Digital forensics

card product

» Products » Digital forensics » Mobile Forensics System
Mobile Forensics System

1. Requirement Analysis


Nowadays, almost everyone is using mobile phone to communicate with others, and browse the Internet information. Thus, a mobile phone stores a lot of information about the user. When a criminal activity, a violence or terrorism incident occurs, we can get valuable information or intelligence by extracting the data of the related mobile phones. Therefore, more and more attention has been paid to the mobile forensics analysis in obtaining clues of the case, and discovering digital evidences. What’s more, digital evidence gradually becomes a new type of litigation evidence. Consequently, a professional, integrated and authenticated mobile forensics system is becoming urgently necessary.


2. System Introduction


MFS (Mobile Forensic System) is a new integrated, comprehensive solution for data acquiring, recovering and analysis of mobile phones. With high performance devices and sufficient accessories, you can use MFS to accomplish forensics works in fields or labs. Moreover, it is fast, portable, intuitive. MFS is a trustworthy platform for law enforcement agencies, military, intelligence agencies and e-discovery investigators all over the world.


3. System Features and Functions


3.1 Supporting Main Stream Mobile Phone Manufacturer


Apple, Nokia, LG, HTC, Samsung, BlackBerry, Huawei, Xiaomi, VIVO OPPO, MI, Motorola, NEC, Dopod, Sony Ericsson, LG, ZTE, Lenovo, MEIZU, Coolpad, Vertu, OnePlus, ASUS, Pantech, Kyocera etc


3.2 Supporting Main Stream Mobile Phone OS


  • Android, iOS, Windows Phones, Yun OS, Symbian, Firefox OS, Blackberry, Palm, BADA, Windows Mobile, Ubuntu, Nucleus OS, Smartisan OS, IUNI OS,HTC Sense, LG Optimus, MIUI OS, Emotion OS, Blur OS, Flyme OS, Brew, Spreadtrum and other smartphone or feature phone operating systems, etc..


3.3 Supporting Abundant Mobile Phone Popular Apps


  • Twitter, Skype, Facebook, WhatsApp, Telegram, Safari web-email, google map,Uber, Chrome, Viber, Zello, Tango, keechat, pal+, ICQ, Wechat, QQ, Wang message, MOMO, MI message, YY, TalkBox, Voxer, GTalk, Telegram, Taobao, dolphin browser, QQ browser, RenRen, 139mailbox, WO mailbox, sina blog, Tencent blog, Wifi hot-spot, Bluetooth record, etc.


3.4 Efficient Data Acquisition and Recovery


  • Logical and physical extractions, file system extraction
  • Password decryption and screen lock bypassing
  • Data recovery of the deleted pictures, video and other documents or data
  • Support taking the memory chip out of the mobile phone and get data directly via a chip forensics suite.


3.5 Data Analysis and Triage


  • Display a visualized graph of the mobile phone owner’s social connections
  • Immediately detect objects within images and videos such as weapons, nudity or sensitive documents; recognize persons of interest quickly using automatic facial detection that adopts optical character recognition
  • Analyze links within case-related networks to reveal hidden connections, group hierarchies and communication patterns
  • Perform cross-case analysis by subject, crime type or time period


3.6 Generating Report


All the procedures are in sound manner from the angle of digital forensic, and stated in the report


4. System Application


  • Applicable for law enforcement, military department, intelligence bureau, digital forensics personnel
  • Law enforcement investigate the criminal cases, collecting digital evidence and submitting to the court
  • Field where violence and terrorism incident occurred, or lab scenario


5. System Advantages


  • Provide solution customization
  • High recognition of products in the solution
  • Powerful and easy to use
  • Quickly and thoroughly examine all data to find actionable insights
  • Refer to forensics process and standard, maintain digital evidentiary integrity at every step, get legal digital evidence
  • Excellent compatibility, easy to extend


6. Flexible Platforms






System Forensic Tower 



Laptop System




Table 6-1 Optional Accessories




Device name




Mobile Phone Signal Shielding Bag/box

Shield signal


Photo Device

Examiner can take pictures or videos on phone screen with it after all means of data extraction are failed


Chip-off Reading Tool

Solve many problems while using normal forensic methods


Mobile Malware Analysis System

malware detection and removing



7. Training


  • Principle and advanced technical training
  • Product application practice
  • Issue the certification of original manufacturers after our professional training, a qualification with global recognition
Mobile Forensics System
Write the E-Mail, we will contact you within days.

Write the E-Mail, we will contact you within days.