Example 1: Deletion of Personal Information:
A Client requested a “dump” of her cellphone. Dump meaning data extraction. Even though she had backed up the phone to the cloud some photos were not there, and she could not access text messages that she had deleted in a moment of anger from her device. The messages contained attached photos and information
Example 2: Evidence Needed for Court:
An attorney requested to have his Client’s phone Cloned. Cloned meaning a Forensic Extraction of Data. He was in the pre-liminary stages of representing his Client in an Employment Sexual Harassment Case. The Employee harassing his Client was a co-worker and in the process of divorce. She had refused any personal relationship with him, but he continued to send text messages, emails and call her after work hours. Although she demanded he stop the communication, he continued. She had filed a formal complaint with the company, but they were of no assistance.
Example 3: Metadata:
A client was accused of causing a personal injury while on vacation. The client stated that they could not have been in the location where the injury occurred and happened to have taken a video at the same time the incident took place. By extracting the video and analyzing the metadata contained within the file we were able to overlay GPS coordinates and time stamps over a digital map to show that the client could not have been responsible for the alleged injury.
Example 4: Spyware or Malware Analysis:
There are risks involved when using a cellular device. Outside of the “Health Risks” reported there is a possibility that your device may have had a spyware or malware application installed. Most spyware applications we have found have been installed by having possession of the device. There are applications available to the public, usually sold by a dealer or manufacture outside of the US that have the capability of being installed remotely. This type of spyware is most likely sent as an attachment. We strongly advice our Clients to avoid downloading any attachment or opening an email from a number or email not familiar to them. There are multiple reasons a Client would request an Analysis of their cellular device if they believed spyware has been installed. Infidelity, Divorce, Stalking, and Disgruntled Employees are many reasons why one party would install some type of spyware/malware application on the other party’s phone to be privy to confidential information, text messages, location, contact lists and email communications.
Example5: Infidelity Reasons:
Many times, an individual will request an extraction of their spouse’s cell phone. First, you must have authorization to do so, access to the phone and the password, if the phone is password protected. Although the requestors results are not going to be submitted in court, the same procedure is followed for the extraction process so that information (to include deleted data) can be obtained.
To conduct a spyware analysis or any of the procedures above, we work off the extraction and not the device, therefore our results can be used in court without having any modifications made to the phone. The extracted data is kept in an encrypted format during the process so that your information remains secure.