Phone

  • Permalink Gallery

    Appropriate Legal Wording for Cell Records Requests Critical Time Saver

Appropriate Legal Wording for Cell Records Requests Critical Time Saver

Can you image the amount of data collected by the phone companies? Not data on customers, but the data that is created by customers. They can store service records – but for only short periods – and once it’s gone, it’s gone.

Because the service provider data is time sensitive, if an attorney or the authorities need the information for a case, a preservation letter has to be created and sent immediately to all the service providers involved. The preservation letter asks them to save data for a specific account and is urgent before the data is eliminated. The legal wording for cell records and preservation is specific to each service provider and if not complete and accurate, the request could be denied.

The service providers [...]

  • Permalink Gallery

    Decrease Threats by Reducing Vulnerability to Cell Phone Spy

Decrease Threats by Reducing Vulnerability to Cell Phone Spy

Let’s talk cell phone spyware detection. Remember this number: 95%. McAfee estimates that’s the percentage of malware ever devised that has been created in the past year. And, the amount of malware detected by them increased 44% last year, too.

Those are dismal numbers that illustrate the growing threat to online security. Many of the major threats targeting large banks, online moguls like Facebook and Twitter recently have come from Europe and Asia but that doesn’t mean that the everyday user is exempt. The targets are cell phones and tablets. But the techniques for phishing are still the old school kind – because they work.

The large corporations are hit because malware is accessed through links to compromised or malicious sites. Once that site is accessed, [...]

Security Starts with TSCM

International Investigators got a call from a CEO who was concerned about an upcoming board meeting. The board would be discussing some very confidential matters including the terms of the sale of the company. If news of the sale was leaked, it could damage not only the negotiations, but the financial health of the company and the employees. He wanted to be certain that the conference room was completely secure.

He asked that we complete Technical Surveillance Countermeasures (TSCM), or as it is often called, a bug sweep. He felt relatively confident that there were no eavesdropping devices or other surveillance equipment in the room, but he had to be absolutely certain.

Usually listening devices are not evident to the casual observer. That’s why counter surveillance [...]

  • Permalink Gallery

    Cell Phone Forensics Investigation Calls for Expertise and Experience

Cell Phone Forensics Investigation Calls for Expertise and Experience

Cell phone investigation and cell phone forensics requires a growing body of knowledge – and experience is becoming more and more important. The main reason is the continual progress in technology advancements.

One aspect is the evolution of cell phones and operating systems.

As a cell phone consumer you may think there are only a few real differences between the different cell phones on the market, I mean you can get a computer that uses one of three major operating system vendors:

MS Windows
OS X from Apple Inc.
Linux OS

That does not hold true for cellular phones. There are more operating systems for cell phones than for desktop computers. The top five include:

Android OS
Apple iOS
Blackberry OS
Symbian
Microsoft

And even though they all offer similar functions and options, they are very [...]

  • Permalink Gallery

    Is Your Employee’s Phone a Mobile Spy Leaking Your Business Secrets?

Is Your Employee’s Phone a Mobile Spy Leaking Your Business Secrets?

All you have to do is sit in a coffee shop or lunchtime dining spot to hear that sensitive business information is being discussed. It may not be about a top secret merger or a hot new product, but information about how a company does business and who their customers are is bantered about in casual discussions.

And with the proliferation of ILLEGAL spyware available on the Internet, cell phone spying is becoming more and more a problem. Here at International Investigators, our mobile phone forensics team is being asked to conduct cell phone spyware detection for more and more businesses.

Cell phone monitoring is most often regarded as a way for someone in a relationship to keep tabs on their partner, or in a stalking [...]

  • Permalink Gallery

    Turn it Off and Stash it in a Drawer to Prevent Cell Phone Spying

Turn it Off and Stash it in a Drawer to Prevent Cell Phone Spying

My friend recently had a meeting with her attorney. I don’t know what they needed to discuss – we never talked about that. We did talk about the Cell Phone Policy her attorney had adopted and required everyone in the office – including clients – to adhere to.

Because of the escalating incidence of cell phone surveillance and cell phone spying, the firm adopted the policy. Every cell phone that came into the office had to be turned off and left locked in a designated cabinet during all visits and consultations. No active cell phone moved past the receptionist’s desk.

Here at International Investigators we understand why the legal firm has taken the stand. We see the increase in mobile device forensics brought on by the [...]

  • Permalink Gallery

    Cell Phone Spying is Infiltrating Daily Life of the Average Citizen

Cell Phone Spying is Infiltrating Daily Life of the Average Citizen

Whether you like Anderson Cooper or not, he is part of the mainstream media and the topics he covers are often timely and informative. He had two women on his television program in the fall who revealed their husbands had spied on them through their cell phones.

The incidence of cell phone spying has grown and infiltrated the daily lives of average citizens in situations like the women on Cooper’s television show. Cell phone eavesdropping is accomplished through the installation of software directly onto the device. That can happen simply through the opening of an email or an image – and, in the case of these ladies, getting an email or text from your husband would not send up any red flags.

Cellular forensics or mobile [...]

  • Permalink Gallery

    Be Proactive so You Don’t Need Cell Phone Spyware Detection Services

Be Proactive so You Don’t Need Cell Phone Spyware Detection Services

We were recently asked here at International Investigators how to prevent a cell phone from becoming a mobile spy. No one wants to be a victim of a bad guy eavesdropping on their conversations or their life through a cell phone listening device and we can detect it using cellphone forensics.

At this time, there isn’t any 100% surefire method to prevent spyware on cell phones. However, there are a few things that would prevent cell phone surveillance:

Understand the SIM Card. A SIM card is a microchip about the size of a postage stamp that is usually located adjacent to the batter in a mobile phone. The Subscriber Identity Module (SIM) is used to identify and authenticate the user of the mobile phone. That’s why [...]

Preserving Evidence is Part of Cell Phone Investigations

Cell phone analysis and forensics covers so many different applications that it is difficult to lump it into one particular use.

For instance, when a crime is committed, the police authorities are finding that forensic cell phone data recovery can provide vital information. Because they are able to recover cell phone data, the sequence of events can often be outlined in a factual and objective manner.

Likewise, in the process of an attorney attempting to get a jury to convict or acquit their client, cell phone records are equally as valuable.

The thing about the data on a cell phone is that even when a user thinks he has deleted the evidence, through cell phone deleted data recovery, a forensic expert can retrieve data and records that [...]

Who’s Listening? Cell Phone Spying is Here

It might sound like a funny prank to pull on a buddy, but installing cell phone spyware is not a joke – nor is it legal - anywhere in the United States.

In fact, the Federal Wiretap Act as part of the Omnibus Crime Control and Safe Streets Act of 1968 (Title III)  makes it a federal offense punishable by 5 years in a federal prison and the perpetrator could be subject to civil lawsuits as well.

If you do an Internet search on cell phone tap, spy, bug, monitor or eavesdrop, you may find hundreds of sites that sell cell phone spyware – and many of them say the equipment is legal. It may be legal in some countries of the world, but it’s not [...]

August 27th, 2012|Cell Phone Spying|