3EF-Twitter
3EF-Google+
3EF-Logo

Mobile Phone Forensics Overview:
The prevalence of mobile phones in today’s world as a form of communication has led to a new, rich evidential resource in both law enforcement and defence cases. Modern mobile phones, particularly smartphones, are much more than simply devices used to make telephone calls, they are much more akin to portable computers. Extracting data from mobile / mobile phones however, is a specialist skill and not the same as recovering information from computers. Most mobile devices don't share the same operating systems and are proprietary embedded devices which have unique configurations and operating systems. What does that mean in terms of getting data out of them? Well in simple terms, it means it is very difficult to do. This is where 3EF come into their own...

Mobile Phone Forensics is fraught with problems unseen by any other Digital Forensics discipline

* Tens of thousands of handset manufacturers and models

* Countless OS versions 

* Physical damage, water damage, encryption, PIN/password locks

Our laboratory is full of the best hardware and software available in the world today, along with tools and techniques that are at the cutting edge of mobile phone forensics.

Whether you're Law Enforcement, Defence, Civil, Corporate or Private, we can help.


We have made a name for ourselves among the forensics community for being able to extract data from mobile devices when all others have failed. We are consistently able to access data thought unrecoverable by others, including High Tech Crime Units of major police forces and large Digital Forensics companies.


Of course, we don't just recover from 'difficult' handsets - Our bread and butter is performing forensic extraction and analysis on all mobile devices. The difference is in the understanding and interpretation of the data, and that's where our experience sets us apart from the rest. We are able to delve deeper into the available data, providing valuable context and offering alternative explanations for data that is found, how it may have got there, what can and cannot be proven, and so on.


WE  perform extraction and in-depth analysis of data from thousands of mobile devices, including:

  • Feature phones
  • Smartphones
  • Tablets- Apple, Android, Windows, BlackBerry, Linux etc
  • Associated external memory- SD, MicroSD, MMC etc
  • Portable GPS devices
  • Phones manufactured with Chinese chipsets
  • 3G Modems
  • Portable music players, iPods, MP3 players etc


We can extract data including (but by no means limited to):

  • Handset information and SIM-card data
  • Accounts Infromation
  • Contacts
  • Incoming/Outgoing/Missed Call Logs
  • SMS/MMS/Email 
  • WhatsApp, Tango and chat data from many other messaging applications
  • Web History
  • Tasks
  • Text notes
  • Photos (live and deleted)
  • Videos (live and deleted)
  • Audio (including answering machine messages, voice-notes and messaging app audio messages)
  • GPRS and Wi-Fi activity giving locations
  • Accounts Information
  • AIM
  • AMR
  • Android User Dictionary
  • BlackBerry Messenger
  • Bluetooth Devices
  • Browser Activity
  • Burner
  • Cache.Cell
  • Cache.Wifi
  • Calendar
  • Chrome
  • Device Information
  • Downloads
  • Dropbox
  • Email
  • Facebook
  • Firefox
  • Foursquare
  • Gmail
  • GMX Webmail
  • Google Analytics
  • Google Hangouts
  • Google Maps
  • Google Talk
  • Grindr
  • Growlr
  • Instagram
  • Installed Applications
  • Kik Messenger
  • LINE
  • Malware/Phishing URLs
  • Meet24
  • Pictures
  • Pornography URLs
  • RebuildWeb
  • Sina Weibo
  • Skype
  • Snapchat
  • Telegram
  • TextPlus
  • TigerText
  • Tinder
  • Torrent
  • Touch
  • Twitter
  • Viber
  • Videos
  • VK
  • Webpage Recovery
  • WhatsApp Messenger
  • Whisper
  • Wi-Fi Profiles
  • Yahoo Mail



And much more... As you can see from this incomplete list, the amount of data recoverable from a mobile phone is astounding. 

We present the data extracted in a clear and meaningful way, so you can quickly and easily understand what data of interest was gleaned and what this means to your case or client. Although you will be given the entire download of the device as well, you will not have to trawl through Gigabytes of meaningless data. 

Call Data Records Analysis

CDRs come in all shapes and sizes, formats and layouts, making them incredibly difficult and time-consuming to decipher and collate into meaningful, understandable data... 

On the one hand you have the different Network Providers submitting different data in different formats

On the other hand, you have the prosecution slicing and dicing, cutting and pasting - Then rarely handing over the original data for analysis...

That's where we come in.

We are able to turn mountains of data into a meaningful set of facts, isolating the data of interest and creating easily digestible, visual representations of the data of interest:


'Did the defendant make those calls?'
'What other calls did s/he make?'
'Is the usage at the time in question unusual?'
'Can it be shown that my client sits much lower in an alleged conspiracy heirarchy than is being alleged?'
'Was there a high volume of traffic, as alleged, or were there a large amount of  missed calls?'
And so on.

Don't be put off by the huge amount of data served by the prosecution; we're here to make sense of it for you.


See here for a more detailed explanation of Chip-off
See here for a more detailed explanation of JTAG
See here for a more detailed explanation of I-SP (In-System Programming)

Mobile Phone Forensics

3EF-LinkedIn

Tel: 0161 241 9458

Tel: 020 7096 1125

​Email: enquiries@3ef.co.uk