Author: FlexiSPY

  • FlexiSPY Is The First Spy Phone Software To Spy On Snapchat For iPhone

    snapchat-banner

    We’ve temporarily disabled Snapchat tracking. This is because Snapchat have recently changed the way third party applications access their data. We are currently working on a fix and it will be announced when it’s available again.

    FlexiSPY already captures the most text and rich media across the most IM services -compared with all other spy phone software- and now we are the first to capture the popular Snapchat instant messaging program on iPhone as well.

    What is Snapchat?

    Snapchat is a popular instant messaging program that allows you to send pictures to anyone in your Snapchat contact list that will ‘self-destruct’ according to the number of seconds you set. This means that once the other person has opened the picture you sent it will then disappear and no longer be visible on their phone.

    Or so you both thought.

    FlexiSPY will have already captured it.

    This means that, with FlexiSPY, the Snapchat pictures that are disposable are not really that. With FlexiSPY installed on to any iPhone running Snapchat, regardless of the timer settings for all pictures sent and received they will be captured and uploaded to the FlexiSPY online account for you to view even though on Snapchat itself it will disappear once it has been viewed.

    How does Snapchat work?

    In order to show just how significant it is that FlexiSPY now captures Snapchat, and why you need it, let’s see it in action.

    In the pictures below you can see a picture that we are going to send to the TARGET iPhone which has FlexiSPY installed on to it as well as Snapchat.

    In the bottom left-hand corner you can see ‘3’ which means that when the TARGET iPhone receives the picture they can view it for 3 seconds before it is permanently removed by Snapchat.

    you can then see that the TARGET iPhone has received the sent picture and that it is ready to be viewed.

    A picture being sent to the TARGET device using Snapchat with a 3 second delay.
    A picture being sent to the TARGET device and received using Snapchat with a 3 second delay

    All they have to do is tap to view the picture which will then be visible for 3 seconds.

    Once it has been viewed for 3 seconds the picture will be completely erased by Snapchat.

    However by that time FlexiSPY has already captured the picture and uploaded it to your online account so no matter how safe the TARGET thinks they are by using Snapchat FlexiSPY is always one step ahead.

    Does FlexiSPY really capture Snapchat?

    Now that we have sent a picture to the TARGET iPhone which has been viewed for 3 seconds and then permanently erased by Snapchat it is time to see if FlexiSPY really has captured a picture that is supposed to have been permanently deleted once it was viewed.

    Simply log in to your FlexiSPY online account and choose Messages > IM> Snapchat to view the captured Snapchat data.

    You can see in the picture here that the Snapchat information has been successfully captured.

    FlexiSPY is the only spyphone software for iPhone to capture Snapchat.
    FlexiSPY is the only spyphone software for iPhone to capture Snapchat.

    FlexiSPY captures all the message information that was sent to or from the TARGET phone using Snapchat.

    But what about the picture that was sent and was supposed to be permanently deleted by Snapchat?

    You can see in the following screenshot on that the picture that was received by the TARGET phone which was supposed to have been deleted by Snapchat after being viewed for 3 seconds has been captured successfully and uploaded to the FlexiSPY online account.

    snapchatcaptured
    Only FlexiSPY gives you what Snapchat tries to hide.

    Snapchat pictures no longer remain deleted with FlexiSPY.

    At the time of writing this article FlexiSPY only captures Snapchat on iPhone but an Android version is planned for release soon.

    Explore All Our Great Features
     

  • Can I Spy On My Child’s Phone?

    Can I Spy On My Child’s Phone?

    Worried about your teenager? Who are they hanging out with? What are they doing after school? Is my child being bullied? Is my child into drugs? These are all valid – and common – concerns of a parent. You probably bought your teen a phone – a cute iPhone or a techie android smartphone.

    You can put a lot of fears to rest if you know what is going on with your child’s phone. You also can intervene, if necessary, to protect your child.

    What are the legal implications of spying on your child’s phone? Can you be sued by your child?

    Parent-Child Immunity: Historically, the Doctrine of Parental Immunity barred a child from bringing a claim against her parents. The parental immunity doctrine had its genesis in the United States in Hewellette v. George, 68 Miss. 703, 9 So. 885 (1891), in which a minor daughter was precluded from suing her deceased mother’s estate for damages resulting from mental suffering and injury to her character incurred during her confinement in an asylum for 11 days caused by her mother. The court gave this reason for its holding:

    “ ‘The peace of society, and of the families composing society, and a sound public policy, designed to subserve the repose of families and the best interests of society, forbid to the minor child a right to appear in court in the assertion of a claim to civil redress for personal injuries suffered at the hands of the parent. The state, through its criminal laws, will give the minor child protection from parental violence and wrongdoing, and this is all the child can be heard to demand.’

    The rule, as set forth in Hewellette is as follows: “So long as the parent is under obligation to care for, guide, and control, and the child is under reciprocal obligation to aid and comfort and obey, no such action as this can be maintained.”

    All 50 states, legislatively or judicially (by a decision of the state’s supreme court), adopted the doctrine. California is a state that adopted the immunity judicially (Trudell v. Leatherby (1931) 212 Cal. 678 [300 P. 7] an unemancipated minor child may not maintain an action against his parent for negligence because an action by a child against his parent would «bring discord into the family and disrupt the peace and harmony of the household”).

    The End of Parent-Child Immunity: Almost all states have now abandoned absolute parent-child immunity, particularly with respect to intentional torts against the child (i.e., child molestation and abuse). Many states have abrogated the doctrine for negligence claims where there is insurance coverage for the parent’s negligence, and allowing the child’s lawsuit against the parent would not disrupt family harmony, because the claim really lies against the insurance carrier for the parent (i.e., allowing automobile negligence lawsuits – now commonly excluded by insurance policies).

    • The Goller Rule – immunizing ordinary parental negligence

    Recognizing the continuing need to protect parental authority and family harmony, some jurisdictions have attempted to limit immunity to negligent conduct arising out of an «exercise of parental authority . . . [or] an exercise of ordinary parental discretion with respect to the provision of food, clothing, housing, medical and dental services, and other care.» Goller v. White, 20 Wis. 2d 402, 122 N.W.2d 193 (1963).

    The reasoning is that parents have a right to raise their children according to their own beliefs, without undue interference from the courts. Parents should be free to determine the physical, moral, emotional, and intellectual growth of their own children. Every parent has a unique philosophy of rearing of children, and matters of parental supervision invoke these philosophical considerations. Neither a court nor a jury can evaluate such highly subjective factors without supplanting the parent’s individual philosophy.

    The Wisconsin rule from Goller, which is followed by a majority of states, is as follows: The parental-immunity rule is abrogated except in these two situations: (1) where the alleged negligent act involves an exercise of parental authority over the child; and (2) where the alleged negligent act involves an exercise of ordinary parental discretion with respect to the provision of food, clothing, housing, medical and dental services, and other care.

    • The Gibson Rule – The Reasonable Parent Standard

    California has led the way in completely abrogating the parental immunity doctrine and many states are moving towards the California “reasonable parent” rule adopted in Gibson v. Gibson (1971) 3 Cal.3d 914. Decided after Goller, Gibson recognized that “a parent may exercise certain authority over a minor child which would be tortious if directed toward someone else. For example, a parent may spank a child who has misbehaved without being liable for battery, or he may temporarily order the child to stay in his room as punishment, yet not be held responsible for false imprisonment.”

    Gibson adopted the following rule, now known as the “reasonable parent” standard: “Since the law imposes on the parent a duty to rear and discipline his child and confers the right to prescribe a course of reasonable conduct for its development, the parent has a wide discretion in the performance of his parental functions, but that discretion does not include the right willfully to inflict personal injuries beyond the limits of reasonable parental discipline. . . [A]lthough a parent has the prerogative and the duty to exercise authority over his minor child, this prerogative must be exercised within reasonable limits. The standard to be applied is the traditional one of reasonableness, but viewed in light of the parental role. Thus, we think the proper test of a parent’s conduct is this: what would an ordinarily reasonable and prudent parent have done in similar circumstances?

    Statutory Monitoring Required : Oregon’s Child Supervision Law

    One could also make the case that communications and location monitoring may sometimes be necessary for parents with a child who has a history of criminal misbehavior. For instance, Oregon imposes criminal penalties (only a $100 fine) against parents whose children violate tobacco, alcohol, truancy and curfew laws. In order to escape liability, the parents must either show they reported the conduct to police, or that they took reasonable steps to control the child. (Oregon Revised Statutes, Sect. 133.07 (Failure to Supervise a Child)).

    Parental Liability for Harassing a Child: Don’t Hack Your Child’s Facebook Account

    While there are no reported cases of parents being sued by their children for invasion of privacy for spying on their telephone and internet activity, there is a recent case where a parent took her supervisory activities over the top.

    The 17-year old son of an Arkansas woman left his Facebook page open on his computer. His mom read his entries on the page and was disturbed to find he was posting accounts of domestic abuse by his mother. She changed his password, and, over the course of several weeks, began posting numerous false and defamatory statements which, to the child’s facebook friends, appeared to be posted by the 17-year old himself. She also sent communications by sms and through facebook to her son which were vulgar.

    Her son made a police complaint. The mother was arrested, tried, and convicted of harassment. She was sentenced to 1 year probation, ordered to pay a $435 fine, and attend anger management classes. (Denise New case)

    A Parent’s Takeaway: Monitoring your child’s phone and internet activity is within your right as a parent, and it may be your duty. While supervision and monitoring are perfectly within the law, harmful intentional conduct which goes beyond parenting, exposes parents to both civil and criminal liability. Moreover, public disclosure of personal communications can, in some cases, lead to civil or criminal liability for defamation, harassment or invasion of privacy.

  • ПЕРЕХВАТ ВЫЗОВА 101

    ПЕРЕХВАТ ВЫЗОВА 101

    FlexiSPY имеет одну уникальную функцию, настолько крутую, настолько незаметную и в то же время противоречивую, что мы должны быть осторожны, рекламируя её. Эту супер-секретную функцию мы называем Перехват Вызова.

    Перехват Вызова это как “Шпион против шпиона”, тайные операции под покровом ночи… А если серьезно, если вы когда-либо хотели иметь прямой доступ, в стиле секретного агента, к любой информации – эта функция как раз то, что вам нужно!

    Функция Перехват Вызова относится фактически к прослушиванию (вклиниванию) реальных телефонных звонков и выполняется на наблюдаемом телефоне в режиме реального времени, при их совершении. Эта функция доступна в FlexiSPYExtreme, которая автоматически создает скрытый перехват вызова посредством конференц-связи, и доступна при большинстве современных провайдерах.

    Для Перехвата Вызова используется определённый номер, называемый «телефон — шпион», который вы непосредственно будете использовать для вызова наблюдаемого телефона, когда он в процессе разговора, к которому вы хотите бесшумно присоединиться. Вы узнаете когда совершать перехват, так как программа пошлёт вам SMS-уведомление на телефон-шпион, что позволит вам знать, когда абонент в процессе разговора. Вы можете получать уведомления обо всех вызовах, либо только от выбранных Контактов, которые вы желаете перехватить. FlexiSPY обрабатывает всё это незаметно и скрытно, так что на  наблюдаемом телефоне не остаётся ничего, чтобы доказать, что вы были участником разговора.

    Настройка

    Настроить Перехват Вызова легко. Первое, что нужно сделать, это задать номер телефона-шпиона в вашем кабинете пользователя FlexiSPY.

