Encrypted Communications

Encrypted communications is when two entities are communicating and do not want a third party to intercept or to listen in. Encrypted communication means people can share information with varying degrees of certainty that third parties cannot intercept what was said. An encrypted phone is a highly secured phone with encrypted internal components and encrypted communications such as encrypted calls, sms, messages, file share and encrypted storage.

Secured Phones and Crypto phones are mobile telephones that provide security against eavesdropping and electronic surveillance.  Encrypted phones can protect calls from interception by using algorithms to encrypt the signals. The phones have a cryptographic chip that handles encryption and decryption. Two algorithms are programmed into the chip, a key-exchange algorithm for the key agreement protocol and a symmetric-key algorithm for voice encryption.

Encrypted Mobile Phone Calls consist of securing and encrypting mobile phone communications by all layers of communication such as full end to end encryption for Voice calls between both phones via a secured encrypted platform. Secured Phones are mobile telephones that provide security against eavesdropping and electronic surveillance. Digitpol supplies highly secured phones, laptops and encrypted communication platforms to the corporate sector.

The interception of telecommunications has become a major industry. Most of the world's intelligence agencies and many private organizations intercept telephone communications to obtain military, economic and political information. The price of simple mobile phone surveillance devices has become so low that many individuals can afford to use them. Advances in technology have made it difficult to determine who is intercepting and recording private communications. Digitpol supplies secured communications to the corporate sector.

The testing of secured mobile phones is carried out on several layers, forensic extraction of data from the phone using law enforcement grade forensic tools, chip off forensics, interception of calls and man in the middle attacks. Encryption is a method in which data is rendered hard to read by an unauthorized party. Since encryption methods are created to extremely hard to break, many communication methods either use deliberately weaker encryption than possible, or have back-doors inserted to permit rapid decryption.

Digitpol provides encrypted devices that have been tested by all means such as forensics and interception.

Secure Mobile Communications

Secure mobile phone communications consist of securing all layers of communication such as end to end encryption for Voice calls, Messaging, Documents, Files and Location Data.

What Is Protected by an Encrypted Phone 

  • Secured Voice Calls (GSM)
  • Secured Messages (SMS)
  • Secured VoIP Calls via fully end to end encryption communication portal
  • Secured Messages  Calls via fully end to end encryption communication portal
  • Secured Group Messaging
  • All data held on the phone
  • Photos on Device
  • Contacts List
  • Documents
  • GPS data, routes
  • Cell Tower ID storage
Mobile Application Testing

Our Expertise

MOBILE LAB FOR FORENSIC EXAMINATION

Mobile device forensics is a branch of digital forensics relating to recovery of digital evidence or data from a mobile device under forensically sound conditions. The phrase mobile device usually refers to mobile phones; however, it can also relate to any digital device that has both internal memory and communication ability, including PDA devices, GPS devices and tablet computers.

Mobile phones are proven to be valuable sources of information in the majority of investigations. Parties in litigation seeking to prove wrongdoing often find important evidence, clues and traces by analysing activities stored on cell phones and smart devices, including contacts and their creation dates as well as when and how often certain phone numbers were called.

We specialize in recovery of data from mobile phones and portable devices. We recover SMS, Calls, Emails, Media, VoIP data, GPS, Internet History, Whatsapp, Viber, Signal, Telegram, Deleted Data, Cloud Sources and all Cell ID Data.

Recover Data From Mobile Phones

Digitpol utilizes global leading technology,  Cellebrite Technology, Cellebrite’s forensic expert technology allows us to carry out forensic acquisition of data from the supported listed devices.

What Data is Recoverable 

  • SMS | IM Chat | WhatsApp | Viber | Skype | Wechat | IRC | Deleted
  • Call history | Incoming | Outgoing | Missed | Deleted
  • EMAILs | Incoming | Outgoing | Drafts | Deleted
  • GPS locations | Waypoints | GEO tagging of pictures
  • Photos | Sent | Received | Deleted
  • Social Network logs | Activity Time | GEO Login | Deleted
  • Internet History | History | Entered Keywords | Searches | Deleted | Cookies
  • Wifi Data | SSID | MAC | I.P
  • Bluetooth | Paired devices | Timestamp
WIFI & NETWORK ANALYSIS

Digitpol Cyber Crime Team specialise in wireless network analysis, we offer RF site surveying, WiFi analysis, Secured wireless network installation and Wi-Fi security services for private and public Wi-Fi hotspot networks.

We perform Surveys to record all Wi-Fi networks on the 2.4GHz and 5GHz spectrum to determine what devices are on your network and if any rogue devices are present. We conduct pen testing on your network via Wi-Fi. We don’t need to access your offices to perform the tests.

CLOUD FORENSICS
Worried about data in the cloud?

Cloud data sources represent a virtual goldmine of potential evidence for forensic investigators. Together with mobile device data, they often capture the details and critical connections investigators need to solve crimes. However, access remains a challenge. Roadblocks and red tape by cloud service providers add time and significant cost to investigations. UFED Cloud Analyzer provides forensic practitioners with instant extraction, preservation and analysis of private social media accounts — Facebook, Twitter, Kik, Instagram — file storage and other cloud-based account content that can help speed investigations. Cellbrite has the ultimate solution when it comes to Cloud Forensics, Digitpol utilises the Cellebrite platform to conduct investigations.

Order an Examination or Call Us