cell phone eavesdropping

Cell Phone Forensics Investigation Calls for Expertise and Experience

Cell phone investigation and cell phone forensics requires a growing body of knowledge – and experience is becoming more and more important. The main reason is the continual progress in technology advancements. One aspect is the evolution of cell phones and operating systems. As a cell phone consumer you may think there are only a few real differences between the different cell phones on the market, I mean you can get a computer that uses one of three major operating system vendors: MS Windows OS X from Apple Inc. Linux OS That does not hold true for cellular phones. There are more operating systems for cell phones than for desktop computers. The top five include: Android OS Apple iOS Blackberry OS Symbian Microsoft And even [...]

Is Your Employee’s Phone a Mobile Spy Leaking Your Business Secrets?

All you have to do is sit in a coffee shop or lunchtime dining spot to hear that sensitive business information is being discussed. It may not be about a top secret merger or a hot new product, but information about how a company does business and who their customers are is bantered about in casual discussions. And with the proliferation of ILLEGAL spyware available on the Internet, cell phone spying is becoming more and more a problem. Here at , our mobile phone forensics team is being asked to conduct cell phone spyware detection for more and more businesses. Cell phone monitoring is most often regarded as a way for someone in a relationship to keep tabs on their partner, or in a stalking [...]

Turn it Off and Stash it in a Drawer to Prevent Cell Phone Spying

My friend recently had a meeting with her attorney. I don’t know what they needed to discuss – we never talked about that. We did talk about the Cell Phone Policy her attorney had adopted and required everyone in the office – including clients – to adhere to. Because of the escalating incidence of cell phone surveillance and cell phone spying, the firm adopted the policy. Every cell phone that came into the office had to be turned off and left locked in a designated cabinet during all visits and consultations. No active cell phone moved past the receptionist’s desk. Here at we understand why the legal firm has taken the stand. We see the increase in mobile device forensics brought on by the ease [...]

Would a Bug Sweep of your Business Uncover any Spy Equipment?

Just like an average citizen might ask who would want anything from them enough to take the time to engage in cell phone tapping, businesses across the nation might ask who would install eavesdropping devices or engage in electronic surveillance in their organizations. The answer is evident in a report from the National Counterintelligence Executive (NCIX). The report says that foreign spies account for economic espionage costing “the United States economy as much as $400 billion or more per year.” Some say that is grossly understated. Now that’s BIG BUSINESS – and not the kind U.S. business wants to see. Is your business being targeted? Corporate secrets and intellectual property are highly valued by competitors and years of research and development could be wiped out [...]

Technical Surveillance Countermeasures (TSCM) provides security – in more ways than one!

Many companies have Intellectual Property Protection insurance for protection. But insurance is only good after a theft or breach of confidential or proprietary information. Wouldn’t it be a better idea to prevent a loss before it happens? When a business hires to do a bug sweep, or more precisely, TSCM, it’s because they want to be proactive and protect proprietary corporate information from being leaked or lost. The TSCM process includes acting as a bug detector, revealing eavesdropping devices and spy equipment. But the actual bug detection services do much more. The benefits to a company or organization are much broader: Protection of damage to income and profits Continued viability of business strategy and processes Security of intellectual property Privacy, both corporate and personal is [...]

TSCM Ensures a Gift is Sincere, Not an Eavesdropping Device

With the door to technology wide open, some people think the days of phone tapping and other spy listening devices are over. They think that all covert surveillance is computer surveillance or cell phone tapping. Let me be the first to tell you, that’s not true – in the least. The stereotypical covert operation to plant eavesdropping devices still happens, but spy equipment could just as easily be carried into your offices in the hands of a presumed “friend.” A great example is a comment I caught in an article I was recently reading about gifts that business people receive. The caution was to beware of gifts from business associates or acquaintances of items that you would keep in your office – something framed or [...]

Cell Phone Spying is Infiltrating Daily Life of the Average Citizen

Whether you like Anderson Cooper or not, he is part of the mainstream media and the topics he covers are often timely and informative. He had two women on his television program in the fall who revealed their husbands had spied on them through their cell phones. The incidence of cell phone spying has grown and infiltrated the daily lives of average citizens in situations like the women on Cooper’s television show. Cell phone eavesdropping is accomplished through the installation of software directly onto the device. That can happen simply through the opening of an email or an image – and, in the case of these ladies, getting an email or text from your husband would not send up any red flags. Cellular forensics or [...]

Either Way, Cell Phone Forensics Uncovers the Facts

I recently wrote about computer rental retailers that were caught illegally watching lessees’ activities and gathering data through computer monitoring software meant to keep track of rented computers. That sort of monitoring is illegal, but there is another type of monitoring that may fall into a gray area. Parents are monitoring their children’s cell phone activities. There is a long discussion of the issue in an article on Laptopmap.com. It begins: “Privacy ends where safety begins,” said Marje Monroe, a clinical social worker, educator and co-founder of ChildrenOnline.org. She consults with schools across the country to help students and parents cope with the dizzying world of social networking, cyberbullying and smartphones. There are all the conversations taking place about the line between personal information and [...]

Cell Phone Spying is Illegal in the United States

There is one more reason to be glad you reside in the United States – cell phone spyware is illegal here. With the release of the Apple iPhone5 in Australia, cries can be heard about the “potential tsunami of privacy breaches” according to an article at news.com.au. The article quotes senior lecturer of Internet law at QUT Peter Black who says that “It is not uncommon for the law to lag behind technology in the sense that technology evolves very rapidly.” While that is somewhat obvious because of the nature of technology and the nature of legislation, here at , we know that the proliferation of cell phone spying is growing and become much more common. Some think it is a good way to catch [...]

Cellular Location Evidence Requires Expert Analysis

The use of cellular forensics has become a real tool for many attorneys and their clients – on both the defense and the prosecution sides of the courtroom. Although we conduct mobile device forensics or mobile phone hack detection for clients suspecting cell phone spying, we also conduct investigations using cellphone records and mobile phone tracking techniques. The complexity of cell tower tracking has grown exponentially with the number of cell phone being used today. In fact, cell tower triangulation for cellphone tracking or for locating cellular location is pretty much a misnomer. Cellphone experts say that there is no cellular tower triangulation because cell phone signals bounce from tower to tower depending not only on geographic location, but also the volume of signals in [...]

Go to Top