Office or business Router Analysis cost includes a forensic download of the router configuration, options, and all available log files to analyze for surveillance, including unknown devices on the network, and security settings such as firewall, connection, network, port forwarding, port triggering, remote access, DMZ, and diagnostic settings.
Why Choose Howe Law Firm?
- As lawyers, we know how to preserve your evidence and maintain client confidentiality. In addition, with our trial experience, we make great expert witnesses when needed.
- Flat-fee services! We do not charge for travel expenses, data storage, or written reports.
- No need to send your router, we do Remote Collection.
- Need a bug sweep? Vehicle sweep for GPS trackers? Cell phone analyzed for hacking or spying? We can analyze your electronic devices and accounts to detect signs of surveillance. This includes:
Our Business Router Analysis Cost Includes:
We review the internet and computer router log files to uncover surveillance or other information. Router analysis occurs remotely, you do not have to mail us your router. Instead, we ship to you and complete the analysis remotely.
We download all of the log files into our database. We’ve written books on database programming, introducing database queries, and stored procedures. Then, we analyze and review all the data to find suspected surveillance.
All Devices that Have Connected to Business or Office Internet
A computer router will record in the internet router log files all devices that connect to the network. For example, we will see the iPhones, Android phones, and computers of anyone that has connected to the business’ internet connection.
Today, more and more devices are “internet” enabled. This means, in addition to phones and computers, there may be video equipment, alarms, and even common appliances that are accessing the internet in our homes and offices. It’s important to separate safe internet devices from “surveillance devices”. The internet router log files will identify devices accessing the internet even if they weren’t found in a physical bug sweep.
Unknown devices connected to your internet connection may be a hidden camera or microphone collecting surveillance.
Inbound & Outbound Internet Traffic
We also evaluate the computer router logs for outbound traffic. Most people when they use the internet, use inbound traffic. For example, when you check your email, you’re downloading the email. When you are visiting websites, you’re downloading website information. When you watch a Netflix, that’s N-E-T-F-L-I-X video, you’re streaming inbound traffic to your computer, phone, or tablet.
Surveillance involves uploaded traffic, not download traffic. For example, audio files, photographs, and video files are often very large files, which can be found in the computer router. If someone is spying on you through a hidden device, they are probably sending themselves those files over your internet connection.
Large amounts of outbound traffic can indicate surveillance and should be of great concern.
Can You Tell Who is Spying on Me through your Router?
Sometimes, when a client contacts us, they already suspect who is spying on them. For example, an ex-business partner, a manager, a business competitor, and many others. We’ll collect this information from you before we begin our investigation to do the most thorough job.
In analyzing the router, we often obtain the IP address of where surveillance information was sent. This helps to identify who is spying, what information they received, and when.
Router Recommendations From our Forensic Expert
Sometimes we find a business owner with an outdated or ineffective computer router. We recommend a better router to use that is more secure to prevent surveillance and provide enhanced log files for later use if surveillance is suspected.