TECHNICAL OPERATIONS DIVISION LESSON PLAN
|
|
|
- Elfrieda Robinson
- 10 years ago
- Views:
Transcription
1 U.S. DEPARTMENT OF HOMELAND SECURITY FEDERAL LAW ENFORCEMENT TRAINING CENTER OFFICE OF TRAINING OPERATIONS TECHNICAL OPERATIONS DIVISION LESSON PLAN CELL PHONE INVESTIGATIONS 3001 SEP/10 WARNING This document is FOR OFFICIAL USE ONLY (FOUO)/LAW ENFORCEMENT SENSITIVE (LES). It contains information that may be exempt from public release under the Freedom of Information Act (5 U.S.C. 552). It is to be controlled, stored, handled, transmitted, distributed, and disposed of in accordance with Department of Homeland Security policy relating to FOUO information and is not to be released to the public or other personnel who do not have a valid 'need-to-know' without prior authorization of an authorized Department of Homeland Security Official. FOR OFFICIAL USE ONLY
2 DEVELOPED BY: (Sep/06) (b)(6), Senior Instructor, CFI (Team Leader) nstructor, CFI nstructor, CFI REVISED BY: (Mar/07) (b)(6) Senior Instructor, CFI (Team Leader) ces; cosmetic and editorial changes) CFI changed to TOD January 2009 (Template Revised SEP/10) REVIEWED BY: (SEP/10) (b)(6) Branch Chief, TOD FOR OFFICIAL USE ONLY
3 TABLE OF CONTENTS SYLLABUS... 1 INSTRUCTOR GUIDE... 2 OUTLINE OF INSTRUCTION... 3 I. INTRODUCTION... 3 A. RAPPORT AND OPENING STATEMENT... 3 B. LESSON PLAN OVERVIEW... 4 II. PRESENTATION... 4 A. EPO #1: IDENTIFY ASPECTS AND FEATURES OF CELL PHONE TECHNOLOGY AS THEY RELATE TO LAW ENFORCEMENT APPLICATIONS B. EPO #2: IDENTIFY THE TYPES OF EVIDENCE LIKELY TO BE RECOVERED FROM A SEIZED CELL PHONE C. EPO #3: IDENTIFY THE FOUR CRITICAL RULES OF CELL PHONE SEIZURE AND ANALYSIS D. EPO #4: IDENTIFY HARDWARE AND SOFTWARE TOOLS NECESSARY FOR IMAGING AND ANALYZING CELL PHONES E. EPO #5: IDENTIFY FEDERAL STATUTES WHICH MAY INFLUENCE THE LAWFUL SEIZURE AND ANALYSIS OF CELL PHONES F. EPO #6: IDENTIFY OR DEMONSTRATE THE PROCESS OF ACQUIRING AND ANALYZING CELL PHONE DATA III. SUMMARY A. REVIEW OF PERFORMANCE OBJECTIVES B. REVIEW OF TEACHING POINTS IV. APPLICATION A. LABORATORY B. PRACTICAL EXERCISE REFERENCES... A BIBLIOGRAPHY... B ATTACHMENTS... C FOR OFFICIAL USE ONLY
4 SYLLABUS COURSE TITLE: CELL PHONE INVESTIGATIONS COURSE NUMBER: 3001 COURSE DATE: SEP/10 LENGTH OF PRESENTATION: LECTURE LAB P.E. TOTAL PROGRAM OPTION FRDE #1 - #5 DESCRIPTION: Cell telephones are among the most ubiquitous electronic communications devices and certainly the most frequently encountered portable electronic device. They will be encountered at most crime scenes and during the execution of many search warrants. A great potential exists for encountering valuable evidence on a cell phone. This course discusses the types of evidence likely to be recovered from cell phones and the proper technique for cell phone seizure and subsequent data analysis. TERMINAL PERFORMANCE OBJECTIVE (TPO): Given an investigative scenario relating to the seizure of digital evidence, the officer will demonstrate the ability to seize, transport and store a cell phone in such a way as to preserve evidentiary integrity. ENABLING PERFORMANCE OBJECTIVES (EPO): EPO #1: Identify aspects and features of cell phone technology as they relate to law enforcement applications. EPO #2: Identify the types of evidence likely to be recovered from a seized cell phone. EPO #3: Identify the four critical rules of cell phone seizure and analysis. EPO #4: Identify hardware and software tools necessary for imaging and analyzing cell phones. EPO #5: Identify Federal statutes which may influence the lawful seizure and analysis of cell phones. EPO #6: Identify or demonstrate the process of acquiring and analyzing cell phone data. STUDENT SPECIAL REQUIREMENTS: There are no special requirements. METHOD OF EVALUATION: Graded Practical Exercise (FRDE: Course #3002) FOR OFFICIAL USE ONLY 1
5 INSTRUCTOR GUIDE METHODOLOGIES: Lecture with questions Discussion Demonstration TRAINING AIDS/EQUIPMENT: 1. Instructor: a. Cell phone seizure hardware kit (including cabling and charger); b. Demonstration cell phone(s); c. Cell phone seizure software; d. Shielded Faraday ( stronghold ) bag. 2. Student: Shielded Faraday ( stronghold ) bag. INSTRUCTOR SPECIAL REQUIREMENTS: There are no special requirements FOR OFFICIAL USE ONLY 2
