Apple’s iPhone is one of the most advanced mobile phone handsets available today. iPhones are pretty well locked down by design, which can make data recovery difficult, and in some cases impossible. There are however a number of scenarios where recovery is possible.
CDecoded data: Call logs, Voicemails, Contact lists, Locations (WiFi, cell towers and GPS fixes), Images, Video files, Text messages (SMS), MMS,
Emails, Notes, Installed applications and their usage, User dictionary, Calendar, Bluetooth devices pairing history, Maps cache
Applications: Skype, Whatsapp, Viber, Fring, MotionX, AIM, TigerText, Facebook Messenger, Twitterrific, Textfree, Google+, Facebook, Foursquare, Garmin, TomTom, Waze, TextNow, Dropbox, Yahoo Messenger, Ping Chat, Twitter, Touch (new ping chat), Find My iPhone, LinkedIn, iCQ, Kik Messenger, Google Maps, Kakaotalk, QIP, Evernote, Vkontakte, Mail.ru
Internet browser data: Safari, Opera Mini – bookmarks, history and cookies
Did you accidentally delete SMS/Files or format the SD card on your Android phone without having any back up? Our data recovery center guarantees that this Android file recovery will be able to not only recover photos and videos that were made by your Android phone but also recover SMS, phone log, WhatsApp messages , music, mail, archives, and other files that were saved on the SD card of your Android phone and all without losing any quality.
Physical extraction method from more than 200 locked Android based devices bypassing any type of lock (Pattern/PIN/Password) – enabling a forensically sound extraction process. Physical extraction from these devices can be done, regardless of their OS version, and does not require temporary rooting. We can disable pattern/PIN/password locks on selected Samsung Android devices.
Physical extraction and advanced decoding, via USB debugging, for ALL Android OS versions including Android 4.X (Ice Cream Sandwich). Physical extraction for any locked device is only available if the USB debugging has been switched on.
Acquire apps data from Android devices via logical extraction using UFED:
Facebook, Facebook Messenger, Google+, PingChat! (aka Touch), Skype, Twitter, Viber, Yahoo Messenger, Whatsapp, TigerText, Dropbox, QIP, Kik Messenger, Evernote, Kakao Talk, ICQ, Vkontakte and more
Decoding of data: Call logs, Contacts, Email, Pattern lock revealing from a full flash image, Bookmarks, Cookies, SMS/MMS, Chat, Locations, Web history, Images, Videos & audio files, Text files, Deleted data, Wi-Fi, Bluetooth, Geotag information
Decoding of smartphone applications: Kik, Kakaotalk, QIP, Evernote, New Viber, ICQ, Mail.ru, VKontakte
Decoding of application files: Executable files (*.exe, JAR files, Java Archive), The Android application package files (APK) and more
WhatsApp Messenger is a smart phone messenger and is one of the most popular android apps among the youth. This application is used for exchanging messages, pictures and much more at no cost. This application works with your 3G or Wi-Fi internet connection but doesn’t charge anything for sending audio, video, text messages or pictures etc.
Most people believe that once the delete button on a mobile telephone has been pressed, that the message from WhatsApp has gone forever – this is not the case.
Mentari Setia can help you to retrieve WhatsApp conversation, voice messages and photo transferred even its deleted.
any applications with chatting ability are available for the iPhone users. According to a recent survey, we can notice that WhatsApp is no doubt on the top list of must-have mobile messaging app for iPhone users.
Deleting messages from WhatsApp on iPhone by accident could happen to anyone. Meanwhile, you may have lost WhatsApp chats after iPhone factory settings restore, jailbreak, iOS update, damage,
iPhone stuck in recovery mode, and more other scenarios. The great thing is that you can restore deleted, lost iPhone WhatsApp Chats without backup, or from iTunes backup.
Mentari Setia available to recover deleted WhatsApp from any Apple devices running any iOS version! We enables forensically sound data extraction, decoding and analysis techniques to obtain existing and deleted data from these devices.
iOS Devices: iPhone 2G,iPhone 3G, iPhone 3GS, iPhone 4, iPhone 4S, iPhone 5,iPod Touch 1G, iPod Touch 2G, iPod Touch 3G, iPod Touch 4G, iPod Touch 5G, iPad Mini, iPad 1, iPad 2, iPad3, iPad 4
Mentari Setia is the first company in the mobile forensic industry to enable physical extraction and decoding from BlackBerry devices running OS 4, 5, 6 and 7.
