Preview

Is Mobile Phones An Invasion Of Privacy

Satisfactory Essays
Open Document
Open Document
354 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Is Mobile Phones An Invasion Of Privacy
Is Mobile Phones an Invasion of Privacy?

This is a very controversial topic that has had many arguing about. Is Mobile Phones an Invasion of Privacy? Personally I think yes. People can track your sim card. This could also benefit many people. In many missing police cases, the police end up tracking the missing person’s phone and find out where their last place was. This can only work if the sim card is not corrupted or broken. Mobile phone tracking is set up using the SIM card, with an ID number that trackers can then enter online to view a real-time location. Although this can be legitimately initiated by asking permission from the phone user, the system is open to misuse. A journalist experimented by tracking his girlfriend – he set up the track while he was at home, then borrowed her mobile and accepted the trace (sending an acceptance message). Although the tracking company is legally required to send occasional warning messages to the trackee’s mobile, the journalist reported that none of the phones in his experiment received any such warnings.
Fortunately for us, the Data Protection Act steps in the way and protects us. But not all people follow the law. Some front cameras on phones could get hacked and send the hacker images that other’s wouldn’t want to be shared. The hacker could also watch you and send messages.
What can you do?
Switch your mobile phone off when not in use
Don’t give out your mobile phone number on forms – use your landline
Don’t transmit your credit card details via your mobile.
All over the internet, companies are selling software that can bug your phone. Some sites even market it as a way to spy on your significant other. But someone could swipe your phone - and in just a few minutes install the spyware - returning it without you ever knowing. Then, when you get a call the spy can listen in to your conversations, and read your texts and e-mails. The cell phone hacker can even access your camera phone and speaker, to keep track of

You May Also Find These Documents Helpful

  • Satisfactory Essays

    How has cell phones affected society? The first wireless cell phone invented was heavy, bulky, and ugly, but it was still portable and used to communicate with people. The first cell phones were very expensive and only the rich people could afford them. Little did we know what the effects would be. With the invention of cell phones came both negative and positive effects. While cell phones can be used in emergencies and used for communication among people, they have also caused accidents while driving and inhibited social interaction…

    • 90 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Cell phones have become the leading source of communication in the world. However, it is not just phone calls or e-mails anymore, someone might take down time to play angry birds or candy crush saga. If your cell phone is left on and completely unattended someone, knows your location. Over 200 million Americans who own a cell phone have been watched on a data base created by the cell phone company, keeping track of tower signals, recording conversations, and making copies of text messages and emails. Even the United States government has gone to the extent to using cell phone information when coming to court evidence and alibies. Parents are becoming technologically aware and are using tracking abilities to keep an eye on their children and their whereabouts. The question remains, where can you draw the line between…

    • 718 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The book 1984, George Orwell depicts a world in which technology has advanced so far that the government of Oceania is able to constantly monitor it’s citizens. The actual year 1984 has passed and no such technology existed then; however, our modern technology is fairly similar to that found in the book 1984. Supposedly, the technology in our world is used for a different purpose then that of Big Brother’s world. However, “That’s No Phone. That’s My Tracker,” is an article by Peter Maass and Megha Rajagopalan that focuses on the use of cell phones as surveillance technology. In the article, the writers discuss how cell phones are simply trackers “ that happen to make calls” (Maass, Rajagopalan 1). Although they are a legitimate concern, surveillance…

    • 549 Words
    • 3 Pages
    Good Essays
  • Good Essays

    “In the far distance a helicopter skimmed down between the roofs, hovered for an instant like a bluebottle, and darted away again with a curving flight” (Orwell, p.85). It was the police patrol, snooping into people’s windows.” Not to mention with false information that can be easily edited to blame the innocents. In many situations we are not even aware of what is being monitored, actually in the article That’s no phone. That’s my tracker it was said that,” Thanks to the explosion of GPS technology and smartphone apps, these devices are also taking note of what we buy, where and when we buy it, how much...whom we text and e-mail…

    • 895 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    This type of information is accessed through high-tech tracking software and some cell phone carriers. According to a security guard from Clackamas High School, the data in cell phone applications like iCloud, Snapchat, and Instagram can be easily accessed by cell phone carriers or the NSA in order to conduct investigations. One’s conversations and pictures on social media accounts say a lot about one’s self and any plotting schemes or reasons for committing a crime (Figert). The government can easily obtain information from these applications. The NSA uses this procedure to obtain evidence of an individual.…

    • 1484 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Invasion of Privacy

    • 968 Words
    • 4 Pages

    Invasion of privacy is something that is a major concern among Americans. In this paper I will discuss Steve, who has recently joined a church. The church doctrine is such that members are to reveal indiscretions from their past. Steve has told them of some of his indiscretions but Steve is not happy about this and decides he would rather leave the church. The church leaders have told Steve even if he leaves his neighbors as well as members of the church will be notified of his past. In this paper I will discuss which privacy torts are involved as well as if this is a libel case. I will also discuss whether the expectation of privacy applies to the facts of this case as well as the defenses to the tort and if there is a legal difference in disclosing personal indiscretions to members of the church, its’ elders and to the general public.…

    • 968 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Nowadays we assume no one can see or hear your private moments but that’s not true the government has been constantly collecting data out of our phones and internet records. With all the new technology and devices we have now it’s easy for the government to hack in the system and track us. Our privacy will always be threatened by them and now not only the government can get our information and look through our devices but these people around the world that are called “hackers” can also. Hackers are known for hacking into any device that you have and can look through your messages, apps, emails, etc. You should never download apps outside the official App Store because hackers have gained access to over 1.3 million google accounts last year. They have also hacked into Twitter and Snapchat which are two big social media apps. In the last few years they have hacked into around 32 million accounts for twitter and snapchat. Both apps do contain private text messages and Snapchat can also talk through pictures too, so hackers can leak the pictures and text messages. This proves that it doesn’t matter if you delete messages or pictures off your phone or just because Snapchat has a time limit with the photos doesn’t mean is gone forever. The government and hackers and find all…

    • 845 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The article That's no phone. That's my tracker., from The New York Times explains how our phones are being used to track and record us. “Every year, private companies spend millions of dollars developing new services that track, store and share the words, movements and even the thoughts of their customers.” (Ohm, 2012). Just like the Telescreens were used to monitor and track every person's movements these phones or should I say trackers are used in the same way. “The surveillance and privacy implications are quite simple. If someone knows exactly where you are, they probably know what you're doing...constantly check and record the location of all phones on their Network.” (Maass, 2012). They don't only track they also record everything you do and the faces, they also use the information recorded from you to advertise and sell…

    • 806 Words
    • 4 Pages
    Good Essays
  • Good Essays

    This includes social media, checking emails, taking pictures and texting. What we do not think about when it comes to using technology, is the possible surveillance cameras and tracking devices on our phones. It makes people wonder, do I really have privacy if my every move is so easily tracked by my phone or if I am being watched when I am out shopping? According to Peter Maass and Megha Rajagopalan, authors of “That’s No Phone. That’s…

    • 538 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Are educators overworked and underpaid? I disagree with the idea that educators are overworked and underpaid because if educating is their passion they shouldn’t care about the pay, they benefit from holidays and summers off, and they have the option to choose their career and select their school of choice.…

    • 715 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The telescreen “with its never-sleeping ear, could spy upon you night and day.” (Orwell, 1949) It was a two way television that could listen and watch everyone at any time. American citizens willingly carry around their own telescreens, and they pay extreme amounts of money for them. The NSA has complete control of citizen’s cell phones, and they are repeated giving up their freedoms. “The NSA’s ANT division develops implants for mobile phones and SIM cards. One of these is a spyware implant called “DROPOUTJEEP” designed for the first generation of iPhones which was still in development in 2008, shortly after the iPhone’s launch. This spyware was to make it possible to remotely download or upload files to a mobile phone. It would also, according to the catalog, allow the NSA to divert text messages, browse the user’s address book, intercept voicemails, activate the phone’s microphone and camera at will, determine the current cell site and the user’s current location. ANT’s technicians also develop modified mobile phones, for use in special cases that look like normal, standard devices, but transmit various pieces of information to the NSA — that can be swapped undetected with a target’s own mobile phone or passed to informants and agents. In 2008, ANT had models from Eastcom and Samsung on offer, and it has likely developed additional models since.” (Cook, J. 2013) Your privacy is entirely nonexistent in today’s society, the fifth amendment of the constitution, “Prohibits unreasonable searches and seizures and sets out requirements for search warrants based on probable cause as determined by a neutral judge or magistrate.” (U.S. Congress, 1791) It is not repealed, it is however, ignored and unlawfully committed everyday by our…

    • 674 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cell phones have changed the ways of communication so much that the world can now have internet, face to face chatting, and some 3D technology has already successfully made holograms. However, it also can pertain to invasion of privacy in some sorts.…

    • 1333 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Social Security

    • 707 Words
    • 3 Pages

    The author stated in source 2 "Downloading and installing an application (or app, for short) could endanger your data privacy, too, if the app collects information from your cell phone without your permission. Some apps explicitly ask for permission to access your cell phone in different ways." This also means that some apps are not safe because they take in your personal information from your phone and your privacy is in danger. Hackers all over the internet waiting for something like this to happen because they see it as a opportunity When using the internet use the right websites so your personal information is…

    • 707 Words
    • 3 Pages
    Good Essays
  • Good Essays

    government tracking

    • 1009 Words
    • 5 Pages

    Terry Allen’s article gives us a much stronger sense that cell phone tracking technology is…

    • 1009 Words
    • 5 Pages
    Good Essays