
Date Published:
6/10/2009
Date Added:
2/14/2012
Language:
English
Sector:
Information and communications
|
|
|
|
|
How To Understand Mobile Surveillance
This how-to guide, published by MobileActive, explains the points of entry for any mobile surveillance conversation, highlighting the potential dangers of locally stored data, network transmission of information, and other considerations such as SMS intercepts and keyloggers.
Additional Information:
Mobile devices are increasingly deployed in ICT interventions throughout the developing world. As the relevance of these new technologies increases, so too does the importance of understanding how mobile surveillance works and what security precautions should be embraced. This how-to guide explains the various points of entry for any mobile surveillance discussion, including locally stored data, network transmission of information, and other potential considerations such as SMS intercepts and keyloggers.
View document »
|
|
|
|
|
|
|