DNA has new interception technique: Contacts or pictures taken from phones and tracking on Facebook / Software can even recover deleted data from mobile or computers

Time 16/01/2022 By myhoneybakedfeedback

In terms of mobile phones, the acquisition of DNA requires software to extract data from phones such as Apple, Alcatel, BlackBerry, Samsung, Sanyo, Sharp, Sony (SonyEricsson), but the list is much longer. To these are added Chinese replicas of mobile devices and memory card storage devices.

DNA has requested that the software support at least 2400 mobile device models for password / pin screen unlocking and security bypass functions. According to the specification, the system purchased by DNA will be able to identify a person's location even if the system is offline for GPS.

LAST NEWS


See more articles in the social category

Deleting messages or contacts is no longer a secret. The software purchased by the National Anticorruption Directorate can even recover data deleted from mobile phones or computers. Tracking can also be done on public networks: the Internet artifacts processing and analysis module also has a search engine and recovery from unallocated spaces (carver functions) for web applications, such as: Facebook, Google Drive, Google Chat, Skype, Dropbox, Torrent etc ", is shown in the specifications.

The software can clone cards, decode phonebooks, access notes, or applications installed on the phone.

The auction was won by five companies: TREND IMPORT EXPORT. Mida Soft Business SRL, WEBSPOT SRL, PRO SYS SRL, Q-EAST SOFTWARE SRL

From the specifications: Extract / purchase existing computer data on the following mobile devices: Acer, Alcatel, Amazon, Amoi, Apple, Archos, Asus, BLU, BlackBerry, Coolpad, Dell, Dopod, Doro, Fly, Garmin, GeeksPhone, GeneralMobile , Gigabyte, QTEK, T-Mobile, Haier, Huawei, K-Touch, Kyocera, Lanix, Lenovo, LG, Meizu, Micromax, Motorola, MyPhone, Navitel, Nokia, Pantech, Philips, SFR, Sagem, Samsung, Sanyo, Sharp , Sony (SonyEricsson), TomTom, Toshiba, Turkcell, Vertu, ViewSonic, Vodafone, ZTE.

According to the same source, Chinese replicas of mobile devices and memory card storage devices are added to the mentioned devices;

At the same time, the notebook provides that the application helps to identify the devices according to the front, physical dimensions, TAC, camera positioning and connectivity ports.

• Show and extract information about mobile device, make, model, IMEI. • Make copies in a variety of ways: logical, physical, file system, password extraction, screenshot via cables or a video camera. • Supports making copies for operating systems on devices: iOS, Android, BlackBerry, Symbian, Windows Mobile and Palm and Chinese replicas

The software will support 8700 profiled mobile devices for logical extraction and decoding and decode JTAG images for at least 130 specific devices.

• Supports JTAG decoding for the following manufacturers: HTC, Huawei, Casio, Kyocera, LG, Nokia, Pantech, Samsung, Sony, ZTE, Sanyo and Chinese replicas. • Supports extraction from mobile devices with MediaTek, Infineon and Spreadtrum chipsets. • Supports at least 2400 mobile device models for password / pin screen unlocking and / or security bypass functions applied to mobile devices. • Will have the ability to search for phones via TAC / IMEI and manually choose the make and model of the device; • Will have the ability to combine different extracts from the same phone with highlighting differences and the possibility to be included in a single report; • Will be able to create physical images with password bypass for Samsung Android mobile devices, including the following models: SM-N9009 Galaxy Note 3, SGH-T989 Gal axy S II, SGH-T989D Galaxy S II, SGH-i727 Galaxy S II Skyrocket, SM-G710 Galaxy Grand 2, SM-G7102 Galaxy Grand 2, SM- G7106 Galaxy Grand 2, GT-i9506 Galaxy S4, SM-N900V Galaxy Note 3, SM-P605V Galaxy Note 10.1, GT-i9506 Galaxy S4, SM-N900V Galaxy Note 3, SM-P605V Galaxy Note 10.1, SM-G870W Galaxy S5 Active, SM-G900P Galaxy S5, SM-G860P Galaxv S5 Sport, SM-N910V Galaxy Note 4, SM-N915P Galaxy Note Edge, SM-G901F Galaxy S5 Plus, GT-I5700 Galaxy Spica, SPH-M920 and Chinese replicas;

DNA requires that the software be able to make physical purchases / copies by password bypass (bypass) for Nokia Lumia Windows Phone 8 (Lumia 520, 820, 822, 920, 925, 1020, 1320). It will also have the ability to extract passwords from Nokia BBS devices, including the RAPUv21 chipset from the following devices: Asha 300 (RM-781), Asha 302 (RM-813), Asha 311 (RM-714), 700 Benji (RM -670), 603 (RM-779).

"The application will allow you to create clones for SIM / MicroSIM / NanoSIM and will support the ability to take screenshots and screenshots of your mobile device through a separate video camera dedicated to software; Analyze data extracted from mobile devices and export data computer: Decodes / converts geo-location information to be accessed directly from the software map It will decode and analyze phonebooks, SMS message list, MMS, Call log, Moreover, the system will be able to access the calendar, notes or applications installed in the phone ", provides the specifications.

The application exports the extracted data (phonebook, SMS message list, MMS, email, IM, calendar, call log, application data, photos, videos, music, sounds, data stored in the internet browser and other files) to proprietary format, in PDF, DOC / DOCX, XLS / XLSX and XML format with the possibility of filtering and selecting them.

