Law Enforcement, Forensics and Mobile Communications
|
|
|
- Adrian Wilson
- 10 years ago
- Views:
Transcription
1 Law Enforcement, Forensics and Mobile Communications Vanessa Gratzer 1 et David Naccache 2 1 Université Paris ii Panthéon-Assas Hall Goullencourt, casier place du Panthéon, f Paris cedex 05 [email protected] 2 École Normale Supérieure Équipe de Cryptographie 45 rue d Ulm, f Paris cedex 05 [email protected] Résumé By the end of 2007, the gsm Association reported that over 740 networks in more than 219 countries were serving more than 2.6 billion users [1]. This extraordinary development of inexpensive and flexible mobile communications is also a source of new security challenges. This paper briefly lists the forensic challenges raised by handsets and overviews the handset analysis techniques used (or usable) by law enforcement officers in the course of criminal investigations. 1 Introduction According to the gsm Association [1], by the end of 2007, 2.6 billion individuals were using gsm phones. This pervasive availability of mobile communications is the source of new security challenges. This paper overviews the handset-related methods usable by law enforcement agencies for gathering evidence during criminal investigations. 2 Handset Types Handsets feature various degrees of complexity and a high variance in functionalities. The simplest phones (that we term Basic) are designed to fulfill the minimal functionality one can expect from a handset : send a receive calls. Intermediate phones usually feature a color screen, a digital camera and a wap browser. Smart phones and pdas would usually be capable of performing advanced operations such as exchange or agenda synchronization. According to Gartner Dataquest, in 2004 the 1.2 billion handsets in use broke-down into 72% intermediate phones, 22% basic phones and 5% smart phones. 3 Wording the Warrant Handset analysis warrants should request at least the following information elements :
2 2 Actes du symposium SSTIC08 User data : phone directory, incoming/outgoing/lost calls, sms, wap bookmarks, mms, images, movies, agenda, mail and documents. Operator data : imsi (International Mobile Subscriber Identity), last Kc, network priority and restrictions, geographic data (last base station) sms and wap parameters. Handset data : imei (International Mobile Subscriber Identity) and an indication of active internal parameters. Namely, the assignment should allow the expert to extract from the sim, the handset and the network the following data elements : sim data elements : Phase (phase id), sst (sim service table), iccid (smart card serial number), lp (language preference), spn (telecom operator s name), msisdn (the subscriber s phone number), and (short dial number), fdn (fixed dialing numbers), lnd (last dialed numbers, usually limited to ten), ext1, ext2 (dialing extensions), gid1, gid2 (groups), sms (text messages), smsp (text message parameters), smss Text message Status, cbmi (preferred network messages), puct (charges per unit), acm charge counter, acmmax (charge limit), hplmnsp (hplmn search period), plmnsel (plmn selector), fplmn (forbidden plmns), ccp (capability configuration parameter), acc (access control class), imsi (sim s identity number) loci (location information), bcch (broadcast control channels), Kc (voice encryption sessionkey), puk (pin unlocking code, extractable only invasively from the sim). Handset data elements : imei (handset identity number, usually appearing inside the phone or by dialing *#06#), short dial numbers, sms, language, time, date, ring tone and volume settings, stored audio and video recordings, stored images, stored documents, logged incoming, missed or dialled numbers, stored executable programmes and applets (added by the user), stored calendar events, gprs, wap and Internet settings. Network subscriber database elements : Customer names and address, billing name and address, user name and address, billing account details, msisdn (the subscriber s phone number), imsi (sim s identity number), the sim s serial number, puk, pin, services allowed. Network Call Data Record (cdr) database elements : originating and terminating msisdns and imeis, duration, type of service, initial serving base station. Finally, the assignment should instruct the expert to intersect these elements between seizures in order to shed light on connections between individuals, dates and events. 4 Seizure Protection To avoid annulment risks, seizures should be properly conditioned by police officers. We recommend the following guidelines : sim pins : Forensic experts frequently receive blocked sim cards due to three consecutive false pin presentations. No matter how important the case is, police personnel should avoid experimenting random pins (the probability of a random pin being correct is around 0.3%). Instead, during primary interrogation, police officers should systematically ask suspects to : Disclose their pin codes (never let a suspect re-manipulate his mobile phone). Write-down the operator s name (to avoid confusion between sims in case the suspect has several handsets, a very frequent case as shown below). Declare if, to the suspect s best knowledge : 1. He still has the papers received when the subscription was opened The subscription has expired or is inactive. 3. The sim or 3 in these papers the investigator should be able to find the sim s puk code
