Cell Phone Extraction

  • Why would you need your phone forensically extracted and analyzed?
    Permalink Why would you need your phone forensically extracted and analyzed?Gallery

    Why would you need your phone forensically extracted and analyzed?

Why would you need your phone forensically extracted and analyzed?

Why would you need your phone forensically extracted and analyzed?  Here are a few reasons to do so.

Example 1: Deletion of Personal Information -
A Client requested a “dump” of her cellphone. Dump meaning data extraction.  Even though she had backed up the phone to the cloud some photos were not there, and she could not access text messages that she had deleted in a moment of anger from her device. The messages contained attached photos and information required by her employer.

Example 2: Evidence Needed for Court -
An attorney requested to have his Client’s phone Cloned. Cloned meaning a Forensic Extraction of Data. He was in the pre-liminary stages of representing his Client in an Employment Sexual Harassment Case. His Client’s boss was in [...]

Investigations: Fact or Fiction

Our results are the truth: Is what we think we see or what we have heard or the way we feel fact or fiction? Investigations are conducted to uncover the truth. A Background Check to learn about an individual, Surveillance to observe activity, Polygraph or VSA for deception, Forensic Analysis for malware and extraction of data, Asset Search for hidden funds or net worth are conducted when finding the truth matters.

We want to know if our spouse, boyfriend, significant other is faithful, and if not, we want them to have the courage to be honest about their activities, but that isn’t always the case. How do we find the answers?
We want our children to be safe when we drop them off at [...]

Why Have Your Cell Phone Data Forensically Extracted?

There are many reasons an individual, attorney or a company would request an extraction from a device.

An accusation of cheating on your spouse or even worse you suspect your spouse of being unfaithful can likely be addressed by analyzing cellular user data. More than likely there is sufficient evidence on of your cellular devices to either give credibility for or against the accusation. Now, what if the smoking gun was a GPS location saved in a temporary folder destined to soon be deleted? Or what if the text messages between a cheating spouse and their fling have been deleted? Our digital forensics software easily carves out deleted data and GPS location data from phones, but not all phones keep deleted user data the same [...]

Ostriches Don’t Get a Fair Deal in a Divorce

For those of us who have been divorced, we understand the process and procedures.  We know that we either represent ourselves (which could create problems during and after the divorce) or we retain the services of a reputable law firm (which prevents the pro-se issues).  We enter into a marriage full of hope and dreams and unfortunately, we are only in control of half of that relationship.  We enter into a divorce with the expectation to right the wrongs and in many cases, there are activities that need to be investigated.  The he/said she/said of the relationship holds little weight in court.  Documented behavior and actions are required.  Not all divorces are complicated, but in relationships that end due to deceit, hiring an investigative [...]

Was It Really an “Air Tight” Criminal Case?

DeVon’s criminal defense attorney called us and explained that the police had an “airtight” case against his client for multiple felony charges. DeVon’s aunt was footing the legal bill and told him she didn’t care about the cost as she believed her young nephew was innocent of the charges.

The attorney was fresh out of law school and was a sole practitioner and pretty green.

Apparently, DeVon was seen by two witnesses breaking into an elderly couple’s home in a ritzy neighborhood and carrying out a large trash bag, ostensibly with stolen items and dumping them into his car. They didn’t get the license plate number but did obtain a general description of the car. DeVon was later stopped by the police who found an empty [...]

October 5th, 2017|Cell Phone Extraction|

Cellular Forensic Data Extraction Solved the Puzzle

When Arthur contacted us at International Investigators, he was perplexed about his wife of 27 years whose personality had changed, her marital demeanor had changed, her sexual needs seemed to require more of an aggressive manner and her choice of provocative clothing was different than her previously conservative nature.  She was currently the breadwinner; he was the stay-at-home husband for the last three years taking care of their five children, two of whom were in college and the other three in high school.   She was a high-powered executive with a big corporation and traveled quite frequently on business.  Arthur equated the changes to a possible affair.  Her company cell phone was usually by her side.   Occasionally Arthur had the opportunity to scroll through the emails [...]

Verbal or Written Communications are Not Always Private

Technical Surveillance Countermeasures, sometimes called TSCM Sweeps, debugging, wiretap detection or just plain old “sweeps”.  With the advent of cellphones, VOIP phones, computer Skype, FaceTime, go-to-meeting and the many other ways of communication, illegal eavesdropping has become easily available to those who are curious.  Google the internet for mobile phone bugging and you will find many “offshore” providers that sell highly sophisticated cell phone spy software for usually less than a hundred bucks.  Carefully read the advertising material posted on these sites and you will find that they guarantee that the spy on cell software can’t be found.  They provide a detailed tutorial explaining how to remotely install phone spying software on a target phone.  Electronic eavesdropping is illegal in the United States and [...]