Summary
Recently, a businesswoman involved in a multimillion-dollar lawsuit hired ICS to check her cell phones for evidence of spying. The intensity of the lawsuit she was involved in had caused the businesswoman to become suspicious, and she began to fear that her cell phone was being monitored. If information was being leaked through any of her three cell phones, the client would be at a huge risk of compromising tor damaging the lawsuit she was involved in. Recognizing the severity of the situation, ICS immediately began a smart phone forensic workup of the client’s cell phones.
Conclusion
Because of the client’s business management position, she owned and carried three smart phones; two of the phones she thought might be hacked were android based phones, and the third was an iPhone. The cellular forensics technician at ICS was able to determine that all three cell phones were clean, and had not been hacked or tapped. During our discussion with the client, she also expressed a concern about the GPS devices on her phones being traced and potentially leading a stalker or criminal right to her, anywhere she went. ICS included a tutorial on how the client could “outsmart” her cell phone for greater peace of mind. One trick ICS was able to share is how to change a smart phone’s GPS reading so that it will always produce a random location, making it impossible for anyone to use a cell phone GPS location to actually find the cell phone.
What to do Next
Smart phones have recently become a hot topic in conversations about safety and security, and cases like that of the businesswoman are not uncommon or unique. Cell phones today can do a wide variety of impressive and convenient tasks in the blink of an eye, and to many, their value is incalculable. If you rely heavily on your smart phone, it's a good idea to find out how your cell phone can be helping as well as hurting you. Simple measures can be taken to determine if your phone is safe, such as:
- Checking for cell phone spyware or malware
- Locating any potential “leaks” in the phone, where private data may be accessed by a different user
- Checking the GPS coordinates, and verifying that no one else is accessing them
Any cell phone can become a security problem, but their benefits are enormous, and depending on the type of the phone, proper measures can be taken to ensure that your phone continues to work for you, rather than leaking information about you. If you have any reason to believe your cell phone may contain spyware or other illegal or harmful programs, contact ICS to begin your free consultation right away. Do not live your life in fear of your phone, let ICS verify its safety and teach you ways to better protect yourself from spying eyes in the future.