3 Actes du symposium SSTIC08 3 Fig. 1: sims in French Evidence Bag handset is dysfunctional (this declaration is important to avoid later evidence destruction claims). Handset : By opposition to practitioners who recommend to turn the handset off and place it in an exhibit bag, we recommend the following : If the suspect s handset implements secret modes 4 or secret-code containers 5 ask the suspect to disclose their codes. If the telephone is an uncommon or foreign model, ask the suspect if he still has the handset s power supply (this can shorten analysis cycle-time, especially when dealing with asian phone brands such as dbtel for instance). Declare if the handset contains, to the suspect s best knowledge, s, photographs or documents and if the phone is capable of synchronizing with a pc agenda. If so, identify this pc. If the handset is switched-on record or photograph what is on the display. Place the handset in a rigid metal box with a power-supply cable passing through a tiny hole in the box. The box is assumed to fulfill two functions : 1. Act as a Faraday cage and 2. Prevent people from manipulating the phone s keyboard through the exhibit bag. Place the box in the exhibit bag and keep the device powered-on until handover to the forensic expert. If this is impossible use at least Paraben s Wireless StrongHold Bag. Cover the handset s infra-red and data ports with thin copper conductive foil tape 6 for extra security. If the handset is switched-off, extract the battery and seal it in a separate exhibit bag, place this first bag in a second one and add the handset into it. The goal of this packaging method is twofold : 1. Prevent people from switching on the phone through the bag and 2. Avoid battery misplacement, confusion or loss. If procedures allow, write the handset s imei on the exhibit bag. 5 Interception, Correlation, Bugging Interception is the tapping of a telecommunication that takes place between individuals. We refer the reader to http :// for a very rich repository on lawful interception technologies, standards and regulations. Beyond classic interception, law enforcement agencies frequently correlate network information. For instance, serial rapists are frequently identified by correlating two reappearances of a given sim 4 e.g. Sharp s v603sh 5 e.g. Sony Ericsson s s700i 6 only the top surface of this tape is conductive and it has a silicone based non-conductive adhesive
4 4 Actes du symposium SSTIC08 Fig. 2: Handset in French Evidence Bag in the vicinity of two consecutive crime scenes (a detail most rapists won t think of). Blackmailers sending threats from cybercafés are usually discovered by tracing back their s to a specific cybercafé and comparing the list of sim-cards present in the vicinity of the cybercafé with a potential list of suspects (e.g. list of competing brands employees). Similarly, credit card thieves are frequently identified by correlating the simultaneous appearance of a given sim and a credit-card purchase done at a specific time and place. The owners of anonymous payphone cards (bought without presenting an id at any grocery shop) are identified by correlating the usage of a given phone card in two public phone booths with the repeated appearance of a specific sim in the vicinity of theses booths. Tracking the repeated physical proximity of two non-communicating sims also helps re-construct the ring of relations of a given individual. It should be noted that more and more law offenders become well aware of theses risks. For instance, on February 23, 2005 The Times reported the story of a couple, David and Jennifer, who was going through a bitter divorce. Jennifer complained that David had sent her death threats and showed the messages to the police. In reality, she plotted against her husband by driving six miles to her husband s new home, put his old sim card in her second phone and then made the threatening calls to her own phone. Fortunately, a deep enquiry found that the calls had been made on Jennifer s handset 7. Bugging consists in transforming the handset into a listening device regardless the user s intention to communicate. Bugging may be achieved by replacing the handset s battery (while the suspect is under temporary arrest) by a battery containing an independent listening device or by turning on remotely the handset so as to listen to surrounding conversations (ghost phones). In a specific Asian phone model the camera can even be activated remotely provided that the downloading of applets into the sim and handset are authorized (this feature is usually disabled though). 7 remember that, as listed in section 3, the Network Call Data Record preserves the originating imei.
