Monday, June 25, 2007

Phone Stalker

This is a horror film cliche.

Somehow, the callers have gained control of the family cell phones, Price and Kuykendall say. Messages received by the sisters include snatches of conversation overheard on cell-phone mikes, replayed and transmitted via voice mail. Phone records show many of the messages coming from Courtney’s phone, even when she’s not using it – even when it’s turned off.

Price and Kuykendall say the stalkers knew when they visited Fircrest police and sent a voice-mail message that included a portion of their conversation with a detective.

The harassment seems to center on Courtney, but it extends to her parents, her aunt Darcy and Courtney’s friends, including Taylor McKay, who lives across the street in Fircrest. Her mother, Andrea McKay, has received messages similar to those left at the Kuykendall household and cell phone bills approaching $1,000 for one month. She described one recent call: She was slicing limes in the kitchen. The stalkers left a message, saying they preferred lemons.

snip

Fircrest Police Chief John Cheesman is familiar with the case and knows the families. His department is working the case with the Tacoma Police Department and the Pierce County Sheriff’s Office, he said. The agencies filed a search warrant for the phone records, but they didn’t reveal much. Many of the calls and text messages trace back to Courtney’s phone, which the family believes has been electronically hijacked.

Cell phone technology allows remote monitoring of calls, according to the U.S. Department of Commerce. Known as a “roving bug,” it works whether a phone is on or off. FBI agents tracking organized crime have used it to monitor meetings among mobsters. Global positioning systems, installed in many cell phones, also make it possible to pinpoint a phone’s location within a few feet.

According to James M. Atkinson, a Massachusetts-based expert in counterintelligence who has advised the U.S. Congress on security issues, it’s not that hard to take remote control of a wireless phone. “You do not have to have a strong technical background for someone to do this,” he said Tuesday. “They probably have a technically gifted kid who probably is in their neighborhood.”

No comments:

Post a Comment