Yes it most certainly can be done very easily, read this:
Computer hacking technology may allow unauthorized access to a customer's wireless device. There have been recent reports in the media that these eavesdroppers can listen to calls or even nearby conversations, access text messages and other saved information on the device, e-mail, etc.
This page includes talking points and other information for customers inquiring about possibly being a victim of cell phone spying.
How Is This Done?
This is reportedly done by:
· Spyware which may have been downloaded to the device if it's been out of the owner's possession even for a short time.
· Once installed, the spyware is hidden from the user and begins to collect all available data. Once uploaded to a remote server, the person who has initiated the spyware process has access to all the information.
· Hacking into a cell phone that is connected to the Internet through a virus. Later on, the eavesdropper can remotely activate the phone even when it's not in use. It's possible that the eavesdropper can then listen and even record sounds and voices within range of the cell phone.
. By using Bluetooth technology to connect one Bluetooth enabled device to another
· Once connected to another phone via Bluetooth, it's often possible to read messages, contacts, change a profile, restore factory settings, use many of the call functions, etc.
What Are the Signs?
The customer may report someone has described details of one or more of the following:
· Details of actual phone calls.
· Details of non-call conversations.
· The actual content of text messages.
· Content of actual voicemail messages.
· Their location.
· Ingoing/outgoing call history.
· Someone has sent or forwarded messages from their number (refer to Spoofing, Phishing, and E-Mails Sent to Wrong Customer).
What Can a Customer Do?
· Do not allow their cell phone out of their possession.
· Enable the device keypad lock and periodically change the lock code.
· Enable the SIM pin lock and periodically change the code.
· Enable and periodically change the voicemail password.
· Don't leave the Bluetooth feature on all the time. Only enable it when needed.
· If the device has onboard anti-virus software, perform periodic device scans. (Motorola Q Windows Mobile has McAfee Virus Scan).
· If a customer believes someone has downloaded spy software to their device:
· Perform a master reset and master clear.
· Performing a master reset and master clear will erase all data (pictures, address book, downloaded content, etc.) and reset any user-defined settings on the device. Refer to the Device Tutorials for instructions on handset feature use and user guides.
· If incorrect lock code is entered more than 3 times (for either the device lock or SIM lock) the phone will display "ENTER PUK". If this message is displayed, the customer should contact Customer Care
· If a wrong PUK code is entered ten times in a row, the SIM card becomes invalid and the customer must purchase a new SIM card.
· AT&T cannot provide active passwords.
· The device security code is different from the SIM lock Code. It is resident to the device and does not affect the SIM card.
· If the device security code is forgotten, perform a master reset to restore the device to original factory specifications.