Any PI or Investigators on board.

Re: Any PI or Investigators on board.

So the question is:

There are several phone surveillance software packages that you can buy as a consumer to track calls of a specific phone number.

Is there a software that can identify the first software listed above to identify the breach in security?

Meaning, how do you catch, track, identify a phone surveillance if it is attached to your number?
 
Re: Any PI or Investigators on board.

This same question goes to computers. If I want to track someones key strokes, searches etc what software do you use.

If you wish to cleanse your computer of anyone tracking your system, how is that done?

I have a business overseas that is sensitive in nature with a new advisary in the picture. They seem to be one step ahead of me by knowing my private information that can only be captured by my personal phone calls or emails

What is your suggestion?
 
Re: Any PI or Investigators on board.

<div class="ubbcode-block"><div class="ubbcode-header">Originally Posted By: Ringbearer</div><div class="ubbcode-body">I have several questions regarding counter surveillance.</div></div>

Rexall, Walgreen's, or Woolworth's?
 
Re: Any PI or Investigators on board.

As someone in the computer field, I would recommend using a utility like Wireshark to monitor the traffic on your network. Cisco also has some stuff that will identify suspicious traffic on your network. The only way you can hope to catch the software on your system with decent probability is to scan it without using the native operating system.
 
Re: Any PI or Investigators on board.

It's not about it being on your network. For them to monitor you, they have to be gathering your information from your machine, and using your network to connect back to the internet. packet sniffing will reveal their traffic.
 
Re: Any PI or Investigators on board.

Gimpy,
Can you expand on that.

I took Brokers advise and contacted a professional security firm.
I just learned that they are tracking our phone from the other side and not my office.
 
Re: Any PI or Investigators on board.

Sure. For them to be monitoring your activities remotely, they have to have malware installed on your system. The code would be written to push "put" information more than likely at a scheduled time. When their malware attempts to push the information out, it will be sending packets to an IP address that you are not trying to contact... Perhaps when you're not even on the internet. In order to have a chance of removing this malware, you will need to download something like an AVG Live cd. I typically do this with a version written for Linux. Their malware will be written to target your Windows operating system and as such will mask itself to Windows. When you run the AVG Live cd, it boots the disk and runs in Linux (storde on the disk), and the malware is unable to hide. I'm not guaranteeing that this will find the malware, but it is light years ahead of hoping something Windows-based will find it.
 
Re: Any PI or Investigators on board.

Excellent. Thank you for the explanation.

Now how do I track who put it on?
Will there be a way to locate their IP address or be spacific in a physical address?
 
Re: Any PI or Investigators on board.

Counter counter surveillance would use this knowledge to disseminate false information or use this knowledge for own benefit.

Exposing and removing snooping will only alert them to the fact that you know about it and they will be able to counter it...
 
Re: Any PI or Investigators on board.

The question is how ^^^do you determine what ip address goes to what person. Doesn't the local DNS determine your ip address at a given time? So, you would have to determine where their local dns server is, then contact their service provider to find out who was using what ip address at that given time, correct? I did not think reverse tracking was easy. I could be wrong on all of this though. It has been a long time since I have messed with any of this.
 
Re: Any PI or Investigators on board.

SilentStalkr, sort of. The packet must contain the end-point ip address. As the op stated, the perpetrators are located overseas, so this should make them easy to identify. The information contained in the packets would also let the op recognize the traffic as abnormal in conjunction with a discrepancy in the destination ip as compared to the desired traffic at the time of capture.
 
Re: Any PI or Investigators on board.

Ya know, I have been reading this thread and cannot help but think of the advancements that have been made in the knee-replacement surgeries and whatnot.

But no matter how good they may be, the waiting list is still a few years long.

I'm just sayin',
 
Re: Any PI or Investigators on board.

Correction:

My phone compromise is over seas.

The computer compromise is here in the states.

Another question: Can someone track and see your emails easily?
 
Re: Any PI or Investigators on board.

Kapersky that is made for your operating system is not enough to find good malware. You have to run something like the link I provided. It doesn't have to be that specifically, but something that works the same way.
 
Re: Any PI or Investigators on board.

There's Free iso Burner. What is the need to burn? You should be able to drag and drop and then burn if you are using Windows 7 or a Mac.
 
Re: Any PI or Investigators on board.

Gimpy
You have been a wealth of good info. Try one more?

There is an encrypting chip for phones called:
KoolSpan’s TrustChip®

Do you know of this chip or can you recomend a better chip?
 
Re: Any PI or Investigators on board.

I am unfamiliar with that encryption. Phones are not currently my area of expertise. However... I understand the iPhone has an encryption app, and any phone in theory should be capable of loading crypto through an SD card. I will ask around tonight and get back to you....

Just checked it out, and I would email them to ask what encryption method they are using. I would try to find something that uses SRTP (Secure Real-Time Transfer Protocol).
 
Re: Any PI or Investigators on board.

<div class="ubbcode-block"><div class="ubbcode-header">Originally Posted By: Gimpy</div><div class="ubbcode-body">There's Free iso Burner. What is the need to burn? You should be able to drag and drop and then burn if you are using Windows 7 or a Mac. </div></div>

using XP thanks.
 
Re: Any PI or Investigators on board.

I have used Kaspersky rescue CD, Panda's CD and also Bitdefender. They all run on Linux so it will really get those tough ones. Make sure you don't have a key logger. That will be on a USB port. Also make sure you shut the computer down when you do the virus scan otherwise if you shut it down incorrectly it will not scan.