Mobile Forensic Services

MOBILE FORENSIC SERVICES

Our mobile forensic team will work hand-in-hand with you during the investigative process and provide you with a comprehensive understanding of your mobile device. By extracting and analyzing mobile data, our mobile forensic services can uncover key evidence that is crucial to building your successful case.

Types of Evidence

Devices

  • Apple iPhones
  • Android Phones
  • Windows Phones
  • PDAs
  • Tablets
  • Chromebooks
  • SIM Cards

Apps / Data

  • Mobile Applications
  • Cloud Storage
  • Text Messages
  • Call logs
  • Pictures
  • Videos
  • Flash Memory
  • Usage History
  • GPS and Location Data History

Types of Cases

  • Legal Holds
  • Backup/Archive for Employee Turnover
  • Preservation for any HR Investigations
  • Confidential/Intellectual Property Theft or mishandling
  • Fraud/Embezzlement/Hidden Assets
  • Data loss Recovery
  • Divorce and Family Matters
  • Insurance Claims
  • Vehicle Accidents
  • Wrongful Death or Accidents
  • Fire/Arson Investigations
  • Business Agreement Dispute
  • Civil Litigation
  • Property Crimes
  • Crimes Against Persons
  • Criminal Investigations

Types of Clients

  • Individuals
  • Businesses
  • Attorneys
  • Law Enforcement
  • Prosecutors
  • Public Defenders

Our Workflow

Tailored to your needs by our team of experts.

After an initial case review and client meeting, our experts will guide each client through the workflow process and determine which steps are appropriate for each specific case.  Though we encourage our clients to utilize all four steps, all steps may not be necessary as our experts will assess client goals and desired outcomes before initiating forensic services.  

  • Establish Scope
  • Identify Evidence
  • Establish Chain-of-Custody
  • Document each process
  • Take photographs as appropriate
  • Collect device and/or data
  • Preserve evidence by making forensic images

  • Extract data from devices
  • Process all data
  • Convert container files, zips, email, spreadsheets, PDFs, and etc. to a readable format
  • Index all data for searching capability
  • Pre-filter all data for the most relevant data and documents
  • Provide early case evaluation to understand the volume of data, user accounts, and any additional information to assist with decision making on next steps

  • Review and correlate all evidence
  • Identify patterns of forensic interest
  • Answer as many investigative questions as possible
  • Provide any additional filtering of confidential, privileged, or proprietary information as necessary

  • Provide oral or written information to our client
  • Prepare written reports, expert reports, affidavits, and/or declarations as requested by client
  • Provide presentation overview of findings to client, management, executives, board members, and others as requested by client
  • Provide oral depositions and testimony as requested by client

Frequently Asked Questions

We can accept / collect data or devices in a variety of ways.  After an initial consultation, our team will determine the most cost effective option for your specific needs.

Our workflow process consists of four steps:

Your case may not require us to utilize each step; a timeline for your case will be determined after an initial assessment by our forensic team.  Initial assessments can take up to 24-72 hours. 

Our workflow process consists of four steps:

You are welcome to use as many steps as you’d like; or team of experts can also walk you through which steps are most appropriate for your needs.

It is recommended that you unlock and unencrypt any device(s) that are provided to our team of experts.  If you do not feel comfortable performing this step, please provide us with the information or credentials we would need to perform this for you.

If you are unable to provide us with credentials to unlock or decrypt your device(s), our experts do have access to advanced tools that can help.  Contact us for further details regarding this specialized service.

During our workflow process, device data is stored in a secure location; retention periods for data storage varies on a case-by-case basis. 

Once we have completed our workflow, data will either be destroyed or returned based on the contract requirements agreed to.

Our extraction software systems for most of our services includes a reader-friendly conversion tool, typically in PDF format.  However, if you need the proprietary data as well, we can assist you by sending a freeware link along with the data file to access the information.

Learn more from our Experts