PhoneLog […] proved to be a valid support for the investigative analysis. It is worth mentioning the efficiency of the software, which made possible a rapid search for the areas in which the monitored number was located, the intersection of the various users monitored and allowing the operator to ‘instruct’ the program on its specific needs and adapt it to its operations.