{"id":11562,"date":"2011-07-09T13:45:18","date_gmt":"2011-07-09T13:45:18","guid":{"rendered":"https:\/\/www.techopedia.com\/definition\/cellular-phone-hacking\/"},"modified":"2011-08-18T17:21:32","modified_gmt":"2011-08-18T17:21:32","slug":"cellular-phone-hacking","status":"publish","type":"definition","link":"https:\/\/www.techopedia.com\/definition\/26355\/cellular-phone-hacking","title":{"rendered":"Cellular Phone Hacking"},"content":{"rendered":"

What Does Cellular Phone Hacking Mean?<\/span><\/h2>\n

Cellular phone hacking is a questionable practice whereby a third party gains access to an individual\u2019s cellular phone through a variety of methods. The legality of cell phone hacking is heavily dependent on who is doing the hacking. For example, law enforcement and national governments often use cell phone hacking methods to apprehend criminals and monitor dissidents. <\/p>\n

There have been many high profile instances of illegal cell phone hacking, particularly of celebrity phones. In 2007, a former journalist of the tabloid \u201cNews of the World\u201d was charged with attempting to hack the phones of royal aides. In 2011, the same tabloid came under fire for hacking the voicemail of a 13 year old girl who was missing, possibly interfering with the investigation into what eventually proved to be her murder.<\/p>\n

This term is also known as cell phone hacking, cell phone spying, phone hacking, or phreaking.<\/p>\n

Techopedia Explains Cellular Phone Hacking<\/span><\/h2>\n

Simply put, cell phone hacking occurs when someone else gets into your phone. Depending on their motives, the hacker may simply view data stored on the phone, broadcast your location or send messages to your contacts under your name. <\/p>\n

However, more serious instances of cell phone hacking involve hackers:<\/p>\n

    \n
  • Deleting data <\/li>\n
  • Adding malicious programs <\/li>\n
  • Gaining access to sensitive information like bank accounts <\/li>\n
  • Transcribing private conversations <\/li>\n
  • Storing copies of texts and emails <\/li>\n<\/ul>\n

    Common ways that a hacker gains access to your cellular phone include:<\/p>\n

      \n
    • Bluehacking – gaining access to your phone when it is a discoverable device on an unprotected Bluetooth network <\/li>\n
    • Unnoticed access to an unlocked phone left unattended in a public space <\/li>\n
    • Mimicry of a trusted network or cell phone tower <\/li>\n
    • Phone cloning by copying the SIM card of the target phone <\/li>\n
    • Malware apps that install malicious software or make changes to firmware <\/li>\n
    • Phishing via mobile optimized sites <\/li>\n
    • Fraudulent account resets using known information about the user (phone number, birth date, address and so on) <\/li>\n<\/ul>\n

      With so many methods available and more sensitive data being stored on smartphones and mobile devices, cellular phone security has become a major concern.<\/p>\n","protected":false},"excerpt":{"rendered":"