Those targeted will be able to be tracked even if the system is offline for GPS, and the system will recover all hidden or deleted data, including messages, images or contacts.

For computers, the system recognizes and analyzes file systems, such as: FAT12, FAT16, FAT32, exFAT, NTFS, ReFS (Windows 8 and Server 2012), HFS, HFS +, Ext2FS, Ext3FS, Ext4FS, CDFS, ReiserFS 3, VxFS ; -Recognizes, analyzes and can decrypt disks with full encryption (WDE), such as: -AFF, PGP, Creditor, SafeBoot, JFS, VMWare, UFS1, Ultimaco Safeguard, Guardian, EFS, LVM, LVM2, AppleFileVault 1 and 2; -Recognizes, analyzes, and decrypts encrypted files, such as: - Bitlocker (Win Vista, 7.8), Checkpoint / PointSec R73 7.4.5, Checkpoint 7.6.150, McAfee Endpoint Encryption 5.x and 6.0, Safeguard Easy 4.40 .9 and Enterprise 5.40 and 5.50, etc .; -Index, process and analyze multiple file types with complex structures, such as: -email type containers: PST, OST, NSF, MSG, P7M, ICS, VCF, MBOX, EML, EMLX, TNEF, DBX, Bloomberg XML; -Archive files: 7Z, ZIP, TAR, GZ, BZ2, RAR, Z, CAB, ALZIP; -Office files: DOCX, DOCM, DOTX, DOTM, DOC, DOT, RTF, ODT, WPD, WPS, XLSX, XLSM, XLSB, XLAM, XLTX, XLTM, XLS, XLT, XLA, XLM, XLW, ODC, ODS , UXDC, DBF, PPTX, PPTM, PPSX, PPSM, POTX, POTM, PPT, PPS, POT, ODP; -The application interface allows the creation and application of advanced filters for automatic data classification; -The application natively supports the analysis of working memory (RAM) of systems investigated remotely or from images taken from them;

The Internet artifacts processing and analysis module also has an unallocated search and retrieval engine (carver functions) for web applications, such as: Facebook, Google Drive, Google Chat, Skype, Dropbox, Torrent, etc .; --The application has a module for generating and attaching to screenshots reports within the application; -The report generation module must be able to export the indicated data and create links within the report to them;

The value of the acquisitions amounts to over 2,536 million lei, ie 563,572 euros. The winning companies are: TREND IMPORT EXPORT. Mida Soft Business SRL, WEBSPOT SRL, PRO SYS SRL, Q-EAST SOFTWARE SRL

Information has appeared in the public space that the company Q-East Software SRL is owned by the president and vice president of the Chamber of Commerce and Industry Romania - Republic of Korea. The head of this organization, Marius Sticlaru, is a member of the Foundation of the National Defense College and a publicist for the "Intelligence" magazine, published by SRI, writes Jurnalul Naţional.

The company Pro Sys SRL, founded by Bărbieru Petrişor, former candidate for the Chamber of Deputies from PDL, sold Microsoft licenses in 2007 to the City Hall of Sector 3, led by Liviu Negoiţă, at ​​that time. According to the Ring newspaper, Pro Sys SRL has entered into a number of contracts with the state, including institutions built by PDL, such as the Ministry of Transport, MDRT, MFA, SGG, the Senate, the Institute for Advanced Technologies and institutions such as DNA. delivered listening equipment.

Webspot SRL is owned by spouses Liliana and Mircea Mitroi Nastea.

The distribution company IT&C Mida Soft Business, which is also active in the segment of providing IT services, last year registered a turnover of 51.2 million lei (11.5 million euros), increasing by 37% compared to of 2014, according to Ziarul Financiar. The company is owned by entrepreneurs Daniel Dumitru Moruz and Florentina Moruz. Mida Soft Business has a 10% stake in the evoMAG.ro online store.

Trend Import-Export is established in 19991, but since 2008 it has been dealing with software services. According to the press, Trend Import-Export works in the distribution and service areas with companies such as Cisco Systems, Linksys, Microsoft, Lenovo, Oracle, AVG and Hitachi. The shareholders of the company are Tudor Iliescu, Anghel Ilie and Ionasek Alexandru.

Read also: Trumpeter of the band Vunk, detained by DIICOT in a case of usury and money laundering Read also: EXPLOSION in a mall in Harghita: Three injured people and 20 children suffered panic attacks Read also: Inspectors who did DNA control, different reactions to Kovesi's criticisms. Inspector: "The chief prosecutor used an imperative, authoritarian and slightly threatening tone" Read also: INVESTIGATION after two students fought at the Economic College from BuzăuRead also: The weather will be generally beautiful. WEATHER FORECAST for Saturday and Sunday Read also: BREAKING NEWS | Toader: I will propose that the Judicial Inspection be at the Strategic Management Council, formed by the Minister of Justice Read also: Laura Codruţa Kovesi goes to the SCM to support her point of view regarding the control of the Judicial Inspection at DNA | LIVE VIDEO Read also: Kovesi presented in the SCM a TICKET belonging to the Judicial Inspection with numbers of files made by DNA: It was put in some documents that they probably got lost / The reaction of the Minister of Justice, Tudorel Toader