Of course, I would like to live in a world where no one ever cheats. But this is a myth that is not destined to come true. People tend to make mistakes and let down those they love. To avoid becoming a victim of betrayal, we suggest using the simplest and in an accessible way obtaining evidence - with the help mobile phone.

Many people on the Internet today are looking for information regarding how to get maximum access to their partner’s mobile phone. For example, users global network, are looking for options on how to listen to your wife’s phone, how to read messages that arrive and are sent to the subscriber’s number, and it would be interesting to look at the media files of the person with whom you share weekdays and nights. And the main question: is it possible to “dig” into a smartphone his companion/companion unnoticed by him? After all, there is always a possibility that your suspicions are unfounded, and then this can develop into a large-scale scandal with the most unpredictable consequences.

The Internet industry does not stand still; nowadays, a lot of applications have been developed that make the life of the user of the 21st century easier. To be aware of how your half lives, you can always use utilities called “spies”. Such applications intercept information received on a mobile phone and transmit it to a server, from which you can then view, read, listen and analyze it at any time. Therefore, if you are looking for methods on how to listen to your wife or husband’s mobile phone, then this is the best.

The only drawback of this “” is that even for 10 minutes, you need to get your wife’s phone number at your disposal. This will only need to be done once, but then you will know everything about your friend/girlfriend/or wife.

Such programs are easy to install, but at the same time they become invisible to the owner herself. Even if she is an advanced user, she will still not be able to detect the interceptor.

Don't worry that your loved one has deleted the call history and messages from her phone. As they say, “the Internet has an eternal memory...”, so all her contacts will still be saved on the server, even if she immediately erases them from her cell phone.

If doubts don’t allow you to breathe easy, if you are always looking for incriminating evidence on your half, and this is increasingly becoming the cause of quarrels in your family, then just install it on her smartphone. If you are going to accuse, then you must have all the evidence on hand!

We wish you only one thing: let tapping your wife’s phone prove to you that she loves only you!

The need to record android conversation may occur for various reasons. For example, you have an important call coming up, the details of which you want to save. Modern mobile devices are equipped with functional software that allows you to record telephone conversations without installing additional applications.

Automatically record android conversations

On an *android* phone, recording telephone conversations* is easily implemented using standard options. Not all owners of devices on the Android platform know that absolutely all telephone conversations can be recorded.

Let's take a closer look at how to do this:

  • Select the desired subscriber from the list of contacts or enter the person’s number manually;
  • Activate the call;
  • Immediately after the call is made, an additional “More” menu will open on the screen, open it;
  • Select the "Dictaphone" command.

After a series of these simple steps, automatic recording of the conversation will begin. After pressing the end call button, the recording stops.

How to listen to recorded phone conversations

As practice shows, difficulties can arise not only directly with the creation sound file, but also with its search. There are two options for listening to the recording. The simplest one is to open the recent call log and click on the special icon that marks all recorded conversations. The audio file will open automatically.

But this method It’s not always convenient to use, especially if you need to find a recording of a telephone conversation that took place a long time ago. For search necessary information go to the “Tools” menu section and select “My Files”. In the audio folder you can find required file. Another saving path is a folder "Android" - Call Recording.

A file with a recording of a telephone conversation can later be moved from the device’s memory to a memory card and can be sent to another user.

The most obvious way is official wiretapping by the state.

In many countries around the world, telephone companies are required to provide access to telephone wiretap lines to competent authorities. For example, in Russia, in practice, this is carried out technically through SORM - a system of technical means to ensure the functions of operational-search activities.

Each operator is required to install an integrated SORM module on its PBX.

If a telecom operator has not installed equipment on its PBX to wiretap the phones of all users, its license in Russia will be revoked. Similar total wiretapping programs operate in Kazakhstan, Ukraine, the USA, Great Britain (Interception Modernization Program, Tempora) and other countries.

