In the past few years, China has placed hundreds of thousands of Uighurs and other Muslims in re-education camps in Xinjiang. With the scanning of phones at the border, the Chinese government is applying similarly invasive monitoring techniques to people who do not even live in Xinjiang or China. Beijing has said that terrorist groups use Central Asian countries as staging grounds for attacks in China.
Three people who crossed the Xinjiang land border from Kyrgyzstan in the past year said that as part of a lengthy inspection, Chinese border officials had demanded that visitors unlock and hand over their handsets and computers.
Using mobile phone text messaging for malaria surveillance in rural Kenya.
One of the journalists undertook the border crossing in recent months. Holders of Chinese passports, including members of the majority Han ethnic group, had their phones checked as well, the journalist said. Apple devices were not spared scrutiny. What the device did could not be determined.
The Open Technology Fund then requested and funded an assessment of the app by Cure53, a cybersecurity company in Berlin. After Fengcai is installed on a phone, the researchers found, it gathers all stored text messages, call records, contacts and calendar entries, as well as information about the device itself. The app also checks the files on the phone against the list of more than 73, items.
This list contains only the size of each file and a code that serves as a unique signature. Most of the files that the journalists could identify were related to Islamic terrorism: Islamic State recruitment materials in several languages, books written by jihadi figures, information about how to derail trains and build homemade weapons.
- Search form.
- Smartphone monitoring!
- Track Everything You Want To Know.
Many of the files were more benign. There were audio recordings of Quran verses recited by well-known clerics, the sort of material that many practicing Muslims might have on their phones. Lister said he did not know why the Chinese authorities might consider him or his book suspicious. Other files the app scans for have no link to Islam or Islamic extremism. In , the prime minister of Greece was advised that his, over dignitaries', and the mayor of Athens' mobile phones were bugged. Security holes within Signalling System No.
Some indications of possible cellphone surveillance occurring may include a mobile phone waking up unexpectedly, using a lot of the CPU when on idle or when not in use, hearing clicking or beeping sounds when conversations are occurring and the circuit board of the phone being warm despite the phone not being used.
Preventative measures against cellphone surveillance include not losing or allowing strangers to use a mobile phone and the utilization of an access password. Another solution is cellphone with physical electric switch, or isolated electronic switch that disconnects microphone, camera without bypass, meaning switch can be operated by user only - no software can connect it back.
From Wikipedia, the free encyclopedia. It has been suggested that Phone surveillance be merged into this article. Discuss Proposed since October It has been suggested that Mobile phone tracking be merged into this article. Main article: Mobile phone tracking.
ABC News, News Retrieved 26 March The New York Times. USA today. Cell Phone Spying. Volume, Issue: 7.
IEEE Spectrum. WTHR News.
The Intercept. Retrieved 7 June Retrieved 7 June — via The Guardian.