Cell phones and mobile devices can prove to be valuable sources of information in many types of investigations. Parties in litigation seeking to prove usage of stolen client lists often find important clues by analyzing patterns of activities on cell phones and PDAs, including contacts and their creation dates as well as when and how often certain phone numbers were called.
Forensicon performs cell phone and mobile device data acquisition on a flat rate basis. Where a cell phone or mobile device is listed as a supported model, Forensicon is often able to copy all of the data off the device for further review or analysis in a few hours time.
Forensicon does not provide cell phone forensics services related to spyware, malware, or hacking investigations. Our services focus on preservation of evidence and recovery of deleted information for litigation purposes. Forensicon is unable to guarantee that the specific deleted data being sought will be recovered given how often data is overwritten on mobile devices.
Forensicon utilizes the Cellebrite UFED Touch Ultimate Technology. This unit is battery operated and portable allowing for collections almost anywhere. This tool allows us to support the following iOS devices: iPhone® (original), iPhone 3G, iPhone 3GS, iPhone 4, iPhone 5, iPad® 1, iPad 2, iPod® Touch 3G and iPod Touch 4G. We also support a number of Android® and Blackberry® based devices.
The following content can usually be retrieved from smart phone devices:
- Call logs
- Contact lists
- Locations (Wi-Fi, cell towers and GPS coordinates)
- SMS (Text) and MMS (Video/Audio) Messages
- And More!
Download the supported devices list (Last Updated Sept 2014)
- CIA Admits Spying on Senate Panel - Late summer an internal CIA inspector general admitted that certain officers spied on members of the Senate Intelligence Committee, deleted information from their computers, and knowingly referred false information to the U.S. Department of Justice for the prosecution of Senate staffers. The spying came after reports of Senate committee Democrats working on a report about[...Read More]
- Mac OSX GPS Photo Forensics Tutorial - Forensicon Tutorial and Walkthrough Extracting GPS metadata from Mac OSX Terminal Command Line using MDLS command Forensicon’s President, Lee Neubecker provides an overview of how anyone can use the Macintosh OSX terminal native command line to extract embedded metadata contained within photos or videos. The “mdls” command extracts the following fields from photos where such[...Read More]
- Yaniv Schiff Promoted to Director of Digital Forensics - CHICAGO, Nov. 11, 2014 /PRNewswire/ — Forensicon, Inc., a Chicago-based digital forensics and eDiscovery firm, is pleased to announce the promotion of Yaniv Schiff from Senior Computer Forensics Examiner to Director of Digital Forensics. In Schiff’s new role as Director, he will lead company efforts to build out the team of digital forensics examiners and provide[...Read More]
- Chicago Election Judges Received Misinformation Calls - How could this have happened? The media has been reporting instances of Republican election judges receiving telephone calls misinforming them that their service was not needed on election day or that further training in remote far away places was required in order to participate as an election judge in Cook County Illinois. The Chicago Cook[...Read More]
- Cook County Electronic Voting Equipment Indicates Tampering - Evidence Suggesting Tampering Discovered In Suburban Cook County, Illinois General Election 2014, November 4th, 2014 – Electronic Voting Advisory Back in October of 2011, our firm, Forensicon, Inc., was invited in at the last minute to participate in an open Request for Bid project with the Suburban Cook County government’s electronic voting equipment forensic audit.[...Read More]