Is it Possible to Wiretapping from a HP? This is the Fact!

Hello, friend Summarized! Have you ever worried that your cellphone is being tapped by someone else? Or maybe you want to know how to tap other people’s cellphones? If yes, then this article is suitable for you to read. Because here, we will discuss cell phone tapping, what can be done by wiretapping, how to do it, and how to prevent it. Come on, see the full review below!

What is HP Tapping?

Cellphone tapping is an action taken to access personal or confidential information stored on someone’s cellphone without the owner’s knowledge or permission. Information that can be intercepted includes:

  • Text messages, WhatsApp, Telegram and other chat apps
  • Phone calls, including voice recordings and numbers dialed
  • Photos, videos, music and other files in the gallery or HP storage
  • GPS location, including travel history and frequently visited places
  • Other application data, such as email, social media, banking, and so on

Cellphone tapping can be done in various ways, ranging from simple to complex. Some of the commonly used wiretapping methods are:

  • Using a spy app. These apps usually have to be installed silently on the target’s phone by borrowing it for a while or sending a download link masquerading as something else. Once installed, the eavesdropper application will send data from the target cellphone to the eavesdropper’s cellphone via the internet.
  • Using spy software. This software usually has to be installed on a computer or laptop that is connected to the target cellphone via a USB cable or Bluetooth. Once installed, the spy software will copy the data from the target cellphone to the eavesdropper’s computer or laptop.
  • Using a public Wi-Fi network. Insecure public Wi-Fi networks can be used by eavesdroppers to peek at the data sent or received by the target cellphone via the internet. The trick is to use a special tool called a sniffer to capture data packets passing on the Wi-Fi network.
  • Using dual SIM cards. A dual SIM card is a SIM card that has two phone numbers on one chip. This SIM card can be used by eavesdroppers to intercept phone calls and text messages from the target cell phone by installing it on another cell phone owned by the eavesdropper. That way, every incoming or outgoing call or message from the target’s cellphone will be duplicated on the eavesdropper’s cellphone.

Examples of Cell Phone Tapping Cases

Cellphone tapping is not a strange thing in Indonesia. Many wiretapping cases have occurred in various fields, be it politics, business, law, or personal. Here are some examples of cell phone tapping cases that have shocked the Indonesian public:

  • The case of wiretapping of President Joko Widodo’s phone by Australia in 2013. This case was revealed after a former United States intelligence agent, Edward Snowden, leaked confidential documents showing that Australia had tapped the phones of President Joko Widodo and several other high-ranking Indonesian officials.
  • The case of wiretapping of KPK Chairman Abraham Samad by the Police in 2015. This case came to light after the Police announced that they had arrested a suspect in a corruption case using evidence of a telephone recording between Abraham Samad and a businessman named Andi Narogong.
  • The case of wiretapping of the artist Gisella Anastasia’s phone by an unknown person in 2020. This case was revealed after an exciting video allegedly featuring Gisella Anastasia and a man circulated widely on the internet. Gisella Anastasia admitted that the video was the result of her personal recording being intercepted by an unknown person.

How to Do Wiretapping?

Wiretapping requires quite deep computer knowledge, many processes need to be gone through to setup a virus embedded in an application you want to use for wiretapping to work.

The outline process is more or less like this:

  1. Hackers determine what application will be used to perform tapping.
  2. Hackers create viruses and insert them into the application.
  3. Hackers spread viruses by various methods, ranging from social engineering , phishing and other distribution methods.
  4. After a target is trapped, the hacker takes action by remote control or sending commands to the victim’s cellphone to send data to the hacker’s device.

Most hackers do wiretapping using the computer as the main device, the IP used must be the same so that applications that have been planted with viruses can make contact according to the IP that has been planted. That is the weakness of doing remote hacking, easy to track if the hacker is careless.

For the complete method, see the video below, only learn this to protect yourself, not to harm others.

https://www.youtube.com/watch?v=YRm-St0bJhU&ab_channel=LoiLiangYang

How to Prevent Cell Phone Tapping?

Cellphone tapping is a violation of privacy rights that can harm us morally, psychologically, and even financially. Therefore, we must be careful and alert to the possibility of cell phone tapping which can occur anytime and anywhere. Here are some tips we can do to prevent cell phone tapping:

  • Using a strong lock password or pattern to lock our HP screen. Don’t use passwords or lock patterns that are easy to guess, such as birthdays, spouse names, or sequential numbers. Also, never share your password or lock pattern with anyone, including those closest to you.
  • Deleting important or sensitive data that is no longer needed from our cellphones. If we have photos, videos, files or other data that are personal or confidential, we should delete them from our cellphones after we are done using them. If necessary, we can store it in another, safer place, such as a computer, laptop, flash drive, or cloud storage.
  • Avoid using unsecured public Wi-Fi networks to access the internet from our cell phones. If we have to use a public Wi-Fi network, we should use a VPN (Virtual Private Network) to protect our data from eavesdropping. VPN is a service that can encrypt our data so that it cannot be read by other people who are on the same network.
  • Keeping our cellphones from being lost or stolen by other people. If our cellphone is lost or stolen, immediately report it to the authorities and ask to block our phone number and SIM card. If necessary, use the find my device feature on our cellphones to track the location of our cellphones and delete the data on them remotely.
  • Install a trusted antivirus or anti-malware application on our cellphone. This application can help us to detect and remove bugging applications or spy software that may be hidden on our cellphones. In addition, this application can also protect our cellphones from viruses, malware or other cyber attacks.

Conclusion

Cellphone tapping is an action that can harm us in various ways. We must be vigilant and careful about the possibility of cell phone tapping, which can be done by anyone for various reasons. We must also take preventive measures to protect the privacy and security of our data on our cellphones.

Thus the article about tapping this cellphone. Hopefully useful and add to your insight. If you have questions, suggestions, or comments regarding this article, please write them in the comments column below. Thank you for reading the article from Diringkas.com!

Subscribe
Notify of
guest
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments