Professional Without a Technical Background (2022 Guide for Newbies) Rating: 0 out of 5 stars0 ratingsDarknet Rating: 4 out of 5 stars4/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5How to Hack Like a Legend: Hacking the Planet, #7 Rating: 5 out of 5 stars5/5Tor and the Deep Web: Bitcoin, DarkNet & Cryptocurrency (2 in 1 Book) Rating: 0 out of 5 stars0 ratingsProtect Your Personal Information Rating: 0 out of 5 stars0 ratingsHacking: Computer Hacking for beginners, how to hack, and understanding computer security! Rating: 5 out of 5 stars5/5Zero to Hacking: Zero Series, #1 Rating: 0 out of 5 stars0 ratingsCompsec: For the Home User Rating: 0 out of 5 stars0 ratingsOnline Hacker Survival Guide Rating: 0 out of 5 stars0 ratings
Security For You
Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5NIST Cybersecurity Framework: A pocket guide Rating: 0 out of 5 stars0 ratingsHands-On Microservices with Kubernetes: Build, deploy, and manage scalable microservices on Kubernetes Rating: 5 out of 5 stars5/5Hacking For Dummies Rating: 4 out of 5 stars4/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5There's No Such Thing as Crypto Crime: An Investigative Handbook Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Codes and Ciphers Rating: 5 out of 5 stars5/5ISO/IEC 27001:2022: An introduction to information security and the ISMS standard Rating: 5 out of 5 stars5/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsUnmasking the Social Engineer: The Human Element of Security Rating: 5 out of 5 stars5/5Mastering Blockchain Rating: 5 out of 5 stars5/5Google Cloud Platform an Architect's Guide Rating: 5 out of 5 stars5/5There's a War Going On But No One Can See It Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Deep Dive: Exploring the Real-world Value of Open Source Intelligence Rating: 0 out of 5 stars0 ratingsHow to Measure Anything in Cybersecurity Risk Rating: 4 out of 5 stars4/5Amazon Web Services (AWS) Interview Questions and Answers Rating: 5 out of 5 stars5/5ISO 27001 Controls – A guide to implementing and auditing Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 Rating: 0 out of 5 stars0 ratings
Reviews for Make Your Smartphone 007 Smart
14 ratings1 review
- Rating: 5 out of 5 stars5/5i liked it when you were on my mind i
1 person found this helpful
Book preview
Make Your Smartphone 007 Smart - Conrad Jaeger
Make Your Smartphone 007 Smart
By Conrad Jaeger
v 4:1
Published at Smashwords
Copyright Alan Pearce 2016
ISBN: 9781370004027
© Alan Pearce November 2016
alanpearce.com
Updated December 2016
Table of Contents
Introduction
1. Clear Out, Load Up, Lock Down, Run Silent
2. Keeping out the Spies
3. High-Level Threats
4. Counter-Intrusion
5. Accessing Hidden Networks
---Using Tor
---Entry Points
6. Secure Communication
7. Secret Messaging
8. Usenet Newsgroups
9. Portable Apps
10. 007 Apps
11. IP Cameras
Learn How to Protect Yourself in the Digital Age
Disclaimer
This book is for educational purposes only. In no way is it the intention of the author, publishers or distributors to encourage anyone to do anything illegal. The author, publishers and distributors accept no liability for anything that happens in any way connected with the reading, possession or use of this book.
Don’t even think about it.
A technical aside
The Deep Web addresses marked listed here can only be opened with Tor-Firefox browser, which you will learn to configure later.
Free, open source software is generally preferable to the paid-for variety because it can be tested by developers and any logging devices or backdoors can be identified.
Be alert that no single system or piece of software is 100% secure or safe.
Introduction
The smartphone in your pocket can easily be turned into a high-tech spy tool and counter-surveillance device to rival anything that Ian Fleming’s Q might have dreamt up.
You can communicate secretly, browse the web anonymously, access the Deep Web and hidden networks, view banned content, download privately, and continue using Twitter and Facebook if their services are ever blocked locally. You can even take over and control many public and private security cameras.
Conversely, mobile devices are not secure unless you make them so. If somebody wants to know where you are at this precise moment, your smartphone or tablet will tell them – even if they are turned off.
Mobile espionage, long the preserve of law enforcement and specialized investigators, has now evolved into a fully-fledged cybercrime industry. In 2011, Kaspersky Labs detected nearly 5,300 new malicious programs for all mobile platforms. By the end of 2012, the number exceeded six million – the vast majority aimed at Android. Today, that number is almost impossible to count.
When it comes to securing your system, there are several concerns – ad networks, cybercriminals, stalkers, malicious trolls, law enforcement, intelligence agencies and corporate spies – and they all use similar techniques. Generally, they do this by so-called social engineering
, the art of playing on peoples’ gullibility or natural desire to please. They do this by enticing