CSI Stick: The Portable Cell Phone Forensic Tool

Paraben Corporation, a digital forensic technology provider, announced today that it has released the new Cell Seizure Investigator Stick (CSI Stick). The CSI Stick is a thumb drive size device that forensically acquires data from cell phones. This portable solution is easy to use with a simple one button command to gather data from the device…Whether it is logical or physical information, the CSI Stick can gather the data. “The Paraben CSI Stick has the potential to be a great tool for street level patrol officers. The functionality of the stick allows street level officers to view media quickly and at the same time the stick maintains a forensic image for full exam by forensic lab personnel,” said Jay Poupard, of the Michigan State Police.

The CSI Stick and its one button interface is the perfect tool for first responders as it gives them the ability to capture all the data off the phone or just grab the imperative data such as SMS messages, phonebooks and call logs, or multimedia messages.

The CSI Stick supports 330 models of Motorola and Samsung phones and is supplied with three adapters for the different connections. Other adapters for popular cell phones will be released later this year increasing the number of models that the CSI Stick will support with LG and Nokia support already in development.

Paraben Corporation is the global leader in cell phone forensics and has been innovating and leading this field since 2002. “After years of developing innovative cell phone forensic technology, we saw a definite need to take cell phone forensics to the masses allowing patrol, narcotic, and gang officers and many others to have access to digital evidence they did not have access to before,” stated Amber Schroader, CEO of Paraben Corporation.

Get The Latest DFIR News!

Top DFIR articles in your inbox every month.


Unsubscribe any time. We respect your privacy - read our privacy policy.

The CSI Stick is compatible with court approved Device Seizure and DS Lite and is available for $199.00 U.S. stand alone or $399.00 with a 4 hour training session on operations and cell phone data analysis.

ABOUT PARABEN

Paraben Corporation specializes in computer forensic software for enterprises and consumers. Established in 1999, Paraben became a leader in handheld forensics with the release of PDA Seizure in 2002, the first commercially available tool for cell phone forensics. Paraben then combined the two tools to create Device Seizure, a comprehensive forensic solution for cell phones and PDAs. Paraben also has many digital forensic software titles for forensic analysis of hard drives and media – P2 Commander, and specialized tools for enterprise level forensics – P2 Enterprise, training classes, and forensic hardware. For more information, visit http://www.paraben.com.

Leave a Comment

Latest Videos

Quantifying Data Volatility for IoT Forensics With Examples From Contiki OS

Forensic Focus 22nd June 2022 5:00 am

File timestamps are used by forensics practitioners as a fundamental artifact. For example, the creation of user files can show traces of user activity, while system files, like configuration and log files, typically reveal when a program was run. 

Despite timestamps being ubiquitous, the understanding of their exact meaning is mostly overlooked in favor of fully-automated, correlation-based approaches. Existing work for practitioners aims at understanding Windows and is not directly applicable to Unix-like systems. 

In this paper, we review how each layer of the software stack (kernel, file system, libraries, application) influences MACB timestamps on Unix systems such as Linux, OpenBSD, FreeBSD and macOS.

We examine how POSIX specifies the timestamp behavior and propose a framework for automatically profiling OS kernels, user mode libraries and applications, including compliance checks against POSIX.

Our implementation covers four different operating systems, the GIO and Qt library, as well as several user mode applications and is released as open-source.

Based on 187 compliance tests and automated profiling covering common file operations, we found multiple unexpected and non-compliant behaviors, both on common operations and in edge cases.

Furthermore, we provide tables summarizing timestamp behavior aimed to be used by practitioners as a quick-reference.

Learn more: https://dfrws.org/presentation/a-systematic-approach-to-understanding-macb-timestamps-on-unixlike-systems/

File timestamps are used by forensics practitioners as a fundamental artifact. For example, the creation of user files can show traces of user activity, while system files, like configuration and log files, typically reveal when a program was run.

Despite timestamps being ubiquitous, the understanding of their exact meaning is mostly overlooked in favor of fully-automated, correlation-based approaches. Existing work for practitioners aims at understanding Windows and is not directly applicable to Unix-like systems.

In this paper, we review how each layer of the software stack (kernel, file system, libraries, application) influences MACB timestamps on Unix systems such as Linux, OpenBSD, FreeBSD and macOS.

We examine how POSIX specifies the timestamp behavior and propose a framework for automatically profiling OS kernels, user mode libraries and applications, including compliance checks against POSIX.

Our implementation covers four different operating systems, the GIO and Qt library, as well as several user mode applications and is released as open-source.

Based on 187 compliance tests and automated profiling covering common file operations, we found multiple unexpected and non-compliant behaviors, both on common operations and in edge cases.

Furthermore, we provide tables summarizing timestamp behavior aimed to be used by practitioners as a quick-reference.

Learn more: https://dfrws.org/presentation/a-systematic-approach-to-understanding-macb-timestamps-on-unixlike-systems/

YouTube Video UCQajlJPesqmyWJDN52AZI4Q_i0zd7HtluzY

A Systematic Approach to Understanding MACB Timestamps on Unixlike Systems

Forensic Focus 21st June 2022 5:00 am

This error message is only visible to WordPress admins

Important: No API Key Entered.

Many features are not available without adding an API Key. Please go to the YouTube Feed settings page to add an API key after following these instructions.

Latest Articles

Share to...