There are several ways that we can collect and obtain data from an iPhone or Apple mobile device. The first option is to have physical access to the device. Each model and version of iPhone, iPod, and iPad have different levels of support, but each can be obtained in some forensic fas
Over the past 6+ months I have been inundated with clients calling with concerns over Spyware on their mobile phones. I made it my mission to start a detailed R&D project that would analyze the forensic aspect of Spy software, how Spy software is purchased, how Spy software is ins
Over the years Binary Intelligence has had the opportunity to service the mobile and cell phone forensic field with logical and physical acquisitions. We started to research and develop a proven chip off forensic process about 3 years ago. We work with devices like Blackberry, Apple i
Wednesday mornings keynote speaker was Chet Hosmer. Mr. Hosmer is the Chief Scientist at Wetstone Allen. The realm of digital and network security has changed dramatically. Think back to before smart phone devices, as a network security manager. You only had to worry about the network
Don’t Try Hiding Where You Have Been If You Use An iPhone! Terry McGuire, of CMD Labs, went over some test data he had acquired in relation to location data on his iPhone and TomTom GPS. If you are familiar with the forensic examination of these two devices this maybe an overvie
Setting the stage: Mobile Forensic / Techno Security Conference 2012 is being held at the Marriott Grande Dunes resort in Myrtle Beach, SC. With about 500+ attendees from various government agencies, law enforcement jurisdictions, private consulting firms, and corporations the variety
For the second time I had the opportunity to sit through a session taught by Rob Lee. If you have not had the chance to learn from Rob or hear him speak you are missing out. The crowds seem to follow Rob and this session was no different. Within minutes the largest session room at the
EnCase is well know for being a powerful tool with regards to computer forensics. Some may even know its a powerful tool for eDiscovery, but the first session I sat through today highlighted some key features inside EnCase v. 6 that can help you with you filtering out the files, folde
My 2pm session at CEIC 2012 was a surprise and treat. Mike Wilkinson from Champlain College give a rather in depth review of the Amazon Kindle and the exploits used to gain root access to its Linux system for gaining a forensic image. Before I jump into his presentation I want to hit