5 Actes du symposium SSTIC Handsets as Bomb Parts cnn 8 reports that on various occasions terrorists have been using the built-in alarms in mobile phones to set off explosives : The bombers who targeted commuter trains in Madrid on March eleven 2004 used the built-in alarm clock in mobile phones to set off explosives. In Jerusalem, it is believed a call to a cell phone in a rucksack set off a bomb at Hebrew University in 2002, killing seven. One of the Bali bombs outside the Sari nightclub in October 2002 had a cell phone attached, as did a car bomb which killed twelve people at the Jakarta Marriott hotel last August. The ease with which a handset can be turned into a bomb trigger and the ability to trigger an explosion from a safe distance call are real concerns. 7 The Forensic Expert s Toolbox The authors are often asked what tools should a handset forensic expert buy or download to get started : 7.1 sim Analysis Tools We recommend Gemplus GemXplore case for editing information present in 2g or 3g sim cards. The tool s capacities stretch beyond the mere inspection of data and care should be taken not to inadvertently modify the seizure (the tool does not always ask for confirmation). GemXplore allows to save data elements as pc files and interacts with the user via a graphical interface offering a drag and drop feature between the sim and the pc. Despite its somewhat high price we highly recommend this tool to handset forensic experts. Gemplus also markets a second (less expensive), software tool called MySIMeditor which is much easier to use but doesn t allow to visualize all the data elements that GemXplore case is capable of accessing. Note that none of these tools will be of any help if the forensic expert does not possess the sim s pin or puk codes. Figures 3 and 4 show screen shots of this tools (actual forensic elements redacted). There are a number of more or less user friendly solutions (e.g. by tulp2g and Radio Tactic) that the authors did not benchmark in a forensic context. A last word about general public tools : Unexperienced forensic experts using general public tools to inspect information present in sim cards. This should avoided given that such tools usually do not allow to visualize erased sms messages that frequently contain very significant evidentiary information 9. Also, before using any smart card kit for forensic purposes, the expert should qualify the tool s behavior on a sample and ascertain that none of the iso-7816 commands sent to the sim by the tool can possibly affect the information present in the sim this is possible by proper re-interpretation of byte indicating the message s status
6 6 Actes du symposium SSTIC08 Fig. 3: GemXplore case Fig. 4: Directory Reading with GemXplore 7.2 Handset Connection Kits Gartner Dataquest reports that worldwide handset sales over break-down as follows : Nokia 37%, Samsung 10%, Siemens 10%, Motorola 10% and a multitude of brands with less than 5% of market-share. In other words, the capacity to analyze four brands provides the forensic expert with the ability to cover nearly 70% of the market s devices. We consider that any serious handset forensic laboratory should maintain privileged relations with these brands R&D teams and benchmark most new handsets manufactured by these brands. From a regional perspective in emea (Europe, Middle East and Africa) Nokia s market share is around 50% 10 and Siemens 15% while in Asia, Nokia s share is slightly higher than 20% while Samsung and Motorola represent circa 10% each. 10 this probably explains the emergence of Nokia-specific forensic tools such as Oxygen Phone Manager ii for Nokia phones (Forensic version)
7 Actes du symposium SSTIC08 7 Besides the brands original connection kits we recommend two multi-brand products : The xry handset analysis box by Micro Systemation and Float MobileAgent (freely available). We did not experiment Paraben Forensic s Cell Seizure v3.0 but note its existence for interested readers. Fig. 5: Micro Systemation s xry Notes : Informal handset flashers (usually undocumented) greatly facilitate access to the handset s memory [2]. As there is no guarantee that the flasher will preserve the evidence present in the device s memory intact, the authors usually disassemble the flasher s code and track its behavior with a logical analyzer to understand its effect on the handset. If this is impossible, an agreement with the investigating judge (see section 7.4) should be reached. When analyzing flash cards found in mobile phones care should be taken to equip the examining pc with a write-blocker. A number handset models detect sim replacement and automatically erase all data linked to the previous sim upon detection of a new one. Forensic analysts should be aware of this and always ascertain experimentally (on an identical handset model) that this cannot cause loss of evidence. 7.3 The Faraday Tent All handset manipulations should be done in an electromagnetically protected area. A very cost-effective solution for doing so is Paraben s Wireless StrongHold Tent, the tent is easy to setup and take down and guarantees an average shielding effectiveness of 85db from 30 Mhz to 10 Ghz. 7.4 Invasive Analysis Invasive investigations allow to bypass pins (which is particularly useful when the seizure is a foreign sim, the suspect isn t talkative 11 and international cooperation procedure are expected to take too much time or have un uncertain outcome). 11 suspects will rarely refuse to disclose their pins but would frequently forget them...
8 8 Actes du symposium SSTIC08 There are essentially two methods to bypass pins : fault attacks and hostile applets. Both require an extreme degree of specialization and specific assumptions about the target. We refer the reader to [3] for an introduction to fault attacks. Any analysis method which is likely to modify or destroy the seizure should be agreed upon with the judiciary authorities before accepting the case. The authors recommend the following process : Buy a sufficiently large number of devices in all points similar to the seizure. Use some of these devices to develop an experimental protocol. As the protocol is stable, apply it to the remaining devices and count the occurrences of the six possible outcomes : {information extracted, information not extracted} {device unaltered, device altered, device destroyed}. Document the protocol precisely and communicate it to the investigating judge along with the experimental statistics. 7.5 Conclusion This extended abstract briefly overviews a panel of techniques allowing to extract forensic information from handsets and sim cards. Références 1. gsma Annual Report, S. Y. Willassen, Forensics and the gsm Mobile Telephone System, International Journal of Digital Evidence, Vol. 2, Issue 1, H. Bar-El, H. Choukri, D. Naccache, M. Tunstall, C. Whelan, The Sorcererís Apprentice Guide to Fault Attacks, Cryptology eprint Archive, Report 2004/100, 2004, http ://eprint.iacr.org.
An Example of Mobile Forensics
An Example of Mobile Forensics Kelvin Hilton K319 kchilton@staffsacuk [email protected] www.soc.staffs.ac.uk/kch1 Objectives The sources of evidence The subscriber The mobile station The network
Forensics and the GSM mobile telephone system
Forensics and the GSM mobile telephone system Abstract Svein Yngvar Willassen, M.Sc, Senior Investigator, Computer Forensics, Ibas AS The GSM system has become the most popular system for mobile communication
SIM Card Security. Sheng He 108005239797. Seminar Work. Chair for Communication Security Prof. Dr.-Ing. Christof Paar
SIM Card Security Sheng He 108005239797 Seminar Work at Chair for Communication Security Prof. Dr.-Ing. Christof Paar advised through Thomas Eisenbarth 12.07.2007 Ruhr-University of Bochum Contents 1 Overview...3
TECHNICAL OPERATIONS DIVISION LESSON PLAN
U.S. DEPARTMENT OF HOMELAND SECURITY FEDERAL LAW ENFORCEMENT TRAINING CENTER OFFICE OF TRAINING OPERATIONS TECHNICAL OPERATIONS DIVISION LESSON PLAN CELL PHONE INVESTIGATIONS 3001 SEP/10 WARNING This document
SPYTEC 3000 The system for GSM communication monitoring
SPYTEC 3000 The system for GSM communication monitoring The SPYTEC 3000 system is intended for passive (if system encryption is absent of if A5.2 encryption is used) or semi-active (if A5.1 encryption
Cellebrite UFED Physical Pro Cell Phone Extraction Guide
Cellebrite UFED Physical Pro Cell Phone Extraction Guide By Colby Lahaie Patrick Leahy Center for Digital Investigation Champlain College May 16, 2012 Table of Contents 1 Introduction... 2 1.1 Research
Massachusetts Digital Evidence Consortium. Digital Evidence Guide for First Responders
Massachusetts Digital Evidence Consortium Digital Evidence Guide for First Responders May 2015 Digital Evidence Guide for First Responders - MDEC A Note to the Reader There are an unlimited number of legal
Formal Education: Professional Qualifications: Professional Awards: Membership/Networking:
Formal Education: (some) 2006: Indonesian Advanced Police College Award: The Best Graduate in Academic 2009: MSc in Forensic Informatics, University of Strathclyde, UK Final Result: Distinction for Dissertation
Protocol of the Communication between SIM and mobile phone
Protocol of the Communication between SIM and mobile phone This protocol oft the layer 7 (application layer) and the layer 2 (data transmission layer) was made with an Siemens SL55 mobile phone in the
CC5500 Interceptor HSS DEVELOPMENT INC. HSS Development Inc. 75S Broadway White Plains, NY 10601 www.secintel.com Tel: 914-304-4333 Fax: 914-368-9729
HSS DEVELOPMENT INC. CC5500 Interceptor HSS Development Inc. 75S Broadway White Plains, NY 10601 www.secintel.com Tel: 914-304-4333 Fax: 914-368-9729 Disclaimers: - All descriptions of HSS products and
Agilent Network Monitoring Content Intercept Manager
Agilent Network Monitoring Content Intercept Manager Enabling Lawful Intercept agencies to keep pace with evolving cellular networks CIM is a flexible tool allowing precise and secure lawful interception
Case Study: Mobile Device Forensics in Texting and Driving Cases
Case Study: Mobile Device Forensics in Texting and Driving Cases Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge
Mobile memory dumps, MSAB and MPE+ Data collection Information recovery Analysis and interpretation of results
Mobile memory dumps, MSAB and MPE+ Data collection Information recovery Analysis and interpretation of results Physical Extraction Physical extraction involves either Removing chips from circuit board
Mobile Phone Forensic Analysis
Mobile Phone Forensic Analysis Kevin Curran *, Andrew Robinson, Stephen Peacocke, Sean Cassidy Intelligent Systems Research Centre Faculty of Computing and Engineering, University of Ulster, Northern Ireland,
Global System for Mobile Communication Technology
Global System for Mobile Communication Technology Mobile Device Investigations Program Technical Operations Division DHS - FLETC GSM Technology Global System for Mobile Communication or Groupe Special
Test Results for Mobile Device Acquisition Tool: Lantern v2.3
FEB. 203 U.S. Department of Justice Office of Justice Programs National Institute of Justice Special RepoRt Test Results for Mobile Device Acquisition Tool: Lantern v2.3 nij.gov Office of Justice Programs
RECOVERING DELETED DATA FROM FAT PARTITIONS WITHIN MOBILE PHONE HANDSETS USING TRADITIONAL IMAGING TECHNIQUES
RECOVERING DELETED DATA FROM FAT PARTITIONS WITHIN MOBILE PHONE HANDSETS USING TRADITIONAL IMAGING TECHNIQUES KEVIN MANSELL CONTROL-F LTD. [email protected] DARREN LOLE & FIONA LITCHFIELD SERVICE
Review of Cell Phone Technology
Review of Cell Phone Technology Types of Cell Technology - CDMA - GSM - iden - TDMA CDMA Code Division Multiple Access (CDMA) CDMA Code Division Multiple Access. In reality it is cdmaone (2G) or CDMA2000
WIRELESS ALARM MONITORING. User Manual V1.2
WIRELESS ALARM MONITORING User Manual V1.2 Please read this user manual fully before attempting installation. Pictures are for indication and illustration purposes only. 1. Accessories Please make sure
White Label Mobile AG, Liechtenstein
How it Works Activate your SIM card! Registration Together with your SIM card you have got the link for activation. Kindly enter this in order to register yourself as a user and to http://pilot-call.com/?q=en/activate
Insert a smart card and push the Test button, if the card is working you can see the reset response:
For extracting SIM-card data you need to have a working PC/SC compatible smart card reader. PC/SC is for chip card readers like Printer & Fax management for printers: it separates hardware from applications
Verint GI2. Gi2 Features. 2010 Verint Systems Inc. All rights reserved.
