archives

Mobile Devices

This category contains 56 posts

How To Use Social Graph In Oxygen Forensic Detective

Hello, this is Keith Lockhart from the Oxygen Forensic training department, and this video is talking about the Social Graph inside Oxygen Forensic Detective. To fully understand the Social Graph and the things it can do for you, you kind of have to understand several other facets of your data and how that data is … Continue reading

Can Your Investigation Interpret Emoji?

by Christa Miller, Forensic Focus Emoji are everywhere — including in your evidence. Used across private-messaging apps and email, social media, and even in passwords and account names, emoji are pictographic representations of objects, moods, and words. They’re a convenient shortcut for users who want to convey tone and emotion in digital communication without using … Continue reading

Walkthrough: XRY Photon Manual

XRY Photon is a solution designed for recovering smartphone app data that’s inaccessible through normal extraction techniques. Now the power of XRY Photon has been expanded to cover hundreds of additional apps, with a new manual option. Before using XRY Photon, always check the XRY device manual first, to see if an app is supported, … Continue reading

Three Reasons Why Call Detail Records Analysis Is Not “Junk Science”

by Patrick Siewert, Principal Consultant, Pro Digital Forensic Consulting Since introducing our private sector clients to the impact that cellular call detail records (CDR) analysis & mapping can have on their cases, we’ve had a lot of robust discussions with litigators and clients about the veracity and value of this evidence.  CDR analysis has been … Continue reading

Cost-Effective Tools For Small Mobile Forensic Labs

by Alex Moeller As the costs associated with running a mobile devices forensic laboratory can be considered to be high, this article is aimed at providing alternative options for small organisations or individuals looking to reduce overheads.  Case Management Tools There are numerous case management systems available online which are free to download, and premium … Continue reading

Crime Scene Investigation of GPS Data in Unmanned Aerial Vehicles (UAVs)

by Chirath De Alwis The invention of the Unmanned Aerial Vehicle (UAV), also known as the drone, has the potential to address some crucial issues in society. Commercial aerial surveillance, oil/gas/mineral exploration, and disaster relief are some of them [1]. Considering the increasingly popular use of drones, it is evident that there is potential for … Continue reading

Four Critical Success Factors In Mobile Forensics

by Mike Dickinson, Deputy Executive Officer at MSAB The purpose of this paper is to encourage mobile forensic practitioners to consider a wider number of critical factors surrounding their choice and use of mobile forensic tools. Specifically, the quality of decoding, training of users and ultimately the preservation of digital as evidence in court proceedings. … Continue reading

Mobile Virtual Network Operators (MVNOs) In The US

by Patrick Siewart  Increasingly, cellular records and their associated location information are being used in civil litigation, where previously they were considered to be a “law enforcement only” tool.  But in the age when users carry at least one smartphone with them at all times, the location data with regard to calls / texts / … Continue reading

ADR512 Testing

by Andrey Fedorov The purpose of this article is to find additional information about the capabilities, specifics, and USPs of the ADR512 Android Data Recovery program. A full description of this software can be found here. Developers from 512 BYTE, who created the software, invited specialists from digital forensics lab Gross to test it.  Let’s … Continue reading

Cellular GPS Evidence: Waze + Cellebrite + CellHawk

by Patrick Siewert, Principal Consultant, Pro Digital Forensic Consulting It’s becoming common knowledge that location evidence on cellular devices can provide a wealth of evidence in any number of civil, criminal and investigative matters. Law enforcement agencies use cellular location evidence from service providers to help place a criminal suspect at or near a crime … Continue reading

Samsung sBrowser – Android Forensics: A Look Into The Cache Files

by Robert Craig and Michael Lambert Abstract Samsung devices are a large portion of the Android OS market.  Samsung has its own Internet Browser, “sbrowser”, installed onto their devices.  All web browsers leave artifacts from user activity.  The “sbrowser” cache files were similar to other browsers.  An embedded source URL gave insight where the cached … Continue reading

Unlocking The Screen of an LG Android Smartphone with AT Modem Commands

by Oleg Davydov, CTO, Oxygen Forensics Modern smartphones are much more than just a device for voice calls. Now they contain a lot of personal data – contact list, communication history, photos, videos, Geo tags etc. Most smartphones can also work as a modem. Almost every modem is Hayes-compatible which means it supports commands of the … Continue reading

Who Is Spying On Android Users, Why Do They Do It And What Are They Doing With The Data?

If you’ve been following the news, you may already know about the many cases where companies, big and small, were caught spying on their users. It might appear that just about everyone making a phone or an app is after your personal information. In this article we’ll try to figure out who collects your personal … Continue reading

Attributing A Third Party To A Recovered (Deleted) IOS SMS Message

In a recent forensic case involving recovered deleted sms messages from an sms.db file on an IOS mobile device none of the mainstream mobile phone forensic software made the link between sender and recipient for the recovered records of interest. I have been asked a few times recently about obtaining the third party of a … Continue reading

Meeting A Forensic Challenge: Recovering Data From A Jolla Smartphone

by Davide Gabrini, Andrea Ghirardini, Mattia Epifani and Francesco Acchiappati Preface During the hacking camp MOCA 2016, at the end of a talk held by Davide “Rebus” Gabrini on passcode circumvention methods on mobile devices, a bystander offered an intriguing challenge: he offered for research purposes a smartphone to find out if and how someone … Continue reading

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,315 other followers