Tel: +44(0)1529 306284

Mobile Forensics

Mobile Forensics

Mobile forensics, device analysis and data recovery

With advances in solid state technologies, mobile devices have been able to increase capabilities, with no significant increase in their footprint.  As a result, voice and text communications, social media technologies have been combined with audio, video and graphics technologies on the same device.

Mobile devices and tablets often contain evidence that can prove or disprove an investigation and may be in the form of emails, contacts, meetings, documents.  Any number of which could be relevant to an investigation.  They may also contain sensitive or confidential business information, which if lost could damage corporate image, contrary to policy.

The volume of recoverable data has increased exponentially, with greater importance to investigations.  For many individuals, these devices also act as organisers, storing additional personal information. Such as significant dates, events, contact information, even passwords.

CCC provide a comprehensive range of computer forensic services, for evidential, intelligence, or data recovery purposes.

For examples of mobile forensic assignments

Mobile Device Analysis

The data available from devices can include:

  • Application Data
  • Call logs
  • Deleted information
  • Emails
  • Files
  • Geo-location data
  • Instant Messaging
  • Internet History
  • Multimedia Messages
  • Network Connectivity
  • Passwords
  • Phonebooks
  • SIM Card Data Analysis
  • Social Media Data
  • Text Messages
  • Video
  • VOIP Data
  • Wi-Fi History

Risks

mobile forensics, computer forensics, mobile phone, computer crime, laptop

Mobile devices used in businesses can also pose significant risk to organisations.  Again, due to the variety and volume of information they contain.  With emails, contacts, databases, documents, spreadsheets and other information which could be confidential or potentially compromising. Frequently being accessed or worked on in public places, such as trains, possibly using free Wi-Fi.

These devices , along with others, such as USB keys, can also be used to copy data.  Effectively stealing it from the organisation.

The recovery of data from devices, can either prove or disprove whether information or events have taken place.  In our experience, it unusual rare for the results of an analysis to be inconclusive.

For examples of mobile forensic assignments

Our expertise and experience, uniquely combines electronic forensic skills, with an understanding of corporate finance.

Asset Tracing – Audit – Computer Security – Digital Forensics – Due Diligence – eDiscovery – Fraud Investigation

Intelligence Gathering -Passwords Analysis – Penetration Testing – Wireless Security

Services underpinned with expertise and experience.