Mobile Forensics2022-01-18T11:00:19+03:00

Mobile Forensics

The term “mobile devices” includes a wide range of tools, from mobile phones, smartphones, tablets and GPS units to wearable devices. What they all have in common is that they can contain a lot of user information. Accusations do not occur independently of technological trends; therefore, mobile device forensics has become an important part of forensics.

The Mobile Forensics process aims to recover digital evidence or related data from a mobile device, forensically protecting evidence. To achieve this, the data is isolated and analyzed in the mobile forensic process and turned into digital evidence. This is a useful tool that researchers use to collect crime evidence from a digital data trail that is often difficult to erase. The removal of deleted mobile phone files used as criminal evidence is the primary work of cell phone forensic researchers.

Mobil Adli Bilişim(Mobil Forensic)

Content of Mobile Forensics

Cell phone forensics include taped conversations, digital phone images, cell phone texts or emails, phone number lists, and sometimes even cell phone digital video recordings. Once the evidence has been collected for legal purposes, it can be stored to prevent the deletion or damage of important digital materials through systems developed for the extraction of mobile phone data. Mobile forensics in short, similar to computer forensics, depends on researchers’ research techniques and experience. Once the data has been successfully extracted, appropriate analysis is needed. We use our extensive forensic experience supported by proven methodologies to accurately interpret data.

Did You Like The Service? Let Us Call You!

Frequently Asked Questions About Mobile Forensics

Why Should I Use Mobile Forensics Service?2020-02-24T14:08:56+03:00

Smartphones offer many different features and allow users to do almost anything they have done with computers before. Smartphones replace desktop computers in almost every aspect, with portability advantages; from private use to business, from taking photos to online banking.

As a result of this situation, smartphones carry valuable information for many researches. It helps the forensic researcher to identify the target person and access information such as recent chats, call records, location data, pictures, and information about their recent activities. In most cases, they carry more personal information than a traditional PC used. Thus, analyzing mobile phones has become the main part of a forensic investigation.

How to Configure a Typical Mobile Forensics Investigation Process?2020-02-24T14:08:23+03:00

There are 4 main parts of a forensic investigation:

  • Seizure: The responsible organization seizes the mobile device and protects it from network communication.
  • Data Extraction: Data extraction from a mobile device with a known mobile forensic toolkit. (Cellebrite, UFED, MSAB XRY, Oxygen Extractor, Hancom GMD, etc.)
  • Analysis: Analysis of data extracted with the aid of a mobile forensic toolkit. Evidence search and verification.
  • Reporting: Exporting evidence that is easy to understand for later use of non-technical personnel.
What to Do While Confiscating Smartphones and Other Mobile Devices?2020-02-24T14:07:56+03:00

Environmental documentation: When assessing evidence in any judicial institution, preparing documents as required is one of the most important tasks. First of all, photographs of the mobile device itself and the environment (especially cables, adapters, docking station, etc.) should be taken. Also note the status of the device (operating / not operating; locked / unlocked; visible damage, etc.) in the documentation.

IMEI documentation: As an identifier for smartphones, the documents usually use the IMEI (International Mobile Station Equipment ID). Because IMEI needs to identify a device in the cellular network, dual SIM phones have two IMEIs, and phones made for the CDMA network have MEIDs instead of IMEIs. Tablets that are not capable of binding to a cellular network do not have an assigned IMEI.

Usually the IMEI is printed on the back of the phone or on a label on the bottom of the battery. If you cannot find an IMEI this way, you can usually find it in the phone’s menu or by pressing * # 06.

Using Locked Mobile Devices: If the phone is unlocked, the first priority is to stop the phone from locking, touch the screen, and set the screen timeout setting to the maximum. The next step is to go to the security settings and check if any lock code is set. If the lock code is available and the code is unknown, it is conceivable that the data extraction from the phone be performed immediately at the scene.

If the display is not active when the device is found, the display should not be touched; thus, possible stains on the screen can be removed and solved by possible unlock patterns of the phone.

All modern smartphones have the option of locking the phone with the remote control command or deleting all data on the phone. This imposes the risk of losing all evidence of a device. In addition, data received after the seizure may alter or overwrite evidence and undermine the forensic soundness of your examination. Therefore, the next priority should be to disconnect the device from

All Forensic Services

Network Forensic
Computer Forensic
Mobile Forensic
Go to Top