This is some follow up on a previous post about using Smartphones to track people’s activity and movements. While it did not take us very long to know the phone had been hacked, it did take longer to get more adequate proof to demonstrate the details for people who were not living with the whole stalking experience directly. To be clear here are some definitions from the Internet. Hacked Phone or Phone Hacking: the action or practice of gaining unauthorized access to data stored in another person’s phone, especially in order to access their voicemail. Cloned Phone: phone cloning, lets you intercept incoming messages and send outgoing ones as if your phone were the original. If both phones are near the same broadcast tower, you can also listen in on calls. To clone a phone, you have to make a copy of its SIM card, which stores the phone’s identifying information.
Hacking a phone can be done with an app. there are hundreds of softwares out there. Once one of these apps are activated on your phone they can track just about all your activity. These applications can even remove the necessity to clone a phone. A cloned phone requires copying the SIM card and the IMEI number to do so. Phone cloning is harder to do due to advances in technology but it can still happen.
Back to what the symptoms of a hacked and tracked phone can be. For anyone looking around on the Internet of Things just search for ‘symptoms of a hacked phone’ or ‘track my girlfriend’ to see ways to hack and track. Also, ask Google, Cortana or Siri ‘How do I know if my phone has been hacked?’ There are a jillion articles out there and at least a few of them give similar symptoms but these are based on a great deal of first hand experience. And yes, we knew this for sure when the device was replaced… they went away.
If any others that I had to deal with come up I will update the article for sure. Those are the main issues that were easily recognizable as symptoms of a hacked or cloned phone. Check out the companion article about Google Tools to monitor account access and verify if you have unauthorized access to your Google account. https://youtu.be/tMJ3FzTnUU4 Here are a few common sense things you can do to protect yourself.
*This article has been updated in November 2018 to reflect the latest information on technology advances and changes in tools available to address this issue.*
While I am not sure of any one cause of becoming a control freak or…
With 70% of stalking victims knowing their abusers often a stalking circumstance is misunderstood, denied…
If only we could turn back tome to that point where we could understand, stop…
Cyberstalking is still a new phenomenon. Law enforcement, the courts and protection efforts are still…
Before you settle on the idea of having a SmartPhone stalker you need to know…
Surviving the Manipulation of a Stalker As we've gone through our experience dealing with stalking,…