Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Forensic Lunch - Forensic / Malware Analyst's Life & Career

 

Rating :

 

Comments

 
  • tparry2
    tparry2 at December 13,2017
    I was aware that this kind of eavesdropping was possible, but seeing it demonstrated in person with everyday , easy to access product, was amazing. With the patriot act, this type of government or police spying has been know and controversial in the news.
  • agoel5
    agoel5 at December 13,2017
    I thought it was funny how many iphones were connecting to the device he had, especially since everyone has an iphone. The speaker addressed some key points on cell phone security and the possible ways to intercept phone calls.
  • estrano
    estrano at December 14,2017
    It's crazy how he's able to have the people connect to his network without it even being broadcasted. Also, it's funny how he calls out iPhones and how they easily connect to everything. So true!
  • Jwiley5
    Jwiley5 at December 14,2017
    A lot of this information in this video is antiquated and the technologies have been updated. At the time of this video I do believe this was ground breaking to the people who weren't aware of this but when this video was made the NSA had already been intercepting and monitoring calls. The device revealed that was being used was what is know as a sting ray.
  • bdgentile
    bdgentile at December 14,2017
    Cellular spying is always a topic of interest because it hit's people where the're sensitive. I have always been really interested in law enforcement cases where Stingray is used.
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved