How to listen to other people's phone conversations. How to check your Android phone for wiretapping? iPhone, how to determine if my smartphone is being tapped. The phone discharges very quickly

As with the legend of triangulation, carefully mixing fiction with carefully measured doses of truth can produce a believable-looking mixture. The beauty of it will be that not a single honest and objective specialist will say “this full bullshit." Such a hybrid of truth and fiction can even be shown on TV, accompanied by interviews with representatives of leading telecom operators. "Is it true that your company cooperates with intelligence services, transmitting to them information about calls and conversations of subscribers?" the pretty presenter will ask. " We work within the framework of the law and provide the necessary assistance in solving criminal crimes,” a company representative will say. And the average person will hear what he wanted to hear: “Yes! Everything said in the program is true! You can turn on the microphone and listen to me!”

Now let's try to figure it out ourselves.

The main tenets of the legend of eavesdropping:

  1. IN any mobile equipment is initially designed to provide information about exact location subscriber (accurate to meters), recording and listening to conversations, and even in the case when mobile phone disabled (emphasis mine, quote from the first link).
  2. These capabilities can be activated by intelligence agencies or well-prepared "hackers"
  3. The phone user cannot detect the fact of listening
  4. The presence of this possibility is confirmed by quotes from experts in information security, representatives of intelligence services and government organizations.

Imagine that such an opportunity really exists and that you have become the target of an eavesdropper. Your phone's microphone picks up your conversations, and your phone transmits them...

This is where the fun begins. How and where does the phone transmit wiretapped conversations? Even the authors of articles about wiretapping do not go as far as outright nonsense in their fantasies like “the phone has an alternative voice codec that is used to encode speech, and the phone then transmits the resulting stream on a secret frequency through a separate antenna, without using base stations".

As a rule, they write that the phone makes a call to a certain number without the owner’s knowledge, after which everyone on the other side listens carefully and records it.

We will stick to this version. So, your phone makes a call (using standard GSM functions) to a certain number without your knowledge, and you don't notice it.

A number of uncomfortable questions immediately arise:

  1. Why is the fact that there is an active call not visible in the phone interface?
  2. How long will your phone battery last?
  3. what to do with characteristic interference on the speakers of surrounding radio equipment?
  4. will the call used for listening be visible in the detailed listing of your calls?

There must be some kind of answer to all these questions, otherwise such a call will go unnoticed for a maximum of a couple of minutes.

Under paragraph 1, they usually write that intelligence services or a mobile operator can remotely install software on your phone, which will Hide Everything. However, there is currently no way to transfer active content to a phone that will work with any phone and SIM card. Software in the form of a SIM-toolkit requires appropriate SIM cards, and cannot control the behavior of the phone in such a way as to hide the fact of the call. Software in the form of special Java Applications requires Java support in the phone (and articles about eavesdropping appeared long before MIDP 1.0 appeared), plus the API will not allow them to control the phone sufficiently to hide the call, and installing them will require certain manipulations on the part of the owner phone (at a minimum - open MMS/WAP-push SMS, or install the software yourself). Perhaps the situation is slightly different with applications for Series 40/60/80 OS or other smartphone OSes. But smartphones are not “all phones.”

There remains the option of remotely changing/replacing the phone's firmware. Works with any phones. Any models. Any manufacturers. In the network of any operators. To this we can only say that it makes direct sense for the intelligence services that are capable of this to retrain as mobile phone manufacturers and effortlessly survive from the market of all current players :)

Point number 2 is usually passed over in silence. However, sometimes they write that “eavesdropping can be detected by the rapidly decreasing battery charge.” Which is usually enough for a maximum of 4 hours of continuous conversation, after which the phone dies. Somehow not very suitable for round-the-clock discreet surveillance, huh?

Point number 3 is also either passed over in silence or indicated as one of the ways to notice eavesdropping. But excuse me, in our time only a completely unobservant person can be unaware of the connection between interference from the speakers of radio equipment and the operation of a mobile phone. Again, for secretive method of listening, such a “side effect” is completely unacceptable.

Point number 4 suggests that the intelligence services are in collusion with mobile operators. This agreement assumes that:

  1. The operator has nothing against the fact that his voice channels are used for listening, and he does not receive a cent for them. (We are not considering the option “secret services pay for the person being bugged”, right?)
  2. The operator excludes calls to intelligence service numbers from the detailed call printout and from all internal databases (ok, this can be done)
  3. If the listener is in the coverage area of ​​another network (or in roaming), the operator additionally bears the costs associated with roaming and interconnect.
  4. This conspiracy is valid at least for all operators in the country where the intelligence services in question operate.

Attention, question: what should be the motivation of operators for them to agree to such a conspiracy - and, moreover, a secret conspiracy?

Since it is secret, the option of “compelling it by law” is not suitable (laws are published). Since the conspiracy involves significant financial losses on the part of the operators, the motivator must be either money or fear. Fear, for obvious reasons, disappears. And the money... Can you imagine intelligence agencies paying an operator for billing modifications and costs associated with wiretapping? :)

(A small digression: I read the “Lawful interception” section in the documentation for MSC from at least three manufacturers. Everywhere they talked exclusively about monitoring and recording calls from/to specified numbers, and not a word about the mystical “remote microphone activation”, “phone diagnostic modes” and so on.)

So what do we have? Some all-powerful intelligence agencies, with the help of a staff of brilliant engineers, are developing a way to remotely change the software of any phone (note, they are developing it themselves - the intelligence services of another country will not share their developments with them). Further, these special services negotiate with all mobile operators to conceal the fact of calls to a secret number belonging to the special services. After which, they change the software of your phone and force it to make a call to a secret number. At the risk of being noticed every second by the rapid discharge of the battery and interference from nearby radio equipment, they have the ability to listen to you for about 4-5 hours (if you played into their hands and pre-charged the phone), and if you want to use GPRS, they will almost certainly have to be interrupted (rare networks and phones allow parallel support active voice channel and active GPRS session).

Sorry, but is the game worth the candle?

Let's apply Occam's razor and try to consider alternative version . Let's say you are a mafioso and you are being followed. According to a court order, your phone (the number can be easily recognized) is put on “classic” wiretapping - giving you the opportunity to listen to the calls you make or receive. In addition, they receive some other information about you in a different way (perhaps not entirely legitimate). In order to be able to use this information in court and not expose its source/method of obtaining, this information is presented as “a recording obtained from a telephone using (unnamed) special means.” In addition, in their free time, representatives of the special services in (anonymous) interviews can support the legend of wiretapping through a switched off mobile phone - just so that “everyone is afraid.”

Now compare both options and ask yourself - which one looks more plausible and (most importantly) easier to implement?

If you are not yet convinced, use the razor again, and think about the relative plausibility of these options:

  1. A young but ambitious journalist hears/reads that a high-profile arrest has been made based on a “bug” installed in a mobile phone. If you write it like that, the note will be boring and uninteresting. It would be much more interesting to write about Turning on the Microphone - then in addition to the paragraph about the arrest itself, it would be possible to write ten more, stuffed with pseudo-scientific nonsense.
  2. You are a manufacturer of "security products for mobile communications". All sorts of scramblers, additional encryptors, tin foil hats, lead cases, etc. But the problem is that your products are poorly bought. The client does not feel the need to shell out money for your inventions. You take the initiative into your own hands and place it in the media a series of articles about the non-illusory threat of Turning the Microphone on... (this is the category the first link seems to fall into).

Yes, I almost forgot - I promised to say more about quotes and links to official documents, with which this legend is often supported. Let's take the English-language article, the link to which I gave at the very beginning of the post. The article is replete with quotes. I will not analyze everything in detail, I will limit myself to the very first.

What the article says: " The FBI appears to have begun using a novel form of electronic surveillance in criminal investigations: remotely activating a mobile phone's microphone [...]. The technique is called a "roving bug," and was approved by top U.S. Department of Justice officials [...]. The surveillance technique came to light in an opinion published this week by U.S. District Judge Lewis Kaplan. take place near a suspect's cell phone. Kaplan's opinion said that the eavesdropping technique "functioned whether the phone was powered on or off."".

If you are not strong in English, I will translate. " The FBI began using new method surveillance: remote activation of a mobile phone microphone. The method is called "mobile bug" and is approved by the highest ranks of the US Department of Justice. Judge Lewis Kaplan's opinion this week brought public attention to the method. The judge made a decision. according to which the application " mobile bug" found legal because [.....]. The judge also noted that this method of eavesdropping works regardless of whether the phone is on or off".

