Preview

Is Mobile Phones An Invasion Of Privacy

Satisfactory Essays
Open Document
Open Document
354 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Is Mobile Phones An Invasion Of Privacy
Is Mobile Phones an Invasion of Privacy?

This is a very controversial topic that has had many arguing about. Is Mobile Phones an Invasion of Privacy? Personally I think yes. People can track your sim card. This could also benefit many people. In many missing police cases, the police end up tracking the missing person’s phone and find out where their last place was. This can only work if the sim card is not corrupted or broken. Mobile phone tracking is set up using the SIM card, with an ID number that trackers can then enter online to view a real-time location. Although this can be legitimately initiated by asking permission from the phone user, the system is open to misuse. A journalist experimented by tracking his girlfriend – he set up the track while he was at home, then borrowed her mobile and accepted the trace (sending an acceptance message). Although the tracking company is legally required to send occasional warning messages to the trackee’s mobile, the journalist reported that none of the phones in his experiment received any such warnings.
Fortunately for us, the Data Protection Act steps in the way and protects us. But not all people follow the law. Some front cameras on phones could get hacked and send the hacker images that other’s wouldn’t want to be shared. The hacker could also watch you and send messages.
What can you do?
Switch your mobile phone off when not in use
Don’t give out your mobile phone number on forms – use your landline
Don’t transmit your credit card details via your mobile.
All over the internet, companies are selling software that can bug your phone. Some sites even market it as a way to spy on your significant other. But someone could swipe your phone - and in just a few minutes install the spyware - returning it without you ever knowing. Then, when you get a call the spy can listen in to your conversations, and read your texts and e-mails. The cell phone hacker can even access your camera phone and speaker, to keep track of

You May Also Find These Documents Helpful

  • Good Essays

    The book 1984, George Orwell depicts a world in which technology has advanced so far that the government of Oceania is able to constantly monitor it’s citizens. The actual year 1984 has passed and no such technology existed then; however, our modern technology is fairly similar to that found in the book 1984. Supposedly, the technology in our world is used for a different purpose then that of Big Brother’s world. However, “That’s No Phone. That’s My Tracker,” is an article by Peter Maass and Megha Rajagopalan that focuses on the use of cell phones as surveillance technology. In the article, the writers discuss how cell phones are simply trackers “ that happen to make calls” (Maass, Rajagopalan 1). Although they are a legitimate concern, surveillance…

    • 549 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cell phones have become the leading source of communication in the world. However, it is not just phone calls or e-mails anymore, someone might take down time to play angry birds or candy crush saga. If your cell phone is left on and completely unattended someone, knows your location. Over 200 million Americans who own a cell phone have been watched on a data base created by the cell phone company, keeping track of tower signals, recording conversations, and making copies of text messages and emails. Even the United States government has gone to the extent to using cell phone information when coming to court evidence and alibies. Parents are becoming technologically aware and are using tracking abilities to keep an eye on their children and their whereabouts. The question remains, where can you draw the line between…

    • 718 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Invasion of Privacy

    • 968 Words
    • 4 Pages

    Invasion of privacy is something that is a major concern among Americans. In this paper I will discuss Steve, who has recently joined a church. The church doctrine is such that members are to reveal indiscretions from their past. Steve has told them of some of his indiscretions but Steve is not happy about this and decides he would rather leave the church. The church leaders have told Steve even if he leaves his neighbors as well as members of the church will be notified of his past. In this paper I will discuss which privacy torts are involved as well as if this is a libel case. I will also discuss whether the expectation of privacy applies to the facts of this case as well as the defenses to the tort and if there is a legal difference in disclosing personal indiscretions to members of the church, its’ elders and to the general public.…

    • 968 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    With all of the latest hullabaloo about cell phones being used as bugging devices, you may be feeling a bit creeped out at the prospect of being monitored without your knowing it. Although some cell phones can be remotely programmed, most modern cell phones would require physical access to your phone to tamper with it. Luckily, when cell phones are transmitting, certain tell-tale signs can be a dead giveaway that your phone is being monitored.…

