New Broad Consent Feature for Magnet GRAYKEY

Digital forensic professionals and Android users know the Android smartphone market is extremely fragmented. Broad Consent is the first step of many towards a future where we can provide users with more access to Android devices.

Fighting CSAM With Magnet GRAYKEY

Magnet GRAYKEY has entered the fight to provide lawful access to mobile devices so examiners and investigators can extract the critical evidence they need to solve CSAM cases.

How To Become A Mobile Forensics Investigator

Today’s criminal investigations often rely on digital evidence residing on mobile devices. During investigations, it’s the mobile forensics investigator’s responsibility to extract and collect that digital evidence. There’s no one “right path” to becoming a mobile forensics investigator.

Comparing logical extraction vs file system extraction

Law Enforcement agencies perform logical acquisitions of unlocked iOS devices when they do not have access to Magnet GRAYKEY. The logical acquisition has been an industry-leading iOS acquisition method used by investigators and forensic examiners because of its simplicity and level of support. However, device security is one of the biggest roadblocks to completing logical acquisitions. For a logical acquisition to take place, device access needs to be granted using a passcode, and a trusted connection is required in most instances.  

Take a Stand Against CSAM

Magnet Forensics is a proud partner and supporter of the Child Rescue Coalition (CRC). The CRC is “a nonprofit organization that rescues children from sexual abuse by building technology for law enforcement, free of charge, to track, arrest, and prosecute child predators.”

What Is ICAC And How Does It Work?

For those unfamiliar, according to, the Internet Crimes Against Children (ICAC) Task Force Program “is a national network of 61 coordinated task forces, representing more than 5,400 federal, state, and local law enforcement dedicated to investigating, prosecuting, and developing effective responses to internet crimes against children.”