Now let's see what is really written in this opinion: "The government applied for a "roving bug," that is, the interception of Ardito"s conversations at locations that were "not practical" to specify, as authorized by 18 U.S.C. § 2518(11)(a). Judge Jones granted the application, authorizing continued interception at the four restaurants and the installation of a listening device in Ardito's cellular telephone. The device functioned whether the phone was powered on or off, intercepting conversations within its range wherever it happened to be." (emphasis mine).

Everything turned out to be simple. The judge approved the installation of a listening device on the suspect's cell phone. There is no word about remotely turning on microphones. Below in the quoted document, the “installation” and subsequent “removal” of the listening device from the mobile phone of another suspect is also clearly mentioned.

Many jealous husbands want to know not only How to wiretap your wife's mobile phone, but what kind of wiretapping program will be effective and truly invisible on her phone after installation? Below are comprehensive answers to these and other similar questions.

So, wiretapping wife via mobile phone is a spy program that must satisfy the following three main requirements for this type of application:

Firstly, wiretapping wife's iPhone must be multifunctional, i.e. not only listen to outgoing and incoming calls, but also intercept messages, photos, media files, give the exact coordinates of its location and much more;

Secondly, wife wiretapping and surveillance program must be hidden, in other words, if the phone is wiretapped, the wife should under no circumstances know about it - this is practically the main criterion for a high-quality spy program;

And thirdly, spy program for wiretapping wife's phone should make it so that you can view all intercepted text messages, photos and more at any time convenient for you, as love correspondence in instant messengers or in social networks can occur both during working hours and late at night.

The VkurSe program is a multifunctional application for wiretapping your phone. and meets all the above requirements for spyware. The functionality of the VkurSe program includes:

  • wiretapping his wife's telephone conversations and recording them;
  • listening to ambient sound (the ability to turn on the microphone remotely);
  • receiving notifications (with the exact date) of outgoing and incoming calls, also from which phone number and to which they were made;
  • interception of messages in instant messengers and social networks (Viber, WhatsApp, Odnoklassniki and VKontakte);
  • the ability to intercept and read even those messages that will be deleted by the wife (if the program is already installed and running on her phone at that time);
  • save all data to your email or to your personal account on the website and view them at any time convenient for you;
  • save photos and media files received on your spouse’s phone to your email;
  • using the “list of wifi networks” command;
  • the ability to take screenshots of the screen at certain intervals;
  • 24-hour geolocation system (GPS), which will allow you to know exactly the location of your spouse, even if she does not answer your call;
  • detailed routing of the wife's movement in any time period and much more.

It is impossible to give here the entire list of actions that can be performed using the VkurSe program, since there are really a huge number of them. More details about the functionality of this program can be found in the “Features” tab.

Is there real hidden wiretapping of your wife's mobile phone?

The VkurSe program is one of the most hidden apps, which cannot be seen or by any signs understand that it has been installed to a simple user(professionals and hackers are not taken into account):

  • during installation WON'T have to hold your wife’s phone in your hands for a lot of time - a program to wiretap your wife is installed in a matter of minutes;
  • no way will NOT affect for the operation of the phone and its charging - the program has practically no weight;
  • Will not detected during an antivirus scan – the application is not malware;
  • Will not appears in the list of applications - the VkurSe program is installed directly into the system folder;
  • the name of the program will NOT cause your wife has absolutely no suspicions - upon registration you will be able to change the name of the program for wiretapping your wife’s phone once at your discretion for free;
  • Impossible identify the program by the icon - a standard robot of standard green color.

However, this also has its own “minus”: if Your wife wiretapped you, then you are now aware that you will not be able to “compute” our program and will be “hooked” by your wife until she deletes it herself.

How to wiretap your wife's phone?

Installing the VkurSe program is not difficult. In order to download program for wiretapping wife's phone you need to go to the “Registration and installation of the application” tab, there you will find step-by-step instruction as our program installs. You can also download wife's phone wiretapping and through the tab. To do this, go to it and click on “Consultant”, where you will receive a download link automatically.
Wiretapping your wife's phone via the Internet for free will work seven days after registration. This free weekly use of the VkurSe program will allow you to try out all its capabilities and understand whether you really need to wiretap your wife or whether it is better to trust your significant other. And without time limit program for wiretapping your wife's phone for free will give out her location around the clock.
In order to continue to have access to all functions after a week, you will need to subscribe; for this, check out the tab

Has your husband started staying late at work? Doesn't he smell like your perfume? Have you not had intimacy for a long time? Has he stopped caring for you and showing signs of attention? Perhaps he had a mistress. Some wives manage catch the traitor Red-handed. But in most cases, the unfaithful spouse skillfully covers his tracks. If direct surveillance is impossible or does not produce results, you can wiretap your husband’s mobile phone.

