cell phone spyware

No One is Ever Going to Hear My Conversations, Or are They?

Social Media: There are so many ways to communicate with social media, but if you break it down, your communication is either by word of mouth or the written word (picture). When you verbally communicate, your message is delivered and heard, then responded to or ignored, but you know right then whether your point was taken or rejected.

In the written form, usually by e-mail, text, or some form of social media, it is derived from a device, a cell phone, a tablet, a laptop or a tower computer. Your personal information is stored in these devices, and sometimes the cloud…and no matter what you write, text, post somebody somewhere that you don’t even know may have access it. That’s the chance we take when [...]

Insurance Beneficiaries and Forensics Data Recovery

Insurance Companies and Law Firms deal with very controversial subject matters.  And usually when we are asked to conduct an Investigation for an Insurance Company, we can be assured there is an attorney on the other side.

We were contacted by a Major Insurance Company regarding an apparent suicide, the coroner and the police department both stated the insured committed suicide, but yet the family couldn’t believe he would take his own life.  There was just too much, they felt, he had to live for.  There was no suicide note, no indication that he was depressed and he was supposed to announce his engagement in less than a week.  He and his girlfriend had recently returned from a Caribbean vacation and become engaged during the [...]

  • Permalink Gallery

    Cell Phones Are Compact Computers with the ability to be “Hacked”

Cell Phones Are Compact Computers with the ability to be “Hacked”

Remember when your “Mobile Phone” was in a case as big as a small brief case and each call cost you a couple of dollars per minute and not cents? You were among a very elite if you had a “Mobile Phone” back in the day. Today, it is reported that more than 91% of adults in a survey of over 2,500 people own cell phones. They are replacing landlines, GPS Devices and tablets and many times every member in the family is linked to their own cellular device. A cell phone allows the user to make calls, send text message and emails, surf the web, schedule to wake you up, remind you of appointments and even goggle answers to questions when in a [...]

Can Spyware Be Installed On My Cell Phone Wirelessly?

Here at International Investigators, we routinely get asked about cellular malware and how it is installed. One of the most common questions is if cell phone spyware can be installed on a cellular device Can Spyware Be Installed On My Cell Phone Wirelessly?

Wirelessly. The answer: YES. So, how does one go about installing malware on a phone if they don’t have physical access? Well, there are several ways this can be done and one of which is an IMSI catcher. The police and some of the big three letter spooky agencies use commercially manufactured IMSI catchers such as the Stingray which is built by the Harris Corporation. We won’t get into the actual capabilities of the Stingray as there are legal ramifications in doing [...]