You should also note that your phone can be blocked remotely. A special DdoS attack can be used to shut down the phone. In fact, there are two different ways to do this. Both rely on sending large amounts of “invisible” text messages. The first method is to fill the message with unreadable symbols, such as defining Chinese encoding for English text. The mobile device will not be able to read or display text messages, but it cannot answer calls or other messages until the end of the text message. Another method is to manage the service WAP push messages. These two messages are invisible, your cell phone jammer device will not display them, and are used to ensure that the victim does not know that their phone has been blocked.
Researchers can use two points to tell a track to make up more than half of all users, and eleven points are enough to distinguish each track. You can see examples of these “personal clues” in the image below. These scientists compared this unique movement path with fingerprints and concluded that it can be used for identification. As mentioned earlier, this database contains personal information. As we all know, Sprint/Nextel owns such a database and they can provide it to law enforcement without any guarantee. Therefore, we can see that mobile operators are helping to track us. For example, Verizon even sells this private information to third parties. Now, special phone jammers owned by law enforcement officers can even spoof cell towers and record the location of all traffic.