Fraud and criminal cases usually include computers. The changing behaviour of users and more powerful online platforms lead to the need to include tablet devices. Here it may be necessary to secure and analyse evidence from a iPad, Kindle or Android based tablet.
If such a tablet has been damaged due to having broken it on the escape route or the user got such an unexpected fright, that he could have totally forgotten which password he last set.
This is where tablet forensics can take it a step further down to the chip level. The laboratory of ACATO has the technical facilities and competencies to do a chipoff on android or kindle or similar types of tablets. Hereby the experts dismantle the device and get access to the pcb of the tablet. In a rework process the chip is removed from the pcb and the reengineering of the data alocation process is started. At the end, the forensics engineers will be able to store the wanted data.
We provide forensic services for lawyers, companies and authorities around the world.
LOOKING AT Tablet Chips
Our laboratory has a reference device depot holding a wide range of cellphones (2400+), smartphones (500+), tablets (40+), harddrives (1000+), ssd (50+) and other flash based devices (70+).
This allows us to find the optimal path to get the data out. Sometimes the extraction might take weeks or months, but where others give up, we continue until we reach the target.
We have successfully extracted data from smartphones that were run over by heavy vehicles. We were got out data from a device that was hit at with a tool in order to destroy the evidence. Even cases damaged by salt water, river and bath water ... eventually resulted in a succesful extraction of data.
We get help requests from companies, auditors, manufacturers, security forces, military and even data recovery experts around the world.
We don't give up on the first obstical. We continue till we succeed or the device is definately dead.
We CAN DO:
- - Chipoff for tablets
- - Chipoff for kindle
- Bypass password of tablet
- Bruteforce security of tablet
- Analyze usage of device
- Find traces of fraud
- - Analyze traces of bylock
- Write expert witness report
- Contest a 3rd party forensic report
- Validate 3rd party forensic results