ICS World Private Investigator Private Investigator Services Since 1967
1 (800) 828-9198 - Toll Free 24hrs
001 480-990-8888 - International
Confidential & Recommended Private Investigator Services Since 1967

Wire and Electronic Communications Crime


Wire and Electronic Communications Crime: We can help inspect your systems and operations to discover vulnerabilities as well as provide recommendations and steps to help protect your systems from attack. If you have already had problems we can help to forensically evaluate events and uncover the source.


Electronic Communications Crime

Telecommunications crime is the fraudulent use of any telephone, microwave, satellite, or other telecommunications system, either as a crime itself or as a tool in committing some other crime.

Using interstate lines of communication during the commission of a crime is a federal offense, as is the fraudulent use of those lines of communication. Technology has brought us to the point where phreaks, a term used to refer to phone hackers, can clone cell phones using over-the-counter electronic equipment, and steal other people’s cell networks for their own use. Some phreaks will use their skills to rip off telephone service providers to get free long distance or unlimited minutes on a cell phone. And while they may not target specific people, this is not a victimless crime. If you think that your phone has been compromised, or if you are a service provider and you are getting a lot of unexplained activity on your lines, then call ICS and let our experts investigate your case. We are available worldwide.

Wire and Electronic Communications Crime Information:

  • Wire and Electronic Crime Consulting Services
    • Voicemail Hacking: gaining unauthorized access to your voice mailboxes, allowing an attacker to hear voice mails and sometimes make free long distance calls using your call forwarding
    • Cellular Cloning
    • Cellular Phone Fraud: the unauthorized use, tampering, or manipulation of a cellular phone or service
      • Use of a stolen phone
      • Signing up for service using a false or stolen identity
      • Cloning a valid electronic serial number (ESN) using an ESN reader, and reprogramming another cell phone with that valid ESN number
    • Force dialing to 900 numbers or overseas charge-back numbers
    • Interception of information from voicemail boxes
    • Pager tracing
    • Leaving harassing or threatening messages
    • Defacing voicemail greetings
    • Phone line scanning to identify undocumented or uncontrolled modems connecting client computers directly to the external telephone network. These phone lines and modems are important because they may represent security holes in the organization's security perimeter.
    • Remote access to phone extensions
    • Business phone hacking
    • PBX hacking: gaining unauthorized access to your telephone system, allowing the individual to make anonymous and free phone calls
    • Phone systems penetration testing
    • Voicemail manipulation, forwarding of private messages
    • Bypassing account codes
    • Intercom hacking
    • Harassing phone calls
    • Theft of service: placing phone calls on company lines via remote access
    • Theft of telecommunication
    • Disguising personal phone usage
    • Telecommunications Training and Seminars
    • Threatening Phone call Tracing
  • Related ICS Services
    • Computer Forensic Services
    • Undercover Investigations
    • Employee Screening Programs
    • Criminal Investigation Services
    • Counterintelligence Services
    • Counter-Surveillance Service
    • Signal Piracy Auditing

ICS Experience and Expertise:

  • Operating since 1967
    • Far greater operational reach than any other investigative service in the world
    • Built through experience and expertise with a mix of law enforcement and military backgrounds
  • All services are performed and billed on an hourly basis.
  • Investigators are available 24/7.

ICS Network:

  • Global resources network for domestic and international work
  • Constantly evolving technical capabilities to adapt to advances in electronics and technology
  • Use of cutting edge technology and equipment

Implementation:

  • Free Consultation for Needs Analysis
  • Design an Action Plan
  • Engagement and Fees
  • Execute Action Plan
  • Present Thorough Documentation of All Results/Findings

Are you in need?

Wire and Electronic Communications Crime covers a wide range of crimes and activities centered around the use of telecommunications services. The crime might involve hacking and phreaking, cloning of phones, manipulation and unauthorized use of phone systems, and more. If you are getting strange activity on your bill, or you are being charged for calls you didn’t make, or any other suspicious activity is happening involving your communication lines, then call ICS immediately. These crimes may be relatively harmless in the short term, but they could lead to excessive costs and identity theft, among other more severe crimes. At ICS, we have experts available who have decades of experience detecting and neutralizing telecommunications crimes.

