Mobile Phone Forensics
Specialists in the examination, extraction and presentation of evidence from all mobile phone devices.
Mobile phone forensics has become more prevalent with devices increasing in power and popularity, with many individuals now carrying more than one. Their increasing capability provides more opportunity to store and disseminate information.
Mobile phone devices allow photographs or videos to be taken. When a multimedia file is taken, most devices automatically embed the GPS location of the handset at that time. This allows the location of the user at that particular moment to be established at a later date.
Multiple communication protocols including Bluetooth, WiFi 3G and 4G enable the free transfer of information across international boundaries. Users can browse the Internet, send and receive e-mail with attached documents, or post entries onto a blog and, if that’s not enough, removable media cards with huge storage capacities can be inserted into the device allowing information to be exchanged quickly and discretely.
Whether the crucial evidence is stored on the handset or SIM card, CYFOR has the experience and expertise to extract and present this evidence.
Mobile Phone Forensics & Analysis
Mobile phone forensics is undertaken by CYFOR’s forensics team each month and they investigate hundreds of mobile phones and tablets.
Our expert investigations include the production of call lists and contact information, the recovery of deleted SMS messages, a summary of mobile internet usage, and the production of photographs and videos. CYFOR’s mobile phone forensics team have extensive experience in mobile phone analysis, whether it’s dealing with older generation mobile phones through to the latest Android and iPhone smartphone devices.
What data can be retrieved?
Depending on the case objectives of the client, it is possible to retrieve both live and deleted data from a smart phone. The following information can be recovered:
- Call history & voicemail
- Calendar events & alarms
- Internet history & bookmarks
- Address book contents
- Typing cache
- Multimedia messages
Additionally the following configuration information may be ascertained:
- iTunes history
- Social media history
- Application installation history
- Application preferences
- GPS fix
- WiFi history
- iPhone configured email accounts
JTAG involves the disassembly of a mobile phone and the connection to test points or components on the motherboard in order to read data from the handset. Connection can be made using specialist adapters, by micro-soldering wires or a combination of the two. Wires can be de-soldered after data extraction to return the handset to its prior state. Using this method, we can extract data from handsets unsupported by forensic software along with PIN, pattern or password protected phones.
Chip-Off involves the removal of the flash memory chip from a mobile phone and the use of specialist hardware and software to read the data from it. Using this method, we can extract data from handsets unsupported by forensic software or JTAG along with PIN, pattern or password protected phones and damaged or otherwise non-working handsets.
CYFOR have over a decade of experience within Mobile Phone Forensics and utilise the latest forensic software such as EnCase to provide a complete and thorough Mobile Phone Forensic Analysis. We are also proud to have leading industry experts at our disposal, including ex-military forensic investigators.
CYFOR adhere to the Association of Chief Police Officers (ACPO) Guidelines and use the latest mobile phone forensics examination techniques to provide a profile of usage to ensure the highest quality of investigations and reporting is adhered to.
Benefits of using CYFOR include:
- Experienced case managers
- Court trained forensic investigators
- ISO 9001:2008 Accredited
- Court ready reports from industry experts
- Secure collection and delivery of exhibits via security cleared CYFOR couriers