±Forensic Focus Partners

Become an advertising partner

±Your Account


Forgotten password/username?

Site Members:

New Today: 0 Overall: 31551
New Yesterday: 8 Visitors: 53

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News   Forums   Articles

±Latest Articles

RSS Feed Widget

±Latest Webinars



Webinars - 2016

How To Easily Break Pincodes / Passcodes / Patterns On Locked Android Phones

  Posted Monday October 03, 2016 (07:28:57)   (2349 Reads)
Presenter: Jeremy Kirby, Director of Sales, Susteen

Join the forum discussion here.
View the webinar on YouTube here.
Read a full transcript of the webinar here.

Jeremy Kirby: Alright, everyone. Thank you for being a part of this. We are going to go ahead and get started. My name is Jeremy Kirby. I’m Director of Sales here at Susteen, and of course I have Chris Carpen with me today. Thank you all for joining us. Obviously, we love having you. Today what we’re going over is the brand new Burner Breaker, and we’ll also go over Strike a little, and of course SecureView. I want to get you in and out of here probably in only about 30 minutes. So we’ll do this fast for your guys.

One thing I do want to mention: those of you that might be attending the Hi-Tech Crime Conference out in Vegas next week, we will be there as well, and we are doing a live demonstration. We’re going to be holding a session on the Burner Breaker.

So I’ll go into, just real fast, a little bit about Burner Breaker, what it is, and what it’s capable of, and then we’ll go ahead and actually show the program, so the software. So the Burner Breaker is literally the only tool in the world capable of breaking into locked burner phones. Those are your pre-paid phones, your throwaway phones, those cheap [Alcatels], which we’ll show you later, that are inundating our prison systems, all of those are in use for the Burner Breaker.

And by the way, guys, I do have my chat window open. If anyone has any questions or they can’t hear me, send a quick chat message, something like that. But I’m getting okays, thumbs up from everyone, so we should be good to go.

So again, Burner Breaker was designed because we have this thing called SV Strike, and the SV Strike is a paycode, passcode, pattern-breaking software box – hardware-software combination – that works on USB-OTG cellphones. So your nicer smartphones, your Galaxies, iPhones, iOS up to iOS 8.0, that type of stuff. That’s used to break into those phones. But what’s happening is we were hearing back from our users, and they were saying, “Hey, we have your SV Strike, we have a few other tools, and they’re not working on our Android phones. What’s going on?” And what’s happening is they were Android phones that are not built with USB-OTG capability, and that’s over 60 million phones in the United States every year. Every one of your Alcatels, a lot of your ZTE phones, your cheap phones that everyone’s buying at Target, 7-11 and the grocery store, that type of thing, even notepads, tablets. So that’s why we created the Burner Breaker, and it’s the only tool that can break into those phones.

Now, what you’re looking at on your screen is SecureView. When you buy the Burner Breaker, that’s the SecureView ultimate [kit]. So when you get Burner Breaker, you’re getting SecureView Logical, you’re getting SecureView Physical, you’re getting all of our analytics, you’re getting the SV Strike for your smarter cellphones, and you’re getting, of course, the Burner Breaker robot, the actual hardware for the phone.

You know what I’m very excited to tell you, all of my government agencies that are with us today – here in the United States, all software is created here in the US, which is wonderful. So please keep that in mind.

So what we’re going to do is I’m going to jump in, just give you a brief demonstration of what’s SecureView – that’s the cellphone branded software – what that is capable of. And we’re going to do a phone on the Strike, and then we’re going to do about three or four phones on Burner Breaker, and I’ll get you out of here. So Chris, if you like, go ahead and click on Acquire for me.

Alright, here we go. So when you acquire data from a cellphone, you can choose either the phone or tablets, obviously. So we’ll just click on Phone real fast. You can then do logical and physical – yes, SecureView does now give physical acquisition. If you have, obviously, the [Apex], which is our physical explorer. What’s neat about it is lost LG phones, it can get a physical image even if they’re passcode-protected, it’ll still pull off physical images on a lot of those phones, and your other Androids, like your Samsungs. You can use a rooting tool, once those are rooted, you can easily pull a physical image off and then view it in our [Apex] physical explorer, which is really neat.

And again, when you get a Burner Breaker, you get all of this, and that’s why we’re going over [unclear] today.

[unclear] click on Advanced Logical, because that’s what everyone starts with, is the logical acquisition, it’s your texts, your emails, your call history. For Android and iPhone it’s completely the same. It looks the same. So Chris, can you click on Android. And the next page will look completely the same whether it’s iPhone or Android. This is the data set that you’re getting off of those phones. So nice and simple. Now, also, we can work out feature phones. We have the largest selection of feature phones in the mobile forensics industry. So if you don’t know what type of Android it is or if it is an Android – Chris, hit Back for me – you could go to Others, and then you can actually search by the make, the model, or even the carrier. So it’s pretty cool, very easy to use.

Now, with some of the feature phones, those really, really cheap phones, we all know them here as track phones – now, the Burner Breaker can break into the track phone. Yay, it’s the first time anything’s ever been able to do that! Problem is, though, once you get into that burner phone, you’ll still need a camera to take pictures of the actual evidence, and that’s because there’s no actual working port on track phones. That’s why you can’t use any mobile forensic tool to put that data off. It’s because there’s not a real port there. It looks like one, but it’s only a charging point. So we’ll break into that phone for you, and then you’ll be able to… whatever tool or whatever camera you want to use to get into that evidence, which is pretty neat, because up until now there’s been no way, short of maybe using ISP or [j-tagging] or ripping that phone apart, to get into it.

So then you need to pull data off of the phone… I’m going to have Chris go back to the Home screen. We’re going to hit Okay. And now we’re going to go to Analyze, which is our nice little magnifying glass. We’re not going to do the physical viewer today – that’s another training. But we do have the physical viewer, and it’s called [Apex]. If any of you would like to see it in more detail I have a recorded webinar you can ask for, or again, come out to some of the shows. Also, I do want to let you know, we often go out to [unclear] and [unclear] across the country to do presentations. We are going to be out a few locations in the Midwest the next month, and if you guys, anyone listening today would like to set that up into your large police department, we’ll be happy to come out to you and demonstrate in person.

Now, I’m going to have her go to svProbe, which is our analyzation tools, right there, and we’re going to do our last case. There we go, it has three different phones. These are our test phones of course. So Chris, [unclear] click OK for me. Right.

And it’s going to take a moment, it’s going to pop up all of our data. So now, SecureView, the cellphone forensic software, was actually the first mobile forensic software out there, [was used at a ton of ICACs], it was actually created for that original purpose. So you can load tons and tons of phones into SecureView. If your computer is powerful enough to load all that data, then SecureView can handle it as well. So here we have three different cellphones that are part of our case.

Now, Discovery is a keyword search. So Chris, if you can go over to the right-hand side – there you go. Type in “hello” and hit Add for me, and then search. And this is basically pulling any of that data, any of those keywords off of the phone, off of any of those phones that are up there. So as you can, there are some text messages, there’s also some application data using the word “hello” as well. And again, normally in our trainings we go in a little more detail, but we all really want to see the passcode breaking, so I’m just running over this quickly.

For Timeline – Chris, go to the next tool – Timeline is the same thing as Discovery. It’s another keyword search, but it tells you more closely when it happened. So if you need to, if you’re trying to figure out the date of the crime or the time of the crime, or you can only search data for certain timelines, then Timeline is the best way of going about it.

Next up, Link Graph. Now, Link Graph is going to show us – here, I’ll click on it – Link Graph is going to show us all of the people that each one of our phones has talked to. So now, as you can see, it’s doing a graphical representation of who our phones are talking to. Now, again, these are our test phones, but they’re [unclear] you can get a good [feed]. One of the things that we changed, which is really neat, is now if someone has pictures loaded in their phone or in their Contacts, you will see them now in this Link Graph. Obviously these are test phones, so all of our people up there are grayed out. And you can choose to have them grayed out like normal as well. But we do have the capability now of showing those pictures. Also, when you click on some of them on the right, you can see it highlight them over on the left. All of these tools have flagging. Again, we won’t go over it much today, but that’s how you build your evidence reports. So you’re going to flag these things to put in your evidence report. Alright? So pretty easy.

