LCD Touch Screen Tablet with USA MapTruth be told, smart phones can have spyware downloaded to them through websites, Bluetooth connections, multi-media messages, opening attachments to e-mails or even by opening photos with secret information embedded in it!

In fact, the “smarter” the cell phones, the easier it is to hide spyware on your cell phone.

Unless you take specific steps to password protect your phone – and require the password for every call you make or take and every Internet access you make – you can be a target for cell phone spyware.

Spyware programs can collect the following information and possibly more:

  • Access to incoming and outgoing messages (phone, text, email),
  • GPS location
  • access phone calls, e-mail, text, multi-media messages and webpage histories
  • ability to listen to conversations not on the phone but in the location at any time the phone is on
  • contact data

There are forensic companies out there that say they offer cell phone forensics.  Be careful, because what they really offer is data extraction – not real cell phone hack detection.

We know, because we are 1 of only 2 or 3 labs in the entire United States that can actually extract data, detect illegal spyware and identify the phantom app made up of 2 or 3 lines of code buried deep in over 300,000 to 5000,00 lines of code in your phone. We really know how to handle cell phone spyware detection.

When we find the spyware, there’s a high probability we can find out who the bad guy is, too.

It’s nearly impossible on most phones to detect cell phone malware without the use of sophisticated software – and without the experience of a knowledgeable examiner. But that doesn’t mean you have to throw your phone away if you suspect a problem – you can come to us for help – we know cell phone forensics— inside and out.

And we can help.

-Brenda McGinley, CEO, All in Investigations, All in Investigations