Mobile Device Data Extraction

Conducted on-site or FedEx to our lab.
Safe. Convenient. Private.

DOWNLOAD OUR FORENSICS BROCHURE

Mobile device data extractions yield huge quantities of data. It has been calculated that 64 gigabytes of storage is about 33,500 reams of paper if printed. In smartphones, 64 gigabytes of storage is common, and a ream is 500 sheets of paper. What hidden secrets do we find—and make sense of—in all these gigabytes?

Mobile Device Data Extraction Information

  • Incoming, outgoing, missed call history.
  • Phonebook or contact lists.
  • SMS text, application based, and multimedia messaging content.
  • Pictures, videos, and audio files and sometimes voicemail messages.
  • Internet browsing history, content, cookies, search history, analytics information.
  • To-do lists, notes, calendar entries, ringtones.
  • Documents, spreadsheets, presentation files and other user-created data.

  • Passwords, passcodes, swipe codes, user account credentials.
  • Historical geolocation data.

  • Cell phone tower related location data.
  • Wi-Fi connection information.
  • User dictionary content.

  • Data from various installed apps.
  • System files, usage logs, error messages.
  • Deleted data from all of the above.

Keep in mind that this is not an exhaustive list.

Smartphones, PDA devices, cell phones, GPS devices and tablets are really mini computers. They reveal a rich history about the persons using them, and there are times when you need-to-know this history—and have it professionally documented. That’s when you come to us.

Some data extraction need-to-know examples…

  • Workplace crimes and espionage facilitated by employer supplied devices.

  • Documenting evidence to exonerate, or better explain, a user’s predicament.
  • Retrieve vital information thought to have been erased.
  • Settle disputes about location and timing of events.
  • Protection of minors.

Data Extraction Steps

The mobile device data extraction is a two-part process. First, there is a logical data extraction (“what you see is what you get”), then a physical data extraction; a hex dump, a bit-for-bit copy of the device’s entire storage.

Physical data extraction recovers deleted information, decipher data, and information from password-protected applications such as Facebook, Skype, WhatsApp, and browser-saved passwords. The process can usually overcome a device’s password locks, and SIM PIN numbers.

How to Schedule a Mobile Device Data Extraction

  1. Contact us, from a safe phone or computer. Tell us about your case.
  2. We will prepare a written estimate for your data extraction examination.
  3. Engage our services.
  4. We will schedule a mutually convenient time for our forensic technician to visit your location, or send us your mobile device via FedEx.
  5. Upon completion of the exam you will receive a verbal report, followed up with a written report. We also provide you with a USB stick containing the data, and an app which makes accessing the information easy.

    Sample Remote Extraction Report

Eavesdropping Detection: Is My Cell Phone Bugged? by Kevin D. Murray

Just curious? Read our book…
Is My Cell Phone Bugged?

website | amazon.com

Additional notes about our mobile device data extraction services…

  • Data extraction is conducted using law enforcement level forensic technology.
  • Inspection of multiple mobile devices during one session are discounted.
  • Data extraction can be conducted in conjunction with a Mobile Device Spyware Detection inspection and/or our TSCM inspections.  

We fully respect your privacy and confidentiality. Results are reported only to you.

DOWNLOAD OUR FORENSICS BROCHURE

Have a Question About Mobile Device Data Extraction?

If you have any questions about the the mobile device data extraction service provided by Murray Associates, simply fill out the form below, or call us from a safe area and phone.

If you think you are under active electronic surveillance, or believe you have discovered a bug or covert video camera, go to our Emergency TSCM page. The procedural checklist there will tell you exactly what you need to do next.