They’re a real nice representation of who the phones are talking to and how they might be connected out there. Next thing we’re going to go into is our Prime List. Prime List is literally ever person that our phones have talked to. When you double-click on them – we won’t do it today, but if you double-click on them it’s going to show every text message between the phones, any calls between the phones. So then, this is just an easy-to-use way of seeing who your suspects are talking to the most, and then you can easily view the data associated with it, and then flag it for your evidence reports.

Now, Activity Map – that’s the next thing. I always do an example. Why Activity Map is so important – so we basically do a lot of work with the prison systems. It’s actually how the Burner Breaker came about. It was actually a suggestion from the [Avenal] State Penitentiary here in California, so we can all thank them for helping with the idea. And what happened was – not this particular penitentiary of course, I won’t name who [unclear] another prison, they had a lot of contraband phones, and they acquired those contraband phones and they were talking [unclear]. All of those phones had the same activity at certain times of the day. What they were able to figure out, going by the Activity Map, is all those phones were being used in correlation with certain correctional officer shifts. So yeah, it’s a sad example, but it was Internal Affairs, and what they found is that these correctional officers were letting the inmates use their phones during certain times of the day. And they were able to then see that they were only being used on their actual shifts. So if a correctional officer had their day off, then that phone was not being in use. So there you go. So it’s an example of why the Activity Map is important.

And of course, lastly, our gallery. The gallery is very powerful. You can get a bunch of information off the pictures. So as you can see, on the left-hand side it shows the picture. On the right-hand side it’s going to show the information of that picture – so the picture name, when it was taken, even GPS coordinates taken off that picture. Chris, if you can click on ‘More Details’ – it’s right above the map. Now, you can even, with new SecureView 4, you can even click on Additional Information – scroll down a little – this will even tell you how fast the suspect was going when taking the picture. So if they were in a car, shooting video or shooting that picture, it will even let you know, basically, if they were standing still, they were walking, jogging, running, if they were in a car. Any bit of other evidence you’ll find on there, you can [pull that out].

On top of that [as well, one of the new things] is that you can also see, for the pictures, what camera took it. So that’s one of the things we implemented. It was coming up in court – was it taken from the front-facing camera or the selfie camera, that type of thing. So it will give you the additional information there. So all of these tools are at your disposal, which is nice, and of course that it secure to you. So very [unclear] we won’t go into the reporting today, but Chris, go to the File and then exit out of there for us. And there we go, we’re back to the Home screen. So that simple.

Now, for reporting features, we have an evidence report, we have the complete report. Complete report is every bit of data taken off of that phone, all 8,000 texts, all pictures, everything else. Evidence report of course is the evidence that was taken off that phone that you flagged. So that’s showing, basically, the evidence that you found important to your case and flagged. So there you are, nice and easy to use.

Okay, so I know we want to get into some of the passcode-breaking stuff. Now, about a year ago, we created what was called the SV Strike. Chris, [if you don’t mind, can you] plug in that phone for me. The SV Strike was basically created because someone out in China had come up with something called an IP box. A lot of you might have had it. Hopefully, absolutely none of you are… no longer using it, hopefully you’re not using it any longer. The reason why I say that is after government agencies, state agencies purchased it, they realized it was sending data back to China. That was a big no-no. Every time they plug it in the network, it’s sending data back to China. So obviously, we don’t want to do that.

So a few agencies put out the call to an American company to create something similar, and that’s where we came into play – we created the SV Strike. And the SV Strike is – Chris, [you can click on Passcode Breaking] for me. There we go. You’re actually looking at the SV Strike home screen now. SV Strike works on PIN codes, it works on passcodes, it works on pattern locks. It is the only tool that works on Android 6, which is the new Marshmallow. And again, this is for smarter, more expensive cellphones – I can’t stress that enough. Your cheapo Alcatels, they’re not going to work. They’re not smart enough to talk to the software. That’s why you need the Burner Breaker. It’s for USB-OTG phones.

So there you are. We’re going to go ahead, I’m going to take just ten seconds here, plug in the phone, and I’ll come right back. So give me one second there.

And there we go. And I’m trying out a brand new camera, which is actually pretty cool. Hopefully you guys can all see this well. So let me just show the Strike real fast. This smart little Strike box – it has two CPUs, that’s one extra CPU than that’s actually needed. The reason why is because we do updates throughout the year. Like I said, we’re the only people that do Marshmallow or Android 6.

