Open
Close

Wiretapping my wife's phone. Wiretapping your wife's phone How can you wiretap a cell phone

There are many fairy tales surrounding the issue of wiretapping a phone without installing a monitoring program. Many newly minted spies claim the existence of such a possibility. Would-be marketers promote their products to intercept other people's conversations and SMS on the fly. But the fact that the GSM telephone network is secure and cannot be hacked without specialized equipment is usually kept silent. And easily led by such tricks, uninformed Internet users listen avidly and spend money.

All traffic from cellular operators is encrypted using a complex algorithm. To intercept it, you don’t need a lot of effort, it’s enough to stand in the path of this signal with a signal receiver (close to the person talking), however, to decipher protected information you will have to acquire very expensive equipment. Either the level of technical knowledge in the field of cryptography and simpler equipment, but also very expensive and bulky, with which you will not be mobile enough. In general, everything here is at the professional level, which means it is not accessible to the masses.

Telephone tapping by subscriber number - theory

So, wiretapping by subscriber number is possible. This is clear. And it is possible in several ways.

First way— to wiretap a phone without installing a program, you need to get access to data from mobile operators. In accordance with recent changes in legislation, operators are now required to store conversations of network users for several years. Just like text messages. But they do not have the right to disclose them in accordance with the same legislation. The responsibility for such an act is too great for them. Only intelligence services can access this data; they simply need to send a corresponding request, after which the operator is obliged to transfer all the requested information. Hence the simple conclusion - wiretapping without access to the phone is the prerogative of the special services for whom this is normal routine work. You just haven’t thought about how many crimes are solved by analyzing data from cellular operators.

Second way- wiretapping a phone without installing a program is possible when using complex software and hardware systems on GSM interception and decryption. But there are so many difficulties that the method will never become widespread.

First, you need to be in the signal interception zone from your mobile phone (or place a receiver there that sends all GSM signals to your base station).

Next, you will need powerful equipment to decrypt the received information, which is encrypted by operators using cryptographic algorithms. There are references on the Internet to certain “rainbow tables” for decrypting the 64-bit A5/1 cryptographic protection system used by cellular operators (it even sounds difficult, imagine what it costs to set up such a system). The tables themselves take up terabytes of hard disk space. To decrypt, you need equipment similar to mining (powerful graphics processors). And it turns out that you need to assemble a GSM signal receiver (it’s expensive, but craftsmen can use regular old Nokias, making some modifications to them), a computer with a large amount of memory and a powerful graphics processor. Combine this using a specialized program for processing the encrypted signal using rainbow tables and filter out everything unnecessary.

There is nothing impossible in all this for advanced specialists, but this is not a mass product for everyday use. And using it is also very difficult and not even always possible (you will have to follow your tracking object everywhere, or slip him a GSM receiver-transmitter, but then why not use a regular bug for wiretapping?).

Therefore, we can safely say that wiretapping a phone without spyware today is available only to a select few, which are the special services and agencies specializing in this issue. Those. wiretapping a phone using a subscriber's number without direct access to his device to install the program is practically impossible!

Related materials:


The most obvious way is official wiretapping by the state.

In many countries around the world, telephone companies are required to provide access to telephone wiretap lines to competent authorities. For example, in Russia, in practice, this is carried out technically through SORM - a system of technical means to ensure the functions of operational-search activities.

Each operator is required to install an integrated SORM module on its PBX.

If a telecom operator has not installed equipment on its PBX to wiretap the phones of all users, its license in Russia will be revoked. Similar total wiretapping programs operate in Kazakhstan, Ukraine, the USA, Great Britain (Interception Modernization Program, Tempora) and other countries.

The corruption of government officials and intelligence officers is well known to everyone. If they have access to the system in "god mode", then for the right price you can have it too. As in all state systems, the Russian SORM is a big mess and typically Russian carelessness. Most technical specialists actually have very low qualifications, which allows unauthorized connection to the system without the notice of the intelligence services themselves.

Telecom operators do not control when and which subscribers are listened to via SORM lines. The operator does not check in any way whether there is a court sanction to wiretap a particular user.

“You take a certain criminal case about the investigation of an organized criminal group, in which 10 numbers are listed. You need to listen to a person who has nothing to do with this investigation. You simply get this number and say that you have operational information that this is the number of one of the leaders of a criminal group,” say knowledgeable people from the website “Agentura.ru”.

