Forensic Telecommunications Services Ltd. (FTS) announces a further increase in the BlackBerry models supported by its ‘Chip-Off’ procedure.
FTS has developed an advanced data extraction method which is able to bypass encryption and retrieve the physical memory from BlackBerry smartphone devices. Currently this is the only known means to deal with devices locked with a handset passcode.
Utilizing the latest laboratory tools and software developments, FTS can now examine models such as the BlackBerry Bold 9790 and 9900, and Curve 9360. The Chip-Off process is accredited to ISO17025:2005 standards and these new devices join a long list of RIM handsets from which FTS has successfully completed data recovery.
Below is a list demonstrating the types of data recovered following Chip-Off extractions on BlackBerry hardware. There is also the possibility of uncovering deleted files in many circumstances.
- Telephony data – SMS, call registers, phonebook, etc.
- User content – Calendar entries, media files, etc.
- Screening for 3rd party applications and recovery of user data relating to them (i.e. Facebook log-in passwords, etc.)
- Ascertaining the SMS, BBM, and e-mail deletion frequency
- Recovery of non active BlackBerry Messenger data and cached data (neither are available via logical examinations)
- The decompression of text strings in excess of 35 characters (e-mails, BBM, and SMS)
- Recovery of MSN chat logs
FTS undertake a significant number of Chip-Off examinations where other techniques are not available or do not yield enough data or where the device is heavily damaged, in many cases uncovering valuable information that has contributed to a criminal conviction.
For more information, visit www.forensicts.co.uk.