Cell Phone Science. Criminal Advocacy Program. Financial Advisory Services. October 10, 2014
|
|
|
- Allen Lewis
- 10 years ago
- Views:
Transcription
1 Cell Phone Science Criminal Advocacy Program October 10, 2014 Financial Advisory Services
2 Select Professionals Brian A. Rosenthal, CISSP, EnCE Brian A. Rosenthal is a Digital Forensic Manager in the Computer Forensics and E-Discovery practice within the Dispute Advisory & Forensic Services Group. Mr. Rosenthal has a background in Computer Forensics, E-Discovery, and Forensic Analysis of digital media including: computers, servers, cell phones and other mobile media storage devices. Digital Forensic Manager Direct Mobile [email protected] B.S. Rutgers College Computer Science Certified Information Systems Security Professional (CISSP) Mr. Rosenthal has extensive experience working with law firms, corporate counsel, litigation support managers, and paralegals to manage their electronic data from collection through production. He combines his knowledge of the legal industry with his experience working on large complex document management projects to improve efficiencies and reduce overall project costs. Mr. Rosenthal s experience with Forensic Investigations and E-Discovery projects spans many industries including manufacturing, automotive, finance, retail, marketing, government, energy, healthcare, and insurance. Prior to joining SRR, Mr. Rosenthal was a Senior Consultant at various national digital forensics and e-discovery companies including Kroll Ontrack. Mr. Rosenthal received a B.S. in Computer Science from Rutgers University and is an Encase Certified Engineer (EnCE) and a Certified Information Systems Security Professional (CISSP). Additionally, Mr. Rosenthal is a member of the International High Technology Crime Investigation Association (HTCIA) and International Information Systems Security Certification Consortium (ISC 2 ). Encase Certified Engineer (EnCE) 2
3 Garry A. Pate, CFCE, CHFI, CCFE, EnCE, CEECS Director Direct Mobile Education M.S. American Intercontinental University Information Technology B.S. University of Maryland Criminal Justice Garry A. Pate is a Director of the E-Discovery practice within the Dispute Advisory & Forensic Services Group. Mr. Pate has a background in Computer Forensics, E-Discovery, internal investigations, database management, document automation, scanning coding and extensive experience working with business owners, attorneys and federal, state, and local government/law enforcement across the United States. Mr. Pate has strong knowledge of electronic data collection, processing and production as well as program and policy development given his 16 years of experience in the legal industry. Mr. Pate has extensive experience managing E-Discovery projects from collection through production in complex litigation cases involving issues such as IP theft, business technology, copyrights, patents, trademarks, employment disputes, environmental, divorce, and numerous other disputes. Prior to joining SRR, Mr. Pate was the Director of E-Discovery at a national forensics and e-discovery vendor where he served as a strategic resource for electronic discovery, document collection, review and production, trial preparation methodologies and other practice support needs. Mr. Pate also was an IT Specialist at the Securities and Exchange Commission (SEC) where he was a founding member of the computer forensic laboratory analysis team. He worked on numerous high profile matters including the SEC v. Enron. Mr. Pate is a Computer Hacking Forensic Investigator EC-Council (CHFI), Certified Computer Forensics Examiner - Information Assurance Certification Review Board (IACRB) (CCFE), EnCase Certified Examiner (EnCE) Guidance Software, Inc., Certified Forensic Computer Examiner (CFCE)/Certified Electronic Evidence Collection Specialist (CEECS) International Association of Computer Investigative Specialists, Certified Handheld [Cell/PDA] Examiner; Certified Advanced Cell Phone Examiner Paraben Corporation. Mr. Pate is a member of the Information Assurance Certification Review Board, EC-Council, Association of Certified Fraud Examiners, International Association of Computer Investigative Specialists, High Technology Crime Investigation Association, Regional Computer Forensics Group, and National Institute of Science and Technology Computer Forensic Tool Testing Committee.
4 Overview of SRR Stout Risius Ross is a global financial advisory services firm that is known for premier expertise, deep industry knowledge, and unparalleled responsiveness. Investment Banking Valuation & Financial Opinions Dispute Advisory & Forensic Services Mergers & acquisitions Private market financing Distressed transaction advisory Strategic assessments Fairness opinions Fairness & solvency opinions Financial reporting Corporate tax related valuations ESOP & ERISA advisory Succession & shareholder planning Real estate valuation Machinery & equipment valuation Family Law Valuation & Advisory Services Pre-litigation consulting Forensic and Discovery services Complex damage analysis Economic assessments for settlement and case evaluation Expert opinions and consultations 4 A T L A N T A B A L T I M O R E C H I C A G O C L E V E L A N D D A L L A S D E N V E R D E T R O I T H O U S T O N L O S A N G E L E S N E W Y O R K T Y S O N S C O R N E R W A S H I N G T O N, D C
5 Overview Introduction History Of Mobile Devices What is Mobile Device Forensics? Mobile Device Analysis Application Forensics Practices and Trends in the Field Questions? 5
6 In The Beginning. What is a cell phone? A mobile (cellular) phone is a phone that can make and receive telephone calls over a radio link while moving around a wide geographic area. It does so by connecting to a cellular network provided by a mobile phone operator, allowing access to the public telephone network. In addition to telephony, modern mobile phones also support a wide variety of other services such as text messaging, MMS, , Internet access, short-range wireless communications (infrared, Bluetooth), business applications, gaming, and photography. 6
7 In The Beginning. List of countries by number of mobile phones in use: 7
