Tag: phone tapping devices
-
Delete Doesn’t Mean Gone to a Cell Phone Analyzer
Delete. Delete. Delete. And you think it’s done and gone. Well, you’re probably wrong. Once information is searched out, read, written or stored on a digital device, it is most likely there forever – if only in bits and pieces. But for digital forensics teams, that is often enough to piece together a bigger picture.…
-
Forensic Cell Tower Evidence is Accurate Only with Complete and Complex Analysis
received a call from a defense attorney on the east coast regarding a cellular forensics report he had received from the prosecution that concluded that the forensic cellular evidence proved his client was in the area of the scene of a crime at the time the crime was committed. The prosecutor had no physical evidence…
-
Cellular Forensics Even Applies to Drop Phones
Data Extraction. That’s what provides the evidence so many of our clients want when they request a mobile phone forensic analysis. Cell phone forensic tools allow a cellular forensics specialist to create an exact image of the cell phone hard drive and from that, complete a mobile phone analysis. The analysis will uncover any evidence…
-
Bug Detection Out of the Office
During nice weather, business is conducted in a lot of places outside the office. Think the golf course or even on a boat. was called about Technical Surveillance Countermeasures (TSCM) services from a financial planner’s attorney. His client had suddenly lost several clients to a specific competitor and was suspicious about why – and how.…
-
Cell Phone Forensics Exposes Source of Harassing Messages
was recently called into an interesting case that could have easily escalated into violence or a life changed forever. We got a call from an attorney who was representing a couple and their college-age daughter. The daughter was receiving harassing texts, calls and messages on her cell phone. They believed the former girlfriend of a…
-
Who is Safe from a Mobile Spy?
In a recent discussion with one of the cellphone experts at , I learned that the Blackberry is probably the least “hackable” phone out there. A cell phone forensic analysis can include what is called a password bypass. In fact, we have been asked to uncover passwords that had been lost or forgotten. That is…
-
Unfair Competitive Edge Can be Averted through TSCM Sweep
There are so many reasons for electronic surveillance. Just about any situation that includes a competitive element provides the impetus for covert surveillance. Corporate and industrial espionage may be what first comes to mind, but spy listening devices can be used in every industry and field. According to an ESPN article from April, 2012, there…
-
Cell Phone Forensics Investigation Calls for Expertise and Experience
Cell phone investigation and cell phone forensics requires a growing body of knowledge – and experience is becoming more and more important. The main reason is the continual progress in technology advancements. One aspect is the evolution of cell phones and operating systems. As a cell phone consumer you may think there are only a…
-
Is Your Employee’s Phone a Mobile Spy Leaking Your Business Secrets?
All you have to do is sit in a coffee shop or lunchtime dining spot to hear that sensitive business information is being discussed. It may not be about a top secret merger or a hot new product, but information about how a company does business and who their customers are is bantered about in…
-
Technical Surveillance Countermeasures (TSCM) provides security – in more ways than one!
Many companies have Intellectual Property Protection insurance for protection. But insurance is only good after a theft or breach of confidential or proprietary information. Wouldn’t it be a better idea to prevent a loss before it happens? When a business hires to do a bug sweep, or more precisely, TSCM, it’s because they want to…