Blog Details
1

How to Know If Someone is Following You Or Tapping Your Cell Phone?

Many people have reasonable apprehensions that someone is physically following them, mounting surveillance on them has planted some gadget or devices to monitor them, has installed software on their phone, installed some bug or has installed some malware on their computer or laptop. The right to privacy is protected, is an intrinsic part of the right to life and personal liberty under article 21 of the Indian Constitution. Data theft is a growing phenomenon of concern for individuals companies and government organizations. Private individuals, security agencies, government offices, and big corporate firms all are worried about the data breach.

FOLLOWING ARE SOME METHODS WHICH ONE CAN ADOPT, TO DETERMINE IF SOMEONE IS FOLLOWING YOU:
 

1. PHYSICAL SURVEILLANCE OR STALKING:-
 

There are chances that someone is doing physical surveillance on in professional term "shadowing" you if your adversaries are learning every move of yours. In most of the cases of physical trailing, a professionally trained Private Investigator, or PI watches the subject from a distance. The private investigators do it very systematically and discreetly. They also carry sophisticated devices and equipment to capture your photographs and videos. The private detective agency in Delhi give these photographs and videos to their clients.

To catch a person who is following or trailing you, very simple steps need to be taken. You need to be very aware of the surroundings and observe people. If travelling in car or bike, always view your rear mirror regularly. Certain good detective agencies use multiple people to trail you. In this scenario, a guy will disappear and a new team will start trailing. Try to slow down your vehicle and see who all have slowed down with you. After some time step up on gas and see who all are picking speed with you. If you are very sure that someone is stalking you, then report to the police immediately. At times, it becomes difficult for you to determine if someone is following you, in these cases, you can hire professional private investigators, who can physically conduct counter-surveillance to expose the people who snooping on you.

2. CELL PHONE SOFTWARE:-

Mobile phones have become an inseparable part of human life. Can you imagine what all can a person do if he hacks your mobile? For a minute imagine your phone is hacked, now the following will be compromised:-

a.  All your telephone conversation will be heard by the person who has hacked the phone.
b. The person who hacked the phone will have direct access to your phone's memory. He can see all the photographs, videos, documents, etc.
c. He will receive all your messages, text, Whatsapp and information shared via any other route, application or media.
d. He will be able to see where you are going by accessing the GPS.
e. He will be able to hear all your live conversation and take live photos and videos.

Therefore, if you have slightest of doubt that your phone is hacked, go to an expert in forensics, who can check and remove such an application.

3. LAPTOP AND COMPUTER MALWARE:-
Any physical device or sophisticated software can easily bug your computer. If your computer has been hacked than every work, which you do on computers will be accessed by the person who has hacked it. Therefore, get your computer checked from an expert. Also, keep the computer password protected.

TELEPHONE LINE PARALLEL:-

Although it is a crime under the Indian Telegraph Act, your wired telephone line can also be targeted by someone who wants to overhear your conversation. Inspect the telephone wires regularly to see if there are any cuts, tapes or wire connection.

BUGS AND GADGETS TO RECORD AUDIO/VIDEO OF SURROUNDINGS:-

Anyone can plant a hidden device which can camouflage in surroundings and cannot be detected easily. Such bugs are small and miniature in size. There are two types of bugs. The first type of bug has its own. Memory and Battery: This type of gadgets are usually installed and uninstalled frequently. The second type of bug is permanently fixed. This device usually has a Wi-Fi zone and internet connections to directly send the audio and visuals of surroundings. The gadgets can be planted at any place like house, office, car, Room, etc. These devices are so nicely conceived that it is impossible for a normal human to detect it. These devices emit Radio Frequency, and their battery produces heat. The process of finding a hidden gadget and eliminating it is known as "Debugging and Sweeping." Professional Private Investigators carry out this task which is known as Technical surveillance countermeasure (TSCM). In TSCM there are technical instruments such as Thermal Camera, Lens detector, Non-Linear Junction Detective (NLJD) Radio Frequency (RF) detector, etc, which are used to detect the device. A physical inspection of the suspected spot is also carried out by the Detective Agency in South Delhi.

 

 

 

Tags:
Our Clients