|Are people listening to your conversations
About this webinar
Are people listening to your conversations? Could they be reading your text messages, seeing your photos? What if someone had unlawful access to your cellular phone?
How would you know and what could you do about it?
Join us as we unpack these and related concerns in this session, which takes an in-depth look into the world of what is possible with the interception of cellular calls and data in South Africa.
Benefits of attending
Retaining your privacy always starts with understanding the basic dynamics of what is at risk, then mitigating that risk and of course being able to verify it. Learn to understand the tell-tale signs of unlawful interception. See a live device interception during the session to truly grasp how this is done and what level of access can be acquired to the device.
Unlawful Cellular interception is a concern for many businesspeople in South Africa. It is equally noted as an area of concern within divorce maters.
The dynamics of what can and cannot be intercepted are intricate and the methods of interception equally so. In exploring these, attendees will gain a broader understanding of the capabilities and warning signs, as well as the prosecution options where compromise is proven.
Outline/content of the webinar
• Introduction to cellular devices.
• What is unlawful interception?
• What is lawful interception?
• How is a cellular device intercepted?
• Demonstration of interception.
• What about cloud accounts?
• Routes into the device.
• Jailbroken/rooted devices.
• Secured devices.
• Understanding the tell-tale signs.
• Forensic analysis.
• Legal considerations.
Having left corporate IT as the National Systems Administrator for Shell Oil (ARB) some 20 years ago, Mr Pedersen opened his own company in the IT maintenance and support space. Growing from simple beginnings the company evolved to employing 20 staff members between its Cape Town and Johannesburg offices catering to maintenance and infrastructure requirements of the small and medium-sized enterprises (SME) market.
Early in the company’s evolution, it became active in the data recovery market, which ultimately evolved to what is now the company’s Digital Forensics division. Mr Pedersen’s early engagements with companies, such as Cellebrite and Magnet have ensured that the company has at all times maintained a reputation for the best of breed technologies.
Mr Pedersen tends to focus much of his time on the management of investigations within the company and developing Open-Source Intelligence paths and tools to enhance data collection and analysis abilities. He has a CFE and is a Certified Cyber Crime Investigator. He is the author of The Investigators Guide to Open-Source Intelligence and a regular speaker and lecturer on both OsInt and digital forensics.