The world in which we live regulates the use of electronic waves and more particularly the frequency ranges used to communicate. Thus, the use of these frequencies is subject to regulation.
Cell phone jammer therefore have a frequency range allocated by telecom operators and must stick to it. I told myself that it would be good one day to warn Internet users about an abuse that can be achieved without their knowledge.
“Did you know that it is possible to remotely operate an extinct mobile phone, for example on a meeting table, to hear what is being said?
This is what reveals Alain Hurst, responsible for computer security for the CEA Defense Department. (The Atomic Energy Commission, a scientific, technical and industrial research establishment)
“Today’s mobile phones have almost all (all GSM brands) a discrete mode of play activated by a computer code that operators can send without the owner of the laptop is aware,” says t he in an interview with AFP.
Any mobile phone can therefore be used as a micro-spy. And even off, the phone continues to be active.
The connection can only be interrupted when the battery is removed from its slot. Who will think about it? and not always obvious and practical in demanding environments the utmost confidentiality.