28.05.2023 Views

The-art-of-invisibility-_-the-world’s-most-famous-hacker-teaches-you-how-to-be-safe-in-the-age-of-Bi

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CHAPTER FOUR

If You Don’t Encrypt, You’re Unequipped

If someone were to pick up yyour unlocked cell phone right now,

that person could gain access to yyour e-mail, yyour Facebook account, and

perhaps even yyour Amazon account. On our mobile devices, we no longer

log in individuallyy to services, as we do on our laptops and desktops; we

have mobile apps, and, once we’re logged in, theyy remain open. Besides

yyour photos and yyour music, there are other unique features on yyour cell

phone, such as SMS text messages. These, too, become exposed if someone

gains phyysical access to yyour unlocked mobile device.

Consider this: in 2009 Daniel Lee of Longview, Washington, was

arrested on suspicion of selling drugs. 1 While he was in custodyy the police

went through his non-password-protected cell phone and immediatelyy

discovered several drug-related text messages. One such thread was from an

individual called Z-Jon.

It read, “I’ve got a hundred and thirtyy for the one-sixtyy I owe yyou from

last night.” According to court testimonyy, the Longview police didn’t just

read Z-Jon’s messages to Lee, theyy also activelyy responded, arranging their

own drug deal. Posing as Lee, the police sent Z-Jon a text message in replyy,

asking him if he “needed more.” Z-Jon responded, “Yeah, that would be

cool.” When Z-Jon (whose real name is Jonathan Roden) showed up for

that meeting, the Longview police arrested him for attempted heroin

possession.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!