Home Router Analysis cost involves using our Router Black Box to forensically collect the router’s settings configuration and log files. Then, we analyze the data collected and provide our findings and recommendations in a written report. We may monitor activities remotely for a few days to improve the chance of finding surveillance and catching the suspect.
Reasons for a Home Router Analysis
The most common means for a suspect to retrieve the information gathered from a hidden camera or microphone in your home is through the home’s internet router. This is especially true if the suspect had easy access to the home, such as an ex-partner, roommate, or contractor. When a suspect relies upon the home’s internet connection to transmit the surveillance information, we can frequently identify the type of device, as well as where the information is going, and thereby identify the suspect.
Gather Evidence & Identify Suspects
From the log files, we can determine:
- All devices that connected to the home’s internet router during that period. Thus, even if a device has since been removed, if it was connected during the router’s information retention period, we will have that history.
- Levels of inbound and outbound internet traffic. This analysis can indicate signs of surveillance as well as potentially locate the suspect to where information is being sent.
Look for Vulnerabilities
We also identify vulnerabilities and recommend more secure settings by evaluating your router’s settings configuration. We may even recommend a more secure router.
Combining an internet router analysis with a home bug sweep provides a robust investigation. However, many of our clients choose to start with the internet router analysis before moving on to the home bug sweep. Call us if you have questions about what makes the most sense for your situation.
Why Choose Howe Law Firm?
We are lawyers, TSCM counter surveillance experts, computer forensic experts, and mobile forensic experts. This experience provides you with professional and comprehensive counter surveillance services for the best results. We’ve written books on database programming, introducing database queries, and stored procedures. We analyze and review all the data to find suspected surveillance.
- We are lawyers. We know how to preserve your evidence and maintain client confidentiality. In addition, with our trial experience, we make great expert witnesses when needed.
- Flat-fee services! No charge for travel expenses, data storage, or written reports.
- Remote Router Services. No need to send your router or have anyone visit your home, we ship our Router Black Box do Remote Collection.
- Computer & Mobile Forensic Experts. There is more we can do to analyze all your electronic devices and accounts for signs of surveillance:
- Comprehensive Services. For a deeper investigation into surveillance concerns, we also offer home bug sweeps, vehicle sweeps, boat sweeps, and airplane sweeps for hidden cameras, microphones, and GPS trackers.
Our Home Router Analysis Cost Includes:
Our home router analysis includes a forensic download of the router configuration, options, and all available log files to analyze for surveillance. In addition, we evaluate security settings such as firewall, connection, network, port forwarding, port triggering, remote access, DMZ, and diagnostic settings. We download all of the log files into our database and retain them for evidentiary purposes.
Electronic surveillance detection also involves looking at unknown devices on the home network and incoming and outgoing internet traffic (e.g. transfer of video files, photos, audio files, and other information to the suspect).
At the end of our analysis, we will provide a written report with our findings and recommendations. You can read more about our analysis below.
Is Your Computer Router Being Used to Spy on You?
When someone conducts surveillance, they are trying to collect certain information about their target. Frequently, this information includes communications in text messages, phone calls, or emails. However, they could also be eavesdropping on conversations or secretly taking photos or videos with hidden cameras and microphones. If so, how are they getting the information? Generally, transmission data is available through the routers’ log files. A router analysis can detect surveillance by identifying hidden spy devices on your network.
Decades ago, to get this information, a person would sit in a vehicle down the street, eating donuts and drinking bad coffee, while trying to overhear conversations using archaic surveillance equipment. Today, getting this information is relatively simple and easy. Using readily available hidden equipment, like cameras, microphones, and GPS trackers, someone can record this information.
Once the surveillance information is recorded, it needs to be transmitted to the individual. Frequently, people use a cellular connection on a mobile phone to send the information. However, surveillance information is also transmitted to an individual using the internet via the home or business computer router.
For this reason, when doing a bug sweep of a home or office, we recommend router analysis to detect surveillance. As computer forensic experts, we check all the settings on your router to make sure your router is secure and determine whether or not there has been any exploits or surveillance.
Is Your Computer Router Being Used to Spy on You?
Information We Can Find in Computer Router Log Files
The information retained through a home router varies by model and manufacturer. However, frequently router log files go back 90 days, allowing us to detect surveillance and gather evidence from before we conduct our analysis. The information we can gather is explained more fully below.
All Devices that Have Connected to Home or Office Internet
An internet router will record in the internet router log files all devices that connect to the network. For example, we often see your friends and family members’ iPhones, Androids, tablets and computers. Essentially, any device that has connected to the home’s internet connection.
Today, the devices connected increasingly includes the growing list of internet-enabled devices. This means, in addition to phones and computers, there may be home security systems, thermostats, smart speakers, and even refrigerators accessing the internet in our homes. It’s important to separate safe internet devices from “surveillance devices.” The internet router log files will identify devices accessing the internet even if they weren’t found in a physical bug sweep.
Unknown devices connected to your internet connection may be a hidden camera or microphone collecting surveillance.
Inbound & Outbound Internet Traffic
We also evaluate the computer router logs for outbound traffic. Most people use inbound traffic when they use the internet. For example, you download website information when reading news or shopping online. Similarly, you stream inbound traffic to your computer, phone, or tablet when watching a Netflix video.
Surveillance involves uploaded traffic, not download traffic. For example, audio files, photographs, and video files are often very large files that can be sent through the computer router. If someone is spying on you through a hidden device, they are probably sending themselves those files over your internet connection.
Large amounts of outbound traffic can indicate surveillance and should be of great concern.
Can You Tell Who is Spying on Me through your Router?
Sometimes, when a client contacts us, they already suspect who is spying on them. For example, an ex-partner, a neighbor, or even an obsessed acquaintance. This information can help target our investigation to identify the most likely sources of evidence.
In analyzing the router, we often obtain the IP address of where surveillance information was sent. This helps to identify who is spying, what information they received, and when.
Router Recommendations From our Forensic Expert
Sometimes we find a homeowner with an outdated or insecure router. We recommend a better router to use that is more secure to prevent surveillance and provide enhanced log files for later use if surveillance is suspected.
Router Analysis Remotely with our Black Box
We can send our Router Black Box to do an analysis on your router remotely. When our Router Black Box arrives, give us a call. At that time, we will give you the combination to unlock the black box. Next, you will plug in the power and your router. Then, we do the rest.
Home Router Analysis Services Near Me
With offices around the country and our remote collection unit, we serve the entire United States. For example, we frequently work in Los Angeles, New York, Chicago, Washington DC, Seattle, Orlando, and surrounding communities.