FCC Upholds $7000 Forfeiture Order to California CB Operator

From: Roger at Bugsweeps <bugs..._at_earthlink.net>
Date: Sun, 5 Aug 2012 18:39:10 -0600

>From - Sat Mar 02 00:57:23 2024
Received: by 10.224.28.144 with SMTP id m16mr102819qac.10.1295637534721;
        Fri, 21 Jan 2011 11:18:54 -0800 (PST)
X-BeenThere: tscm-l2006_at_googlegroups.com
Received: by 10.224.176.70 with SMTP id bd6ls369018qab.5.p; Fri, 21 Jan 2011
 11:18:47 -0800 (PST)
Received: by 10.224.28.148 with SMTP id m20mr101305qac.16.1295637527528;
        Fri, 21 Jan 2011 11:18:47 -0800 (PST)
Received: by 10.224.28.148 with SMTP id m20mr101304qac.16.1295637527485;
        Fri, 21 Jan 2011 11:18:47 -0800 (PST)
Return-Path: <mit..._at_tscmusa.com>
Received: from qmta02.westchester.pa.mail.comcast.net (qmta02.westchester.pa.mail.comcast.net [76.96.62.24])
        by gmr-mx.google.com with ESMTP id l11si2232654qcg.0.2011.01.21.11.18.47;
        Fri, 21 Jan 2011 11:18:47 -0800 (PST)
Received-SPF: softfail (google.com: domain of transitioning mit..._at_tscmusa.com does not designate 76.96.62.24 as permitted sender) client-ip=76.96.62.24;
Authentication-Results: gmr-mx.google.com; spf=softfail (google.com: domain of transitioning mit..._at_tscmusa.com does not designate 76.96.62.24 as permitted sender) smtp.mail=mit..._at_tscmusa.com
Received: from omta09.westchester.pa.mail.comcast.net ([76.96.62.20])
        by qmta02.westchester.pa.mail.comcast.net with comcast
        id yKFG1f00B0SCNGk52KJoM7; Fri, 21 Jan 2011 19:18:48 +0000
Received: from TSCMPC ([68.53.112.91])
        by omta09.westchester.pa.mail.comcast.net with comcast
        id yKJm1f00P1yNDRQ3VKJnXo; Fri, 21 Jan 2011 19:18:47 +0000
From: "TSCM/SO Group" <mit..._at_tscmusa.com>
To: <infogu..._at_yahoogroups.com>
Subject: remote spyware installation on cell phones
Date: Fri, 21 Jan 2011 13:18:41 -0600
Message-ID: <001801cbb9a0$04014890$0c03d9b0$_at_com>
MIME-Version: 1.0
Content-Type: multipart/alternative;
        boundary="----=_NextPart_000_0019_01CBB96D.B966D890"
X-Mailer: Microsoft Office Outlook 12.0
Thread-Index: Acu5oANORrZ7Z7J5Tb2KQ4xblTBd8g==
Content-Language: en-us

------=_NextPart_000_0019_01CBB96D.B966D890
Content-Type: text/plain;
        charset="us-ascii"
Content-Transfer-Encoding: 7bit

Part of a post I received,always subject to debate,but informative fwiw...

>> Question #1: Can you install spy phone software remotely?

 

In other words, must I have physical access to the cell phone I want to spy
on?

 

The quick answer is NO.

 

You cannot install spy phone software remotely, and you MUST have physical
access to the phone. There is absolutely NO WAY around this.

 

Not a single spy phone vendor on the market today, is selling any type of
spy phone software that has remote installation. I've actually spoken to a
few of them, and they've told me that although it's technically possible,
they would never develop it. There is just too much opportunity for abuse.
Not to mention the legal ramifications that a spy phone vendor would incur.

 

So what should you do if you cannot get physical access to the target phone?
Definitely don't waste your money on any type of spy phone software. I
repeat, DO NOT WASTE YOUR MONEY. I know there are few sites out there
claiming that you can remotely install spy phone software, or use other
technologies such as Bluetooth. Do not believe what they advertise. If you
do, its your loss. There is also an email scam going around selling spy
phone software that says you can install it remotely. The product is called
the MMS Phone Interceptor and it was reported by Symantic as one of the top
spam threats in August 09.

 

So what should you do?

 

My recommendation is that you either find a way to get access to the target
phone, or....

 

1) Purchase A New Cell Phone.

 

If you cannot get access to the target's cell phone, then what you can do is
purchase a compatible cell phone, install the spy phone software, then give
to your target as a gift. This will enable you to not only get the software
in the hands of your target, but most importantly, you'll be able to take
all the time you need installing the software and making sure it works
properly, versus trying to do it in a few minutes while your target is not
near their phone.

 

2) Look For Alternate Ways To Spy On Your Target

 

For example, what two technology items are most used today? I'd say cell
phones and computers. Which means, if you can't get access to one, go for
the other one. Any google search for "PC Spy Software" will turn up at least
40-50 different PC Spy vendors. The one I recommend is Sniper Spy
(www.sniperspypc.com).

 

I'm a huge fan of Sniper Spy because I have yet to find any other PC Spy
software that can compete feature by feature. This is not a Sniper Spy
review, but I do want to mention that Sniper Spy has remote installation, it
records keystrokes, takes screenshots of the remote PC, uploads the logs to
a secure remote server, and best of all, has LIVE PC monitoring. This means
you can actually monitor a PC in real time.

 

Other options include Google's new Latitude application which allows you to
track the movements of a person using Google Maps. However, they will have
to 'opt in' to being tracked, so if you want to do this secretly, there is
always GPS devices you can place on or in their car. You can also find out
who they call most often via looking at their cell phone records (if you
have access to them), and then do a reverse cell phone look up using many of
the reverse cell phone look up services such as www.cellphonesnoop.com.

 

 

In summary, now you know that no matter what you read online, there

is no way to install spy phone software remotely, so you will have to

find other ways to get the information you want. Remember, DO NOT

WASTE YOUR MONEY on spy phone software that claims you can install

it remotely.

 

 

Mitch Davis

TSCM/Special Operations Group Inc.

20 Music Square West,Suite 208

Nashville, TN. 37203 USA

615.251.0441

Fax 615.523.0300

www.tscmusa.com

***********************************

"Maintaining a higher degree of excellence"

*****************************************

 


