ICS World Private Investigator Private Investigator Services Since 1967
1 (800) 828-9198 - Toll Free 24hrs
001 480-990-8888 - International
Confidential & Recommended Private Investigator Services Since 1967

Android and iPhone eDiscovery

Cell phone spyware is more common today than ever, but this does not mean you have to be defenseless against this type of intrusive hacking. Private investigators from ICS can take a forensic image of your cell phone and quickly determine if your phone has been compromised. These types of cases are common, but that does not detract from the seriousness of the issue.


Recently, a businesswoman involved in a multimillion-dollar lawsuit hired ICS to check her cell phones for evidence of spying.  The intensity of the lawsuit she was involved in had caused the businesswoman to become suspicious, and she began to fear that her cell phone was being monitored. If information was being leaked through any of her three cell phones, the client would be at a huge risk of compromising tor damaging the lawsuit she was involved in. Recognizing the severity of the situation, ICS immediately began a smart phone forensic workup of the client’s cell phones.


Because of the client’s business management position, she owned and carried three smart phones; two of the phones she thought might be hacked were android based phones, and the third was an iPhone. The cellular forensics technician at ICS was able to determine that all three cell phones were clean, and had not been hacked or tapped. During our discussion with the client, she also expressed a concern about the GPS devices on her phones being traced and potentially leading a stalker or criminal right to her, anywhere she went. ICS included a tutorial on how the client could “outsmart” her cell phone for greater peace of mind. One trick ICS was able to share is how to change a smart phone’s GPS reading so that it will always produce a random location, making it impossible for anyone to use a cell phone GPS location to actually find the cell phone.

What to do Next

Smart phones have recently become a hot topic in conversations about safety and security, and cases like that of the businesswoman are not uncommon or unique.  Cell phones today can do a wide variety of impressive and convenient tasks in the blink of an eye, and to many, their value is incalculable.  If you rely heavily on your smart phone, it's a good idea to find out how your cell phone can be helping as well as hurting you. Simple measures can be taken to determine if your phone is safe, such as:

  • Checking for cell phone spyware or malware
  • Locating any potential “leaks” in the phone, where private data may be accessed by a different user
  • Checking the GPS coordinates, and verifying that no one else is accessing them

Any cell phone can become a security problem, but their benefits are enormous, and depending on the type of the phone, proper measures can be taken to ensure that your phone continues to work for you, rather than leaking information about you. If you have any reason to believe your cell phone may contain spyware or other illegal or harmful programs, contact ICS to begin your free consultation right away. Do not live your life in fear of your phone, let ICS verify its safety and teach you ways to better protect yourself from spying eyes in the future.

See the following case types for more information:

Computer Forensics Investigation

Computer Forensics Investigation: You need a leader in high technology crime solutions that's...

Surveillance GPS Tracking

Surveillance (GPS Tracking): How do you know if someone isn’t where they said they’d be? What if...

Cellular Phone Forensics

Cellular Forensics to see what data may in fact exist in a cell phone memory.

Mobile Phone and PDA Seizures

Mobile Phone and PDA Seizures: Digital Age technology employed for your investigation.

Electronic Discovery Services

Electronic Discovery Services: With our electronic discovery and computer forensics specialists,...

Cyber Sabotage Investigations

Cyber sabotage investigations can be conducted for a wide range of actions, from a harmful and...

Copyright © 2022 International Counterintelligence Services, Inc. All rights reserved.