The Threat to Privacy by GSM Technology

Business

  • Author Nicola Brown
  • Published January 28, 2012
  • Word count 555

The technology used in mobile phones is increasingly finding its way into eavesdropping devices. The use of bugs based on mobile phone technology (GSM) allows spies to monitor private conversations from anywhere in the world.

What is GSM?

GSM (Global System for Mobile) communications is an open, digital cellular technology used for transmitting mobile voice and data services. In very simple terms, GSM technology works by searching GSM networks to find nearby mobile phone masts to transfer voice, data and SMS between mobile phones.

GSM technology was originally created in 1982 by the European Conference of Postal and Telecommunications Administrations (CEPT), who designed the Groupe Spécial Mobile (GSM) with the aim of creating a pan-European mobile phone technology.

Thanks to GSM's international roaming capabilities, it is now the most widely used mobile phone technology. According to the GSMA (the GSM Association), terrestrial GSM networks now cover more than 80% of the world's population. That's more than 6 billion people across more than 218 countries.

The GSM bugging threat

With the advantages brought by the wide coverage GSM technology offers, comes a growing threat to privacy. The same GSM technology used to service mobile phones is also used in the world of covert surveillance and spying to eavesdrop on private conversations from anywhere in the world.

This is possible through using GSM audio bugging devices that use specially adapted mobile phone technology to listen in and transmit conversations taking place in one location to another. These devices work in the same way as mobile phones and can be used anywhere you can use a mobile phone.

Once hidden in the target location, the GSM bug waits silently in standby mode until the eavesdropper calls the SIM card number being used in the device. At this time the call is silently answered and the microphone activated, allowing the caller to listen in to conversations taking place in the nearby vicinity. When the conversation has ended the bug is then switched back to standby (passive) mode. Other more advanced devices have the facility for sound, vibration and motion activation whilst others can be manually or remotely set by SMS commands.

These bugging devices are small and discreet and are normally concealed within innocent looking items that are frequently found around the home or office. Because they use GSM technology they can even pick up audio whilst on the move, just like mobile phones, so are not limited to static locations. This makes them ideal for picking up conversations in cars, or they can even be slipped inside a pocket or handbag to ensure a target is constantly monitored wherever they are.

How to spot GSM bugging devices?

Not only are GSM devices getting smaller and more sophisticated, making them hard to detect, but their signals are often lost amongst legitimate GSM and mobile phone communications. This is a particular problem when being operated in urban areas, which where most eavesdropping targets tend to be located.

It is for this reason that using professional counter surveillance services is the only practical option for effectively detecting and dealing with these bugs. Counter surveillance specialists have the training, experience and equipment needed to detect, locate and deal with the presence of GSM bugs. In particular, these experts are able to find both active and passive GSM bugs in order to provide a 100% secure environment.

QCC Interscan are bug sweeping and counter surveillance experts based in the UK. Their bug sweeps effectively detect, locate and deal with GSM bugs. They also offer a fast and effective permanent GSM and mobile phone detection solution with Searchlight.

Article source: https://articlebiz.com
This article has been viewed 809 times.

Rate article

Article comments

There are no posted comments.

Related articles