{"id":2748,"date":"2017-05-24T16:31:56","date_gmt":"2017-05-24T20:31:56","guid":{"rendered":"https:\/\/www.digitalforensicscorp.com\/blog\/?p=2748"},"modified":"2024-12-11T18:36:59","modified_gmt":"2024-12-11T18:36:59","slug":"sim-cards-forensic-analysis-with-oxygen-software","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/software\/sim-cards-forensic-analysis-with-oxygen-software\/","title":{"rendered":"SIM Card Forensic Examination with Oxygen Software"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-sim-card-data-and-its-importance-in-mobile-forensics\"><span class=\"ez-toc-section\" id=\"SIM_Card_Data_and_Its_Importance_in_Mobile_Forensics\"><\/span>SIM Card Data and Its Importance in Mobile Forensics<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n<p>The main function of the SIM card is the identification of a cellular network user so they can access mobile services, and this information often becomes relevant in <a href=\"https:\/\/www.digitalforensics.com\/digital-forensics\/cell-phone-forensics\">mobile forensics<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p><!--more--><\/p>\n<p>The following types of data can be found in the SIM card, which are of interest to the expert or investigator:<\/p>\n<ul>\n<li>information related to the services provided by the mobile operator;<\/li>\n<li>Phonebook, calls;<\/li>\n<li>Messages;<\/li>\n<li>Locations<\/li>\n<\/ul>\n<p>Initially, SIM cards were almost the only source of data about the contacts of the owner of the mobile device. Information about calls and messages could only detect the phone book in their memory. Subsequently, the storage of this data was moved to the memory of mobile devices and SIM cards began to be used only to identify subscribers in cellular networks. That&#8217;s why some of the developers of forensic solutions, for the study of mobile devices, refused to implement the functionality for the study of SIM cards in their products. However, today users use a lot of cheap phones (often we call them &#8220;Chinese phones&#8221;), with a limited amount of memory. In such phones, a part of the owner&#8217;s data is stored in SIM cards. Therefore, forensic research of SIM cards continues to remain relevant.<\/p>\n<p>A SIM card is an ordinary smart card. It contains the following main components:<\/p>\n<ul>\n<li>processor;<\/li>\n<li>RAM;<\/li>\n<li>ROM;<\/li>\n<li>EEPROM;<\/li>\n<li>a file system;<\/li>\n<li>a controller I\/O.<\/li>\n<\/ul>\n<p>In practice, there are SIM cards with both eight and six contacts on contact pads. This happens because the two contacts are not directly involved in working with the phone (smartphone). And their absence leads to a decrease in the size of the area occupied by the SIM card, when it is placed in a mobile device.<\/p>\n<p>SIM cards can use three supply voltages (Vcc): 5V, 3.3V, 1.8V. Each card has a certain supply voltage.<\/p>\n<p>In the SIM cards is implemented protection against overvoltage. Therefore, if you install a SIM card that supports a 3.3V power supply in a card reader that can only work with a 5V supply voltage (old models), then the information or the card itself will not be damaged, but it will be impossible to work with such a card . At the same time, the expert will feel that the SIM card in question is faulty. Although in fact, this is not so.<\/p>\n<p>Before extracting data from the mobile device, itself, where a SIM card is installed, it is not practical to conduct forensic research. Since, when the SIM card is removed, the user data stored in the memory of the mobile device can be deleted.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Forensic_Analysis_of_SIM_Cards_Using_Oxygen_Software\"><\/span>Forensic Analysis of SIM Cards Using Oxygen Software<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>For analysis, the SIM card must be removed from the mobile device and connected to the expert&#8217;s computer, using special equipment &#8211; a card reader.<\/p>\n<p>You can develop the basic requirements for a card reader based on the above information about SIM cards, which will be comfortable for the expert to work with during forensic studies of SIM cards.<\/p>\n<p>1) The card reader must support smart cards having supply voltages: 5V, 3.3V, 1.8V.<\/p>\n<p>2) The card reader must support smart cards with eight and six pins on the site.<\/p>\n<p>3) The card reader must support the &#8216;Microsoft PC \/ SC&#8217; protocol. Drivers for such devices are included in all versions of the operating systems of the &#8216;Wind\u043ews&#8217; family. Therefore, to interface such devices with an expert computer, additional drivers will not be needed.<\/p>\n<p>An example of such a card reagent is shown in FIG. 1<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2746 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/05\/Fig001-3.png\" alt=\"\" width=\"1800\" height=\"797\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig001-3.png 1800w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig001-3-300x133.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig001-3-768x340.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig001-3-1024x453.png 1024w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig001-3-1536x680.png 1536w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig001-3-512x227.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig001-3-920x407.png 920w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig001-3-1600x708.png 1600w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig001-3-16x7.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig001-3-32x14.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig001-3-28x12.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig001-3-56x25.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig001-3-64x28.png 64w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig001-3-1000x443.png 1000w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig001-3-1200x531.png 1200w\" sizes=\"auto, (max-width: 1800px) 100vw, 1800px\" \/><\/p>\n<p style=\"text-align: center;\">Figure 1. SIM reader from ASR, model &#8220;ACR38T&#8221;.<\/p>\n<p>&nbsp;<\/p>\n<p>Despite the fact that there are card readers designed to read directly from SIM cards, you can use card readers designed to work with cards of standard size (having the size of a bank card). For comfortable work with such devices a card-blank is used, on which, with the aid of pieces of adhesive tape, the SIM card is attached.