6 OUTLINE OF INSTRUCTION I. INTRODUCTION A. RAPPORT AND OPENING STATEMENT 1. Never in the history of civilization has any gadget become so quickly instilled as part of the culture as has cell telephones. Though the technology (in its current incarnation) is barely a decade old, cell phones are globally ubiquitous. According to the Washington Post (July 28, 2005), there are over 190 million cell phone service subscriptions in the United States, representing fully one-half of the population. When one subtracts the number of preadolescents and geriatrics from the population, then it can safely be said that almost everyone has a cell phone. 2. In spite of these statistics, law enforcement has been largely remiss in incorporating cell phone technology into its standard library of enforcement procedures. 3. Typically, a cell phone is far more than a voice communications instrument. It is a compact personal storage device for a wide array of data and information. Rightfully, the cell phone should always be considered as evidence when making an arrest or when executing a search warrant. 4. In 2006 a police officer in Washington State acquired a cell phone during the course of an investigation. Having never received training on proper cell phone seizure and transportation, the officer sent the unprotected phone to the crime lab for further analysis. The lab analyst found no data on the cell phone. Later it was determined that the suspect had immediately after the seizure called his cell provider (T-Mobile), and reported his phone stolen. T-Mobile then remotely deleted all data from the seized phone prior to its arrival at the crime lab. Had the officer been aware of the rules for handling seized cell phones this potentially valuable evidence would not have been destroyed. 5. In another investigation, the Los Angeles Police Department found a dead body in a dumpster in a city back alley. The body had a cell phone which was recovered and sent to a crime lab for analysis. Analysts found the cell phone to contain a digital appointment calendar indicating the victim was to meet a named associate near the back alley on the evening of his death. An arrest for murder was affected within 24 hours of finding the body, based on evidence recovered from the cell phone. FOR OFFICIAL USE ONLY 3
7 6. This course discusses the types of evidence which may be recovered from a cell phone and the proper procedures for seizing, transporting, and storing cellular telephones. B. LESSON PLAN OVERVIEW 1. Terminal Performance Objective (TPO) Given an investigative scenario relating to the seizure of digital evidence, the officer will demonstrate the ability to seize, transport and store a cell phone in such a way as to preserve evidentiary integrity. 2. Enabling Performance Objectives (EPO) EPO #1: Identify aspects and features of cell phone technology as they relate to law enforcement applications. EPO #2: Identify the types of evidence likely to be recovered from a seized cell phone. EPO #3: Identify the four critical rules of cell phone seizure and analysis. EPO #4: Identify hardware and software tools necessary for imaging and analyzing cell phones. EPO #5: Identify Federal statutes which may influence the lawful seizure and analysis of cell phones. EPO #6: Identify or demonstrate the process of acquiring and analyzing cell phone data. II. PRESENTATION A. EPO #1: IDENTIFY ASPECTS AND FEATURES OF CELL PHONE TECHNOLOGY AS THEY RELATE TO LAW ENFORCEMENT APPLICATIONS. 1. Cell phones are, at their most fundamental level, two-way radios, granted, very sophisticated radios. They differ from simpler radios in a few ways: a. A walkie-talkie has one channel and can communicate wirelessly over a distance of about a mile. b. A CB radio has 40 channels and can communicate over a distance of about 5 miles. FOR OFFICIAL USE ONLY 4
8 c. A cell phone has a minimum of 1,664 channels and communicates with a cell tower typically less than 10 miles away. Individual calls are bounced from tower to tower. 1) The geographical area surrounding a tower is called a cell. Communications providers try to erect towers (thus, defining cells) in such locations so that all cell phone users are within communications range of a tower. a) If there is no tower within reach of a cell phone, the cell phone is said to be in a dead spot and out of communications range. d. Because of FCC frequency allocations, each cell can handle about 56 different simultaneous phone calls of analog messages. e. The First Generation cell service was deployed with the Advanced Mobile Phone Service (AMPS) and used Frequency Division Multiple Access (FDMA) to deliver analog signals. f. Digital technology came about in the Second Generation. There are several Second Generation technologies: 1) TDMA: (Time Division Multiple Access). Number of users per cell is triple that of analog cells. TDMA is voice only ; no text messaging, internet browsing, photo or file transfer. TDMA was state of the art from the early 1990 s to the late 90 s. 2) CDMA: (Code Division Multiple Access). Since several different calls can be multiplexed over a single channel, there is no finite number of calls that can be simultaneously carried in each cell. CDMA can also handle text messaging, file transfers, and Internet interaction. 3) GSM: (Global System for Mobile Communications). An international standard used in 168 countries (including US). a) GSM allows for international roaming. b) The single most visible feature of a GSM phone is that it uses a SIM memory chip for all cell phone storage. FOR OFFICIAL USE ONLY 5
