Mobile About Slide

Forensic Mobile Work


Your personal history revealed here

secure the data on your mobile deviceBack in 2009 Disklabs was featured in a Computer Weekly article entitled “Forensic mobile phone work reveals threat to all of us“.

The article revealed exactly how much detailed information could be gleaned about an individual from text messages, emails, contact databases and apps. Information that could be used to get access to bank accounts, to determine the best time to burgle your home or, more insidiously, for both cyber and physical stalking.

Six years on the situation has only got worse.

93% of UK adults now own mobile phones (source: Mobile Operators Association) and more than two thirds have a smartphone (source: Mobile Consumer 2014: The UK Cut. Deloitte). Our smartphones and tablets contain even more details of our personal and business lives.  Not only have the devices themselves been given greater processing power and capacity but they plug us in more effectively than ever to a myriad of apps, social media sites and eCommerce opportunities.

It is true that manufacturers and content providers have introduced various security measure and features to help protect us from prying eyes. Fingerprint scanners and facial recognition on our phones and tablets; Two-step verification log-ins and secure encrypted sessions for websites and apps.

However here are two statistics that make those measures sound less reassuring.

One. A 2014 study by Consumer Reports suggested that 34% of smartphone owners in the US don’t use any security features at all – it isn’t likely that the UK will be better in this respect.

Two. A staggering 183, 523 smartphones, tablets, laptops and USB drives were reported to the Police as lost or stolen in 2013-2014 (source:  EE (source: actually suggested the figure was as high as 10 million.

It all adds up to a massive risk for both individuals and organisations.  Reported UK cybercrime in 2013-2014 was valued at £670m but this is likely to be a massive underestimate.  Disklabs has provided its digital forensic investigation capability for a variety of public and private bodies and maintaining privacy has been the watchword in every case.

So what can you do to be more secure?

• Set up lock screens and use a pin number or better still a password with a mix of alphanumeric characters, upper and lowercase.  Pattern unlocks can be detected by greasy finger trails on the screen.

• Use apps to provide antivirus, antitheft, device location and privacy protection features. Providers include Norton, AVG, BullGuard and Sophos.  Don’t use any apps that come from unknown sources.

• Switch off automatic wifi, Bluetooth and NFC connections to stop your device from connecting with spoof networks.

• Consider encrypting your smartphone and SD card. This offers very strong protection to your phone but there are some disadvantages.  It may slow your phone down and once you have enabled it you can’t go back to non-encrypted use without a factory reset.

Most people don’t willfully leave their doors and windows open, a stack of money laying on the kitchen table and a list of the location of their most valuable belongings pinned to the fridge when they go out.  Don’t do the equivalent on your mobile device.

Visit our website for more information on Disklabs’ range of digital forensics and data recovery services or get in contact.  Call us today on +44(0)1827 50000 or use our contact form to let us know your requirements.


Image courtesy of Stuart James at</>


Remote Computer Forensics


Supporting the IT Department

remote computer forensicsWe live in an increasingly litigious world where companies can easily find themselves in the middle of legal action. Increasing corporate legislation means that considerable amounts of data must be made available usually from digital storage. Other cases including employee misconduct require a computer forensic response, including the ‘imaging’ and examination of hard drives in line with accepted techniques for integrity and continuity of evidence.

These issues can be an extraordinary pressure on IT Security Teams. These teams by definition cannot be expert at everything within the digital security arena.  As a result incident response and e-discovery requirements are often handled incorrectly leaving the company open to criticism and legal action.

A cost-effective solution now exists for IT security teams to manage their legal responsibilities from a central location by using software that ensures forensic integrity of data. From any location around the globe (law allowing) machines in the enterprise can be examined, hard drives imaged for forensic examination and necessary surveillance carried out.

Intelligent monitoring

The solution revolves around the pre-deployment of tiny covert software ‘agents’ which can be deployed using standard patch management systems. The ‘agent’ provides a point of contact for the Console which is used by the security team to communicate with each PC or Server. The ‘agent’ allows the Console to connect to it using encrypted authentication and provides the operator with the ability to collect volatile evidence (network connections etc), RAM and even the entire drive. This is a way for providing a remote forensics solution for the enterprise.

The ‘agent’ also provides unparalleled abilities to monitor the computer for anomalous activity that can be set by the Remote Forensic Expert. This may include the amount of data traffic being generated or data being copied to an external device. This behaviour can notify the Remote Forensics Expert who can respond to an incident anywhere in the world immediately. The Remote Forensics Expert can grab an image of the screen of the remote PC, turn on keylogging and even sniff data packets being generated or received by the computer. This can act as intelligence gathering to make the decision whether to image the machine or not.


Increasing legislation, especially surrounding SOX, (Sarbanes-Oxley), in the USA is causing many companies headaches when e-discovery demands are made upon them. Our solution greatly simplifies the issues by allowing the Remote Forensics Expert to instruct each deployed ‘agent’ to search for defined data criteria and either copy the data to a central store or just report its presence.

For example, a law firm may require all data created after a certain date which contains particular keywords, alternatively they may wish to know which computers have a certain spreadsheet on them, and you can even query your enterprise to see which computers have accessed a particular web site. These capabilities make complying with e-discovery demands considerably simpler.

Although there are other solutions in the marketplace which provide some of these elements, our solution is not bound to any specific forensic examination platform and is significantly more cost-effective.

Disklabs has a team of digital forensics experts offering a range of investigatory and consultative capability.  Let them advise you on a remote computer forensics solution today

Call us on +44(0)1827 50000 or use our contact form to let us know your requirements.


Disklabs – Computer forensics services for legal and civil investigation.

Top Ten Unusual Requests for Data Recovery – No. 9


Data Recovery Hit Parade

recover data from damaged diskNumber 9 in Disklabs countdown of odd request for data recovery from computer disks.

“I dropped it from a second-floor building…on purpose.”

A client decided to test exactly how rugged his ruggedised laptop was by dropping it out of the window. Unfortunately he didn’t know that the specialised hard drive in the machine had been swapped for an ordinary hard drive.

Although the insides of the drive had been damaged by the fall Disklabs was able to recover the data intact.

If you need to recover data from a damaged disk drive we won’t tell anyone how it got that way!

Call us today on +44(0)1827 50000 or use our contact form to let us know your requirements.


Disklabs - Equipment degaussing experts