CELL PHONES

 < Day Day Up > 

Spam to Go

The Annoyance:

I just received a text ad for a cheap home mortgage on my cell phone. Not only am I receiving ads I don't want, I'm being forced to pay for them! What can I do to stop cell phone spam?

The Fix:

Unsolicited ads sent via cell phone text messaging services has been an unpleasant fact of life in Japan and Europe for a few years, and it could become a big problem for the United States' 165 million cell phone owners. The CAN SPAM Act of 2003 authorized the FCC to look into methods for stopping phone spam; in February 2005, the agency published a list of wireless domains to which spammers were forbidden to send commercial text messages without a customer's permission. (For more info, see http://ftp.fcc.gov/cgb/policy/canspam.html.) But given the miniscule impact CAN SPAM has had on our email inboxes, don't expect much relief from the FCC ruling.

The practical step is to call your wireless provider to register a complaint; many will simply take the spam messaging charges off your bill, says John Walls, VP of public affairs for the Cellular Telecommunications and Internet Association (CTIA). He adds that major wireless carriers are aware of the problem and actively filter out most spam messages before they reach customers. While you're at it, be sure to file a complaint with the FCC at http://www.fcc.gov/cgb/complaints.html or call them at (888)225-5322.

IS YOUR CELL PHONE STALKING YOU?

In the good old days, dialing 911 on your cell phone was about as effective as rolling down the window and shouting "Help!" Unlike traditional land line phones, emergency operators had no easy way to trace wireless calls back to their physical location. That began to change in 1996 when the Federal Communications Commission mandated that tracking technology, such as Global Positioning Satellite transponders, be built into every cell phone, which allows emergency responders to pinpoint their locations. Wireless carriers are required to implement "Enhanced 911" (E911) capabilities in their networks by December 31, 2005, but when this service will be available nationwide is anyone's guess, thanks to problems upgrading the country's antiquated emergency response equipment. (For the 411 on E911, see http://www.fcc.gov/911/enhanced/.)

But this GPS data may also be available for commercial use. In 2002, AT&T Wireless (now part of Cingular) rolled out a "Find Friends" service in 15 U.S. cities that let subscribers locate people via their cell phones, as well as seek out restaurants, ATMs, and so on, based on their location. In both cases, these services rely on GPS data to figure out where you (or your friends) are on the globe. This is just the beginning of a multi-billion-dollar "location-based services" market in which your cell phone becomes a playback device for advertisements based on where you happen to be. Walk by an Italian restaurant, for instance, and your cell phone might alert you it's just received a coupon for a free Coke with every purchase of a pepperoni pizza. And if the pizzeria can triangulate your location, what's to stop local law enforcement officials or your spouse's divorce attorney from tracking your movements? So far, not much. The courts have barely begun to address such issues, in part because such services are only starting to appear. Wireless industry groups say commercial GPS services will only be implemented with the customer's permission, though they've yet to define how such permission will be obtained. Moral of the story? The next time you're going out on a private errand or a discreet rendezvous, you may want to turn off your cell phone.


Cell Phone Candid Camera

The Annoyance:

Somebody just snapped a picture of me in a compromising position with their cell phone camera. Can I have him killed?

The Fix:

Not legally. But you may be able to have him fined and sent up the river for a year. Thanks to the recently enacted Video Voyeurism Prevention Act of 2004 (http://thomas.loc.gov/cgi-bin/bdquery/z?d108:S.1301:), covert cameras are banned in locker rooms, bedrooms, up or inside various bits of clothing anywhere the involuntary photo subject had a "reasonable expectation of privacy." (So if someone captures you during a wardrobe malfunction at the Super Bowl, you're out of luck.) A more realistic solution: approach the shutterbug, remind him or her of the law, and politely ask that the photo be deleted (assuming, of course, he hasn't already emailed it to his blog see "Moblog Rules").

Moblog Rules

The Annoyance:

OK, I wasn't naked when they took the shot, but it wasn't pretty and then they posted it on their mobile phone web blog, where various strangers have been commenting on it. How can I get it removed?

The Fix:

The proprietors of mobile web logs (moblogs) take a dim view of people posting photos without the subject's consent though with hundreds of thousands of such blogs sprouting up, enforcing this practice is next to impossible. If your picture appears on a moblog site such as TextAmerica or FotoLog and you don't want it there, contact the service and complain. Most moblogs list a contacts page (TextAmerica's is at http://www.textamerica.com/contact.aspx; to contact FotoLog send email to admin@fotolog.com). You will likely have to surrender some personal information, such as who you are and why you feel the photo invades your privacy. If your mug shot appears on a private web site and the owner refuses to remove it, contact their web hosting company or Internet Service Provider most have similar rules about posting inappropriate or copyrighted material.

PRIVACY IN PERIL: VIRUSES ON THE MOVE

In June 2004, Russian security vendor Kaspersky Labs announced it had detected the first virus specifically targeting mobile phones. The virus, named Cabir, affects only Bluetooth phones using the Symbian operating system, which includes Series 60 phones made by Nokia.

Cabir spreads wirelessly from phone to phone using Bluetooth, and had been sighted in 17 countries at press time. According to Finnish anti-virus vendor F-Secure, Cabir-infected phones could be used for Bluejacking (inserting contacts or messages on someone else's phone), Bluesnarfing (data theft), Bluetracking (following the owner's movements) or Bluebugging (listening in on conversations by getting the phone to call you back). Mostly, however, the virus runs down cell phone batteries by constantly scanning for Bluetooth devices. F-Secure makes a patch that detects and neutralizes the virus (see http://www.f-secure.com/estore/avmobile.shtml).

F-Secure warns that before long we're likely to see Trojan Horses masquerading as games or screensavers that can falsify billing records and steal personal information from your phone. And as Microsoft moves aggressively into the mobile market, one can only imagine what virus writers will conjure up for Windows-based phones.


IS YOUR PHONE TAPPED?

You hear a strange clicking sound whenever you pick up the phone. Is it squirrels chewing on the wires, or are G-men camped out in a laundry truck outside your house tapping your line? Unless you're a drug lord, a Mafia don, or a suspected member of a worldwide terrorist conspiracy, it's probably the squirrels.

For starters, today's surveillance equipment is so sophisticated you'd never be able to tell if your line was bugged. For another, authorized wiretaps are exceedingly rare. According to the Administrative Office of the United States Courts, there were 1,442 Federal and state wiretaps in 2003, with nearly 4 out of 5 related to drug cases. (For the full report, see http://www.uscourts.gov/wiretap03/2003WireTap.pdf.) Add to that another 1,724 intercepts approved under the Foreign Intelligence Surveillance Act, and we're up to roughly 3,200 taps still an infinitesimal fraction of the more than 300 million land and cell phones in the U.S.

If you get your phone service using a voice over Internet protocol (VoIP) hookup, your conversations could theoretically be open to hackers as well as the Feds. In August 2004, the FCC directed VoIP vendors to make their networks accessible to law enforcement. Security experts point to VoIP as a likely target for hackers and crackers looking to eavesdrop on conversations or flood your digital line with "voice spam."

Louis Mamakos, chief technology officer for VoIP vendor Vonage, acknowledges that hacking into an unencrypted VoIP stream is possible, though difficult. Hackers would have to intercept the calls near the source and pick through a stream of data to identify the voice packets. He says a bigger concern is simple fraud, where people steal your phone service for free.

Of course, a private party could be tapping your line, which is a federal crime. If you suspect someone's listening in on your calls, contact your phone company and ask them to check the line. If your suspicions prove true, the phone company will alert you and notify the authorities. But if you're the subject of an official wiretap, don't expect them to tell you at least, until after the investigation is long over.


Your cordless phone could be transmitting your conversations to the world or at least, nosy neighbors with a cheap radio receiver or even a baby monitor. The solution? Replace your old 46MHz or 900MHz unit with a spread-spectrum 2.4GHz or 5.8MHz digital phone that's harder to eavesdrop on. And use a wired, landline phone for making confidential calls.


If you're worried about the Feds snooping on you, it's better to contact the FTC by phone than by filling out a form online. According to Chris Hoofnagle, associate director of the Electronic Privacy Information Center, material submitted to the FTC can be disclosed to law enforcement with a court order. So if the FBI wants to match an email address to a phone number, they've got a handy list of 85 million Americans they can scan. When you call, they don't have your email address.


Wireless Wiretaps?

The Annoyance:

Maybe I've been watching too many episodes of The Sopranos, but I'm wary of talking on my cell phone for fear someone else might be listening in. Can people tap my mobile calls?

The Fix:

It depends on the type of phone you're using. Calls made with older analog cell phones could be heard using police radio scanners you could buy via mail order. (The sale of such spy gear is now illegal as is private citizens tapping into other people's phone calls, of course.) Today's digital cell phone transmissions are much harder to tap into. You're more at risk from someone overhearing your conversation. (For more info, see http://www.spybusters.com/cell_phone_privacy.html.) The real question is why anyone would want to listen in; the answer probably depends on how much time you've been spending at the Bada Bing!

Are people you're talking to recording the conversation? They may be and may have every right to do so, depending on where they live. In California, for example, recording is legal only if both parties consent. But in Texas only one party the one capturing the call needs to consent. In fact, 38 states have "one-party" rules. (See http://www.pimall.com/nais/n.recordlaw.html for more info.) Think about that the next time you call your paramour in the panhandle.


     < Day Day Up > 


    Computer Privacy Annoyances
    Computer Privacy Annoyances
    ISBN: 596007752
    EAN: N/A
    Year: 2005
    Pages: 89

    flylib.com © 2008-2017.
    If you may any questions please contact us: flylib@qtcs.net