Almost all of us use a mobile phone every day. Parents buy cell phones for their children so that the child can always be in touch if something happens. Adults actively use mobile phones in personal and business communications. He is with you all the time, anywhere and at any time.

Today, the most popular devices are smartphones. This is a very convenient, multifunctional gadget. Smartphones support cellular communication, GPS navigation, wireless Internet, hundreds mobile applications for different purposes. If you want to listen to your husband's phone, you will need a special application.

What is this program?

Special software For mobile devices has the functions of tracking subscriber activity, detecting his location, and monitoring operations. Spy program installed directly on cellular telephone. Once activated, it does not affect the operation of the device. In this way, you can control your husband’s communications. The user will not know that his activity is under attack.

By using the service, you receive unlimited access To:

  • wiretapping;
  • interception of incoming and outgoing calls;
  • tracking location on a map;
  • exchange of data and mobile correspondence of the spouse.

Our call listening service is available anywhere in the world. After activating the application you are offered 12 hours free testing programs. This time is sometimes quite enough to confirm your suspicions about your husband’s infidelity.

The resource provides complete anonymity and privacy, as well as a high level of information security. Limited access access to account data is carried out using a personal password. The created profile is contained on a special website that supports landline and mobile version. That is, wiretapping of the husband’s phone is carried out via the Internet. This means your mobile and your spouse’s mobile must be online.

Installing the application

How to install wiretapping on my husband's phone? It is necessary to gain physical access to your husband's mobile phone. But it’s better to do this without his knowledge, otherwise all the spy games will go down the drain. It is enough to download and install the spy program through a special service. By following the instructions, you will quickly complete the activation. After this, you will be able to remotely:

  • find out who your husband communicates with;
  • where he resides;
  • what establishments he visits;
  • who is in his circle.

Install mobile spy call your husband’s phone and calm your suspicions!

Many of the methods below are legal. But not all.

As a rule, if you are not doing anything illegal or are not under suspicion, then you will not be wiretapped. But this does not eliminate the chance of wiretapping by business competitors, criminals and other ill-wishers.

Just know all this information and sleep well.

SORM

The system of operational-search activities is official, state, total wiretapping. In the Russian Federation, all telecom operators are required to install SORM on their PBXs and provide law enforcement agencies with access to user conversations and correspondence.

If the operator does not have SORM, he will not be issued a license. If he disables SORM, the license will be revoked. By the way, not only in neighboring Kazakhstan and Ukraine, but also in the USA, Great Britain and many other countries, the same system operates.

The installation of SORM is determined by the Law “On Communications”, order of the Ministry of Communications No. 2339 of August 9, 2000, order of the Ministry information technologies and Communications of the Russian Federation dated January 16, 2008 N 6 “On approval of the Requirements for telecommunication networks for carrying out operational investigative activities”, as well as a dozen other regulatory documents.

SORM includes:

  • Hardware and software that is installed by the telecom operator;
  • Remote control center, which is located at law enforcement agencies;
  • Data transmission channels, the operation of which is provided by the provider to establish communication with a remote control point.

SORM is usually divided into three generations:


Operators in the Russian Federation predominantly use SORM 2. But in practice, for 70% of companies, the system either does not work at all or works with violations.

First of all, SORM is expensive to install (and the operator must do this at his own expense according to an individual plan approved by the local FSB department). For most operators, it is easier to pay about 30 thousand rubles in fines in accordance with Part 3 of Article 14.1 of the Code of Administrative Offenses of the Russian Federation.

In addition, the operator’s SORM may conflict with FSB complexes. And because of this, it is technically impossible to record user traffic.

Operators do not control how intelligence agencies use SORM. Accordingly, they cannot prohibit listening to your specific number.

However, intelligence services formally need a court decision to wiretap. In 2016, courts of general jurisdiction issued 893.1 thousand such permits to law enforcement agencies. In 2017, their number decreased, but only slightly.

However, it doesn’t cost law enforcement officials anything to include someone’s number in a wiretapping kit as potentially suspicious. And refer to operational necessity.

In addition, the security level of SORM is often low. So there remains the possibility of unauthorized connection - unnoticed by the operator, subscriber and intelligence services.

The operators themselves can also view the history of calls, messages, and smartphone movements across base stations.

Signaling network SS7 (SS7)

SS7, OKS-7, or signaling system No. 7 is a set of signaling protocols that are used to configure PSTN and PLMN telephone exchanges around the world. Protocols use digital and analog channels to transmit control information.

Vulnerabilities in SS7 are found regularly. This allows hackers to connect to the operator's network and listen to your phone. Generally speaking, there were practically no security systems built into SS7 - it was initially believed that it was protected by default.

Typically, hackers infiltrate the SS7 network and send a Send Routing Info For SM (SRI4SM) service message through its channels. He specifies the wiretapping number as a message parameter. In reply home network sends the subscriber IMSI (International Subscriber Identity) and the address of the MSC switch that is currently serving the subscriber.

After this, the hacker sends another message - Insert Subscriber Data (ISD). This allows him to infiltrate the database and upload his address there instead of the subscriber's billing address.

When a subscriber makes a call, the switch accesses the hacker's address. As a result, a conference call is carried out with the participation of a third party (the attacker), who can listen and record everything.

You can connect to SS7 anywhere. So the Russian number may well be broken from India, China, or even from distant hot Africa. By the way, SS7 allows you to use USSD requests to intercept SMS or transfer balance.

In general, SS7 is the “mother of all holes” and the most vulnerable point mobile system. It is now used not only for wiretapping, but also to bypass two-factor authentication. In other words, to access your bank accounts and other protected profiles.

Trojan applications

This is exactly the simplest and most common method. Install the application while your partner is in the shower, or use methods social engineering to force people to follow a link is much easier than negotiating with the authorities and the FSB.

Applications allow you not only to record cell phone conversations or read SMS. They can activate the microphone and camera to secretly listen and film everything that happens around them.

The most popular Trojan of this kind is FinFisher. In 2008-2011, it was installed on the iPhone through a hole in iTunes, which Apple for some reason did not close. Brian Krebbs wrote about the vulnerability back in 2008, but everyone pretended it didn't exist.

In 2011, the Egyptian government used FinFisher during the Arab Spring. Moreover, it purchased the official version for 287 thousand euros. Shortly after this, WikiLeaks showed on video how FinFisher, FinSpy and other Gamma Group developments collect user data. And only after that Apple was forced to close the hole.

How can you be persuaded to install a spy for wiretapping? This could be an update of a popular game from a “left” catalog, an application with discounts, or a fake system update.

By the way, law enforcement agencies also use spy applications – for example, when they cannot go the official route and obtain court permission. Trojans for 0day vulnerabilities in Android and iOS are a multimillion-dollar market, products on it are in demand in many countries around the world.

Remote wiretapping

There are three options here - a mobile complex, a femtocell or a fake base station. All of them are not cheap, so the average user will not be tapped in this way. But we’ll still tell you how it works.

The mobile complex is installed at a distance of up to 300-500 m from the smartphone being monitored. A directional antenna intercepts all signals, the computer stores them and decrypts them using rainbow tables or other technologies. When the wiretapping is completed, the complex simply leaves.

The fake base station (IMSI interceptor) has a stronger signal than the real one. The smartphone sees that such a station will provide the best quality of communication, and automatically connects to it. The station intercepts all data. The size of the station is slightly larger than a laptop. It costs from $600 (handicraft) to $1500-2000 (industrial options).

By the way, fake stations often used to send spam. In China, craftsmen assemble such devices and sell them to companies that want to attract buyers. Often, fake BS is used in combat areas to misinform the military or the population.

Femtocell is a smaller device. It is not as powerful as a full-fledged communication station, but it performs the same functions. Femtocells are usually installed by companies to listen to the traffic of their employees and partners. Data is intercepted before it is sent to base stations mobile operators. But the same femtocell can be installed for spot wiretapping.

Before you think about, say, how to listen to your wife’s mobile phone, it is worth taking into account the fact that any interference in a person’s personal life is completely illegal. And it doesn’t matter who he is to you: wife, husband, sister, mother, and so on. Therefore, if you suddenly decide to seriously concern yourself with this problem, keep in mind that all the actions you take are contrary to the law.

How to wiretap a mobile phone legally?

The answer is simple - no way. Only law enforcement agencies can carry out actions to wiretap a phone, and only if they have a court order to do so. IN in this case assistance is provided to them directly by the mobile communications operator, which is obliged, according to the decision made, to provide maximum assistance to law enforcement agencies.

An ordinary person will never be able to use this service from cellular operators. Unless you find a person working in law enforcement who agrees to help you solve this problem.

Are there other options for listening to a mobile phone?

In our modern times, when, as they say, progress is advancing by leaps and bounds, there are many ways to listen to a mobile phone. One of them is the use of special equipment. Taking this option as a basis, a person who needs to obtain certain information uses special, usually very expensive equipment, thanks to which the outgoing signal from the victim’s mobile phone is intercepted on the way to the base of the cellular operator.

Although this method- the pleasure is more than expensive, it allows you to listen without making contact with the victim.

Strange MMS

It is no secret that most detective agencies employ former employees of secret intelligence services. Sometimes they reveal their secrets of how to wiretap a cell phone. This option is possible thanks to the genius of programmers or hackers. In order to use this method of eavesdropping, all you need to know is the victim's phone number. A special virus program is attached to a picture, which is sent as a regular MMS message to a specific number. As soon as the subscriber opens the message for reading, the Trojan program is quickly activated on the phone and begins its work.

Now we can talk not only about how to listen to someone else's mobile phone. This virus allows you to listen to conversations taking place outside the device. Even if the subscriber turns off the smartphone, listening will continue.

Smart phones

If we are talking about what types of listening devices exist for mobile phones, then first of all I would like to mention the device itself.

It is known for certain that there are certain models of smartphones that have built-in programs that allow not only to listen to a subscriber’s telephone conversations, but also to read all SMS correspondence, as well as listen to the surrounding environment. Of course, you won’t find such devices for free sale.

It is known that some Internet resources are actively selling listening devices and the smartphones described above in particular. If you have an idea to purchase such a phone to give to your spouse, then pay special attention to such offers. Otherwise, you risk paying 30 thousand for a regular chinese smartphone without any spyware.

Should you trust sites on the Internet?

Believe it or not, it's up to you to decide. In fact, sources that offer help in deciding how to listen to someone else's mobile phone should be treated with extreme caution. If you look closely, the cost of any wiretapping equipment is quite high. Here we are talking not only about spy phones, but also about bugs and other devices.

You may be asked to pay only part of the cost. But this amount is also very impressive, especially considering the fact that there are at least a dozen people like you.

Therefore, before you rush headlong into the adventure of purchasing super-listening devices, think carefully about whether you are ready to throw a certain amount of money down the drain. Yes, just take it and throw it away! No? Then maybe it’s not worth trying, buying who knows what and who knows who?

Malware

In fact, you can manually install a virus on your phone that will spy and send you reports on the information received. In order to understand how to wiretap a cell phone using spy software, you will need the program itself and access to the victim's phone.

Install via the Internet, activate and... listen to everything and everyone. True, for this you need to have the software itself available. But, again, be vigilant, because there are plenty of people who make money by scamming users online.

As a rule, such “craftsmen” describe the delights of this program in all colors. They offer absolutely perfect option how to wiretap the victim's mobile phone. Fraudsters justify their kindness by the fact that, for example, having once been deceived by a beloved wife or husband, they show solidarity and want to help everyone who finds themselves in such a similar situation.

What follows is usually detailed description program, instructions for use are given, detailed screenshots are provided, and then it is proposed to download the installation file itself either through a paid file hosting service, or by sending an SMS to short number. Sometimes, after downloading a program, you suddenly discover the simplest software for installing Bluetooth, for example.

In some cases, the program will download to your computer without installation file, which you will be offered to buy at a separate price.

Be carefull

In fact, when deciding how to wiretap a mobile phone, you may find yourself under surveillance. Ask yourself: do you know exactly what files you are installing on your PC? What if they contain some Trojan viruses that will subsequently steal your personal information?

It's good if you have an excellent antivirus protection. But it is known that some users simply neglect it.

When performing obviously illegal actions, think about the fact that to the question of whether a mobile phone that is in your personal use can be wiretapped, you may well receive an affirmative answer. I wonder how you would feel in such a situation? Will you be offended and outraged because you are an honest person? Think about it, perhaps the person you are planning to spy on is not doing anything immoral either. Maybe you just misunderstood something?