Cell Phone Forensics

[column col=”1/3″]
[list type=”arrow2″]

  • Call History Log Recovery
  • Text Message (SMS) Recovery
  • Phone Book and Contact Extraction
  • Calendar and To Do List Extraction

[/list]
[/column]

[column col=”1/3″]
[list type=”arrow2″]

  • Pictures, Videos and Audio Recovery
  • Phone Email and Chat Analysis
  • Multimedia Message Recovery
  • Social Networking

[/list]
[/column]

[column col=”1/3″]
[list type=”arrow2″]

  • Recovery of User Lock Codes
  • SIM Card Cloning & Data Extraction
  • Physical Memory (Hex) Dump
  • Phone File System Capture

[/list]
[/column]

[space height=”20″]

Using an array of specialized software and equipment designed specifically for advanced cell phone forensics, Binary Intelligence experts are able to extract key evidence from cellular phones, Smartphones, PDA’s, GPS units and other mobile devices. We are able to extract active and deleted data from many cell phones on the market today. Common engagements include the recovery of text messages, pictures, videos and call history logs. Additionally, we are able to perform advanced analyses such as chip-off forensic extractions, spyware checks to determine if surveillance software is installed on a device, operating system and application artifact recovery (Internet history, emails, tweets, etc.), and localization services to determine where a phone has been.

[list type=”arrow2″]

  • Examples of commonly recoverable data includes:
  • Text Messages (SMS – Short Message Service)
  • Photo/Multimedia Messages (Multimedia Messaging Service)
  • Pictures and Images
  • Video and Audio Recordings
  • Call History Logs (Received calls, Missed calls, Dialed calls)
  • Phonebook and Contacts
  • Calendar and Task List Entries
  • Emails stored on handset
  • Internet Browsing History
  • Social Networking Artifacts (Facebook, Twitter, IM)
  • Application Artifacts (data from programs installed on Smartphone devices)

[/list]

[space height=”20″]

We are able to forensically process over 3500+ models of cellular phone handsets – capabilities include forensic processing of:

[list type=”arrow2″]

  • Handsets using all carrier technologies including CDMA, GSM, IDEN, TDMA and EDGE
  • Phones from all major wireless service providers including Verizon Wireless, Sprint/Nextel, AT&T, T-Mobile, Cincinnati Bell Wireless, Cricket, TracFone, MetroPCS, Boost Mobile, U.S. Cellular, Virgin Mobile, PowerNet Mobile, VodaPhone, China Mobile, Orange France, Telstra Australia and many others
  • Smartphone and PDA devices running all major operating systems including Apple iPhone, Google Android, Microsoft Windows Mobile, Blackberry, Palm, and Symbian

[/list]

[space height=”20″]

Advanced mobile phone forensic procedures include:

[list type=”arrow2″]

  • Handset physical memory extraction – including TSOP and BGA chip-off forensic extractions, hex dumps and file system acquisitions
  • SIM card reading and cloning
  • Deleted data recovery (text messages, phonebook contacts, call history, pictures and videos)
  • Recovery of user handset lock code
  • In-depth forensic analysis of Smartphone operating system and application artifacts

[/list]

[space height=”20″]
[divider]

[space height=”20″]

Chip-Off Forensics article from 02/2012 issue of Digital Forensics Magazine
by Jim Swauger, partner at Binary Intelligence

[space height=”20″]

Android™ Forensics

Blackberry™ Forensics

iPhone™ Forensics