8 In The Beginning. USA Mobile Phone Carriers The USA uses two main radio network standards: GSM (Global System for Mobile) CDMA (Code Division Multiple Access) 8
9 In The Beginning. Cell Phone Forensics Short History The first hand-held cell phone - DynaTAC 8000x - was demonstrated in Europe by John F. Mitchell and Dr. Martin Cooper of Motorola in In 1979, Japan launched the first commercial cellular network. 9
10 In The Beginning. Cell Phone Forensics Short History 10
11 In The Beginning. Cell Phone Forensics Short History Shortly thereafter in 1981, the Nordic Mobile Telephone (NMT) system was launched in Europe.The United States began developing a mobile telephone network in the early 1980s. 11
12 In The Beginning. Cell Phone Forensics Short History In 1991, the 2G digital cellular network was launched. Cell phones were dumb phones and their capabilities were limited to Making phone calls Paging Push to talk Voic 12
13 The Smartphone is Born Cell Phone Forensics Short History In 2007, this guy introduced this device 13
14 Today Cell Phone Forensics Short History 4G Smartphones RIM s Blackberry is on life support Need a more robust network because 14
15 Today. 15
16 Today The average smartphone today has more computing power than NASA had in 1969 when the United States sent astronauts to the moon 16
17 Mobile Device vs Computer Forensics Mobile Device Forensics is NOT Computer Forensics Similar Intent = Different Method Computer Forensics: Only a few major Operating System Standards: Windows, Mac, Linux. Standard practice is to image the hard drive and examine the data. Mobile Device Forensics: Multiple Operating Systems. Various Communication Standards. Each manufacturer has their own: Nokia, Samsung, Motorola, Palm, Blackberry, etc. Communication Standards are evolving. Started this way but is consolidating to four or five. Mobile Forensics is becoming more like computer forensics in some ways. Mobility Aspect: - Mobile devices are live things roaming around. It s not just about what s on the device, but where has it been and what connections have been made? 17 What s retained by the network varies from carrier to carrier, but apart from the billing essentials, not much data is saved after 30 days. Some Exceptions.
18 Mobile Device vs Computer Forensics Another Difference: Phones Are Always Updating hjjjjproper Handling and Isolation Are Essential Cell Phone Forensics is not technically forensics. We are just starting to image the drive. Mostly we are engaging it to tell us what s in there and then recording and analyzing. Proper training in handling and processing phones is essential in reducing the risk of loss or contamination. While the acquisition of data is relatively easy, it often requires putting an Agent on the device to assist with data extraction. A phone is always updating with the network, and remote destruction is possible. Proper isolation of the device from the network and immediate analysis is best when possible. 18
19 Mobile Device Data What Can Be Acquired from the Device Phonebook Call History and Details (To/From) Call Durations Text Messages with identifiers (sent-to, and originating) Sent, received, deleted messages Multimedia Text Messages with identifiers Photos and Video (also stored on external flash) Sound Files (also stored on external flash) Network Information, GPS location Phone Info (CDMA Serial Number) s, memos, calendars, documents, etc. GPS Info, Social Networking data, web browsing history 19
20 Mobile Device Data What Can Be Acquired from the Device IMSI: International Mobile Subscriber Identity IMEI: International Mobile Equipment Identity- Unique Identifier[*#06#] ICCID: Integrated Circuit Card Identification (SIM Serial No.) MSISDN: Mobile Station Integrated Services Digital Network (phone number) Network Information LND: Last Number Dialed (sometimes, not always, depends on the phone) ADN: Abbreviated Dialed Numbers (Phonebook) SMS: Text Messages, Sent, Received, Deleted, Originating Number, Service Center (also depends on Phone) SMS Service Center Info: GPRS Service Center Info Location Information: The GSM channel (BCCH) and Location Area Code (LAC) when phone was used last. * When SIM Locked Cannot Be Cracked without Network Operator Assistance. A PIN Locked SIM is Not Accessible Without PIN Requires PUK From Carrier 20
21 Network Call Data Records Cell Record History What Is It? Review of cell provider s historic records. 21 C l i c k t o e d i t M a s t e r t e xt s t y l e s
22 Why was cell technology developed? Limited Space! Just like on the highway, there is a limited amount of space in which wireless frequencies can travel. This works fine when there are limited amount of devices talking to each other (walkie talkies) but presents an issue when there hundreds or thousands of devices. There simply isn t enough bandwidth for all of this chatter! 22 C l i c k t o e d i t M a s t e r t e xt s t y l e s
23 Cell Grids Divide an area into small cells of coverage. This allows frequency re-use, so that many phones can be used in the same small area. Cell phones operate within cells, and they can switch cells as they move around. Each cell ranges in size depending on the density. Typically sized at about 10 square miles (26 square kilometers). Cells are normally thought of as hexagons on a big hexagonal grid. Because cell phones and base stations use lowpower transmitters, the same frequencies can be reused in nonadjacent cells. The two purple cells can reuse the same frequencies. 23 C l i c k t o e d i t M a s t e r t e xt s t y l e s
24 Solution: Cell Grid Cells are normally thought of as hexagons on a big hexagonal grid. 24 C l i c k t o e d i t M a s t e r t e xt s t y l e s
25 MTSO Carrier s Central Office Mobile Telephone Switching Office In cities/regions, mobile carrier operates hundreds or thousands of cell towers, which route calls and data to the carrier s backbone network. Each carrier in each city/region also runs one central office called the Mobile Telephone Switching Office (MTSO). This office handles all of the phone connections to the normal land-based phone system and controls all of the base stations in the region. This office handles all of the phone connections to the normal land-based phone system and controls all of the base stations in the region. 25 C l i c k t o e d i t M a s t e r t e xt s t y l e s
