Who's Spying on Your Phone in 2020? (Part 1)

preview_player
Показать описание
This is intended to be a multipart series on who's spying on your phone. There are multiple parties spying on your phone. There are multiple pieces of data being captured. And there are multiple technologies used for spying. This is a very deep discussion on this and in subsequent videos, we will dig in in more detail.

We will examine this from the point of view of law enforcement, mass surveillance, commercial spying, and unknown parties and hackers.

We will discuss some of the laws in the US that authorize some of this spying. Like CALEA and FISA.

We will talk about the technologies used in spying at the network level, at the radio transmission level and down to the chips of the devices themselves.

In this first part, we will discuss the big picture first so you understand the spying landscape. Our phones are now directly part of this surveillance infrastructure. Whether you like it or not, you are participating in it. Whether or not you have anything to hide.

Part 2 is now available:

Please follow me on Odysee! (Previously LBRY.tv)
--------------------------

----------------
I'm the Internet Privacy Guy. I'm a public interest technologist. I'm here to educate. You are losing your Internet privacy and Internet security every day if you don't fight for it. Your data is collected with endless permanent data mining. Learn about a TOR router, a VPN , antivirus, spyware, firewalls, IP address, wifi triangulation, data privacy regulation, backups and tech tools, and evading mass surveillance from NSA, CIA, FBI. Learn how to be anonymous on the Internet so you are not profiled. Learn to speak freely with pseudo anonymity. Learn more about the dangers of the inernet and the dangers of social media, dangers of email.

I like alternative communication technology like Amateur Radio and data communications using Analog. I'm a licensed HAM operator.

Рекомендации по теме
Комментарии
Автор

You have some solid knowledge and I can't be more thankful for all your hard work.

Your work is so important!

mrruhe
Автор

Thank you for your hard work and sharing. I’m so glad I found your channel.

larva
Автор

Rob, Your work and insight is invaluable and should be taught in our schools! Of course the government would never allow this. The cell phone is the greatest individual tracking tool ever conceived and few realize the implications...

vulcan
Автор

Perfect mix of simplification and "shop talk" terminology. Rob, you're doing a fine job of teaching us cumulatively and keeping track of what you previously covered. So if we follow your videos in order, we're not overwhelmed with special terms and uncovered processes. You have developed comprehensive teaching skills within a wildly complex subject! Wasn't English your 2nd language too?

hawaiidealer
Автор

Nicely done Rob. Nearly at 8000 subscribers!

in-craig-ible
Автор

I don't think I've ever stumbled over such an important channel. I'm sharing it with everyone.

threeharesmedia
Автор

Classic CSPAN book hour music. Brings back them memories. Love this dude

TY-rhxk
Автор

Whoever says otherwise, this man is a digital hero and we need more like him.

colosistvan
Автор

Thanks for your work so much, I love you.

aeebeecee
Автор

Dear Rob, what's the name of the intriguing guitar music intro?

hugocoolens
Автор

I like your channel - appreciate your work 🙏

meditating
Автор

STK is a service in android that have system privileges otherwise it wouldn’t be able to communicate with sim card. Technically it is a system application and it was made to work with carrier SIM menu. The strange part is that it actually has a permission to access the network so one of the first things to do is to disallow it any network connections in firewall and restrict accessing anything in xprivacy.
You can actually intercept system carrier messages in a rooted android but what makes me really frustrated is that you have to use xposed for such thing or to get at least some level of control over your phone

ivanov
Автор

Thank you it is good to know great information

marianmoore
Автор

Surprised you're not arrested for "knowing too much"

Oo-IIII-oO
Автор

I had forgotten about "stingray". Tell us about the long lings.

bulvinescatologist
Автор

Glad someone else is talking about this. I tell people this all the time and they act like I'm a crazy tin foil head.. ive been talking about this for years.

concerned_citizen
Автор

How do we know you don't work for "them"

tonyd
Автор

Excellent summary. Can your questions and speculations be facts? Perhaps you can add the fields of "pre-crime" and "parallel construction"? Are there nodes similar to PSTN " B boxes" ( SAI) and UG vaults used with non POTS networks? Some people say that "Everyone" is "dirty". Can this sentence describe the collection of personal data where it can tend to embarrass associates of a target, rather than concern explicit violations of law? As I understand it, any social pressure ( legal) can be used for coercion and control.

crimestoppers
Автор

Is it not safe to presume that all electronic communications are intercepted and archived?

Walkeranz
Автор

For a number of years I assumed that everything I said and did on my phone and laptop was monitored by the state and this was a price worth paying for security. After all, my life hardly interested me so it was unlikely to interest the State. I have however recently been struggling with the realisation that the State is, intentionally or otherwise, a more dangerous and hostile opponent than the alleged security threats it purports to protect us from. Why this should be, is beyond me, other than to remember that power corrupts and absolute power corrupts absolutely. Was it always thus? The older I get, the more of a supporter of the concept of anarchy I become.

robinwells