9 c) Changing GSM phones is as simple as taking the chip out of one phone and inserting it the other. g. 3 rd generation technology introduced faster speeds and greater multimedia support. h. 4 th generation technology or 4G is the era of IP packet switched networks. 2. A cell phone network has the following components: a. A transmitting/receiving cell phone. b. A cell phone tower. 1) This receives the incoming call, changes the frequency, and retransmits it either to another transceiving tower or, eventually, to a base station. c. The base station is called an MTSO (Mobile Telephone Switching Office). 1) Each cell phone service provider will have a single MTSO in each home area. 2) If the incoming call is to another cell the MTSO routes the call appropriately through the cell network (to another MTSO). 3) If the incoming call is to a land-line, the MTSO routes it to a PSTN (Public Switched Telephone Network). The PSTN is the local land-based phone company (BellSouth, Qwest, etc.). 3. Cell Phone Acronyms that all law enforcement officers should know: a. b. c. (b)(7)e FOR OFFICIAL USE ONLY 6
10 4. The officer should also be aware that the MTSO maintains a realtime database of all locally assigned cell phones and the identification of the cell in which the phone is currently located. a. b. (b)(7)e B. EPO #2: IDENTIFY THE TYPES OF EVIDENCE LIKELY TO BE RECOVERED FROM A SEIZED CELL PHONE. 1. The cell phone industry applies a variety of technologies and an even wider variety of integrated cell phone capabilities. Any or all of the following may be found on a functioning cell phone. a. b. c. (b)(7)e d. FOR OFFICIAL USE ONLY 7
11 e. Contact lists 1) Includes names, aliases, phone numbers for work, residence, cells, fax, addresses, etc. f. Memos (constructed personal messages). g. To-Do Lists h. Personal Calendar/Appointments. i. Internet web pages. 2. Modern cell phones are truly hybrid electronic devices. For under $300, a user can purchase a cell phone with a built-in digital camera (85% of all cell phones purchased now have integrated cameras), Internet browsing software, MP3 Player potential, a text messaging keyboard, and a gaggle of other gadgets. 3. In addition to the evidence stored internally on a cell phone, the cell phone provider can potentially provide a wealth of other evidence relating to cell phone subscribers. Different legal authority is required depending on the type of evidence desired. a. Customer name and billing address. b. User name and account for on-line support. c. Billing account details. d. Other subscriber phone numbers. e. Call logs, including cell origination, destination, times and duration. C. EPO #3: IDENTIFY THE FOUR CRITICAL RULES OF CELL PHONE SEIZURE AND ANALYSIS. 1. (b)(7)e FOR OFFICIAL USE ONLY 8
12 2. (b)(7)e FOR OFFICIAL USE ONLY 9
13 D. EPO #4: IDENTIFY HARDWARE AND SOFTWARE TOOLS NECESSARY FOR IMAGING AND ANALYZING CELL PHONES. 1. Acquiring cell phone data in a useful and legal manner requires a few tools in addition to a standard personal computer. 2. (b)(7)e a) File format for most software tools is HTML and can be viewed after downloading with an Internet browser. 2) Single-purpose software can be acquired from the cell phone manufacturer for a cost of about $30. 3) Universal software that works with most cell phone models is also available from a limited number of manufacturers. c. Cell phone forensics hardware and software providers. 1) The two most commonly used providers of cell (b)(7)e FOR OFFICIAL USE ONLY 10
14 (b)(7)e E. EPO #5: IDENTIFY FEDERAL STATUTES WHICH MAY INFLUENCE THE LAWFUL SEIZURE AND ANALYSIS OF CELL PHONES. 1. The traditional laws and procedures relating to search and seizure are not enough when seizing cell phones. At least two additional statutes may come into play at one time or another and will impact the legality of cell phone investigations. They are discussed here. 2. Wiretapping Statutes (aka: Title III of the Omnibus Crime Control and Safe Streets Act of 1969): 18 U.S.C FOR OFFICIAL USE ONLY 11
15 Pages 15 through 17 redacted for the following reasons: (b)(7)e