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2747 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/05\/Fig002-2.png\" alt=\"\" width=\"1375\" height=\"949\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig002-2.png 1375w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig002-2-300x207.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig002-2-768x530.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig002-2-1024x707.png 1024w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig002-2-512x353.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig002-2-920x635.png 920w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig002-2-16x11.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig002-2-32x22.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig002-2-28x19.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig002-2-56x39.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig002-2-64x44.png 64w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig002-2-1000x690.png 1000w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig002-2-1200x828.png 1200w\" sizes=\"auto, (max-width: 1375px) 100vw, 1375px\" \/><\/p>\n<p style=\"text-align: center;\">Figure 2. Appearance of the card-blank with the SIM card on it.<\/p>\n<p>&nbsp;<\/p>\n<p>In order to investigate the SIM card, it is necessary to remove it from the mobile device. Install in a SIM card reader that connects to an expert computer. As mentioned earlier, the drivers for the &#8216;Microsoft PC \/ SC&#8217; devices are part of the Windows&#8217; family and therefore do not require an additional installation.<\/p>\n<p>In Oxygen Software, click the &#8216;Connect device&#8217; button located on the toolbar. This will launch Oxygen Software Extractor.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2740 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/05\/Fig003-3.png\" alt=\"\" width=\"660\" height=\"453\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig003-3.png 660w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig003-3-300x206.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig003-3-512x351.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig003-3-16x11.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig003-3-32x22.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig003-3-28x19.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig003-3-56x38.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig003-3-64x44.png 64w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/p>\n<p style=\"text-align: center;\">Figure 3. The main window &#8216;Oxygen Software Extractor&#8217;.<\/p>\n<p>In the main menu of Oxygen Software Extractor, click on the &#8216;UICC acquisition&#8217; option. The next window will prompt you to select the connected card reader, or an error message is displayed.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2741 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/05\/Fig004-3.png\" alt=\"\" width=\"663\" height=\"454\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig004-3.png 663w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig004-3-300x205.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig004-3-512x351.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig004-3-16x11.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig004-3-32x22.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig004-3-28x19.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig004-3-56x38.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig004-3-64x44.png 64w\" sizes=\"auto, (max-width: 663px) 100vw, 663px\" \/><\/p>\n<p style=\"text-align: center;\">Figure 4. A card reader connection error message.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2742 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/05\/Fig005-2.png\" alt=\"\" width=\"661\" height=\"453\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig005-2.png 661w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig005-2-300x206.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig005-2-512x351.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig005-2-16x11.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig005-2-32x22.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig005-2-28x19.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig005-2-56x38.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig005-2-64x44.png 64w\" sizes=\"auto, (max-width: 661px) 100vw, 661px\" \/><\/p>\n<p style=\"text-align: center;\">Figure 5. The card reader selection window.<\/p>\n<p>If access to SIM card data is locked to PIN or PUK code, you will be prompted to enter the appropriate code. The number of available attempts to enter PIN and PUK codes is displayed in the program. If attempts to unlock the SIM card have not previously been applied, 3 attempts to enter the PIN code and 10 attempts to enter the PUK code are available for entering the codes. After 10 incorrect attempts to enter PUK code, the card is permanently blocked. The PUK code can be obtained from the communication operator by a person having the appropriate authority.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2743 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/05\/Fig006-2.png\" alt=\"\" width=\"665\" height=\"455\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig006-2.png 665w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig006-2-300x205.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig006-2-512x350.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig006-2-16x11.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig006-2-32x22.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig006-2-28x19.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig006-2-56x38.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig006-2-64x44.png 64w\" sizes=\"auto, (max-width: 665px) 100vw, 665px\" \/><\/p>\n<p style=\"text-align: center;\">Figure 6. The SIM card data extraction window.<\/p>\n<p>The SIM card data extraction window displays:<\/p>\n<ul>\n<li>information about the card reader;<\/li>\n<li>information about the SIM card;<\/li>\n<li>PIN and PUK code entry fields.<\/li>\n<\/ul>\n<p>Enter the SIM card unlock code and click the &#8216;Next&#8217; button.<\/p>\n<p>In the next window, you can specify additional information about the extracted output that will be stored in the file. Also, in this window, you can select the options to save the extracted data from the device:<\/p>\n<p>The option &#8216;Stored extended physical dump of backup in the device image &#8230;&#8217; saves the main files from the SIM card.<\/p>\n<p>Option &#8216;Complete UICC image.&#8217; Saves all files from the SIM card. If you select this option, the process of extracting files from the SIM card can take more than 12 hours.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2744 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/05\/Fig007-2.png\" alt=\"\" width=\"661\" height=\"454\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig007-2.png 661w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig007-2-300x206.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig007-2-512x352.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig007-2-16x11.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig007-2-32x22.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig007-2-28x19.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig007-2-56x38.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig007-2-64x44.png 64w\" sizes=\"auto, (max-width: 661px) 100vw, 661px\" \/><\/p>\n<p style=\"text-align: center;\">Figure 7. The window for entering additional information about the case.<\/p>\n<p>Click the &#8216;Next&#8217; button. The process of extracting data from the SIM card under investigation will start.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2745 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/05\/Fig008-2.png\" alt=\"\" width=\"658\" height=\"454\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig008-2.png 658w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig008-2-300x207.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig008-2-512x353.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig008-2-16x11.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig008-2-32x22.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig008-2-28x19.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig008-2-56x39.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig008-2-64x44.png 64w\" sizes=\"auto, (max-width: 658px) 100vw, 658px\" \/><\/p>\n<p style=\"text-align: center;\">Figure 8. Displaying the process of retrieving data.<\/p>\n<p>The following data can be extracted from the SIM card, including deleted ones:<\/p>\n<ul>\n<li>Device Information of the SIM card;<\/li>\n<li>Contacts;<\/li>\n<li>Calls;<\/li>\n<li>Messages;<\/li>\n<li>other information.<\/li>\n<\/ul>\n<p>At the end of the extraction, the created case can be opened in the program Oxygen Software.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span><strong>Conclusion<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The basics of SIM cards forensics of analysis are discussed in the article. An example of extracting data from a SIM card using Oxygen Software is given.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Authors\"><\/span>Authors:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><a href=\"https:\/\/linkedin.com\/in\/igormikhaylovcf\">Igor Mikhaylov<\/a> &amp; <a href=\"https:\/\/linkedin.com\/in\/oleg-skulkin\">Oleg Skulkin<\/a><\/p>","protected":false},"excerpt":{"rendered":"SIM Card Data and Its Importance in Mobile Forensics The main function of the SIM card is the&hellip;","protected":false},"author":126,"featured_media":2739,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[6],"tags":[],"class_list":{"0":"post-2748","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-software","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SIM cards Forensic Analysis with Oxygen Software<\/title>\n<meta name=\"description\" content=\"Learn how to perform SIM card forensic analysis using Oxygen Software. Explore recoverable data types, card reader requirements, voltage support, and key forensic artifacts.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/software\/sim-cards-forensic-analysis-with-oxygen-software\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SIM Card Forensic Examination with Oxygen Software\" \/>\n<meta property=\"og:description\" content=\"Learn how to perform SIM card forensic analysis using Oxygen Software. Explore recoverable data types, card reader requirements, voltage support, and key forensic artifacts.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/software\/sim-cards-forensic-analysis-with-oxygen-software\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-24T20:31:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-11T18:36:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig000.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"562\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Viktor Sobiecki\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Viktor Sobiecki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/sim-cards-forensic-analysis-with-oxygen-software\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/sim-cards-forensic-analysis-with-oxygen-software\\\/\"},\"author\":{\"name\":\"Viktor Sobiecki\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\"},\"headline\":\"SIM Card Forensic Examination with Oxygen Software\",\"datePublished\":\"2017-05-24T20:31:56+00:00\",\"dateModified\":\"2024-12-11T18:36:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/sim-cards-forensic-analysis-with-oxygen-software\\\/\"},\"wordCount\":1133,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/sim-cards-forensic-analysis-with-oxygen-software\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/Fig000.jpg\",\"articleSection\":[\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/sim-cards-forensic-analysis-with-oxygen-software\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/sim-cards-forensic-analysis-with-oxygen-software\\\/\",\"name\":\"SIM cards Forensic Analysis with Oxygen Software\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/sim-cards-forensic-analysis-with-oxygen-software\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/sim-cards-forensic-analysis-with-oxygen-software\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/Fig000.jpg\",\"datePublished\":\"2017-05-24T20:31:56+00:00\",\"dateModified\":\"2024-12-11T18:36:59+00:00\",\"description\":\"Learn how to perform SIM card forensic analysis using Oxygen Software. Explore recoverable data types, card reader requirements, voltage support, and key forensic artifacts.