The corruption of government officials and intelligence officers is well known to everyone. If they have access to the system in "god mode", then for the right price you can have it too. As in everyone state systems, in the Russian SORM there is a big mess and typical Russian carelessness. Most technical specialists actually have very low qualifications, which allows unauthorized connection to the system without the notice of the intelligence services themselves.

Telecom operators do not control when and which subscribers are listened to via SORM lines. The operator does not check in any way whether there is a court sanction to wiretap a particular user.

“You take a certain criminal case about the investigation of an organized criminal group, in which 10 numbers are listed. You need to listen to a person who has nothing to do with this investigation. You simply get this number and say that you have operational information that this is the number of one of the leaders of a criminal group,” say knowledgeable people from the website “Agentura.ru”.

Thus, through SORM you can listen to anyone on “legal” grounds. This is such a secure connection.

2. Wiretapping through an operator

Operators cellular communications In general, without any problems, they look at the list of calls and the history of movements of a mobile phone, which is registered in various base stations according to its physical location. To obtain call records, like the intelligence services, the operator needs to connect to the SORM system.

For Russian law enforcement agencies, there is little point in installing Trojans, unless they need the ability to activate a smartphone’s microphone and record, even if the user is not talking on a mobile phone. In other cases, SORM does an excellent job of wiretapping. Therefore, Russian intelligence services are not very active in introducing Trojans. But for unofficial use it is a favorite hacking tool.

Wives spy on their husbands, businessmen study the activities of competitors. In Russia, Trojan software is widely used for wiretapping by private clients.

A Trojan is installed on a smartphone different ways: via fake software update, through an email with a fake application, through a vulnerability in Android or in a popular software like iTunes.

New vulnerabilities in programs are found literally every day, and then they are closed very slowly. For example, the FinFisher Trojan was installed through a vulnerability in iTunes, which Apple did not close from 2008 to 2011. Through this hole, it was possible to install any software on behalf of Apple on the victim’s computer.

It is possible that such a Trojan is already installed on your smartphone. Have you ever felt like your smartphone battery has been draining a little faster than expected lately?

6. Application update

Instead of installing a special spy Trojan, an attacker can do an even smarter thing: choose an application that you yourself voluntarily install on your smartphone, after which you give it full authority to access phone calls, record conversations and transfer data to a remote server.

For example, it could be a popular game that is distributed through “left” directories mobile applications. At first glance, it’s an ordinary game, but with the function of wiretapping and recording conversations. Very comfortably. The user manually allows the program to access the Internet, where it sends files with recorded conversations.

Alternatively, malicious application functionality may be added as an update.

7. Fake base station

A fake base station has a stronger signal than a real base station. Due to this, it intercepts subscriber traffic and allows you to manipulate data on the phone. Known to be fake base stations widely used by law enforcement agencies abroad.

In the USA, a model of fake BS called StingRay is popular.



And it's not just law enforcement agencies that use such devices. For example, merchants in China often use fake BS to mass mailing spam to mobile phones that are located within a radius of hundreds of meters around. In general, in China the production of “fake honeycombs” has been ramped up, so in local stores it is not a problem to find such a device, assembled literally on your knees.

8. Hacking a femtocell

Recently, some companies have been using femtocells - low-power miniature cellular stations that intercept traffic from mobile phones within range. This femtocell allows you to record calls from all company employees before redirecting calls to the base station mobile operators.

Accordingly, to wiretap a subscriber, you need to install your own femtocell or hack the operator’s original femtocell.

9. Mobile complex for remote wiretapping

In this case, the radio antenna is installed close to the subscriber (operates at a distance of up to 500 meters). A directional antenna connected to the computer intercepts all phone signals, and when the work is completed, it is simply taken away.

Unlike a fake femtocell or Trojan, here the attacker does not have to worry about getting into the site and installing a femtocell, and then removing it (or removing the Trojan without leaving any traces of hacking).

