Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Forensic Lunch - Forensic / Malware Analyst's Life & Career

 

Rating :

 

Comments

 
  • nbodyk
    nbodyk at April 18,2015
    This video is boring and it's too long. This guy needs to get to the point of the discussion. Anyway people have been listing in to cellphone conversations for years, then there's the embarrassing reveal two years ago of the NSA spying on cellphone conversations for years.
  • mrgodfrey3
    mrgodfrey3 at June 26,2015
    I dont beleive the NSA was spying on cell phone conversations - just sifting thru metadata. Great video and very informative.
  • jhilldog77
    jhilldog77 at December 03,2015
    Interesting that the GSM base tower picks all of the settings to instruct the handset - I thought it was the other way around. For a couple thousand dollars you can intercept phone calls and meta data associated with those hand held devices and networks. IMSI catchers are being used by local police and intel agencies but does raise serious civil liberties and privacy issues.
  • sagarwa9
    sagarwa9 at December 11,2015
    Long but informative video. Cell phone spying is not something unheard or uncommon practice. Law enforcement agencies use it to tap suspect's phones.
  • CCotton10
    CCotton10 at March 04,2016
    As pointed out, I don't think most people know anything about the GSM base tower picking up the cell phone settings and instructing the handset. I also don't think most are aware that police and intel are listening in on some conversations. It was an interesting demo but took awhile to demonstrate the point.
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved