I suspected my wife was having an affair but could never prove it as she was continually deleting her Whatsapp conversations...”
We can help you with forensic investigations and data recovery from more than 31,000 working and non-working Apple iOS and Android mobile devices profiles including smartphones, tablets, cellular phones, smartwatches and portable GPS devices.
OUR CAPABILITIES INCLUDE:
- Physical data extraction from more than 7,700 mobile devices.
- Logical data extraction from more than 12,000 mobile devices, including:
- The extraction and decoding of application data, passwords (user lock codes), emails, call history, SMS & MMS, IM (instant messaging), contacts, calendar, media files, location information, phone details (IMEI/ESN), ICCID and IMSI, SIM location information (TMIS, MCC, MNC, LAC) etc. plus the generation of easy-to-read reports if required.
- File system data extraction from more than 7,700 mobile devices.
- Bypassing pattern lock (password/PIN) of more than 3,600 devices by using custom boot-loaders enabling accurate and forensically sound data recoveries.
- Password recovery from more than 1300 mobile devices.
WE EMPLOY FOUR MOBILE DEVICE INVESTIGATION LEVELS:
The extraction of the logical file system, where a physical data extraction is not yet possible. This does not include the recovery of unallocated space but in some cases enables the extraction of deleted files.
Deleted database records such as call log entries, contacts, messages (MMS/SMS) etc. can in some cases be extracted following a file system, physical or hardware extraction process.
A bit-by-bit copy (clone) is made of the flash memory (including unallocated space) bypassing the operating system by accessing the internal flash memory directly. It is in some cases possible to bypass user locks or passcodes as well as enabling the acquisition of intact (unaltered) hidden or deleted data.
Unallocated space may contain deleted data like SMS records, call logs, phonebook entries, media files such as photos and videos, deleted passwords, installed applications, geotags, location information, GPS fixes, emails, chats etc.
This is an advanced process of extracting data from a physically damaged (e.g. broken, faulty, dead, water damaged etc.) mobile device. The process could include taking the device apart and removing the memory and other chips using techniques like JTAG and chip-off. It is typically a complex and time-consuming process taking 2-8 weeks on average.