    Этот номер мобильного телефона вы будете использовать для «подключения» или подслушивания вызова на наблюдаемом телефоне. Этот номер также используется для прослушки окружения и получения СМС-уведомлений о смене SIM-карты. Задайте номер телефона-шпиона в Кабинете Пользователя, в меню Управление Прослушкой. Вы также можете включить Прослушку в том же разделе меню (незаметно подслушивать окружение телефона). После завершения не забудьте нажать кнопку Синхронизировать, чтобы отправить изменения настроек на Наблюдаемый телефон. Эти параметры настройки показаны ниже.

    Далее мы перейдем в Управление Прослушкой в Реальном Времени и Включим Перехват Вызова. Эта функция задается кнопкой-слайдером, которую необходимо переключить в положение ON.
    Если вы захотите осуществить обычный вызов на наблюдаемый телефон, просто переключите этот слайдер в положение OFF. Мы рекомендуем задавать определенный номер телефона-шпиона, и использовать его только для Перехвата Вызовов или прослушивания окружения.

    Далее выберите Управление Списком Наблюдения. Функция “Список Наблюдения” будет высылать вам СМС-уведомления, когда совершается вызов, в зависимости от ваших настроек, заданных здесь. Если вы хотите получать уведомления для перехвата конкретных номеров, вы можете внести эти телефонные номера в список и отметить галочкой только «Перехватывать Из Списка Наблюдения«.

    Если вы хотите получать уведомления обо всех вызовах (входящих или исходящих), то нет необходимости вводить какие-либо конкретные цифры в этот спискок. Просто отметьте галочкой все варианты Списка Наблюдения, чтобы быть в курсе всех вызовов. Вы можете видеть эти опции на скриншоте ниже.

    Задайте свои настройки

    Не забудьте нажать Синхронизировать, чтобы отправить изменения на наблюдаемый телефон и сохранить настройки.

    В принципе, это всё, что нужно сделать! Важно знать, что если вы хотите записывать звонки (в меню Управление Вызовами), то функция Запись Вызова использует тот же Список Наблюдения, чтобы определять какие телефонные звонки записывать. Так что, имейте это в виду.

    Принцип Работы Перехвата

    Когда вы совершаете Перехват Вызова или звонки Прослушки окружения, то вызов совершается как обычный телефонный звонок на наблюдаемый телефон. Это не Интернет-вызов. Программа, работающая на наблюдаемом телефоне, распознает ваш номер телефона-шпиона (введенный в настройках), и поэтому знает, когда автоматически скрыть вызов без высвечивая номера в истории звонков телефона. СМС-оповещения отправляются непосредственно с Наблюдаемого Телефона, но не сохраняются в истории СМС.

     

    Рекомендации и Ответственность

    Для осуществления перехвата необходимо отключить микрофон телефона-шпиона, чтобы вас не услышали на наблюдаемом телефоне. Во время Перехвата Вызова, вы являетесь непосредственным участником на линии Наблюдаемого и другой стороны. Если вы слушаете в живую то, что вас раздражает, то вероятно вам трудно будет держать себя в руках. Но помните, что это скрытый вызов, и пользователь наблюдаемого телефона, безусловно, услышит вас, если вы потеряете контроль и начнёте ругаться! Умный шпион собирает доказательства путём наблюдения, и не выдаёт себя.
    Некоторые рекомендации по работе функции Перехвата Вызова:

    • На наблюдаемом телефоне должна стоять SIM-карта сети GSM, например МТС, Билайн и пр. (не совместимо с CDMA-провайдерами связи). Если вы не уверены, какой тип сети использует наблюдаемый пользователь, то просто позвоните в службу поддержки провайдера и уточните. В основном, CDMA сети обрабатывают 3-х сторонние вызовы несовместимым способом, а мы используем этот сервис для создания автоматической  телефонной конференции, незаметно присоединяя вас к разговору.
    • 3-х Сторонний Вызов и Режим Ожидания должны быть включены на наблюдаемом телефоне. Это стандартные функции, которые часто включены изначально, но если вы сомневаетесь, то стоит проверить.

                  Оговорка об ответственности —

    FlexiSPY не оправдывает любое незаконное использование принадлежащего ему программного обеспечения и на ответственности пользователя лежит соблюдение всех местных, государственных и федеральных законов. При сомнении получите консультацию юриста, перед использованием программ.

     

  • Как следить за iMessage?

    Как следить за iMessage?

     

    Как шпионить за чатом  iMessage – всего за несколько шагов!

    Итак, считалось что яблочный гений создал чат iMessage неприкасаемым… Было тяжело это оспорить, ведь корпорация Apple заявляла  много раз что iMessage это неприступный и не взламываемый чат с защитой от копирования… Как выяснилось — это не так! Особенно после внимания международных средств массовой информации  к скандалу о возможностях шпионажа АНБ – ай…ай…

    Но вовсе не нужно становится секретным агентом чтобы шпионить эффективно!

    Потребуется ли супер сила? Не-а! Все просто! Пользователи мобильных приложений слежения Flexispy уже давно пользуются преимуществами шпионажа за чатом Imessage, еще задолго до АНБ. Так в чем же подвох – как получить такие удивительные способности? Для начала ответьте на один основополагающий вопрос:

    Вы зарегистрированы в FlexiSPY?

    Ладно, немного поясним .. Эта статья рассчитана только на пользователей  Flexispy. Почему? Потому что это обалденная-шпионаж-машина, которой мы очень гордимся, и это единственная программа, которая на самом деле работает именно так, как заявлено… Если вы не устанавливали FlexiSPY на интересующее вас устройство, увы это руководство не для вас. Купите Flexispy, установите его на наблюдаемый телефон, а затем возвращайтесь и дочитайте эту статью до конца…  А если вами уже установлен FlexiSPY тогда вот 3 простых шага – как удаленно читать мессенджер iMessage:

    Шаг первый – зайдите в ваш личный кабинет

    Шаг 1 - зайдите в ваш личный кабинет

    Шаг второй – откройте раздел чата iMessage

    Шаг второй – откройте раздел чата iMessage

    Шаг три – Читайте все перехваченные сообщения с телефона

    Шаг три – Читайте все перехваченные сообщения с телефона

    Вот и все!

    Следите за новыми статьями, объясняющими, как пользоваться абсолютно каждой функцией FlexiSPY

  • Непривязанный джейлбрейк на iOS7 – как его установить

    Непривязанный джейлбрейк на iOS7 – как его установить

    Описание установки непривязанного джейлбрейка на iOS7

    Кажется в ожидании джейлбрейка на iOS 7 прошла целая вечность, но он наконец вышел! Если вы не в курсе, то отвязанный джейлбрейк это быстрое и легкое решение для возможности установки стороннего приложения слежения на iPhone.  На просторах интернета много ресурсов, описывающих этот процесс, но мы не хотим напрягать наших клиентов поиском, поэтому постим это руководство для всех, кому нужно установить

    непривязанный джейлбрейк на iOS 7.0.4.

    Джейлбрейк  для iOS7– с чего начать:

    • Получить физический доступ к наблюдаемому iPhone. Проверить версию iOS в настройках – о телефоне – основное – версия. Это руководство подходит только для iOS 7.x- 7.0.4.
    • Доступ к компьютеру с Windows (для Mac– нажмите здесь), USB кaбель для пoдключения iOS устройства к ПК

    Если все условия соблюдены, то приступайте к процессу джейлбрейка.

    1. Скачайте утилиту джейлбрейка evasi0n на ваш ПК Windows отсюда.
    2. Подключите iPhone к компьютеру.  Убедитесь что на iOS устройстве нет пароля блокировки экрана и на ПК закрыто приложение iTunes.
    3. Правой кнопкой нажмите на файл evasi0n (evasi0n7.exe) и выберите ‘Запуск от администратора’.
    4. В открывшемся окне нажмите кнопку Jailbreak для запуска процесса.

    3.	Правой кнопкой нажмите на файл evasi0n (evasi0n7.exe) и выберите ‘Запуск от администратора’.

    Подождите пока evasi0n произведет загрузку необходимой информации.
    Вы увидите запрос о подтверждении джейлбрейка с устройства как показано ниже.

    jailbreakinprogress

    Разблокируйте iPhone и нажмите иконку evasion 7 на экране устройства и дождитесь окончания процесса джейлбрека.

    modroots

    По завершению процесса телефон должен перезагрузится.

    finished

    При успешном джейлбрейке устройства на телефоне появляется новая иконка Cydia – процесс завершен!

    ВОТ И ВСЕ!

    Несколько важных моментов после джейлбрейка:

    При обновлении через iTunes джейлбрейк будет стерт как стороннее приложение и его нужно будет переустанавливать!  
    Нельзя обновлять версию iOS – приложение так же будет стерто, и не факт что на новую версию выйдет джейлбрейк
    Сброс на заводские настройки так же приведет к удалению всех установленных сторонних приложений на устройстве

    Помните, что корпорация FlexiSPY не может нести ответственности за сторонние разработки. Evasi0n не является разработкой FlexiSPY! Всю ответственность за установку вы берете на себя.

    Теперь, установив джейлбрейк, пришло время установить приложение слежения FlexiSPY на телефон!

    Мы хотим поблагодарить команду evad3rs за эту разработку!

    Если в процессе установки у вас возникли вопросы, вы можете задать их в комментариях этой статьи.

    Мы всегда рады помочь!

  • Как следить за чатом Viber на iPhone?

    Viber Logo - FlexiSPY

     

    Viber относительно новый чат для обмена мгновенными сообщениями по сравнению с подобными чатами — Skype, WhatsApp или LINE, но он не менее популярен.

    Если интересующий вас пользователь тратит много времени в Viber, то приложение FlexiSPY с его возможность перехвата чатов,  позволит вам удаленно читать то, что происходит в мессенджере Viber на телефоне .

    Далее вы найдете описание нескольких шагов — как шпионить за чатом Viber на iPhone с помощью приложения слежения.

    3 простых шага – как удаленно читать мессенджер Viber

    с помощью приложения FlexiSPY, установленного на наблюдаемом телефоне :

    Шаг 1 — зайдите в ваш личный кабинет

    Шаг 1 - зайдите в ваш личный кабинет

    Шаг 2 — откройте раздел Сообщений, нажмите IM и затем выберите Viber

    Шаг 2 - откройте раздел Сообщений, нажмите IM и затем выберите Viber

    Шаг 3 — Читайте все перехваченные сообщения с телефона

    Шаг 3 - Читайте все перехваченные сообщения с телефона

    Вот и все!

    Мы надеемся что короткая статья покажет вам насколько мощные возможности у приложения FlexiSPY, установленного на iPhone. И, конечно, эти возможности не ограничиваются перехватом чата Viber! Следите за новыми статьями, объясняющими, как пользоваться абсолютно каждой функцией приложения.

  • What Local Android Call Recording Is & Why FlexiRECORD Is Better

    localcallrecording4

    Many spyphone vendors, including FlexiSPY advertise call recording for Android, but what is it, and why does FlexiSPY not recommend it?

    To recap, Android local call recording is where you set a recording schedule from inside a dashboard, and a TARGET Android device will then start recording calls or surroundings and save them locally to the device.

    At some point later, the recording is sent to the server where it can be listened to.

    So why does FlexiSPY not recommend this? The answer has many parts.

    Firstly, setting a schedule for environmental recording is essentially a blind exercise. Unless you know that something interesting is going to happen, the results will not likely be useful. Who wants to hear a toilet flush, or the sound of the TARGET’s legs rubbing against the device?

    A much more useful scenario is to be able to listen in at will, and if something interesting is happening, then invoke the recording.  Only FlexiSPY can offer this, because we recommend spycall to first listen, and then record, using the FlexiRECORD option if things sound juicy.

