SURVIVALIST #27: The Throw Away Phone

in #travel8 years ago


Have you ever wondered why spies in the movies throw cell phones away as if they were insignificant? It is for good reason; cellular technology today allows a majority of the smart devices we use on a daily basis to be tracked, with or without the owner’s approval. Spies, like everyone else, appreciate the ability to remain private in their personal affairs. They throw away cell phones in the movies in order to maintain that privacy and freedom of mobility.

Cell phone tracking has its place, and has saved lives on occasion, when used for its original intent. That, however, is seldom the case. Law enforcement, in conjunction with state and federal governments, have shown how easily the system can be utilized for nefarious activities, such as tracking and eavesdropping on American citizens at will, and without the procurement of a warrant. This is a clear violation of several amendments in the Bill of Rights of the U.S. Constitution. In order to avoid becoming an unwilling target of intrusion, it is necessary to understand the technology surrounding the cellular industry, especially when it comes to smart phones.

Smart phones are easily hacked and accessed through the same technology that makes them operational. All modern cell phones have 911 tracking software embedded. This has been done as a safety protocol and is intended to allow 911 operators the ability to triangulate cell phone locations with the assistance of cell phone towers.

Advances in software applications rely heavily and extensively on GPS technology and the ability to geo-locate devices. This is necessary for a majority of the applications found on smart phones. Navigation applications require the ability to communicate with satellites on a constant and continuous basis in order to pinpoint a cell phone location and determine the best map course to recommend.

Several of the social media apps utilize this same technology. It is often advertised as a method of providing the information, and content, relevant to the location of the device. It is also advertised as a way of allowing friends to pinpoint locations of each other without having to actually communicate verbally or through a text. The problem is, these software tracking packages, when allowed to access the phone, are always on, always intrusive, and always forgotten about. As an added bonus, the applications requiring “location” services, often advertise that they will not work properly without those services, which means you cannot use the application without giving up all of your personal information to an unknown and untrusted entity.

The Throw Away Phone:
Several manufacturers produce cell phones that are not recognized as carrier specific brands. Straight Talk, Tracfone & Nextel are brand names associated with what are commonly referred to as “burner” phones. These phones and the carriers that service them, do not require a traditional cell phone plan. Instead, owners are provided the opportunity to buy monthly plans online, or by purchasing brand specific activation cards. The beauty of these devices rests in the initial setup protocol.

Unlike conventional cell phone carriers, which require providing personal information such as name, address, social security number, date of birth, etc.; these non-carrier devices can be activated without divulging any personal information whatsoever.

The basic procedure for activating any of these devices involves getting online, or using another phone, landline or cellular. In order to remain anonymous, the best course of action is to visit a free wifi environment, such as a library or coffee shop, and accessing the website for activating the device. Once on the activation page of the website, you can literally complete the personal information criteria as you see fit, using a pseudonym, an existing address of any location in the US, and filling in the blanks as you see fit.

This information will be what is provided to any agency which happens to inquire about the ownership, and/or possible location of the device. Bear in mind that if the “location” services are used on these devices, it will still allow outside agencies the ability to triangulate the device; however, due to the fact that these carriers piggyback off of traditional cell carrier services, the process of triangulation takes a bit longer than normal.

Summary:
These devices are often less expensive than their traditional counterparts. Services provided on these devices may not have the same feel and appeal as their traditional counterparts, but they will allow you to perform many of the same tasks. These devices can be thrown away, whenever invasion of privacy concerns arise, and replaced with a new throw away model at an affordable rate.

Original article by Walkabout Willie, published in Survivalist Magazine

Read All 29 Articles From This Issue on STEEMIT Here

If you would like to see more survival and preparedness training, please UpVote & Share.

Coin Marketplace

STEEM 0.18
TRX 0.16
JST 0.030
BTC 67789.28
ETH 2615.54
USDT 1.00
SBD 2.72