[vc_row][vc_column width=”1/6″][/vc_column][vc_column width=”2/3″][mk_fancy_title tag_name=”h1″ color_style=”gradient_color” grandient_color_from=”#e5272f” grandient_color_to=”#1375ba” grandient_color_angle=”diagonal_left_top” size=”” font_weight=”bold” letter_spacing=”1″ margin_top=”50″ font_family=”none” align=”center” animation=”scale-up” drop_shadow=”true” shadow_color=”rgba(30,115,190,0.6)”]SMARTPHONE FORENSICS[/mk_fancy_title][vc_column_text css=”.vc_custom_1556398241718{margin-bottom: 0px !important;}”]
Fraud and criminal cases often include smartphones from different brands and suspects. These mobile devices allow users to send all sort of data and coordinate coups. Some people do not think that is is possible to recover data from phones they threw into rivers or out of building windows. We have conducted several chip-offs which resulted in the successful delivery of digital data stored in such severely damaged smartphones.
[/vc_column_text][vc_empty_space height=”40″][ultimate_modal btn_size=”lg” btn_bg_color=”#ffffff” btn_bg_hover_color=”#386aac” btn_text=”Read More” modal_size=”container” modal_style=”overlay-show-genie” overlay_bg_opacity=”80″ img_size=”80″ btn_txt_color=”#386aac”]
Even if the device has an unknown password or a faulty system update caused an unsolvable permanent system failure – a chip off can deliver to lawyers, courts or police or private detectives what they need to continue the investigation.
The German laboratory of ACATO has the technical facilities and competencies to do a chip off on different types of smartphones. Hereby the experts dismantle the device and get access to the PCB of the phone. In a rework process, the chip is removed from the PCB and the reengineering of the data allocation process is started. In the end, the forensics engineers will be able to store the wanted data.
We provide forensic services for lawyers, companies and authorities around the world.
[/ultimate_modal][/vc_column][vc_column width=”1/6″][/vc_column][/vc_row][vc_row][vc_column css=”.vc_custom_1555740333083{padding-top: 0px !important;padding-right: 50px !important;padding-bottom: 50px !important;padding-left: 50px !important;}”][vc_column_text css=”.vc_custom_1556398438167{margin-bottom: 0px !important;}”]
LOOKING AT SMARTPHONE CHIPS
Our laboratory has a reference device depot holding a wide range of cellphones (2400+), smartphones (500+), tablets (40+), hard drives (1000+), SSD (50+) and other flash-based devices (70+).
This allows us to find the optimal path to get the data out. Sometimes the extraction might take weeks or months, but where others give up, we continue until we reach the target.
We have successfully extracted data from smartphones that were run over by heavy vehicles. We were got out data from a device that was hit at with a tool in order to destroy the evidence. Even cases damaged by salt water, river and bath water … eventually resulted in the successful extraction of data.
We get help requests from companies, auditors, manufacturers, security forces, military, and even data recovery experts around the world.
We don’t give up on the first obstacle. We continue till we succeed or the device is definitely dead.
[/vc_column_text][vc_column_text css=”.vc_custom_1556398514441{margin-bottom: 0px !important;}”]
EXTRACTING EVIDENCE FROM SMARTPHONE AND TABLET
The field of mobile forensics is focused on gathering digital evidence out of intelligent devices such as Smartphones, tablets and GPS systems. Even cell phones still have a value for conducting a forensic examination. Is is really so easy to extract digital evidence from smartphones? A simple app of backup software will not deliver data that is showing clean integrity that it will withhold a court examination.
Therefore professional forensics requires equipment and expertise. The tools used have special protection modes to avoid manipulating the data inside the device and the extracted copy. In some cases, you need to brute force a locked phone. Some methods like shadow copying can help surpase an iPhone protection but they are a time-consuming campaign. Das Geht von einem Lesegerät mit Schreibblocker bis hin zu Entschlüsselungssystemen, die eventuell eine PIN herausfinden können, um ein Handy zu entsperren.
[/vc_column_text][/vc_column][/vc_row][vc_row css=”.vc_custom_1556399777457{padding-bottom: 40px !important;}”][vc_column][vc_custom_heading text=”WE CAN DO:” use_theme_fonts=”yes”][vc_separator color=”custom” align=”align_left” border_width=”5″ el_width=”10″ css_animation=”bounceInUp” accent_color=”#e12831″][vc_row_inner attached=”true” is_fullwidth_content=”false”][vc_column_inner width=”1/3″][mk_icon_box icon=”mk-icon-check-square” title=”chipoff for android phones” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square” title=”chipoff for windows phones” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square” title=”chipoff for iPhones” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square” title=”bypass pin of smartphone” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][/vc_column_inner][vc_column_inner width=”1/3″][mk_icon_box icon=”mk-icon-check-square” title=”Bruteforce security of smartphone” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square” title=”Analyze usage of device” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square” title=”Find traces of fraud” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square” title=”Analyze traces of bylock” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][/vc_column_inner][vc_column_inner width=”1/3″][mk_icon_box icon=”mk-icon-check-square” title=”Write expert witness report” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square” title=”Contest a 3rd party forensic report” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][mk_icon_box icon=”mk-icon-check-square” title=”Validate 3rd party forensic results” text_size=”18″ font_weight=”bold” style=”simple_ultimate” icon_color=”#000000″ title_color=”#000000″ txt_color=”#777777″ margin=”20″][/mk_icon_box][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row fullwidth=”true” fullwidth_content=”false” bg_type=”grad” css=”.vc_custom_1552599167136{padding-top: 50px !important;padding-bottom: 40px !important;}” bg_grad=”background: url(data:image/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjxkZWZzPjxsaW5lYXJHcmFkaWVudCBpZD0iZ3JhZGllbnQiIHgxPSIwJSIgeTE9IjAlIiB4Mj0iMCUiIHkyPSIxMDAlIj48c3RvcCBvZmZzZXQ9IjAlIiBzdHlsZT0ic3RvcC1jb2xvcjojRTUyNzMwOyIgLz48c3RvcCBvZmZzZXQ9IjEwMCUiIHN0eWxlPSJzdG9wLWNvbG9yOiMxMzc0QkE7IiAvPjwvbGluZWFyR3JhZGllbnQ+PC9kZWZzPjxyZWN0IGZpbGw9InVybCgjZ3JhZGllbnQpIiBoZWlnaHQ9IjEwMCUiIHdpZHRoPSIxMDAlIiAvPjwvc3ZnPg==);background: -webkit-gradient(linear, left top, left bottom, color-stop(0%, #E52730), color-stop(100%, #1374BA));background: -moz-linear-gradient(100deg,#E52730 0%,#1374BA 100%);background: -webkit-linear-gradient(100deg,#E52730 0%,#1374BA 100%);background: -o-linear-gradient(100deg,#E52730 0%,#1374BA 100%);background: -ms-linear-gradient(100deg,#E52730 0%,#1374BA 100%);background: linear-gradient(100deg,#E52730 0%,#1374BA 100%);”][vc_column width=”2/3″][vc_column_text css=”.vc_custom_1552600091618{margin-bottom: 0px !important;}”]
Contact us for analysis and quote
We offer immediate, 24/7 assistance from our team of digital investigators.[/vc_column_text][/vc_column][vc_column width=”1/3″][vc_btn title=”CREATE CASE” style=”3d” color=”black” align=”center” button_block=”true” link=”url:https%3A%2F%2Fnew.acato.org%2Fcreate-case%2F|title:Create%20Case|target:%20_blank|”][vc_column_text css=”.vc_custom_1552600497951{margin-bottom: 0px !important;}”]
CALL: +49 89 – 54041070
[/vc_column_text][/vc_column][/vc_row]