PeEgAB1uY4


Reporters found that: where a 139 phone number to be sent to a message listener, says: "You two o'clock in later,mulberry purple bag mulberry continental purse, I quit ......"

Reporter: Do you have an old woman how to monitor the contents of his wife's it? Customers do not have privacy in front of you a?

Liao: I can hear the old woman listening content, monitor the content of other customers have been uploaded to the customer

Personal mailbox,mulberry bayswater clutch bag, because the old woman would not use a computer, so let me help take care of the mailbox,http://ghost.funbbs.me/viewthread.php?tid=118608&extra=, she came to pick up once a month.

Two types of monitoring calls and SMS messages, the last column is the two rows of Arabic numerals, click on these figures, we entered into a website interface.

Liao: Go here, can be found on the specific location of the object being monitored.

Reporter: so magical ah? How to achieve,abercrombie and fitch edinburgh?

Liao: These figures are the longitude and latitude of the code, the input to both the boxes, you can lock the specific location of the object being monitored, can be accurate to what road number number.

After a few seconds, the page turned out a digital map, the red mark that is the specific location of monitored objects.

Six steps to get eavesdropping software installation

Reporter: What is the name of this software is oh,mulberry bags cheap?

Liao: no name, is imported from abroad. My client is installed eavesdropping software mostly with marriage, emotional concerned.

After several "close contact", the reporter gradually made Mr Liu's trust, he details the eavesdropping software installation process to reporters:

The first step: Liao customers to provide the object being monitored phone number (cell phone is a smart phone, and Internet access);

Step two: Mr Liu was listening to the phone to send a text object, which contains the URL of eavesdropping software;

The third step: the object being monitored on the phone,http://www.huaniucar.com/home.php?mod=space&uid=36672, according to the SMS Web site to download and install the software;

Step Four: Liao customers to provide a mailbox, Mr Liu for background operation;

Step Five: backstage listening to the customer mailbox and phone number to be bound, the system can be carried out monitoring, and real-time call and message content will be uploaded to your personal mailbox;

Step Six: Customers will be able to view the call to open the mail and SMS.

"You just show your prior record is not ready Oh? How I believe you tapping into it?" To further find out the whole process of software installation, the reporter deliberately "difficulties" and that want to use their mobile phone trial what effect.

Liao hesitated or promised down, and agreed the next day to his residence for installation.

SMS call recording two minutes display

20 am,hollister california cologne,http://www.maydayfans.cn/forum.php?mod=viewthread&tid=90406, reporters who went to Mr Liu's rental again. According to him the day before the tutorial, reporters need to eavesdrop on the phone, he sent me a text message is opened, follow the prompts to download and install the eavesdropping software, Mr. Xiang Liao provides a phone model, phone number and personal email.

"I need to send us your company's information technology administrator, who then passed back to your operation." Mr Liu said, while beginning through QQ and one called "software a" good friend to chat, also requires Reporter avoided.

"Buttoned up, you can now call, send text messages, try the effect." About 10 minutes later, Mr Liu said proudly.

Subsequently,hollister sizes in uk, the reporter eavesdropping software equipped with a mobile phone, to a friend call the five telephone,mulberry factory shops mulberry small bag,http://www.nashy-in-germany.com/component/fireboard/?func=view&catid=3&id=8801#8801, compiled and distributed five text messages.

To verify the listener effect, two minutes later, the reporter login mailbox, and she received two messages.

The first message in recorded just five reporters dialed calls, including: call time, length, and the other side the name and number information during a call, but no call.

The second message is recorded message,http://www.mydiyclub.com/home.php?mod=spacecp&ac=blog&blogid=, including the transmission time, content, and other names and phone numbers.

Reporters checked one by one and found that the content of messages verbatim. Reporter: how did call recording it?

Liao: audio files larger than upload messages to lag a little,abercrombie sunglasses abercrombie china.

Soon, the bound-mail messages really came the five, the conversation is the reporter dialed the previous five phones.

Click to download call recording attachments,brands like abercrombie abercrombie and fitch london store location, you can clearly hear the entire contents of the call.

"We can also lock the position of the object being monitored." Liao open the message inside the English form, click on a group of digital code, you enter a website interface.

Subsequently, an electronic map page pops up above the red mark is the reporter dialed the phone location.

"Bound mail account and password only customers know that backstage management is invisible." Liao said.

F

In-depth investigation

Clear division of trading covert eavesdropping software industry chain to form underground

On the 20th morning, when reporters eavesdropping software experience, Mr. Liao Bin suddenly visited the rental, he took out a bunch of miniature camera equipment to start labeling.

Mr. Bin said he and Mr Liu is a fellow. They gave reporters a business card display, they belong to the same company, Mr. Bin address in Chengdu, while Mr Liu was Shenzhen.

Mr. Bin said he and Mr Liu is a partner, sales of digital products in a number of digital city, but also directly supply mall merchants getting goods from Shenzhen to other manufacturers.

He said that businesses do not operate like phone tapping software, is responsible to introduce them to the customer, they give businesses a certain percentage of the rebate.

21, the reporter also visited a number of digital mall in Chengdu, found that many businesses are undertaking secretly eavesdropping software installation business, then "subcontracting" to the ground like Liao same technical staff,http://xwlsy.w118.sethost.cn/thread-668939-1-1.html, earn a referral fee.

"Eavesdropping software business has formed underground industry chain of their clear division of labor, things low-key and subtle." A digital mall tenants told reporters.

□ precautions

Bazhao prevent the phone being tapped

So,http://sgwto.com/bbs/forum.php?mod=viewthread&tid=340819, how best to avoid being tapped? Experts advise,karen millen, we must note the following:

First, do not easily be kept their phones to others and use;

Second, do not open unsolicited MMS, if not necessary, do not easily to the website to download software,http://www.daigoubang.net/forum.php?mod=viewthread&tid=18752, mainly to avoid the invasion of viruses and Trojans;

Third, Internet-enabled mobile phone users to open, it is best to phone to install some firewall or anti-virus software, listening to resist the intrusion of viruses;

Fourth, if the mobile phone text messages and Internet traffic is abnormal, the consumer should be carefully checking the list to see if there is not

Ming origins of the called number and their unwitting SMS;

Fifth, when an important meeting or make important decisions,mulberry leah, such as worry about the phone being tapped, admission is best not to bring cell phones or cell phone battery removal;

Sixth, the mobile phone in case of breakdown maintenance, be sure to pull out the SIM card should prevent others tricks;

Seventh, the Bluetooth phone interface and the like, best to turn off in public places. USB interface can be shut off as much as possible, with the turn.

Eighth, choose a virus-enabled mobile phone or cell phone to choose a professional anti-virus software, can prevent and expulsion phone viruses and Trojans.

□ laws and regulations

Illegal sales of eavesdropping equipment imprisonment

Chengdu lawyer Xing Lian said, the illegal use of wiretapping equipment theft of trade secrets to other units or individuals, shall be required to compensate the victims of economic loss; illegal use of wiretapping equipment against another's privacy,mulberry plant, defamation, and the spirit of the law to bear liability for damages.

And according to "criminal law" requirement: the illegal production and sale of eavesdropping or secret photographing

Other special espionage equipment, imprisonment, criminal detention or control of three years. Illegal use of wiretapping, burglary as other special espionage equipment, causing serious consequences, term imprisonment, criminal detention or control. For professional spy equipment production and sales, the state law this is explicitly specified, only circulating among particular subject, is not allowed civilian. □ WCC reporter trainee reporter Ruth Zhang Li and photo coverage
 
2 Next