{"id":2958,"date":"2014-02-18T10:44:35","date_gmt":"2014-02-18T15:44:35","guid":{"rendered":"http:\/\/www.kaspersky.co.in\/blog\/?p=2958"},"modified":"2019-11-22T15:41:47","modified_gmt":"2019-11-22T10:11:47","slug":"the-rise-of-mobile-surveillance","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/the-rise-of-mobile-surveillance\/2958\/","title":{"rendered":"The Rise of Mobile Surveillance"},"content":{"rendered":"<p>During the 20<sup>th<\/sup> century, many detective stories began with a protagonist noticing that some suspicious persons were following him. According to a recent (and a very non-fictional) <a href=\"http:\/\/www.yalelawjournal.org\/the-yale-law-journal-pocket-part\/constitutional-law\/tiny-constables-and-the-cost-of-surveillance%3A-making-cents-out-of-united-states-v.-jones\" target=\"_blank\" rel=\"noopener nofollow\">publication<\/a> in The Yale Law Journal, the estimated cost of a covert pursuit by skilled group of detectives is $275\/hr.<\/p>\n<p><b><\/b><\/p>\n<p>When implemented at a top level, it requires five cars and five skilled agents. Approximately 14,000 special agents from organizations such as the FBI can\u2019t efficiently track more than 2,800 suspects. This limitation, however, is not relevant anymore. As modern technology enables efficient tracking without any agent physically present in a suspect\u2019s proximity. Researchers estimate, that usage of a GPS tracker reduces the tracking cost to $10\/hr. With legal power to request cell-phone location data from a mobile operator, it could be further reduced to $5.21\/hr.<\/p>\n<p style=\"text-align: center;\"><b><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/02\/05083839\/figure_2_surveillance.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-3791\" alt=\"figure_2_surveillance\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/02\/05083839\/figure_2_surveillance.jpg\" width=\"488\" height=\"398\"><\/a><\/b><\/p>\n<p>This effectively means that the FBI can easily track 50 times more suspects that it used to track in the past century.<\/p>\n<div class=\"pullquote\">It costs only $5 per hour to track all of your moves. No wonder it became affordable to any interested party.<\/div>\n<p>However, it\u2019s not only the FBI, NSA or any other governmental agency that can perform such tracking. Your smartphone provides similar time-and-location data to a number of third parties, including ecosystem owner (Apple, Google or Microsoft), mobile ads network (AdMob and others) and app developers. Popular \u201cfitness\u201d apps, like Moves, collect and analyze location data to calculate your travel distance and physical activities. \u00a0But, there are spying apps that enable such remote monitoring for <b>any<\/b> interested person \u2013 be it a jealous partner, employer or competitor.<\/p>\n<p>The only way to escape such cheap and effective monitoring is radical\u2013 you must stop using a mobile phone or at least leave it at your home\/office when departing to do something important and confidential.\u00a0 If you are just mildly concerned, you can limit your exposure by analyzing the list of apps that use your location data. There are settings screen in iOS and special privacy tools for Android that control this data sharing.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.kaspersky.co.in\/blog\/files\/2014\/02\/screen2-surveillance-576x1024.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-3793\" alt=\"screen2-surveillance\" src=\"https:\/\/www.kaspersky.co.in\/blog\/files\/2014\/02\/screen2-surveillance-576x1024-576x1024.png\" width=\"403\" height=\"717\"><\/a><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3792 aligncenter\" alt=\"screen1-surveillance\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/02\/05083838\/screen1-surveillance.png\" width=\"363\" height=\"341\"><\/p>\n<p>Additionally, to fight spying mobile malware, you have to use <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.kms.free\" target=\"_blank\" rel=\"noopener nofollow\">full-scale mobile security solution<\/a>, which will also protect you from SMS spam, phishing and device theft.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>During the 20th century, many detective stories began with a protagonist noticing that some suspicious persons were following him. According to a recent (and a very non-fictional) publication in The<\/p>\n","protected":false},"author":32,"featured_media":2959,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[523,43],"class_list":{"0":"post-2958","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-mobile-surveillance","9":"tag-privacy"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/the-rise-of-mobile-surveillance\/2958\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/the-rise-of-mobile-surveillance\/2851\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/the-rise-of-mobile-surveillance\/3219\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/the-rise-of-mobile-surveillance\/3174\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/the-rise-of-mobile-surveillance\/3789\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/the-rise-of-mobile-surveillance\/2686\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/the-rise-of-mobile-surveillance\/3789\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/the-rise-of-mobile-surveillance\/3789\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/privacy\/","name":"privacy"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/2958","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=2958"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/2958\/revisions"}],"predecessor-version":[{"id":18100,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/2958\/revisions\/18100"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/2959"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=2958"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=2958"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=2958"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}