ICS World Private Investigator Private Investigator Services Since 1967
1 (800) 828-9198 - Toll Free 24hrs
001 480-990-8888 - International
Confidential & Recommended Private Investigator Services Since 1967

Android Phone and Corporate Espionage


In recent months, an increase in cases involving cell phones and tablet devices are being brought to ICS as concerns about cell phone security grow. These concerns are particularly serious for people who own or operate a business, but these are certainly not the only people who have reason to worry about the information their cell phone may be giving out.


Summary

In recent months, an increase in cases involving cell phones and tablet devices are being brought to ICS as concerns about cell phone security grow. These concerns are particularly serious for people who own or operate a business, but these are certainly not the only people who have reason to worry about the information their cell phone may be giving out. Clients may want to consider a cell phone investigation with ICS if:

  • You currently are, or have been in the past, the victim of stalking
  • You are involved in a major lawsuit and think the opposing legal team may be trying to illegally gain information
  • You use your cell phone heavily and want to test its security and learn more about keeping it free of spyware or other illegal forms of hacking

Conclusion

A particularly interesting case ICS took on involved using eDiscovery as a method of counterintelligence. A successful businessman came to ICS after receiving viable threats of corporate espionage that had caused him to worry about the security of his business contact information. In this case, the client had an Android phone that automatically synced contact information through his Google account. Since information on the phone could also be found online, the client was right to worry about the security of his private business information.

ICS was able to help the businessman in several ways. First, a team of cell phone forensic technicians took a forensic image of the Android phone, giving them a clear understanding of how the phone had been used and if it had been used as a part of a corporate espionage plot. By using a systematic and innovative approach to cell phone forensics, ICS was able to determine the phone was free of any spyware. However, because the phone had also been backed up online, the client was still at some risk of having his private contacts hacked, stolen, or viewed through illegal means.

ICS was able to install software that would disable to Google sync function. From here, ICS helped the concerned businessman take his security one step further, by creating and uploading a fake set of business contacts onto his phone, then overwriting the real contacts on Google with the fake contacts created by ICS. With this additional security measure, the client gained significant peace of mind, knowing his real information was protected.

What to do Next

Any cell phone can become a security problem, but their benefits are enormous, and depending on the type of the phone, proper measures can be taken to ensure that your phone continues to work for you, rather than leaking information about you. If you have any reason to believe your cell phone may contain spyware or other illegal or harmful programs, contact ICS to begin your free consultation right away. Do not live your life in fear of your phone, let ICS verify its safety and teach you ways to better protect yourself from spying eyes in the future.



See the following case types for more information:

Computer Forensics Investigation

Computer Forensics Investigation: You need a leader in high technology crime solutions that's...

Cellular Phone Forensics

Cellular Forensics to see what data may in fact exist in a cell phone memory.

Mobile Phone and PDA Seizures

Mobile Phone and PDA Seizures: Digital Age technology employed for your investigation.

Electronic Discovery Services

Electronic Discovery Services: With our electronic discovery and computer forensics specialists,...

Cyber Sabotage Investigations

Cyber sabotage investigations can be conducted for a wide range of actions, from a harmful and...

Copyright © 2024 International Counterintelligence Services, Inc. All rights reserved.