[Technical Insights]Data on Locked Phone with Qualcomm Chips Be Extracted Without Root or Debugging!
VIP Key Function Video Demo
[Technical Insights] How to Decrypt BIOS Encrypted Hitachi Hard Drive
In this issue, data recovery experts from the Key Laboratory of Sichuan Province will introduce fast decryption methods for BIOS encrypted Hitachi hard drive. This method, compared with other commonly used methods, features simple operation, simplified process and high success rate, and can be used to help onsite forensic experts to quickly extract important clues.
[News] WannaCry Ransomware Infected Files Can be Recovered?
The WannaCry ransomware, as its name suggests, is a kind of virus that hold files on one’s computer hostage until the user pays the amount asked for decrypting files encrypted by hackers. While we’re shocked about how hackers can carry out an attack of such a large scale, we’re also pondering how it is possible.
[News] SalvationDATA at Forensics Europe Expo!
As a “must attend” event for the entire forensics industry, Forensics Europe Expo is an international exhibition & conference that offers a unique 360 degree viewpoint on mobile, computer and DVR forensics.
[Technical Insights] Base Station Data Extraction from Android Radio Log
In this issue, data recovery experts from the Key Laboratory of Sichuan Province will introduce base station data extraction methods from Android Radio log. This method is developed on the basis of base station positioning principles. Only when investigators gained access to the location data of the base station can they confirm if the suspects had been near the station, which could provide vital clue for cracking a case.
[Technical Article] Criminal Found with Recovered Surveillance Video Clips
A Mercedes S400 worth up to one million Yuan was scratched in the parking lot. Who did that? When the car owner went to the property management office for an explanation, he was told that surveillance system broke down at that day. Was it true that there is no way to find out who did this?
[Technical Article] How to Switch Cellphones with Screen-lock to Flight Mode
In the process of cellphone forensics, cellphones need to be put inside signal shielding bags to prevent data getting locked, changed or even erased remotely and to ensure the originality and objectivity of extracted data. In situations where signal shielding bags are unavailable, switching cellphones to flight mode can achieve the same purpose. In this issue, data recovery experts from the Key Laboratory of Sichuan Province will explain how to switch cellphones with and without screen-locks into flight mode.
[Technical Insights] Research on File Recovery and Extraction for WD Hard Disk with Damaged Firmware
In this issue, data recovery experts from the Key Laboratory of Sichuan Province will explain their research on file recovery and extraction technology for WD hard disk with bad sectors. A more efficient method for firmware bad sector restoration is introduced to address the problems of inaccessibility of WD hard disk.
[News] Coming Soon! DF(Digital Forensics System) for Computer Forensics!
We're always working on new forensic systems based on forensic process flow for delivering the most reliable result for investigators. Let’s take a quick look at the features of this system before it is finally released.
[Technical Article] Extraction of Raw Data of GPS Location and Base Station on iOS/Android Devices
In this issue, data recovery experts from the Key Laboratory of Sichuan Province will explain the process from raw data scanning to specific data extraction for iOS/Android mobile devices. This issue covers the analysis of common locating trace data and its analysis methods, and methods of using GPS service and base station service provided by the third-party for further data analysis and map display.
[Technical Article] Research on Avoiding Data Wiping While Unlocking Cellphones
Data wiping of some cellphones during unlocking process adds to difficulties of mobile forensics, and the avoiding of which bears great importance. In this issue, data recovery experts from the Key Laboratory of Sichuan Province explains methods to avoid data wiping during cellphone unlocking by taking Samsung Note 5 and Huawei P7 as examples.