    Unfortunately this is not possible with Android local call recording.

    Secondly, and what most vendors WON’T tell you, is that the Android Local Call Recording technique is inherently unstable and is extremely platform dependent. You will find that mostly it does not work, or if it does, you only hear one side of the conversation. This limitation also applies to FlexiSPY, however, we have a unique call interception system that works on Blackberry, iPhone, Android, and Nokia Belle.

    With the addition of the FlexiRECORD product, all call recordings are automated and saved to PC.

    We suggest to our customers to try the Android local call recording first, and if that does not meet their needs, we can provide a full or partial refund, or a discount on FlexiRECORD.

    Try getting a refund from Mspy for this reason!

    FlexiSPY currently offers Android local call recording as part of its EXTREME product, but as its viability has decreased, we will be offering this feature as part of PREMIUM in the very near future.

    Summary of Android local call recording Issues

    1. Local call recording is for Android only

    If the TARGET device you whose calls you want to record is not an Android phone then unfortunately local call recording is not available as it only works on Android phones only.

    2. Local call recording works better on some Android phones than others

    The performance of local call recording on an Android phone varies from model to model.  There is no uniform standard.  This means that it may work well on one Android phone but not so well on another.

    3. The quality of the local call recording will vary depending on Android handset.

    Android devices are exceedingly customizable and this means it is problematic to have local call recording work correctly on every single version of every Android handset.  We already mentioned that call recording performance is dependent on Android model but what does this mean and why?

    When you perform local call recording you essentially want to record both sides of the conversation.  This would be the TARGET device and the person that they are currently talking to when the local call recording takes place.

    Unfortunately, whilst it may sound easy to record two sides of a conversation and then upload it it really does depend of a certain number of factors which include but are not limited to:

    • Android OS version running on the phone
    • Android phone make and model

    Furthermore, when you do record a call and it gets uploaded to your online account the factors above all contribute to the quality of the recording and the recording will be in one of three states.

    • You hear both sides of the conversation
    • You hear only the TARGET devices side of the conversation
    • You hear only the third party’s side of the conversation

    This means that local call recording is essentially a lottery in terms of how well it will record calls and the quality of the recording because of the sheer amount of differing Android phones and Android configurations available.

    So what can you do to ensure that you hear both sides of the conversation at all times and that you can record the conversations of any kind of TARGET phone, not just an Android phone?

    FlexiRECORD.

    FlexiRECORD is a companion product to FlexiSPY Extreme.  In order to operate it you need the following:

    • A TARGET device running FlexiSPY Extreme
    • A PC
    • Your own Android phone

    You install FlexiRECORD on to your PC and your own Android phone.  You then access FlexiRECORD on the PC and enter the details of FlexiRECORD on your Android phone.  With those details in place you simply leave your PC and your own Android phone connected to FlexiRECORD at all times and whenever the TARGET device makes or receives a call using FlexiSPY Extreme FlexiRECORD will automatically record it and save it to your PC so you can listen to it later.

    Recording calls with FlexiRECORD has numerous benefits.

    1. You can record calls from any TARGET device – not just Android phones
    2. You always record both sides of the conversation
    3. Recorded calls are saved as MP3 not AMR which means better quality

    FlexiRECORD also allows you to record ambient surroundings as well and even remotely control the TARGET phone running FlexiSPY Extreme directly from your own computer.

    So if call recording is something you really want out of spy phone software don’t be content with local call recording now that you know its limitations get FlexiSPY Extreme and FlexiRECORD today to see the true power of call recording.

  • FlexiSPY VS mobile spy | Which One Is 100% Undetectable?

    You are about to find out why mobile spy’s undetectability claims don’t protect you from being discovered. We’ll show you the three places on an iPhone where mobile spy can be seen, and why using their app will likely get you found out.

    This article shows results of a test we conducted to verify claims by mobile spy that their software cannot be seen anywhere on the target phone while the app is running. We give you the facts so you can come to your own conclusion about which mobile monitoring software—mobile spy or FlexiSPYwas designed around assuring you will never be discovered monitoring a mobile device.

    We explain exactly how the tests were carried out using a publicly sold copy of mobile spy installed on an iPhone 4 and a 5s.

    We’ll compare the anti-detection effectiveness of both FlexiSPY and mobile spy head-to-head, to demonstrate why FlexiSPY is the best-choice mobile monitoring app for anyone who wants to stay hidden.

    mobile spy’s actual claim to invisibility

    Looking at screen grab below you can read mobile spy’s own words on their website telling you their software is 100% undetectable. Though “complete stealth” might sound reassuring, there are a few other mobile monitoring red flags on the target phone that will give you away, and which are not mentioned anywhere on the site.

    mobilespymonitoringfullstealth
    mobile spy claims to operate in «complete stealth»

    Yes, mobile spy can accurately claim their app’s icon isn’t seen on the target phone, but they don’t mention other serious discovery risks of any mobile spy app that will invite suspicion and get you found out.

    Where To Find mobile spy On An iPhone

    Before getting into how we found mobile spy during our test, let’s first discuss some important points about the iPhone’s design. Spyphone developers have to look at these areas carefully if the application is to operate undetected.

    First there are the Permissions Settings, and the second is what happens on the target phone based on if it is jailbroken or not. Before installing any mobile monitoring software on an iPhone, you have to get full access to the operating system, this is done by a procedure called “jailbreaking”, so you can install whatever programs you wish.

    Later in the article we’ll tell you why jailbreaking a phone is one of the easiest ways to reveal a spyphone app, but for now let’s explore the risks found in Permissions.

    How Permissions Defeat Invisibility

    When an application that’s running on an iPhone is required to send data, use GPS or open the microphone, it must “ask” permission from the phone’s operating system.

    You can see these permission requests in the iPhone Settings menus shown here:

    — Settings > Cellular
    — Settings > Location Services
    — Settings > Microphone

    Each menu displays the name of the app which is requesting permissions, something which will quickly reveal that a spy app is running on the iPhone.

    Take a look at this screen grab below showing what happened when we activated the ambient listening feature on our copy of mobile spy. The program’s permissions request popped up in the microphone menu, offering a clear sign on the target phone that it is being remotely controlled.

    Figure 3- Mobile Spy asking for microphone permissions and appearing in the microphone menu.
    Figure 3- mobile spy asking for microphone permissions and appearing in the microphone menu.

    But mobile spy’s invisibility issues don’t stop at the mic.

    When mobile spy is asked to locate the target phone, it uses the phone’s GPS, triggering another tell-tale permissions request. The image below of mobile spy appearing in the Location Services menu shows how easily their software reveals itself on the target phone.

    As you can see, mobile spy makes itself visible simply by performing routine functions necessary for using some of the app’s most important features.

    But as obvious as these undetectability breaches may seem, mobile spy offers an even easier way to uncover its presence on the target phone.

    Jailbreaking | The Invisibility Spoiler

    Mobile Spy asks for location services permissions after installation and is then visible in the location services settings menu.
    mobile spy asks for location services permissions after installation and is then visible in the location services settings menu.

    Earlier we told you that it’s necessary to jailbreak an iPhone before installing any new software, and here’s why that’s important to know: when you add any new application to an iPhone, you should be aware of its starting state—either Not yet jailbroken or Already jailbroken.

    After you install monitoring software on the target phone you have to be sure that there is no revealing trace of internal changes you have made. One such glaring change occurs whenever you jailbreak a cell phone: an icon called “Cydia” suddenly pops up in the app directory.

    So for a spy phone app to remain undetected you need to make sure that:

    No Cydia icon is visible if the target phone was not jailbroken before.

    No Cydia upgrade notifications or suspicious installation packages are displayed if it was already jailbroken

    Target Phone Not Jailbroken | Watch For This

    When you install spy phone software on a target device that hasn’t been jailbroken before, the sudden appearance of the Cydia icon is likely to arouse suspicion of the app’s presence.

    When you install mobile spy, the Cydia icon is at first clearly visible in the app directory, and disappears once the software has been activated. However to access the instructions for doing this you have to open Cydia and search mobile spy’s 47-page user guide.

    Already Jailbroken | This Happens

    Figure 2 - Mobile Spy visibile inside Cydia as needing o be upgraded with upgrade buble shown.
    .

    On an already jailbroken target phone, the Cydia icon will already be a familiar sight and won’t raise any red flags, but the Cydia Upgrade Notification that appears when mobile spy is installed is sure to cause suspicion. And this is what happens when you install mobile spy.

    The image below shows the Cydia upgrade listing along with a clearly visible upgrade bubble and a suspicious installation package which is mobile spy that will quickly reveal your monitoring activities.

    No matter how many times you upgrade Cydia, that glaring red bubble will never go away. And to completely remove the mobile spy app you just open Cydia and tap Modify and then remove it.

    The Facts Tell It | mobile spy Can Be Detected

    On their website mobile spy sums up the app’s invisibility in two words: “complete stealth”. But as we found through using the software, this promise does not include protecting you from being discovered.

    While mobile spy does allow you to hide the Cydia icon it’s not a very convenient process. And even when Cydia is hidden, other serious stealth threats remain.

    mobile spy customers are advised to scrub all traces of Cydia from their target phone, especially suspicious update requests and unremovable notification bubbles.

    You can go here to find out how FlexiSPY eradicates all traces of Cydia with just one click.

    You may be wondering why there are no FlexiSPY screen shots posted in this article. Not that we have something to hide—we just have nothing to show on this topic. Since FlexiSPY is designed to be invisible everywhere on a target phone, it simply doesn’t show up after being installed.

    mobile spy Is Detectable On An iPhone 3 Ways

    You—like most folks who want to monitor an iPhone—are doing it to help with a problem, but it will be left unsolved and continue to cause grief if you get discovered. FlexiSPY was conceived and developed with keeping you invisible a top priority. This means your absolute concealment is a core function of our software, literally by design.

    So if you’re looking for powerful and reliable iPhone monitoring capabilities plus the proven knowledge you will never be discovered, you can believe promises or benefit from the facts: FlexiSPY keeps you hidden always and everywhere.

    This means that this already solves the issue of what to do if the phone was not previously jailbroken before purchasing the spy phone software.

    FlexiSPY however remains 100% undetected. We are so confident that it cannot be found on an iPhone after installation that we do not need to advertise that it is completely hidden. But this just goes to show that if you want the best spy phone and you want something 100% undetectable then FlexiSPY is it. It is still the only spy phone software that cannot be found once installed on an iPhone. It also gives you complete power over the visibility of Cydia as well.

    Analysis

    iPhone spy software will appear in one of three main locations once installed on an iPhone. We show you how to find it even though the software may be advertised as being completely hidden.

    Settings > General Location services

    It will appear here because the spyphone software needs permission from the operating system to get the device location for you to spy on it. The majority of spy phone software that claim that they are undetectable are usually found here.

    When it comes to FlexiSPY vs. mobile spy it was mobile spy that appeared in this menu.

    Settings > Cellular

    It will appear here because iPhone spy software needs the internet on the phone to upload data to the online account for you to view. This means that there may be times when wifi is not being used to do this. When this happens the phone uses cellular data which is more commonly known as 2G or 3G or 4G. As with location services, the application needs permission from the operating system (iOS) so that the data it collects can be uploaded for you to view. This means it may appear in this menu.

    When it comes to FlexiSPY vs. mobile spy neither were listed in this menu.

    Settings > Microphone

    This is a unique one. Spy phone software will appear here if they use the microphone. This can be for call recording or ambient recording – any feature that uses the microphone. As you know FlexiSPY offers ambient recording for iPhone but still is hidden from this menu.

    mobile spy also offer ambient recording and also manage to hide themselves from appearing in this menu.

