Intercepting Text Messages
Spying activities over cellular networks is a growing concern in today's world. Gone are the days when you needed sophisticated equipments to intercept private conversations. In this article I will tell you two techniques to intercept messages. Purpose of this document is just to inform you, if you want more technical details you can search on the web. We don't recommend you to go for such activities as they are illegal in most of the countries.
Grab the messages
The other procedure to intercept text messages is to extract the poorly encrypted messages. All you need is to install a special firmware on your mobile phone. The firmware will turn the cell into a radio that will capture all (insecure) messages that are transmitted over a certain channel at that time. If you want to intercept messages from/to a specific person than you and your victim must be using the same base station and you will also need some other firmware. Such firm wares are available freely on internet. Depending on your cell phone you will need a serial or USB cable to flash/install the firmware.
Clone the phone
To turn your cell phone into a spying machine all you need is a SIM card reader/writer. These devices are available on a various online shopping websites like eBay. Such devises also come in USB plug and play interface and are easy to use. The difficult part in this technique is that you have to gain access to your victim's cell phone, without his knowledge.
After capturing the SIM all you need to do is to insert it into your reader to copy the SIM information (in technical terms copy the cryptographic key). Cryptographic key is like a password for encrypting and decrypting a text message. Next step is to copy that cryptographic key to your dedicated spy phone. This technique guarantees the reception of messages on your cell. Your victim and you will get identical copies of the messages because the base station will be unable to differentiate between the two clones!
mobile-pedia and its team members will not be held responsible for any illegal activity caused, directly or indirectly, as a result of information contained in this document.