The Vendor is required to provide mobile device data extraction tool to enhance forensic investigations, ensuring secure, comprehensive data retrieval and analysis from iOS and Android devices.
- Requirement
• Access to encrypted or locked devices using advanced techniques, within legal boundaries.
• Compatibility with a broad range of mobile devices and operating system versions.
• Ability to extract data from apps, call logs, messages, contacts, multimedia, and system files.
• Ability to process search warrant returns from companies such as google, Facebook, etc.
• Retrieval of deleted and hidden data where feasible.
• Automated categorization of extracted data.
• Keyword searching, pattern recognition and timeline visualization.
• Advanced analytics for identifying relationships, geolocation data, and behavioral patterns.
• Customized and exportable reports (PDF, CCSV, etc.)
• Chain of custody documentation.
• Strong encryption for data storage and transmission.
• Audit trails for all actions performed within the software.
• Compliance with local and international data privacy regulations.
- Objectives
• Enable secure and legally compliant extraction and analysis of mobile device data.
• Minimize device processing times while maintaining data integrity.
• Provide comprehensive training, certifications, and support to ensure optimal solution usage.
• Provide a fully functional mobile data extraction solution with all required components.
• Provide licensing details, including the duration and scope of license.
• Cross platform compatibility (windows, macos, etc.)
• Regular updates for device compatibility and software enhancements.
• Integrated capabilities with other forensic tools and capabilities and case management systems, such as gray-key and FTK imager.
- Security requirements
• Single sign on (SSO) using azure active directory
• User provisioning: system for cross-domain identity management (SCIM) provisioning is preferred but provider may disclose other methods such as SAML.
• Multifactor or two factor authentication for non-SSO accounts.
• Viable options include authenticator apps, time-based one-time passwords, and security keys.
• Configurable roles and permissions, such as system administrator, administrator, user, customer, etc. to permit least privilege permissions.
• Log user access, important data changes, and other security-related activity.
- Documentation
• Services workflow, file layouts, system technical specifications (e.g. Data transport mechanism requirements, port and firewall rules, secure networking requirements)
• Message details as applicable (e.g. Error handling, application alerts and notifications, filtering, throttling, queuing, transaction record retention period, and resending and republishing of messages)
• System monitoring and reporting (e.g. Exceptions, transaction processing, bandwidth requirements for x transaction volume).
• If the contractor does not have this documentation readily available, IT should provide in its bid the cost for professional services to create this documentation for cities use case.
• Documentation must be created for all interfaces and accurately reflect the production environment at go-live.
• After go-live, interface documentation must be updated anytime interfaces are modified.
Set up free email alerts and get notified when new government bids, tenders and procurement opportunities match your industry and location. Choose daily or weekly delivery.