- He made several deposits to his crypto currency account from our savings account. What was he hiding?
- She had been blowing up my phone with text messages and voicemail messages. Fortunately, I'm not stupid enough to delete them because you never know when something irritating might actually be useful.
- Our cell phone bill didn't have actual message contents, but it did have sent and received information so I could tell he was still texting his secret lover even though he deleted the evidence from his phone. Idiot!
- I found a photo album on his phone. The dumb-ass was constantly adding pictures of his fuck-buddies to his album. I bet he thought he was being clever. So I shared his photo album with me so I'd always see his updates.
Let's not forget something major like: Geotagged Pictures.
For those unfamiliar with geotagging, that is embedding GPS coordinates inside a picture to show where the picture was taken. Standard EXIF information would include date and time of the picture, the camera device, shutter speed and F-stop. You could also call this 'metadata'.
- I looked at the picture of a hand, not mine, inside my wife's pants. The metadata said it was taken six days ago just before 4 PM, when my wife was supposed to be in a company meeting. What was even more distressing was the location information. She wasn't in New York City like she said. She was in the Florida Keys. My attorney was going to have a field day with this.
- The kidnappers might really be this stupid. The ransom picture still had the GPS coordinates of where they were holding my baby.
- They were smarter than I thought. They made sure to remove any data from the picture that could narrow down my search. All that was there was the date and time.
Finally, a cell phone is a computer, susceptible to malicious software. Add to this a built-in QR code reader and you have an easy way to gain remote access to a phone. If you're not familiar with QR codes, a quick search will give you tons of information on these next generation barcodes.
- "I don't need to put my number in your phone. I have a QR code for that." She displayed this fancy barcode on her phone that, as soon as I pointed my camera at it, said it was adding her contact information.
- We PI's have our tricks. I approached the most gorgeous creature in the bar and quietly asked if she'd like to make a quick thousand dollars. She was suspicious even after I showed her my PI credentials. She asked me what she had to do. I told her all she had to do was show a QR code to as many people in the place as she could. It would say her name was Candice 'Candy' Sorensen and leave a fake phone number. I didn't tell her it would give me access to her phone and every other phone she 'infected' for me.
- She handed me her phone so I could put my contact information in it. I quickly opened her browser and went to one of my special malware websites and installed back-door software so I could see everything about her life anytime I wanted.
- It was simple. I had a bunch of business cards printed up with an AI generated image of a naked hottie. The card simply said, 'discreet hook-ups' with a QR code that would install my special app. I'd plaster these cards in mens rooms, leave them on the ground in parking lots, anywhere I could hope to get someone to scan them.
- I knew something was going on when my phone scanned a QR code and my security software identified an attempt to install malware. I quietly informed my security detail and they took it from there.
Many times you can substitute 'virus' for 'malware'. Most people won't know or won't care about the difference.
This is by no means comprehensive and it's not meant to be a definitive guide. I hope you found little gems to help improve your writing and find new ways to do things with phones.