What was unheard of almost a decade ago is currently in practice at large_ spying on mobiles. Starting with Atir Raihan’s brainchild, FlexiSpy in 2003 that he deliberately designed to expose the adultery of his girlfriend, many companies have followed suit and today the market is teeming with duplicate applications, all built with a common purpose in mind_ remote mobile monitoring.
When it comes to the possibilities of what we can do with such applications, they are numerous and are being improved with every new, booster dose of features injected into these apps regularly. Likewise, there is no denying the usefulness of such cutting edge products but when it comes to ethics, people have different, often conflicting opinions over the use of such technology.
Let’s explore how these applications work and how they can be positively recruited for various purposes, leaving the question of ethics to be dealt at the end.
Unlike spyware that can be installed remotely, these monitoring software require physical access to the device itself. These applications are normally compatible with different operating systems including Google’s Android, Apple’s iOS, Nokia’s Symbian, BlackBerry and Windows. This means that you can monitor mobiles as well as tablets.
On purchasing the application, the company sends you a welcome email that contains a download link and the credentials you would be needing to sign in to your online control panel. In order to install the application on the target device, you first need to download it. For this, you open up your inbox on the cell phone or the tablet. (Make sure your internet is working properly or you might get into trouble for any delay). Click on the download link provided and the app will automatically be downloaded and installed before disappearing into THE BACKGROUND. Nearly all these tracking software work in complete stealth mode and leave behind no trace to be detected.
Once successfully installed, you are all set to steer your way through the target device. All you need to do is to sign into the online user account, using the username and password provided to you by the company. All the data from the target set flows to the company server from where it is routed to your personal account that you can access at any time and from any place, provided you have a working system and a stable internet connection.
On the Menu on the user dashboard, you will see a list of items that you can choose from and view details for their activity. Here are a few of them. Let’s explore what each of these can do for you.
This gives you a complete record of all incoming, outgoing and missed calls with the name of each sender and receiver as well as the date, time and duration of each call.
If you are interested in finding out the messages sent and received on the target device, this is for you. You can not only look into the names and numbers of senders and recipients but also read complete messages, each stamped with the date and time at which it took place. Some advanced features include retrieving old and deleted messages but are only provided by a few.
Call logs give you a general overview of who the target connects with. It reveals the identity and number of each caller and receiver, as well as the duration, date and time for each call. However, this info is not very helpful when it comes to settling your doubts or listening to the telephonic conversation itself. At such times, call recording comes in quite handy. If you want to record and download the calls for a future reference, the call recording feature lets you do that too. Additionally, some spy apps allow for blocking calls from certain numbers remotely, directly from the control panel.
Live call interception:
What if you want to catch someone red handed or save your child from a confrontation in the nick of time? A lot of apps have solved this problem by introducing the live call interception feature. Unlike call recording that gives you past records only, this feature not only gives you the real-time news but also records the conversation and send it down to your control panel.
Internet Browsing history:
Whether you are a worried parent or a concerned employee, this feature will help you take a sneak peek at the browsing habits of your kids and employees respectively. Look into the list of visited websites by checking out the internet history. You can also view the duration for which each website was accessed as well as the frequency of visit. What’s more? You can also go through the checked bookmarks to gauge what sort of stuff interests the subject the most. You can block certain websites on account of parental restriction, view Wi-Fi access points, the location from where the Wi-Fi was accessed and the type of connection that was used.
E-mails are more detailed and are used mainly for official purposes only. So if you want to know what kind of electronic mails is being exchanged right under your nose, a spy app can fulfill your wish. Monitor all incoming and outgoing emails badged with complete details of the senders, recipients, time and day for each mail. Maybe now you can finally take a breath of relief on finding out that your company secrets are safe and protected. In case otherwise, get ready for some serious action!
Smartphone and tablet owners are very fond of downloading dozens of applications on their devices. Applications can be a lot of fun but at the same time, some of them can be disguised malware and a gateway for hackers. With this innovative feature, you can remotely control what apps reside on the target phone or device. You can start, pause and stop applications, even delete them at your discretion.
With Spy apps, finding your way into the phone’s address book is no longer a figment of your imagination. Scroll through the contact list to not only retrieve name and numbers alone but any kind of information fed on the phone, pertaining to any or all users. Moreover, you can modify the contact list by adding or deleting contact numbers.