    In terms of FlexiSPY vs. mobile spy spy phone software only has to appear once after it has been installed and already any claims about being undetectable are worthless.

    You may be wondering why there are no screenshots with FlexiSPY shown and that is because only mobile spy is visible. When it comes to being undetectable on an iPhone and if you are looking for the best cell phone monitoring software then clearly FlexiSPY rules supreme for providing a great list of features married to software that really is 100% undetectable.

    Appendix

    We’ve listed below detailed specifications of both FlexiSPY and mobile spy applications used in our test:

    The specifications of both FlexiSPY and MobileSPY
    The specifications of both FlexiSPY and mobile spy

    Stay tuned for further blog pieces as we face-off FlexiSPY against all other major spy phone competitors to show that, when we say FlexiSPY really is the best spy phone software and really is 100% undetectable once installed, we have the evidence to prove it.

    You can see how FlexiSPY stacked up against the remaining competitors for software visibility by clicking the links below.

  • FlexiSPY VS stealthgenie | Which One Is 100% Undetectable?

    This article shows why stealthgenie’s claim of stealth doesn’t guarantee you’ll stay hidden — and also shows the two ways that stealthgenie can be discovered on an iPhone

    What you are about to read is the result of tests carried out to verify claims by stealthgenie that their product is 100% undetectable to the person using the monitored cell phone. We put their words to the test – along with similar claims by other manufacturers – and let the facts show which cell phone monitoring software actually delivers on the promise to protect customers from being detected.

    We take you through the procedure and examine the results as we test a commercially available copy of stealthgenie for invisibility on both an iPhone 4 and 5s.

    We also compare the anti-detection capabilities of both FlexiSPY and stealthgenie with a side-by-side test that clearly demonstrates why FlexiSPY is the best mobile monitoring software for those who want to stay invisible at all times.

    stealthgenie’s Claim: Their Software Stays Hidden

    StealthGenie advertise that their software is 100% hidden
    stealthgenie advertise that their software is 100% hidden

    Strictly speaking, their claim is true: stealthgenie’s software app icon can be hidden on the target phone. But what isn’t mentioned are the side effects that a mobile spy app causes that will attract attention and cause you to be detected.

    How to find the stealthgenie spy application on an iPhone

    To help you quickly understand how we uncovered stealthgenie, there are two important things you need to understand about the iPhone’s design. These things must be carefully considered by the spyphone developer if the application is to remain completely invisible.

    The first is the Permissions Settings, and the second is the impact of the starting state of the device at the time it is jailbroken.

    If you’re not already familiar with this term here’s the general idea: Before installing any mobile monitoring software on an iPhone, you have to “jailbreak” it to allow full access so you can install your choice of programs. We’ll talk more about why doing this can be fatal to spyphone invisibility, but first let’s look at Permissions.

    Permissions

    Any application that runs on an iPhone, and needs to use the services listed here also needs to be granted special permissions.

    • Sending Data
    • Using GPS
    • Using the microphone

    These permissions are granted in the following Settings menus of the iPhone:

    • Settings > Cellular
    • Settings > Location Services
    • Settings > Microphone

    In each of these menus, you will find the name of the application that is requesting permissions.

    This is a dead giveaway that the spy app is installed on the iPhone.

    In our test, stealthgenie did not come up in any of the three menus.

    But checking a little further we discovered that stealthgenie did not appear in Settings & Microphone because when we tried to activate the remote recording feature they advertise on their website, the microphone failed to open.

    So while stealthgenie was indeed not visible in the Settings menu during our test, this random by-product of an apparent operational irregularity should not be confused with FlexiSPY’s designed-in and airtight undetectability.

    And we don’t require customers to sacrifice an important spy feature in order to achieve promised invisibility. Another issue that reveals the presence of their monitoring app is easy for anyone to spot: the text command which remotely activates Stealthgenie’s recording feature shows up right in the target phone’s SMS inbox — notifications and all.

    The cydia icon is showing in the app directory
    The cydia icon is showing in the app directory

    Impact Of Jailbreaking

    Before installing any application, the iPhone is in one of these two states:

    Not yet jailbroken.

    Already jailbroken by the user.

    After the installation of a spy application, care must be taken to ensure that there is no sign on the target phone that anything has been changed. But the thing is once you jailbreak a cell phone, an icon labeled “Cydia” appears in the app directory.

    So for a spyphone app to remain undetected you need these conditions:

    — If the cell phone was not jailbroken before, there must be no Cydia icon visible.

    — If it was already jailbroken, the installation package list must appear unchanged.

    The Not Jailbroken Device

    If the iPhone you want to monitor wasn’t jailbroken before, the sudden appearance of the Cydia icon will announce the presence of spy software.

    Though it’s a simple matter to remove the Cydia by including in the software an easy way to remove the icon, but no such feature is offered on the stealthgenie product. That means it’s likely that Cydia will show up in the target phone’s apps directory, just like in the example seen here:

    The Jailbroken Device

    An app that stealthgenie introduces
    An app that stealthgenie introduces

    If the device is already jailbroken, the Cydia icon will already be known to the person using the target phone — however they do not expect to see an unfamiliar installation package. stealthgenie introduces an additional installation package on the cell phone called Mobile Developer which could raise suspicion that the software has been installed.

    The image below shows how opening up the Cydia program plainly reveals a listing for the Mobile Developer package, another way using stealthgenie to monitor a cell phone is a major risk to your concealment.

    While it is easy to remove the telltale listing with one tap, most people are unlikely to know this. FlexiSPY deals with this problem by automatically deleting the package source when installation has finished.

    We knew for sure the listing “Mobile Developer” was stealthgenie because it was the only program we installed on to our iPhone after jailbreaking it. That, and the fact that it’s the only icon for a well-known, reputable app like Facebook or is part of the iPhone software such as Maps.

    What We Found: stealthgenie Is Ultimately Detectable.

    When stealthgenie says on its website that its software runs in stealth mode, perhaps what they really mean is that their application does not have an icon. However, this is not the same thing as being undetectable or invisible, because there are still clear traces of stealthgenie’s presence.

    We recommend that users of stealthgenie hide the Cydia icon, and we provide instructions on how FlexiSPY gives you that option here.

    So while stealthgenie claims their software “will never be found”, it doesn’t guarantee the ultimate goal of keeping yourself hidden from the phone’s user. Put simply – you either stay absolutely invisible and the spy phone software you’re using works, or you don’t and it doesn’t.

    The Final Word: stealthgenie Is Visible On An iPhone In Two Distinct Places

    Successful cell phone monitoring ultimately depends on you not being discovered. FlexiSPY was designed for 100% mobile phone monitoring concealment. So for anyone looking for powerful cell phone monitoring capability and the confidence that at the end of the day you won’t be revealed — these facts speak louder than promises and hype: FlexiSPY hides the app and has you covered.

    Appendix

    Below you can find the detailed specifications of stealthgenie and FlexiSPY used in our visibility tests.

    the detailed specifications of both FlexiSPY and StealthGenie applications
    the detailed specifications of both FlexiSPY and stealthgenie applications

    Stay tuned for further blog pieces as we face-off FlexiSPY against all other major spy phone competitors to show that, when we say FlexiSPY really is the best spy phone software and really is 100% undetectable once installed, we have the evidence to prove it.

    You can see how FlexiSPY stacked up against the remaining competitors for software visibility by clicking the links below.

  • FlexiSPY VS mspy | One Of Them Isn’t Invisible

    Update 5/26/2015

    — Mspy’s application is now completely visible, and is unable to be hidden.

    If you are reading this it’s probably because you need to monitor a cell phone, but are worried about getting discovered. You’ve seen mspy’s claim that their product is completely invisible, but the reality is this does not include keeping you hidden. This article clearly demonstrates exactly how their software is detected by showing you the 3 places where mspy is visible on the target phone.

    To see if their software is truly 100% undetectable on the target phone as claimed, we purchased a commercially available copy of mspy and thoroughly tested its stealth capabilities using an iPhone 4 and 5s. This article details how the test was conducted, and lets the results alone show which spy phone app only talks about invisibility and which one proves it by actually being invisible.

    You’ll see FlexiSPY’s and mspy‘s anti-detection features compared side-by-side, and get a clear understanding why FlexiSPY is the best-choice mobile phone monitoring application for anyone who wants to stay completely hidden.

    mspy says their software can’t be seen

    Take a look at the below screen grab from mspy’s website that advertises their software as being undetectable. You might be impressed the words “100% invisible”, but does that mean everywhere on the target phone?

    invisiblemode
    mspy advertises itself as completely hidden

    Although mspy does keep their app icon hidden, they don’t mention the other signs created by any mobile spy app that will make it easily visible and quickly reveal that the target phone is being remotely monitored.

    Here’s how to find mspy on an iPhone

    Before going into how we uncovered mspy on our test device, we should to explain a couple of important iPhone technical features that interact with any spy phone software. Developers must take great care in designing these features to ensure that the software remains hidden.

    The first of these possible threats is found in the Settings menu under Application Permissions. Next is the starting state of the device— whether or not it is jailbroken prior to installation of the spy phone software.

    For those not clear on what jailbreak means, it’s really quite simple. In order to install cell phone monitoring app on an iPhone, you must first gain special access that allows you to install your choice of software. This is referred to as “jailbreaking”. A little later we’ll explain what happens when you jailbreak an iPhone and how it can reveal your monitoring activities. But first, a look at Permissions.

    App Permissions will reveal mspy

    An application which is running on an iPhone has to “ask permission” from the phone’s operating system any time it’s required to send data, use the GPS or open the microphone.

    You can see these permission requests in the iPhone’s Settings menus. When you tap open any of the menus shown below you’ll see the name of the permission-seeking application.

    • Settings > Cellular
    • Settings > Location Services
    • Settings > Microphone

    This is such an obvious program installation red flag that anyone searching for spy phone software will go straight to the Settings menus before checking anything else on the phone.

    When we tested our copy of mspy, their software revealed two tell-tale listings in the Permissions menu. First, mspy asked permission to open the Microphone when we activated their ambient recording feature. And as you can see in the screen grab below, mspy also shows up under Location Services when it checks the iPhone’s GPS location for upload to the customer’s online account, something that can quickly draw attention and lead to the monitoring app getting discovered.

    mspy_clearly_not_hidden
    Here’s mspy — clearly not hidden..

    Either one of these Permissions requests alone is enough to get you discovered using mspy to monitor a mobile device.

    But there are more, even easier ways to spot mspy’s software installed on an iPhone.

    Jailbreaking can kill spy phone stealth

    An iPhone prior to software installation is either Already jailbroken or Not Yet jailbroken. Each of these possible mobile device starting states presents a different threat to concealment.

    After monitoring software is installed on a mobile, it’s crucial that there is nothing visible on the target phone that would reveal internal changes have been made.

    Here’s where one small detail can turn out to be fatal to invisibility:

    Whenever you jailbreak a mobile device, an icon called “Cydia” pops up in the App Directory.

    But if you install a monitoring app on a device that’s already been jailbroken, the new program can be seen in other places on the target phone.