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/sim-cards-forensic-analysis-with-oxygen-software\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/sim-cards-forensic-analysis-with-oxygen-software\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/sim-cards-forensic-analysis-with-oxygen-software\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/Fig000.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/Fig000.jpg\",\"width\":960,\"height\":562},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/sim-cards-forensic-analysis-with-oxygen-software\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"SIM Card Forensic Examination with Oxygen Software\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\",\"name\":\"Viktor Sobiecki\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"caption\":\"Viktor Sobiecki\"},\"description\":\"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.\",\"sameAs\":[\"https:\\\/\\\/www.digitalforensics.com\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/viktor-sobiecki\\\/\"],\"honorificPrefix\":\"Dr\",\"jobTitle\":\"Chief Technology Officer (CTO)\",\"worksFor\":\"Digital Forensics Corporation\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/visor\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SIM cards Forensic Analysis with Oxygen Software","description":"Learn how to perform SIM card forensic analysis using Oxygen Software. Explore recoverable data types, card reader requirements, voltage support, and key forensic artifacts.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/software\/sim-cards-forensic-analysis-with-oxygen-software\/","og_locale":"en_US","og_type":"article","og_title":"SIM Card Forensic Examination with Oxygen Software","og_description":"Learn how to perform SIM card forensic analysis using Oxygen Software. Explore recoverable data types, card reader requirements, voltage support, and key forensic artifacts.","og_url":"https:\/\/www.digitalforensics.com\/blog\/software\/sim-cards-forensic-analysis-with-oxygen-software\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2017-05-24T20:31:56+00:00","article_modified_time":"2024-12-11T18:36:59+00:00","og_image":[{"width":960,"height":562,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig000.jpg","type":"image\/jpeg"}],"author":"Viktor Sobiecki","twitter_card":"summary_large_image","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Viktor Sobiecki","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/sim-cards-forensic-analysis-with-oxygen-software\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/sim-cards-forensic-analysis-with-oxygen-software\/"},"author":{"name":"Viktor Sobiecki","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce"},"headline":"SIM Card Forensic Examination with Oxygen Software","datePublished":"2017-05-24T20:31:56+00:00","dateModified":"2024-12-11T18:36:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/sim-cards-forensic-analysis-with-oxygen-software\/"},"wordCount":1133,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/sim-cards-forensic-analysis-with-oxygen-software\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig000.jpg","articleSection":["Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/sim-cards-forensic-analysis-with-oxygen-software\/","url":"https:\/\/www.digitalforensics.com\/blog\/software\/sim-cards-forensic-analysis-with-oxygen-software\/","name":"SIM cards Forensic Analysis with Oxygen Software","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/sim-cards-forensic-analysis-with-oxygen-software\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/sim-cards-forensic-analysis-with-oxygen-software\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig000.jpg","datePublished":"2017-05-24T20:31:56+00:00","dateModified":"2024-12-11T18:36:59+00:00","description":"Learn how to perform SIM card forensic analysis using Oxygen Software. Explore recoverable data types, card reader requirements, voltage support, and key forensic artifacts.","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/sim-cards-forensic-analysis-with-oxygen-software\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/software\/sim-cards-forensic-analysis-with-oxygen-software\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/sim-cards-forensic-analysis-with-oxygen-software\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig000.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/05\/Fig000.jpg","width":960,"height":562},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/sim-cards-forensic-analysis-with-oxygen-software\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims","item":"https:\/\/www.digitalforensics.com\/blog\/software\/"},{"@type":"ListItem","position":3,"name":"SIM Card Forensic Examination with Oxygen Software"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce","name":"Viktor Sobiecki","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","caption":"Viktor Sobiecki"},"description":"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.","sameAs":["https:\/\/www.digitalforensics.com\/","https:\/\/www.linkedin.com\/in\/viktor-sobiecki\/"],"honorificPrefix":"Dr","jobTitle":"Chief Technology Officer (CTO)","worksFor":"Digital Forensics Corporation","url":"https:\/\/www.digitalforensics.com\/blog\/author\/visor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/2748","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/126"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=2748"}],"version-history":[{"count":5,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/2748\/revisions"}],"predecessor-version":[{"id":16015,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/2748\/revisions\/16015"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/2739"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=2748"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=2748"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=2748"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}