ChangeLog: Improvements: Possibility to select how many concurrent session use during a download Bug Fix: Fixed a BUG which caused the downloading of mail folders to fail
SecurCube is a team of digital forensics experts and IT developers focused on justice.
Hands on experience and constant research: we create highly specialized but easy to use technologies for the successful
investigation of phone records and cell tower analysis.
Focus on the correlation of CDR and BTS data with other multiple sources to create a full circle data validation process. Prove your evidence with more proof.
We provide the method and the tools: the best understanding of digital evidence and the clearest results for the courtroom.
Collect, organize, analyze, validate, and present your evidence with confidence.
Our technology can do it, join us and discover how.
Trust Our Experience
Our solutions are born from our daily work and research in the field of digital forensics.
We are people who have been on the field, in the lab and in front of a courtroom.
Every function and breakthrough was created from real case scenarios and collaborations with Law Enforcement on a global scale.
You can trust our background and professionalism.
- EnCE (openText), CCME (Cellebrite) and many other certifications
- Professional and reliable data recovery with the latest technology
- Video, image, and audio analysis for court proceedings
Dedicated evidence assistance
- Digital evidence management: extraction, analysis and consulting
- Trial evidence preparation procedures following best practices standards
- Data analysis on multiple sources: WhatsApp; Email; Movements; etc.
- On demand Call Detail Records (CDR) analysis
- Multi evidence correlation and alibi reviews
Field tests and support to Law Enforcement
- Cell towers real signal coverage survey and mapping
- Assistance to Law authorities for device seizures and evidence management
- LAB evidence examination: PCs, GPS, smartphones, Cameras, SIM cards, etc.
Technology is learned through training. We supply both.
Webinars, face to face workshops, and follow up sessions. Forensics training for every level, learn first hand with the people
developing the SecurCube system.
Build on Your knowledge level and certify the technology skills with us.
Securcube has also developed an Academic Program aimed at the investigators of the future: PhoneLog Lab.
We collaborate with Universities all over the world, we wish to expand our network to Your Institution as well
Nicola Chemello and SecurCube have been a key part of the success of the Cybersecurity program at Manchester Community College in Manchester New Hampshire, USA. It is our goal to teach students the most up to date techniques in a rapidly changing cyber investigations world. Through his collaboration with our College, Nicola has and continues…
During cell phone related investigations, one of the most tedious tasks to perform is the mapping of cell towers and trying to figure out who called who, how many times, at what time of the day, from what locations, etc.PhoneLog makes this very easy. It not only creates an easy to read map of cell…
[…] I am very excited to use the software. Phone Log is a great and stable environment for every professional who would like to analyze CDRs. As one of them, I found an user-friendly product with many analysis techniques.[…] I would like also to mention great support from a responsive and friendly team who were…
[…] Thanks to the use of the software PhoneLog, it was possible to examine, in a simple, intuitive and, at the same time, rigorous manner 100,000 records of incoming and outgoing calls over a period of one year generated from 12 mobile phones used by 3 suspects, obtaining important results from an investigative point of…
PhoneLog is effective, immediate and easy to use […] suitable for investigative needs. Excellent is the data normalization using the importers of which the software is equipped. The process of analyzing telephone records […] was excellent.
PhoneLog […] proved to be a valid support for the investigative analysis. It is worth mentioning the efficiency of the software, which made possible a rapid search for the areas in which the monitored number was located, the intersection of the various users monitored and allowing the operator to ‘instruct’ the program on its specific…