Apple Forensics – iPhone, iPod, and iPad Forensics

There are several ways that we can collect and obtain data from an iPhone or Apple mobile device. The first option is to have physical access to the device. Each model and version of iPhone, iPod, and iPad have different levels of support, but each can be obtained in some forensic fas
Continue Reading →

Is your phone hacked or running Spy Software?!

Over the past 6+ months I have been inundated with clients calling with concerns over Spyware on their mobile phones. I made it my mission to start a detailed R&D project that would analyze the forensic aspect of Spy software, how Spy software is purchased, how Spy software is ins
Continue Reading →

Chip Off Forensics for almost Any Device

Over the years Binary Intelligence has had the opportunity to service the mobile and cell phone forensic field with logical and physical acquisitions. We started to research and develop a proven chip off forensic process about 3 years ago. We work with devices like Blackberry, Apple i
Continue Reading →

Android & iPhone’s Growing Malware Problem – MFC 2012

Wednesday mornings keynote speaker was Chet Hosmer. Mr. Hosmer is the Chief Scientist at Wetstone Allen. The realm of digital and network security has changed dramatically. Think back to before smart phone devices, as a network security manager. You only had to worry about the network
Continue Reading →

iPhone Forensics / Location Information – MFC 2012

Don’t Try Hiding Where You Have Been If You Use An iPhone! Terry McGuire, of CMD Labs, went over some test data he had acquired in relation to location data on his iPhone and TomTom GPS. If you are familiar with the forensic examination of these two devices this maybe an overvie
Continue Reading →

Mobile Forensic / Techno Security Conf 2012

Setting the stage: Mobile Forensic / Techno Security Conference 2012 is being held at the Marriott Grande Dunes resort in Myrtle Beach, SC. With about 500+ attendees from various government agencies, law enforcement jurisdictions, private consulting firms, and corporations the variety
Continue Reading →

CEIC 2012 Day 2 – Kindle Forensics

My 2pm session at CEIC 2012 was a surprise and treat. Mike Wilkinson from Champlain College give a rather in depth review of the Amazon Kindle and the exploits used to gain root access to its Linux system for gaining a forensic image. Before I jump into his presentation I want to hit
Continue Reading →