What Are Some Indicators That My Cell Phone Might Have Malware/Spyware?
1. Battery is warm when not in use.
2. Battery life is noticeably diminished each day.
3. Some Blackberry’s; communication icon on right screen flashing.
4. Small pauses of audible communication while talking.
5. Light audible tones, beeps or clicks throughout conversation.
6. Flashing or flickering on display or change of brightness.
7. Some spy-ware programs require the spy to manually mute their phone, therefore you might hear them in the background at the beginning of conversation or when they tap in.
8. Slower internet access.
9. Suspicious 3rd parties have detailed knowledge of your private conversations and locations (GPS).
10. You have opened a suspicious email or one from a potential spy. (allowing Trojan horse to install spy-ware remotely).
The Smarter the Cell Phones the Easier It Is to Hide Spy-Ware.
If the eavesdropping perpetrator has effectively installed spy-ware on your phone, then that perpetrator has total control, i.e. obtain all text messages, emails, internet sites visited GPS location, photos and videos obtained, etc.
Facts You Should Know About Cell Phone Spyware
Can I Examine My Own Phone?
It is nearly impossible on most phones to detect cellular malware without the use of sophisticated software. Not only is forensic spy-ware detection software expensive, it is also highly complex and difficult to master. Furthermore, the software is only as good as the examiner who utilizes it. The examiner must not only know how to operate the software to its full potential but also be able to manually search through the data (lines of code) to find the spy-ware. An examiner must have completed multiple certification courses prior to becoming an expert examiner. This is particularly useful if any evidence obtained is to be introduced into a court of law. Credibility is very important in technical evidence. Learn more about our cell phone spyware detection procedure.
How Do I Get My Phone To You?
We recommend placing the phone in a well protected container with the battery separated from the phone and supplied along with the charger. If you are unable to remove the battery from the phone then we highly recommend that you turn it off and wrap the phone 8 or 10 times with metal foil which will essentially become a Faraday cage. This will prevent any signals from leaving or entering the phone prior to our examination. Once we receive your phone an examination begins within one business day and usually takes approximately seven days to complete prior to sending the phone back to you. Sometime we are able to accomplish the examination in less time.
Step 2: Follow the procedure above for securing your phone for shipment to us.
Step 3: Ship your phone to:
How We Got Started With Cell Phone Forensics
In 2004, All In Investigations, Inc. (formerly International Investigators), our parent company, was involved in a Technical Surveillance Countermeasures sweep of a Client’s home and office in Orange County, California. When no bugs, eavesdropping devices or wire taps were found in either location, one of our team members began further questioning of our Client in an attempt to determine what could possibly have been used to conduct an effective eavesdropping operation on her private conversations with her attorney and others. It was learned that the only common denominator was her cell phone which her estranged husband had physical access to during their cohabitation. Her husband was an IT expert with a large company and had access to this spyware technology. At that point we had no experience with cell phone bugs or how to handle them, but knew the protocol when examining computers for Trojan horses or spy-ware. Since a cell phone was just a less complicated computer at that time, we treated it as such. Upon further investigation a malware (usually referred to as spy-ware or Trojan horse), program was found in the phone that enabled her husband to monitor her cell phone conversations and more specifically to remotely turn on her cell phone while it was in the standby mode, either in her purse or on a table and obtaining clear audio of conversations surrounding the phone. This was the beginning of our mobile forensics lab. Today our mobile forensics lab division utilizes state of the art software and hardware platforms to search for even the most covert cell phone malware programs that can be installed in today’s high-tech phones. We are part of a mobile forensics collaboration with the leading examiners in the United States that exchange information so that we are always aware of new cellular and mobile malware programs that are literally “born” each day. Mobile forensics examiners in the collaboration find nearly 10 to 15 new malware programs per day with well over 4,000 completely different types or variations known to be in existence presently.