Subscribe to New Scientist

Tech

Feeds

Home |Tech |Science in Society | In-Depth Articles

The pocket spy: Will your smartphone rat you out?

Continue reading page |1 |2

THERE are certain things you do not want to share with strangers. In my case it was a stream of highly personal text messages from my husband, sent during the early days of our relationship. Etched on my phone's SIM card - but invisible on my current handset and thus forgotten - here they now are, displayed in all their brazen glory on a stranger's computer screen.

I've just walked into a windowless room on an industrial estate in Tamworth, UK, where three cellphone analysts in blue shirts sit at their terminals, scrutinising the contents of my phone and smirking. "If it's any consolation, we would have found them even if you had deleted them," says one.

Worse, it seems embarrassing text messages aren't the only thing I have to worry about: "Is this a photo of your office?" another asks (the answer is yes). "And did you enjoy your pizza on Monday night? And why did you divert from your normal route to work to visit this address in Camberwell, London, on Saturday?"

I'm at DiskLabs, a company that handles cellphone forensic analysis for UK police forces, but also for private companies and individuals snooping on suspect employees or wayward spouses. Armed with four cellphones, which I have begged, borrowed and bought off friends and strangers, I'm curious to know just how much personal information can be gleaned from our used handsets and SIM cards.

A decade ago, our phones' memories could just about handle text messages and a contacts book. These days, the latest smartphones incorporate GPS, Wi-Fi connectivity and motion sensors. They automatically download your emails and appointments from your office computer, and come with the ability to track other individuals in your immediate vicinity. And there's a lot more to come. Among other things, you could be using the next generation of phones to keep tabs on your health, store cash and make small transactions - something that's already happening in east Asia (see "Future phones").

Gone phishing

These changes could well be exploited in much the same way that email and the internet can be used to "phish" for personal information such as bank details. Indeed, some phone-related scams are already emerging, including one that uses reprogrammed cellphones to intercept passwords for other people's online bank accounts. "Mobile phones are becoming a bigger part of our lives," says Andy Jones, head of information security research at British Telecommunications. "We trust and rely on them more. And as we rely on them more, the potential for fraud has got to increase."

So just how secure is the data we store on our phones? If we are starting to use them as combined diaries and wallets, what happens if we lose them or they are stolen? And what if we simply trade in our phones for recycling?

According to the UK government's Design and Technology Alliance Against Crime (DTAAC), 80 per cent of us carry information on our handsets that could be used to commit fraud - and about 16 per cent of us keep our bank details on our phones. I thought my Nokia N96 would hold few surprises, though, since I had only been using it for a few weeks when I submitted it to DiskLabs. Yet their analysts proved me wrong.

Aside from the text messages stored on my SIM card, the most detailed personal information that could be gleaned from my handset came from an application called Sports Tracker. It allows users to measure their athletic performance over time and I had been using it to measure how fast I could cycle to work across London. It records distance travelled, fastest speed at different points along the route, changes in altitude, and roughly how many calories I burn off. But when DiskLabs uploaded this data to their computer and ran it through Google Maps and Street View, they were able to pull up images of the front of my office and my home - with the house number clearly displayed. Sports Tracker also recorded what time I normally leave the house in the morning and when I return from work. "If I wanted more information, then I could just stalk you," says Neil Buck, a senior analyst at DiskLabs.

I had deliberately chosen to turn Sports Tracker on, and many people might not stop to consider how such programs could be used against them. In February, Google launched Latitude, networking software for smartphones that shares your location with friends. It can be turned off, but campaign group Privacy International is concerned by Latitude's complex settings and says it is possible the program could broadcast your location to others without your knowledge. "Latitude could be a gift to stalkers, prying employers, jealous partners and obsessive friends," the organisation warns.

It is possible your phone could broadcast your location to others without your knowledge

A phone-based calendar could also leave you vulnerable. Police in the UK have already identified burglaries that were committed after the thief stole a phone and then targeted the individual's home because their calendar said they were away on holiday, says Joe McGeehan, head of Toshiba's research lab in Europe and leader of DTAAC's Design Out Crime project, which recently set UK designers the challenge of trying to make cellphones less attractive to people like hackers and identity thieves. "It's largely opportunistic, but if you've got all your personal information on there, like bank details, social security details and credit card information, then you're really asking for someone to 'become' you, or rob you, or invade your corporate life," McGeehan says.

Continue reading page |1 |2
Issue 2730 of New Scientist magazine
  • New Scientist
  • Not just a website!
  • Subscribe to New Scientist and get:
  • 51 issues of New Scientist magazine delivered to your door
  • unlimited online access to articles from over 500 back issues
  • Subscribe Now and Save

If you would like to reuse any content from New Scientist, either in print or online, please contact the syndication department first for permission. New Scientist does not own rights to photos, but there are a variety of licensing options available for use of articles and graphics we own the copyright to.

Have your say
Comments 1 | 2 | 3 | 4

Scary Stuff!

Wed Oct 14 18:41:09 BST 2009 by iPhone Developer
http://www.theiphonedevelopers.co.uk/

I dread to think how much info there is on my phone... it used to be a pain if you lost your mobile phone - now it could be utterly disastrous if your phone was to fall into the wrong hands.

I used to think the people who used pay and go SIMs for 6 months and then got new ones were a bit weird; now I'm not so sure.

Scary Stuff!