16 4. (b)(7)e III. SUMMARY A. REVIEW OF PERFORMANCE OBJECTIVES EPO #1: Identify aspects and features of cell phone technology as they relate to law enforcement applications. EPO #2: Identify the types of evidence likely to be recovered from a seized cell phone. EPO #3: Identify the four critical rules of cell phone seizure and analysis. EPO #4: Identify hardware and software tools necessary for imaging and analyzing cell phones. EPO #5: Identify Federal statutes which may influence the lawful seizure and analysis of cell phones. EPO #6: Identify or demonstrate the process of acquiring and analyzing cell phone data. B. REVIEW OF TEACHING POINTS 1. Cell phones have a dynamic impact on our culture and on the actions of law enforcement officer. Any failure to consider cell phones during the act of enforcing an arrest or during the execution of a search warrant is a serious shortcoming. 2. Cell phones can be a rich source of evidence during the course of an investigation. However, proper seizure requires the following of stringent procedural and legal guidelines. IV. APPLICATION A. LABORATORY 1. NONE. B. PRACTICAL EXERCISE 1. NONE. FOR OFFICIAL USE ONLY 15
17 REFERENCES How Cell Phones Work. Sep National Public Radio; Surveillance Via Cell Phones ; Dec. 14, Cell Seizures ; Unpublished Training Manual ; Paraben Corporation ; Orem, UT; Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations (July 2002 (Amended)); U.S. Department of Justice, Computer Crime and Intellectual Property Section (CCIPS); (Current as of Sept. 2006). Mobile Phones ; Wikipedia ; Grant, August E. and Meadows, Jennifer H.; Communication Technology Update, Tenth Edition; Focal Press; Bedell, Paul; Wireless Crash Course; McGraw-Hill; New York; FOR OFFICIAL USE ONLY A
18 BIBLIOGRAPHY None FOR OFFICIAL USE ONLY B
19 ATTACHMENTS 1. PowerPoint Presentation. FOR OFFICIAL USE ONLY C
TECHNICAL OPERATIONS DIVISION LESSON PLAN
U.S. DEPARTMENT OF HOMELAND SECURITY FEDERAL LAW ENFORCEMENT TRAINING CENTER OFFICE OF TRAINING OPERATIONS TECHNICAL OPERATIONS DIVISION LESSON PLAN CELLULAR FORENSIC SOFTWARE 3261 SEP/10 WARNING This
How Cell Phones Work by Julia Layton and Marshall Brain and Jeff Tyson
Page 1 of 6 Make HowStuffWorks your home page! Mobil Travel Guide Consumer Guide Pr Search HowStuffWorks and the Auto Stuff Science Stuff Health Stuff Entertainment Stuff Travel Stu Computer Stuff Electronics
Chapter 3 Cellular Networks. Wireless Network and Mobile Computing Professor: Dr. Patrick D. Cerna
Chapter 3 Cellular Networks Wireless Network and Mobile Computing Professor: Dr. Patrick D. Cerna Objectives! Understand Cellular Phone Technology! Know the evolution of evolution network! Distinguish
Chapters 1-21 Introduction to Wireless Communication Systems
Chapters 1-21 Introduction to Wireless Communication Systems Yimin Zhang, Ph.D. Department of Electrical & Computer Engineering Villanova University http://yiminzhang.com/ece8708 Yimin Zhang, Villanova
Introductory Concepts
Chapter 1 Introductory Concepts 1.1 Introduction Communication is one of the integral parts of science that has always been a focus point for exchanging information among parties at locations physically
Mobile Device Investigations Program (MDIP) A Brief History of Wireless Technology
Federal Law Enforcement Training Center Technical Operations Division Mobile Device Investigations Program (MDIP) A Brief History of Wireless Technology (b)(7)e (b)(6) Course Objective Describe the evolution
Guide to Wireless Communications. Digital Cellular Telephony. Learning Objectives. Digital Cellular Telephony. Chapter 8
Guide to Wireless Communications Digital Cellular Telephony Chapter 2 Learning Objectives Digital Cellular Telephony 3 Describe the applications that can be used on a digital cellular telephone Explain
Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition
APR. 08 Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition Cover photographs copyright 2001 PhotoDisc, Inc. NCJ 219941 Chapter 1. Electronic Devices: Types, Description,
Chapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 9 Cellular Telephone Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain the operation of Cellular
HOW W I R E L E S S T E C H N O L O G Y WORKS
HOW WORKS OW ORKS WHAT S INSIDE Inside your wireless phone, there is a compact speaker, a microphone, a keyboard, a display screen, and a powerful circuit board with microprocessors that make each phone
Review of Cell Phone Technology
Review of Cell Phone Technology Types of Cell Technology - CDMA - GSM - iden - TDMA CDMA Code Division Multiple Access (CDMA) CDMA Code Division Multiple Access. In reality it is cdmaone (2G) or CDMA2000
October 19, 2015 POLICY DIRECTIVE 047-02. Assistant Secretary U.S. Immigration and Customs Enforcement
