Every level of espionage has access to you by tracking cellphone activity


The pocket-size tracking device we call smartphones is monitoring your every move. Additionally, every conversation you have and random camera appearances make you a celebrity in the eyes of government surveillance. Collaborative service between your cell phone network provider and governmental regulations reveals details of our lives to both facilities. The acquisition of this information is held and used on an “as needed” basis.


IP addresses are a unique string of numbers that communicate and define with whom the phone is talking. The government has graciously endowed cell phone networks use of free space with an understanding. This unspoken agreement allows the government a right to search phones and communications without a warrant or reason.




By providing free routing services, the government ensures its freedoms. This means you have no privacy. In fact, a new law enables this invasion of privacy. The law states, Government access to prepaid phones, is free to track all communications and information without warrants based on a no privacy policy.


Tracking without any warrants

Many companies such as Facebook and Google will profess their innocence about the invasion of privacy. Facebook has gone so far as to issue a statement. Initially, the announcement insists Facebook does not use your phone’s microphone in any way. Instead, advertisements shown are based on interests and profile information. However, they go on to say if you have given permission or actively use an app requiring audio or video they will have reasonable access to your voice, music, videos, and conversations.



We are made to believe our records of phone conversations, selfies, emails, passwords, and all activity on our phones and the internet are kept for our convenience. Meanwhile, this is the mere side effect. The primary reason for maintaining these records has nothing to do with your personal comforts. Obviously, the Department of Defense has use of information obtained without your consent.

Do you still believe the government has no malicious intent? IP addresses get routed to a carrier. The United States Department of Defense, or to DInsa, Ministry of Defense out of the United Kingdom are the two central routing locations. You can look up your IP address online to find out from where your phone is routing.


Most people keep their phones by their sides at all times, including when sleeping

Knowing your phone is a tracking device both physically and intellectually, rethinking its priority in life might be a prudent course of action.



Advertisers are the main culprits for device matching techniques to sell more and make more money. Indeed, a red line has been crossed. This type of aggressive marketing is infiltrating and merchandizing every moment of every day. Frequency beacons are another technological means used to qualify and quantify advertising. The government encourages marketers so they can also identify and monitor all digital communications.

The National Security Agency (NSA) and the Government Communications Headquarters (GCHQ) stole encryption keys from a sim card manufacturer out of Netherlands. Unrestricted access such as this to billions of cellphones everywhere overreaches international laws and espionage.


A breach such as this empowers the secret monitoring and violates all privacy rights

Confiscated encryptions within the sims have created a criminal network where unlimited access goes undetected. All mobile phone systems lack security. Therefore, with this knowledge, it might be prudent to fix the problem.



Replacing the sim cards could cause networks and providers to lose too money, which they are not willing to do. Besides the fact that the process would be massive in scope. In the meantime, national and foreign governments condone these practices directly because it aids their political, secret and military activities.

Allegedly some coalitions for privacy rights have filed lawsuits. Nonetheless, these issues could remain bogged down in red tape until kingdom come. Hackers, governments, spies and any other number of espionage organizations have the upper hand in this picture.

What recourse can the public take to protect rights of privacy? How can people protect themselves from surveillance? Undoubtedly, some action must taken.

References: YouTube, Bank Info Security, Digital Trends

Image credit: