Are Cell Phones Safe?
Price
Free (open access)
Transaction
Volume
117
Pages
11
Page Range
59 - 69
Published
2011
Size
364 kb
Paper DOI
10.2495/SAFE110061
Copyright
WIT Press
Author(s)
H. B. Wolfe
Abstract
We take for granted every day that we are safe from any given risk because we are protected by various standards, statutes, and laws. The cell phone has become ubiquitous and is currently being used by more than 5 billion people around the world. It is really nothing more than a small computer with a radio transmitter and receiver integrated into it. Newer phones may also record photos, videos and sound. Some have a built in Global Positioning Satellite System capability providing the ability to track the phone’s physical location. Every generation of cell phone has expanded its capabilities and we are now able to communicate with the Internet in addition to normal telephone activity. Along with these capabilities come a number of risks. Some of these are normally associated with using the Internet exposing users to malware of various kinds. However, there are other more insidious risks that are less known. This paper will discuss all of the risks associated with cell phone use including malware; loss, theft, and seizure; communications interception and loss of privacy; location logging and tracking; and bugging. Most people are not aware of these threats and believe that their service provider has put in place measures to eliminate any risks as well as protecting their privacy by the use of cryptography. While there can never be 100% safety, the accompanying discussions will cover mitigating alternatives that can be put in place to reduce the identified cell phone risks. Keywords: data encryption, mobile phones, triggerfish, Bluetooth. 1 Introduction In 1968 Joseph Licklidder [1], sometimes referred to as the \“father of the Internet” said \“In a few years, men will be able to communicate more effectively through a machine than face to face.” The mobile phone is an embodiment of that forecast. Mobile phones, cell phones, personal data assistants (PDA), smart
Keywords
data encryption, mobile phones, triggerfish, Bluetooth