October 19, 2015 Deputy Secretary U.S. Department of Homeland Security Washington, DC 20528 Homeland Security POLICY DIRECTIVE 047-02 MEMORANDUM FOR: Sarah Saldana Assistant Secretary U.S. Immigration
Mobile SMS and Data Roaming Explained
Mobile SMS and Data Roaming Explained Mobile SMS and data roaming explained Roaming is the ability of customers to use their mobile phones or other mobile devices outside the geographical coverage area
Department of Justice Policy Guidance: Use of Cell-Site Simulator Technology
Department of Justice Policy Guidance: Use of Cell-Site Simulator Technology Cell-site simulator technology provides valuable assistance in support of important public safety objectives. Whether deployed
Mobile Wireless Overview
Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure
Digital Evidence Collection and Use. CS 585 Fall 2009
Digital Evidence Collection and Use CS 585 Fall 2009 Outline I. II. III. IV. Disclaimers Crime Scene Processing Legal considerations in Processing Digital Evidence A Question for Discussion Disclaimers
Massachusetts Digital Evidence Consortium. Digital Evidence Guide for First Responders
Massachusetts Digital Evidence Consortium Digital Evidence Guide for First Responders May 2015 Digital Evidence Guide for First Responders - MDEC A Note to the Reader There are an unlimited number of legal
Basic Network Design
Frequency Reuse and Planning Cellular Technology enables mobile communication because they use of a complex two-way radio system between the mobile unit and the wireless network. It uses radio frequencies
How To Get A Phone In The United States
Telephone Systems COMP476 Home Telephones Plain Old Telephone Service (POTS) provides a twisted pair connection from your phone to the central office. You own your home wiring and the telephone company
Case Study: Mobile Device Forensics in Texting and Driving Cases
Case Study: Mobile Device Forensics in Texting and Driving Cases Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge
Certified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
Certified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
Indian Journal of Advances in Computer & Information Engineering Volume.1 Number.1 January-June 2013, pp.1-5 @ Academic Research Journals.
Cellular System Rajat Chugh, Parag Jasoria, Tushar Arora, Nitin Ginotra and Vivek Anand V Semester, Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas, Farukhnagar,
Monitoring mobile communication network, how does it work? How to prevent such thing about that?
Monitoring mobile communication network, how does it work? How to prevent such thing about that? 潘 維 亞 周 明 哲 劉 子 揚 (P78017058) (P48027049) (N96011156) 1 Contents How mobile communications work Why monitoring?
Παρουσιάσεις για το Μάθημα Ασύρματων και Κινητών Τηλεπικοινωνιών του ΔΜΠΣ στο ΕΚΠΑ
Παρουσιάσεις για το Μάθημα Ασύρματων και Κινητών Τηλεπικοινωνιών του ΔΜΠΣ στο ΕΚΠΑ [email protected] Αθήνα, 2015 1 PART I Introduction to Wireless Communications 2 What is Wireless? Wireless operations
Global System for Mobile Communication Technology
Global System for Mobile Communication Technology Mobile Device Investigations Program Technical Operations Division DHS - FLETC GSM Technology Global System for Mobile Communication or Groupe Special
Wireless Solution for Rural Broadband Access
Wireless Solution for Rural Broadband Access As addressed to U.S. Department of Agriculture, Rural Utilities Service public meeting on Rural Broadband Access, June 27, 2002. I would like to thank Administrator
IAPE STANDARDS SECTION 16 DIGITAL EVIDENCE
IAPE STANDARDS SECTION 16 DIGITAL EVIDENCE IAPE STANDARD SECTION 16.1 DIGITAL EVIDENCE Standard: Digital evidence is a critical element of modern criminal investigation that should be maintained in strict
How To Understand Cellular Communications
Definition Cellular Communications A cellular mobile communications system uses a large number of low-power wireless transmitters to create cells the basic geographic service area of a wireless communications
Wireless Cellular Networks: 1G and 2G
Wireless Cellular Networks: 1G and 2G Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Audio/Video recordings of this lecture are available
Over the PSTN... 2 Over Wireless Networks... 2. Network Architecture... 3
Content Introduction... 1 History of Modems... 2 Over the PSTN... 2 Over Wireless Networks... 2 Network Architecture... 3 Circuit-Switched Cellular Data... 3 Short Message Service... 3 Packet-Switched
Overview of Computer Forensics
Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National
Computers Are Your Future. 2006 Prentice-Hall, Inc.
