Cyber Security in the Mobile Space

GPS Data

Even if the GPS function of a device is deactivated, various permissions that are agreed to when using apps can still track the location even without the user knowing. Although the permissions the app has requested can be easily found, many people simply accept the request without looking into the associated security concerns. For example, Facebook is an app that is able to track the location of users even in the background when the app is not in use. In the settings menu of both iOS and Android, users are able to see what permissions each app has access to and then disable the permissions if necessary. However, for internet service providers or government organizations, blocking the ability to track location can be extremely difficult and go undetected as they can still be accessed while the phone is off and hence other physical measures must be taken such as utilizing a PrivacyCase.

Camera

The camera on the mobile phone, either the front or rear-facing cameras, can be accessed remotely without the user’s knowledge. With this, intrusive software can be used to take pictures or view the activity via the cameras at any time. A simple and inexpensive method of blocking others from viewing from the users phone camera is to block it with a case that covers both the front and back of the device. However, this does not stop the actual access of the camera, but rather obscures the view similarly to the camera blockers that block the view of the laptop cameras. As with the GPS, the camera can be accessed by apps which have the necessary permissions and hence should be carefully evaluated to see if they are crucial to the functions of the app.

In order to prohibit remote access to the camera, Camera Blocker – Anti Spyware (Android) can be downloaded to restrict all access to the camera with a single click. Through the app, access to the camera is completely blocked so that no app or the system can gain entry which effectively stops unauthorized views from viruses or organizations. One of the best features of Camera Blocker is that users are able to automatically set the time that they want the camera to be disabled. For example, in taking a picture, users can set their camera to be accessible for a few minutes and then automatically lock after that time has expired so that the camera is nearly always protected.

Microphone

Similarly to the camera, the microphone can also be accessed without the user’s knowledge in order to listen to the conversations and other activities. As a method of eavesdropping, this has traditionally been done by police forces with the correct legal procedures but accessing the microphone has been made easier to those who have malicious intent including government organizations who engage in mass surveillance. For this reason, Microphone Block -Anti malware (Android) is a mobile app that protects against wiretaps either from viruses or hackers. With a single tap, users are able to block all of the access to the microphone so that no audio is captured while the app also identifies the apps that have access to it.

Tools

The most effective countermeasure to all of these access points which can be used to invade privacy is a PrivacyCase which completely blocks all connections to the phone so that hackers and organizations are not able to remotely access any aspect of the device. With this, no signals can be sent to access the phone including the camera, microphone, or GPS. However, using this method eliminates the ability to receive calls and texts at the expense of increased security and so users of the PrivacyCase must limit their connectivity in order to effectively protect their device in terms of cyber security. Furthermore, the case acts physical protection as it is waterproof and shock absorbent.

As many of the access points such as the GPS and microphone can still be accessed when the device is turned off, the methods and tools outlined in this article should be utilized in order to increase privacy and security. For those who have removable batteries, removing the battery will render all of the access points useless. While fewer and fewer phones have removable batteries, it will become increasingly difficult to ensure the greatest degree of security and hence these tools are highly recommended.

Latest from NewsReports