{"id":20344,"date":"2015-07-16T10:46:39","date_gmt":"2015-07-16T08:46:39","guid":{"rendered":"http:\/\/www.fedaiisf.it\/?p=20344"},"modified":"2015-07-16T13:48:37","modified_gmt":"2015-07-16T11:48:37","slug":"il-controllo-a-distanza-dellambiente-intorno-al-cellulare","status":"publish","type":"post","link":"https:\/\/www.fedaiisf.it\/en\/il-controllo-a-distanza-dellambiente-intorno-al-cellulare\/","title":{"rendered":"Remote control of the environment around the mobile phone or ipad"},"content":{"rendered":"<p>THE<img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" src=\"http:\/\/www.fonefunshop.co.uk\/spyphone\/interceptor_spyphone1.gif\" alt=\"\" width=\"350\" height=\"198\" \/>The &quot;spy phone&quot; is a common mobile phone or smartphone modified at the software level. It allows remote access to the main information transiting on the mobile phone: audio of calls, text of SMS messages, list of calls, telephone directory, but also <strong>ambient sound<\/strong> when the phone is not in use. It can also provide the text of Facebook and WhatsApp chats, GPS location, text of e-mails, websites visited, videos and photos taken with the mobile phone and other data.<\/p>\n<p>The most invasive function is the one that allows the &quot;Spy Phone&quot; to function as a real bug, allowing you to listen not only to the conversations made via the telephone, but also and above all those that take place AROUND it.<\/p>\n<p>THE<img loading=\"lazy\" decoding=\"async\" class=\"alignright\" src=\"http:\/\/ispyoo.com\/wp-content\/uploads\/2013\/11\/How-to-download-the-spy-phone-software-for-any-smartphone-iOS7.jpg\" alt=\"\" width=\"276\" height=\"164\" \/>nfact, while the phone is in standby, or <strong>even when it&#039;s off<\/strong>, it can still detect (and transmit) sounds and conversations taking place nearby. In practice, thanks to this software, many mobile phones can turn into a &quot;Spy Phone&quot;, which allows you to obtain complete control over the person to be monitored. Conversations, movements, SMS messages - a complete surveillance package, all in one program.<\/p>\n<p>These devices can become a dangerous tool, to collect information illegally (until now). A phone reprogramming, replacement, or delivery of a modified phone can give other people access to your phone data and the ability to listen in on all conversations around you from anywhere in the world.<\/p>\n<p>Taken from <a href=\"http:\/\/aldexnapoli.jimdo.com\/programmi-per-spiare-cellulari\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000ff;\">ELDAXNAPOLI.COM<\/span><\/a><\/p>\n<p>Related news: <span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"http:\/\/www.fedaiisf.it\/en\/lo-snami-abruzzo-vieta-luso-di-tablet-e-smartphone-agli-isf\/\" target=\"_blank\">SNAMI Abruzzo prohibits the use of tablets and smartphones for ISFs<\/a><\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Il \u201ccellulare spia\u201d \u00e8 un comune telefono cellulare o smartphone modificato a livello di software. Consente di avere a distanza le informazioni principali che transitano sul cellulare: audio delle chiamate, testo dei messaggi SMS, elenco delle chiamate, rubrica telefonica, ma anche l\u2019audio dell\u2019ambiente circostante quando il telefono non \u00e8 in uso. Inoltre pu\u00f2 fornire anche &hellip;<\/p>","protected":false},"author":4,"featured_media":20347,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16],"tags":[21],"class_list":["post-20344","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-primo-piano","tag-informatori-scientifici"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.fedaiisf.it\/en\/wp-json\/wp\/v2\/posts\/20344","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.fedaiisf.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fedaiisf.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fedaiisf.it\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fedaiisf.it\/en\/wp-json\/wp\/v2\/comments?post=20344"}],"version-history":[{"count":0,"href":"https:\/\/www.fedaiisf.it\/en\/wp-json\/wp\/v2\/posts\/20344\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fedaiisf.it\/en\/wp-json\/wp\/v2\/media\/20347"}],"wp:attachment":[{"href":"https:\/\/www.fedaiisf.it\/en\/wp-json\/wp\/v2\/media?parent=20344"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fedaiisf.it\/en\/wp-json\/wp\/v2\/categories?post=20344"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fedaiisf.it\/en\/wp-json\/wp\/v2\/tags?post=20344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}