There are three ways we collect mobile phone evidence:
- Mobile Phone itself.
- Backups of the mobile phone on the computer.
- Backups of the mobile phone on a cloud service.
Our forensic software and collection procedures are fully defensible. Meaning, we protect your data integrity so you can use it for litigation if needed. We extract images, videos, text messages call logs, notes, voicemail and application data. In addition, we always maintain chain of custody and preserve the integrity of the evidence, so it can be admissible in court.