26 Phone Codes All cell phones have special codes associated with them. These codes are used to identify the phone, the phone's owner and the service provider. GSM: Serial Number IMEI/MSISDN SIM Cards - ICCID IMSI Subscriber Record CDMA: Serial Number - ESN/MEID (CDMA) Phone Numbers MIN/MDN System Identification Code (SID): A unique number that is assigned to each carrier by the FCC 26 C l i c k t o e d i t M a s t e r t e xt s t y l e s
27
28 Congestion within Cell Grids Each tower is designed to accommodate a set number of calls per second, per a certain geographic area. In a crisis (9-11, Boston Marathon), when everyone naturally reaches for their phone, that limit is quickly surpassed and the radios on the tower get sluggish. If the closest tower is overloaded, the MTSO can route you to a farther tower. 29 C l i c k t o e d i t M a s t e r t e xt s t y l e s
29 Where s your Cell Phone? Locational Data (Cell Phone Self Tracking) GPS Triangulation* Wi-Fi signals* *even with the GPS off, a phone can locate itself. Service Provider Cell Tower Records 30 C l i c k t o e d i t M a s t e r t e xt s t y l e s
30 Location: GPS/Triangulation Triangulation Three cell phone towers are used to approximate the location of the phone. GPS Satellites are used to pinpoint the location of the phone. Note FCC E911 regulations require wireless carriers to be able to track 911 callers. FCC proposing rules that would require greater accuracy. 31 C l i c k t o e d i t M a s t e r t e xt s t y l e s
31 Location: Cell Tower Records Service providers keep logs of what cell phones were connected to what towers at what time. Towers are constantly pinging cell phones to provide service, so a caller s whereabouts and path of travel are generally traceable. Relies only on tower data that is, the records of which cell tower the defendant's phone was connecting through and from which angle. Police and prosecutors can use this information in order to connect a suspect to a crime location. 32 C l i c k t o e d i t M a s t e r t e xt s t y l e s
32 Network Call Data Records Call Data Record (CDR) Data is Not Kept Long! Only History. Tower Information As To Where Calls Originated or Received. Data Acquired From Call Data Records Number Called and Received Switch Center / Server Identification (2G/3G Network Interface) Call Type for Billing Purposes (Day/Night + Weekend) Length of Call Start and Stop Time Location Area Code (LAC) Cell Identity Start CI and Finish CI Tower Location Name and GPS Coordinates Voic Call Number SMS Service Center Number and more 33
33 Network Call Data Records Voice Usage For: (203) Account Number: Sample Call Data Record Item Date Time Number Calls To Mins Feature Usage Charge Roam Switch Sid Serving Area LAC Start / End CI Called Used Type Type Code 1 03/14/08 4:32P (203) NORWALK 5 M2MTMB DT $0.00 H BOTNM0 T-Mobile / Fairfield CT / Connecticut 2 03/14/08 4:42P (203) INCOMING 2 M2MCNG DT $0.00 H BOTNM0 T-Mobile / Fairfield CT / Connecticut 3 03/14/08 5:02P (203) STAMFORD 12 M2MCNG DT $0.00 H BOTNM0 T-Mobile / Fairfield CT / Connecticut 4 03/14/08 5:10P (203) STAMFORD 5 M2MCNG DT $0.00 H BOTNM0 T-Mobile / Fairfield CT / Connecticut 5 02/05/08 6:39P (203) STAMFORD 2 M2MCNG DT $0.00 H BOTNM0 T-Mobile / Fairfield CT / Connecticut 34
34
35 Flaws: Cell Tower Records When someone places a call, it does not automatically go to the closest tower. It s routed to the tower that the switching center determines is the best. This depends on many factors: weather, time of day, types of equipment and technology, and call traffic. Two individuals, subscribed to the same cellular provider, standing next to each other can still get different towers. 36 C l i c k t o e d i t M a s t e r t e xt s t y l e s
36 Location: Cell Tower Sensors Cell towers typically have 3 sensors, each tracking 120 pie. 37 C l i c k t o e d i t M a s t e r t e xt s t y l e s
37 Location: Cell Tower Sensors Cell towers typically have 3 sensors, each tracking 120 pie. 38 C l i c k t o e d i t M a s t e r t e xt s t y l e s
38 Location: Take Away The use of historical records is different than triangulation or GPS technology. Phone companies do not save GPS or triangulation data for an individual phone. Using phone company records. The only thing that you can say with confidence is that the phone connected to a cell site somewhere within a radius of many miles. Large margin of error! 39 C l i c k t o e d i t M a s t e r t e xt s t y l e s
39 Location: Live Tracking Service provider asks the central switch the following question Where is the hardware associated with this phone number and billing record? Ping Send a signal to your phone, phone reports back its location from it s GPS. 40 C l i c k t o e d i t M a s t e r t e xt s t y l e s
40 Surveillance Rogue tower (Stingray) Device that impersonates a cell tower. Tricks phone into thinking you are the service provider. Only Military/FBI originally, but recently State and Local law enforcement now have this. A Private Citizen can theoretically buy it online but officially not legal. 41 C l i c k t o e d i t M a s t e r t e xt s t y l e s
41 Legality When investigating a crime that occurred in the past, police tend to have two options: seize the phone or obtain the cell records. Riley v. California, a June 2014 Supreme Court decision made it mandatory for police to obtain warrants before searching the cell phones of people they arrest. Federal appellate courts are divided on the issue of whether a search warrant is needed to attain location records from cell providers. The disparity in requirements between the two could encourage police to rely increasingly on calldetail records. 42 C l i c k t o e d i t M a s t e r t e xt s t y l e s
42 Case of Interest - Lisa Marie Roberts Girlfriend had been found strangled and dumped in a park. Accused of murdering girlfriend had been found strangled and dumped in a park. Prosecution had cell records purportedly showed she used her phone near where the body was found. Roberts claimed the call was made 8 miles away while driving. Roberts attorney urged her to take a plea, without having seen the evidence. Roberts was given a 15 year sentence for manslaughter. 43 C l i c k t o e d i t M a s t e r t e xt s t y l e s