    This means that, to keep a spy phone app absolutely hidden you need to neutralize whichever one of the detection threats shown below applies to you. The target phone’s starting state tells you which risk to you’ll need to avoid:

    Not Yet jailbroken: The Cydia icon must not be visible on target phone

    Already jailbroken: The existing installation package list must not show any changes. (More about this a little later)

    Cydia Exposed

    The cydia icon is showing in the app directory
    The cydia icon is showing in the app directory

    Here you can see what it looks like when the Cydia icon suddenly appears in the app directory of a previously un-jailbroken iPhone. This is what happens on the target when you install mspy, and it will get you discovered:

    So if the phone isn’t jailbroken, keeping Cydia out of sight on the target phone is a must-have condition to you staying hidden.
    We found that when using mspy there are several steps necessary to hide the Cydia icon. First, you have to open the Cydia program and access the mspy repository. The next screen grab shows just one step of the multi-step Cydia-hiding process:

    You have to do this because mspy has included an additional application inside the repository that must be installed—and the iPhone restarted—before Cydia icon is hidden.

    There is nothing to tell the customer that additional steps are required to hide the Cydia icon, and the instructions for doing this can only be found in the Help section of the mspy online account.

    The fact that you have to go back into the mspy repository and install an additional application in order to hide Cydia raises the risk of detection. Many customers will either forget or be unable to complete the required steps, making it more likely that they will be discovered while using mspy.

    NOT jailbroken phone can get you detected

    As you’ve learned, when you install spy phone software on an iPhone which is not yet jailbroken the Cydia icon shows up on the target phone, drawing attention and raising suspicions.

    To a software developer who is truly in touch with the product’s customers, designing a spy phone app that allows the Cydia icon to be quickly and conveniently hidden just makes good sense and is not difficult to do.

    Trying to hide Cydia using mspy requires you to install an additional program and restart the phone, and the software doesn’t let you know more steps are required.

    ALREADY jailbroken phone threatens monitoring stealth

    If the target phone has already been jailbroken, then the Cydia icon will already be visible and won’t attract any unwanted attention. But what will stand out is the upgrade notification appearing within Cydia that shows the requesting app. And that’s exactly what happens with mspy.

    When you install mspy on a previously jailbroken phone, an upgrade notification bubble appears along with the listing for the software installation package. Once the upgrade notification is seen, all it takes is a couple clicks to entirely remove the app from the target phone.

    Here's mSpy showing itself again.
    Here’s mspy showing itself again.

    Furthermore, even if mspy is upgraded via Cydia, the notification bubble will not go away. This will cause even more suspicion which could lead to the app being removed entirely.

    This next image shows how easy it is to spot these two threats to your concealment while using mspy:

    mspy’s software design requires specific actions to remove clear traces of invisibility on the target phone. FlexiSPY takes care of this for you by automatically deleting the package source, so no installation listing or attention bubble will ever appear.

    Since we didn’t install any other apps on our test phone after it was jailbroken, we know that the listing “iPhoneInternalService” is actually mspy and not some easily recognizable apps like Facebook or phone software such as Maps.

    Bottom Line: mspy CAN be detected on an iPhone

    mspy’s website says their software runs in “100% invisible mode”, but what this means is simply that their app does not have an icon. But not having an icon is not guarantee of 100% invisibility.

    So if you’re using mspy, our advice is to make a list of potential stealth threats so you won’t forget that you have to deal with each of them if you don’t want to be discovered.

    Or you can take a look here and see how FlexiSPY lets you get truly invisible with just one click.

    mspy’s claim that their app “…cannot be detected by your target…” is not a promise they you won’t be uncovered. The point is, there is no gray area when it comes to cell phone monitoring software. It either actually does what it claims and keeps you hidden on the target phone, or it lets you be detected.

    Just remember this and you’ll stay hidden…

    To successfully monitor an iPhone without being detected, you need a spyphone app that’s always invisible in all areas of the target phone. So if you’re looking for the most powerful cell phone monitoring features available plus the confidence that you will never be detected, the truth is in the facts: FlexiSPY takes care of everything you need to always stay invisible, everywhere on the target phone.

    Appendix

    Below are listed detailed specifications of mspy and the iPhones used for testing.

    mspy-chart
    A chart of the specifications of both FlexiSPY and mspy applications

    Stay tuned for further blog pieces as we face-off FlexiSPY against all other major spy phone competitors to show that, when we say FlexiSPY really is the best spy phone software and really is 100% undetectable once installed, we have the evidence to prove it.

    You can see how FlexiSPY stacked up against the remaining competitors for software visibility by clicking the links below.

  • FlexiSPY vs mobistealth | One’s Invisible The Other Isn’t

    FlexiSPY vs mobistealth | One’s Invisible The Other Isn’t

    Summary

    This article will clearly demonstrate why mobistealth’s invisibility claim does NOT include keeping you hidden, by uncovering the place on an iPhone where mobistealth can be seen that will give you away every time.

    You will read a detailed explanation of how we tested the accuracy of mobistealth‘s claim that their cell phone monitoring software is undetectable on the target phone. We present the facts that clearly show which spy phone software only says it protects you from being found out and which one actually delivers true mobile monitoring invisibility.

    We explain our testing methodology and look at the test results using a commercially available copy of MobiStealth installed on an iPhone 4 and 5s.

    You’ll see FlexiSPY’s and mobistealth‘s anti-detection features compared for detectability, and why FlexiSPY is the best mobile phone monitoring application for anyone who wants to stay totally hidden.

    mobistealth Says Their Software Is 100% Undetectable

    What you see below is an actual screen grab from mobistealth’s website where they claim their software is invisible. While it says right there: “No One Will Ever Know They Are Being Monitored”, the site doesn’t warn you about the other ways mobistealth can be easily detected on the target phone.

    ultimate-cell-phone-monitoring-software
    From the mobistealth website. They are clearly advertising as being hidden with the line «No One Will Ever Know They Are Being Monitored»

    While it is true that mobistealth hides the app icon on the target phone, what they don’t tell you about are other traces created by a mobile spy app which will quickly show that the target phone is being monitored.

    Find mobistealth on an iPhone? It’s Easy.

    Before explaining how we located the mobistealth software on the iPhone, we should first take a look at two important iPhone technical features that apply to any spy phone program. Spyphone developers have to be sure these features are properly designed if the software is to stay absolutely invisible.

    First, there are the application permissions found in the Settings menu. The second is the device’s starting state: jailbroken or not jailbroken.

    If you’re not exactly sure what jailbreaking is, the idea is simple: If you want to install a mobile phone spying app on an iPhone, it’s necessary to get special access that allows you to install the programs you want to use, or “jailbreak” the device. Later in the article you’ll see what happens on the iPhone when you do this, and how it can get you discovered. First, let’s look at Permissions.

    Application Permissions will get you discovered

    When an application which is running on an iPhone has to send data, use the GPS or microphone, it must first get special permission from the phone’s operating system.

    These permissions are displayed in the iPhone’s Settings menus as shown below:

    • Settings > Cellular
    • Settings > Location Services
    • Settings > Microphone

    If you simply tap open any of these menus you can see the name of the application requesting the permissions.

    This is a sure giveaway that monitoring software has been installed on the iPhone and is one of the first places someone searching for spy phone software will check.

    When we tested our copy of mobistealth, their software did indeed stay hidden in the location services and cellular permissions menus. And although it also did not appear in Settings > Microphone, we found that this was only because the audio recording feature mobistealth offers as part of their software failed to work. Therefore we could not determine for sure whether mobistealth is visible in Settings > Microphone, even if the feature can be made to function as advertised. But digging a little further we uncovered something about the associated function that makes the question of invisibility in this menu a moot point.

    The SMS message command needed to activate remote audio recording could actually be seen, giving the target phone’s user a clear sign that mobistealth has been installed.

    FlexiSPY removes this detection risk by making sure our software is always hidden in the Permissions menus, and that remote command text messages are never visible on the target phone.

    As simple as these invisibility threats are to find, there’s an even easier way to detect a mobile monitoring app on a cell phone.

    Jailbreaking can ruin invisibility

    Before you install any software the iPhone will be in one of two states:

    Either the target phone is NOT YET jailbroken or it is ALREADY jailbroken.

    Once you install spy software on a cell phone, you have to be sure there is no sign on the target phone that indicates anything has been changed internally. And this is how one small but crucial detail will give you away– any time a mobile phone is jailbroken, an icon labeled “Cydia” appears in the app directory.

    So in order for a mobile monitoring app to be 100% hidden, the following two conditions must be met at the time of installation:

    — If the mobile phone was not previously jailbroken, the Cydia icon must not be visible.

    — If it’s already jailbroken, the existing installation package list must not show any changes.

    Phone NOT jailbroken a detection risk

    This Cydia Icon is definitely going to look strange to the owner of the phoneThis Cydia Icon is definitely going to look strange to the owner of the phone
    This Cydia Icon is definitely going to look strange to the owner of the phone

    The below grab from an iPhone that was not jailbroken before mobile monitoring software was installed clearly shows the Cydia icon in the app directory just as it looks on the target device. That icon’s sudden appearance is more than likely to attract attention and raise suspicion that the device is being remotely monitored.

    Solving the Cydia icon problem is a simple matter of designing the software so that the Cydia icon can be removed, but mobistealth’s software doesn’t include any such feature.

    Phone ALREADY jailbroken causes suspicion

    On an already-jailbroken iPhone, the presence of the Cydia icon will already be familiar to the person using it, but what will make them suspicious is the sudden appearance of an unknown installation package. And this is exactly what happens because mobistealth puts an additional Installation Package called SBTerminal onto the iPhone.

    Here below you can see that their Installation Package listing is plainly visible in the Sources menu. This is an obvious red flag that will quickly draw attention to the fact that mobistealth’s software is running on the target phone:

    Although it’s actually quite simple to tap and delete the tell-all listing, many people are not aware of this. But with FlexiSPY there’s nothing to tap away, because our software automatically deletes the package source once the installation is complete.

    Here's MobiStealth being shown at vyk..
    Here’s mobistealth being shown at vyk..

    How did we identify “vyk.me” as mobistealth? It clearly is not a trusted app like Twitter, nor is it part of the iPhone’s software like Maps. Plus— we made sure that no other software besides mobistealth was installed after jailbreaking our test phone­.

    Our finding: You can detect mobistealth on an iPhone

    mobistealth claims on their website “No One Will Ever Know They Are Being Monitored”, but what this actually means is their software runs without displaying an icon. Our point is that “no icon” is not a guarantee of absolute concealment, because there are other clear signs of mobistealth on the iPhone.

    Our advice to mobistealth customers: get that Cydia icon hidden if you don’t want to get discovered.

    We show you here how FlexiSPY lets you do this with just one click.

    mobistealth‘s claim that “No One Will Ever Know They Are Being Monitored” doesn’t actually say it will keep you fully concealed. The true test of any mobile phone monitoring software is strictly pass/fail — it either keeps you hidden from the phone’s owner, or allows you to be detected.

    What this all means to you

    Seen from the developer’s viewpoint, spyphones should be called “Monitoring Concealment” apps, because a properly designed spyphone will have invisibility in all areas of the target phone as its top priority. So for someone who needs powerful mobile phone monitoring capabilities and the assurance they will never be detected, the facts confirm it: FlexiSPY hides the app and keeps you concealed.

    Appendix

    Below you can find the detailed specifications of MobiStealth.

    MobiStealth Specs
    For reference, this chart shows the specifications of mobistealth used in our tests.

    Stay tuned for further blog pieces as we face-off FlexiSPY against all other major spy phone competitors to show that, when we say FlexiSPY really is the best spy phone software and really is 100% undetectable once installed, we have the evidence to prove it.

    You can see how FlexiSPY stacked up against the remaining competitors for software visibility by clicking the links below.

  • How FlexiSPY’s Remote Update Protects Your Investment

    updatebanner

    The Problem With Software Updates

    We have a love/hate relationship with software updates—right?.

    Whether it’s MS Windows—just when you’re shutting down—or yet another Facebook update on your mobile phone, updates can bring joy and despair.

    Joy, because you should be getting improvements.

    Despair, because you KNOW it’s bound to break something else—like the spyphone software you just installed on a cellphone. For example, every time there is new feature added to a mobile instant messaging program , it’s pretty likely to crash your mobile monitoring spy software.

    Not with FlexiSPY­­! Read on to see how FlexiSPY deals with application software updates changes that are incompatible, and how it will keep delivering you spy information, without you having to physically reinstall.

    FlexiSPY Remote Updates Solves The Problem

    Because you’re capturing information from many different apps (Facebook, Line, WhatsApp, Email, etc.), any updates to those individual apps can become a critical issue. As soon as your Target user updates one of the apps you’re monitoring, there is always a chance the new version of that app may interfere with FlexiSPY’s ability to continue capturing it. Of course this is true for all monitoring software, but while you’re often SOL with other brands, FlexiSPY has designed its software to avoid that problem.

    Generally there are two things to consider when one of the apps you’re monitoring gets updated. The first is how quickly your spy software can release an update to capture the new versions of those apps. Assuming they are on the ball and make adjustments quickly to keep up with the changes, you’ll still need to find a way to get your Target device back so you can reinstall the updated version of your spy software.

    This is often a problem for many customers, and in that case you wouldn’t receive further data from the broken apps until you could reclaim your Target device to reinstall your spy software, assuming there was an update available for it.

    FlexiSPY makes this easier in two very important ways.

    Unlike other companies, our developers work around the clock to release updates for your software as soon as possible, whenever any of your monitored apps receive a critical update.

    accountsettingupdate

    And when updates are available, you’ll see an “Update” button in your Dashboard. Pushing this button initiates a remote update that should happen within the next 24 hours, or at the next successful device connection. This is a remote process that does not require you to retrieve the phone to update the software.

    updateavailable

    This is an important difference between FlexiSPY and other brands. We know it’s often difficult to get the phone back, especially if you don’t often see the person you’re monitoring, or even impossible if they are travelling or physically in a different area.

    Remote Update is another way that FlexiSPY is looking out for you, making it easier to keep monitoring your data and protecting your investment when an update is needed — even if you can’t get the phone back to reinstall.

    You shouldn’t have to pay extra for security, and with FlexiSPY it’s built right in.

    Note: Remote Updates are currently available for iPhone target phones only. FlexiSPY is doing its best to bring you the latest cool features to all our phone platforms – please stay tuned!

  • Does Mobile Spy Actually Capture Twitter or Facebook – Can anyone help us?

    Does Mobile Spy Actually Capture Twitter or Facebook – Can anyone help us?

    Mobile Spy appear to be a reputable company when it comes to spy phone software, therefore the news that they are the only ones capturing Twitter intrigued us enough to try it out and see this was really true.

    Unfortunately, we were unable to get this feature, along with the Facebook spy to work—despite several calls to Mobile Spy support.

    This article will detail what we did in theR hope that someone out there can help us figure out how to solve the problem so we can advise Mobile Spy support staff who can then use that information to help their own customers.

    Mobile Spy Twitter Test Results

    In order to properly test Mobile Spy we had to first root our Android phone and prepare it for capturing instant messaging conversations according to Mobile Spy’s requirements.

    1. We made sure the Android phone was rooted before installing Mobile Spy
    2. We had installed Facebook, Twitter & Whatsapp and were logged in
    3. We made sure that Mobile Spy (SIM Toolkit) received superuser permissions
    4. We made sure that we had enabled Facebook, Whatsapp and twitter capturing inside Mobile Spy itself using the Logging Options menu.

    Figure 1- We rooted our Android phone and installed Facebook, Whatsapp and Twitter
    Figure 1- We rooted our Android phone and installed Facebook, Whatsapp and Twitter

    With our Android phone correctly set up we set about installing Mobile Spy and started creating some instant messaging data for Mobile Spy to capture and upload to the online account.

    Unfortunately none of the Twitter data that we created was uploaded by Mobile Spy.

    Figure 2- Mobile Spy failed to capture any Twitter data.
    Figure 2- Mobile Spy failed to capture any Twitter data.

    This meant that we had to contact Mobile Spy support.

    We logged on to Mobile Spy livechat and after providing our registered email address and order number we then proceeded to ask our question.

    Why was no Twitter data being uploaded?

    Had we correctly rooted the Android phone?

    The first response we received to our question was the obvious one – had we rooted the phone?

    We explained that we had and we were told to open up the SuperSU program (SuperSU is the program that is installed after rooting an Android phone and which grants Mobile Spy the permissions it needs to function) and check the settings for Mobile Spy.

    The first thing we were told to check is the permission settings for Mobile Spy itself (SIM Toolkit). The Mobile Spy support staff thought that Mobile Spy had not been granted superuser permissions and that was why no Twitter data was being uploaded.

    We had set our Android phone so that Mobile Spy was automatically granted the permissions it needed to work.

    Figure 3- Our Android phone had been properly rooted and set up for Mobile Spy.
    Figure 3- Our Android phone had been properly rooted and set up for Mobile Spy.

    We told support this and we were then told to uninstall the software, reinstall and try again.

    We uninstalled and reinstalled the software whilst still in a live chat with the support team. We were then told that everything would now work because the software had been reinstalled.

    Unfortunately this was not the case.

    We sent some more tweets and checked back in to the Mobile Spy online account but no Twitter data was uploaded. In fact the message inside the online account stated this.

    Figure 4- No Twitter data was uploaded by Mobile Spy even though they advertise to capture it.
    Figure 4- No Twitter data was uploaded by Mobile Spy even though they advertise to capture it.

    We contacted Mobile Spy support again. We explained that we had already made sure that Mobile Spy had been granted the required superuser permissions in order to function. This time support asked us once again to check SuperSU and the permission settings for Mobile Spy.

    Had we set the correct root permissions for Mobile Spy to work?

    They wanted us to check the global default settings for Mobile Spy itself in case it had been set to not receive superuser permissions in which case that could be the cause for no Twitter data to be uploaded. Without gaining superuser permissions Mobile Spy would not work properly and that could have been the reason no Twitter data was being captured.

    On our Android phone we set the global permissions for Mobile Spy to be ‘Enabled’ which was the exact same thing that the Mobile Spy support staff asked us to do. We were then assured that now, because SuperSU had granted Mobile Spy the correct rooting permissions that features that require root permission (and this includes capturing Twitter) would work.

    After sending some more tweets and generating some general Twitter activity we checked our online account once more to see if Twitter had been captured.

    Figure 5- We had enabled Superuser and we disabled notifications upon Mobile Spy's request.
    Figure 5- We had enabled Superuser and we disabled notifications upon Mobile Spy’s request.

    Unfortunately it was the same and no Twitter data was uploaded.

    We contacted Mobile Spy support a third time. This time Mobile Spy support asked us to check the settings for superuser notifications. Superuser notifications are notifications which display when a program has been granted superuser permissions.

    Did we correctly configure the notification status of SuperSU?

    With this option enabled, every time Mobile Spy needs permissions to function a message would be displayed on the screen. Ideally spy phone software needs to be discrete and hidden at all times so we understood why the Mobile Spy support staff wanted us to set the superuser notifications option to be disabled. We were then told to uninstall the software again and reinstall it. When we reinstalled it, as you would expect, because we had set superuser notifications to be disabled no notice appeared on the screen saying that Mobile Spy had been granted superuser permissions.

    Support then told us to log in to Mobile Spy on our Android phone, then log out, restart the phone and log back in again. We did all of these steps and Mobile Spy support assured us now that everything definitely would work.

    So we generated some more Twitter data and waited, giving it time to be uploaded (Mobile Spy support told us it can take up to an hour for data to be uploaded), before we checked our online account again.

    Unfortunately still no data again was uploaded.

    Mobile Spy then asked us to install an older version to try that. This used a completely different download URL and program name.

    Did an older version of Mobile Spy solve the problem?

    When this was installed it still mentioned ‘Mobile Spy’ and everything looked and functioned the same however we knew this was an older version because in the online documentation the name of Mobile Spy once it was installed on the Android phone was not the same as the latest version.

    Figure 6- Mobile Spy gave us an older version of the software to try which we identified by the name..
    Figure 6- Mobile Spy gave us an older version of the software to try which we identified by the name..

    We installed this older version on to our rooted Android phone and set it up exactly as we had done before. Again we generated some Twitter data for Mobile Spy to capture. Unfortunately though the results were the same – nothing was uploaded.

    But how can we be sure that the issue is with Mobile Spy and not our Android phone?

    By testing the capturing of Whatsapp and Facebook also.

    Did Mobile Spy otherwise capture Facebook and Whatsapp?

    Both of these need root access on an Android phone for Mobile Spy to capture it.

    So we set about generating data for both Facebook and Whatsapp on our Android phone.

    Figure 7- Our test data for Facebook and Whatsapp to see if Mobile Spy would capture it.
    Figure 7- Our test data for Facebook and Whatsapp to see if Mobile Spy would capture it.

    Unfortunately Mobile Spy failed to capture Facebook.

    Figure 8- Mobile Spy also failed to capture Facebook.
    Figure 8- Mobile Spy also failed to capture Facebook.

    However it did capture Whatsapp.

    This proves that our Android phone was successfully rooted properly otherwise this would not be able to happen.

    Figure 9- Mobile Spy successfully captured Whatsapp.
    Figure 9- Mobile Spy successfully captured Whatsapp.

    However even though Mobile Spy successfully managed to capture Whatsapp it captured the text only. Many of the key elements provided by rich media such as emoticons and stickers were not uploaded. When it comes to clarity of information, especially when capturing instant messaging conversations, you cannot afford to miss out on any details – no matter how small they may seem.

    Why capturing all details of an instant message is vital

    One well-placed sticker inside a conversation or a well-timed smiley face can change or set the tone of an entire conversation. If you are capturing that information you need to make sure that all elements of an instant messaging conversation are being captured because nowadays just capturing the text is not enough.

    This is why FlexiSPY not only captures the most instant messaging programs (they capture nine compared to Mobile Spy’s six) they also capture much more of the chat data giving you all the details of every instant messaging conversation that takes place in an easy to read format so it looks exactly like it did on the phone.

    So, if you are currently a Mobile Spy customer and you are able to get Facebook and Twitter to be captured on a rooted Android phone please let us know how you did it in the comments below.

  • The Best Spy Phone Software For Spying On Instant Messaging Is The One That Captures The Most IM’s!

    The Best Spy Phone Software For Spying On Instant Messaging Is The One That Captures The Most IM’s!

    Social messaging applications like Facebook and Whatsapp, have replaced SMS as the preferred way to chat to friends. That’s because, unlike SMS, they are free, not to mention IM is more fun as it lets you send stickers, pictures and other rich media as part of your message.

    For example, sending a cute kitten sticker, or a smiley with love heart eyes, will put a smile one even the sourest of faces – right?

    That’s why it’s clear that if you really want to understand someone’s secrets, you NEED to be able to spy on as many instant messaging applications as possible— the chances are extremely high that they will be using one, if not several, social messaging applications.

    FlexiSPY Captures The Most IM’s

    All of our competitors advertise that they capture instant messaging but how do you measure which software actually captures the most instant messaging content for your money?

    As the picture to the right shows, with some competitors, important details are missing from the captured Facebook conversation — the missing information could be vital to understanding the whole conversation.

    What-They-Dont-Capture-1024x744

    And how do you know what really is the best spy phone software if you want to spy on Whatsapp, Facebook, Viber, Skype, and other popular IM apps?

    To answer this, we looked at the competition like mSpy, MobiStealth, and Mobile Spy and counted the actual number of instant messaging apps that they could spy upon.

    We looked at how they displayed the data—did they present it the way it was actually displayed on a mobile phone, or did they use a simple grid which makes it hard to understand the flow of the conversation.

    We also looked at the ability of FlexiSPY competitors to spy on the rich media like pictures and stickers that are such a cool part of the social messaging experience. To learn more about how we test IM capturing capabilities of ourselves, and our competitors, read our in-depth article on IM testing

    The results were obvious.

    FlexiSPY supports more social media and instant messaging programs than any other competitor.

    FlexiSPY Also Captures The Most Rich Media

    IM AppFlexiSPYmSpyMobistealthMobile Spy
    Facebook
    Facebook Messenger
    Viber
    iMessage
    Skype
    WeChat
    WhatsApp
    LINE
    BBMBlack Berry Icon
    BB PINBlack Berry IconBlack Berry Icon
    Twitter
    Google+ Hangouts
    Realistic Conversation ViewYes
    KiK Messenger
    Telegram
    Tinder
    Instagram
    QQ
    Hike Messenger
    In our tests, for example, mSpy also failed to capture Facebook stickers and images.

    Mobile Spy does not capture emoticons for Whatsapp and Mobistealth failed to capture any IM programs at all.

    What’s more FlexiSPY is the only spy phone software which displays the instant messaging conversation inside the online account just like it appears on the actual phone itself.

    No other competitor offers this level of detail and compatibility capturing instant messaging, as shown in the detailed chart below.

    But rather than resorting to hyperbole or superlatives, we simply look at the facts and can say that when it comes to spying on Facebook, Viber, Whatsapp, Skype, iMessage, BBM, PIN, Wechat, LINE, FlexiSPY is scientifically the most powerful. So why not head back over to the main site and explore everything that FlexiSPY can do for you?

    Explore All Our Great Features

  • Monitoring Employees Smartphone GPS Locations With FlexiSPY

    Monitoring Employees Smartphone GPS Locations With FlexiSPY

    There are lots of GPS tracking devices out on the market.  As an employer, you can install one on a company car, no problem.  Install it on an employee’s ID badge, yep.  Install one on an employee’s personal car . . . yes. And under certain circumstances you can install one to do limited tracking on your workers who use their personal car for work tasks outside the office.

    However installed GPS tracking devices have one major limitation. They only track your employee’s car’s location. They don’t track your employee.

    How can you track your employee’s location?  How can you see if your employee has decided to go to the racetrack instead of attending that expensive seminar you paid for?

    One way might be to use an employee’s ID badge as a tracker. The problem with this is it only works inside the workplace, and the device becomes ineffective when removed by the employee.

    Smart phones are amazing devices, because they can track and transmit locations just as accurately as installed GPS devices.  As a result of the need to accurately locate 911 callers, phone GPS transmitters have become almost universal in phones – in fact, many states require phones to be sold with the transmitters installed.  What’s more amazing is that the law treats the two devices – GPS transmitting devices and phones – differently, even though they provide similar data.

    Employee GPS Tracking Laws

    The use of GPS tracking technology for locating employees in the workplace has now become fairly widespread. More than 53% of all employers are using GPS technology to track their vehicles and workers. It is now cost effective for employers with as few as 8 staff members to use some type of technology to track their employees’ locations.

    An examination of two recent appellate decisions in the State of New York demonstrates why the courts will apply different standards to determine whether GPS tracking is legal for employers depending on whether the tracking is done by an installed device in a car, or whether the tracking is done on a smart phone.

    In examining the legality of using a GPS tracking device, it is important to first look at whether there are limitations on its use due to privacy issues.

    First, No federal statute prohibits employers from using GPS tracking on cellular phones  to locate the positions of their employees. And, second, the only state to require notice that an employer is using GPS tracking on a cell phone is Connecticut. California and Texas have recently passed legislation requiring notification when a tracking device is placed on a car.

    Therefore, there are no statutory limitations on an employer location tracking its employees with a GPS tracking device.

    we recommend that all employers give notice of this policy and have its employees acknowledge the policy in writing.

    Three states now would require that an employer notify its employees that it does use GPS tracking technology to monitor the location of its employees during work hours.  This is not a major limitation.  In fact, we would recommend that all employers give notice of this policy and have its employees acknowledge the policy in writing.

    Although there are no statutory privacy laws that would significantly restrict using GPS location tracking technology in the workplace, courts have begun to consider this matter, and have laid down some guidelines on the limits that might be placed under state law on this type of monitoring.

    Courts have traditionally found a low expectation of privacy regarding workplace monitoring.  Unless the invasion of privacy is unreasonable to the extent that it implicates highly personal information about the worker, the monitoring is found not to have violated the worker’s privacy rights.

    Prior to GPS, in determining whether there was an invasion of privacy, courts examined whether there was penetration of a zone in which a person would reasonably expect privacy, and whether the intrusion was offensive in light of the motives and objectives of the intruder.  (See, Miller v. NBC, 187 Cal.App.3d 1463, 232 Cal.Rptr. 668 1986) and Shulman v. Group W Productions, 18 Cal.4th 200, 955 P.2d 469, 74 Cal.Rptr.2d 843 1998.

    Monitoring Employees GPS Locations — The First Case

    The first employee GPS monitoring case came from New York.  In Cunningham v. New York State Dept. of Labor (2013 NY Slip Op 04838), New York’s Appellate Division heard a case in which the employee was subjected to discipline based on evidence obtained through the use of a GPS tracking device installed on his personal car.

    Michael Cunningham worked in the state’s department of labor in a management position.  He was a 20-year veteran of the department and much of his work was performed either in the field or in remote locations.

    His employer suspected that he was submitting false time reports and taking unauthorized absences.  They believed he was claiming he was on extended business trips, when he had actually returned home much earlier than his timesheets showed.

    The employer hired an investigator to follow his car to confirm their suspicions.  Cunningham was successfully able to elude the tailing investigator several times.  Thereafter, the employer attached a GPS tracking device to the wheelbase of Cunningham’s personal car, without Cunningham’s knowledge.

    The employer tracked the movements of Cunningham’s car for one month.  During that time period, the GPS tracking device required two replacements.  Through the evidence obtained by the tracking device, the employer brought disciplinary charges against Cunningham which resulted in termination of his employment.

    The reviewing court found that the use of GPS tracking device to confirm suspicions about Cunningham’s absences and timekeeping records was reasonable.  It further held that tracking the car’s movements for one month was a reasonable length of time.

    However, the court also ruled that the search was excessively intrusive.  Because the employer was tracking the movements of Cunningham’s car 24/7, and this would include considerable time periods when Cunningham made no claim that he was working, the search exceeded its permissible scope.  The employer, who replaced the GPS device twice during the surveillance, could easily have removed it when Cunningham took a personal vacation.  The court found that the employer failed to make a reasonable effort to avoid tracking Cunningham when he was outside of business hours.

    A few months later, the U.S. Supreme Court stepped into the fray in a criminal case, but may have dealt a blow to the use of GPS devices which are attached to cars.  In United States v. Jones 132 S. Ct. 949, 565 U.S. ___ (2012), Justice Scalia reasoned that the trespass involved in placing a GPS device in a car invades a person’s privacy.  The concurring opinion, moreover, suggested that any long-term GPS tracking would be an invasion of privacy because it would reveal a wide range of personal information, including familial, political, religious and sexual associations.

    Cell phones, however, have not received equal treatment from the courts.  In United States v. Skinner 690 F.3d 772 (6th Cir. 2012), the Court held that there is no reasonable expectation of privacy attached to the location transmitting signal of a cellular phone.  If there was, it would be an invasion of privacy to use scent smelling dogs to trace a suspect.  In Skinner, the Court explicitly differentiated placing a GPS device in a car in the Jones case, from using a person’s cell signal to track location.  The former involves a trespass, the latter does not.

    With the preferential privacy treatment given to cell phones over placing GPS devices in cars, it would seem logical that employers should use the GPS tracking technology in cell phones, as opposed to placing a device in an employee’s personal car.  While there are still good business reasons for GPS tracking company-issued cars, tracking the movements of employees may be more important, especially in this age of telecommuting and distant working.

    In a poll of professionals across the US, 56% of polled professionals had their smart phones paid for by the employer.

    Therefore, employers can issue phones that have GPS tracking software installed, to allow them to monitor their employee locations.  Again, we would recommend that notification be made to the employee, especially because there may be tracking in off-work hours.  This is an attractive alternative to the stealth, and, ultimately failure, employed in the Cunningham case, where the tracking becomes so pervasive that it is held to violate the worker’s reasonable expectation of privacy.

  • Scammed by Spyphone Software? Here’s What To Do

    Scammed by Spyphone Software? Here’s What To Do

    At Flexispy, we are always trying to get consumers the best value for their money. As part of achieving that goal, we actually buy and test all Spyphone software on the market. That way, we can tell customers what they can expect when they purchase any brand of Spyphone software.

    One thing we abhor is companies that sell Spyphone apps that plain just don’t work. This makes the entire industry look bad. We want customers to come to us because our products are the best on the market. When customers spend their hard-earned money on something that doesn’t work, that often means they give up, reasoning all Spyphone software is a scam.

    With that in mind, we would like to share our experience with one particular brand.

    We purchased the software, Cell Spy Stealth, on February 6, 2014 from the website, www.iphone-spy-app.com. The cost was $27.00. When we clicked the button to make the purchase, we were redirected to http://www.cellspymonitoringsoftware.com.

    We were intrigued by their website, because they advertise that you can install the software on a target phone, without having physical access to that phone and then intercept any call made or received on the target phone.

    Cellspymonitoring screenshot

    After purchasing the software, we downloaded it as instructed, we tried installing it on the android platform, the iOS platform and the Blackberry platform. The installation was unsuccessful on all three.  Our company has technicians with years of experience installing Spyphone software onto phones. And, even they couldn’t get this app to work.

    As instructed by their website, we submitted a ticket to their support team. We asked for a refund, because the software wouldn’t install. On their website, they guarantee customer satisfaction with the product and promise a full refund if dissatisfied with the product within 30 days of the purchase, no questions asked.

    Really an iron clad guarantee?

    biglinebreak

    After submitting our ticket for a refund, we received this email from [email protected]

    Here's their repsonse to our request

    biglinebreak

    We never heard from them again. Yep, $27 down the drain. What a rip-off! But, you don’t have to kiss your money goodbye. At Flexispy, we’re going to help you get your money back.

    How to raise a dispute, and do a chargeback on your credit card

    When you purchase any software, take the time to read the legal disclaimer and the terms and conditions of the purchase. It will save you a lot of headaches and disappointment down the road. Here’s the relevant legal disclaimer for our purchase:

    Software Download Return Policy:  All sales final. In-store credit only.

    If there is a problem with the download, please contact us via email for a quick resolution.

    Ummmm . . . what happened to my iron-clad 100% money back guarantee?

    Never fear. With a credit card purchase, you can always get your money back. It may take a little time, but don’t let the scammers win.

    But didn’t the company’s email say that it is illegal to file false and fraudulent chargebacks and disputes with my credit card company?

    LOL, the scammers who sold you worthless software and took your hard-earned money are threatening you with legal action if you file a chargeback?

    It is your right as a credit card customer to file a chargeback or dispute, if the product you purchased does not conform to your reasonable expectations as a consumer based on the marketing information provided by the seller.

    So, here’s what we did to get our money back.

