{"id":3463,"date":"2024-08-19T10:30:28","date_gmt":"2024-08-19T08:30:28","guid":{"rendered":"https:\/\/www.tec4net.com\/web\/?p=3463"},"modified":"2024-08-19T14:08:16","modified_gmt":"2024-08-19T12:08:16","slug":"30640","status":"publish","type":"post","link":"https:\/\/www.tec4net.com\/web\/2024\/08\/19\/30640\/","title":{"rendered":"Smartphone-Spionage: Wie CellHawk unsere Privatsph\u00e4re bedroht"},"content":{"rendered":"<p>In einer zunehmend digitalisierten Welt hat CellHawk, eine Software des US-Unternehmens Hawk Analytics, das Potenzial, unsere Smartphones in m\u00e4chtige \u00dcberwachungsinstrumente zu verwandeln. Diese Technologie erm\u00f6glicht es Strafverfolgungsbeh\u00f6rden, Bewegungsprofile von Mobilfunknutzern \u00fcber ein Jahr hinweg in wenigen Minuten zu erstellen.<\/p>\n<p>Durch das Auswerten von Standortdaten und App-Nutzungen kann ein detailliertes digitales Abbild des Lebens einer Person entstehen. Datensch\u00fctzer warnen vor dem enormen Missbrauchspotenzial, das weit \u00fcber die Verbrechensbek\u00e4mpfung hinausgeht und sogar zur \u00dcberwachung von Dissidenten genutzt werden k\u00f6nnte.<\/p>\n<p>Quelle:<br \/>\n<a href=\"https:\/\/report24.news\/big-brother-in-der-hosentasche-wie-cellhawk-unsere-handys-zu-spionen-macht\/?feed_id=40528\">https:\/\/report24.news\/big-brother-in-der-hosentasche-wie-cellhawk-unsere-handys-zu-spionen-macht\/?feed_id=40528<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Wir sind Experten f\u00fcr Datenschutz und IT-Sicherheit<\/strong><\/p>\n<p>Profitieren Sie von unserer umfassenden Beratung zu den Themen Datenschutz und IT-Sicherheit. Unser erfahrenes Team unterst\u00fctzt Sie dabei, Ihre Website und digitalen Dienste datenschutzkonform zu gestalten um die gesetzlichen Vorgaben zu erf\u00fcllen.<\/p>\n<p>Kontaktieren Sie uns noch heute und sichern Sie sich praxisnahe Beratung zur Umsetzung der DSGVO und Normen wie ISO 27001, PCI-DSS oder TISAX.<\/p>\n<p><strong>Datenschutz und IT-Sicherheit praktikabel umsetzen &#8211; tec4net GmbH<\/strong><\/p>\n<hr \/>\n<p><a href=\"https:\/\/www.tec4net.com\">www.tec4net.com<\/a> \u2013 <a href=\"https:\/\/www.it-news-blog.com\">www.it-news-blog.com<\/a> \u2013 <a href=\"https:\/\/www.it-sachverstand.info\">www.it-sachverstand.info<\/a> \u2013 <a href=\"https:\/\/www.datenschutz-muenchen.com\">www.datenschutz-muenchen.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In einer zunehmend digitalisierten Welt hat CellHawk, eine Software des US-Unternehmens Hawk Analytics, das Potenzial, unsere Smartphones in m\u00e4chtige \u00dcberwachungsinstrumente zu verwandeln. Diese Technologie erm\u00f6glicht es Strafverfolgungsbeh\u00f6rden, Bewegungsprofile von Mobilfunknutzern \u00fcber ein Jahr hinweg in wenigen Minuten zu erstellen. Durch das Auswerten von Standortdaten und App-Nutzungen kann ein detailliertes digitales [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[1084,1082,1081,1085,1086,1080,1083],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Smartphone-Spionage: Wie CellHawk unsere Privatsph\u00e4re bedroht - tec4net<\/title>\n<meta name=\"description\" content=\"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tec4net.com\/web\/2024\/08\/19\/30640\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Smartphone-Spionage: Wie CellHawk unsere Privatsph\u00e4re bedroht - tec4net\" \/>\n<meta property=\"og:description\" content=\"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tec4net.com\/web\/2024\/08\/19\/30640\/\" \/>\n<meta property=\"og:site_name\" content=\"tec4net\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-19T08:30:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-19T12:08:16+00:00\" \/>\n<meta name=\"author\" content=\"Matthias