Government Spies on your Cell Phone-The Truth Denied


It’s nothing new that commercial spyware is being used by law enforcement and security intelligence in countries around the world. For the most part, the public accepts the strange reality of Cybercrimes as well as identity theft and public unease appears to be minimal. Conversely, this explains why the habits conducted by internet and cell phone users is generally not one of caution; that is until the dirty deed actually happens to them.  For those savvier users, it’s apparent that we worry about rogue attacks and data mining thieves who literally want to steal away our identity.  In addition, a bigger threat seems to be lurking in the underbelly of the internet.  Is the government spying on us and if they are, why? WikiLeaks  released story about how the Government Is Spying On You Through Your iPhone WikiLeaks began publishing The Spy Files   in 2011 and has consistently claimed that the government has infected thousands of computers and cell phones with malicious software and over  160 intelligence contractors in the mass surveillance industry are involved.

One of many examples of the spy malware is the FinFisher Trojan, which is government spyware that is installed via a phony iTunes update. How many of you have iTunes?  Meanwhile hundreds of thousands of cell phone users claim that not only have they found bugs in their phones (Apple & Android alike) , they can prove that they are being tracked via legal APPS.

“In my opinion, the public is being preyed upon by software developers who are aligned with the Department of Defense, lured into app stores that serve as spyware for the government. Reasons are infinitum. “  THE TRUTH DENIED

Here is a video that should explain some of the happenings around the world, detailing how some apps can be a bad idea. The front and rear cameras, microphone, text messages and phone call logs were able to be remotely accessed.

“While the app icon was visible on my phone, there is a disguised version available with the innocuous title “system framework”. Apart from the icon there were no other signs my phone was compromised.”


ABC News has chosen not to name the app used in the experiment, but it is available on the Android app store and is just one of many apps available.Using nearby Wi-Fi points and GPS data, my location could be tracked. Where I live, where I work and where I get my morning coffee was all visible.”- Reporter Elise Worthington

“I had no idea how easily my phone could be controlled remotely to see, hear and record what I said, everywhere I went and everything I did.”

“I consented to having the app downloaded and I knew I could be monitored at any time, but I wasn’t aware of exactly when I was being watched. And as I went about my usual morning routine, I soon forgot my phone was spying on me.”

“In the Netherlands, 300 police reports a week are filed for smartphone-theft.” 2.1 million Americans had phones stolen in 2013, according to a nationally representative survey conducted by the Consumer Reports National Research Center. (Another 3.1 million smartphones were lost.)”

Be sure to watch the following video entitled  Short Film: Find my Phone – Subtitled

Any questions? Check the Reddit AmA:  The short documentary ‘Find My Phone’ follows a stolen phone’s second life by means of using spyware. Although you’ll meet the person behind the theft up close and personal, the question remains: how well can you actually get to know someone when you base yourself on the information retrieved from their phone? Do you want the full story behind the film? You can contact me in order to answer all of your questions by means of an interview (I’m proficient in Dutch and English), or to invite me to a film festival. To use this video in a commercial player or in broadcasts, please email

Need Help?

To determine some of the federal investigative law enforcement agencies that may be appropriate for reporting certain kinds of crime, please refer to the following table or visit

Type of Crime Appropriate federal investigative law enforcement agencies
Computer intrusion (i.e. hacking)
Password trafficking
Counterfeiting of currency
Child Pornography or Exploitation
Child Exploitation and Internet Fraud matters that have a mail nexus
Internet fraud and SPAM
Internet harassment
Internet bomb threats
Trafficking in explosive or incendiary devices or firearms over the Internet

Do you feel that you are a product of spying or gangstalking?

Mind Control, Gang Stalking, & Implants! Testimony of James Walbert & Dr. Barrie Trower

How to Remove and RFID IMPLANT 


Roxy Lopez is a writer, investigator, radio show host, speaker, investigator of controversial issues. She is a major label recording artist, musician, singer, author and activist and public advocate. Please be sure to join her on Facebook.

This article is shared with you by kind permission of the author … please visit them and give them support,

Leave a Reply

Your email address will not be published. Required fields are marked *