43 New Evidence - Exonerated! DNA evidence placed another suspect, a man, at the crime scene. Cell records showed that moments before the call in question, Roberts had received another call that came through a different cell tower. U.S. District Judge Malcolm F. Marsh threw out Roberts guilty plea. Stating that the presentation of expert testimony at trial, concerning the variables impacting the reliability of cell tower evidence to pinpoint a caller's location, likely would have changed the outcome of the trial. After 12 years in jail, Roberts was released. 44 C l i c k t o e d i t M a s t e r t e xt s t y l e s
44 Tools and Techniques of the Trade Preservation RF Protection Required To Protect Device From The Network. Faraday Box and Bag Airplane Mode and Keep the Device Charged. 45
45 Tools and Techniques of the Trade Data Capture Options Screen Captures: The simplest way. Use a camera to take pictures of what s on the screen. Reporting tools available. Sometimes this is the only way. Logical Analysis: Extracting the data on the device that you see and can access on the device. No deleted information with this method. Call logs, phone books, SMS messages, pictures, , browsing etc. The active information on the device can be extracted using a Logical extraction tool. This is the standard method today. Plenty of tools and easy to use. Physical Analysis: The practice of extracting data from the physical memory of the device, and removable memory. Like PC forensics, you are getting the raw binary / hex data. Requires decoding and understanding of language and techniques used by device manufacturers. Physical analysis is the way to deleted information, but it is difficult and sparsely supported. Only a few tools. Mostly Nokia supported. Early days of the new standard. Chip Level Analysis: - Analysis of the chips in the phone by removing them from the device and probing for data, or rebuilding another phone. Extremely technical. Broken SIMs analyzed this way. 46
46 Tools and Techniques of the Trade The Unfortunate Reality of the Forensic Collection Kit There Is No One Size Fits All Solution A Number of Mobile Device Forensic Tools on the Market Each have their strengths and weaknesses. Plenty of overlap of support, but success with devices varies. This is due to the challenges in supporting the continuous introductions of new phones and changing technologies. It s a tough job for the examiner to keep up And equally difficult for the companies making the tools. Examiners Never Know What They Are Going To Get! Often need more than one tool for the multiple different devices out there. This is changing somewhat with a consolidation of mobile Operating Systems (Android, Apple, BlackBerry, Windows), but some tools will dig deeper in some areas than others. 47
47 Tools and Techniques of the Trade Today s Mobile Device Forensic Solutions 48
48 Tools and Techniques of the Trade Screen Capture Sometimes Taking A Picture is The Only Way To Get Data Off of a Phone 49
49 Tools and Techniques of the Trade Storage Card Analysis Todays smartphones are essentially handheld computers. Most cell phones come with a certain amount of internal storage with the option to expand that storage via an SD card. For example, my cell phone has 16GB of internal storage and I have a 16GB SD card. This allows storage of numerous documents, pictures, songs, videos, etc. 50
50 Tools and Techniques of the Trade Logical Acquisition Logical acquisition pulls the Active data off the device 51
51 Tools and Techniques of the Trade Physical Acquisition Physical acquisition accesses the internal memory and the Raw Data Today s Top Tools: XRY Physical and UFED Physical 52
52 Tools and Techniques of the Trade 53
53 Tools and Techniques of the Trade 54
54 Mobile Virtual Network Operators Throw Away Phones Mobile Virtual Network Operators What are They? Virtual operators selling mobile services. Operating on larger networks. Why are They? Marketing to specific demographics. Reduce contract restrictions. Who are They? 55
55 Tools and Techniques of the Trade A Challenge for Forensic Efforts Throw Away Phones Plans and Devices often Paid for in cash. No contract, no identity tied to the device or service contract Often a disposable solution for criminals Some proprietary devices not widely supported by forensic solutions (this is changing) This Does Not Mean There is Not Valuable Data on Device SIM Card Data (TracFone, Boost, T-Mobile) Last Numbers Dialed on Device/SIM Call Logs, Call Durations Pictures Text Messages (message identifiers) 56
56 Tools and Techniques of the Trade Questions to ask for a cell phone collection What type of phone? Be very specific (i.e. Apple iphone 5S) Is it password protected? If so, attempt to get the password Is the phone encrypted? How long can the user go without the phone? Can the acquisition be done in a lab environment as opposed to on site? What information are you looking for? Please preserve the phone photograph, airplane mode, shut off. 57
57 Every Minute of the Day Sixty seconds seems like an insignificant amount of time, but when you look at it in terms of how much data is created, there s a whole lot going on 58
58 App Store Trends 59
59 Communication in Would you call for help? Two girls lost in a storm water drain in Adelaide, Australia, updated their Facebook status instead of calling emergency services on Sunday night. They were fortunate a young friend was online at the time and was able to call for help for them. In Atlanta, Georgia, a councilman was concerned that his cellphone battery would be flat by the time a 911 call connected. Instead, he Tweeted: "Need a paramedic on corner of John Wesley Dobbs and Jackson St. Woman on the ground unconscious. Pls ReTweet". A Tulsa woman hid in a basement and used Facebook to call for help when men broke into her home early Monday. "Somebody please help me. Here's my address. Call 911. Call the police. There's people in my house!"