Verint GI2 Gi2 Features 2010 Verint Systems Inc. All rights reserved. Channelyser Function The Channelyser allows the user to interrogate the local networks and display the Broadcast information. This
Certified Digital Forensics Examiner
Cyber Security Training & Consulting Certified Digital COURSE OVERVIEW 5 Days 40 CPE Credits $3,000 Digital is the investigation and recovery of data contained in digital devices. This data is often the
User Manual. Vogue2.8-D6
User Manual Vogue2.8-D6 S L E E C Index 1. iball Vogue2.8-D6...1 1.1 Phone Overview...1 1.2 Functions of Keys...2 2. Getting Started...3 2.1 Installing the SIM Cards and the Battery...3 2.2 Installing
No more nuisance phone calls! Internet Control Panel & Weblink Guide
No more nuisance phone calls! Internet Control Panel & Weblink Guide truecall Ltd 2009 2 Contents Welcome! 3 Weblink 4 Your Internet Control Panel 5 Frequently asked questions 15 Support/Data Protection
Mobile Device Forensics. Rick Ayers
Mobile Device Forensics Rick Ayers Disclaimer Certain commercial entities, equipment, or materials may be identified in this presentation in order to describe an experimental procedure or concept adequately.
www.swisscom.ch User guide
www.swisscom.ch User guide Communication made simple Contents Welcome to Swisscom You can do so much more than make telephone calls with your mobile phone. You can check your answering machine, send SMS
Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2. Instruction Manual
Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2 Instruction Manual Firmware version: 2.0.1 Issue: 0.6 Version of the GPRS transmitters configurator: 1.3.6.3 Date of issue: 07.03.2012 TABLE OF CONTENTS
Link Gate SIP. (Firmware version 1.20)
Link Gate SIP (Firmware version 1.20) User guide v1.0 1 Content 2 1. Technical parameters - Dimensions 133 x 233 x 60 mm - Weight 850 g - Operating position various - Operating condition temperature: +5
Certified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
DERYtelecom telephony guide
1 2 Table of contents Introduction Support Services Customer service Technical support 611 Message relay centre for the deaf Operator service 0 Emergency services 911 Directory assistance service 411 Phone
Certified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
Dirty use of USSD codes in cellular networks
.. Dirty use of USSD codes in cellular networks Ravishankar Borgaonkar Security in Telecommunications, Technische Universität Berlin TelcoSecDay, Heidelberg, 12th March 2013 Agenda USSD codes and services
Junos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
Domonial, le Sucre. Easy to Use Intruder Detection Systems
Domonial, le Sucre Easy to Use Intruder Detection Systems Domonial Brief description With over a million installed sites, Domonial is one of the most popular remotely monitored wireless security systems
Security GSM Alarm System USER MANUAL
Security GSM Alarm System USER MANUAL System installation Brief introduction of system This alarm consists of main engine of alarm and various wireless-connected accessories. When people enter the defense
Manual for USB, GPRS Modem
Manual for USB, GPRS Modem Thank you for using this product for your application. Within this manual, you can find 3 major sections : Hardware, Software and AT command sets. Hardware is for you to understand
Cellular Analysis for Legal Professionals Larry E. Daniel Digital Forensic Examiner and Cellular Analyst EnCE, DFCP, BCE, ACE, CTNS, AME
Cellular Analysis for Legal Professionals Larry E. Daniel Digital Forensic Examiner and Cellular Analyst EnCE, DFCP, BCE, ACE, CTNS, AME Copyright 2015, Guardian Digital Forensics Cellular Telephone Easy
Validating Tools for Cell Phone Forensics
Validating Tools for Cell Phone Forensics Neil Bhadsavle and Ju An Wang Southern Polytechnic State University 1100 South Marietta Parkway Marietta, GA 30060 (01) 678-915-3718 {nbhadsav, jwang}@spsu.edu
Table Of COnTenT. 1 Advanced Cable Communications. Contact Us...2. Welcome...3. Calling Features...4-11. Frequently Asked Questions...