Advanced Blackberry decoding of existing and deleted data
Toyota Land Cruiser 200 VIP version Armored in B6 class according to the CEN standards
This is prepared with the best quality materials and fabricated by skilled technicians.
This protection is to European B6 level and is certified to defeat the following ammunition:
7.62 x 51 RG L2A2 at 843 m/s 7.62 x 39 PS 1943 ball at 709 m/s 5.56 x 45 RG L2A2 at 931 m/s FNB SS109 at 942 m/s and lesser threats
Armouring: Sides – plates thickness 6 mm ARMOX T 500/5 mm ARMOX T 600 Floor – plates thickness 4 mm ARMOX T 500 – protection against two DM51 hand grenades Roof – plates thickness 4 mm ARMOX T 500 Glass – thickness 38 mm
Multi-Layer-Application tactical system that interrogates and identifies any GSM/UMTS mobile handset from the air.
Product versions:
All versions available in various modes of operation:
Operational Applications:
Operational benefits:
Can be connected to:
Our products for Law Enforcement
Simple stand-alone single-line „personal recorder”. Can be connected to:
Market: Law Enforcement
Requirements/applications:
Multi-channel call recorder. Can be connected to:
All recordings are stored on internal HDD or NAS. Max. 32 channels/PC
Multi-channel call recorder. Can be connected to:
Standard analogue telephone lines
Radiotelephones
Digital PBX telephone lines
ISDN (E1/30B+D or U/S0/2B+D) lines
VoIP
All recordings are stored on internal HDD or NAS. Max. 512 channels/PC.
Audio recording may be used in the court as evidence, but sometime the recording may have loud background noise that cause the recording to be useless.
At Mentari Setia, we have specialist for audio enhancement. His job is to remove static background noise and improve overall audio clarity and intelligibility.
The purpose of the mobile jammer is to ensure protection against radio-controlled bombs. It can protect single or group moving objects, groups of people, cars and/or other small area targets the security of the working personnel is guaranteed according to the standards BDS17137-90, European Union standard SAR and the NATO standard STANAG 2345
The purpose of portable jammer is to ensure protection against radio-controlled bomb. It can protect single or group moving objects, groups of people, cars or any other small object
List of jammed devices
The purpose of Manpack Jammer is to ensure protection against radio-controlled bomb. It can protect single or group moving objects, groups of people, cars or any other small object
<p>Passwords can be forgotten through lack of use or from auto generated changes. Or they can simply cease to work for no apparent reason. This may prohibit the user from using the computer, but in other cases it may require thousands of password protected files to be deleted if the overriding password cannot be determined. Where special encryption has also been involved, the task becomes even more difficult.
we are experts at cracking password protected files and systems. Using our extensive library of software, techniques and cracking resources we may be a critical resource when crucial files are encrypted. We can also perform security analysis and provide un-crackable encryption software and state of the art firewalls and network security software for those who value privacy and want to be sure their data is secure.</p>
Audio Forensics / Voice Investigation / Voice Forensics is the field of forensic science relating to the acquisition, analysis, and evaluation of sound recordings that may ultimately be presented as admissible evidence in a court of law or some other official venue
The primary aspects of audio forensics are:
As an Audio Forensic Expert and Expert Witness, Mentari Setia has analyzed hundreds of audio recordings for authentication, clarification and voice identification in both analogue and digital formats.
The following list describes types of forensic services Mentari Setia offer as an expert witness:
Disk cloning is the process of copying the contents of one computer hard disk to another disk or to an “image” file. This may be done straight from one disk to another, but more often, the contents of the first disk are written to an image file as an intermediate step, then the second disk is loaded with the contents of the image. Typically, this is done for archiving purposes, to restore lost or damaged data, or to move wanted data into a new disk, though other reasons also exist.
Unlike standard copying functions, disk cloning involves copying hidden and in-use files, and thus presents special challenges, as those types of files are typically not available for copying. Additional complications arise when the process is used for networked computers, as the network must be able to distinguish between different computers.
Anti Forensics</b> is simply a breaking tool and a growing methods and collection of tools used to prevent or against the application of science to those criminal and civil laws that are enforced by criminal justice system
Goals of Anti-Forensics: