slaider
Digital forensics

card product

» Products » Digital forensics » Mobile Forensics System
Mobile Forensics System

1. Requirement Analysis

 

Nowadays, almost everyone is using mobile phone to communicate with others, and browse the Internet information. Thus, a mobile phone stores a lot of information about the user. When a criminal activity, a violence or terrorism incident occurs, we can get valuable information or intelligence by extracting the data of the related mobile phones. Therefore, more and more attention has been paid to the mobile forensics analysis in obtaining clues of the case, and discovering digital evidences. What’s more, digital evidence gradually becomes a new type of litigation evidence. Consequently, a professional, integrated and authenticated mobile forensics system is becoming urgently necessary.

 

2. System Introduction

 

MFS (Mobile Forensic System) is a new integrated, comprehensive solution for data acquiring, recovering and analysis of mobile phones. With high performance devices and sufficient accessories, you can use MFS to accomplish forensics works in fields or labs. Moreover, it is fast, portable, intuitive. MFS is a trustworthy platform for law enforcement agencies, military, intelligence agencies and e-discovery investigators all over the world.

 

3. System Features and Functions

 

3.1 Supporting Main Stream Mobile Phone Manufacturer

 

Apple, Nokia, LG, HTC, Samsung, BlackBerry, Huawei, Xiaomi, VIVO OPPO, MI, Motorola, NEC, Dopod, Sony Ericsson, LG, ZTE, Lenovo, MEIZU, Coolpad, Vertu, OnePlus, ASUS, Pantech, Kyocera etc

 

3.2 Supporting Main Stream Mobile Phone OS

 

  • Android, iOS, Windows Phones, Yun OS, Symbian, Firefox OS, Blackberry, Palm, BADA, Windows Mobile, Ubuntu, Nucleus OS, Smartisan OS, IUNI OS,HTC Sense, LG Optimus, MIUI OS, Emotion OS, Blur OS, Flyme OS, Brew, Spreadtrum and other smartphone or feature phone operating systems, etc..

 

3.3 Supporting Abundant Mobile Phone Popular Apps

 

  • Twitter, Skype, Facebook, WhatsApp, Telegram, Safari web-email, google map,Uber, Chrome, Viber, Zello, Tango, keechat, pal+, ICQ, Wechat, QQ, Wang message, MOMO, MI message, YY, TalkBox, Voxer, GTalk, Telegram, Taobao, dolphin browser, QQ browser, RenRen, 139mailbox, WO mailbox, sina blog, Tencent blog, Wifi hot-spot, Bluetooth record, etc.

 

3.4 Efficient Data Acquisition and Recovery

 

  • Logical and physical extractions, file system extraction
  • Password decryption and screen lock bypassing
  • Data recovery of the deleted pictures, video and other documents or data
  • Support taking the memory chip out of the mobile phone and get data directly via a chip forensics suite.

 

3.5 Data Analysis and Triage

 

  • Display a visualized graph of the mobile phone owner’s social connections
  • Immediately detect objects within images and videos such as weapons, nudity or sensitive documents; recognize persons of interest quickly using automatic facial detection that adopts optical character recognition
  • Analyze links within case-related networks to reveal hidden connections, group hierarchies and communication patterns
  • Perform cross-case analysis by subject, crime type or time period

 

3.6 Generating Report

 

All the procedures are in sound manner from the angle of digital forensic, and stated in the report

 

4. System Application

 

  • Applicable for law enforcement, military department, intelligence bureau, digital forensics personnel
  • Law enforcement investigate the criminal cases, collecting digital evidence and submitting to the court
  • Field where violence and terrorism incident occurred, or lab scenario

 

5. System Advantages

 

  • Provide solution customization
  • High recognition of products in the solution
  • Powerful and easy to use
  • Quickly and thoroughly examine all data to find actionable insights
  • Refer to forensics process and standard, maintain digital evidentiary integrity at every step, get legal digital evidence
  • Excellent compatibility, easy to extend

 

6. Flexible Platforms

 

All-in-one

 

 

 

System Forensic Tower 

 

 

Laptop System

 

 

 

Table 6-1 Optional Accessories

 

 

Number

Device name

Functions

Pictures

1

Mobile Phone Signal Shielding Bag/box

Shield signal

2

Photo Device

Examiner can take pictures or videos on phone screen with it after all means of data extraction are failed

3

Chip-off Reading Tool

Solve many problems while using normal forensic methods

4

Mobile Malware Analysis System

malware detection and removing

 

 

7. Training

 

  • Principle and advanced technical training
  • Product application practice
  • Issue the certification of original manufacturers after our professional training, a qualification with global recognition
Mobile Forensics System
Write the E-Mail, we will contact you within days.



Write the E-Mail, we will contact you within days.