Free Consulation

Call 866-629-3757

Cell Phones as Spy Tools… Trying Times for Personal Privacy and Protection for Smart Phone Users

Anyone who thinks their Smart Phone calls, text messages or personal conversations are safe from interlopers, stalkers, corporate spies, or personal enemies, is forewarned. Your Smart Phone can be a double agent.

A few years ago, some offshore techies developed a software program that would allow spouses or lovers to monitor their cell phone calls or text messages. It could also allow Parents to check their kid’s usage or potentially locate them in the event of an emergency.  As this spyware developed, additional features were added that provided real time eavesdropping, text message viewing, keystroke logging, and location tracking services linked to online maps.

These advanced capabilities created the ‘perfect toolbox’ for all manner of corporate espionage types, social predators, and other miscreants to secure private and personal information from any unsuspecting party. More importantly, the spyware is purchased offshore and the servers that host the data are likewise conveniently located offshore in countries that do not abide by our Privacy Statutes.

The Smartphone Spyware does have some flaws in that the software must be manually accessed and a pass code must be inputted to activate the program. There are some other tell tale signs to indicate the Smartphone has been infected including unexplainable increases in minute usage and questionable SMS text messaging, the Smartphone’s battery life has noticeably decreased between charges, and the phone appears to go on or off without any manipulation by the owner.

If you suspect your phone is infected, it may be necessary to have the SIM card removed or replaced and perform a clean wipe of all programs or apps that you personally downloaded and installed on your Smartphone.

Vigilance is the keyword here and you must safeguard your phone from anyone who could potentially access it and activate the Spyware. You should absolutely change your Smartphone’s security password to include caps and numbers in illogical sequences and restrict its access. Employing these safeguards will certainly improve your odds against being victimized by anyone who would invade your privacy and track your movements.

If our firm can be of assistance to you regarding this or any other matter, please don’t hesitate to contact us for a free consultation.

Jennings Smith Associates


Toll Free: (866) 629.3757


Call 1-866-629-3757 for expert, discreet private investigation and security consulting services.

Click here to visit Jennings Smith Investigations, Inc. on Twitter. Click here to visit the Private Investigator Blog. Click here for the Private Investigator Blog RSS Feed.
  • Jennings Smith Associates Professional Certifications

    • Professional Certified Investigator (PCI), ASIS International
    • Certified Protection Professional (CPP), ASIS International
    • Physical Security Professional (PSP), ASIS International
    • Certified Homeland Security Level 5 (CHS-V), American Board for Certification in Homeland Security
    • Certified Business Continuity Professional (CBCP), Disaster Recovery Institute International
    • Certified Healthcare Safety Professional (CHSP), Board of Certified Hazard Control Management
    • Certified Healthcare Emergency Professional (CHEP), Board of Certified Hazard Control Management
    • Certified Safety & Health Manager (CSHM), Institute for Safety and Health Management
    • Certified Hazard Control Manager (CHCM), Board of Certified Hazard Control Management
    • Certified Forensic Consultant (CFC), American College of Forensic Examiners International

    Certifications Continued


    Cyber Forensic Investigations

    JSA's cybersecurity experts are ready to assist you with a complete array of cybercrime protection, data recovery, and evidence collection services. Cyber forensic Investigations include: unauthorized data access; PII (personal identifiable information) exposure; IP (intellectual property/proprietary information) theft; employee social media/email/messaging abuse; ransomware data corruption; and more.

    Cyber Forensics Continued

  • Share

  • Major Credit Cards Accepted