Most Innovative Company, South Africa, 2016, African Business Awards
Best Forensic Investigation Company, Africa, 2016, African Corporate Excellence Awards
Best in Security, Forensics & Investigations – 2016 – International Business Awards

Privacy Protection, Online Anonymity and Identity Security

Privacy Protection, Identity Security and Anonymity

Cybercrime is real and it is growing rapidly in terms of scale and reach. Any person connected to the Internet of things must take precautions to limit the amount of information that is available online and to secure devices and systems against hackers and malware. Recovering from identity theft or a hacking incident can be costly and exhausting but prevention is relatively easy and cheap. Apart from cybercrime, having one’s personal information available to spammers and unscrupulous telemarketers can be annoying at best. Intertel’s products in this category are designed to keep your private information safe, deter cybercriminals, defend against attacks and generally strengthen your security posture.

Privacy Products

Spoofing

Spoofing a call, SMS or fax allows the caller or sender to alter the telephone number that is displayed to the receiver so that it appears to have come from a different telephone number than the one it actually originated from. For most people, this would have no practical use except perhaps to prank a friend or relative, but for some, keeping their telephone number a secret may be justified – it may even be a matter of life or death – and for those people we have a number of spoofing products available.

Spoofing Solutions

WARNING If you’re a crook or if you have any intention of using these solutions for criminal, antisocial, or inappropriate activities or any purpose that is meant to defraud, extort, coerce, harass, threaten, insult, bully, intimidate, stalk or cause another person distress then think again. While the receiving party may not know where the call or message came from, the authorities can trace the communication back to us, and we will cooperate with any legal request for your details. For this reason, an identity check is conducted before the spoofing services are activated.

Child Victims

Child Victims

Usually criminal in nature, these investigations are often undertaken in cooperation with the Police or Courts. They may involve allegations of neglect, endangerment, physical or sexual abuse, or other offenses against children. These investigations may be initiated by one or other, or both, parents, family or other concerned individuals.

Child Witnesses

Child Witnesses

These matters may not be entirely focused on a child, but rely on the testimony of, or evidence from, a child. For example, an investigation in preparation for a maintenance hearing may necessitate the interviewing of a child in order to gather information regarding their standard of living and care.

Child Offenders

Child Offenders

This is where a child is alleged to have committed a crime or been instrumental in the incident or activity under investigation. These types of cases are rarely undertaken without the involvement of the Police, Social Services or Courts unless requested by the parents of, or the victim, of the alleged incident or event.

Child Subjects

Child Subjects

This a catch-all for any other type of investigation in which a child is involved, implicated, will be affected by the outcome of the investigation, or is believed to have information material to the matter under investigation – but where the child is neither the victim, the offender nor an official witness. An example might be a child-custody investigation.