Reminders and calendar entries:
Want to see what plans the subject has in mind? What is he/she up to? Then dive into the Reminder and Calendar section to find that out. Browsing through the ‘Reminder’ section tells you what important tasks the person intends to perform in the future and the calendar entries tell you about the pre-decided stuff such as any scheduled meetings or appointments. This can give you a good idea of the person’s whereabouts and social activity to look for any signs of suspicion.
With Geo Positioning Satellites always on the watch, tracing locations no longer remain far-fetched, especially when there is an in-built GPS tracker on the spy app that you just installed on your phone or tablet. It enables you to find out the target’s current position as well as a complete record of previously visited places. Point to point surveillance is made possible by recording the routes taken, which are represented on the Google’s map for better understanding and representation. Some apps also allow you to practice ‘Geo-fencing’. This means that you can separate ‘allowed’ from ‘forbidden’ zones by sketching out an invisible boundary line on the map. Once up and running, this feature makes sure that you are always notified when the target surpasses the drawn lines.
Chat rooms are out, instant messaging applications are in! It is difficult to keep count of the numerous IM applications that have clogged the market in the past decade or so. Just imagine the difficulty of monitoring each and every app, given that they are mostly free and always exist as multiples on any person’s list of applications. Thanks to these monitoring apps, you can smoothly sail through multiple IM services simultaneously, without going through the hassle of cracking passwords and the fear of being caught. Spy on IM’s from WhatsApp, Skype, Snapchat, Viber and more. For IM services that allow for free internet calls, you can also view details of those free voice calls.
Photos and videos:
If you are worried about confidential information being leaked out or inappropriate content being watched, this is for you. Steer through multimedia files including photos, MMS, audios and video content on the target phone or device.
Camera and mic bug:
This is a highly advanced feature rolled out by certain spy-app companies such as TheOneSpy. This takes your monitoring experience to a newer level, where you can directly activate the camera and microphone on the device. By doing so, you can capture images of the target’s background and listen to ambient sounds.
In the case of loss or theft, you can use this feature to wipe out all data on your device. This saves you from the potential danger of your personal data being misused.
The uses of mobile spying applications are as diverse and numerous as is your imagination and the cause for which it is used. Although most apps proclaim to be designed solely for the purpose of child and employee monitoring, their usefulness extends way beyond that. Just make sure that if you intend to use any of these apps, it is legal to use them in your area. Be careful not to use them to snoop around on people for no good reason.
Having said this, let’s analyze a number of situations in which you might find them useful:
What kind of friends does my child have in school or college? What are their most favorite topics of discussion? Which places do they like to visit? What activities they pursue when they are together?
These and other questions of the same kind are a constant source of stress and anxiety for the parental community.
If you are a cautious parent who spends sleepless nights, worrying about your child, who craves for independence and time out, you will finally be able to take a breath of relief. You can secretly monitor your child at every level, without the need to bring up confrontations. You can bring out the lies and save your child from any potential harm by using the different features of these applications. Use the location tracker to discover the whereabouts of your child and confirm if your son/daughter is really at the place where he/she claims to be. Activate the camera and microphone bug to see for yourself who your child hangs out with and what kind of language they use in their conversations. Check out the address book on their phones to look for any new and unknown contacts. Read their instant messages to find out what kind of ideas and private details are being exchanged and whether or not a potential online predator may be reaching out to your child. Browse through their multimedia files to search for any inappropriate content that your kid might be viewing. Open up their browsing history to look out for any signs of internet misuse. Go through their call and message logs to watch out for strange calls and texts. In short, Spy apps facilitate you to take a more rounded view of monitoring child’s personal and social life. As a parent, you can also pin down any dangerous and suspicious elements closing in on your child. After all these years of concern and doubt, you would finally be able to sleep soundly.
Are you a business owner who does not believe in hovering over your employees all the time but still wants to make sure that they are doing their job well? Do you as an entrepreneur fear that loss of company time in personal pursuits may cause a decline in profits? Are you suspicious that some of your employees may be stabbing you behind your back and leaking out company secrets or business formulas to your competitors?
Is so, there is no better solution to your concerns than monitoring your employees BYOD on the devices given by the company. After all, you own the devices and the company time for which you pay your employees. No law can stop you from checking on your staff, as long as they know that they are being checked upon.
