cell phone tapping devices

Use of Cell Phone Spyware by Stalkers Growing

Although often marketed under the guise of keeping track of employees’ whereabouts, cell phone tracking software is much more than a GPS. And the software is often misused and takes advantage of the most vulnerable. In fact, stalkers have taken their actions to a whole new, frightening level turning a device that is seen as a life line into a cell phone spy. Cell phone monitoring using malware software can be installed in a matter of a few minutes and the victim can be completely unaware anything is different with their cell phone. Domestic abuse advocates and shelters place cell phones on the top of the list when working with victims. One of the first suggestions they make is turning the phone off, removing the [...]

Not Even the Experts You Hire Can Catch Everything

In today's world, there is a lot of room for expertise. At , our expertise involves tracking down the truth and gathering facts to prove it. We do this confidentially and use highly sophisticated technology-based databases. Your expertise might also be in a specialized area. But the point is that we can't all be experts in all areas. For example, many business owners don't know everything there is to know about computers. That skill isn't a prerequisite to business ownership and is a big relief for many. Lots of company owners simply hire IT people to take care of everything related to computers. They don't worry about what they don't know since they are paying someone else to know. Much of the time, that strategy [...]

Advanced Persistent Threat Threatens Digital Security

The worry over security is at its highest level in history. Corporations and manufacturers have full-time staff and departments fighting to eliminate vulnerabilities and safeguard company secrets and information. Some organizations conduct regularly scheduled computer forensic analysis on employee’s business devices. Forensics consultants are on retainer and computer forensic services are a line item on the budget. Likewise, company issued cell phones are collected and routine mobile phone hack detection and mobile phone spyware detection are conducted. While employees might take advantage of a vulnerability in the system, companies are also concerned with security breaches that are unknown to employees such as spyware being uploaded inadvertently by an employee. The idea of corporate espionage mostly conjures up visions of covert operations to STEAL something – [...]

Cell Phone Forensics Creates Timeline to Prove Innocence

The smart cell phone is becoming one of the most influential producers of evidence for authorities. has been on the forefront of cell phone forensics since the beginning. As cellular forensics evolves, we stay in step with developments. Locating cellular locations and turning cellular tower triangulation into forensic cellular evidence has become more commonplace and almost a routine in many investigations. Mobile phone analysis to extract data including emails, instant messages and text messages provides evidence, too. The evolution of the technology has continued and now, much of the information in a phone is also stored “on the cloud.” Forensic data analysis by a computer forensic specialist using data extraction software and protocol can produce evidence that is court-worthy. It’s also true that many phones [...]

Investigators Save New Business

You might be surprised how many small business owners’ attorneys contact . It’s not just the multi-million dollar enterprises who have to be on guard against corporate espionage and theft by employees. Take this case, for example: When Mitch and his business partners moved from the West Coast to open a second decorative concrete business in the Midwest, they obviously hoped the new venture would be as successful as the first. But none of them were prepared with just how quickly the business grew. Mitch's finishing techniques were unlike any others. The “wow” factor was immediate. Suddenly the new business was the hot topic among many well-known developers and architects. But that instant popularity prompted jealously among competitors. Unidentified concrete businesses seemed to be trying [...]

Business Espionage is Not Limited to High Tech and Multi-Million Dollar Firms

When people think corporate espionage, they think high-tech and industrial secrets. They don’t realize that corporate espionage includes any product, service or client list that a company has to make money. Everything from chocolate recipes to online marketing techniques can be the subject of business espionage. Here’s a case from the International Investigator files as an example: While attending design school in England, Beth befriended another student, Miguel. They made an elaborate plan to open a business together once they graduated. While Miguel returned to his native Peru to wait for a visa, Beth returned to her native Florida and accepted a job with an already-established designer. After Miguel's visa was granted and he arrived in Miami, he backed out of the plan with Beth [...]

Veteran Private Investigator Rides the Cutting Edge of Cyber Sleuthing

In a recent article in the Indianapolis Business Journal, CEO, Brenda McGinley explains what it means to be on the cutting edge of investigative work in the new millennium. Cyber sleuthing, something that didn’t even exist two decades ago is one of the fasting growing areas of investigation. Spying has gone digital through cell phones and computers. And, the spy doesn’t have to be anywhere near the subject. The news reveals that governments and big business have even been accused of spying on each other through the covert installation of spyware on computers and cell phones. But digital spying is not limited to the wealthy or the deep pockets of government and business. No, individuals are getting in the game, too, by purchasing illegal spyware [...]

Cell Phone Forensics Illuminates Murder

When the nearly naked dead body of a 28-year-old male was discovered in a wooded area near a lake, the local sheriff's department requested an autopsy, announced that a large amount of heroin was found in the young man's blood stream and treated the death as a drug overdose. Quickly, the case was closed. Although the grieving family members were enraged at the actions of local authorities, they gathered to bury the young father of three. But in the weeks following the funeral, they soon discovered that they could not let go of the case. They did not believe the conclusions drawn so quickly by the Sheriff's department. After all, this young man, called Chip by family and close friends, had absolutely no history of [...]

Go to the Experts for Cell Phone Forensics

Remember the days when private investigators were depicted as the rather eccentric characters seated behind messy desks in seedy neighborhood buildings? And the majority of their clients were heartbroken wives who strongly suspected their husbands of having affairs? Through the years, that very incorrect stereotype has slowly eroded and been replaced with a much more accurate picture. Actually the private investigator of today is very often a technologically savvy professional with an assortment of impressive skills. Yes, there are still clients- male and female- who request surveillance and answers to their gnawing questions about fidelity. But also, a private investigator identifies the value of finding answers through the use of technology. For example, the cell phone forensic examination of a cell phone can often be [...]

Look to a Private Investigator and Digital Forensics for Professional Help

received a call from a business owner. He said his new office manager spends an excessive amount of time on the phone. In fact, since some of her job requires her to be away from the office, her phone is company-issued. When she runs work-related errands, she is gone a lot longer than what he would deem necessary. He had already addressed these concerns privately with his new employee. In fact, he had also reminded her that she is still on probation. A couple of weeks later, other office staff told him that the new employee has told co-workers that he made a pass at her during a meeting alone in his office. They also told him that she has plans to file a claim [...]

Go to Top