Computers Are Your Future 2006 Prentice-Hall, Inc. Computers Are Your Future Chapter 3 Wired and Wireless Communication 2006 Prentice-Hall, Inc Slide 2 What You Will Learn... ü The definition of bandwidth
Lecture 1. Introduction to Wireless Communications 1
896960 Introduction to Algorithmic Wireless Communications Lecture 1. Introduction to Wireless Communications 1 David Amzallag 2 May 25, 2008 Introduction to cellular telephone systems. How a cellular
Case Study: Smart Phone Deleted Data Recovery
Case Study: Smart Phone Deleted Data Recovery Company profile McCann Investigations is a full service private investigations firm providing complete case solutions by employing cutting-edge computer forensics
Location management Need Frequency Location updating
Lecture-16 Mobility Management Location management Need Frequency Location updating Fig 3.10 Location management in cellular network Mobility Management Paging messages Different paging schemes Transmission
Wireless Broadband Access
Wireless Broadband Access (Brought to you by RMRoberts.com) Mobile wireless broadband is a term used to describe wireless connections based on mobile phone technology. Broadband is an electronics term
The GSM and GPRS network T-110.300/301
The GSM and GPRS network T-110.300/301 History The successful analog 1:st generation mobile telephone systems proved that there is a market for mobile telephones ARP (AutoRadioPuhelin) in Finland NMT (Nordic
Analysis of Methods for Mobile Device Tracking. David Nix Chief Scientific Advisor
Analysis of Methods for Mobile Device Tracking David Nix Chief Scientific Advisor October 2013 Table of Contents 1. Document Purpose and Scope 3 2. Overview 3 2.1 Mobile Device Penetration 3 2.2 Mobile
Immigration and Customs Enforcement Forensic Analysis of Electronic Media
for the Immigration and Customs Enforcement Forensic Analysis of Electronic Media DHS/ICE/PIA-042 May 11, 2015 Contact Point Peter T. Edge Executive Assistant Director Homeland Security Investigations
ENGN4536 Mobile Communications
ENGN4536 Mobile Communications Dr Thushara Abhayapala Department of Engineering Faculty of Engineering & Information Technology Australian National University [email protected] http://www.webct.anu.edu.au
Biology Explorervision. John Lenzini and Jason Gorecki. The Amazing Cell Phone
Biology Explorervision John Lenzini and Jason Gorecki The Amazing Cell Phone History of the cell phone- The very first concept of the cellular phone started with AT&T car phone around 1970. When Motorola
WorkTime UC Mobile Admin Guide
WorkTime UC Mobile Admin Guide Release: 20.1.1 Android 20.1.2 ios Document Version 1.0 Table of Contents 1 About XO Hosted PBX UC Mobile Client...1 2 Use Cases...2 2.1 Placing Outbound Calls... 2 2.2 Receiving
Introduction. Mobile GIS emerged in the mid-1990s to meet the needs of field work such as surveying and utility maintenance.
Mobile GIS Introduction With more than 6.8 billion mobile cellular subscribers, (2013), wireless communication and mobile computing have gained acceptance worldwide with speed that has surpassed many other
Mobile Device Forensics: A Brave New World?
Mobile Device Forensics: A Brave New World? Contributed by Jason Gonzalez and James Hung, Stroz Friedberg LLC Say your client is charged with trade secret theft. What if you could show electronic evidence
Telecommunications and the Information Age ET108B. Cell Phone Network
Telecommunications and the Information Age ET108B Cell Phone Network The Cellular Telephone Network Cellular Telephone Features Carrying Data Across the Cellular Network Satellite Telephone Service Cellular
Mobile Phone Terminology Simplifying telecoms management
Mobile Phone Terminology Simplifying telecoms management _ 3G The next generation mobile network, launched in the UK in March 2003, pushed heavily by the company, Hutchison 3. The other major networks
Narrowband and Broadband Access Technologies
Computer Networks and Internets, 5e Chapters 12 and 16 Access and Interconnection Technologies (slidesets abridged/combined) By Douglas Comer Modified from the lecture slides of Lami Kaya ([email protected])
Connecting your Aiki phone to a network
Connecting your Aiki phone to a network Connect to mobile networks Depending on your carrier and service plan, your phone may connect automatically to your carrier s fastest available data network. Or
How To Understand The History Of The United States
WIRELESS GLOSSARY OF TERMS Air Interface: The operating system of a wireless network. Technologies include AMPS, TDMA, CDMA, GSM and iden. AMPS: Advanced Mobile Phone Service (AMPS) is the original analog
Humayun Bakht School of Computing and Mathematical Sciences Liverpool John Moores University Email:[email protected]
Applications of mobile ad-hoc networks my article applications of mobile ad-hoc networks at http://www.computingunplugged.com/issues/issue2004 09/00001371001.html Humayun Bakht School of Computing and
Cellular Network Organization. Cellular Wireless Networks. Approaches to Cope with Increasing Capacity. Frequency Reuse
Cellular Network Organization Cellular Wireless Networks Use multiple low-power transmitters (100 W or less) Areas divided into cells Each served by its own antenna Served by base station consisting of
What is VoIP and How It Can Benefit Your Business? Introduction
What is VoIP and How It Can Benefit Your Business? Introduction Although individuals are increasingly using text messaging and social media for their communication, telephony remains an essential tool
Cell Phone Forensics For Legal Professionals
1 Cell Phone Forensics For Legal Professionals Lars E. Daniel, EnCE, ACE, AME, CTNS, SCE, SCCM, SCA Digital Forensics Examiner Cell Phone Acquisition and Examination Collection and Acquiring Cell Phones
www.quicknetworksolutions.net RC: 960240
QSL is a growing business that s offering IT Solutions and services to SME and Established Organizations with a high level of understanding and fully qualified, friendly and knowledgeable consultants.
House Committee on the Judiciary. Subcommittee on Crime, Terrorism, and Homeland Security
House Committee on the Judiciary Subcommittee on Crime, Terrorism, and Homeland Security Hearing on the Geolocation Privacy and Surveillance (GPS) Act Statement for the Record of Professor Matt Blaze May
White Paper. Is VoIP Without E9-1-1 Worth the Risk? Challenges, Approaches, and Recommendations for VoIP Service Providers
TeleCommunication Systems, Inc. www.telecomsys.com Is VoIP Without E9-1-1 Worth the Risk? Challenges, Approaches, and Recommendations for VoIP Service Providers Notices 2004 TeleCommunication Systems,
TRAFFIC ACCIDENT STUDY GUIDE 2010
TRAFFIC ACCIDENT STUDY GUIDE 2010 SECTION SEVEN This study guide is designed to provide the law enforcement Explorer with basic principles. The guide is not all inclusive, and does not delineate specific
Imre Földes THE EVOLUTION OF MODERN CELLULAR NETWORKS
Budapest University of Technology and Economics Faculty of Electrical Engineering and Informatics Imre Földes THE EVOLUTION OF MODERN CELLULAR NETWORKS Research Report BUDAPEST, 2015 Contents 1 The early
Deploying In-Building Wireless Solutions
Deploying In-Building Wireless Solutions How enterprise, wireless service providers and building owners can better serve their employees, customers and tenants by deploying a converged in-building wireless
Computer Forensics. Securing and Analysing Digital Information
Computer Forensics Securing and Analysing Digital Information Aims What is a computer? Where is the evidence? Why is digital forensics important? Seizing evidence Encryption Hidden files and folders Live
ACCESS CHARGE A fee charged subscribers or other telephone companies by a local exchange carrier for the use of its local exchange networks.
Glossary of Telecommunications Terms (Source: Federal Communications Commission) ACCESS CHARGE A fee charged subscribers or other telephone companies by a local exchange carrier for the use of its local
ECE/CS 372 introduction to computer networks. Lecture 13
ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:
Vehicle Tracking System,
Vehicle Tracking System, The Complete Solution What is GPS? Product Review. Complete system. Contact Us. What is GPS? GPS, which stands for Global Positioning System, is the only system today able to show
Development of Wireless Networks
Development of Wireless Networks Cellular Revolution In 1990 mobile phone users populate 11 million. By 2004 the figure will become 1 billion Phones are most obvious sign of the success of wireless technology.
Chapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
Hello viewers, welcome to today s lecture on cellular telephone systems.
Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture minus 31 Cellular Telephone Systems Hello viewers, welcome to today s lecture
How To Solve A Violent Home Invasion With A United Force
Use Case SOLVING VIOLENT CRIMES WITH A UNIFIED WORKFLOW In a Violent Home Invasion Investigation, the UFED Series Seamlessly Unifies Workflows from Field to Lab A series of violent home invasions has everyone
The CHICAGO STORY. Use of CCCTV for General Area Surveillance, Crime Hot Spots, Mobile Applications, and Future Developments
The CHICAGO STORY Use of CCCTV for General Area Surveillance, Crime Hot Spots, Mobile Applications, and Future Developments 3rd Largest U.S. City 2.9 million residents 228 square miles CPD 2 nd largest
Digital Forensics for Attorneys Overview of Digital Forensics
Lars Daniel,, EnCE, ACE, CTNS Digital Forensic Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital Evidence
GSM v. CDMA: Technical Comparison of M2M Technologies
GSM v. CDMA: Technical Comparison of M2M Technologies Introduction Aeris provides network and data analytics services for Machine-to- Machine ( M2M ) and Internet of Things ( IoT ) applications using multiple
SOLUTION BRIEF. Motorola FSA4000. How to Achieve Near 100% Fire Station Alerting Reliability
SOLUTION BRIEF Motorola FSA4000 How to Achieve Near 100% Fire Station Alerting Reliability CONTENTS 2 Abstract 2 Introduction 2 Rapid Response Depends on Reliable Dispatch and Alerting Systems 3 Most Approaches
AlarmNet Network Overview
AlarmNet Network Overview AlarmNet is a family of communications services designed specifically for the security industry. AlarmNet is designed to be a cost effective alternative or backup to the transmission
ODOT Surveyor s Conference
Introduction to This document describes the process that will enable you to access the ODOT servers and Microsoft Outlook (E-mail) when you are away from your office and not on the internet. The process
Cell Phones Past, Present, and Future
Cell Phones Past, Present, and Future By Sean W. Henry Table of Contents Chapter One How Cell Phones Work 1 Chapter Two The Birth and Growth of Wireless Transmission 2 Chapter Three Landline or Cell Phone?