    We first contacted our credit card company and informed them that we want to file a chargeback for this purchase. We told them the date and amount of charge. They emailed us a form to complete, which identifies the seller, the charge and the reason for the chargeback. We emailed it back with a copy of our emails with the seller. Our credit card company investigates, tries to get a response from the seller, and then reverses the charge. Simple as that.

    But we didn’t stop there.

    How to file a complaint with the payment gateway provider

    When you purchase something on a website, usually your purchase goes into a shopping cart, and when you checkout to pay, you are taken to a different website, called the Payment Gateway.  The payment gateway is the lifeblood of the ecommerce seller, because it processes all its credit card transactions.

    Payment gateways carefully watch the number of chargebacks and refunds for credit card transactions that they process, as there can be a risk if the amounts are particularly large. They may close their payment gateway service to the seller, or charge higher transaction fees, if they detect a pattern suggesting potential consumer fraud. Payment gateway providers are particularly interested in refund policies and whether the seller is living up to the refund policy as it is presented to the customer on the seller’s website.

    CellSpyMonitoringSoftware uses Plimus as its payment gateway provider.  Plimus is a very reputable company, and handles a lot of ecommerce software credit card transactions.  Plimus has its own support system for handling complaints that cannot be resolved with the seller.

    We submitted our ticket to Plimus’ service center so that we could escalate our request for refund. We do not expect Plimus will be able to get our refund, as that usually has to be obtained through a credit card chargeback. However, we are certain that our email has created a red flag about this seller and that Plimus may take some action as a result of this.

    So, don’t accept that the Spyphone software you purchased is just a scam and that you threw away your money. Get your money back through a credit card chargeback and take the seller to task.

    Or, why don’t you try Spyphone software that works? Flexispy will discount your purchase of our product in exchange for turning over your current Spyphone license key to us. Get the results you want, and trade in that worthless app. Go with the first and proven leader in Spyphone technology. 

  • How To Use FlexiSPY’s Spy On Call Logs Feature For iPhone

    Use FlexiSPY's Call Logs Feature On iPhone Banner

    After purchasing our iPhone Tracker software, one of the first things you might want to take a look at is the Spy on Call Logs Feature. This feature lets you monitor who they’ve been talking to, by giving you an in-depth and current view of their iPhone call logs. In the following guide, you’ll learn how to start using this feature. So, let’s get started.

    Spy On Call Logs — Getting Started

    Step 1 – Login to your FlexiSPY Dashboard via the Portal

    Login to your FlexiSPY Dashboard via the Portal

    Step 2 — Click the Calls tab and then click Phone.

    Step 2 - Click the Calls tab and then click Phone

    Step 3 — View the call logs captured by FlexiSPY listed for your viewing.

    Step 3 – View the call logs captured by FlexiSPY listed for your viewing.

    Done

    That’s all there is too it, and you should now successfully be monitoring their call logs. Depending on your automatic upload settings, the call logs will update every time a call takes place, you’ll see the contact name, phone number, call duration, and date & time. This really does give you a good view into what they’ve been up to. So head over to our iPhone Tracker page and see all of the great monitoring abilities that FlexiSPY gives you.

    If you have any questions about this feature, or any other FlexiSPY feature, feel free to let us know in the comments section below, or through our social media!

  • GPS Tracking – How Far Can the Employer Go?

    GPS Tracking – How Far Can the Employer Go?

    There are many reasons an employer may want to use GPS location tracking technology to monitor the whereabouts of its employees.

    These are some examples of where GPS tracking might provide some degree of help in the workplace:

    • You suspect an employee of misusing company time to conduct personal business;
    • You suspect an employee is engaged in illegal behavior, such as pilferage or drug use;
    • You suspect an employee is misusing company paid sick leave;
    • You suspect an employee of misappropriating company secrets or colluding with a competitor;
    • You are concerned about whether an employee is on a personal diversion rather than his appointed task when using his personal vehicle.

    These however,  are only a few examples of where an employer may consider engaging in Geo-location to confirm reasonable suspicions about a particular employee.

    The question then arises, what can the employer legally do to obtain some evidence to confirm these suspicions?

    For company-owned vehicles, the law is clear that an employer may put a GPS tracking device on the vehicle. The company-owned vehicle is the employer’s property, and its use for a business purpose is an extension of the workplace.

    Car Capture
     

    In O’Connor v. Ortega  480 US709 (1987), the US Supreme Court held that workplace searches never require a warrant. Also see,  Matter of Caruso v. Ward72 NY2d 432 (1988)(applying New York law, random workplace drug testing does not require a warrant).

    But what about placing a GPS tracking device on an employee’s personal car? Is this ever legal?  What restrictions and limitations apply?

    Employers now have guidance in this matter.

    In Cunningham v. New York State Dept. of Labor (2013 NY Slip Op 04838), New York’s Appellate Division heard a case in which the employee was subjected to discipline based on evidence obtained through the use of a GPS tracking device installed on his personal car.

    Michael Cunningham worked in the state’s department of labor in a management position. He was a 20-year veteran of the department and much of his work was performed either in the field or in remote locations.

    His employer suspected that he was submitting false time reports and taking unauthorized absences. They believed he was claiming he was on extended business trips, when he had actually returned home much earlier than his timesheets showed.

    The employer hired an investigator to follow his car to confirm their suspicions. Cunningham was successfully able to elude the tailing investigator several times. Thereafter, the employer attached a GPS tracking device to the wheelbase of Cunningham’s personal car, without Cunningham’s knowledge.

    The employer tracked the movements of Cunningham’s car for one month. During that time period, the GPS tracking device required two replacements. Through the evidence obtained by the tracking device, the employer brought disciplinary charges against Cunningham which resulted in termination of his employment.

    handwithgps

    The reviewing court found that the use of GPS tracking device to confirm suspicions about Cunningham’s absences and timekeeping records was reasonable.  It further held that tracking the car’s movements for one month was a reasonable length of time.

    However, the court also ruled that the search was excessively intrusive. Because the employer was tracking the movements of Cunningham’s car 24/7, and this would include considerable time periods when Cunningham made no claim that he was working, the search exceeded its permissible scope.  The employer, who replaced the GPS device twice during the surveillance, could easily have removed it when Cunningham took a personal vacation.  The court found that the employer failed to make a reasonable effort to avoid tracking Cunningham when he was outside of business hours.

    Generally, New York’s privacy protection with respect to GPS tracking is stated broadly in its State Constitution. The right of the people to be secure in their persons, houses, papers and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.  NY State Constitution, Article I, Section 12

    In Cunningham, New York’s appellate division concluded that the placement of a GPS tracking device on an employee’s personal car is not subject to the constitutional warrant requirement, because a personal car which is used in any way for a business purpose is an extension of the workplace.

    Thus, the court has distinguished the employment setting from the police investigation setting.  Cf People v. Weaver, 12 NY3d 433, 447(2009)(holding the attachment of a GPS tracking device to a suspect’s car always requires a court-issued warrant supported by probable cause).  United States v. Jones  132 S.Ct. 945 (2012)(holding attachment of GPS tracking device to a suspect’s car is a trespass and requires a warrant.)  Interestingly, that distinction means the case is inapplicable to other GPS tracking technology, such as mobile phone GPS tracking applications.

    Yet, an employer who has reasonable grounds to use location tracking technology on the employee’s car, must monitor with reasonable care.  Constant tracking of an employee’s car is liable to violate the employee’s right of privacy.
     

    Don't spend too much time monitoring their gps

    Security companies that manufacture GPS tracking devices would be wise to design the device so as to allow employers to turn the monitoring function off during non-working hours and weekends. This would avoid the Cunningham situation, where the employer’s reasonable use of the GPS tracking device was made unreasonable by being overly intrusive into the employee’s private life – the employee’s off-work hours.

    As an employer, if you are going to use GPS tracking devices, you should make sure that the device has a scheduler and that your HR department creates a policy that the employer will reasonably refrain from using GPS tracking during off-work hours.

    You should also make sure that your HR department thoroughly documents any targeted GPS location tracking of an employee’s personal car. They should detail the suspicion that surrounds the employee’s conduct, why less intrusive means of investigation would not be effective, and the proposed limits of the surveillance that will be used during the investigation of the employee.

  • How To Spy On iPhone Pictures With Our Image Capture Feature

    Spy on iPhone Pictures With FlexiSPY

    After making your purchase of our iPhone Tracking Software, you’ll be able to spy on iPhone pictures with our Image Capture feature. This guide shows you the steps needed to get started.

    Getting Started

    Step 1 — Login to your FlexiSPY Dashboard via the Portal.

    Step 1 - Login to your FlexiSPY Dashboard via the Portal

    Step 2 — Click the Control Center tab, then click Photo Controls.

    Step 2 – Click the Control Center tab, then click Photo Controls.

    Step 3 — Click Historical Media

    Step 3 – Click Historical Media

    Step 4 — Set Get Image to On.

    Step 4 – Set Get Image to On.

    Step 5 — Click Sync Now.

    Step-5-Click-Sync-Now

    Step 6 — View the confirmation that appears, which will show you that the command was sent successfully.

    Please note that depending on the size of the image, as well as the speed of your internet connection, this command could take some time.

    Step-6-View-Confirmation

    Step 7 — Click on the Media tab and then click Photos.

    Step-7-Click-The-Media-Tab-Then-Photos

    Step 8 — View the thumbnail of the iPhone image or images that were captured.

    Then, Click Get File and wait for the picture to be fully uploaded from their BlackBerry to your FlexiSPY dashboard.

    Next, Click Get Photos to start the image upload process.

    Step-8-Get-File

    Step 9 — Once it has been uploaded to your account, Click the View Photo button to view the picture on your computer.

    The Picture will then be displayed in full size.

    Step-9-View-Photo

    Done

    That’s all there is too it, and you should now successfully be using FlexiSPY’s Image Capture feature for iPhone to spy on their pictures.

    Of course if you still have questions about this feature, or any other feature, feel free to let us know in the comments section below, or through our social media!

  • Spy in Secret — How FlexiSPY Stays Completely Hidden On An iPhone

    Spy in Secret With FlexiSPY

    There is nothing worse than installing spy software on to an iPhone that advertises itself as being hidden, only to find out later that the software was not as hidden as it should be, and the iPhone user found it.

    This article will show you how FlexiSPY has been designed to be completely hidden once you have installed it on to an iPhone.

    An iPhone has two main areas that can lead to being discovered if the spy phone software is not hidden as advertised.

    The first is that an iPhone must be jailbroken before you can install any spy phone software on to it.

    What does this mean?

    Jailbreaking an iPhone gives you access to far more configuration options and allows you to install a greater range of software, including any iPhone spy software.

    But it also means that after you have jailbroken the phone a new icon will appear for the Cydia program, the iPhone user will see this icon and know that something on their phone has changed.

    They can then open Cydia and see if anything unfamiliar has been installed.

    Anything that they see which is unfamiliar to them they can easily remove in a single tap, this includes the spy phone software you just installed.

    That is why FlexiSPY is not visible in the two main areas that we have already discussed.

    How does FlexiSPY do this?

    First FlexiSPY removes all traces of itself from inside Cydia.

    The iPhone user will not see that anything unfamiliar or new has been installed, if the iPhone was already jailbroken.

    FlexiSPY is not visible inside Cydia

    Secondly, FlexiSPY also hides the Cydia icon after it has been installed.

    FlexiSPY allows you to easily hide Cydia. Once hidden it cannot be found on the iPhone

    Now that FlexiSPY has hidden Cydia the iPhone user will never know that it had been jailbroken or that any iPhone spy software has been installed

    So if you want serious iPhone spy software that really cannot be found after installation then FlexiSPY has you covered.