      What Does Cellular Phone Hacking Mean? Cellular phone hacking is a questionable practice whereby a third party gains access to an individual\u2019s cellular phone through a variety of methods. The legality of cell phone hacking is heavily dependent on who is doing the hacking. For example, law enforcement and national governments often use cell phone […]<\/p>\n","protected":false},"author":7813,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"_acf_changed":false,"_lmt_disableupdate":"","_lmt_disable":"","om_disable_all_campaigns":false,"footnotes":""},"definitioncat":[218,233,236,219],"class_list":["post-11562","definition","type-definition","status-publish","format-standard","hentry","definitioncat-cybersecurity","definitioncat-encryption","definitioncat-network-management","definitioncat-networks"],"acf":[],"yoast_head":"\nWhat is Cellular Phone Hacking? - Definition from Techopedia<\/title>\n<meta name=\"description\" content=\"This definition explains the meaning of Cellular Phone Hacking and why it matters.\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cellular Phone Hacking\" \/>\n<meta property=\"og:description\" content=\"This definition explains the meaning of Cellular Phone Hacking and why it matters.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techopedia.com\/definition\/26355\/cellular-phone-hacking\" \/>\n<meta property=\"og:site_name\" content=\"Techopedia\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/techopedia\/\" \/>\n<meta property=\"article:modified_time\" content=\"2011-08-18T17:21:32+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@techopedia\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.techopedia.com\/definition\/26355\/cellular-phone-hacking#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.techopedia.com\/definition\/26355\/cellular-phone-hacking\"},\"author\":{\"name\":\"Margaret Rouse\",\"@id\":\"https:\/\/www.techopedia.com\/#\/schema\/person\/f5dd538e31ee352d105b8af36c4268a5\"},\"headline\":\"Cellular Phone Hacking\",\"datePublished\":\"2011-07-09T13:45:18+00:00\",\"dateModified\":\"2011-08-18T17:21:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.techopedia.com\/definition\/26355\/cellular-phone-hacking\"},\"wordCount\":348,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.techopedia.com\/#organization\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.techopedia.com\/definition\/26355\/cellular-phone-hacking#respond\"]}],\"articleSection\":\"\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.techopedia.com\/definition\/26355\/cellular-phone-hacking\",\"url\":\"https:\/\/www.techopedia.com\/definition\/26355\/cellular-phone-hacking\",\"name\":\"What is Cellular Phone Hacking? - Definition from Techopedia\",\"isPartOf\":{\"@id\":\"https:\/\/www.techopedia.com\/#website\"},\"datePublished\":\"2011-07-09T13:45:18+00:00\",\"dateModified\":\"2011-08-18T17:21:32+00:00\",\"description\":\"This definition explains the meaning of Cellular Phone Hacking and why it matters.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.techopedia.com\/definition\/26355\/cellular-phone-hacking#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.techopedia.com\/definition\/26355\/cellular-phone-hacking\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.techopedia.com\/definition\/26355\/cellular-phone-hacking#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.techopedia.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\/\/www.techopedia.com\/topic\/4\/cybersecurity\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Term\",\"item\":\"https:\/\/www.techopedia.com\/definition\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cellular Phone Hacking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.techopedia.com\/#website\",\"url\":\"https:\/\/www.techopedia.com\/\",\"name\":\"Techopedia\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.techopedia.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.techopedia.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.techopedia.com\/#organization\",\"name\":\"Techopedia\",\"url\":\"https:\/\/www.techopedia.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techopedia.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2025\/02\/techopedia-light-logo.svg\",\"contentUrl\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2025\/02\/techopedia-light-logo.svg\",\"caption\":\"Techopedia\"},\"image\":{\"@id\":\"https:\/\/www.techopedia.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/techopedia\/\",\"https:\/\/x.com\/techopedia\",\"https:\/\/www.linkedin.com\/company\/techopedia\/\",\"https:\/\/www.youtube.com\/c\/Techopedia\"],\"publishingPrinciples\":\"https:\/\/www.techopedia.com\/about\/editorial-policy\",\"ownershipFundingInfo\":\"https:\/\/www.techopedia.com\/about\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.techopedia.com\/#\/schema\/person\/f5dd538e31ee352d105b8af36c4268a5\",\"name\":\"Margaret Rouse\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techopedia.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/margaret-rouse-headshot.jpeg\",\"contentUrl\":\"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/margaret-rouse-headshot.jpeg\",\"caption\":\"Margaret Rouse\"},\"description\":\"Margaret is an award-winning technical writer and teacher known for her ability to explain complex technical subjects to a non-technical business audience. Over the past twenty years, her IT definitions have been published by Que in an encyclopedia of technology terms and cited in articles by the New York Times, Time Magazine, USA Today, ZDNet, PC Magazine, and Discovery Magazine. She joined Techopedia in 2011. Margaret's idea of a fun day is helping IT and business professionals learn to speak each other\u2019s highly specialized languages.