------=_NextPart_000_0019_01CBB96D.B966D890
Content-Type: text/html;
        charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40"><head><META HTTP-EQUIV=3D"Content-Type" CONTENT=
=3D"text/html; charset=3Dus-ascii"><meta name=3DGenerator content=3D"Micros=
oft Word 12 (filtered medium)"><style><!--
/* Font Definitions */
_at_font-face
=09{font-family:"Cambria Math";
=09panose-1:2 4 5 3 5 4 6 3 2 4;}
_at_font-face
=09{font-family:Calibri;
=09panose-1:2 15 5 2 2 2 4 3 2 4;}
_at_font-face
=09{font-family:Tahoma;
=09panose-1:2 11 6 4 3 5 4 4 2 4;}
_at_font-face
=09{font-family:Consolas;
=09panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
=09{margin:0in;
=09margin-bottom:.0001pt;
=09font-size:11.0pt;
=09font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
=09{mso-style-priority:99;
=09color:blue;
=09text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
=09{mso-style-priority:99;
=09color:purple;
=09text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
=09{mso-style-priority:99;
=09mso-style-link:"Plain Text Char";
=09margin:0in;
=09margin-bottom:.0001pt;
=09font-size:10.5pt;
=09font-family:Consolas;}
span.EmailStyle17
=09{mso-style-type:personal-compose;
=09font-family:"Calibri","sans-serif";
=09color:windowtext;}
span.PlainTextChar
=09{mso-style-name:"Plain Text Char";
=09mso-style-priority:99;
=09mso-style-link:"Plain Text";
=09font-family:Consolas;}
.MsoChpDefault
=09{mso-style-type:export-only;}
_at_page WordSection1
=09{size:8.5in 11.0in;
=09margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
=09{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue vli=
nk=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal>Part of a post I=
 received,always subject to debate,but informative fwiw&#8230;&#8230;.<o:p>=
</o:p></p><p class=3DMsoPlainText>&gt;&gt; Question #1: Can you install spy=
 phone software remotely? <o:p></o:p></p><p class=3DMsoPlainText><o:p>&nbsp=
;</o:p></p><p class=3DMsoPlainText>In other words, must I have physical acc=
ess to the cell phone I want to spy on?<o:p></o:p></p><p class=3DMsoPlainTe=
xt><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>The quick answer is NO. <o:=
p></o:p></p><p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlai=
nText>You cannot install spy phone software remotely, and you MUST have phy=
sical access to the phone. There is absolutely NO WAY around this.<o:p></o:=
p></p><p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>=
Not a single spy phone vendor on the market today, is selling any type of s=
py phone software that has remote installation. I've actually spoken to a f=
ew of them, and they've told me that although it's technically possible, th=
ey would never develop it. There is just too much opportunity for abuse. No=
t to mention the legal ramifications that a spy phone vendor would incur.<o=
:p></o:p></p><p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPla=
inText>So what should you do if you cannot get physical access to the targe=
t phone? Definitely don't waste your money on any type of spy phone softwar=
e. I repeat, DO NOT WASTE YOUR MONEY. I know there are few sites out there =
claiming that you can remotely install spy phone software, or use other tec=
hnologies such as Bluetooth. Do not believe what they advertise. If you do,=
 its your loss.&nbsp; There is also an email scam going around selling spy =
phone software that says you can install it remotely. The product is called=
 the MMS Phone Interceptor and it was reported by Symantic as one of the to=
p spam threats in August 09.<o:p></o:p></p><p class=3DMsoPlainText><o:p>&nb=
sp;</o:p></p><p class=3DMsoPlainText>So what should you do?<o:p></o:p></p><=
p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>My reco=
mmendation is that you either find a way to get access to the target phone,=
 or....<o:p></o:p></p><p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=
=3DMsoPlainText>1) Purchase A New Cell Phone. <o:p></o:p></p><p class=3DMso=
PlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>If you cannot get ac=
cess to the target's cell phone, then what you can do is purchase a compati=
ble cell phone, install the spy phone software, then give to your target as=
 a gift. This will enable you to not only get the software in the hands of =
your target, but most importantly, you'll be able to take all the time you =
need installing the software and making sure it works properly, versus tryi=
ng to do it in a few minutes while your target is not near their phone.<o:p=
></o:p></p><p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlain=
Text>2) Look For Alternate Ways To Spy On Your Target <o:p></o:p></p><p cla=
ss=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>For example,=
 what two technology items are most used today? I'd say cell phones and com=
puters. Which means, if you can't get access to one, go for the other one. =
Any google search for &quot;PC Spy Software&quot; will turn up at least 40-=
50 different PC Spy vendors. The one I recommend is Sniper Spy (<a href=3D"=
http://www.sniperspypc.com">www.sniperspypc.com</a>). <o:p></o:p></p><p cla=
ss=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>I'm a huge f=
an of Sniper Spy because I have yet to find any other PC Spy software that =
can compete feature by feature. This is not a Sniper Spy review, but I do w=
ant to mention that Sniper Spy has remote installation, it records keystrok=
es, takes screenshots of the remote PC, uploads the logs to a secure remote=
 server, and best of all, has LIVE PC monitoring. This means you can actual=
ly monitor a PC in real time. <o:p></o:p></p><p class=3DMsoPlainText><o:p>&=
nbsp;</o:p></p><p class=3DMsoPlainText>Other options include Google's new L=
atitude application which allows you to track the movements of a person usi=
ng Google Maps. However, they will have to 'opt in' to being tracked, so if=
 you want to do this secretly, there is always GPS devices you can place on=
 or in their car. You can also find out who they call most often via lookin=
g at their cell phone records (if you have access to them), and then do a r=
everse cell phone look up using many of the reverse cell phone look up serv=
ices such as <a href=3D"http://www.cellphonesnoop.com">www.cellphonesnoop.c=
om</a>.<o:p></o:p></p><p class=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=
=3DMsoPlainText><o:p>&nbsp;</o:p></p><p class=3DMsoPlainText>In summary, no=
w you know that no matter what you read online, there <o:p></o:p></p><p cla=
ss=3DMsoPlainText>is no way to install spy phone software remotely, so you =
will have to <o:p></o:p></p><p class=3DMsoPlainText>find other ways to get =
the information you want. Remember, DO NOT<o:p></o:p></p><p class=3DMsoPlai=
nText>WASTE YOUR MONEY on spy phone software that claims you can install<o:=
p></o:p></p><p class=3DMsoPlainText>it remotely. <o:p></o:p></p><p class=3D=
MsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p=
 class=3DMsoNormal style=3D'mso-line-height-alt:8.0pt'><b><span style=3D'fo=
nt-size:12.0pt;font-family:"Tahoma","sans-serif"'>Mitch Davis<o:p></o:p></s=
pan></b></p><p class=3DMsoNormal style=3D'mso-line-height-alt:8.0pt'><b><sp=
an style=3D'font-size:12.0pt;font-family:"Tahoma","sans-serif"'>TSCM/Specia=
l Operations Group Inc.<o:p></o:p></span></b></p><p class=3DMsoNormal style=
=3D'mso-line-height-alt:8.0pt'><span style=3D'font-size:12.0pt;font-family:=
"Tahoma","sans-serif"'>20 Music Square West,Suite 208 <o:p></o:p></span></p=
><p class=3DMsoNormal style=3D'mso-line-height-alt:8.0pt'><span style=3D'fo=
nt-size:12.0pt;font-family:"Tahoma","sans-serif"'>Nashville, TN. 37203 USA<=
o:p></o:p></span></p><p class=3DMsoNormal style=3D'mso-line-height-alt:8.0p=
t'><span style=3D'font-size:12.0pt;font-family:"Tahoma","sans-serif"'>615.2=
51.0441<o:p></o:p></span></p><p class=3DMsoNormal style=3D'mso-line-height-=
alt:8.0pt'><span style=3D'font-size:12.0pt;font-family:"Tahoma","sans-serif=
"'>Fax 615.523.0300<o:p></o:p></span></p><p class=3DMsoNormal style=3D'mso-=
line-height-alt:8.0pt'><span style=3D'font-size:12.0pt;font-family:"Tahoma"=
,"sans-serif"'>www.tscmusa.com<o:p></o:p></span></p><p class=3DMsoNormal st=
yle=3D'mso-line-height-alt:8.0pt'><span style=3D'font-size:9.0pt;font-famil=
y:"Tahoma","sans-serif"'>***********************************<o:p></o:p></sp=
an></p><p class=3DMsoNormal style=3D'mso-line-height-alt:8.0pt'><span style=
=3D'font-size:9.0pt;font-family:"Arial","sans-serif"'>&quot;Maintaining a h=
igher degree of excellence&quot;</span><span style=3D'font-size:9.0pt;font-=
family:"Tahoma","sans-serif"'><o:p></o:p></span></p><p class=3DMsoNormal><s=
pan style=3D'font-size:8.0pt'>*****************************************<o:p=
></o:p></span></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></body></=
html>
------=_NextPart_000_0019_01CBB96D.B966D890--
Received on Sat Mar 02 2024 - 00:57:23 CST

This archive was generated by hypermail 2.3.0 : Sat Mar 02 2024 - 01:11:45 CST