60 Application Forensics 61
61 Application Forensics 62
62 Russian soldier Alexander Sotkin Posted two photos of himself to Instagram from within Ukraine -- one on June 30 and another on July 5. The Russian army denies that its troops have crossed the Ukraine border. Russia claimed the photos were forgeries and the locations of the selfies were falsified. Photo Map uses GPS to determine its users' locations, a tool that is generally accurate with 50 feet or so. 63
63 Terms and Conditions (b) Location Data. Apple and its partners, licensees and third party developers may provide certain services through your ios Device that rely upon location information. To provide and improve these services, where available, Apple and its partners, licensees and third party developers may transmit, collect, maintain, process and use your location data, including the real-time geographic location of your ios Device, road travel speed information, location search queries, and location of where you purchase and launch applications. The location data and queries collected by Apple are collected in a form that does not personally identify you and may be used by Apple and its partners, licensees and third party developers to provide and improve location-based products and services. By using any location-based services on your ios Device, you agree and consent to Apple's and its partners', licensees' and third party developers transmission, collection, maintenance, processing and use of your location data and queries to provide and improve such products and services. 64
64 iphone Artifacts Settings Privacy Location Services System Services Frequent Locations 65
65 Steps in any exam Attorney or forensic examiner: Try to get include the charging cable when taking custody of a phone Ask for the pass code or swipe code! Put into airplane mode, turn off Bluetooth, turn off WiFi If unsure how to put into airplane mode, Google the make/model, download the user manual or user guide Check the manufacturer s site, the wireless provider site, phonearena.com or pdab.net for information 66
66 Steps in any exam Let s look at the HTC One 67
67 Steps in any exam Airplane mode, per the user guide, obtained by chatting with a verizonwireless.com tech 68
68 Steps in any exam Per the Cellebrite list of supported devices [currently 6,513 models] 69
69 Examination Results The extraction summary 70
70 Examination Results Calendar entries 71
71 Examination Results Call logs 72
72 Examination Results Analytics which combines a count of how many phone calls and messages were exchanged between the user and others 73
73 Questions? 74
74 Your Partner in E-Discovery Bridging the Gap Between Discovery and Technology Solutions Grounded in its core values of positive team attitude, accountability, commitment, entrepreneurial and relationship focused, SRR emphasizes a results-oriented approach which provides creative solutions for your most complex situations. SRR Your partner in E-Discovery
75 Disclaimer This document is intended for the internal use of the recipient only (attendees of the Cell Phone Science Seminar held October 10, 2014, as part of the Criminal Advocacy Program) and may not be distributed or released to any third party without the prior written consent of Stout Risius Ross, Inc. This document presents information designed to educate the recipient on the basics of mobile device tracking and forensics, and is not intended to be formal legal advice.
Cellebrite UFED Physical Pro Cell Phone Extraction Guide
Cellebrite UFED Physical Pro Cell Phone Extraction Guide By Colby Lahaie Patrick Leahy Center for Digital Investigation Champlain College May 16, 2012 Table of Contents 1 Introduction... 2 1.1 Research
Case Study: Smart Phone Deleted Data Recovery
Case Study: Smart Phone Deleted Data Recovery Company profile McCann Investigations is a full service private investigations firm providing complete case solutions by employing cutting-edge computer forensics
TECHNICAL OPERATIONS DIVISION LESSON PLAN
U.S. DEPARTMENT OF HOMELAND SECURITY FEDERAL LAW ENFORCEMENT TRAINING CENTER OFFICE OF TRAINING OPERATIONS TECHNICAL OPERATIONS DIVISION LESSON PLAN CELL PHONE INVESTIGATIONS 3001 SEP/10 WARNING This document
Case Study: Mobile Device Forensics in Texting and Driving Cases
Case Study: Mobile Device Forensics in Texting and Driving Cases Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge
Mobile Device Forensics: A Brave New World?
Mobile Device Forensics: A Brave New World? Contributed by Jason Gonzalez and James Hung, Stroz Friedberg LLC Say your client is charged with trade secret theft. What if you could show electronic evidence
Massachusetts Digital Evidence Consortium. Digital Evidence Guide for First Responders
Massachusetts Digital Evidence Consortium Digital Evidence Guide for First Responders May 2015 Digital Evidence Guide for First Responders - MDEC A Note to the Reader There are an unlimited number of legal
Chapter 3 Cellular Networks. Wireless Network and Mobile Computing Professor: Dr. Patrick D. Cerna
Chapter 3 Cellular Networks Wireless Network and Mobile Computing Professor: Dr. Patrick D. Cerna Objectives! Understand Cellular Phone Technology! Know the evolution of evolution network! Distinguish
An Example of Mobile Forensics
An Example of Mobile Forensics Kelvin Hilton K319 kchilton@staffsacuk [email protected] www.soc.staffs.ac.uk/kch1 Objectives The sources of evidence The subscriber The mobile station The network
How Cell Phones Work by Julia Layton and Marshall Brain and Jeff Tyson
Page 1 of 6 Make HowStuffWorks your home page! Mobil Travel Guide Consumer Guide Pr Search HowStuffWorks and the Auto Stuff Science Stuff Health Stuff Entertainment Stuff Travel Stu Computer Stuff Electronics
Digital Forensics for Attorneys Overview of Digital Forensics
Lars Daniel,, EnCE, ACE, CTNS Digital Forensic Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital Evidence
Analysis of Methods for Mobile Device Tracking. David Nix Chief Scientific Advisor
Analysis of Methods for Mobile Device Tracking David Nix Chief Scientific Advisor October 2013 Table of Contents 1. Document Purpose and Scope 3 2. Overview 3 2.1 Mobile Device Penetration 3 2.2 Mobile
Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition
APR. 08 Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition Cover photographs copyright 2001 PhotoDisc, Inc. NCJ 219941 Chapter 1. Electronic Devices: Types, Description,
Mobile Phone Terminology Simplifying telecoms management
Mobile Phone Terminology Simplifying telecoms management _ 3G The next generation mobile network, launched in the UK in March 2003, pushed heavily by the company, Hutchison 3. The other major networks
Cellular Analysis for Legal Professionals Larry E. Daniel Digital Forensic Examiner and Cellular Analyst EnCE, DFCP, BCE, ACE, CTNS, AME
Cellular Analysis for Legal Professionals Larry E. Daniel Digital Forensic Examiner and Cellular Analyst EnCE, DFCP, BCE, ACE, CTNS, AME Copyright 2015, Guardian Digital Forensics Cellular Telephone Easy
Evolution of Smartphones And Android Operating System
Evolution of Smartphones And Android Operating System Evolution of Smartphones Background First telephone call was made on March 10, 1876 by Alexander Graham Bell. After that Pager continues to dominate
Quick Start Guide: Iridium GO! Advanced Portal
Quick Start Guide: Iridium GO! Advanced Portal Contents Set-Up... 3 Overview... 4 Main Tab 1: General... 5 Status.... 5 Settings... 8 Audio.... 8 GPS.... 9 Tab 2: Communication... 9 Wi-Fi... 9 Satellite...
