Communication devices from mobiles to Tablets, Macs and PC’s include countless components and data-holding areas. From something as simple as recovering information or passwords to more in-depth examinations, we use industry-leading forensic processes to help you obtain the information held on it. The same goes for the associated SIM cards and memory cards – all of this can be examined and documented for you, quickly and simply.
- Data from most digital devices can be recovered, including:
- External Hard Drives
- Thumb drives
We will access deleted data from formatted and even damaged drives, and can also assist with Bitcoin wallet recovery and lost password recovery.
Examples of information which can be recovered from mobile phones include:
- General device information and settings
- Phone Information
- Call Logs
- Text Messages (SMS – Short Message Service)
- Picture Messages (MMS – Multimedia Messaging Service)
- Contacts with Photos
- Custom phonebook field labels
- Pictures & Images
- Camera Recordings (Still & Video)
- Audio Recordings
- Web History
- Internet Data
- Google Maps
- Google Talk
- User Settings
- User Property Lists
- Speed Dials
- GPS (Locations & Satellite Navigation)
- File System Data
- 3rd Party Applications Settings
- Office Documents
- Paired Wi-Fi networks list with their geo position
- Paired Bluetooth devices list
- Skype calls, chats and SMS messages history
- Skype address book
- User dictionary
Bitcoins are an increasingly valuable commodity – their high profile in the media recently has raised awareness of their value, and as such they are becoming increasingly attractive to thieves. Sytech can help you in the event that you fall prey to a Bitcoin thief, whether from external hackers or from someone with physical access to the computer, tablet or phone used for your storage or actual Bitcoin transactions.
Our industry-leading experts draw on years of experience and a vast array of methods to forensically examine the device from which the Bitcoins were taken, and determine how access was gained. We then look for the traces of activity left behind that may point to the identity, IP address and/or location of the hacker or thief.
Sytech are also able to analyse the Blockchain itself. The Blockchain is a continuous, authoritative record of all historical Bitcoin transactions. It is possible to analyse the transactions for a particular Bitcoin and follow them back to an IP address. This can be cross-referenced against any IP address found in the preliminary investigation to further bolster the evidence against the thief.
We are also able to trace Bitcoins even after coins are split up into multiple transactions and wallets or aggregated into one wallet. There are laundering or Bitcoin mixer sites available to help the Bitcoin thief hide their tracks – however the liquidity of these sites is still so low that it is sometimes still possible to follow out.
We will then follow these until the thief tries to “cash-out” on an exchange; due to the current legislation being worked upon for crypto currencies, the vast majority of these exchanges are requesting identification materials in order to create and use an account.
With the assistance of Law Enforcement, Government Agency or Court Order it will be possible to request the user’s details and consequently it will be possible to prosecute and reclaim the stolen currency as with any other type of theft.
All evidence gleaned is done so in a forensically sound manner following ACPO guidelines by our team of experts, who can be called upon in a court of law to act as expert witnesses.
Prevention is better than cure
Sytech also offer an assessment of your digital security so that together we can pre-empt the hackers or thieves to ensure that your hard-mined Bitcoins are never in danger. We can assess your level of vulnerability and plug any gaps in your security for you before they are exploited by would-be thieves. We can also inform you of the best and latest forms of secure storage for your Bitcoin Wallet.
Contact us and we’ll be very happy to provide further details.