So there you go, so the software-hardware combination. It will work on [pattern locks] as well. What I have [unclear] Galaxy [unclear]. So a nicer phone, a newer phone, it’s USB-OTG and that type of thing. One of the most important things that we want to do is we want to make sure that we are matching up our device to the software. So obviously, this is not an Android 6. This is older, it’s an S5. So [unclear] Android, it’s probably Kit-Kat or Lollipop operated. If it was an iPhone, we use an iPhone. If it’s a super old phone – which still comes up in some other countries and even in the States – if it’s an old phone using what’s called the Brew operating system – Brew meaning B-R-E-W like brewing coffee – then you use the SVPIN. So that’s important.

So now, okay. [Someone] has a really good question, because again, this is something [unclear] redo. And the question is: Do Android phones have to have USB debugging turned on for Strike to work? No, they don’t. This does not require USB debugging to be turned on on that phone. So that’s great. So we’ll move ahead now.

You have a few different options. If the phone is PIN code protected, you can choose PIN. If it’s passcode, you can choose Passcode. If it’s pattern, you can choose Pattern. Now, I am going to load in our [training] software here, so that it’s always implemented. Give me one second, it’ll pop it up and I’ll do my testing.

But you can choose. So most of the time, it’s going to be PIN code protected. Every once in a while you will see a passcode. We do the most common passcodes. We have the most common PIN codes for you to use. You can load any of our lists already in there. We even have an Ashley Madison list in there. We do that to showcase the fact that we are constantly out there looking for the most commonly used PINs and passcodes, and we make sure that that’s done for you and in there.

Now, if you’re connected to the internet – most of you with federal government agencies will not be, state agencies will not be, some police departments are – if you are connected to the internet, you can choose so that the software will warn you once it’s broken into the phone, either by a text message or by an email. If not, then don’t worry about it. So we are going to go ahead. I’m just going to hit Start here, and I’m going to turn on the phone [unclear] you guys can see a little better. And let’s see what it does.

Now, what it’s automatically doing is it’s running through… there we go. It’s throwing in a bunch of codes real fast. Why is it doing that? Well, because we want the phone to lock down. Reason why we’re doing that is so that the software and the phone can be on the same page. They can be on that same locked-out time. So the phone is going to lock out for 30 seconds, we’re going to lock out for about 35 seconds, just to ensure that we’re over on the amount of time. Now, one of the things that the Burner Breaker does that the Strike doesn’t currently do but will have built into it is you can change the timeout. We found that our European customers, or even for our larger agencies here in the states that were getting European phones, their lockout times differ from American phones. It can be the same Galaxy [unclear] but their lockout time might be 60 seconds versus our 30 seconds, so very interesting.

So now, it’s going to go through and it’s starting our PIN codes. And by the way, what this camera is doing is this is literally taking a picture of every failed attempt to get into that phone, and then the correct attempt. And now, why is it doing that? It’s because we’re building an evidence report. We’re trying to build that evidence report for you guys so that if you go to court, you have an evidence report going back, showing every failed attempt to get in that phone. Why? Well, so that a suspect can’t go to court and say that they were coerced into giving you a PIN code, that you threatened them, anything like that. You have full evidence backing up how you got into that phone, which is wonderful. So that’s great.

So I’m going to let it run one more. I think [unclear] screen, I believe it’s going to go ahead and break into this phone. I have the PIN code set [for an easy one, so that] we can get in quickly for you guys. I don’t want you sitting here for over an hour. And let’s see if it goes on the next one.

And there you go. And now you’re into that phone. So now you have access to that phone, you can use SecureView or any other tool, forensic tool that you have in your arsenal – Strike works with all other forensic tools – to get the data out from that phone.

Now, [unclear] what happens if it’s set to wipe? I have never run across an Android phone set to wipe after ten attacks. There are people that do that, I’m sure they’re out there, but I do these cases for federal as well as state agencies, local police departments across the country. We’ve never had one set to do that. We do tell you guys, when you’re sitting there with that phone, make sure that you watch that phone for the first 20 attempts, because every Android, if it is set to wipe, it is not like an iPhone. It will always warn you if that’s the case. And if that is the case, you unplug it, and you’re good to go at that point. The only phones that automatically wipe are iPhones. That’s why this isn’t specifically built for iPhones using an 8.0 or later operating system. It’s for the Androids and of course other types of phones as well. But there, very good question. And I everyone always asks that, but I have yet to see an Android actually in a real-world situation actually be set to do that. And you might get one out of 20, where someone got smart and set it to wipe, but Android doesn’t automatically do that like iPhones. Those of you that see Verizon phones, Verizon phones are the only company that gives the person that option right up front as they’re setting up the phone. So if you’re in a Verizon-heavy area, then you might see those phones a little bit more than other people. So heads-up on that.

Let’s see. Okay, so one other thing is this is set for Marshmallow. We’re the only tool that does that. Marshmallow has an increasing timeframe. So the first lockdown attempt might be 20 seconds, the next one might be 30, the next one might be 40, the next one might be 60.

Very good question. That doesn’t happen with any of the burner phones, obviously, and in the states they’re not set to adopt that till 2019, so you have plenty of time. But for your Galaxies that are using Marshmallow, that is a concern. What the Strike does – and this is why you use our most commonly used PIN code, passcode list – the Strike gives you a good 300 to 380 attempts to break into that phone before Marshmallow just gets too long to continue. So basically, eventually, it’ll start pushing out one week between attempts, two weeks between attempts. That’s the current process right now. But you’re able to get in a good 300 or 350 attempts before that happens. And let me tell you what – if you have the suspect’s information, meaning their date of birth, anything like that, I can’t tell you how many times the PIN code turns out to be 0114, if their birthday is January 14th – that type of thing. So we do give you, with the most popular PINs and passcodes, a very good chance of getting into that. And there you go. And that’s utilizing the Strike.

What we’re going to do now is we’ll go ahead and move to the… oh yeah, and by the way, if you do have… this will work on any iOS device, [up to your] iOS 8. So if you have an iOS 6… it has to be 6.25. That is when OTG was built into the iPhone. If not though, you can use the Burner Breaker. But if you’re using an iOS 6 – not an iPhone 6 but an iOS 6 – up to iOS 8, Strike will work on those as well. So there you go.

Now, give me one minute, guys. I’m going to switch my camera over. We’re going to get it on the Burner Breaker, and I’m going to go over that in a little bit more detail, and we’re going to show you what the [robot] can do for you guys. So give me one second.

Alright, guys. Now, hopefully, everyone should be able to see… I’m going to [resume you] on my screen. Hopefully everyone should be able to see now the camera again – there, we’re live. It should come up on your participant menu. If you don’t have that up and running, I’ll give you a minute to get that open. You should be able to see my camera somewhere there. If you can make it bigger… because we’re going to showcase that. I’m going to show you the actual [robot] here in a little more detail. And there you are.

Okay. So hopefully, everyone can go ahead and see the camera there, and then can still see my screen. Let’s see if I can… and there you go. If you can’t, go ahead and shoot a text message, and just say, “Hey, it’s really small,” or whatnot. Hopefully you should be able to see it very well.

Okay. So we’re going to start going over the Burner Breaker, and what you’re actually seeing here is our internal preview software – do not share this with anyone please. But this is our version of the software. And why I like to go over this version is it shows you all the behind-the-scenes tools of what the robot is actually capable of. When you get the robot there, you’ll have our production software that actually launches this month, and it’s just a little easier for you guys to use, a lot less [unclear] and lot more pictures, so that it’s friendly.

Now, one of the things I do want to let you know is that the Burner Breaker itself… the Burner Breaker comes with training. When you get the kit, you get training included. In some cases we will actually fly out to you – we have a lot of investigators – and do a full training for you. That is no additional cost. So keep that in mind. We do the training at no cost, which is wonderful. So we’ll train you on how to use it.

Now, let’s hit Connect here and see if we can get this [guy] moving. And there you are. And I’m just going to hit a button here, just to see if we have our placement. We’ll give it a second.

Okay. So what we’re going to do is we’re going to go over the software itself, to show you how it’s working and what it’s capable of. Give me one minute, I’m just going to pop up on my screen here, so I can choose the phone. Give me one second.

