OmniTel Communications' Website Compass

Back to Basics 14 WebsiteCompass The following are examples of stalkerware apps: • FlexiSpy– Claims to take complete control of the device, so the stalker can monitor everything the user does. • Flash Keylogger – Documents anything typed, including web searches, text messages, and emails. • Free Android Spy – Monitors location and reveals contacts, photos, and videos. • iKeyMonitor– Enables monitoring of calls, messages, and social media activities, as well as location tracking, and more. • mSpy– Monitors social media, web browsing, calls, texts, and location. • PhoneSpector– Delivers texts, call history, and GPS location to the stalker. • Spyera– Enables the stalker to listen in on and record phone calls, monitor social media, record keystrokes, look at texts, examine photos, track location, and listen to what’s happening near the phone at any time. • SpyFone– Gains access to the user’s contacts, location, and phone log. • SpyPhone Android Rec Pro– Enables the stalker to listen to and record phone calls, intercept text messages, and more. • TruthSpy– Extracts data from the phone, including text messages, location, calls, social media, and browsing history. • XNSPY– Monitors call logs, tracks GPS, monitors web browsing, accesses chats, and more. Many makers of this type of app are still raking in money from selling them, but others have shut their doors due to being threatened by hacktivists (people who use their hacking skills for good). Why is Stalkerware Considered Abusive? The Technology Safety blog, run by the National Network to End Domestic Violence, states, “Healthy relationships are built on mutual trust—not monitoring or checking up on a partner. Surveilling or stalking a partner’s devices or communications is an example of one way that an abusive person may try to gain power and control over a current or former partner.” In the world before mobile technology, the use of stalkerware would have been the equivalent of someone following you around all day, constantly peeking in the window of your home, listening in on all your live and telephone conversations, sitting in on all your club meetings and appointments, opening your snail mail, compiling a list of all your friends and business associates, peering over your shoulder every time you look up something in a phone book or encyclopedia, and processing the film in your camera —all at the same time! Why Should You Warn Others? Stalkerware can only be detected if you know what to look for, and not everyone knows that stalkerware even exists. Just as you share information with others about how to avoid physical crimes, illnesses, and other unwanted events, it’s important to spread the word about these intrusive and destructive apps. These Apps May Be Spying on You, Too Even if you don’t have stalkerware installed, there are other apps that may be collecting more information about you than you’d like. Experts recommend deleting the worst offenders such as those listed here: • Angry Birds – This innocent game has been known to non-innocently leak data. At the very least, make sure you have the latest version. • DoorDash – The food ordering app collects personal information, including name, email address, and physical address. • Facebook – Given Facebook’s shaky reputation for respecting user data, it should be no surprise that its app collects a variety of data from your phone. • Flashlight apps – These apps may request supposedly needed permissions before they will operate. • Instagram – Because Instagram is owned by Facebook, it has some of the same data collection issues. • WhatsApp – Vulnerabilities with this app allow cybercriminals to attack with a simple message. QUICK TIP: Though rare, stalkerware can also be placed on computers. Use antivirus software to detect and remove it. Source: https://www.nortonlifelock.com/blogs/norton-labs/stalkerware-rise Source: https://www.zdnet.com/article/how-to-find-and-remove-spyware-from-your-phone/ Source: https://www.techsafety.org/blog/2020/3/2/recent-survey-confirms-pervasive-stalking- behaviors-that-survivors-and-advocates-have-reported-for-years

RkJQdWJsaXNoZXIy MTMzNDE=