The capabilities of modern PCs are enough to record a GSM signal on a large number of frequencies, and then crack the encryption using rainbow tables (here is a description of the technique from a well-known specialist in this field, Carsten Nohl).

If you voluntarily carry a universal bug with you, you automatically collect an extensive dossier on yourself. The only question is who will need this dossier. But if he needs it, he can get it without much difficulty.

About what it is phone wiretapping what they are phone wiretapping and where buy phone wiretapping we will tell you in this article.

The concept itself phone wiretapping includes two concepts: the abstract concept of the listening process itself and the concept electronic device, with the help of which any conversations are monitored, including telephone conversations.

In this article we will look not only wiretapping a landline phone, IP telephony wiretapping, but also cell phone wiretapping. The difference in wiretapping regular phone and wiretapping of a mobile phone lies in the difference in communication channels through which information is transmitted between subscribers and the size of the devices for communication.

Wiretapping a landline phone

Let's consider a communication channel between two subscribers and consider the possibility wiretapping a landline phone.


As you can see from the figure, the communication channel between subscribers for landline phones passes through the PBX. If we consider the situation with wiretapping a landline phone in more detail, it will become clear that the communication channel is also a wire coming from the apartment or office of each subscriber through corridor risers, interfloor boxes, and then into underground cable channels. If you just imagine in your mind through what physically accessible places for external influence the wire of an ordinary city wire passes telephone communication, then it becomes clear that even a schoolchild can get access to subscriber conversations.

Wiretapping connection points

Let's look at physical locations phone wiretapping connections to the communication channel in more detail to the subscriber to the subscriber. More precisely, we will consider only half of the communication channel - from one of eavesdropped subscribers to the PBX, since we will take into account the symmetry of the second subscriber’s channel relative to the PBX. So, as many could probably guess, the first step phone wiretapping is the handset. I'm afraid to disappoint the erudites, although such an attempt will be counted, it is not correct. Telephone wiretapping starts outside the handset of the phone. Since the voice of subscriber1 (sitting near the handset) and the voice of subscriber2 can be heard by me handset, it is enough to place phone wiretapping somewhere near telephone. With good microphone sensitivity wiretapping, both the voice of the first and the second subscriber will be heard. What can play a role in this case? wiretapping? Anything: it could be a mini-dictaphone and mini radio bug And mini GSM bug.

Wiretapping in a telephone handset

The second place is implementation in the communication channel with wiretapping the phone is, of course, the same telephone receiver. Such a large telephone handset can not only accommodate a good quality radio bug or voice recorder with a microphone, but also allows you to connect directly to the speaker and microphone contacts, which will provide the most best quality audible voice of both subscribers. The most interesting thing is that wiretapping located in a stationary device do not need to change batteries, since they can be powered wiretapping scheme directly from the wires of a landline telephone.

The third weak point is the telephone box. Since the signal passes through its circuit, then wiretapping can be connected and in the device itself. In Soviet times, when there were no voice recorders on micro-flash cards, it was even possible to install a mini-cassette recorder in the phone case. In our time, when landlines purchased the size of mobile phones, implementation of telephone wiretapping into a machine or tube has become problematic, but still achievable. We will tell you how to do this in the description paragraph. wiretapping cell phones. The picture below shows an example of a telephone with a built-in GSM bug.

The fourth vulnerable point for wiretapping is the wire from a landline telephone. It is not even necessary to cut the wire and connect parallel to the wires. It is enough to place the induction bug on the wire, which will receive a clear signal based on the induced radiation. The listened signal can then be either recorded or transmitted over a radio channel.

Connecting wiretapping to a communication cable

After leaving a residential or office premises, the telephone cable usually passes through publicly accessible places, such as the staircase hall, interfloor box, and, ultimately, the access distribution box. Access to such places is as easy as shelling pears: just enter the victim’s entrance or call neighbors under the guise of a guest. It is also very easy to gain access to office premises: just pretend to be a client or customer and receive an invitation to the office complex. Telephone wiretapping device, which can be placed in the staircase hall in a junction box, costs from $100 and above, depending on the required operating time and functionality.

In the picture below we see bug, built into the tee telephone socket, which in Russia can be bought from 2000 rubles.

If it is possible to cut into the telephone wiring, then you can install the same bug as on a regular wire.

Well, and, perhaps, the last segment of the sidebar wiretapping telephone lines this is an automatic telephone exchange. The PBX with its terminal equipment is usually available for wiretapping only to special services. But it’s true that everything is prepared for this. There is no need to crash into anything or connect anything. For digital PBX of the latest generation, it is enough to programmatically select a subscriber and put all his conversations on record. Wiretapping is carried out by special order. To check whether a number is being tapped, just call tapped number and at the moment you pick up the phone, listen to the receiver. If a beeping sound is heard for 1-2 seconds at a frequency of approximately 500 Hz, then we can confidently say that the subscriber is being tapped. If not, then nothing can be said for sure.


Bluetooth headsets have already become commonplace, and most of us have one of these in our pocket, at home, or already inserted into our ear. The next time you see someone with a Bluetooth headset that doesn't look like a regular Bluetooth headset, you can be sure that it's a spy one. wiretapping.


This one is unique wiretapping can not only record video, but also transmit a Bluetooth signal to compatible smartphones. Of course, you can forget about the secular quality of 1024p, since the camera shoots at 480p at 30 frames per second. This permission, however, is quite enough for the spy to listen to and collect the necessary video evidence of the enemy.

During the Cold War, the United States led wiretapping USSR communication cables on the ocean floor. A special wiretapping bug weighing 6 tons was lowered from the submarine and attached to the cable itself. The information was collected by wiretapping using induction noise created by the cable.

Special electronics separated information channels and recorded data onto media. The wiretap had a built-in battery, allowing the wiretap to operate for several months. At the end of the recording, the wiretap was retrieved and the data was analyzed in the information processing center.

Wiretapping, produced in the Barents and Okhotsk Seas, essentially did not justify itself. Since the USSR had an embedded agent, misleading data was leaked through communication channels and the US costs for installing wiretapping did not pay off.

Many wiretaps are still on communication cables, since their removal is not economically or strategically beneficial to either party. Most of the recordings are made up of ordinary telephone conversations.

A few simple rules to help avoid wiretapping

If you suspect that someone has tracked you wiretapping, you must adhere to all the points below. They will help determine whether your suspicions are true and will also significantly reduce the likelihood of a leak. confidential information.

1. Regularly check sockets, panels, wiring and wires for the presence of listening devices. This is due to the fact that in such places it is possible to ensure a constant supply of energy for “ bug" Under this condition, wiretapping can be carried out for an unlimited amount of time.

2. Be sure to check all gifts received, especially if you did not expect to receive them. The greatest attention should be paid to items that are intended to be constantly with their owner (for example, a watch). It is also worth checking small details that were accidentally left or forgotten. The listening device can be disguised as anything - a pen, a cufflink, a keychain.

3. It should be understood that even the most secure phone line cannot guarantee complete confidentiality of the conversation. All important issues should be discussed in person and not over the phone. If you urgently need to solve something important via phone, veil the meaning in such a way that it is incomprehensible to outsiders.

4. To make sure that you have installed wiretapping, try throwing misinformation into the conversation a couple of times. After this, all that remains is to closely monitor all possible wiretapping organizers.

5. Stop the conversation when the interlocutor’s hearing has sharply worsened or improved. Since this is one of the main signs that phone wiretapping. Another effect that can occur on tapped phones is a decrease in your audibility for the interlocutor. These oddities occur when a listening device is inserted into a telephone line (the voltage in it is reduced).

6. Before holding important meetings, completely turn off all phones (both landline and mobile). You should also be sure to turn on background music. It won't interfere with the conversation, but it will interfere with wiretapping will obviously create.

