Our mobile phones and tablets are now the most personal devices we own. Our mobile devices log everything: Our conversations, our calls, our pictures, our web browsing. Your life is on your phone. This is why a mobile device can be so valuable in a litigation or criminal case.
Flashback Data has the ability to capture and preserve the data on almost any mobile device just like we always have for computers. We can recover deleted text messages, call history, pictures, and even analyze how the device was typically used and at what times.
We support all of the most popular devices, including (but not limited to):
New iPhones are released each year, and they are used by millions of people. This means our experts continue to update our iOS forensics research, as well. We can use our mobile forensics services to go through malware, spyware, and recover data from broken iPhones.
Android manufacturers have created many different devices and the internal makeup varies, making it difficult for analysts to perform data recovery in Android forensics. Androids have eMMC, eMCP or UFS chips and removable SD cards for extra phone storage, which make it difficult to retrieve data. Android devices can provide a challenge, but Flashback Data will work carefully and effectively to recover data.
iPads and Kindles
Tablets have become very convenient in businesses and at home. iPads and Kindles also have different internal makeups depending on the device, so analysts have to evolve their research and techniques to retrieve data from tablets.
Our Forensics Process
We have streamlined our forensics process to make it similar to how an investigation works. Not every investigation is the same, but there are similarities.
Step 1: Engagement
Before beginning an investigation, we will have a meeting to discuss case objectives and create a detailed work statement.
Step 2: Preservation
No matter how many devices are involved in the case, the next step will be to preserve the evidence and begin a chain of custody through verified copies of evidence. This will help track the movements to and into our lab and save the original data.
Step 3: Investigation
Investigation is where the main work happens. Our experts will retrieve data, analyze it, take notes, and build a credible story with the data.
Step 4: Reporting
When the investigation is complete, we compile everything into a report explaining our findings, which are clear and easy to understand for people with different levels of technology knowledge.
Step 5: Testimony
Our experts can testify in court on the case findings if needed.
Flashback Data has worked for clients around the world since 2004 on sensitive incident investigations and forensic data recovery services. We have worked for corporations, law firms, and foreign governments.
We have a ISO/IEC 17025:2017 laboratory that is accredited by the American Society of Crime Laboratory Directors. We also have several certifications:
- Certificate | ALI-113-T
- Field of Accreditation | Forensic Science Testing
- Discipline | 9.0 Digital and Multimedia Evidence
Our personnel are experts in law, criminal investigation, intelligence, fraud examination, and information systems and security, and our forensic examiners are highly credentialed in many fields.
Flashback Data has a very secure facility that will protect your media at all times. The lab features four zones equipped with 24/7 monitoring, antistatic flooring, class 100 clean room workstations, flash memory and mobile phone repairs stations, thousands of hard drive replacement parts, and more.
The forensic lab has powerful workstations and fast hardware imaging stations, as well as dozens of terabytes of storage.
To recover data from a device, the environment must be clean since any dust, fingerprints and dirt can harm the recovery process. Flashback Data performs all recoveries in a safe and clean environment for the best results possible.
We also perform advanced mobile device forensics that go further than other digital forensics labs. Most labs stop when their forensic tools do not support a device or when they run into a passcode locked phone. At Flashback Data, we take it to the next level with JTAG and chip-off level forensics.