Telephone, Voice Over Internet Phone (VOIP), Cell Phone, And Superphone
All cell phones not only track you, the Superphones have GPS as well as Internet access and can be much more dangerous than a computer to your personal security and privacy.
All the privacy concerns and dangers listed in the previous chapter about computers apply to the Superphone that most carry today. There is the added risk of location tracking by Cell Tower Triangulation and GPS tracking that can pinpoint your location within a few feet.
Here are your security levels with these communication devices from most secure to least secure in descending order:
Level One:
Don’t own a cell phone so there is no number to give out to people and No Tracking Ever! There is no over-the-air communication, which is easily monitored.
Use a VOIP phone (MagicJack) at home, registered in a Fake Name or Protected Business Name, on a Level Two protected and secure computer. It is best to use a wired phone plugged into the MagicJack rather than a cordless phone because the cordless phone is over-the-air and anyone can be listening. Since you already have a computer with an Internet connection and it is protected, the VOIP phone working through that computer poses no added security risk as long as you DO NOT plug a cordless over-the-air telephone into the VOIP’s box that is linked to the Internet. Always use a corded phone for maximum security.
RECOMMENDATION: For VOIP, I like the Magic Jack or the recently introduced MagicJack Plus and MagicJack Go that can work with or without a computer, but an Internet connection is still needed. Bought retail for cash so no personal information is given out. Register to a fake name (I use David, David … So it looks like I made a mistake and repeated my first name in the last name box). Maybe NOT registered for 911 calls to your living address. This is so your living address does not end up in a whole bunch of databases even if it is attached to a fake name. You could use a neighbor’s address for 911 emergencies, so the police or fire department would arrive near to the correct address in an emergency.
Level Two:
A basic Prepaid Cell Phone (with any backup battery disabled) and kept turned off in your auto with the battery removed. This cell phone is for emergency use only or for occasional use while traveling and never used at home except in a dire emergency. Register to a fake name or protected Business Name so it is not traceable to you personally. You insert the battery and turn this phone on only as needed and only when miles from your home. You turn it back off and remove the battery as soon as you finish using it.
I buy the prepaid cell phone locally and anonymously for cash. Don’t give the number to anyone.
WARNING: If you forget to turn the Cell Phone off, remove the battery, and travel home with it on or the battery in … You’ve been tracked!
Use a VOIP phone (MagicJack) at home, registered in a Fake Name or Protected Business Name, on a Level Two protected computer. This is preferred to the Prepaid Cell Phone because the Cell Phone can track your location. See VOIP information and IMPORTANT NOTE under Level Two about VOIP.
I’m currently at Level Two but would have no great issue with getting rid of the basic prepaid cell phone and becoming Level One. I rarely use the prepaid cell phone and then only when traveling in my car. I could survive fine without the prepaid cell phone. It’s nice to have for an emergency and backup.
Level Three:
TRY TO AVOID THIS LEVEL!
A Basic Cell Phone without an imbedded battery so you can remove it and with any backup battery disabled or removed. You require much airtime away from home. You use this cell phone for travel and when away from home. You turn it off long before you arrive back home and remove the battery. Bought locally for cash and registered to a protected Business Name and Protected Address. You turn it off long before you arrive back home and use VOIP at home. Don’t give the number to anyone except your trusted inner circle or to nobody.
WARNING: If you forget to turn the Cell Phone off, remove the battery, and travel home with it on … You’ve been tracked!
Use a VOIP phone (MagicJack) at home, registered in a Fake Name or Protected Business Name, on a Level Two protected and secure computer. Don’t use a Cell Phone because the Cell Phone can track your location. See VOIP information and IMPORTANT NOTE under Level Two about VOIP.
Level Four:
AVOID THIS LEVEL!
A Superphone without an imbedded battery so you can remove it and with any backup battery disabled or removed. You only go here because you need the Superphone functions for business purposes, maybe you travel a lot, or away from home a lot. You turn it off long before you arrive back home and remove the battery. Bought locally for cash and registered to a protected Business Name and Protected Address. Don’t give the number to anyone except your trusted inner circle or to nobody.
WARNING: If you forget to turn the Cell Phone off, remove the battery, and travel home with it on or the battery in … You’ve been tracked.
Use a VOIP phone (MagicJack) at home, registered in a Fake Name or Protected Business Name, on a Level Two protected and secure computer rather than the Superphone because the Superphone can track your location. See VOIP information and IMPORTANT NOTE under Level Two about VOIP.
Level Five:
BE AS UNSECURE AND UNPROTECTED AS THE AVERAGE JOE AND DON’T EVEN BOTHER TO PROTECT YOUR HOME WHILE YOU ARE AT IT. YOU ARE ONLY AS GOOD AS YOUR WEAKEST LINK AND THE SUPERPHONE OR ANY CELL PHONE YOU USE AT HOME IS BY FAR YOUR WEAKEST LINK!
You might as well have a hardwired Landline Telephone too if you choose to live at this level (expensive and registered to your home address).
What is a basic Cell Phone?
It’s a “no-frills” cell phone defined more by what it does not have than has. There’s no camera, 3G or 4G radio, WIFI, Bluetooth, memory storage, music player, or apps. It can’t even send text messages. It’s a generic quad-band GSM cell phone offering nothing more than unprotected over-the-air voice communication.
Best Practices for General Cell Phone Security
Cell phones are small, easily misplaced, lost, or stolen. Someone knowledgeable easily compromises the best-secured cell phone. They may want your data or use your cell phone to incur a large roaming bill in your name.
Be aware of the risks of “Social Engineering”. If you are making a phone call that involves sensitive information, for example, a credit card number, be sure no one can overhear you and use the information fraudulently or commit identity theft.
Contact your cell phone provider as soon as your cell phone is lost or you think it’s been hacked. At a minimum, if your cell phone is lost or stolen you’ll want to stop service immediately before the thief can run up a big bill.
Password protect your phone. Use a strong password (minimum of 8 characters, with a mixture of numbers, symbols, uppercase, and lowercase letters). This prevents most casual thieves from stealing your info, but 95% of people don’t do this. If a cop asks for your phone, you are not obligated to give the password. For smartphones, apps like Lookout can be programmed to back up your data and help you find a lost phone.
Turn off Bluetooth, unless you need it. Disabling the Bluetooth service will significantly decrease a hacker’s opportunity to hack into your phone.
Get and install antivirus software, if it’s available for your model, and keep it updated. New malware is created every day, so it’s important to have antivirus software on your cell phone.
Don’t accept files and text messages from individuals you do not know. You wouldn’t download an attachment to an email you received from a stranger to your desktop or laptop computer. For the same reason you want to be careful about opening unsolicited files and text messages on your cell phone.
Get and install encryption software for your cell phone, if available. GadgetTrak offers a service that will encrypt your data and back it up in the cloud. There are ways around encryption, but this will stop 99% of hackers and police.
What if the police or criminals steal your phone and go to work hacking into it and getting your passwords, financial information, and recent whereabouts? Just use GadgetTrak, SeekDroid, or Webroot to remotely wipe your phone’s data. This can be done from your home computer.
FINAL SAFETY AND SECURITY NOTE: Never say anything over any communication device that you would not want published in tomorrow’s local newspaper. If something embarrassing or private needs to be securely communicated … Use Encrypted Email (next chapter), or meet face-to-face at a safe location. Intelligence agencies and many law enforcement agencies, educate their people to “never use a telephone or cell phone if a face-to-face meeting is possible” … NEVER! Do you remember when Obama was elected President? … The Secret Service took his Blackberry away before he was sworn in as President!