All Practitioners Should be Cognizant of Cell Phone Security
Aug. 24, 2009
|
By a practitioner in China
(Clearwisdom.net) I recently participated in a Fa conference, and before the conference began, a few practitioners and I removed the batteries from our cell phones. Some practitioners simply did not bring their cell phones while others took their phones to the conference, but only powered off the phones instead of removing the batteries, even though they were reminded several times to do so. After arriving, we noticed that some fellow practitioners had taken their cell phones to the conference, and left them in the room next to the conference room. Some practitioners even answered their phones during the conference.
It was pointed out several times that this situation was not right, but the relevant practitioners didn't take it seriously. This situation has occurred before, and nothing seems to have changed, even after several years. Therefore, I would like to use medium of Clearwisdom to share the importance of cell phone security with fellow practitioners.
I. Cell Phone Monitoring is Easy and Feasible
Equipment: It is very easy to monitor cell phones. The commonly seen equipment includes duplicate cards, monitoring software and monitoring machines.
Equipment Source: The equipment and software is widely available. A search on the Internet found that these products can be bought easily on all major websites. Some people even sell these items using cell phone text message advertisements. Besides the police, quite a few everyday people use these methods to monitor cell phones calls for their own purposes.
Easy Manipulation: A duplicate cell phone SIM card can be made in less than thirty minutes, and the installation of software is also very easy. For example, if someone sends you a cell phone picture and you turn on your cell phone to look at it (you may see a picture or meaningless codes), the trojan software will be installed on your cell phone, which can then be monitored whenever your cell phone number is entered in the monitoring machine.
Functions: The monitoring includes viewing messages, listening to phone conversations, and listening to the environment around the cell phone (this kind of monitoring can be started by connecting to your cell phone without ringing it, and when the phone is hung up, there is no record of a phone conversation). It can also involve determining the location of your cell phone, detecting changes made to your phone number (they can quickly detect your new phone number if you changed your phone number without changing the phone serial number), and automatically recording by connecting to your computer. The nephew of a fellow practitioner majors in electronic information specifically related to cell phones. He once performed an experiment on practitioners. He put a cell phone in one room and he used his own cell phone in another room to monitor the other cell phone. It turned out that the sound in the former room could be heard very clearly, but the people in that room were completely unaware of the monitoring. When informed, the practitioners were shocked by this result.
It is therefore imperative to maintain cell phone security.
II. The Importance of Cell Phone Security from the Perspective of Cultivators
Master has clearly said that we should pay attention to phone safety. If we do not pay attention to cell phone safety, we are not listening to Master. This is one issue.
Furthermore, think about this. If we attend a Fa conference, when Master lectures, should we be going in and out of the conference room to answer phone calls? Certainly not. Although Master is not in the conference room of the Fa conferences in China, Master's law bodies are indeed protecting the conference and taking care of all the Dafa disciples in the room, therefore every fellow practitioner joining the conference feels the compassion, peace, respect, and safety in our hearts. If we answer the phone casually, in my opinion this behavior is inappropriate toward both Master and the fellow practitioners at the conference.
August 10, 2009