Wireless Network Surveillance
How does our Wireless Network Detection work?
Namely, without sending any loggable packets (secretly), it is able to detect the presence of both wireless access points and wireless clients and to associate them with each other. We do this by using some of the best wireless monitoring tools available. In simple terms, we can capture all secured and unsecured wireless routers and sync them to a geographical map depicting their general location.
How is this used?
Wireless Network Surveillance can be used to solidify a case and negate defenses such as third party access of their internet through an unsecured network. Wireless Network Surveillance can also capture devices connected to the wireless access point at the time of the surveillance, identifying the physical presence of a device. This is beneficial for a wide variety of investigations such as, identity theft, contraband possession, drug trafficking, domestic violence, and many more.
Disclaimer:
Please note: It is almost always illegal to connect to another person’s wireless network unless you have permission to use it. The internet subscriber is paying for the internet access; therefore, it may be no different than stealing something from their home. There are some locations that offer free WiFi such as coffee shops and library's where use is permitted.
Namely, without sending any loggable packets (secretly), it is able to detect the presence of both wireless access points and wireless clients and to associate them with each other. We do this by using some of the best wireless monitoring tools available. In simple terms, we can capture all secured and unsecured wireless routers and sync them to a geographical map depicting their general location.
How is this used?
Wireless Network Surveillance can be used to solidify a case and negate defenses such as third party access of their internet through an unsecured network. Wireless Network Surveillance can also capture devices connected to the wireless access point at the time of the surveillance, identifying the physical presence of a device. This is beneficial for a wide variety of investigations such as, identity theft, contraband possession, drug trafficking, domestic violence, and many more.
Disclaimer:
Please note: It is almost always illegal to connect to another person’s wireless network unless you have permission to use it. The internet subscriber is paying for the internet access; therefore, it may be no different than stealing something from their home. There are some locations that offer free WiFi such as coffee shops and library's where use is permitted.
This service is restricted and not available for some applications.