Tag: cell phone forensics
-
Cell Tower Triangulation Provides Evidence of Innocence
Another interesting case recently investigated was centered in a child custody battle. A police officer and his wife in Iowa were divorcing and both wanted custody of their two children. The wife accused the officer of harassing her by sending threatening text messages. He was on the verge of losing any custodial rights as well…
-
Who is Safe from a Mobile Spy?
In a recent discussion with one of the cellphone experts at , I learned that the Blackberry is probably the least “hackable” phone out there. A cell phone forensic analysis can include what is called a password bypass. In fact, we have been asked to uncover passwords that had been lost or forgotten. That is…
-
Unfair Competitive Edge Can be Averted through TSCM Sweep
There are so many reasons for electronic surveillance. Just about any situation that includes a competitive element provides the impetus for covert surveillance. Corporate and industrial espionage may be what first comes to mind, but spy listening devices can be used in every industry and field. According to an ESPN article from April, 2012, there…
-
Cell Phone Forensics Investigation Calls for Expertise and Experience
Cell phone investigation and cell phone forensics requires a growing body of knowledge – and experience is becoming more and more important. The main reason is the continual progress in technology advancements. One aspect is the evolution of cell phones and operating systems. As a cell phone consumer you may think there are only a…
-
Is Your Employee’s Phone a Mobile Spy Leaking Your Business Secrets?
All you have to do is sit in a coffee shop or lunchtime dining spot to hear that sensitive business information is being discussed. It may not be about a top secret merger or a hot new product, but information about how a company does business and who their customers are is bantered about in…
-
Technical Surveillance Countermeasures (TSCM) provides security – in more ways than one!
Many companies have Intellectual Property Protection insurance for protection. But insurance is only good after a theft or breach of confidential or proprietary information. Wouldn’t it be a better idea to prevent a loss before it happens? When a business hires to do a bug sweep, or more precisely, TSCM, it’s because they want to…
-
Cell Phone Spying is Infiltrating Daily Life of the Average Citizen
Whether you like Anderson Cooper or not, he is part of the mainstream media and the topics he covers are often timely and informative. He had two women on his television program in the fall who revealed their husbands had spied on them through their cell phones. The incidence of cell phone spying has grown…
-
Either Way, Cell Phone Forensics Uncovers the Facts
I recently wrote about computer rental retailers that were caught illegally watching lessees’ activities and gathering data through computer monitoring software meant to keep track of rented computers. That sort of monitoring is illegal, but there is another type of monitoring that may fall into a gray area. Parents are monitoring their children’s cell phone…
-
Cell Phone Spying is Illegal in the United States
There is one more reason to be glad you reside in the United States – cell phone spyware is illegal here. With the release of the Apple iPhone5 in Australia, cries can be heard about the “potential tsunami of privacy breaches” according to an article at news.com.au. The article quotes senior lecturer of Internet law…
-
Cellular Location Evidence Requires Expert Analysis
The use of cellular forensics has become a real tool for many attorneys and their clients – on both the defense and the prosecution sides of the courtroom. Although we conduct mobile device forensics or mobile phone hack detection for clients suspecting cell phone spying, we also conduct investigations using cellphone records and mobile phone…