Android TeleGuard is a messaging app developed by Swisscows with a
strong focus on user privacy. According to its developers, the app
stores chats on the server only until they are delivered and does not
share data with third parties. All communications through the app are
end-to-end encrypted. TeleGuard is a cross-platform application
available for Android, iOS, and Windows operating systems.
Since the app deletes all chats after they are delivered, the only way
to retrieve the data is by extracting it from the device where the
communication took place. This significantly raises the forensic value
of the artifacts left behind by Android TeleGuard. As shown below, the
extracted data may contain important information that can help
investigators gather details about the communications of suspicious
individuals.
Android TeleGuard artifact can be found at the following locations:
*/data/ch.swisscows.messenger.teleguardapp/app_flutter/teleguard_database.db
*/data/ch.swisscows.messenger.teleguardapp/app_flutter/teleguard_temp.db
*/data/ch.swisscows.messenger.teleguardapp/databases/download_tasks.db
This section will discuss how to use ArtiFast to extract Android
TeleGuard artifacts from Android machines’ files and what kind of
digital forensics insights we can gain from the artifact.
After you have created your case and added evidence for the
investigation, at the Artifact Selection phase, you can select Android
TeleGuard artifact parser:
Once ArtiFast parsers plugins complete processing the artifact for analysis, it can be reviewed via “Artifact View” or “Timeline View,” with indexing, filtering, and searching capabilities. Below is a detailed description of Android TeleGuard artifacts in ArtiFast.
Android Teleguard Messages
Android Teleguard Posts
Android Teleguard Contacts
Android Teleguard Channels
Android Teleguard Download Tasks
Android Teleguard Draft Messages
Android Teleguard Media
Android Teleguard Calls
For more information or suggestions please contact: kalthoum.karkazan@forensafe.com