If you Like HowToVanish on Facebook then we will give you one of the $2-3 30 page Mini-Guides for free. Just send us a message on Facebook and let us know which one you want: (1) Financial, (2) Political or (3) Personal.

Post image for Turn Smartphones Into Top Secret Spy Tools

Turn Smartphones Into Top Secret Spy Tools

by Bill Rounds Esq. on February 13, 2011

Reading time: 5 – 8 minutes

International spy thrillers always feature some really cool top secret spy tools.  But you don’t have to be Angelina Jolie or Daniel Craig to have a spy tool that is almost as powerful as anything seen at the cinema.  In the hands of a silver screen spy, a smartphone would contain all of the contacts, top secret communications, sensitive files and killer applications that would make them seem super human.  And the best part is, we can turn our own smartphones into our own top secret spy tools.    But how do you keep the data on your smartphone from falling into the hands of an arch enemy?

1. Password Protect

Password protecting your phone isn’t just to prevent butt-dialing.  It keeps people out of your phone and out of all the personal information in there.   All phones allow you to protect access with a password.  If your phone allows it, using a password longer than 4 characters is more secure, although more annoying.

2. Enable Remote Locking Capabilities

Some people lose their phone on the subway, leave it in a taxi, and sometimes phones get stolen. The smartphone itself is pretty valuable, but the data can be even more valuable.  Even a password protected phone can be hacked with a little time and patience.  In that case most of the private stuff on your your phone is up for grabs.  Most phones will allow you to lock down or wipe all the data on the phone remotely.  Most companies will charge a premium for this service.  For other phones you simply have to register for remote locking or wiping capabilities. Either way, remote locking or wiping can be very valuable insurance.

3. Encrypt

Yes, you can encrypt data on a smartphone too. Blackberry is one phone that has encryption capability built right into the phone. You will find them in the phone settings. There are encryption apps for other phones that don’t have built in encryption.  If passwords and remote locking fail, encryption will keep your classified documents stored on your phone safe from Dr. Evil and his henchmen.

4. Use A VPN For Internet Connections

Yup. You can use a VPN on a smartphone too. When you connect to the internet from a wireless hotspot using your phone, it is just as risky as using your laptop.  If you aren’t connecting to a secure site (https) someone might see what you are doing.   So instead of connecting to the internet through one of those hot spots, you can log into your VPN securely. Some phones will also have better protection of their own wireless network so you can log in through your own phone service instead of a public router.

The same cast of VPN characters will work for your PC or your phone. WiTopia, Identity Cloaker, Cryptohippie and a whole bunch more will be good paid services. There are plenty of good free ones too, but the user experience is more cumbersome.

5. Get Anti Virus

Smartphones are the next big target for hackers. They have been unprotected for a long time, but have become full of valuable data.  The most likely ways for a smartphone to become infected is through a malicious app or through links in text messages.  Apple iPhones are less susceptible to viruses because of Apple’s tight central control of available apps.  Most other phones can be protected with anti-virus software.  Find out which software is compatible with your smartphone and get the latest version of AVG, Wavesecure, Kaspersky Mobile Security, Trend Micro or some other good anti virus software.

6.  BlueTooth Beware

Bluetooth is convenient.  Hands-free anything means you drive your Astin Martin, shoot rockets at someone who is chasing you, and have a pleasant chat with M, all at the same time.  But Bluetooth signals are incredibly easy to intercept.  Either password protect your Bluetooth or call M back later without using Bluetooth.

Conclusion

Lots of people have a gadget in their pocket that only world class spies would have had just a few years ago.  See if you have what it takes to make yours as powerful as any that Angelina or Daniel would have used.   Using these techniques together with getting your smartphone through a prepaid carrier (yes, they have pre-paid smartphones), paying for the phone and loading minutes with cash, or owning it in your private LLC, you can keep information on your smartphone out of the hands of your enemies.

No tips yet.
Be the first to tip!

Support How To Vanish - Tip With Bitcoin

1L2JyYbEJbDCYd88aYoc4qULKhDdBU9vjF

Find this post helpful? Please consider tipping with Bitcoin. Each article gets a unique Bitcoin address so by tipping you help make How To Vanish sustainable and give valuable feedback on which content is most appreciated!

9,712 random numbersEmail Email Print Print

5 comments

ABOUT THE AUTHOR: Bill Rounds, Esq. is a California attorney. He holds a degree in Accounting from the University of Utah and a law degree from California Western School of Law. He practices civil litigation, domestic and foreign business entity formation and transactions, criminal defense and privacy law. He is a strong advocate of personal and financial freedom and civil liberties. This is merely one article of 123 by .
Free HowToVanish Privacy Guide

{ 5 comments… read them below or add one }

1 Richard February 15, 2011 at 1:59 pm

Great article!
I was just wondering which smart phone would you most recommend?
Cheers

2 Bill Rounds J.D. February 17, 2011 at 3:45 pm

Thanks Richard. I most recommend Blackberry. They have encryption capability built in, they are widely available with prepaid phone services like Boost Mobile, and they have shown that they have guts by standing up to Saudi Arabia when the Saudis had problems with encryption. I hope this helps.

Bill

3 J. Pratt May 28, 2011 at 12:08 am

Thanks for the very informative info, it reall answered a lot of my questions. Very professional and organized, easy to understand, exactly what i needed. Take care. J. Pratt

4 ilse June 18, 2011 at 4:38 pm

I love your tips to vanish!

5 Demat Gold April 8, 2013 at 7:10 pm

…and they have shown that they have guts by standing up to Saudi Arabia when the Saudis had problems with encryption…

But why didn’t they show their guts to India? Blackberry tamely handed over their encryption keys to the Indian authorities. Just Google it.

Leave a Comment

Previous post:

Next post: