Howe Law Firm
  • Events
  • Locations
  • Blog
  • FAQs
  • Resources
  • About
  • Case Types

search

 

phone

(800) 348-4698

Menu
  • Home
  • e-Discovery and Forensics
    • Mobile Phone Evidence
      • Text Messages
      • Phone Metadata
      • Voicemails
      • Phone Call Logs
      • Contacts
      • GPS & Locations
      • Phone Internet History
      • Phone Bookmarks
      • Close
    • Tablet Forensics
      • iPads
      • Android
      • Close
    • Email Evidence
    • Computer Evidence
      • Backups
      • Computer and Smartphone Forensics
      • Computer File Types
      • Computer Internet History
      • Computer Log Files
      • Computer Metadata
      • Computer Web Bookmarks
      • Google Docs & Sheets
      • Mac Computers
      • Photos & Images
      • Servers
      • Videos
      • Virtual Machine and eDiscovery Forensics in Litigation
      • Windows Computers
      • Word, Excel, PDF files
      • Close
    • Social Media Evidence
    • Online Cloud Evidence
    • Database Evidence
    • Website Evidence
      • Search Technologies
      • Close
    • Legal Review Platform
    • Close
  • Remote Collection
  • Expert Services
    • Expert Witness
    • Joint (Neutral) Expert
    • Special Master
    • Litigation Response Plan
    • Discovery Protocols
    • Discovery Requests & Pleading Preparation
    • Document Review
    • Trial Presentation Exhibits
    • e-Discovery Legal Consulting
    • Asset and Background Reports
    • Digital Asset Recovery after Death
    • Close
  • Counter Surveillance
    • Fees
    • FAQs
    • Homes
    • Offices
    • Conference Rooms
    • Vehicles
    • Phones
    • Computers
    • Routers
    • Email Accounts
    • Social Media Accounts
    • Online Accounts
    • Personal Items
    • Signs of Surveillance
    • Cyber Security & Cyber Forensics
    • Close
  • Fees
  • Order
    • New Client Form
    • Email Evidence Report
    • Facebook Evidence Report
    • Remote Collection Unit
    • Person Asset and Background Report
    • Business Asset and Background Report
    • Close
  • Contact

Analyzing Internet Routers for Surveillance

Is Your Computer Router Being Used to Spy on You?   

When someone conducts surveillance, they are trying to collect certain information about their target. Frequently, this information includes communications in text messages, phone calls, or emails. However, they could also be eavesdropping on conversations or secretly taking photos or videos with hidden cameras and microphones. If so, how are they getting the information? Generally, transmission data is available through the routers’ log files. A router analysis can detect surveillance by identifying hidden spy devices on your network.

Wifi router with lights and computer in background with radio waves
Is someone spying on me through my WiFi router?

Decades ago, to get this information, a person would sit in a vehicle down the street, eating donuts and drinking bad coffee, while trying to overhear conversations using archaic surveillance equipment. Today, getting this information is relatively simple and easy. Using readily available hidden equipment, like cameras, microphones, and GPS trackers, someone can record this information. 

Once the surveillance information is recorded, it needs to be transmitted to the individual. Frequently, people use a cellular connection on a mobile phone to send the information. However, surveillance information is also transmitted to an individual using the internet via the home or business computer router.  

For this reason, when doing a bug sweep of a home or office, we recommend router analysis to detect surveillance. As computer forensic experts, we check all the settings on your router to make sure your router is secure and determine whether or not there has been any exploits or surveillance.  

Is Your Computer Router Being Used to Spy on You?

Information We Can Find in Computer Router Log Files 

We review the internet and computer router log files to uncover surveillance or other information.  

We download all of the log files into our database. We’ve written books on database programming, introducing database queries, and stored procedures. We analyze and review all the data to find suspected surveillance. 

  All Devices that Have Connected to Home or Office Internet 

A computer router will record in the internet router log files all devices that connect to the network. For example, we will see the iPhones, Android phones, and computers of anyone that has connected to the home or business’ internet connection.  

Today, more and more devices are “internet” enabled. This means, in addition to phones and computers, there may be video equipment, alarms, and even common appliances that are accessing the internet in our homes and offices. It’s important to separate safe internet devices from “surveillance devices”. The internet router log files will identify devices accessing the internet even if they weren’t found in a physical bug sweep.  

Unknown devices connected to your internet connection may be a hidden camera or microphone collecting surveillance.  

Inbound & Outbound Internet Traffic 

We also evaluate the computer router logs for outbound traffic. Most people when they use the internet, use inbound traffic. For example, when you check your email, you’re downloading the email. When you are visiting websites, you’re downloading website information. When you watch a Netflix, that’s N-E-T-F-L-I-X video, you’re streaming inbound traffic to your computer, phone, or tablet. 

Surveillance involves uploaded traffic, not download traffic. For example, audio files, photographs, and video files are often very large files, which can be found in the computer router. If someone is spying on you through a hidden device, they are probably sending themselves those files over your internet connection.   

Large amounts of outbound traffic can indicate surveillance and should be of great concern. 

Who is Spying on You?  

Sometimes, when a client contacts us, they already suspect who is spying on them. For example, an ex–spouse; an employment manager; a business competitor; neighbor; and many others. We’ll collect this information from you before we begin our investigation in order to do the most thorough job.   

In analyzing the computer router, we can often obtain the IP address of where surveillance information was sent to identify who is spying, what information they received, and when.  

Router Recommendations From our Forensic Expert 

Sometimes we find a homeowner or a business owner that has an outdated or ineffective computer router. We will recommend you a better router to use that is more secure to prevent surveillance and provide enhanced log files for later use if surveillance is suspected. 

Remote Analysis of Internet Router
We can send you our Remote Black Box to check for surveillance on your router

Router Analysis Remotely with our Black Box

We can send our Router Black Box to do an analysis on your router remotely. When our Router Black Box arrives, give us a call. At that time, we will give you the combination to unlock the black box. Next, you will plug in the power, and your router. Then, we do the rest.  

  • Home
  • Services
  • Fees
  • Case Types
  • Events
  • FAQs
  • Links
  • Blog
  • About Us
  • Contact

Copyright © 2021

Howe Law Firm
Main (503) 227-6660
Howe@HoweLawFirm.com
Pay Your Invoice Securely with LawPay
  • Albuquerque
  • Anaheim
  • Atlanta
  • Bakersfield
  • Baltimore
  • Boise
  • Boston
  • Chicago
  • Columbus
  • Dallas
  • Denver
  • Detroit
  • El Paso
  • Fort Worth
  • Fresno
  • Houston
  • Irvine
  • Jacksonville
  • Kansas City
  • Las Vegas
  • Long Beach
  • Los Angeles
  • Memphis
  • Miami
  • Milwaukie
  • Minneapolis
  • New York
  • Oakland
  • Orlando
  • Philadelphia
  • Phoenix
  • Pittsburgh
  • Portland
  • Reno
  • Riverside
  • Sacramento
  • San Antonio
  • San Diego
  • San Francisco
  • San Jose
  • Santa Ana
  • Santa Rosa
  • Seattle
  • Spokane
  • St. Louis
  • Stockton
  • Tacoma
  • Tampa
  • Tucson
  • Vancouver
  • Washington DC
  • Facebook
  • Instagram
  • LinkedIn
  • Pinterest
  • Twitter
  • YouTube
Copyright © 2018, HoweLawFirm.com. All Rights Reserved | Privacy Statement | Terms Of Use