Cell phones and mobile devices can prove to be valuable sources of information in many types of investigations. Parties in litigation seeking to prove usage of stolen client lists often find important clues by analyzing patterns of activities on cell phones and PDAs, including contacts and their creation dates as well as when and how often certain phone numbers were called.
Forensicon performs cell phone and mobile device data acquisition on a flat rate basis. Where a cell phone or mobile device is listed as a supported model, Forensicon is often able to copy all of the data off the device for further review or analysis in a few hours time.
Forensicon does not provide cell phone forensics services related to spyware, malware, or hacking investigations. Our services focus on preservation of evidence and recovery of deleted information for litigation purposes. Forensicon is unable to guarantee that the specific deleted data being sought will be recovered given how often data is overwritten on mobile devices.
Forensicon utilizes the Cellebrite UFED Touch Ultimate Technology. This unit is battery operated and portable allowing for collections almost anywhere. This tool allows us to support the following iOS devices: iPhone® (original), iPhone 3G, iPhone 3GS, iPhone 4, iPhone 5, iPad® 1, iPad 2, iPod® Touch 3G and iPod Touch 4G. We also support a number of Android® and Blackberry® based devices.
The following content can usually be retrieved from smart phone devices:
- Call logs
- Contact lists
- Locations (Wi-Fi, cell towers and GPS coordinates)
- SMS (Text) and MMS (Video/Audio) Messages
- And More!
Download the supported devices list (Last Updated Feb 2014)
- Mac OSX GPS Photo Forensics Tutorial - Forensicon Tutorial and Walkthrough Extracting GPS metadata from Mac OSX Terminal Command Line using MDLS command Forensicon’s President, Lee Neubecker provides an overview of how anyone can use the Macintosh OSX terminal native command line to extract embedded metadata contained within photos or videos. The “mdls” command extracts the following fields from photos where such[...Read More]
- Yaniv Schiff Promoted to Director of Digital Forensics - CHICAGO, Nov. 11, 2014 /PRNewswire/ — Forensicon, Inc., a Chicago-based digital forensics and eDiscovery firm, is pleased to announce the promotion of Yaniv Schiff from Senior Computer Forensics Examiner to Director of Digital Forensics. In Schiff’s new role as Director, he will lead company efforts to build out the team of digital forensics examiners and provide[...Read More]
- Chicago Election Judges Received Misinformation Calls - How could this have happened? The media has been reporting instances of Republican election judges receiving telephone calls misinforming them that their service was not needed on election day or that further training in remote far away places was required in order to participate as an election judge in Cook County Illinois. The Chicago Cook[...Read More]
- Cook County Electronic Voting Equipment Indicates Tampering - Evidence Suggesting Tampering Discovered In Suburban Cook County, Illinois General Election 2014, November 4th, 2014 – Electronic Voting Advisory Back in October of 2011, our firm, Forensicon, Inc., was invited in at the last minute to participate in an open Request for Bid project with the Suburban Cook County government’s electronic voting equipment forensic audit.[...Read More]
- Community Health Services Data Breached By Hackers - More than 4.5 Million patient records were compromised by a data breach disclosed this week by Community Health Systems, which operates 9 hospitals in Illinois. Three of the impacted hospitals in the Chicago area included Metro South Medical Center in Blue Island, Vista Medical Center and Vista Medical Center West in Waukegan. According to the[...Read More]