About Your Presenter. Digital Forensics For Attorneys. Overview of Digital Forensics
Larry E. Daniel, EnCE, DFCP, BCE Digital Forensic Examiner Digital Forensics for Attorneys An Overview of Digital Forensics About Your Presenter EnCase Certified Examiner (EnCE) Digital Forensics Certified
Formal Education: Professional Qualifications: Professional Awards: Membership/Networking:
Formal Education: (some) 2006: Indonesian Advanced Police College Award: The Best Graduate in Academic 2009: MSc in Forensic Informatics, University of Strathclyde, UK Final Result: Distinction for Dissertation
Cell Phone Forensics For Legal Professionals
1 Cell Phone Forensics For Legal Professionals Lars E. Daniel, EnCE, ACE, AME, CTNS, SCE, SCCM, SCA Digital Forensics Examiner Cell Phone Acquisition and Examination Collection and Acquiring Cell Phones
Review of Cell Phone Technology
Review of Cell Phone Technology Types of Cell Technology - CDMA - GSM - iden - TDMA CDMA Code Division Multiple Access (CDMA) CDMA Code Division Multiple Access. In reality it is cdmaone (2G) or CDMA2000
How To Solve A Violent Home Invasion With A United Force
Use Case SOLVING VIOLENT CRIMES WITH A UNIFIED WORKFLOW In a Violent Home Invasion Investigation, the UFED Series Seamlessly Unifies Workflows from Field to Lab A series of violent home invasions has everyone
Sensitive Incident Investigations. Digital Risk Management. Forensics Testing.
Sensitive Incident Investigations. Digital Risk Management. Forensics Testing. 2009 Innovation Award Winner Austin Chamber of Commerce 2010 Innovation Award Finalist Austin Chamber of Commerce Only private
CELLULAR PHONE EVIDENCE DATA EXTRACTION & DOCUMENTATION DET. CINDY MURPHY
CELLULAR PHONE EVIDENCE DATA EXTRACTION & DOCUMENTATION DET. CINDY MURPHY DEVELOPING PROCESS FOR THE EXAMINATION OF CELLULAR PHONE EVIDENCE Digital forensic examiners have seen a remarkable increase in
Test Results for Mobile Device Acquisition Tool: Lantern v2.3
FEB. 203 U.S. Department of Justice Office of Justice Programs National Institute of Justice Special RepoRt Test Results for Mobile Device Acquisition Tool: Lantern v2.3 nij.gov Office of Justice Programs
OXYGEN FORENSIC SUITE 2010 GETTING STARTED
OXYGEN SOFTWARE OXYGEN FORENSIC SUITE 2010 GETTING STARTED 2000-2010 Oxygen Software http://www.oxygen-forensic.com Table of contents Table of contents...2 General information...3 Installation...5 Extracting
Certified Digital Forensics Examiner
Cyber Security Training & Consulting Certified Digital COURSE OVERVIEW 5 Days 40 CPE Credits $3,000 Digital is the investigation and recovery of data contained in digital devices. This data is often the
HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY
GOLD EMM SUBSCRIPTIONS Experience the most secure mobility management solution with BES12 and Gold Enterprise Mobility Management (EMM) subscriptions. HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY
Norton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY
DATASHEET HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY Gold level EMM for BlackBerry Regulated-level security for BlackBerry 10 devices Ultimate security. BlackBerry 10 devices managed by BES10 with
Industry Analysis of the Nigerian Mobile Technology Development
Industry Analysis of the Nigerian Mobile Technology Development Presented by Cistematix Ltd. 30 th June, 2011 www.cistematix.com WHY WE ARE HERE TODAY? To deliver a lecture on Industry Analysis of the
SIMPLIFYING THE COMPLEXITY OF MOBILE DATA FORENSICS
SIMPLIFYING THE COMPLEXITY OF MOBILE DATA FORENSICS Extract the Insights that Focus Investigations CELLEBRITE UFED PRO SERIES THE DATA SOURCES THAT MATTER MOST 95% MOBILE DEVICE ITSELF 59% THIRD-PARTY
platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential
Best Practices for Smartphone Apps A smartphone is basically a computer that you can carry in the palm of your hand. Like computers, smartphones have operating systems that are often called platforms.
Monitoring mobile communication network, how does it work? How to prevent such thing about that?
Monitoring mobile communication network, how does it work? How to prevent such thing about that? 潘 維 亞 周 明 哲 劉 子 揚 (P78017058) (P48027049) (N96011156) 1 Contents How mobile communications work Why monitoring?