Thu Oct 15 13:31:03 BST 2009 by Simpo
http://freetubetv.net

The message thing seems normal since everyone knows about digital forensics finding files on a deleted or busted hard drive. But what really amazed me was the gps tracking - being able to track the actual paths taken by the author. Why would a cell phone be recording that information - as in why would it track her entire path of movement? I'm assuming she wasn't on the phone non stop while travelling, because then they'd be tracking it so that they can figure out which tower signals need to be sent to. It's odd the phone would carry that info and have it recorded on the SIM.

Scary Stuff!

Fri Oct 16 04:37:30 BST 2009 by Jeff

There wasnt any gps tracking by that cycling software...

What they did was used the distance moved & change in height and (probably other inputs such as Suburb) and plugged that raw data into google maps, where they could find a location to map the data.

Not quite gps tracking, more of an inference.

?

Wed Oct 14 19:09:03 BST 2009 by km

Did you mean "Don Juan" instead of "Don Quixote?"

?

Thu Oct 15 17:20:33 BST 2009 by Bill

Probably neither. I can't imagine she wanted to make out her husband to be someone that is deluded and in love with someone who doesn't exist (Don Quixote), or a serial womaniser (Don Juan). Possibly "Adonis" would be a better reference here?

This Needs An Absolute Fix Very Soon

Wed Oct 14 19:32:44 BST 2009 by Pete N

This is something that needs an absolute fix very soon phone numbers, text messages , other stuff needs either an absolute method of deletion or they must only be sent to a memory stick / card that you can remove from the phone and it needs to happen very very quickly at least then you have the option of if need be destroying the memory card by fire for the best results we also need extreme encryption on phones that the nosey gits cant get round after all your data and info is YOURS not some slimey scheeming nosey parker that needs a lesson in keeping his nose OUT of things.

This Needs An Absolute Fix Very Soon

Wed Oct 14 20:13:58 BST 2009 by chris

And this is never going to happen because ,generally, people are too thick to demand it. We're sleep walking into a nightmare. Buying things we don't need while all the time these "things" expose us to greater threats

This Needs An Absolute Fix Very Soon

Thu Oct 15 15:22:04 BST 2009 by Number

Geez...

ok so # one: there is no *Absolute* when dealing with people like hackers

#2: people are already complaining about how slow there phone conection is, if you add an encription on top of that, it will probably cut your phone speed by 10

and #3: people, in general dont know much of anything anyway, one more/less person isn't going to fix that.

This Needs An Absolute Fix Very Soon

Fri Oct 16 02:09:30 BST 2009 by ron dean

Greetings. Technology won't slow down for

personal security. A person can insulate

themselves from others treachery , by just

being careful. Life has always been like that.

It is a part of everyones Human Nature , to

stir things up a bit , and see if anything fun , or profitable can be found. We all do it , at least a bit.

Those slimey scheeming nosey people , who

are out there , are not going to just go away.

So rise above them , and say to yourself

" SO WHAT ".

It could be seen as a compliment , that

someone goes to the time and effort to

smear you. Friends , family or workmates

that are worth caring about , will see right

through any nasty smear campaign. Others

who fall for such an old ploy , show them-

selves , as easily mislead. Life has always

had Human treachery in it.

About money , the world is full of schamers

and tricksters. If one has ANY wealth ,

others will try to get it from you. We live

in an imperfect world. Be happy with the

good things in our world , and enjoy your

phone , but be a cautious adult.

Take responsibility , and learn more about

protecting yourself from the nasties out

there , and have a truely GREAT DAY .

Comments 1 | 2 | 3 | 4

All comments should respect the New Scientist House Rules. If you think a particular comment breaks these rules then please use the "Report" link in that comment to report it to us.

If you are having a technical problem posting a comment, please contact technical support.

Holds more secrets than you may think (Image: Eric Van Den Brulle/Getty)

Holds more secrets than you may think (Image: Eric Van Den Brulle/Getty)

1 more image

ADVERTISEMENT

New camera promises to capture your whole life

13:10 16 October 2009

Worn around the neck, it records every minute of your life – which could help people with memory problems, or who just want to "lifelog"

Solving the crystal maze: The secrets of structure

12:10 16 October 2009

Crystal structures explain the behaviour of everything from bone to gemstones – but why do they take the shapes they do? We might have cracked it at last

Was moon-smashing mission doomed from the start?

18:55 15 October 2009

Weeks before NASA's LCROSS mission hit the moon on Friday, some scientists predicted the impact might not be visible, and others questioned the mission's logic

Sea anemone stings make a 'hypodermic' skin cream

15:03 15 October 2009

Stinging cells can be used as tiny needles to inject drugs into the skin – sea anemone face creams should be available to buy next year

Latest news

Lunar plumes and Martian dunes: the week in space

00:13 17 October 2009

This week, astronomers spotted a faint plume of material lofted above the moon by the impact of NASA's LCROSS mission and strange shapes created by the Martian wind

Facing extinction: Conservation in North America

19:00 16 October 2009

A fine history, Nature's Ghosts by Mark Barrow shows how far we've come from Thomas Jefferson's belief that mammoths still roamed the Earth

Today on New Scientist: 16 October 2009

18:00 16 October 2009

Today's stories on newscientist.com, at a glance, including: how to solve the secrets of structure, a camera to record your whole life, and how to give a fly a false memory

Venki Ramakrishnan: A Nobel display of modesty

16:51 16 October 2009

A bike and a "little drinks party in the lab" is enough for the molecular biologist named joint winner of the prize in chemistry last week

TWITTER

New Scientist is on Twitter

Get the latest from New Scientist: sign up to our Twitter feed

ADVERTISEMENT

Partners

We are partnered with Approved Index. Visit the site to get free quotes from website designers and a range of web, IT and marketing services in the UK.

Login for full access