Make Your Smartphone 007 Smart
4/5
()
About this ebook
The smartphone in your pocket can easily be turned into a high-tech spy tool and counter-surveillance device to rival anything that Ian Fleming’s Q might have dreamt up.
You can communicate secretly, browse the web anonymously, access the Deep Web and hidden networks, view banned content, download privately and continue using Twitter and Facebook if their services are ever blocked locally.
Conversely, mobile devices are not secure unless you make them so. If somebody wants to know where you are at this precise moment, your smartphone will tell them – even if it is turned off.
The push by the commercial world and more recently by law enforcement and surveillance agencies to monitor all we do has led to a counter-revolution. The Mobile Internet has evolved and so has its counter-surveillance tools.
Rather like spies in a James Bond movie, mobile users have an array of digital tools to call upon, both to mask their identity and to provide real confidence that their correspondence, data and contacts are secure.
There are smartphone apps that let you see in the dark or measure the height of a building. You can film and record without being rumbled; send emails, PMs and SMS that cannot be intercepted or read. You can even take over and control many public and private security cameras.
Conrad Jaeger
Deep Web Guides - inter-active guides to the Deep Web
Read more from Conrad Jaeger
Deep Web Secrecy and Security: an inter-active guide to the Deep Web and beyond Rating: 4 out of 5 stars4/5Enter the Dark Net: The Internet’s Greatest Secret Rating: 4 out of 5 stars4/5
Related to Make Your Smartphone 007 Smart
Related ebooks
Deep Search: How to Explore the Internet More Effectively Rating: 5 out of 5 stars5/5The Book of Bad:: Stuff You Should Know Unless You’re a Pussy Rating: 5 out of 5 stars5/5The Best Hacking Tricks for Beginners Rating: 4 out of 5 stars4/5Ultimate guide for being anonymous: Avoiding prison time for fun and profit Rating: 4 out of 5 stars4/5How to Hack Like a Pornstar: Hacking the Planet, #1 Rating: 5 out of 5 stars5/5The Mobile Application Hacker's Handbook Rating: 3 out of 5 stars3/5How to Hack Like a GOD: Master the secrets of hacking through real-life hacking scenarios Rating: 4 out of 5 stars4/5Exploit the Art of Hacking Rating: 5 out of 5 stars5/5The Little Book of Scams: Swindling for Fun and Profit! Rating: 5 out of 5 stars5/5The Fine Art of Getting Even Rating: 5 out of 5 stars5/5The Most Forbidden Knowledge: 151 Things NO ONE Should Know How to Do Rating: 4 out of 5 stars4/5Serious Revenge: Reference Handbooks and Manuals Humor and Satire Rating: 4 out of 5 stars4/5Wireless and Mobile Hacking and Sniffing Techniques Rating: 0 out of 5 stars0 ratingsWireless Hacking 101 Rating: 4 out of 5 stars4/5Hacking: 25 Incredibly Useful Beginners Hacking Tips on How to Hack Rating: 4 out of 5 stars4/5Arrest-Proof Yourself Rating: 3 out of 5 stars3/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5Deep Web for Journalists: Comms, Counter-Surveillance, Search Rating: 5 out of 5 stars5/5Basic Wifi Hacking Rating: 0 out of 5 stars0 ratingsHacking Essentials - The Beginner's Guide To Ethical Hacking And Penetration Testing Rating: 3 out of 5 stars3/5How to Hack Like a Legend: Hacking the Planet, #7 Rating: 5 out of 5 stars5/548 Really Useful Web Sites Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5How to Kick Someone's Ass: 365 Ways to Take the Bastards Down Rating: 3 out of 5 stars3/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 4 out of 5 stars4/5
Reviews for Make Your Smartphone 007 Smart
12 ratings0 reviews
Book preview
Make Your Smartphone 007 Smart - Conrad Jaeger
Make Your Smartphone 007 Smart
By Conrad Jaeger
v 4:1
Published at Smashwords
Copyright Alan Pearce 2016
ISBN: 9781370004027
© Alan Pearce November 2016
alanpearce.com
Updated December 2016
Table of Contents
Introduction
1. Clear Out, Load Up, Lock Down, Run Silent
2. Keeping out the Spies
3. High-Level Threats
4. Counter-Intrusion
5. Accessing Hidden Networks
---Using Tor
---Entry Points
6. Secure Communication
7. Secret Messaging
8. Usenet Newsgroups
9. Portable Apps
10. 007 Apps
11. IP Cameras
Learn How to Protect Yourself in the Digital Age
Disclaimer
This book is for educational purposes only. In no way is it the intention of the author, publishers or distributors to encourage anyone to do anything illegal. The author, publishers and distributors accept no liability for anything that happens in any way connected with the reading, possession or use of this book.
Don’t even think about it.
A technical aside
The Deep Web addresses marked listed here can only be opened with Tor-Firefox browser, which you will learn to configure later.
Free, open source software is generally preferable to the paid-for variety because it can be tested by developers and any logging devices or backdoors can be identified.
Be alert that no single system or piece of software is 100% secure or safe.
Introduction
The smartphone in your pocket can easily be turned into a high-tech spy tool and counter-surveillance device to rival anything that Ian Fleming’s Q might have dreamt up.
You can communicate secretly, browse the web anonymously, access the Deep Web and hidden networks, view banned content, download privately, and continue using Twitter and Facebook if their services are ever blocked locally. You can even take over and control many public and private security cameras.
Conversely, mobile devices are not secure unless you make them so. If somebody wants to know where you are at this precise moment, your smartphone or tablet will tell them – even if they are turned off.
Mobile espionage, long the preserve of law enforcement and specialized investigators, has now evolved into a fully-fledged cybercrime industry. In 2011, Kaspersky Labs detected nearly 5,300 new malicious programs for all mobile platforms. By the end of 2012, the number exceeded six million – the vast majority aimed at Android. Today, that number is almost impossible to count.
When it comes to securing your system, there are several concerns – ad networks, cybercriminals, stalkers, malicious trolls, law enforcement, intelligence agencies and corporate spies – and they all use similar techniques. Generally, they do this by so-called social engineering
, the art of playing on peoples’ gullibility or natural desire to please. They do this by enticing