Guide to Wireless Communications. Digital Cellular Telephony. Learning Objectives. Digital Cellular Telephony. Chapter 8
Guide to Wireless Communications Digital Cellular Telephony Chapter 2 Learning Objectives Digital Cellular Telephony 3 Describe the applications that can be used on a digital cellular telephone Explain
HOW W I R E L E S S T E C H N O L O G Y WORKS
HOW WORKS OW ORKS WHAT S INSIDE Inside your wireless phone, there is a compact speaker, a microphone, a keyboard, a display screen, and a powerful circuit board with microprocessors that make each phone
THE ENTERPRISE MOBILITY POLICY GUIDEBOOK
THE ENTERPRISE MOBILITY POLICY GUIDEBOOK October 2010 Edition 2 About This Guidebook Research from Strategy Analytics shows that over 90% of organizations now have employees using smartphones within their
Successful ediscovery in a Bring Your Own Device Environment
IT@Intel White Paper Intel IT IT Best Practices IT Governance and IT Consumerization June 2012 Successful ediscovery in a Bring Your Own Device Environment Executive Overview Close collaboration between
Certified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
Certified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
Mobile memory dumps, MSAB and MPE+ Data collection Information recovery Analysis and interpretation of results
Mobile memory dumps, MSAB and MPE+ Data collection Information recovery Analysis and interpretation of results Physical Extraction Physical extraction involves either Removing chips from circuit board
Vehicle Monitoring Quick Reference Guide
Vehicle Monitoring Quick Reference Guide Powered by Delphi Welcome You re about to experience a powerful device that will deliver a new level of convenience and peace of mind with your vehicle. When combined
Wireless Broadband Access
Wireless Broadband Access (Brought to you by RMRoberts.com) Mobile wireless broadband is a term used to describe wireless connections based on mobile phone technology. Broadband is an electronics term
Developing Process for Mobile Device Forensics
Developing Process for Mobile Device Forensics Det. Cynthia A. Murphy Abstract With the growing demand for examination of cellular phones and other mobile devices, a need has also developed for the development
C E L L U L A R P H O N E E V I D E N C E DATA EXTRACTION AND DOCUMENTATION DET. CINDY MURPHY
C E L L U L A R P H O N E E V I D E N C E DATA EXTRACTION AND DOCUMENTATION DET. CINDY MURPHY DEVELOPING PROCESS FOR THE EXAMINATION OF CELLULAR PHONE EVIDENCE Recently, digital forensic examiners have
How To Be A Computer Forensics Examiner
Richard A. Peacock 410.346.7288 (Office) 443.398.5246 (Cell) [email protected] EnCase Certified Examiner (EnCE) Access Data Certified Examiner (ACE) Access Data Mobile Phone Certified Examiner
Junos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
USES OF INTERNET TECHNOLOGIES IN CHILD SEXUAL ABUSE CASES. Peer to Peer Networking TYPES OF TECHNOLOGY. Presentation Supplement. How can it be used?
TYPES OF TECHNOLOGY Peer to Peer Networking Networks in which computers are equal partners using common file sharing programs that allow users to connect directly to each other s computer hard drive to
Introduction. Mobile GIS emerged in the mid-1990s to meet the needs of field work such as surveying and utility maintenance.
Mobile GIS Introduction With more than 6.8 billion mobile cellular subscribers, (2013), wireless communication and mobile computing have gained acceptance worldwide with speed that has surpassed many other
C ell phones have changed the way people
A Consumer Action Project www.consumer-action.org Learn how to get results Cell Phone Savvy How to avoid problems with your wireless device and service C ell phones have changed the way people communicate.
The GSM and GPRS network T-110.300/301
The GSM and GPRS network T-110.300/301 History The successful analog 1:st generation mobile telephone systems proved that there is a market for mobile telephones ARP (AutoRadioPuhelin) in Finland NMT (Nordic
COMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION
COMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION Answers to End-of-Chapter Questions Matching g 1. whiteboard i 2. sending device o 3. streaming j 4. WiFi m 5. Webcam d 6. data transfer
Digital Evidence Collection and Use. CS 585 Fall 2009
Digital Evidence Collection and Use CS 585 Fall 2009 Outline I. II. III. IV. Disclaimers Crime Scene Processing Legal considerations in Processing Digital Evidence A Question for Discussion Disclaimers
Verizon Wireless Family Locator 4.9 User Guide Contents
Verizon Wireless Family Locator.9 User Guide Contents Let s get started... Sign up, then activate phones!... Use the Activation Wizard... Set Up an Android... Set Up a BlackBerry... 6 Set Up a Feature...
Chapters 1-21 Introduction to Wireless Communication Systems
Chapters 1-21 Introduction to Wireless Communication Systems Yimin Zhang, Ph.D. Department of Electrical & Computer Engineering Villanova University http://yiminzhang.com/ece8708 Yimin Zhang, Villanova
Indian Journal of Advances in Computer & Information Engineering Volume.1 Number.1 January-June 2013, pp.1-5 @ Academic Research Journals.
Cellular System Rajat Chugh, Parag Jasoria, Tushar Arora, Nitin Ginotra and Vivek Anand V Semester, Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas, Farukhnagar,
Design and Implementation of Forensic System in Android Smart Phone
Design and Implementation of Forensic System in Android Smart Phone Xinfang Lee 1, Chunghuang Yang 1 2, Shihj en Chen, Jainshing Wu 2 1 Graduate Institute of Information and computer Education National
EC-Council Ethical Hacking and Countermeasures
EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
The Explosion of Mobile Technology; What s the Impact on the Financial Services Industry?
The Explosion of Mobile Technology; What s the Impact on the Financial Services Industry? Presented by: on Financial Services 1 A look at the state of mobile technology in 2012 on Financial Services 2
Are free Android virus scanners any good?
Authors: Hendrik Pilz, Steffen Schindler Published: 10. November 2011 Version: 1.1 Copyright 2011 AV-TEST GmbH. All rights reserved. Postal address: Klewitzstr. 7, 39112 Magdeburg, Germany Phone +49 (0)
AT&T International Roaming When you are traveling outside the U.S.
Cell Phone Packages 1 Passport Passport Silver Passport Gold AT&T International Roaming When you are traveling outside the U.S. For Cell Phones AT&T Passport SM Packages Get everything you need for international
Kaseya 2. User Guide. Version 7.0. English
Kaseya 2 Mobile Device Management User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
CSI Crime Scene Investigations
CSI Crime Scene Investigations Did Jack do it? Speaker Introductions Amber Schroader Paraben Corporation Oodles of forensic experience Tyler Cohen Federal Government (Still Cool Person) IPod Obsession
Connecting your Aiki phone to a network
Connecting your Aiki phone to a network Connect to mobile networks Depending on your carrier and service plan, your phone may connect automatically to your carrier s fastest available data network. Or
Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 9 Cellular Telephone Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain the operation of Cellular
Optimizing Wireless Networks.
from the makers of inssider Optimizing Wireless Networks. Over the past few years, MetaGeek has created tools to help users optimize their wireless networks. MetaGeek s tools help visualize the physical
Kaspersky Security 10 for Mobile Implementation Guide
Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful
MARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633
MARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633 COLLEGE EDUCATION B.A. degree in Criminal Justice from Cal State, Fullerton in
Teltonika FM41XX. Configurator v. 1.0
Teltonika FM41XX Configurator v. 1.0 1. First steps Connect Teltonika FM41XX (PIN1 for plus and PIN11 ground ) to the voltage supply 10-30 V as shown below and GPS, GSM antennas. (GSM is long and thin,
JAMES R. SWAUGER Digital Forensic Examiner
CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner Binary Intelligence, LLC 726 East Main Street, Suite F #150 Lebanon, Ohio 45036 Phone: 866.246.2794 x703 Email: [email protected] CERTIFICATIONS
iphone in Business Mobile Device Management
19 iphone in Business Mobile Device Management iphone supports Mobile Device Management, giving businesses the ability to manage scaled deployments of iphone across their organizations. These Mobile Device
Deploying iphone and ipad Mobile Device Management
Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.
What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes
What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes Table of Contents UFED Basics...3 Extraction Types...4 Logical extraction...5 Logical extractions of ios devices...5
AIRAVE Frequently Asked Questions
AIRAVE Frequently Asked Questions 2008 Sprint - 1-2008 Sprint. Sprint and the logo are trademarks of Sprint. Other marks are the property of their respective owners. AIRAVE FAQs General 1. What do I need
Mobile Devices in Electronic Discovery
Mobile Devices in Electronic Discovery Mobile Devices in Electronic Discovery Abstract Once upon a time they were used to make phone calls; now they are our mobile offices. Mobile devices are a prolific
LabTech Mobile Device Management Overview
You are here: Using LabTech > Mobile Device Management > Mobile Device Management Overview LabTech Mobile Device Management Overview Features LabTech mobile device management (MDM) is a fully integrated
Back, start, and search key... 3. Lock the keys and screen... 6. Unlock the keys and screen... 7. Set the keys and screen to lock automatically...
Userguide Nokia Lumia 620 Table of Contents Keys and parts... 3 Back, start, and search key... 3 How to Insert a SIM card... 4 First start-up... 6 Switching Phone ON and OFF... 6 Switch the phone on...
Cellular Device Data Recovery Preparation Considerations and Troubleshooting
Cellular Device Data Recovery Preparation Considerations and Troubleshooting Lauren Wagner High-Tech Crime Training Specialist S E A R C H T R A I N I N G S E R V I C E S April 2013 HOW TO USE THIS GUIDE
VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune
VEHICLE TRACKING SYSTEM USING GPS Pooja P. Dehankar 1, 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune Prof. S. P. Potdar 2 2 Asst. Professor, SCOE, Vadgaon, Pune Abstract- Global Positioning System is
Precise innovation presents: USer manual
Precise innovation presents: USer manual Let the FUn Begin! The goal of Caref is simple to give parents greater peace of mind and children a greater sense of freedom when they should be focusing as much
Consumer Attitude Towards the Cell Phone: A study on Young Generations of Chittagong Metropolitan City, Bangladesh
Asian Business Review, Volume 3, Number 3/213 (Issue 5) ISSN 234-2613 (Print); ISSN 235-873 (Online) Consumer Attitude Towards the Cell Phone: A study on Young Generations of Chittagong Metropolitan City,
DOCUMENT REFERENCE: SQ312-002-EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. March 2014
DOCUMENT REFERENCE: SQ312-002-EN SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper March 2014 SAMKNOWS QUALITY CONTROLLED DOCUMENT. SQ REV LANG STATUS OWNER DATED 312 002 EN FINAL
Mobile Commerce and Ubiquitous Computing. Chapter 6
Mobile Commerce and Ubiquitous Computing Chapter 6 Learning Objectives 1. Discuss the value-added attributes, benefits, and fundamental drivers of m-commerce. 2. Describe the mobile computing infrastructure
Smartphone Forensics Analysis: A Case Study
Smartphone Forensics Analysis: A Case Study Mubarak Al-Hadadi and Ali AlShidhani Abstract Smartphone forensics is a sub-set of digital forensics, and refers to the investigation and acquisition of artefacts
CERTIFIED DIGITAL FORENSICS EXAMINER
CERTIFIED DIGITAL FORENSICS EXAMINER KEY DATA Course Title: C)DFE Duration: 5 days CPE Credits: 40 Class Format Options: Instructor-led classroom Live Online Training Computer Based Training Who Should
CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner
CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner Binary Intelligence, LLC 150 Industrial Drive Franklin, Ohio 45005 Phone: 866.246.2794 x703 Email: [email protected] CERTIFICATIONS AND
A Survey of Existing Technologies, Applications, Products, and Services for Geofencing
Report to the US Department of Transportation Research and Innovative Technology Administration A Survey of Existing Technologies, Applications, Products, and Services for Geofencing California PATH Program
IBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