Please be prepared, a Free Consultation for this investigation type may request the following information:

  • What is your role?
  • Are you developing a RFI, RFP or Bid for this matter?
  • Are you or is someone in danger for life or otherwise?
  • By what date do the services need to be complete?
  • Do you have "Broadband" internet access? (DSL/CABLE/T1/OC12)
  • Do you use VoIP? (Vonage/XO/Other)
  • Is there use of computers involved?
  • Do you use voicemail?
  • What type of building is to be inspected?
  • How many locations will need to be inspected?
  • How many people are involved?
  • How many phone lines do you have?
  • How many computers are in question?
  • How may extensions and/or handsets are in use?
  • What is the total square feet of the location to be examined?
  • Are you aware of any encryption or passwords in use?
  • Have you considered counter-surveillance?
  • How many subjects may be involved?
  • Is there a civil suit pending or has been filed?
  • Was there a police report created?
  • Please understand that the funding for your case may vary depending on the complexity. So that we may help you, what range of funding would you estimate to be affordable for this matter?
  • Will you need these services on a regular or recurring basis?
  • Describe the circumstances and requirements of your case to us. Please include any and all information that may be important. Even the most minor detail can be considered helpful. (The Story)
  • If you used a search engine to find us, please type the keywords here:

See the following case studies for examples of this case type:


Leave Comment


Recent Investigation Inquiries

Origin Investigation Location
GAMBRILLS, Maryland United States
Ypsilanti, Michigan United States
Ypsilanti, Michigan United States
York, Pennsylvania
FORTWAYNE, Indiana United States
VAN DALIA , Illinois United States
Flint, Michigan United States
Marysville, Washington North Carolina
Grapevine, Texas United States
Citrus Heights, California United States

Find a Private Investigator by Closest Region

The ICS private investigator network can manage your case locally or across multiple jurisdictions. Your case will be worked by qualified and licensed private investigators where applicable. Through the innovative ICS Licensee Program, we are able to provide local private investigators in several states. Not all services are available in all areas. All private investigators can be identified upon request according to State law. Find a local Private Investigator:

