cell phone tapping devices

Teenagers and Cell Phones

Here at , we pay attention.  We listen and learn and share our expertise and case example outcomes with our Clients.  It usually starts out like “I bet you haven’t heard this before” and in most cases we have.  What we haven’t heard are the thought patterns and real life situations with a teenager.  Therefore, we asked an 18 year old female granddaughter of one of our employees the importance of her phone, what she does with it, how she sets up her passwords and who she shares with.  This is what she told us: The life of an 18 year old is so drama filled and complexly effortless now that everyone has a cell phone. Just one touch of a button and you’ve blocked [...]

I Now Pronounce You Husband and Ex-Wife

Statistics claim that more people are not getting married for fear of divorce and further state that 50% of marriages end in divorce. That means that one out of every two people will find themselves in divorce court or one of two people will know someone that has gone through a divorce or going through a divorce. https://fox59.com/2016/02/12/legal-ways-to-track-a-cheater/ After the “I Do’s”, come the “I Can’t Believe He Would Do That To Me”. We hear that a lot here at . The ”I can’t believe” is always followed by financial woes. Having been left is hard; having been left with no financial security is difficult. Many times we hear how the wife has to succumb to these facts. Our Client was unaware of their finances [...]

Are You Being Victimized By Corporate Espionage?

According to a recent article on CNN, the head of the FBI’s counterintelligence division, Randall Coleman said that the bureau has seen a 53% increase in economic espionage cases. To warn and educate industry leaders, the FBI has launched a nationwide campaign. In the article, Bill Evanina, head of the National Counterintelligence and Security Center, said, “Economic security is national security.” There is growing evidence of threats from several different nations, which is part of the concern from the government agencies. Three scenarios highlight the types of situations of corporate espionage: Insider Threats. This is a situation where individuals who are familiar with the inner workings of a company or products are recruited by outside organizations. Sometimes these individuals actually “spy” on the company and [...]

Are You Aware of What You’re Leaving on That Sim Card?

The good old factory reset has done enough for you to get rid of that old phone, right? NOTHING could be less true! And that could be enough to bring your business, your marriage or your financial life down for good. Let me explain. So many people are willing to donate – or sell – their old phones when the newest version arrives on their doorstep. The cellphone expert here at knows that all he has to do is run a little sim card forensics and he can collect all sorts of data from that donated phone. And it’s not just a jumble of code, no, it’s phone numbers, names, messages and personal information. There was a blog post we stumbled across online where a [...]

Cell Phone Forensics and the Little Thumbprint

Here at we conduct a lot of mobile device forensics. We have included cellular location evidence in our findings and used cellular tower triangulation, too. Of course, cell phone spying is a continuing issue and we do a lot of cell phone hack detection and removal of the mobile spy. Wireless forensics include cell phone records analysis and cell phone tracking. We take pride in the fact that we are on the cutting edge and have so much experience that we have “seen it all.” That’s why when we read an article about a group of armed robbers on the rampage in the Cleveland area and saw how cell phone forensics were used to catch them we were not surprised. One of the robbers was [...]

Not All Office Spying is About Corporate Espionage

Many times, our clients are flabbergasted after we conduct a very confidential TSCM sweep of their offices. When TSCM services are combined with digital forensics, the findings catch them by surprise. It’s not uncommon for IT departments to be asked to monitor employee’s habits in surfing the Internet. Today with so much of the business world transacting business through the Internet, monitoring has been reduced to applying restrictions and developing Internet use policies. What Sort of Investigation? One C-level executive had a problem and contacted directly. He was a little uncertain about what he wanted. There was a female admin who was giving him some weird vibes. So much so that he went to personnel to find out where she had worked previously because he [...]

Is Using Surveillance Equipment Good or Bad?

If you watch TV at all, you hear continual references to closed circuit TV. In fact, if you spend time in the UK or other European countries you will see them everywhere. We realize that makes some people feel uneasy, but there are two sides to surveillance equipment. The Crime Prevention Side of Surveillance Equipment Not sure if I should call it crime prevention because it only seems to deter those who respect the law to begin with, but cameras can be installed inside and around public space and places of business to: Record evidence of theft and other wrongdoing such as vandalism. Authorities routinely use CC TV recordings to identify robbers and submit images to the public for help in apprehending the perpetrators. Employers [...]

Mobile Phones Recording the Best – and Worst – in People

While bullying and harassing classmates has been a long-time problem, today’s technology is not only bringing situations into the light of day, but providing evidence that is admissible in court. It’s not a “rite of passage” anymore. It is a criminal offense and can mean jail time. Last year an autistic boy in Washington, D.C. was tormented by his “friends” at knifepoint. They even made a video of the incident. Just prior to that incident, on a cold Valentine’s Day, he was lured out onto an icy lake and fell through. The “friends” didn’t go to his aid. Instead, they used their phones to make a video of it. Luckily the boy was able to save himself. With the evidence on the phones, these “friends” [...]

Investigator’s Special Tools: The Cell Phone and Cell Phone Forensics

We never like these stories, but they happen. As professionals, all of us here at know that the cell phone has become one of the most productive tools in the investigator’s toolbox. This is why forensic mobile services has exploded: Earlier in the year a nursing student went missing from school in Oklahoma. She had told family that she was coming home for a visit but she never arrived. Foul play is always on the table in these situations and parents, friends and siblings play out all the awful scenarios in their minds. After days the young woman was still missing. No sightings and no leads. But authorities had a cellphone witness – her cell phone. More precisely, they had a ping witness. Through specialized [...]

Cell Phone Forensics Narrow Search Areas – But You Can’t Delay

There is one element of cell phone forensics that the public, including some attorneys, doesn’t often think about and it is one that can make a huge difference – if CONDUCTED IN A TIMELY MANNER. When most people think of cell phone forensics, they think of mobile phone analysis or cell phone spyware detection. In most of those instances, the actual mobile device is needed and forensic cellular evidence is extracted using data mining software. However, a cell phone investigation can be the first step in uncovering critical evidence for situations other than forensics data recovery and mobile phone hack detection. A good example is how, in September, 2014, cell phone forensics helped to narrow the search area for a missing airplane in Alabama. There [...]

Go to Top