It is commonly observed that employees engage in futile activities such as random net surfing and roaming around on social media websites during office hours. What is even more surprising is that a large percentage of online shopping also occurs from 9 to 5. It is not objectionable if a person turns to such activities for a short while, so as to refresh his/her mind. But regular diversions from work can seriously affect efficiency and results in a loss of productivity and company time. Studies show that a regular person may take at least 20-25 minutes to return back to work after a habitual trip to a social media website such as Facebook. Irresponsible use of internet and downloads may also open up the company’s computers to hacking and malware. If a group of employees is going about harassing others, you as an employer should know about it so as to avoid legal consequences in the future. These and a multitude of other reasons makes it imperative for you to keep an eye on the activities of all workers as you will be ultimately responsible for their actions.
According to a survey, nearly 45 percent of companies monitor their employees’ e-mail. Of those that do, 73 percent use technology tools that automatically check e-mail content, and 40 percent hire people to manually read employee e-mail. Another 45 percent monitor phone calls and nearly half of respondents use video monitoring to counter theft, violence, and sabotage. Less than 10 percent of employers use video surveillance to track on-the-job performance. A single spy app can do all of that without going through any hassle at all. All you have to do is to install the app on the company phones before handing them over to your employees. Then sit back in your office or any place else and get a bird’s-eye view of everything going around.
Read their e-mails to see if any important company document files are being exported to a third party. Use the GPS location tracker to check out the movements of your employees on the road, especially if they have a field job and make sure that they spend the company time doing their duty not chatting away with acquaintances or dropping their kids off at school. Look for any snapshots of office files intended to be misused and vulgar multimedia files downloaded, watched and circulated amongst colleagues. Peep into the reminders and appointments to watch out for any planned hookups with your competitors. Activate the geofencing to set intangible boundaries for your employees during office hours and location tracker to see for any mysterious or unlawful activity on the road. Keep thinking and I’m sure you would come up with cleverer ways to use these applications.
Have you been feeling that your spouse has been withdrawing from the family for the last couple of months? Does he often come late with unexplained lapses of time? And mysterious warning signs that he/she might be cheating on you? Are the business trips becoming longer and more frequent? Has the workload suddenly increased and makes him/her work late into the night? Do you feel a change in his/her social and calling habits?
If so is the situation, you definitely need to take the matter into your own hands and carry out an investigation. But how? How can you find out the reasons without asking or letting him know. By calling his colleagues? Or by following him around? That would neither be feasible nor affordable. Why not download and install a spy app on your spouse’s mobile and free your mind of worries but be careful, some dating apps are stealing data.
Trace his locations to see whether he really is out of town on business or staying at a local hotel. Watch out for his/her web surfing habits and check out his conversations over social media and instant messengers. Use the camera and microphone bug to see what is he/she up to and much more.
By doing so, two of the following could possibly happen. Either your suspicions would be verified and with evidence in your hand, you would be in a better position to confront your partner or your doubts would be dissolved if your partner comes out clean and your relationship would be strengthened. It’s a win-win situation both ways.
Boyfriend/ girlfriend monitoring:
Do you suspect that your boyfriend or girlfriend may be cheating on you? Where the forward march of technology makes it easier for people to get their hands in nasty flirtations, it has also made it easier for your girl or boyfriend to catch you red handed. The easiest way to do it by using any of the spy apps readily available. Look out for any recently added contacts under fake names. Trace their real-time locations to check if your friend might be lying to you about his whereabouts. Check his incoming and outgoing call and message logs as well as complete details of his internet use, to smell a newly built affair.
Have you been robbed of your phone? Is your phone stolen? Do you think that you lost your phone at your office?
If so, what would become of the personal data on the phone? Do you fear it may be misused by the robbers? Do you want to trace the location of the robbers in the hope of getting your phone back?
Modern spy apps can help you achieve that all in one go. You can remotely wipe off all data from your device so that your loss may be minimized to the phone itself. You can trace the location of the phone if you have misplaced it, at home or at work. In case it has been stolen, the location tracker may help you trace the location of the thief itself. You can use the call and message logs to identify any accomplice and potentially help the law enforcement agencies catch the entire gang of criminals.
