High-Tech Tools for Catching a Cheater

Spy programs monitor activity on computers, smart phones.

ByABC News
November 22, 2010, 6:30 AM

Nov. 22, 2010— -- Attention cheaters, those high-tech toys you think are so trustworthy can turn against you in seconds.

According to the entertainment website Radar Online, basketball player Tony Parker thought his alleged infidelities were safe in an "electronic program that only he could access." Until, that is, he forgot to close the program and his wife (soon-to-be-ex), actress Eva Longoria, took a look inside.

But even if you're careful about closing encrypted or hidden computer files or using smart phone applications that claim to permanently erase potentially incriminating text messages, your digital indiscretions can be easily found out.

"If someone wants your data, they're going to get your data," said Todd Morris, CEO of Brickhouse Security, an online retailer of security and surveillance products. "The only way to keep a secret is to keep it in your mind."

It's unknown exactly what kind of "electronic program" Parker used to lock away his private information, but Morris said it could have been an encrypted file vault, which is a password-protected hidden folder that works almost like a second hard drive on a computer.

Other tech-savvy cheaters might reach for programs that delete mobile communication stored on smart phones.

When the iPhone application TigerText launched earlier this year, the Huffington Post hailed it as an iPhone app that "Helps Cheating Spouses Get Away With It."

But neither approach is foolproof. Morris said a whole suite of products for personal computers and smart phones make it relatively cheap and easy to monitor everything a person does electronically.

The Stealth iBot, for example, he said, is a spying tool that plugs into a computer's USB port and quickly installs a program that silently records all activity on that computer.

The $129 USB drive deploys data minding technology that can monitor websites visited, keystrokes made and it can take thousands of screenshots, so that you can see everything happening on the bugged computer from your own computer.