    • 464 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    How has cell phones affected society? The first wireless cell phone invented was heavy, bulky, and ugly, but it was still portable and used to communicate with people. The first cell phones were very expensive and only the rich people could afford them. Little did we know what the effects would be. With the invention of cell phones came both negative and positive effects. While cell phones can be used in emergencies and used for communication among people, they have also caused accidents while driving and inhibited social interaction…

    • 90 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    ” by Peter Maass and Megha Rajagopalan, informs that it appears that millions of cellphone users have been swept up in government surveillance on their calls and where they made them from. The surveillance and privacy implications are quite simple. If someone knows exactly where you are, they probably know what you are doing. There is a lot of comparison in 1984 and today’s modern technology in which government can keep watch. However, in 1984, they had helicopters to spy, but can’t go as high as a regular helicopter.…

    • 895 Words
    • 4 Pages
    Good Essays
  • Good Essays

    government tracking

    • 1009 Words
    • 5 Pages

    Terry Allen’s article gives us a much stronger sense that cell phone tracking technology is…

    • 1009 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Cell phone surveillance is mainly used to gain a better understanding about criminals and their motives. As one author puts it, the main advantage of spying on cell phones is “the ability of police officers to carry out undercover surveillance of suspected major criminals… They are using it sparingly to further legitimate investigations” (Wheeler). Secret cell phone surveillance is helpful in tracking down criminals and collecting information for investigative purposes only. In 1984, the government, known as the Party, uses a different form of electronic surveillance but for a similar purpose.…

    • 1484 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    and internet on our phones even now we are just susceptible to not having our privacy. All the apps downloaded and no one ever reads every word of the terms they accept. There are lots of apps that could potentially turn on the camera without you knowing or accessing your txt and your history on your browser. Now people are doing all their banking though their cellphones. Are they really secure as the banks say they are?…

    • 529 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cell Phone Privacy

    • 655 Words
    • 3 Pages

    A. Whenever you use your cell phone, you are being tracked. Whether you are using an app or connecting to Wi-Fi, your phone company knows where you are and what you are doing.…

    • 655 Words
    • 3 Pages
    Good Essays
  • Good Essays

    This includes social media, checking emails, taking pictures and texting. What we do not think about when it comes to using technology, is the possible surveillance cameras and tracking devices on our phones. It makes people wonder, do I really have privacy if my every move is so easily tracked by my phone or if I am being watched when I am out shopping? According to Peter Maass and Megha Rajagopalan, authors of “That’s No Phone. That’s…

    • 538 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Are educators overworked and underpaid? I disagree with the idea that educators are overworked and underpaid because if educating is their passion they shouldn’t care about the pay, they benefit from holidays and summers off, and they have the option to choose their career and select their school of choice.…

    • 715 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The telescreen “with its never-sleeping ear, could spy upon you night and day.” (Orwell, 1949) It was a two way television that could listen and watch everyone at any time. American citizens willingly carry around their own telescreens, and they pay extreme amounts of money for them. The NSA has complete control of citizen’s cell phones, and they are repeated giving up their freedoms. “The NSA’s ANT division develops implants for mobile phones and SIM cards. One of these is a spyware implant called “DROPOUTJEEP” designed for the first generation of iPhones which was still in development in 2008, shortly after the iPhone’s launch. This spyware was to make it possible to remotely download or upload files to a mobile phone. It would also, according to the catalog, allow the NSA to divert text messages, browse the user’s address book, intercept voicemails, activate the phone’s microphone and camera at will, determine the current cell site and the user’s current location. ANT’s technicians also develop modified mobile phones, for use in special cases that look like normal, standard devices, but transmit various pieces of information to the NSA — that can be swapped undetected with a target’s own mobile phone or passed to informants and agents. In 2008, ANT had models from Eastcom and Samsung on offer, and it has likely developed additional models since.” (Cook, J. 2013) Your privacy is entirely nonexistent in today’s society, the fifth amendment of the constitution, “Prohibits unreasonable searches and seizures and sets out requirements for search warrants based on probable cause as determined by a neutral judge or magistrate.” (U.S. Congress, 1791) It is not repealed, it is however, ignored and unlawfully committed everyday by our…

    • 674 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cell phones have changed the ways of communication so much that the world can now have internet, face to face chatting, and some 3D technology has already successfully made holograms. However, it also can pertain to invasion of privacy in some sorts.…

    • 1333 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays