Everyone has watched CSI and seen reference to cellular forensics putting the bad guy at the scene of the crime.  More often than not it will put someone no where near the scene and prove innocence of allegations, whether criminal or civil.

Often we are asked to take a forensic dump of a child or spouses phone to simple disprove something that is believed to be happening.  Illicit communications or sexting, a phone doesn’t care, it retains that evidence and you need an expert with the correct tools to access and recover that data.  This is not something that you just search Amazon or Ebay to find those little USB forensic sticks.  That is grade school level technology.  We utilize the same forensic systems the government and law enforcement deploy to protect this country from terrorist and criminals alike.

In many area, the smaller local courts and often the local law enforcement agency simple doesn’t have the proper equipment or time to do these investigations in a criminal case.  A defendant’s lawyer needs us to do the work, that the police could not to prove innocence. It is the lawyer and private investigator job to prove that.

You may think to yourself, “I’m just worried about what my son or daughter is exposed to”.  But what if you use one of those below par forensic programs offered by many untrained private investigators and there is evidence of your child being a victim of cyber bullying, or teenage sexting, or even extortion over something that child shared with a friend.  You have contaminated it and it is not going to stand up for prosecution or defense in court.  Do it right the first time.

We can recover and analysis a wide spectrum of data extracted from a smart phone.  Including deleted data (based on phone OS and model)

  • Call Logs – times, frequency, dialed and received calls, and call duration
  • Text messages or SMS messages
  • MMS Messages / Picture or Video messages
  • Browser History & Internet searches
  • GPS locations from cell towers, internet activity or pictures and videos
  • Wifi Access locations
  • Geo Tagging within images and videos
  • Photo Meta data
  • Voicemails
  • Downloaded App & App Data ( communications within apps like chats, sent pictures and calls)
  • Account names & Passwords
  • Email Message Contact names & phone numbers
  • Address book entries; residential addresses and email addresses
  • Photos & graphics
  • Videos
  • Wi-Fi connections & passwords
  • Malware & Spyware detection

We can create a timeline of events from the first artifact in the phone till when it was handed over for analysis.

We haven’t talked about it on this post, but we have the capability for defeating the screen lock on most phones.