Table Of COnTenT Contact Us...2 Welcome...3 Calling Features...4-11 Frequently Asked Questions...12-17 Other Services...18 1 Advanced Cable Communications CONTACT US EMAIL US: [email protected] TelePHOne
User Manual GSM Alarm System. www.deltasecurity.cn. All rights reserved by Delta Security Co., Ltd
User Manual GSM Alarm System All rights reserved by Delta Security Co., Ltd Dear Clients, Thank you for using our GSM Alarm System. We are committed to giving you the best home security available today
Design and Implementation of Forensic System in Android Smart Phone
Design and Implementation of Forensic System in Android Smart Phone Xinfang Lee 1, Chunghuang Yang 1 2, Shihj en Chen, Jainshing Wu 2 1 Graduate Institute of Information and computer Education National
This guide will help you with setting up an Apple Macintosh for a GPRS connection to O 2 Mobile Web
This guide will help you with setting up an Apple Macintosh for a GPRS connection to O 2 Mobile Web Recommended System Requirements: MacOS 8.6 through to 9.2.x MacOS X 10.2.x Contents Page 2: Guidelines
Consumer Attitude Towards the Cell Phone: A study on Young Generations of Chittagong Metropolitan City, Bangladesh
Asian Business Review, Volume 3, Number 3/213 (Issue 5) ISSN 234-2613 (Print); ISSN 235-873 (Online) Consumer Attitude Towards the Cell Phone: A study on Young Generations of Chittagong Metropolitan City,
Policy and Profile Reference Guide
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Policy and Profile Reference Guide Published: 2014-06-16 SWD-20140616165002982 Contents 1 About this guide... 10 2 New IT policy
BLU Vivo 4.3 User Manual
BLU Vivo 4.3 User Manual 1 Table of Contents Phone Safety Information... 3 Appearance and Key Functions... 4 Installation and Charging... 5 Phone Operation... 7 Communication... 10 Camera... 11 Gallery...
User Guide. BlackBerry Storm 9530 Smartphone. Version: 4.7
BlackBerry Storm 9530 Smartphone Version: 4.7 SWD-490426-0909090640-001 Contents Shortcuts... 9 BlackBerry basics shortcuts... 9 Phone shortcuts... 9 Camera shortcuts... 9 Media shortcuts... 9 Typing shortcuts...
Bell Mobile Device Management (MDM)
Bell MDM Technical FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool
Analysis of Methods for Mobile Device Tracking. David Nix Chief Scientific Advisor
Analysis of Methods for Mobile Device Tracking David Nix Chief Scientific Advisor October 2013 Table of Contents 1. Document Purpose and Scope 3 2. Overview 3 2.1 Mobile Device Penetration 3 2.2 Mobile
Norton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
STATUS POWER MONITOR ALARM SOS DISARM
STATUS POWER MONITOR ALARM SOS DISARM I. Features II. Preparation before use III. Host 1.LED status explanation 2. Host panel IV. System Settings 1. Coding of wireless sensors 2. Exit coding 3. Settings
Your Phone This section introduces you to the hardware of the device.
Your Phone This section introduces you to the hardware of the device. No. Items Functions 1 Earphone jack 2 Strap hole 3 LED / Speaker Use a headset for hands-free conversation or listening to music. It
Tank Gauges and Security on the Internet
Tank Gauges and Security on the Internet by Jack Chadowitz CEO, Boston Base, Inc. This article discusses the security and risk aspects of using the Internet for communicating with a tank gauge. As the
TUTA B12. User Manual GSM REMOTE CAMERA. Manual version 3.0
TUTA B12 GSM REMOTE CAMERA User Manual Manual version 3.0 TUTA Series GSM Remote Camera Thank you for purchasing the TUTA camera. This camera is a remotely controlled image-capturing device consisting
CALL MANAGEMENT SERVICES. User Guide. 1 888 télébec telebec.com
CALL MANAGEMENT SERVICES User Guide 888 télébec telebec.com QUICK REFERENCE Télébec Call Management Services - Important Codes Service Activation Cancellation Call Blocking 6 7 Call Forwarding 7 2 7 3
Hawaiian Telcom Calling Services USER GUIDE. qqq qqq. qqq * 69 * 6 9 * 8 9 * 7 7 * 8 7 * 6 6 * 8 6 * 6 0 * 8 0 * 7 2 * 7 3 * 9 0 * 9 1 * 9 2 * 9 3
Quick Reference Guide Hawaiian Telcom Calling Services USER GUIDE Feature To Use To Cancel * 69 * 6 9 * 8 9 Anonymous Call Rejection * 7 7 * 8 7 Busy Redial * 6 6 * 8 6 Call Block * 6 0 * 8 0 Call Forwarding
Best Practices for Incident Responders Collecting Electronic Evidence
Best Practices for Incident Responders Collecting Electronic Evidence rev. April 2013 Prepared by: Rick Clyde Forensic Examiner [email protected] M: (402) 709-6064 Chris Hoke Principal and Owner
Guide to Wireless Communications. Digital Cellular Telephony. Learning Objectives. Digital Cellular Telephony. Chapter 8
Guide to Wireless Communications Digital Cellular Telephony Chapter 2 Learning Objectives Digital Cellular Telephony 3 Describe the applications that can be used on a digital cellular telephone Explain
Quick Start Guide: Iridium GO! Advanced Portal
Quick Start Guide: Iridium GO! Advanced Portal Contents Set-Up... 3 Overview... 4 Main Tab 1: General... 5 Status.... 5 Settings... 8 Audio.... 8 GPS.... 9 Tab 2: Communication... 9 Wi-Fi... 9 Satellite...
