At Data Rescue Labs Inc., we specialize in forensic data recovery and decryption, providing a level of service that is unmatched by other forensic labs. With almost 12 years of experience in smartphone and cell phone forensics, our team has the expertise and tools to extract evidence from damaged and encrypted devices, even when other forensic tools fail. In addition, we have the ability to break into locked devices using brute force techniques for forensic purposes. We offer our services to forensic firms, corporations, and private individuals with legal representation.
Data Rescue Labs Inc. has been using the most sophisticated tools in mobile technology investigations since 2012. Our forensic team utilizes Cellebrite UFED and other forensic tools, which are only available to law enforcement and certified forensic labs. In addition, we have added other tools, including Magnet Forensics: Axiom, to our arsenal. Cellebrite UFED is a standalone mobile forensic extraction device that offers unparalleled support for mobile devices and data extraction technology. Our team is dedicated to providing the highest level of service and expertise in mobile forensic investigations.
We specialize in the forensic acquisition of cell phones, smartphones, and tablet devices. Our state-of-the-art equipment, including Cellebrite UFED, allows us to forensically acquire and investigate almost any mobile device under forensically sound conditions. Additionally, we have the ability to break into locked devices using specialized tools and brute force techniques for forensic purposes. Using our in-house developed methods, we are able to extract a wide range of data from mobile devices, including call history logs, text messages, phone book and contact information, calendar and to-do list entries, and much more. Our team is dedicated to providing the highest level of service and expertise in mobile forensic investigations.
Our tools can extract and investigate the following data
- Call History Log
- Text Message (SMS)
- Phone Book and Contact Extraction
- Calendar and To-Do List Extraction
- Pictures, Videos, and Audio Recovery (Limited to cached images only)
- Phone Email and Chat Analysis
- Multimedia Message Recovery
- Social Networking
- Recovery of User Lock Codes
- SIM Card Cloning & Data Extraction
- Physical Memory (Hex) Dump
- Phone File System Capture
- Login tokens, Cookies, Website trackers
- Log entries
- GPS Locations
- Device events
- Wireless networks
- Custom 3rd party apps (create on-demand unsupported app templates)
- Detailed Use Analytics
We offer checkm8 exploit data extraction on some qualified iPhone / iPad models. See our Blog for more info.
Full file system extraction on newer file base encrypted androids.
Since Android 7.0, most devices are now encrypted. We are able to use a decrypting bootloader in order to obtain a physical dump of the internal memory in a decrypted state. See our youtube video for more details.
We now also support most QNX-based Blackberry devices. Q10, Z10, Z30, and more.
Physical extraction from BlackBerry devices running OS 4-7. Exclusive decoding: BBM data, apps, emails, Bluetooth, etc.
Physical extraction from newer QNX (Q10, Z10, Z30, Passport, Classic, etc) Blackberry devices – Decoding of BBM, Apps, Emails, Pictures, and videos
Please Note that the above process is only available via the ChipOff method.
Widest support for Apple devices running iOS3+
Physical extraction and decoding while bypassing pattern lock/password / PIN from Android devices including HTC, Motorola, Samsung Galaxy family, and more
Physical extraction from Nokia BB5 devices – password extraction from selected devices
File system extraction from any device running Windows phone 7.5 and 8 including Nokia, HTC, Samsung, Huawei and ZTE
The most powerful solution for phones with Chinese chipsets
TomTom trip-log decryption, and data extraction from other portable GPS devices
Obtain existing and deleted data: apps, passwords, emails, call history, SMS, contacts, calendar, media files, geotags, location information, GPS fixes etc.
Proprietary technology and boot loaders ensure forensically sound extractions
Handsets using all carrier technologies including CDMA, GSM, IDEN, TDMA and EDGE
Smartphone and PDA devices running all major operating systems including Apple iPhone, Google Android, Microsoft Windows Mobile, Blackberry, Palm, and Symbian.