ISRA recovers and restores deleted data such as SMS, chats, call logs and browser histories from iPhones, smartphones, tablets and more. In fact, all of our IT-forensic services take mobile devices into consideration.
The reason is simple: these days, digital forensics is applicable not just to corporate networks, desktop computers and laptops. Android phones like Samsung, Blackberries, iPads and other mobile devices are used for more than personal communication. Increasingly, these portable gadgets are tools for the running of business and handling of personal data without the office.
For professional investigators this means that tablets, iPhones and similar devices can be used as a means of tracking the activities of individuals and groups. Access to the device can provide vital evidence, such as messages sent and chat logs, files that have been accessed through the device, photos taken, web-browser histories – including information about the particular times and places of these actions!
What types of devices can we access?
The brand or operating system of your device does not matter. We have the expertise to work on Samsung as well as iPhone and Android as well as IOS. And our IT-forensics team have the technical equipment to work with just about any common digital device, such as computers, smartphones, tablets, hard drives, SD-cards, USB-sticks and similar.
What if I don’t have access to the device?
In some cases, the smart phone or laptop that you would like to check out is out of your hands. Naturally, this makes things more complicates. But we find that if there is a will there is a way, and we have solid experience of dealing with challenges of this kind. Make contact and discuss your particular needs!
What if the data has been erased or encrypted?
Our experts can localise, restore and retrieve most types of data, even if it has been erased or encrypted. Typically our clients are looking for pictures, video or audio files, chat logs or various types of meta-data created during the use of the device.
What if my mobile device has crashed and is broken?
We can restore broken hard drives, and usually we can recover your SMS, chats, call logs etc. from broken mobile devices as well.
Our Work Speaks For Itself…
This was a straightforward digital forensics assignment, were suspicions already pointed in the direction of one of the employees. With forensic techniques we captured images of this suspect’s computer, and then executed a manual file recovery. Then followed the work of decrypting files that were heavily encrypted for protection, as well as making a script to facilitate the interpretation of the recovered data. The result of uncovering the data proved economically satisfying to our client. The suspected employee had been involved in a large-scale fraud. The investigation also provided conclusive evidence against this fraudster, locating the account where his private gains were banked.
The digital forensic work on this case primarily involved collection and analysis of logs from firewalls, servers and parts of the network. In addition, it proved valuable to conduct interviews with the client’s IT-staff, to get a clearer understanding of routines etc. We could soon confirm that there had in fact been an intrusion, where the perpetrator had gained full access. But we could also pinpoint the vulnerability in the particular application that the intruder had used, and identify malware that granted remote controlling. The location of the intruder could be identified and our client referred the case to legal authorities.
We helped our client reform existing IT-security and incident response routines to ensure that they corresponded to current industry standard best practices. In addition, we provided practical training for the IT-staff in the fields of data collection and incident response. At the end of this assignment, we performed penetration tests and similar to make sure that the security of our client’s network and the competence of the staff could withstand and deal with potential attacks in the future.
A former employee of the telecommunications company was suspected of having extracted copyright covered Java code and using it to the benefit of his new employer. In this case, the source code was extracted by a process of decompilation, and we could provide a detailed forensic report of the events to support our client’s legal action.
The particular feature of this assignment was the time restraint. Our client had an important meeting with a client of his own – in two hours from the time of contact! Certain files would be demonstrated and discussed at this meeting, and showing up without them was not an option. Fortunately, this case was easily resolved. Though the hard drive proved permanently damaged, we managed to recover the necessary files. In time!