Awesome. Okay, guys. So the Burner Breaker is completely [basically like edible] by you. There’s so many… editable, I should say. There’s so many different types of phones out there, depending on country-specific. So this is not just made for the American audience – this is made for the Asian audience, European, and so on. The phone that we’re going to do first, that you can see down there – I’ll turn it on real fast, so you can [unclear] – this is a Chinese [Chipset], it’s an [FDK] phone. And we use this phone as an example to show that this bad boy will literally get into anything, which is awesome. Now, what you’re looking at here – and I’ll just briefly explain – these are kind of coordinates. You’re basically… you don’t realize it, but you’re looking at an X-and-Y graph. Those of you that were maybe good in geometry and algebra – I was not, but – you’ll have a little leg up.

Now, the X and Y graph, basically, you’re training the Burner Breaker to see where the actual phone coordinates are. I’m going to move this down, give me one second, and we’re actually going to take a look here. Sorry if I’m making [unclear]. I want to get a close-up on that phone. There you go. So you’re actually telling the Burner Breaker where the phone buttons are. I’m going to do a center offset there, that’s a center offset. The most important part of finding out how to use the machine is finding where that center button is. And again, I [could center offset], it’s finding that center button.

The next most important thing is finding where the X coordinate is. What is that? Well, that’s the button next to the center button. That would be like the number four. And once you’ve plugged in those two coordinates, well, guess what? All the other buttons are equidistant, so now it knows where every single additional button on that phone is, which is wonderful.

Now, the only other thing that you will have to plug in is how you’re going to keep that phone awake, where its emergency… where either its home screen is, its pushbutton. So now, this [Chinese chipset], this actually has a pushbutton on it that the Americans do not. Well, not all phones do. So again… and it’s kind of back here. But it’s a press button instead of a touch screen that keeps that phone awake.

So that’s one of the things that you train. You train that by coming down here to the coordinates and entering in the correct ones. And now it takes about ten minutes to set up a phone doing it this way, it’s kind of trial and error. On the software you guys will receive, again, it’s a lot easier, because you’re going to be able to move the machine over the button and program it that way. So we are working on easier software for you, but it’s already very easy to set up.

Now, one of the other nice things is that we have preset phones built into the machine. So if you’re using an Alcatel phone, a Chinese [Chipset], like if you’re using… an Alcatel is the most common screen in America. It’s the 4.5-inch, or the 5.5-inch on that screen. So that Alcatel settings that we give you work on really thousands of different phones. So a lot of phones are already built into the software. The next thing of course, you get to choose what the lockout period is. Chinese phones all have 60-second lockouts. That happens in Europe a lot as well. Here in the States it’s a 30-second lockout. So this is all programmable by you. Does it have to [click] a backup PIN. So this is used, guys, not just to break in the phone, but the Burner Breaker can be used to break into app locks as well. You’re probably all seeing those a lot more, which is an actual application that locks you out of apps on that phone.

Well, why there’s a backup PIN, which you can see right here? That’s because on some phones there’s no Enter key. So especially on the applications, if you’re typing in a password that’s 1234 and that’s not the correct password, when the Burner Breaker, or when the Strike or anything else keeps going, it goes into the next attack, 1235, 1236, it’s continuously entering them into the field, because there’s no Enter key. So this can be trained to cause the Burner Breaker to hit the Backspace key after every failed attack, which is really neat. Same thing with Swipe, and you’ll see this in a second.

Now, I’ve found my center offset. Wherever the center offset is, I need to do a wakeup test to see if I can keep this phone awake. And it looks like we’re right on the money. So what I’m going to go ahead and do is I’m going to go ahead and hit Run… [unclear]. We’re going to see if we can get into this phone. Let’s see how we’re doing. Two. Three. And there you go.

Now, I’m going to keep talking as it’s going. Now, same thing with the SV Strike – the Burner Breaker is taking pictures of every failed and then correct attempt to get into this phone. Why that’s important again is for that evidence report. And now, as you can see, it’s keeping the phone awake – there you go – while it’s going through and doing its… while the phone is counting down 49 seconds, 50 seconds, our Burner Breaker software has elapsed time as well. And it’s going to go through and it’s going to match up with that timeframe.