Case Study: Smart Phone Deleted Data Recovery
Case Study: Smart Phone Deleted Data Recovery Company profile McCann Investigations is a full service private investigations firm providing complete case solutions by employing cutting-edge computer forensics
ODOT Surveyor s Conference
Introduction to This document describes the process that will enable you to access the ODOT servers and Microsoft Outlook (E-mail) when you are away from your office and not on the internet. The process
Mobile Device Usage Policy
Mobile Device Usage Policy Version 1.0 1. Introduction...2 2. Responsibilities...2 Line Manager Responsibilities...2 3. Administration and Support of Mobile Devices...3 4. Personal Usage Monitoring...4
3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources.
G DATA Software 1. Introduction G DATA INTERNET SECURITY FOR ANDROID offers comprehensive protection against malware, intrusive apps and phishing attacks. Locate lost devices or wipe their content remotely
HCO BG30L Mobile (GSM) Surveillance Camera/Alarm System. User s Manual
HCO BG30L Mobile (GSM) Surveillance Camera/Alarm System User s Manual Content 1 Product Information... 2 1.1 General Description....2 1.2 Interfaces... 2 1.3 Information Display... 3 1.4 Features... 4
Avaya Unified Communications Can Reduce Cell Phone Expenses
WHITE PAPER Avaya Unified Communications Can Reduce Cell Phone Expenses June 2008 Table of Contents Introduction... 1 Section 1: Reduce Inbound Minutes... 1 Section 2: Reduce Outbound Minutes... 2 Section
THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE
THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
Wireless AUTODIAL GSM SMS Home Alarm Security System 900/ 1800/ 1900Mhz(CK-GSM-9003)
CN2HK LIMITED Wireless AUTODIAL GSM SMS Home Alarm Security System 900/ 1800/ 1900Mhz(CK-GSM-9003) User Manual Please read this manual before operating this product. After you finish reading this manual,
Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition
APR. 08 Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition Cover photographs copyright 2001 PhotoDisc, Inc. NCJ 219941 Chapter 1. Electronic Devices: Types, Description,
Welcome to Cogeco Business Digital Phone Service
Welcome Welcome to Cogeco Business Digital Phone Service Congratulations on choosing Cogeco Business Digital Phone Service. 1 Your decision to subscribe to our digital quality phone service is a smart
Kaseya 2. Quick Start Guide. for Network Monitor 4.1
Kaseya 2 VMware Performance Monitor Quick Start Guide for Network Monitor 4.1 June 7, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private
The evolution of data connectivity
Leveraging the Benefits of IP and the Cloud in the Security Sector The CCTV and alarm industry has relied on analogue or Integrated Services Digital Network (ISDN) communications to provide data connectivity
Development of a GSM based Control System for Electrical Appliances
International Journal of Engineering and Technology Volume 3 No. 4, April, 2013 Development of a GSM based Control System for Electrical Appliances Oke A. O., Emuoyibofarhe J. O., Adetunji A. B. Department
DO MORE WITH YOUR HOME PHONE
CALL 13 2200 VISIT A TELSTRA STORE telstra.com/homephone HOME FEATURES USER GUIDE DO MORE WITH YOUR HOME PHONE C020 JAN13 XXXXXXXX PHONE FEATURES THAT MAKE LIFE EASIER Our home features make it easy for
Residential. telephony. DERYtelecom telephony guide. derytele.com
Residential telephony 1 derytele.com Table of contents Introduction Support Services Customer service Technical support 611 Message relay centre for the deaf Operator service 0 Emergency services 911 Directory
Kaseya 2. Quick Start Guide. for Network Monitor 4.1
Kaseya 2 Syslog Monitor Quick Start Guide for Network Monitor 4.1 June 5, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector
Video Intelligence Platform
Security Whitepaper Five Tips to Fight ATM Skimming ATM skimming is a global crime that incurs annual losses of $1 billion. At the basic level, thieves seek to extract cash from bank accounts; however,
The ultimate IP DECT communication devices for voice, text messaging and inhouse mobility
The ultimate IP DECT communication devices for voice, text messaging and inhouse mobility Table of content On-site Wireless telephony on your IP Network 3 Key Applications 6 10 reasons for Business Mobility
1 Test Results for Mobile Device Acquisition Tool viaextract v2.5
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 1 Test s for Mobile Device Acquisition Tool viaextract v2.5 The main item of interest for interpreting the test results is determining the conformance of the tool under
CHAPTER 18 CYBER CRIMES
CHAPTER 18 CYBER CRIMES 18.1 With increased use of computers in homes and offices, there has been a proliferation of computer-related crimes. These crimes include: Crimes committed by using computers as
Mobile SMS and Data Roaming Explained
Mobile SMS and Data Roaming Explained Mobile SMS and data roaming explained Roaming is the ability of customers to use their mobile phones or other mobile devices outside the geographical coverage area
11.1. Performance Monitoring
11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts
Kaseya 2. User Guide. for Network Monitor 4.1
Kaseya 2 Ping Monitor User Guide for Network Monitor 4.1 June 5, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.
