Computer & Mobile Forensics

Computer & Mobile Forensics Computer & Mobile Forensics

Our Computer & Mobile Forensic Services include, but is not limited to:-

 

1. Computer Monitoring (local or remote)

Description

By installing monitoring software on the PC we can follow all activities (Browsers, chat, IM) of a user to monitor either locally or remote.

Potential Use Case

Activities of a family member on the Internet (inappropriate, pornography etc)

 

 

2. Remote or Local Key Logging / Screen Capture

Description

By installing key logging software we can see every key stroke that the user is making and when combined with screen capture software we can see what the user is looking at either locally or remote.

 

Potential Use Case

Activities of a family member, a particular phrase being typed.

 

 

3. Data Recovery (Computer, Mobile, USB, Camera)*

Computer & Mobile Forensics: Description

We  can provide data recovery from all types of storage media, Computers, Mobiles, USB drives and Camera etc. from a file, folder to a whole hard drive.

 

Potential Use Case

Accidental deletion of valuable code, sensitive business documents

Lost family photos (baby, wedding, graduation)

Graphics

*excluding hardware failure

 

 

4. Computer and Mobile, USB and Camera Forensics*

Description

We can collect, analyse and report on digital data in a way that is legally admissible using forensically sound techniques combined with software and hardware.

 

Computer

Images (including those deleted)

Emails (including those deleted)

Internet Browsing History

Documents

 

Mobile

PIN / Password

Text Messages (including those deleted)

Social Media files & History

Call Logging & analysis

Contacts & phonebook.

Images (including those deleted)

Emails (including those deleted)

Internet Browsing History

Documents

Maps & GPS location

 

USB

Files (documents)

Images( including those deleted)

Videos (including those deleted)

 

Camera

Images including deleted

 

Potential Use Case

Misuse of Company property

Criminal activities

 

*excluding hardware failure

 

 

5. Email Analysis

Computer & Mobile Forensics: Description

By analysing the data hidden behind the email you can determine such things as: the actual email account used, what software they use, their approximate location, sometimes even home address(when combined with other data sources).

 

Potential Use Case

Stalker / Hate mail / Targeted Attack – find out who the malicious person is and use this information to report to the police.

Spam – find out if an email is genuine.

 

 

6. CCTV/ Image Forensics (Including Image manipulation)

Description

Can extract / recover the CCTV footage from many different devices to perform audio /image enhancement, slow motion, still images. Can also perform image level analysis to determine if an image has been altered, forged or manipulated.

 

Potential Use Case

Enlarge & Find a particular detail. ie  license plate or a person’s face.

Find out if the contents of an image are real or whether it has been tampered with.

 

 

7. GPS Forensics

Description

It is possible to determine the following from a Satellite Navigation device i.e. TomTom, Garmin: Details of journeys.

 

Historic locations visited Places of Interest

Saved favourite locations

Track logs (showing start points and destinations) Deleted data

Bluetooth connections Mobile phone details

 

Potential Use Case

Find out where  your car has been

 

 

 

8. Bypass Pin and Password Authentication

Description

It is possible to bypass either the PIN or Password on mobile devices to re-gain access.

 

Potential Use Case

Forgotten password, valuable data on the device.

Password maliciously changed.

 

 

9.Password Recovery (Offices files, archives, PDFs)

Description

It is possible to decrypt a file that has been encrypted with a password, whether it be an excel document or a zipped file.

 

Potential Use Case

Valuable files that the customer requires access to, due to forgotten password.

 

 

 

10. Obtain windows, linux and Mac O/S credentials

Description

It is possible to obtain credentials on a Windows, Linux or Mac operating system to successfully login to the device in question.

 

Potential Use Case

Forgotten username and / or password, valuable data on the host machine

 

 

11. Obtain Internet (Facebook, gmail etc) credentials / history

Computer & Mobile Forensics: Description

It is possible to obtain any browser, web application credentials and history that is held on a hard disk.

 

Potential Use Case

Forgotten password, cant reset password.

Viewing previously viewed websites i.e. dating sites

 

 

12.Obtain wireless credentials / network analysis

Description

By capturing packets out of thin air, we can obtain the password used for a wireless access point / router. Once this wireless key has been identified we can analyze all traffic that is sent through the router from all devices.

 

Potential Use Case

Forgotten password

Find out if malicious traffic is bent sent through

 

 

 

13.Open Source intelligence

Description

Using publicly available resources online combined with scripts and tools, we can find information that wouldn’t normally be viewed by the end user.

 

Potential Use Case

Secure your identity online

Ascertain where someone has previously tweeted from, potentially providing GPS data

Locate associated  online identity/profile

 

14.Data Deletion to NSA standards

Description

Using specialist hardware we can ensure the secure deletion of data to NSA standards so it can not be recovered using data recovery techniques.

 

Potential Use Case

Sensitive data that the user needs to be permanently erased, as operating system delete does not delete the file.

Clients selling / recycling devices on whilst ensuring that their data is not situated on the storage medium within that device.

(Many people buy hard drives, phones on eBay etc. to purposely recover the previous owner’s data held on the hard drive or phone to sell on.)

 

 

15. Computer and Mobile Malware Analysis

Description

Using specialist tools we can identify, confirm and remove malware on computers and mobile through low level RAM analysis.

This service can usually stem from random deletion of emails and files on a user’s device.

 

Potential Use Case

Identify, confirm and remove malware from a user’s device, returning control to the user.

Computer & Mobile Forensics

Computer & Mobile Forensics

 

 

 

 

 

 

Law

To ensure we work in accordance with the law, we will require an authorisation form completed before commencing any work giving written permission from the system owner combined with a declaration of ownership, agreeing to a scope of works.

 

Expenses: Any receipted postage charges that may be incurred for sending devices to/from SGI/our forensic experts will be charged to client.

For an approximate costing for any of the above – please call us.

 

 

 

Services Include:-
Hire a Private Investigator; Private Detective UK; Covert Surveillance Wales; Professional Investigator Cardiff ; Witness Statements Swansea; Computer & Mobile Forensics;  CV verification Liverpool; CFA sign ups Gloucester; Employees Moonlighting Manchester; Enquiry Agent Aberdare: Address Verification; Covert Video Intelligence Cardiff; Private Investigations Cardiff; PC & Mobile Forensics; Accident Sketch Plans Swindon; Locus Inspection Ammanford; Suspected Fraud Cardiff; Llanelli Vehicle Trackers; Computer & Mobile Forensics;  GPS Tracker Hire Cardiff; Tracing Missing Persons Cardiff; Commercial Investigations Merthyr Tydfil; Computer & Mobile Forensics; Tracing Debtor Milford Haven; Private Detective Chippenham; Hire a Private Detective Cardiff; Tracking Assets Cardiff; Address Verification Cardiff; Personal Injury Surveillance Manchester; Computer & Mobile Forensics; Catch a Cheating Partner Cardiff; Door Knock Enquiries Ystalyfera; Private Investigator

 

 

Professional Investigator Network
British Agents
Linkedin
 UK Professional Surveillance Network
Approved Private Investigator