Amy, If you are concerned about the stuff stored in a stolen cell phone, protection is poor, because you cannot destroy the card. You don't have the card to do that. Deactivating the card does not remove information. It doesn't matter how tight a password is, the info is still there. A so-called low-level format and rewrite of all storage bits will remove information. Short from that, A hammer IS effective. Now if you are concerned about reading cell transmissions, again there is a problem. I have seen cell phone readers. Possibly the technology has improved, but one part cannot be improved on: Time is on the side of anyone who wishes to intercept a cell call. All they have to do is record the encrypted data, which to a radio guy is trivial. It just costs equipment and $$. Decription can occur later, at a slower pace, at a pace that a computer can do it. Yes, It takes computer horsepower, but is possible. (and done everyday) In short, nothing on a cell phone is secure, short of a employing a hammer, and not saying what you don't want someone else to hear. I should mention, the same is true of computer transmissions, including WiFi, WiMAX, etc. Jim Ussailis Original Message: ----------------- From: Amy Zuckerman az at a-zinternational.com Date: Thu, 17 Dec 2009 18:13:29 -0500 To: Hidden-discuss at lists.hidden-tech.net Subject: [Hidden-tech] HUGE PR OPP - need info on protecting cell phoneCONTENT ** Be sure to fill out the survey/skills inventory in the member's area. ** If you did, we all thank you. -------------------------------------------------------------------- mail2web.com Enhanced email for the mobile individual based on Microsoft® Exchange - http://link.mail2web.com/Personal/EnhancedEmail