XRY (software)

Last updated

XRY is a digital forensics and mobile device forensics product by the Swedish company MSAB used to analyze and recover information from mobile devices such as mobile phones, smartphones, GPS navigation tools and tablet computers. It consists of a hardware device with which to connect phones to a PC and software to extract the data. [1]

XRY is designed to recover the contents of a device in a forensic manner so that the contents of the data can be relied upon by the user. Typically it is used in civil/criminal investigations, intelligence operations, data compliance and electronic discovery cases. The software is available to law enforcement, military and intelligence agencies. It has become well known in the digital forensics community as one of their common tools for this type of work. [2]

There are many more complex challenges when examining mobile phones in comparison to the forensic examination of normal computers. Many mobile phones have their own proprietary operating systems, which makes reverse engineering of such devices a very complex operation. The speed of the mobile device market also means that there are many more new devices being manufactured on a regular basis, so a mobile forensics tool must deal with all of these issues before being suitable for the task.

The XRY system allows for both logical examinations (direct communication with the device operating system) and also physical examinations (bypassing the operating system and dumping available memory). Whilst the logical recovery of data is generally better supported for more devices, physical examination offers the ability to recover more deleted information such as SMS text messages, images and call records etc. Because of the complexities of the topic, specialist training is usually recommended to operate the software.

The latest versions include support to recover data from smartphone apps such as the Android, iPhone and BlackBerry devices. Data recovered by XRY has been used successfully in various court systems around the world. [3] [4]

XRY has been tested by a number of different government organizations as suitable for their needs and is now in worldwide use. [5]

Related Research Articles

<span class="mw-page-title-main">Smartphone</span> Handheld mobile device

A smartphone is a portable computer device that combines mobile telephone functions and personal computing functions into one unit. They are distinguished from older-design feature phones by their more advanced hardware capabilities and extensive mobile operating systems, which facilitate wider software, access to the internet, and multimedia functionality, alongside core phone functions such as voice calls and text messaging. Smartphones typically contain a number of metal–oxide–semiconductor (MOS) integrated circuit (IC) chips, include various sensors that can be leveraged by pre-installed and third-party software, and support wireless communication protocols. More recently, smartphone manufacturers have begun to integrate satellite messaging connectivity and satellite emergency services into devices for use in remote regions where there is no reliable cellular network.

<span class="mw-page-title-main">SD card</span> Type of memory storage for portable devices

Secure Digital, officially abbreviated as SD, is a proprietary, non-volatile, flash memory card format the SD Association (SDA) developed for use in portable devices.

<span class="mw-page-title-main">Computer forensics</span> Branch of digital forensic science

Computer forensics is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information.

<span class="mw-page-title-main">Mobile computing</span> Human–computer interaction in which a computer is expected to be transported during normal usage

Mobile computing is human–computer interaction in which a computer is expected to be transported during normal usage and allow for transmission of data, which can include voice and video transmissions. Mobile computing involves mobile communication, mobile hardware, and mobile software. Communication issues include ad hoc networks and infrastructure networks as well as communication properties, protocols, data formats, and concrete technologies. Hardware includes mobile devices or device components. Mobile software deals with the characteristics and requirements of mobile applications.

<span class="mw-page-title-main">Mobile device</span> Small, hand-held computing device

A mobile device, also referred to as a digital assistant, is a computer, small enough to hold and operate in the hand. Mobile devices typically have a flat LCD or OLED screen, a touchscreen interface, and digital or physical buttons. They may also have a physical keyboard. Many such devices can connect to the Internet and connect with other devices such as car entertainment systems or headsets via Wi-Fi, Bluetooth, cellular networks or near field communication. Integrated cameras, the ability to place and receive voice and video telephone calls, video games, and Global Positioning System (GPS) capabilities are common. Power is typically provided by a lithium-ion battery. Mobile devices may run mobile operating systems that allow third-party applications to be installed and run.

In computing, data recovery is a process of retrieving deleted, inaccessible, lost, corrupted, damaged, or formatted data from secondary storage, removable media or files, when the data stored in them cannot be accessed in a usual way. The data is most often salvaged from storage media such as internal or external hard disk drives (HDDs), solid-state drives (SSDs), USB flash drives, magnetic tapes, CDs, DVDs, RAID subsystems, and other electronic devices. Recovery may be required due to physical damage to the storage devices or logical damage to the file system that prevents it from being mounted by the host operating system (OS).

<span class="mw-page-title-main">Digital forensics</span> Branch of forensic science

Digital forensics is a branch of forensic science encompassing the recovery, investigation, examination, and analysis of material found in digital devices, often in relation to mobile devices and computer crime. The term "digital forensics" was originally used as a synonym for computer forensics but has expanded to cover investigation of all devices capable of storing digital data. With roots in the personal computing revolution of the late 1970s and early 1980s, the discipline evolved in a haphazard manner during the 1990s, and it was not until the early 21st century that national policies emerged.

<span class="mw-page-title-main">Mobile web</span> Mobile browser-based World Wide Web services

The mobile web comprises mobile browser-based World Wide Web services accessed from handheld mobile devices, such as smartphones or feature phones, through a mobile or other wireless network.

Anti–computer forensics or counter-forensics are techniques used to obstruct forensic analysis.

A factory reset, also known as hard reset or master reset, is a software restore of an electronic device to its original system state by erasing all of the data, settings, and applications that were previously stored on the device. This is often done to fix an issue with a device, but it could also be done to restore the device to its original settings.

<span class="mw-page-title-main">Mobile device forensics</span> Recovery of evidence from mobile devices

Mobile device forensics is a branch of digital forensics relating to recovery of digital evidence or data from a mobile device under forensically sound conditions. The phrase mobile device usually refers to mobile phones; however, it can also relate to any digital device that has both internal memory and communication ability, including PDA devices, GPS devices and tablet computers.

<span class="mw-page-title-main">Mobile technology</span> Technology used for cellular communication

Mobile technology is the technology used for cellular communication. Mobile technology has evolved rapidly over the past few years. Since the start of this millennium, a standard mobile device has gone from being no more than a simple two-way pager to being a mobile phone, GPS navigation device, an embedded web browser and instant messaging client, and a handheld gaming console. Many experts believe that the future of computer technology rests in mobile computing with wireless networking. Mobile computing by way of tablet computers is becoming more popular. Tablets are available on the 3G and 4G networks. Mobile technology has different meanings in different aspects, mainly mobile technology in information technology and mobile technology in basketball technology, mainly based on the wireless technology of wireless devices equipment information technology integration.

Mobile Business Intelligence is defined as “Mobile BI is a system comprising both technical and organizational elements that present historical and/or real-time information to its users for analysis on mobile devices such as smartphones and tablets, to enable effective decision-making and management support, for the overall purpose of increasing firm performance.”. Business intelligence (BI) refers to computer-based techniques used in spotting, digging-out, and analyzing business data, such as sales revenue by products and/or departments or associated costs and incomes.

Cellebrite DI Ltd. is an Israeli digital intelligence company that provides tools for federal, state, and local law enforcement as well as enterprise companies and service providers to collect, review, analyze and manage digital data. On April 8, 2021, Cellebrite announced plans to go public via a merger with a blank-check firm, valuing the company at approximately $2.4 billion. Their flagship product series is the Cellebrite UFED.

<span class="mw-page-title-main">Mobile security</span> Security risk and prevention for mobile devices

Mobile security, or mobile device security, is the protection of smartphones, tablets, and laptops from threats associated with wireless computing. It has become increasingly important in mobile computing. The security of personal and business information now stored on smartphones is of particular concern.

Carrier IQ was a privately owned mobile software company founded in 2005 in Sunnyvale, California. It provided diagnostic analysis of smartphones to the wireless industry via the installation of software on the user's phone, typically in a manner that cannot be removed without rooting the phone. The company says that its software is deployed in over 150 million devices worldwide.

Advanced Digital Forensic Solutions, Inc. is a company based in Bethesda, Maryland, that develops tools for scanning suspect computers and digital devices in order to locate and extract data, a process known as digital forensics. Digital forensic tools scan mobile phones, computers and digital devices to collect intelligence or evidence of a crime to identify computers that contain content relevant to an investigation.

<span class="mw-page-title-main">MicroG</span> Free and open-source alternative to Google Android libraries

MicroG is a free and open-source implementation of proprietary Google libraries that serves as a replacement for Google Play Services on the Android operating system. It is maintained by German developer Marvin Wißfeld. In a presentation, Wißfeld described microG as "the framework to create a fully-compatible Android distribution without any proprietary Google components".

<span class="mw-page-title-main">Cellebrite UFED</span> Software to extract data from mobile devices

The UFED is a product series of the Israeli company Cellebrite, which is used for the extraction and analysis of data from mobile devices by law enforcement agencies.

References

  1. "Chapter 6: Micro Systemation XRY". viaForensics.
  2. "Australian News Story". news.com.au. October 2009. Archived from the original on December 29, 2011.
  3. "Borneo News Story". Borneo Post Online. December 2011.
  4. "IRA membership trial hears mobile phone evidence". Breaking News IE. May 2012.
  5. "Test Results for Mobile Device Acquisition Tool: Micro Systemation XRY v6.3.1". National Institute of Justice. February 2013.