Our program and software are based on years of experience helping law enforcement agencies access digital devices. We have used our expertise in the field, to gather a robust knowledge base of the most commonly used pincodes/passcodes/patterns for digital devices. 


Agencies will learn cutting-edge techniques to locate pincodes, predict unknown pincodes and access locked devices.


This on-demand program will ensure law enforcement personnel are proficiently trained in and have access to:



The psychology behind why victims, witnesses & suspects choose their pincodes and passcodes.

How to brute force pincodes/passcodes from other devices and services that share commonality.

The most popular pincodes/passcodes used for different groups

The most popular passwords used for child exploitation

New exploits recently discovered for 2023-2024


How did you choose your pincode?


This is just the tip of the iceberg. Join this program today and access more locked devices faster than ever!

What to do with a pattern-locked phone? Celebrate!

Learn about the most popular used pattern locks and how and why people choose them.

Smudge Forensics


We do a deep dive into smudge forensics and how a dirty phone can be your best friend.

Commonality across platforms.


Humans are creatures of habit. Find the common denominator! One Ring to rule them all, One Ring to find them, One Ring to bring them all and in the darkness bind them.


Working on an After First Unlock acquisition from an iPhone 11, I looked at all his user names and passwords which were obtained and found commonalities. 

It turned out he had changed his iPhone from the 4 or 6 digit numeric code to a custom numeric code. He ended up using his five digit zip code.

Thanks again for the great training!

- Corporal Stephen L. Best


This detective was investigating an overdose, resulting in death, a case in which DATAPILOT assisted me with one of the phones belonging to the deceased. I was unsuccessful getting information from the device and the county was unable to break the encryption lock using other brute force tools. A DATAPILOT representative was in the office conducting a training for our detectives and when he concluded the training, we did an acquisition of evidence off one of the two phones we had on this case. I informed him of the problem on the second phone as we could not retrieve any evidence due to the lock.  He alluded to a "pins and passcodes" class and went over the basic ideas of the class. That majority of the time if you know a bit about your suspect, you can make an informed "guess" on the pin. He gave examples of birthdates, numbers in their address, special dates like kids' or family members' birthdays or sometimes as easy as 0000 or 1234. It took me about 10 minutes, but the pin ended up being a combination of the victim's birthday year and month. The phone, a TCL (burner phone), was unlocked and we were able to pull a full acquisition of evidence and I was able to get the data I needed. Without his assistance I may not have obtained that information.


- Det. Joe Malone

Want More Information?


Enroll Today, or enter your email below and a representative will contact you shortly.