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/margaretrouse\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/@techdefinitions\"],\"knowsAbout\":[\"Technology Expert\"],\"url\":\"https:\/\/www.techopedia.com\/contributors\/margaret-rouse\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is Cellular Phone Hacking? - Definition from Techopedia","description":"This definition explains the meaning of Cellular Phone Hacking and why it matters.","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"Cellular Phone Hacking","og_description":"This definition explains the meaning of Cellular Phone Hacking and why it matters.","og_url":"https:\/\/www.techopedia.com\/definition\/26355\/cellular-phone-hacking","og_site_name":"Techopedia","article_publisher":"https:\/\/www.facebook.com\/techopedia\/","article_modified_time":"2011-08-18T17:21:32+00:00","twitter_card":"summary_large_image","twitter_site":"@techopedia","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.techopedia.com\/definition\/26355\/cellular-phone-hacking#article","isPartOf":{"@id":"https:\/\/www.techopedia.com\/definition\/26355\/cellular-phone-hacking"},"author":{"name":"Margaret Rouse","@id":"https:\/\/www.techopedia.com\/#\/schema\/person\/f5dd538e31ee352d105b8af36c4268a5"},"headline":"Cellular Phone Hacking","datePublished":"2011-07-09T13:45:18+00:00","dateModified":"2011-08-18T17:21:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.techopedia.com\/definition\/26355\/cellular-phone-hacking"},"wordCount":348,"commentCount":0,"publisher":{"@id":"https:\/\/www.techopedia.com\/#organization"},"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.techopedia.com\/definition\/26355\/cellular-phone-hacking#respond"]}],"articleSection":""},{"@type":"WebPage","@id":"https:\/\/www.techopedia.com\/definition\/26355\/cellular-phone-hacking","url":"https:\/\/www.techopedia.com\/definition\/26355\/cellular-phone-hacking","name":"What is Cellular Phone Hacking? - Definition from Techopedia","isPartOf":{"@id":"https:\/\/www.techopedia.com\/#website"},"datePublished":"2011-07-09T13:45:18+00:00","dateModified":"2011-08-18T17:21:32+00:00","description":"This definition explains the meaning of Cellular Phone Hacking and why it matters.","breadcrumb":{"@id":"https:\/\/www.techopedia.com\/definition\/26355\/cellular-phone-hacking#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techopedia.com\/definition\/26355\/cellular-phone-hacking"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.techopedia.com\/definition\/26355\/cellular-phone-hacking#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techopedia.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.techopedia.com\/topic\/4\/cybersecurity"},{"@type":"ListItem","position":3,"name":"Term","item":"https:\/\/www.techopedia.com\/definition"},{"@type":"ListItem","position":4,"name":"Cellular Phone Hacking"}]},{"@type":"WebSite","@id":"https:\/\/www.techopedia.com\/#website","url":"https:\/\/www.techopedia.com\/","name":"Techopedia","description":"","publisher":{"@id":"https:\/\/www.techopedia.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techopedia.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.techopedia.com\/#organization","name":"Techopedia","url":"https:\/\/www.techopedia.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techopedia.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2025\/02\/techopedia-light-logo.svg","contentUrl":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2025\/02\/techopedia-light-logo.svg","caption":"Techopedia"},"image":{"@id":"https:\/\/www.techopedia.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/techopedia\/","https:\/\/x.com\/techopedia","https:\/\/www.linkedin.com\/company\/techopedia\/","https:\/\/www.youtube.com\/c\/Techopedia"],"publishingPrinciples":"https:\/\/www.techopedia.com\/about\/editorial-policy","ownershipFundingInfo":"https:\/\/www.techopedia.com\/about"},{"@type":"Person","@id":"https:\/\/www.techopedia.com\/#\/schema\/person\/f5dd538e31ee352d105b8af36c4268a5","name":"Margaret Rouse","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techopedia.com\/#\/schema\/person\/image\/","url":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/margaret-rouse-headshot.jpeg","contentUrl":"https:\/\/www.techopedia.com\/wp-content\/uploads\/2023\/02\/margaret-rouse-headshot.jpeg","caption":"Margaret Rouse"},"description":"Margaret is an award-winning technical writer and teacher known for her ability to explain complex technical subjects to a non-technical business audience. Over the past twenty years, her IT definitions have been published by Que in an encyclopedia of technology terms and cited in articles by the New York Times, Time Magazine, USA Today, ZDNet, PC Magazine, and Discovery Magazine. She joined Techopedia in 2011. Margaret's idea of a fun day is helping IT and business professionals learn to speak each other\u2019s highly specialized languages.","sameAs":["https:\/\/www.linkedin.com\/in\/margaretrouse\/","https:\/\/x.com\/https:\/\/twitter.com\/@techdefinitions"],"knowsAbout":["Technology Expert"],"url":"https:\/\/www.techopedia.com\/contributors\/margaret-rouse"}]}},"_links":{"self":[{"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/definition\/11562","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/definition"}],"about":[{"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/types\/definition"}],"author":[{"embeddable":true,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/users\/7813"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/comments?post=11562"}],"version-history":[{"count":0,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/definition\/11562\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/media?parent=11562"}],"wp:term":[{"taxonomy":"definitioncat","embeddable":true,"href":"https:\/\/www.techopedia.com\/wp-json\/wp\/v2\/definitioncat?post=11562"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}