Ways to protect against phone wiretapping

In a highly competitive environment modern business Quite serious attention is paid to security measures and the protection of confidential information from unauthorized access. One method of such an invasion is phone wiretapping, both stationary and mobile. Is it possible to avoid such interference?

To protect landline phones from wiretapping, you can use a special module that is installed on the site telephone cable, connecting the PBX and the subscriber, since it is most often used to install listening devices. Functional Features The device allows you to detect and suppress connections to the line of other telephones, voice recorders, and bugs, not only in conversational mode, but also when on-hook. Such protective devices are effective for both tone and pulse dialing devices.

One of the fairly reliable ways wiretapping protection for both landline and mobile phones is to install a scrambler – special device, which is combined with a telephone and encrypts the transmitted speech. A significant disadvantage of this technology is the need for both subscribers conducting a conversation to have such devices. An effective method of combating wiretapping is the use of a cryptophone - an independent device for mobile communications or a small telephone set-top box, with the help of which highly complex encryption of conversations is carried out.

In parallel with technical means wiretapping protection exist and software solutions Problems. Modern mobile phones and smartphones are equipped with built-in programs that block unauthorized access or allow you to install such functions. MicroSD cards have also been created that have an integrated chip that supports encryption functions. Such cards can be used in mobile phones, smartphones and communicators.

All funds from wiretapping vary in price, degree of protection and are selected depending on necessary requirements to fencing against unauthorized access.

Signs of phone tapping

Wiretapping The telephone, as a form of non-indirect espionage, is available only to the special services, which, in turn, are equipped with good equipment.

Espionage is information that can be resold to other people or other companies. As a rule, it is very expensive and often there is a need for personal connections in the company for sale. A few examples: As an option for the self-taught, it will be easy program, such as “wiretapping”, the Internet is full of such programs today. Its significance lies in the fact that the program does not connect to communications from the outside, but only records conversations directly from the victim’s phone. These are the programs that send audio recordings, SMS, pictures and video files to the customer.

As you know, it is impossible to determine for yourself that you are being bugged, or it can be reduced to a minimum. So how can a mere mortal determine this?

The phone is "independent".
Without your participation, it rebooted, dialed some numbers, turned on and off, installed and launched programs, deleted data. Such a “habit” may be caused by an important malfunction in the device, but also the fact that cell phone is tapped maybe too.

The phone somehow quickly began to discharge.
An unexpectedly dead battery may indicate dangerous program in the device. Naturally, all chargers begin to work worse over time. But the reduction in capacity does not happen immediately. If the phone was recently purchased, or yesterday there was enough charge for 8 days, and today it takes 6 hours, this is not good.

The battery is heating up.
Hot battery - perhaps there is some program running on the phone, or maybe not. Hot phone during a conversation - this is not terrible (since you create the heat yourself).

Audible interference.
Noise appears during a conversation; it can appear if the signal reception is poor or if the phone is of poor quality. When you hear hissing, clicking or squealing, sitting or walking in any place, and in conversations with relatives, there is cause for concern. It is also very alarming if there is an “echo”.

In simple language we can talk about lies (dialed, received calls).
Maybe someone’s unfamiliar number will appear on your phone, which you did not dial or accept, and there is a “duration” of the connection - you should worry, it may have been carried out wiretapping via mobile.

The device “does not want” to turn off.
It happens that you try to turn off the phone, it doesn’t want it and starts doing all sorts of tricks, turns on the backlight or doesn’t turn off - you can be sure that the phone is a carrier of the very bad one, spyware. Or the failure may be caused by a simple technical problem.

How to avoid becoming a victim of wiretapping

You don’t have to be paranoid or suffer from persecution delusions to one day think: “I think I’m are bugged, and maybe they’re recording it on camera.” Of course, such thoughts are much closer to successful people who have something to hide, but ordinary citizens are sometimes subject to routine checks by intelligence services and law and order units.