Pocket PC Phone Quick Start Guide. Read this guide before operating your Pocket PC Phone.
Pocket PC Phone Quick Start Guide Read this guide before operating your Pocket PC Phone. 1 Feature Maps Front Panel Components 4. 5. 2. 3. 6. 7. 1. 12. 11. 9. 8. 10. 1 Volume. Press to adjust the volume
IDD-213T User Manual. (Rev. 1.0) China Aerospace Telecommunications Limited
(Rev. 1.0) China Aerospace Telecommunications Limited Contents 1. Introduction......3 2. Specifications...4 2.1 External Interface... 4 2.2 Status Indicator...... 5 2.3 Technical Parameters... 6 3. Device
Security features include Authentication and encryption to protect data and prevent eavesdropping.
What is a SIM card? A SIM card, also known as a subscriber identity module, is a subscriber identity module application on a smartcard that stores data for GSM/CDMA Cellular telephone subscribers. Such
Thank you for choosing Huwei E589 4G Mobile WiFi
Thank you for choosing Huwei E589 4G Mobile WiFi This guide briefly describes the functions of your Huawei E589 4G Mobile WiFi. For more details, see help on the web management page. See Accessing the
D I G I T A L P H O N E S E R V I C E F E A T U R E S G U I D E DIGITAL P H O N E S E R V I C E. ACN 2007 useng_featuresguide_prdpv_w_092507
D I G I T A L P H O N E S E R V I C E F E A T U R E S G U I D E DIGITAL P H O N E S E R V I C E ACN 2007 useng_featuresguide_prdpv_w_092507 TABLE OF CONTENTS Making Phone Calls... 2 Accessing Your Account
Samba W - Table of Contents
Samba W - Table of Contents 1.Getting Started... 3 1.1 Installing the SIM Card, SD Card and Battery... 3 2. Input Type... 4 3. Menu Guide... 6 1.2 Messaging... 6 1.3 Call History... 6 1.4 Calculator...
Fromdistance MDM. Setting the standard in device management
Fromdistance MDM Setting the standard in device management GOAL to make mobile devices part of Enterprise Information System MAIN PRODUCT Fromdistance MDM (Mobile Device Manager) Mobile device management
History of Mobile Applications
History of Mobile Applications MAS 490: Theory and Practice of Mobile Applications Professor John F. Clark Overview Mobile communication is so integrated into our lives that many people feel uncomfortable
Otium Gear S Smart Watch User Guide Please read the manual before use. * For further information, please visit www.otiumobile.com
Otium Gear S Smart Watch User Guide Please read the manual before use. * For further information, please visit www.otiumobile.com 1 About this manual You can use this Gear S as a companion device to some
Worldwide attacks on SS7 network
Worldwide attacks on SS7 network P1 Security Hackito Ergo Sum 26 th April 2014 Pierre-Olivier Vauboin ([email protected]) Alexandre De Oliveira ([email protected]) Agenda Overall telecom architecture Architecture
GSM COMMUNICATORS CATALOGUE
COMMUNICATORS CATALOGUE ( ) 870020/B - 07/2007 - Daitem - ATRAL SYSTEM S.A.S. - R.C.S. Grenoble 311 586 382 The services and product data presented in this document may be modified without prior notice
Function Description Ascom IP-DECT System
Function Description Contents 1 Introduction... 1 1.1 Abbreviations and Glossary... 1 2 Technical Solution... 2 2.1 System Size... 2 2.2 LDAP Server... 3 2.3 Supported Protocols... 3 2.4 Power the Base
Users Manual of GSM Home Alarm System with Photo-taken
GSM-IV REMOTE CAMERA MANNAL The Excellent GSM + Camera alarm system bases on the GSM network, integrates the communication technology, can automatic screen a photo with the intruder or burglar, and send
