Espionage, eavesdropping or spying can take many forms in today's age of technology, and has become relatively common given the plethora of devices available for sale to the public. Cell phones have become highly technical, and as a result can become a huge security risk. Unfortunately, cell phone hacking has become a common method of corporate espionage and fraudulent surveillance.
Recently ICS was hired by a corporate engineer who suspected that his cell phone had been hacked and may pose a security leak. As a new employee at the company, the client thought his phone may have been hacked as a part of his initiation hazing into the company. However, after a month, he was no longer willing to tolerate any sort of cell phone surveillance. After completing a free consultation, the engineer decided to hire ICS to complete a Technical Surveillance Countermeasures (TSCM) sweep, which involves taking a forensic image of the cell phone software.
The TSCM sweep of the client's cell phone did not turn up any spyware or other hacking traces, putting the engineer at ease that his phone was safe and did not pose a security breech. As a part of his investigation, ICS advised the client about future cell phone security and safety. The client owned an older, outdated cell phone, which pose much higher security risks than the newer, more advanced smart phones, which the client was unaware of prior to his investigation. Because no spyware was found, there was no need to take any further action on the case.
Clients who suspect they may be the victim of cell phone hacking, surveillance, or sabotage may experience these signs of hacking:
- Computer, network, or cell phone has slowed down considerably
- Your personal information seems to be known by an outside source
- Documents, text messages, or conversations that took place in private have become
What to do Next
If you suspect that you are the object of surveillance, please feel comfortable contacting ICS right away to begin your free consultation. Cell phone and computer hacking is especially dangerous because it puts the victim at an enormous risk of identity theft, corporate sabotage, or theft of ideas or property. Do not wait until it is too late, begin your investigation today.