To avoid becoming a victim wiretapping it is enough to follow a few simple rules and have the necessary amount of attentiveness.
The first rule on this list and, perhaps, the most important is to be careful in conversations on the phone and, preferably, conduct them in person. This will help avoid churn important information. In the event that a personal meeting is impossible, you can use “Aesopian language” - a combination of words, syllables and even just sounds that is very incomprehensible to outsiders who do not know your personal encoding. But such encoding will have to be developed jointly with the interlocutor, which is also not always possible.

The second rule says that it is very important when telephone conversations take into account the quality of communication. mobile connection tends to “fail” and break, but landline telephones, which depend only on the stability of the telephone line, rarely fail their owners. When introducing “bugs” and listening devices onto a telephone line or PBX, the quality of communication will significantly improve on the one hand and deteriorate on the other. This occurs due to a sudden drop in voltage. Of course, a drop in communication quality can also be caused by a normal network electrification failure, but this behavior of the device may well cause alarm. In this case, there are two ways out of the situation: stop the telephone conversation (which will certainly arouse the suspicion of the listening party) or carry out deep misinformation.

The third rule should be used when conducting business negotiations in a conference room or your own office, especially if they are very significant for you, it is worth checking for auditions all furniture, baseboards, hoods and any items that are present in the room. Also, during negotiations, it is recommended to turn on quiet background music, which will interfere with communication, and turn off mobile phones, which themselves can be transmitting devices.

And, of course, you should be wary of gifts from business partners and, especially, from competitors. Every gift - be it technology or a harmless souvenir - may contain a recording or relay device.
It wouldn’t hurt to install your own surveillance, which will help identify the actions of unauthorized persons in the room.

Many of the methods below are legal. But not all.

As a rule, if you are not doing anything illegal or are not under suspicion, then you will not be wiretapped. But this does not eliminate the chance of wiretapping by business competitors, criminals and other ill-wishers.

Just know all this information and sleep well.

SORM

The system of operational-search activities is official, state, total wiretapping. In the Russian Federation, all telecom operators are required to install SORM on their PBXs and provide law enforcement agencies with access to user conversations and correspondence.

If the operator does not have SORM, he will not be issued a license. If he disables SORM, the license will be revoked. By the way, not only in neighboring Kazakhstan and Ukraine, but also in the USA, Great Britain and many other countries, the same system operates.

The installation of SORM is determined by the Law “On Communications”, order of the Ministry of Communications No. 2339 of August 9, 2000, order of the Ministry information technologies and Communications of the Russian Federation dated January 16, 2008 N 6 “On approval of the Requirements for telecommunication networks for carrying out operational investigative activities”, as well as a dozen other regulatory documents.

SORM includes:

  • Hardware and software that is installed by the telecom operator;
  • Remote control center, which is located at law enforcement agencies;
  • Data transmission channels, the operation of which is provided by the provider to establish communication with a remote control point.

SORM is usually divided into three generations:


Operators in the Russian Federation predominantly use SORM 2. But in practice, for 70% of companies, the system either does not work at all or works with violations.

First of all, SORM is expensive to install (and the operator must do this at his own expense according to an individual plan approved by the local FSB department). For most operators, it is easier to pay about 30 thousand rubles in fines in accordance with Part 3 of Article 14.1 of the Code of Administrative Offenses of the Russian Federation.

In addition, the operator’s SORM may conflict with FSB complexes. And because of this, it is technically impossible to record user traffic.

Operators do not control how intelligence agencies use SORM. Accordingly, they cannot prohibit listening to your specific number.

However, intelligence services formally need a court decision to wiretap. In 2016, courts of general jurisdiction issued 893.1 thousand such permits to law enforcement agencies. In 2017, their number decreased, but only slightly.

However, it doesn’t cost law enforcement officials anything to include someone’s number in a wiretapping kit as potentially suspicious. And refer to operational necessity.