And again, this is all completely editable for you. So if there’s different lockout times, you can utilize that. Now, the robot itself, built very well, [full metal base]. It’s about eight inches high, the base is about 8X8 square. It will work on up to 17-inch tablets. We are currently working on one right now for Australia, where they sent us a giant Galaxy tab, and yes, it will work on those as well, which is awesome. So what I always tell people… people say, “What’s the phone support? What can this work on?” I say, “Can you touch the phone screen with your finger?” They say, “Yes,” and I say, “Well, it’s going to break into that phone.” It’s that simple. It literally is built to mimic the hand of the human being.

And it [is full of] warranty – if anything goes wrong, this little guy can be completely switched out by us. We produce it, we’ll send it to you.
And there you go – you now have access to the phone, and you can do whatever you want. And again, Burner Breaker and Strike, they work with SecureView, if you want to use SecureView to download that data off them. But if you’re more familiar with another forensic tool, go ahead and utilize it. So that’s pretty neat as well. So I’m going to switch this one now. And just again, [Chinese Chipset, guys], [MDK] phone, it’s basically their iPhone knockoff version that we’re using. I’m going to do…

Of course the reason why we created the Burner Breaker, this is the famous Alcatel. And why do you guys see so much of those? Well, in California, this is the free phone. This is the phone we give out, this is the phone that’s inundating our prison system. And for most Alcatels, they do not work on Strike and on the other tools, because they’re not smart enough to talk to them. They need an actual brute force device. And by the way, when I [unclear] warranty, there is a normal maintenance and support, just like every other tool, for the Burner Breaker. So as long as you’re upkeep on your maintenance and support, then you’ll be warranteed forever. So it’s that simple. Again, we built that here for you, so we can get them out.

Okay, so now – this is a different phone, right? So this is not [unclear], this is an Alcatel. So we have to take a look and see what the Alcatel can do. So as you can see, it kind of changed some of the settings there. [Turn on keys] are in a different [unclear]. I’m going to click that here. So we’re going to need a different center offset. We have to find a completely different center offset here. Also, Alcatel’s screen is notoriously bad, meaning that they’re tough, they don’t work well even on your own fingers. So you really have to get in there and plug these phones in right. And I’m just going to go ahead and I’m testing our wakeup. It looks like our wakeup is working perfectly on this phone as well.

So I’m going to go ahead here and run, and as soon as it’s done we’re going to see if this works. And again, this is an Alcatel phone. This is, again, the number one burner, prepaid phone out there, different versions of Alcatel, but they all share the same software, and we can break into every single one of them.

Burner Breaker can break into clamshell phones too, your true, old feature phones. So I do want to tell you about that as well. You do need to build like a little cradle for them, play-doh works the best. The reason why is because those clamshells will rock, obviously, if you’re going to touch on the top screen. So you need to do something to stop them from rocking.

One of the things I want to show you is that, if you notice, our lockout period is different. So again, this is an American phone, it’s going to have a 30-second lockout, it’s not going to have that 60-second lockout. [So you want to use that].

And we’re going to use this to break in, and then I’m going to show you something that is pretty cool. It’s actually something that we’re finalizing right now on the Burner Breaker, and what that is is teaching the Burner Breaker to actually break into pattern locks as well. SV Strike can usually break into a pattern-locked phone if that cellphone is USB-OTG capable. But what about a burner phone? They have patterns too. Alcatels have patterns, ZTEs have pattern locks. So I’m actually going to show that to you, and we’re going to take a look. Give me one second.

And there you are. That simple to get into the phone, guys.

So now I’m going to show you the ZTE. Now, this is something that we’re self-testing. I’m not saying it’s going to work perfectly on this try, but I want to show you guys, just the fact that there’s really no limits on what this robot can do for you. This is a ZTE. It is a phone that we had to go out and buy because we actually had… someone who has the Burner Breaker had this exact phone in a real case. They got theirs to work and did open the phone. By the way, we do have testimonials on the Burner Breaker from departments that have already used it. You guys need that, email us, we’ll get them out to you.

So we went out, we programmed the Burner Breaker so that it can actually do pattern locks. And I’m going to load this in here, you’re going to see the settings change a little. I’m using my ZTE. I’m now… it will swipe test there for you. I’m now going to do a new PIN list. Now, obviously, we’re not using a PIN. We’re going to use a pattern lock. So we had to train… and by the way, all these PIN lists and pattern lists and most popular lists, they all come for free with the Burner Breaker, so there you go. Don’t have to pay extra for them.

It changed our thing. So what it’s doing is there’s a swipe required on this phone, before you can get to the PIN code or the pattern code screen, you have to swipe it. So you have to swipe that just to get there. So I’m going to go ahead, we’re going to try to do a center offset. I’ve got to find that center offset a little better here.

And give me one second. Chris, can you click on it right… Give me one second. Alright. There we go. Try it again. Now go to emergency… wakeup test for me… on the left. Up a little more, up a little more… there you go, right there. And we’re going to get that loaded here. It looks like it might be hitting it. Can you do it again for me? And it looks like we’re kind of there. And then when this is done I’m going to have you hit center offset for me. Alright, hit center offset. And I think we’re still lined up. So I’m going to have her hit run.

And I’m actually going to hold the phone, just because we are still testing. We’re going to see what this thing can do, and hopefully [unclear] input the pattern right there on your screen. And again… wow, it hit the S, that’s the hardest one to do, the S. And now you’re in that phone.

And this goes to show that this product is wholly supported. We have engineers that are working specifically on the Burner Breaker at all times to ensure that it’s working on thousands and thousands of different types of phones. I cannot stress enough, it is the only tool in the world capable of doing so, and it’s built right here in the United States. We’re very proud of that.

And guys, that’s it. I could show a thousand more phones, but it’s really the same thing for everything. Burner Breaker works great, very easy to use. And again, I’m just reiterating what it comes with. If you’re not currently a SecureView user, when you buy the Burner Breaker, it’s the entire kit, so you get SecureView Logical, SecureView Physical, which is [APEX], you get the SV Strike, and you get the Burner Breaker. If you already have SecureView, let us know, and what you can do if you don’t need an entire new license, you can just get the Burner Breaker. I would say just to get the entire package though, because that also comes with full training. How often have you guys ever gotten certified training at no cost? And that’s at no cost, and in some cases, preferably if you live on a Hawaiian island somewhere, we will actually come out there and train you in person. Not sure for the guys in Montana, I apologize. No, I’m kidding. But we will actually do that in a lot of areas.

So this product has been a godsend for human trafficking cases, for drug cases. Again, we have testimonials from people that have used it on extremely important cases, where it worked and it worked fast. Because of our most popular pattern and PIN code lists, we can usually get into a phone within six hours. Keep that in mind.

So that’s great. So guys, everyone, thank you so much for being here today. When you’re done here, please go ahead, email. If you were speaking with William, if you’re speaking with Aaron, if you’re speaking with Christa, let them know if you have any questions. They can get you out a quote, they can help you out with anything further that you need. I do also want to let you guys know – a little sneak preview – we are also launching our cloud analyzer, which no one knows about yet, that comes out in October.

The cloud analyzer is actually going to be the heart of our APEX Physical Explorer, it will not cost you an extra dime if you have the Burner Breaker. Those of you that have bought cloud analyzers before, you know they get expensive by themselves, usually $1500-2000. So that will also be included, we’re very excited about that, which is nice.

Now, [unclear], any questions on SecureView, let us know. SecureView – I’ll just do a quick recap. The very first mobile forensic tool in the world, it actually all spawned from the Data Pilot, which was the largest data transfer suite ever, over six million users. And what happened is the FBI actually saw that and said, “Hey guys, we notice that you can transfer data from one phone to another. Can you do it in a forensic way?” That’s how SecureView was born back in 2008. It’s now in use in over a thousand different agencies, and we are hitting international markets now, because we can now get into Chinese [Chipsets], South American phones, all of our border patrol users, these can be [placed neatly into] the Burner Breaker as well. It can be built in the field. Remember that it comes in a tough case. It is [unclear], the bottom is complete steel, I mean the thing is heavy, and it’s just a great tool.

So please, if anyone has any questions, contact us. Again, my name is Jeremy, I’m Director of Sales. My direct number, if you need, is 9497898221, and I am always available to help you.

So thank you guys so much for being here, and I can’t wait to help your communities even safer than they are now. This will truly be an amazing tool for you guys. You guys have a wonderful day, everyone stay safe, and if you’re going to be at HTCI, we’ll see you there. Take care, everyone.

End of Transcript


  Printer Friendly Format