News

Your Cell Phone Can Betray You

Thanks to the HP scandal, we’ve all heard about "pretexting"—a private investigator, identity thief or government lackey contacts a cell phone operator and pretends to be you, to find out at what times and to whom you placed or received calls.

But “pretexting” is just the tip of the iceberg when it comes to threats to your privacy from cell phones. Here are some of the most common threats and some common-sense ideas to deal with them:

  • Your cell phone is spying on you. The newest generation of cell phones are “location beacons.” Any time you switch the phone on, your physical location can be pinpointed within a few feet (in a metropolitan area). Outside a metropolitan area, your location can’t be pinpointed as precisely, but an investigator can still obtain a good idea of your movements. Protective strategy: use an anonymous, prepaid phone that can’t be traced to you.
  • Your voice mail box is vulnerable. It is easy for someone to access your cell phone’s voice mail if you haven’t protected your mailbox with a password. All someone needs to know is your mobile phone number and one of several industry default PIN codes. Protective strategy: Use a PIN code (not your phone number or other easy-to-guess number) to protect your voice mail box.
  • Incompletely deleted data can come back to haunt you. By now, many people realize that when you hit the “delete” button on a personal computer, the data isn’t necessarily gone—it’s just hidden. With the right software, the data can be recovered. It’s the same situation in a cell phone. Used phones with supposedly “deleted” data that you sell or give away can, in the right hands, surrender calling records, contact lists, SMS messages, etc. Protective strategy: Before disposing of your cell phone, remove its SIM card, if it has one. Also, follow the instructions at http://www.wirelessrecycling.com/home/data_eraser/default.asp to securely delete all personal data from your phone.
  • Your cell phone can be bugged. If someone can gain access to your cell phone, they can insert a tiny bugging device that will allow them to read your SMS messages. Protective strategy: Keep your cell phone with you at all times, or in a secure location where no one else can have access to it. 

        For more protective strategies to protect your privacy, see https://www.hugedomains.com/domain_profile.cfm?d=isecureonline.com.

On another note, many clients first get to know us by accessing some of our well-researched courses and reports on important topics that affect you.

Like How to Go Offshore in 2024, for example. It tells the story of John and Kathy, a couple we helped from the heartland of America. You’ll learn how we helped them go offshore and protect their nestegg from ambulance chasers, government fiat and the decline of the US Dollar… and access a whole new world of opportunities not available in the US. Simply click the button below to register for this free program.

About The Author

Free Consultation

Since 1984, we’ve helped 15,000+ customers and clients build their wealth protection plan.

Book in a free no-obligation  consultation and learn how we can help you too.

Get our latest strategies delivered straight to your inbox for free.

Get Our Best Plan B Strategies Right to Your Inbox.

The Nestmann Group does not sell, rent or otherwise share your private details with third parties. Learn more about our privacy policy here.

The Basics of Offshore Freedom

Read these if you’re mostly or very new to the idea of going offshore

What it Really Takes to Get a Second Passport

A second passport is about freedom. But how do you get one? Which one is best? And is it right for you? This article will answer those questions and more…

How to Go Offshore
in 2024

[CASE STUDY] How we helped two close-to-retirement clients protect their nest egg.

Nestmann’s Notes

Our weekly free letter that shows you how to take back control.