In addition, the security level of SORM is often low. So there remains the possibility of unauthorized connection - unnoticed by the operator, subscriber and intelligence services.

The operators themselves can also view the history of calls, messages, and smartphone movements across base stations.

Signaling network SS7 (SS7)

SS7, OKS-7, or signaling system No. 7 is a set of signaling protocols that are used to configure PSTN and PLMN telephone exchanges around the world. Protocols use digital and analog channels to transmit control information.

Vulnerabilities in SS7 are found regularly. This allows hackers to connect to the operator's network and listen to your phone. Generally speaking, there were practically no security systems built into SS7 - it was initially believed that it was protected by default.

Typically, hackers infiltrate the SS7 network and send a Send Routing Info For SM (SRI4SM) service message through its channels. He specifies the wiretapping number as a message parameter. In reply home network subscriber sends IMSI (International Subscriber Identity) and MSC switch address, which in currently serves the subscriber.

After this, the hacker sends another message - Insert Subscriber Data (ISD). This allows him to infiltrate the database and upload his address there instead of the subscriber's billing address.

When a subscriber makes a call, the switch accesses the hacker's address. As a result, a conference call is carried out with the participation of a third party (the attacker), who can listen and record everything.

You can connect to SS7 anywhere. So Russian number They may well break from India, China, or even from distant hot Africa. By the way, SS7 allows you to use USSD requests to intercept SMS or transfer balance.

In general, SS7 is the “mother of all holes” and the most vulnerable point mobile system. It is now used not only for wiretapping, but also to bypass two-factor authentication. In other words, to access your bank accounts and other protected profiles.

Trojan applications

This is exactly the simplest and most common method. Install the application while your partner is in the shower, or use methods social engineering to force people to follow a link is much easier than negotiating with the authorities and the FSB.

Applications allow you not only to record cell phone conversations or read SMS. They can activate the microphone and camera to secretly listen and film everything that happens around them.

The most popular Trojan of this kind is FinFisher. In 2008-2011, it was installed on the iPhone through a hole in iTunes, which Apple for some reason did not close. Brian Krebbs wrote about the vulnerability back in 2008, but everyone pretended it didn't exist.

In 2011, the Egyptian government used FinFisher during the Arab Spring. Moreover, it acquired official version for 287 thousand euros. Shortly after this, WikiLeaks showed on video how FinFisher, FinSpy and other Gamma Group developments collect user data. And only after that Apple was forced to close the hole.

How can you be persuaded to install a spy for wiretapping? This could be an update of a popular game from a “left” catalog, an application with discounts, or a fake system update.

By the way, law enforcement agencies also use spy applications – for example, when they cannot go the official route and obtain court permission. Trojans for 0day vulnerabilities in Android and iOS are a multimillion-dollar market, products on it are in demand in many countries around the world.

Remote wiretapping

There are three options here - a mobile complex, a femtocell or a fake base station. All of them are not cheap, so the average user will not be tapped in this way. But we’ll still tell you how it works.

The mobile complex is installed at a distance of up to 300-500 m from the smartphone being monitored. A directional antenna intercepts all signals, the computer stores them and decrypts them using rainbow tables or other technologies. When the wiretapping is completed, the complex simply leaves.

The fake base station (IMSI interceptor) has a stronger signal than the real one. The smartphone sees that such a station will provide the best quality of communication, and automatically connects to it. The station intercepts all data. The size of the station is slightly larger than a laptop. It costs from $600 (handicraft) to $1500-2000 (industrial options).

By the way, fake stations are often used to send spam. In China, craftsmen assemble such devices and sell them to companies that want to attract buyers. Often, fake BS is used in combat areas to misinform the military or the population.

Femtocell is a smaller device. It is not as powerful as a full-fledged communication station, but it performs the same functions. Femtocells are usually installed by companies to listen to the traffic of their employees and partners. The data is intercepted before it is sent to the base stations of cellular operators. But the same femtocell can be installed for spot wiretapping.