![]() This event highlighted phone security, not just for Apple but for Android too, on phones being accessed without a passcode. He was the Texas gunman who killed 26 and injured many more. Many clients remember the case at the end of 2017 widely reported in the press where the FBI supposedly asked Apple to unlock Devin Kelley's iPhone. This means that there are always some phones which realistically cannot be cracked, yet… However, it’s a bit like an arms race with phone manufactures adding to security and people like ourselves looking to reverse engineer access. In time, our tools generally enable us to "crack" or unlock the phone. However, if we are asked to (legitimately) access a phone where the passcode is unknown then it gets much more difficult. Where we have the passcode, then our work becomes considerably easier and we can focus on the actual data. Also operating systems like iOS and Android are being regularly updated with security patches so, both forensics and recovery are moving targets. However, phones continually change, with new models being launched. On the software side, we use a range of tools typically used by advanced law enforcement and security organisations. On the hardware side, we have a whole host of interfaces used to gain access to a phones data and we have also developed a few of our own bespoke tools and techniques. Obtaining data from phones can involve work at both a hardware and software level. These days, that means we see a lot of phones. These see us participate in investigations with our role being to uncover or obtain data from computers and other devices. We also provide Digital Forensics services. ![]() Then, it's no wonder people are keen to get their data back and a recovery service is often the only way to do it. When you consider the average person has over 600 photos on their phone and also that it is often their most used device for online work. Most of the volume comes through our data recovery service where we typically get back client data from damaged phones. In fact, we support over 3000 phone models for investigation or recovery. Our labs complete both recovery and forensic exercises on both these platforms and many other makes and models of phones. The two major phone systems currently being used, are iOS for Apple, and Android for almost everyone else. ![]() ![]() We are tasked daily with getting access to locked and damaged phones. However, what happens when you don't have or aren’t given the passkey? This is the sort of situation we come across in our Forensic business. In general owners are able or forced to provide their passkey so our work then revolves round getting their data back. I phones make up, around 70% of the devices we see through our forensic facilities. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |