Mobile Forensics

Forensic evaluation of smartphones, tablets and other mobile devices

Smartphones, tablets and other mobile devices are everyday companions of many people and carry important data in themselves. Using specialized forensic hardware and software, these content can be extracted from these devices and subsequently analyzed.

While regular computers represent a relatively “open” platform with established standards, smartphones tend to be self-contained systems. In this case, it is not intended for the user to exchange, change or read components or the configuration of the underlying operating system.  Accordingly, the success of an extraction depends on the manufacturer, model and the version of the operating system of the device.

In addition to the analysis of contacts, call lists, SMS, social networks and messages from messaging services, it is also possible to extract movement data, e-mails and passwords from most systems. And much of it is outsourced into the cloud.

In addition to the extraction and evaluation of a smartphone via the commercial forensics toolkits, T3K-Forensics has specialized in analyzing SQLite databases, app analysis and analyzing the network traffic of a smartphone.

T3K-Forensics therefore offers support in the entire mobile-forensic evaluation cycle.

Mobile- & Cloud Forensics

Securing and evaluating smartphones, tablets and cloud data.


Identification, securing, analysis, preparation and documentation of evidence on data carriers

Mobile Security

Identify and defend the threats of mobile devices

Forensics Trainings

Mobile Forensics Trainings & Workshops for authorities in the European area

Our Expertise

Analysis, preparation and judicial use of digital evidence