Common Questions & Answers
Common Questions & Answers Summary of Advantages Honeywell has proven manufacturing and design capability, distribution expertise and the field training/ support necessary for a successful partnership
Modern Wireless Communication
Modern Wireless Communication Simon Haykin, Michael Moher CH01-1 Chapter 1 Introduction CH01-2 1 Contents 1.1 Background 1.2 Communication Systems 1.3 Physical Layer 1.4 The Data-Link Layer 1.4.1 FDMA
Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1
Computer Networks Wireless and Mobile Networks László Böszörményi Computer Networks Mobile - 1 Background Number of wireless (mobile) phone subscribers now exceeds number of wired phone subscribers! Computer
1 Introduction to mobile telecommunications
1 Introduction to mobile telecommunications Mobile phones were first introduced in the early 1980s. In the succeeding years, the underlying technology has gone through three phases, known as generations.
Commercial Motor Vehicle Safety and Security Systems Technology Wireless Mobile Communications
Commercial Motor Vehicle Safety and Security Systems Technology Wireless Mobile Communications Objective Satellite- and cellular-based mobile two-way communication tracking systems for commercial motor
Use Current Success to Develop Future Business
>THIS IS THE WAY Use Current Success to Develop Future Business Malur Narayan / Nitin Khanna February 2005 >THIS IS Wireless Broadband Opportunities & Segments Mobile Broadband Access Enterprise Broadband
1342) Prerequisit. cies. Investigative interview and C9, F9,) interviews. research, the. C. Sketching. the Crime and students. Scene.
Criminal Investigation (CJSA 1342) Credit: 3 semester credit hours (3 hours lecture) Prerequisit te/co-requisite: None Course Description Investigative theory; collection and preservation of evidence;
DATA RETENTION. Guidelines for Service Providers
DATA RETENTION Guidelines for Service Providers The Attorney-General s Department has prepared this guide to assist industry participants to understand the obligations arising from the Telecommunications
About Your Presenter. Digital Forensics For Attorneys. Overview of Digital Forensics
Larry E. Daniel, EnCE, DFCP, BCE Digital Forensic Examiner Digital Forensics for Attorneys An Overview of Digital Forensics About Your Presenter EnCase Certified Examiner (EnCE) Digital Forensics Certified
Emerging Wireless Technologies
Emerging Wireless Technologies QCHAT The Future of Push-to-Talk Communications Foreword: The Public Safety Wireless Network (PSWN) Program is conducting an ongoing assessment of advancements in the wireless
Wireless LANs vs. Wireless WANs
White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,
Wireless Telecommunication Industry Overview
Wireless Telecommunication Industry Overview Columbia Graduate Consulting Club February 13, 2012 Pablo Prieto-Muñoz COLUMBIA UNIVERSITY Civil Engineering and Engineering Mechanics Global mobile phone subscribers
Cellular Analysis for Legal Professionals Larry E. Daniel Digital Forensic Examiner and Cellular Analyst EnCE, DFCP, BCE, ACE, CTNS, AME
Cellular Analysis for Legal Professionals Larry E. Daniel Digital Forensic Examiner and Cellular Analyst EnCE, DFCP, BCE, ACE, CTNS, AME Copyright 2015, Guardian Digital Forensics Cellular Telephone Easy
MCOLES Information and Tracking Network. Security Policy. Version 2.0
MCOLES Information and Tracking Network Security Policy Version 2.0 Adopted: September 11, 2003 Effective: September 11, 2003 Amended: September 12, 2007 1.0 POLICY STATEMENT The Michigan Commission on
What is telecommunication? electronic communications? What is telephony?
What is telecommunication? Telecommunication: Any transmission, emission or reception of signs, signals, writing, images and sounds or intelligence of any nature by wire, radio, optical or other electromagnetic