Walter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matthias Walter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.tec4net.com\/web\/2024\/08\/19\/30640\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/2024\/08\/19\/30640\/\"},\"author\":{\"name\":\"Matthias Walter\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/eb2c0c81b5ce5b0320d91188184d409b\"},\"headline\":\"Smartphone-Spionage: Wie CellHawk unsere Privatsph\u00e4re bedroht\",\"datePublished\":\"2024-08-19T08:30:28+00:00\",\"dateModified\":\"2024-08-19T12:08:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/2024\/08\/19\/30640\/\"},\"wordCount\":184,\"publisher\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/#organization\"},\"keywords\":[\"Bewegungsprofile erstellen CellHawk\",\"CellHawk \u00dcberwachung Mobilfunkdaten\",\"ISO 27001 Audits M\u00fcnchen und Bayern\",\"Missbrauchspotenzial bei CellHawk Nutzung\",\"Mobilfunkdaten und Datenschutz Kontrolle\",\"PCI DSS Sicherheit Bayern f\u00fcr Unternehmen\",\"Strafverfolgung Datenschutz CellHawk\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tec4net.com\/web\/2024\/08\/19\/30640\/\",\"url\":\"https:\/\/www.tec4net.com\/web\/2024\/08\/19\/30640\/\",\"name\":\"Smartphone-Spionage: Wie CellHawk unsere Privatsph\u00e4re bedroht - tec4net\",\"isPartOf\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/#website\"},\"datePublished\":\"2024-08-19T08:30:28+00:00\",\"dateModified\":\"2024-08-19T12:08:16+00:00\",\"description\":\"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/2024\/08\/19\/30640\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tec4net.com\/web\/2024\/08\/19\/30640\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tec4net.com\/web\/2024\/08\/19\/30640\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/www.tec4net.com\/web\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Smartphone-Spionage: Wie CellHawk unsere Privatsph\u00e4re bedroht\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#website\",\"url\":\"https:\/\/www.tec4net.com\/web\/\",\"name\":\"tec4net\",\"description\":\"Ihr starker IT-Partner\",\"publisher\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tec4net.com\/web\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#organization\",\"name\":\"tec4net\",\"url\":\"https:\/\/www.tec4net.com\/web\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.tec4net.com\/web\/wp-content\/uploads\/2018\/12\/t4n_Logo_startseite.png\",\"contentUrl\":\"https:\/\/www.tec4net.com\/web\/wp-content\/uploads\/2018\/12\/t4n_Logo_startseite.png\",\"width\":178,\"height\":163,\"caption\":\"tec4net\"},\"image\":{\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/eb2c0c81b5ce5b0320d91188184d409b\",\"name\":\"Matthias Walter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c8945f23c3708dc375c12592ec9c9a7e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c8945f23c3708dc375c12592ec9c9a7e?s=96&d=mm&r=g\",\"caption\":\"Matthias Walter\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Smartphone-Spionage: Wie CellHawk unsere Privatsph\u00e4re bedroht - tec4net","description":"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tec4net.com\/web\/2024\/08\/19\/30640\/","og_locale":"de_DE","og_type":"article","og_title":"Smartphone-Spionage: Wie CellHawk unsere Privatsph\u00e4re bedroht - tec4net","og_description":"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003","og_url":"https:\/\/www.tec4net.com\/web\/2024\/08\/19\/30640\/","og_site_name":"tec4net","article_published_time":"2024-08-19T08:30:28+00:00","article_modified_time":"2024-08-19T12:08:16+00:00","author":"Matthias Walter","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"Matthias Walter","Gesch\u00e4tzte Lesezeit":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tec4net.com\/web\/2024\/08\/19\/30640\/#article","isPartOf":{"@id":"https:\/\/www.tec4net.com\/web\/2024\/08\/19\/30640\/"},"author":{"name":"Matthias Walter","@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/eb2c0c81b5ce5b0320d91188184d409b"},"headline":"Smartphone-Spionage: Wie CellHawk unsere Privatsph\u00e4re bedroht","datePublished":"2024-08-19T08:30:28+00:00","dateModified":"2024-08-19T12:08:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tec4net.com\/web\/2024\/08\/19\/30640\/"},"wordCount":184,"publisher":{"@id":"https:\/\/www.tec4net.com\/web\/#organization"},"keywords":["Bewegungsprofile erstellen CellHawk","CellHawk \u00dcberwachung Mobilfunkdaten","ISO 27001 Audits M\u00fcnchen und Bayern","Missbrauchspotenzial bei CellHawk Nutzung","Mobilfunkdaten und Datenschutz Kontrolle","PCI DSS Sicherheit Bayern f\u00fcr Unternehmen","Strafverfolgung Datenschutz CellHawk"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.tec4net.com\/web\/2024\/08\/19\/30640\/","url":"https:\/\/www.tec4net.com\/web\/2024\/08\/19\/30640\/","name":"Smartphone-Spionage: Wie CellHawk unsere Privatsph\u00e4re bedroht - tec4net","isPartOf":{"@id":"https:\/\/www.tec4net.com\/web\/#website"},"datePublished":"2024-08-19T08:30:28+00:00","dateModified":"2024-08-19T12:08:16+00:00","description":"Unsere IT-Experten beraten Sie im Bereich Consulting, IT-Security und Datenschutz in M\u00fcnchen | tec4net GmbH - seit 2003","breadcrumb":{"@id":"https:\/\/www.tec4net.com\/web\/2024\/08\/19\/30640\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tec4net.com\/web\/2024\/08\/19\/30640\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.tec4net.com\/web\/2024\/08\/19\/30640\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.tec4net.com\/web\/"},{"@type":"ListItem","position":2,"name":"Smartphone-Spionage: Wie CellHawk unsere Privatsph\u00e4re bedroht"}]},{"@type":"WebSite","@id":"https:\/\/www.tec4net.com\/web\/#website","url":"https:\/\/www.tec4net.com\/web\/","name":"tec4net","description":"Ihr starker IT-Partner","publisher":{"@id":"https:\/\/www.tec4net.com\/web\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tec4net.com\/web\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.tec4net.com\/web\/#organization","name":"tec4net","url":"https:\/\/www.tec4net.com\/web\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/logo\/image\/","url":"https:\/\/www.tec4net.com\/web\/wp-content\/uploads\/2018\/12\/t4n_Logo_startseite.png","contentUrl":"https:\/\/www.tec4net.com\/web\/wp-content\/uploads\/2018\/12\/t4n_Logo_startseite.png","width":178,"height":163,"caption":"tec4net"},"image":{"@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/eb2c0c81b5ce5b0320d91188184d409b","name":"Matthias Walter","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.tec4net.com\/web\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c8945f23c3708dc375c12592ec9c9a7e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c8945f23c3708dc375c12592ec9c9a7e?s=96&d=mm&r=g","caption":"Matthias Walter"}}]}},"_links":{"self":[{"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/posts\/3463"}],"collection":[{"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/comments?post=3463"}],"version-history":[{"count":1,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/posts\/3463\/revisions"}],"predecessor-version":[{"id":3464,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/posts\/3463\/revisions\/3464"}],"wp:attachment":[{"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/media?parent=3463"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/categories?post=3463"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tec4net.com\/web\/wp-json\/wp\/v2\/tags?post=3463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}