New: We now offer checkm8 exploit data extraction on some qualified iPhone / iPad models. See our Blog for more info.
With almost 10 years experience in smart phone and cell phone forensics, Data Rescue Labs Inc., has been the pioneer in forensic investigations on these devices. We are able to not only fix damaged and encrypted smart phones in order to extract the evidence but also break into locked devices. (court approved, required documentation is required)
Since 2012, Data Rescue Labs Inc., has been using the two most sophisticated tools in cell phone, smartphone and other mobile technology investigation. Cellebrite UFED and MSAB XRY. These tools are only available to Law Enforcement and alike. Additionally, in the last few years we have also added other tools, one of the more prominent is Magnet Forensics: Axiom (formerly known as IEF)
Cellebrite UFED is a comprehensive, standalone mobile forensic extraction device that combines outstanding mobile device support with unrivaled data extraction technology.
MSAB XRY is a purpose built software based solution, complete with all the necessary hardware for recovering data from mobile devices in a forensically secure manner.
Acquisition of Cell Phones, Smart Phones & Tablet Devices for Forensic investigation.
Mobile device forensics is a branch of digital forensics relating to recovery of digital evidence or data from a mobile device under forensically sound conditions. With state of the art equipment such as Cellebrite UFED and MSAB XRY, that is only available to law enforcement and certified computer forensic labs, we are able to forensically acquire and investigate almost any mobile device.
We are the only private company in the GTA (Greater Toronto Area) that have this equipment.
Using Cellebrite UFED and XRY, we can acquire and investigate the following data from mobile devices:
- Call History Log
- Text Message (SMS)
- Phone Book and Contact Extraction
- Calendar and To Do List Extraction
- Pictures, Videos and Audio Recovery
- Phone Email and Chat Analysis
- Multimedia Message Recovery
- Social Networking
- Recovery of User Lock Codes
- SIM Card Cloning & Data Extraction
- Physical Memory (Hex) Dump
- Phone File System Capture
- Login tokens, Cookies, Website trackers
- Log entries
- GPS Locations
- Device events
- Wireless networks
- Custom 3rd party apps (create on-demand unsupported app templates)
- Detailed Use Analytics
Since Android 7.0, most devices are now encrypted. We are able to use a decrypting bootloader in order to obtain a physical dump of the internal memory in a decrypted state. See our youtube video for more details.
We now also support most QNX based Blackberry devices. Q10, Z10, Z30 and more.
Physical extraction from BlackBerry devices running OS 4-7. Exclusive decoding: BBM data, apps, emails, Bluetooth etc.
Physical extraction from newer QNX (Q10, Z10, Z30, Passport, Classic etc) Blackberry devices – Decoding of BBM, Apps, Emails, Pictures and videos
Please Note that the above process is only available via ChipOff method.
Widest support for Apple devices running iOS3+
Physical extraction and decoding while bypassing pattern lock / password / PIN from Android devices including HTC, Motorola, Samsung Galaxy SIII family and more
Physical extraction from Nokia BB5 devices – password extraction from selected devices
File system extraction from any device running Windows phone 7.5 and 8 including Nokia, HTC, Samsung, Huawei and ZTE
The most powerful solution for phones with Chinese chipsets
TomTom trip-log decryption, and data extraction from other portable GPS devices
Obtain existing and deleted data: apps, passwords, emails, call history, SMS, contacts, calendar, media files, geotags, location information, GPS fixes etc.
Proprietary technology and boot loaders ensure forensically sound extractions
Handsets using all carrier technologies including CDMA, GSM, IDEN, TDMA and EDGE
Smartphone and PDA devices running all major operating systems including Apple iPhone, Google Android, Microsoft Windows Mobile, Blackberry, Palm, and Symbian.