Thus, through SORM you can listen to anyone on “legal” grounds. This is such a secure connection.

2. Wiretapping through an operator

Cellular operators generally look at the call list and movement history of a mobile phone, which is registered in various base stations according to its physical location, without any problems. To obtain call records, like the intelligence services, the operator needs to connect to the SORM system.

There is little point for Russian law enforcement agencies to install Trojans, unless they need the ability to activate the smartphone’s microphone and record, even if the user is not talking on a mobile phone. In other cases, SORM does an excellent job of wiretapping. Therefore, Russian intelligence services are not very active in introducing Trojans. But for unofficial use it is a favorite hacking tool.

Wives spy on their husbands, businessmen study the activities of competitors. In Russia, Trojan software is widely used for wiretapping by private clients.

The Trojan is installed on a smartphone in various ways: through a fake software update, through an email with a fake application, through a vulnerability in Android or in popular software like iTunes.

New vulnerabilities in programs are found literally every day, and then they are closed very slowly. For example, the FinFisher Trojan was installed through a vulnerability in iTunes, which Apple did not close from 2008 to 2011. Through this hole, it was possible to install any software on behalf of Apple on the victim’s computer.

It is possible that such a Trojan is already installed on your smartphone. Have you ever felt like your smartphone battery has been draining a little faster than expected lately?

6. Application update

Instead of installing a special spy Trojan, an attacker can do an even smarter thing: choose an application that you yourself voluntarily install on your smartphone, after which you give it full authority to access phone calls, record conversations and transfer data to a remote server.

For example, it could be a popular game that is distributed through “left” mobile application catalogs. At first glance, it’s an ordinary game, but with the function of wiretapping and recording conversations. Very comfortably. The user manually allows the program to access the Internet, where it sends files with recorded conversations.

Alternatively, malicious application functionality may be added as an update.

7. Fake base station

A fake base station has a stronger signal than a real base station. Due to this, it intercepts subscriber traffic and allows you to manipulate data on the phone. Fake base stations are known to be widely used by law enforcement agencies abroad.

In the USA, a model of fake BS called StingRay is popular.



And it's not just law enforcement agencies that use such devices. For example, merchants in China often use fake BS to send mass spam to mobile phones that are located within a radius of hundreds of meters around. In general, in China, the production of “fake honeycombs” has been ramped up, so in local stores it is not a problem to find such a device, assembled literally on your knees.

8. Hacking a femtocell

Recently, some companies have been using femtocells - low-power miniature cellular stations that intercept traffic from mobile phones within range. Such a femtocell allows you to record calls from all company employees before redirecting the calls to the base station of cellular operators.

Accordingly, to wiretap a subscriber, you need to install your own femtocell or hack the operator’s original femtocell.

9. Mobile complex for remote wiretapping

In this case, the radio antenna is installed close to the subscriber (operates at a distance of up to 500 meters). A directional antenna connected to the computer intercepts all phone signals, and when the work is completed, it is simply taken away.

Unlike a fake femtocell or Trojan, here the attacker does not have to worry about getting into the site and installing a femtocell, and then removing it (or removing the Trojan without leaving any traces of hacking).

The capabilities of modern PCs are enough to record a GSM signal on a large number of frequencies, and then crack the encryption using rainbow tables (here is a description of the technique from a well-known specialist in this field, Carsten Nohl).

If you voluntarily carry a universal bug with you, you automatically collect an extensive dossier on yourself. The only question is who will need this dossier. But if he needs it, he can get it without much difficulty.

Listening to a “non-telephone” conversation using a telephone

If necessary, in order to listen to a conversation on the phone, it is not at all necessary to put a “bug” in a person’s pocket or connect a listening device. All it takes is the “victim’s” mobile phone.

At the right moment, your phone will independently and quietly dial a specific number, and an interested attacker will be able to listen to your conversation until he hangs up.

And if your mobile phone is near you, you can rest assured that the conversation will not only be heard, but also recorded. And the distance from you to the wiretapping place does not matter.

By the way, in the phone, in outgoing calls, there will be no traces of the “left” call, and you will not be able to find out that you were eavesdropped. Hard to believe? Alas, this is true. Although not all cell phones can be used by scammers as wiretapping.

There is a segment of consumers who prefer business-class smartphones. This type of device is distinguished by its wide capabilities and attractive design, but at the same time, this smartphone also has many vulnerabilities. By taking advantage of these vulnerabilities, an interested person can turn your smartphone into a wiretap controlled by him, and you won’t even know about it.

And even if the attacker is on the other side of the globe, he will be quite capable of initializing a call to listen to your cell phone. And it is not at all necessary to steal the “victim’s” phone in order to install a “bug” - some brands of phones allow you to call them remotely, without pressing any buttons on the device and even (!) without knowing the number.

Attackers' methods of operation

Some brands of phones with Bluetooth transmitters are susceptible to this vulnerability, allowing the phone to be controlled using a headset. It was the “blunders” in the authorization algorithm for such headsets that made the possibility of remote wiretapping real. The main disadvantage of the headset is that it does not require mandatory authorization.

And all because manufacturers are trying to reduce the cost of the headset by evading the hardware implementation of the authentication algorithm. Mobile phone developers, aware of the lack of such algorithms, eliminated the algorithm for checking the equipment connected to the phone, while, as an additional benefit, the phone was compatible with many headsets.

But not all phone models can be tapped in this way. And the fact that there is no headset authorization algorithm cannot be considered some kind of curiosity, because the headset connected to the phone is used only for talking without using the microphone and speaker of the phone. The headset itself is “not capable” of either making a call or downloading any data from the phone. In other words, an unauthorized connection of the “left” headset to the phone does not make it possible to organize listening.

As a rule, the mobile phone itself initiates the search for the headset, because the headset does not have functionality that allows you to search for devices (in order to reduce cost). That is, the headset cannot find the phone and, moreover, cannot determine the Bluetooth channel through which it is necessary to contact the phone.

For each functionality of the Bluetooth transmitter, a corresponding port (channel) of the device is allocated. A standard transmitter has many ports. This allows the transmitter to simultaneously solve several problems or, in more technical terms, support different profiles.

Profile related functions:

  • information interaction with the point of access to the global network;
  • reception/transmission of electronic business cards;
  • emulation of a serial port for the purpose of exchanging data with a PC, etc.

One of these functions is interaction with a Bluetooth headset. After identifying the Bluetooth headset, the mobile phone provides it with the port number through which the headset is connected. But for “vulnerable” mobile phones, the wireless headset profile number is publicly available. It turns out that we know the channel number, authorization is not required - what is stopping us from implementing listening to someone else's conversation?? The situation is further complicated by the fact that the headset has quite significant rights.

Men who are prone to jealousy are often alarmed by the situation when their beloved goes into the next room to talk on a mobile phone or when a wife suddenly hangs up calls in the presence of her husband. In this case, he will want to know how to listen to his significant other’s phone. To do this, it is not necessary to hire a private detective, because there are simple ways to listen to conversations.

There is a solution! It won't suit everyone, but it's worth a try! Helped me get rid of blackheads and pimples on my face. Try this face mask!

Watch → No one has canceled the secrecy of telephone conversations, so jealous people should remember that wiretapping is illegal. Even if you want to record the conversations of your legal spouse.

There is a risk of being held accountable.

There is a moral aspect that also needs to be taken into account. A man should remember the consequences and decide for himself how he will then look into the eyes of his beloved, having learned the content of her conversations. After this, the marriage may crack. And if the wife becomes aware of this act, she will not be able to trust her partner.

Wiretapping without apps Wiretapping by number involves intercepting the signal coming from the telephone to the operator's station. The method is quite expensive from a financial point of view. You will have to purchase special equipment to make a recording.

  • there is no direct contact with the mobile operator;
  • the likelihood that the spouse will find out about this is reduced to a minimum.

But there are also disadvantages. The range of such equipment is limited - about 300 meters from the desired phone, so it will not be possible to listen to your wife’s iPhone at a long distance. The operator can change the encoding of the transmitted signals, then the efficiency of the listening equipment will drop to zero.

Spyware

There is another way to listen to a husband or wife's mobile phone. You will need spyware; it can be installed directly on your smartphone by downloading it via the Internet. The program works on the principle of conference calling. When talking, she involves a third party in the process without the others noticing.

But for each mobile phone model you will have to create an individual spyware algorithm. And it is imperative to establish direct contact with a specific device.

You can now download various programs to your computer or phone that can not only listen to conversations, but also determine the geographic location of an object, take pictures if you have a camera, and save the contents of messages. For quality programs you will have to pay a lot of money. You can also find free options on the Internet, although there is a risk of catching a virus. But you can’t do it without installing programs.

Neospy and Talklog

One such program is Neospy for the Android platform. The application can be downloaded via Google Play. When downloading the latest version v1. 9 PRO can be configured so that the program does not appear in Google application lists. The cost of using the program will depend on the selected functions. On average it is 20–50 rubles per day.

Talklog has a free trial mode with several basic free features. This service is a full-fledged spy that can obtain almost all the necessary information about the activity of a certain person, including listening to his wife’s phone.

Definition of wiretapping

It is important not only to learn how to record a telephone conversation, but also to become familiar with the signs that this is happening.

Hello! I am glad to introduce you to new material on my blog about mobile security! Do you know how the phone is tapped? Can any third party use such a service if they want to gain access to your personal information? How to protect your confidential data? In the article I will try to answer in detail all the related questions, and this material will be completed with a current video on the same topic, recorded especially for you!

Technically, tapping a phone turns out to be a very difficult task. I have carefully studied this topic, so I can draw some conclusions. Firstly, we immediately dismiss physical devices for intercepting conversations. Cellular network signals are sent with complex encryption, making it difficult for anyone to eavesdrop on your conversation. If the intelligence services require this, then everything is much simpler, since the work is carried out directly with the mobile operator. But no outsider will be able to gain access there!

I decided to look on the Internet to see if there were special programs that would help bug any phone. I reviewed a lot of applications for Android smartphones, but I still couldn’t find any really working software. But there are a lot of scams and deception programs that are better not to install at all! You can even accidentally pick up viruses! But my search did not end there.

The next interesting idea was to find a service that allows you to copy information remotely. Creating a backup copy is a useful service that would be useful in case you lose your mobile phone, or if something happens to the memory. Even a simple breakdown can lead to the loss of important data, especially if you use your phone for business communications. It will not be possible to directly wiretap your phone through such a program, but a copy of the information, including correspondence on social networks and recordings of conversations, will be sent to your personal account located on a separate server.

On an Android mobile phone, you will need to install a special program; watch my video about setup after the article. I liked the ability to send data not via 3G traffic, but via Wi-Fi. As for compatible software, a very large number of clients for social networks are supported, as well as a variety of messengers! There are no complaints about the work, I use it regularly.

As a result, I thought that to install wiretapping on a phone, an attacker might not need any special programs, because everything can be done much simpler! Imagine for yourself that someone will install an application on your smartphone, like the one described above! But which one is not important! Antiviruses will not detect or block it, since this utility utility only brings benefits in the right hands. Remotely sending information is not considered a violation of the operating system, since it can be used to save important data.

Therefore, try not to leave your mobile phone in the office unattended, and also do not give the phone to strangers! And, of course, regularly update your antivirus software and do not visit dubious resources. If the service I talked about interests you, then be sure to watch the video after this article. But do not install such programs on other people's mobile phones! Nobody would like something like that!

Application features: reading correspondence SMS, MMS, Vkontakte (official application and Kate Mobile), Odnoklassniki, Facebook, Moi [email protected], VSeti.by, Twitter, Hangouts, Google+, WhatsApp, Skype, Viber, Hangouts (formerly Google Talk ), [email protected], ICQ, IM+ and IM+Pro, AIM, Jabber, MSN, MySpace, Yahoo! and Ya.Online (Yandex Chat), Email correspondence Gmail and [email protected], view visited sites in Chrome, Opera, Firefox browsers. Access your call list and phone location. This is a small part of all the possibilities. All

Video installation guide for any phone:

Video installation guide on a phone with ROOT rights:

Installation and configuration instructions:

  1. We create a personal account using this link: “Create a personal account” (just register there).
  2. Follow this link: “Login to your personal account on the site” and enter the Email and password that you specified before registration.
  3. Click the button: “Add phone”
  4. We fill in all the fields that are asked to be entered. We fill it out correctly as it is written there, otherwise it will not work.
  5. Click the “Save” button.
  6. We read the instructions that appeared after clicking the “Save” button
  7. We install the application on the phone (the one from which you need to obtain information), and configure it according to the instructions, which you will need to read in step 6.
  8. The application is installed. Everything is fine. The developers write that you need to wait at least an hour for the data to start arriving in your personal account that you created in step 1. In our case, the data arrived after 4 hours. The plan was a success! I wish you success.