Telecommunications crime is the fraudulent use of any telephone, microwave, satellite, or other telecommunications system, either as a crime itself or as a tool in committing some other crime.
Using interstate lines of communication during the commission of a crime is a federal offense, as is the fraudulent use of those lines of communication. Technology has brought us to the point where phreaks, a term used to refer to phone hackers, can clone cell phones using over-the-counter electronic equipment, and steal other people’s cell networks for their own use. Some phreaks will use their skills to rip off telephone service providers to get free long distance or unlimited minutes on a cell phone. And while they may not target specific people, this is not a victimless crime. If you think that your phone has been compromised, or if you are a service provider and you are getting a lot of unexplained activity on your lines, then call ICS and let our experts investigate your case. We are available worldwide.
Wire and Electronic Communications Crime Information:
- Wire and Electronic Crime Consulting Services
- Voicemail Hacking: gaining unauthorized access to your voice mailboxes, allowing an attacker to hear voice mails and sometimes make free long distance calls using your call forwarding
- Cellular Cloning
- Cellular Phone Fraud: the unauthorized use, tampering, or manipulation of a cellular phone or service
- Use of a stolen phone
- Signing up for service using a false or stolen identity
- Cloning a valid electronic serial number (ESN) using an ESN reader, and reprogramming another cell phone with that valid ESN number
- Force dialing to 900 numbers or overseas charge-back numbers
- Interception of information from voicemail boxes
- Pager tracing
- Leaving harassing or threatening messages
- Defacing voicemail greetings
- Phone line scanning to identify undocumented or uncontrolled modems connecting client computers directly to the external telephone network. These phone lines and modems are important because they may represent security holes in the organization's security perimeter.
- Remote access to phone extensions
- Business phone hacking
- PBX hacking: gaining unauthorized access to your telephone system, allowing the individual to make anonymous and free phone calls
- Phone systems penetration testing
- Voicemail manipulation, forwarding of private messages
- Bypassing account codes
- Intercom hacking
- Harassing phone calls
- Theft of service: placing phone calls on company lines via remote access
- Theft of telecommunication
- Disguising personal phone usage
- Telecommunications Training and Seminars
- Threatening Phone call Tracing
- Related ICS Services
- Computer Forensic Services
- Undercover Investigations
- Employee Screening Programs
- Criminal Investigation Services
- Counterintelligence Services
- Counter-Surveillance Service
- Signal Piracy Auditing
ICS Experience and Expertise:
- Operating since 1967
- Far greater operational reach than any other investigative service in the world
- Built through experience and expertise with a mix of law enforcement and military backgrounds
- All services are performed and billed on an hourly basis.
- Investigators are available 24/7.
ICS Network:
- Global resources network for domestic and international work
- Constantly evolving technical capabilities to adapt to advances in electronics and technology
- Use of cutting edge technology and equipment
Implementation:
- Free Consultation for Needs Analysis
- Design an Action Plan
- Engagement and Fees
- Execute Action Plan
- Present Thorough Documentation of All Results/Findings
Are you in need?
Wire and Electronic Communications Crime covers a wide range of crimes and activities centered around the use of telecommunications services. The crime might involve hacking and phreaking, cloning of phones, manipulation and unauthorized use of phone systems, and more. If you are getting strange activity on your bill, or you are being charged for calls you didn’t make, or any other suspicious activity is happening involving your communication lines, then call ICS immediately. These crimes may be relatively harmless in the short term, but they could lead to excessive costs and identity theft, among other more severe crimes. At ICS, we have experts available who have decades of experience detecting and neutralizing telecommunications crimes.