Birmingham
Huntsville
Mobile
Montgomery
Tuscaloosa
Anchorage
Surprise
Chandler
Flagstaff
Glendale
Mesa
Peoria
Phoenix
Scottsdale
Tempe
Tucson
Little Rock
Anaheim
Antioch
Bakersfield
Berkeley
Beverly Hills
Burbank
Carlsbad
Chula Vista
Clovis
Corona
Costa Mesa
Daly City
Downey
East Los Angeles
El Cajon
El Monte
Elk Grove
Escondido
Fairfield
Fontana
Fremont
Fresno
Fullerton
Garden Grove
Glendale
Hayward
Huntington Beach
Inglewood
Irvine
Lancaster
Long Beach
Los Angeles
Modesto
Moreno Valley
Murrieta
Oakland
Oceanside
Orange
Orange County
Oxnard
Palmdale
Pasadena
Pomona
Rancho Cucamonga
Rialto
Riverside
Roseville
Sacramento
Salinas
San Bernardino
San Buenaventura
San Diego
San Francisco
San Jose
San Mateo
San Bernardino
San Diego
San Francisco
San Jose
Santa Ana
Santa Clara
Santa Clarita
Santa Maria
Santa Rosa
Santa Ana
Simi Valley
Stockton
Sunnyvale
Temecula
Thousand Oaks
Torrance
Vallejo
Visalia
Vista
West Covina
Aurora
Colorado Springs
Denver
Fort Collins
Greeley
Thornton
Westminster
Bridgeport
Greenwich
Hartford
New Haven
Stamford
Waterbury
Dover
Wilmington
Washington
Cape Coral
Clearwater
Coral Springs
Davie
Fort Lauderdale
Fort Lauderdale
Gainesville
Hollywood
Jacksonville
Lakeland
Miami
Miami Gardens
Orlando
Pembroke Pines
Pompano Beach
St Petersburg
Tallahassee
Tampa
West Palm Beach
Athens
Atlanta
Augusta
Columbus
Marietta
Sandy Springs
Savannah
Hilo
Honolulu
Kailua
Maui
Oahu
Boise
Addison
Aurora
Chicago
Elgin
Joliet
Kankakee
Naperville
Oak Park
Peoria
Rockford
Schaumburg
Springfield
Waukegan
Evansville
Fort Wayne
Gary
Indianapolis
South Bend
Terre Haute
Cedar Rapids
Davenport
Des Moines
Kansas City
Olathe
Overland Park
Topeka
Wichita
Frankfort
Lexington
Louisville
Baton Rouge
Lafayette
Metairie
New Orleans
Shreveport
Augusta ME
Portland
Annapolis
Anne Arundel County
Arnold
Baltimore
Chevy Chase Village
Severna Park
Silver Spring
Boston
Cambridge
Lowell
Springfield
Worcester
Ann Arbor
Dearborn
Detroit
Flint
Grand Rapids
Lansing
Sterling Heights
Warren
Apple Valley
Duluth
Minneapolis
St Paul
Jackson
Branson
Columbia
Florissant
Independence
Jefferson City
Kansas City
Springfield
St Louis
Billings
Lincoln
Omaha
Carson City
Henderson
Las Vegas
North Las Vegas
Paradise
Reno
Spring Valley
Sunrise Manor
Manchester
Edison
Elizabeth
Jersey City
Jersey City
Newark
Paterson
Trenton
Albuquerque
Las Cruces
Albany
Brooklyn
Buffalo
New York City
Rochester
Syracuse
Yonkers
Cary
Charlotte
Durham
Fayetteville
Greensboro
Raleigh
Winston Salem
Winston Salem
Bismarck
Fargo
Akron
Canton
Cincinnati
Cleveland
Columbus
Dayton
Marietta
Sandusky
Steubenville
Toledo
Youngstown
Broken Arrow
Norman
Oklahoma City
Tulsa
Bend
Eugene
Gresham
Hillsboro
Portland
Salem
Allentown
Bethlehem
Erie
Gettysburg
Harrisburg
Hershey
Norristown
Philadelphia
Pittsburgh
Providence
Charleston
Columbia
North Charleston
Sioux Falls
Sioux Falls
Brentwood
Chattanooga
Clarksville
Davidson County
Gallatin
Knoxville
La Vergne
Memphis
Mount Juliet
Murfreesboro
Nashville
Smyrna
Abilene
Amarillo
Austin
Beaumont
Carrollton
College Station
Corpus Christi
Dallas
Denton
El Paso
Fort Worth
Frisco
Grand Prairie
Houston
Killeen
League City
Lewisville
Lubbock
McAllen
Mesquite
Odessa
Pearland
Plano
Richardson
Round Rock
San Angelo
San Antonio
Tyler
Waco
Wichita Falls
Ogden
Provo
Salt Lake City
West Jordan
West Valley City
Burlington
Alexandria
Arlington
Chesapeake
Fairfax
Hampton
Newport News
Norfolk
Northern Virginia
Richmond
Roanoke
Virginia Beach
Bellevue
Everett
Olympia
Renton
Seattle
Spokane
Tacoma
Vancouver
Charleston
Green Bay
Madison
Milwaukee
Cheyenne
Calgary
Edmonton
Strathcona County
Abbotsford
Kelowna
Vancouver
Victoria
Brandon
Portage La Prairie
Steinbach
Winnipeg
Fredericton
Moncton
Saint John
Conception Bay South
Corner Brook
Gander
St Johns
Yellowknife
Amherst
Cape Breton
Halifax
Iqaluit
Barrie
Brampton
Chatham Kent
Guelph
Hamilton
Kingston
Kitchener
London
Mississauga
Oshawa
Ottawa
Peterborough
St Catharines
Sudbury
Thunder Bay
Toronto
Windsor
Charlottetown
Summerside
Gatineau
Laval
Longueuil
Montreal
Quebec City
Saguenay
Sherbrooke
Trois Rivieres
Prince Albert
Regina
Saskatoon
Whitehorse
Beijing
Chongqing
Hong Kong
Macao
Shanghai
Tianjin
Barranquilla
Bogota
Cali
Cartagena
Medellin
Pereira
San Salvador
Bangalore
Chennai
Delhi
Hyderabad
Kolkata
Mumbai
Kiev
Sevastopol
Abu Dhabi
Dubai
Limon
Puntarenas
San Jose

Copyright © 2024 International Counterintelligence Services, Inc. All rights reserved.