Partnerships

Belkasoft
Elcomsoft
Legal & Other

Disclaimer
Cookies
Use of this website (T&Cs)    
Environmental Responsibility
Compliance
Data Privacy
Documentation

Articles
White Papers
Brochures
Press Releases
Subscribe to our Newsletter

Our Websites

Visit our sister websites
Copyright Strathclyde Forensics © 2009-2015. All Rights Reserved.
About us

Our People
Our Clients
What our Clients say
High Profile Cases
Contact us
Strathclyde Forensics website is found to be Safe by NORTON SAFE WEB Strathclyde Forensics website is found to be Safe by NORTON SAFE WEB
Strathclyde Forensics website is found to be SAFE by McAfee SECURE (Siteadvisor) Strathclyde Forensics website is found to be SAFE by McAfee SECURE (Siteadvisor)
"Absence of evidence is not
evidence of absence"
Our Blogs

Check out our Blogs
Terrorist Alerts

MI5 (UK)
Department of Homeland Security (USA)

Cyberattacks (real time)
Kaspersky
FBI Cyber Most Wanted

Home
ICTTF logo ICTTF logo
ACPO Guidelines ACPO Guidelines
Scottish Legal Aid logo Scottish Legal Aid logo
The American Society of Digital Forensics & eDiscovery The American Society of Digital Forensics & eDiscovery
Limbus Studio Limbus Studio
DFS Logo DFS Logo
Mobile Phone Forensics
Mobile phones are nowadays almost anything but just phones. With the introduction of the 3G generation and the likes of iPhone, Blackberry etc. the mobile phones are a comprehensive tool that includes a portable computer, internet connection infrastructure, GPS for satellite navigation, cameras, and even Office suites, wireless connection to keyboards and printers; they are as complicated as it can get.

Until a few years mobile forensics was concentrated to retrieving SMS messages, photos, address books and details of the last connection with a mast. Today we can extrapolate incredibly more information. We can get deleted photos and videos, messages, call records, and even deleted documents. We can also retrieve internet browsing activity, instant messaging logs and wireless connections logs. We can also use the (in the GPS enabled phones) the SATNAV applications in order to trace where the phone has actually been.

Today, live tracing facilities allow companies to locate their employees through their mobiles, and parents to know where their children are, especially if they are vulnerable and very young. 

Once a mobile phone is under investigation, the relevant USB write blocker (either hardware of software) is used, to ensure there is no alteration to the suspect mobile or the suspect SIM card.

The amount and quality of the information that can be recovered, is subject to a series of factors.Please feel free to discuss what can and can not be recovered in an investigation and why. You may find services for specific devices on the top menu of this page under DEVICE FORENSICS. You may also find additional information in our Articles, the Brochures and White Papers pages.