Backup for your phone’s data:
Are you confronted with an issue that needs your phone to be factory reset? Do you plan to sell your device and want to create a backup for your phone’s data? Why waste your energies in transferring your data to a remote system, when it can be done without making any effort?
Spy apps automatically shift data, in a periodic fashion, to the online account that the company gives you. In case you need to reset your device, just do it with your eyes closed as your data is completely protected and easily accessible from your company account, anytime and anywhere.
Do you suspect that any of your employees is involved in the viewing and distribution of pornographic content, meant to threaten or harass female co-workers? Do you think that your child is being targeted by a cyber bully? Have your suspicions finally been proved correct that your husband or girlfriend is involved in another relation?
Where Mobile spying can save you from a potential lawsuit, it can also assist you in reproducing evidential proof, if and when the need arises. Spy apps can save telephonic and conversation records. They can capture multimedia content meant to be used for wrong purposes. It is interesting that where the legal value of such applications itself remain cloudy and vague, they can help the law discern between the guilty and the innocent. They can produce content needed to prove an attempt of cyberbullying or an act of infidelity. They can help the police close in on the criminals and are therefore of much legal value.
Ever wondered why mobile spying app are proliferating so rapidly? Because the selling of this software in most countries is legal. Most of the spyware companies absolve themselves of any legal responsibilities by resting the entire responsibility of the use of spyware on the buyer. For example, an excerpt from the disclaimer of a spy company reads as follows:
“It is a federal and state offense in most countries to install monitoring/surveillance software onto a phone which you do not own or have proper authorization to install. It may also be an offense in your jurisdiction to monitor the activities of other individuals. Check all state, federal and local laws before installing any Cell Phone Spy software such as Mobile Spy. You must always notify a person they are being monitored if they are over age 18. Federal or local law governs the use of some types of software; it is the responsibility of the user to follow such laws.”
This implies that if the user complies with the laws and uses the software responsibly, it could save him/her from paying the legal cost. There would be nothing that could stop him/her to use these apps. But stop for a moment and think… If something is permissible in the eyes of the law, does it entail that it is ethical too? Not necessarily.
Ethics and Legality are two separate terms and cannot be used interchangeably. Something that is legal may not be ethical and vice versa. It may be legal for parents to spy on their kids as they are the legal guardians and can in no condition see their child in danger and distress, but is it ethical to monitor them without their consent. If you are doing something of this sort, you are probably closing the door to two-way communication with your child and planting the seed of mistrust. But if you take your child in confidence on the reasons for your monitoring and involve his/her will, then it’s a completely different story.
Obviously, it won’t be possible for you to tell your spouse or your boyfriend that you intend to spy on them or to seek their consent, but it won’t be a good idea to plan it in the first place. Everything has a day of disclosure, so why put your relation in jeopardy for the sake of satisfying your suspicions. Why to let your relation trail off to the point where you are left with no other option. Better nip the evil in the bud. There is no better way to let go of your doubts then to initiate an honest, friendly and fair conversation with your partner. Only if your partner is willing to reciprocate. Believe it or not, if it works, there is nothing more relieving. However, if you think your partner is a scumbag of lies, talking to him/her won’t solve problems at all. In such dire circumstances, ethics can be kept aside for a while. After all, everything is fair in love and war.
When it comes to tracking your employees, it is completely legal as far as they know they are being monitored. But ethics speak a slightly different language. Every grown-up has a certain expectation of privacy, even at the workplace. Nothing can stop you from declaring that all their data will be scrutinized and doing so may actually boost productivity for a while, but that may not necessarily win you the trust and respect of your workers. The ethical code of conduct teaches us how to win hearts and that can be only done if you step down to the level of your employees and show them that you trust them and how you expect them as your team, to work for the betterment of the company. It is a time-tested theory that no surveillance works better than self-surveillance. When you let their conscience take the charge and make each of them responsible for their own work, the chances of engaging in unproductive activities would automatically reduce.
Having said this, the use of spy apps is not only about being-the-bad-guy and has actually yielded benefits to the society. As far as the monitored party knows about the watching, it never hurts to modify the definition of ‘ethics’ once in a while.
Brooke fills in as tech and digital parenting expert. She mostly covers latest technology tip, tricks, and reviews of mobile spying apps, social media norms, parental control. She manages content for TheOneSpy cell phone spy app. Follow her on twitter @brookechloe78.