Mobile Phone Forensics
HOME | Forensic Data & Cyber Threats | Mobile Phone Forensics
In today’s world, the majority of us use smart phones and devices such as the Blackberry and the iPhone. In many cases, we use the same device for both corporate and business communication, accessing the Internet, posting on social networks, taking photos and videos, and most commonly using Email and Calendar capabilities. If a device has been implicated as part of investigation within your workplace, how do you go about retrieving the evidence?
What is Mobile Phone Forensics?
This process centers on the finding and isolating of digital evidence located on mobile and smart phones. This can be undertaken on behalf of companies, organisations, law firms or government departments, and is useful for locating both information that is on the device, and also information that has initially been deleted but can still be retrieved. Several types of digital evidence can be obtained from a mobile phone, including call histories, emails, contacts, text messages, calendar and diary information, photos and videos, Internet browsing history, GPS history and file storage activity.
Undertaking Mobile Phone Forensics
Due to the different operating systems and configurations used by phone manufacturers, retrieving evidence from a mobile or smart phone can require different equipment software to that which is used to undertake Computer Forensics, and as such it can be difficult to do internally.
Mobile Phone Forensics investigations may be required for the following reasons:
• Criminal activity such as fraud or theft within the organisation
• Misuse of electronic equipment such as for own personal use or operating own business using the assets of the organisation
• Workplace bullying or unfair treatment
• Organisation policy breaches such as sending inappropriate or offensive emails
• Execution of a search warrant or civil search such as Anton Piller Order
• Data theft or compromise of Intellectual Property
• Civil cases which involve the movement of data on digital devices
Regents’ Approach
At Regents’, we understand that it can be difficult to effectively monitor activity on devices that are being used either in the workplace, either for personal or organisational reasons. We also appreciate the sizeable amount of information and data that can accumulate on a device, even when the user believes that it has been deleted.
We frequently update our forensic software to ensure that we keep abreast of the constant developments in the mobile phone technology sector. Moreover, our Mobile Phone Forensics services can be utilised on mobile and smart phones, as well as on GPS Sat-Nav devices, voice recorders and digital cameras.
Computer Forensics
Mobile Phone Forensics
Cyber Threats
TSCM
Document Examination
Need Professional Advice?
Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module
Regents Blog
Mobile Phone Thefts
Ever since mobile phones became an essential tool for businesspeople, their theft and resale has posed a security problem for companies. The latest smart phones are not only costly, they can also contain crucial data relating to the company and the personnel working...
Digital photocopiers pose security threat
for identity theft
The digital photocopier being used in your home or office may offer an identity thief or fraudster gateway direct to your personal or sensitive data. Though most users are unaware, nearly all digital copiers sold since 2002 contain a digital hard drive — similar to...
Theft of military data drive
exposes security flaws
Top secret defence documents belonging to the commander of Australian operations in the Middle East stored on a USB drive went missing from the backpack of a military aide travelling on a commercial flight from Dubai to Pakistan. It is believed the USB went...
Fraud audits for companies and organisations
Fraud is an ever increasing problem for companies and organisations of all sizes. According to the Certified Fraud Examiners recent survey in 2008 in the USA alone, around US$994 Billion was lost to fraudulent activity. Fraud is a different form of commercial crime,...
Air India Found Wanting
– Designing a Robust Fraud Prevention
Stelios Haji-Ioannou, founder of budget airline EasyJet once uttered the famous phrase “If you think safety is expensive, try an accident”. This was based upon his dire experience in 1991 when a tanker belonging to his father’s shipping company spilled 50,000 tonnes...
Major corruption payments to Singapore Ikea manager
A Singaporean businessman who paid an incredible SGD $2.4 million to Singapore Ikea’s food services manager over six years has pleaded guilty to 12 counts of corruption involving $761,020. Andrew Tee Fook Boon, owner of business AT35 Services, gave monthly bribes to...