Formal Education: Professional Qualifications: Professional Awards: Membership/Networking:

Size: px
Start display at page:

Download "Formal Education: Professional Qualifications: Professional Awards: Membership/Networking:"

Transcription

1

2 Formal Education: (some) 2006: Indonesian Advanced Police College Award: The Best Graduate in Academic 2009: MSc in Forensic Informatics, University of Strathclyde, UK Final Result: Distinction for Dissertation on Steganography Forensic Professional Qualifications: (some) 2004: Professional Commendation on Crime Scene Management from Senior Investigator (Retired) of New York Police, US 2005: Expert Degree on Computer Forensic from Puslabfor Polri 2007: Computer Hacking Forensic Investigator (CHFI) from EC-Council, US 2008: Certified EC-Council Instructor (CEI) from EC-Council, US 2009: Professional Member (MBCS) from British Computer Society, UK Professional Awards: (some) 2005: 8 year loyalty medal from Indonesian National Police 2008: British Chevening Scholarships Award from UK FCO 2010: Indonesian Super Six UK Alumni from British Council 2013: 16 year loyalty medal from the Republic of Indonesia Membership/Networking: (some) 2007: EC-Council 2009: British Computer Society 2010: Interpol Asian and South Pacific Working Party on IT Crime 2012: Manager of Digital Forensic Analyst Team Indonesia at LinkedIn 2013: Manager of ADFA (Association of Digital Forensic Analyst) at LinkedIn Association of Certified Fraud Examiners

3 Experience as Instructor/Speaker: (some) Indonesian Police Criminal Investigation Board (Bareskrim) Indonesian Police Education Institute (Lemdikpol) Indonesian Police Forensic Lab. Centre (Puslabfor) President Secretary Office of the Republic of Indonesia (Sespri Presiden RI) Indonesian General Attorney Training and Education Board (Badiklat Kejagung) Indonesian Ministry of Communication and Information (Kemenkominfo) Indonesian Ministry of Finance (Kemenkeu) Indonesian Corruption Eradication Commission (KPK) Indonesian State Intelligent Board (BIN) Indonesian Military Attaché in London, UK Banks such as Mandiri Bank, CIMB Niaga Bank, OCBC NISP Bank Universities: - University of Strathclyde, Glasgow, UK - University of Indonesia, Depok - University of Islamic Indonesia, Yogyakarta - Paramadina University, Jakarta - Krida Wacana University, Jakarta - Airlangga University, Surabaya - State Islamic University, Tangerang - Muhammadiyah University, Jember - State Crytptography Institute, Tangerang - State Polytechnic, Batam United Nations Office for Drugs and Crime (UNODC) Asian Pacific Computer Emergency Response Team (AP-CERT) EC-Council Indonesia Association of Certified Fraud Examiners (ACFE), etc.

4 Chief of Forensic Lab Centre Forensic Lab Branches: 6 Secretary Physics and Computer Forensic Dept. Ballistic and Metallurgy Forensic Dept. Document and Counterfeit Forensic Dept. Chemistry and Biology Forensic Dept. Narcotics Forensic Dept. Fire and Accidents Ballistic Document Chemistry Narcotics Special Detection Metallurgy Counterfeit Biology Psychotropic Computer Forensic Explosive Printed Product Toxicology Drugs

5 2000: Started to discuss about the significance of digital forensic to support examination on electronic evidence : Awards of EC-Council s Computer Hacking Forensic Investigator (CHFI) 2009: Award of MSc in Forensic Informatics from the University of Strathclyde, UK 2010: DFAT (Digital Forensic Analyst Team) was founded 2011: Computer Forensic Sub-Department was founded 2014: Computer Forensic Lab. in progress for ISO 17025

6 Computer Forensic Sub-Department Indonesian Police Forensic Laboratory Centre Number of Cases and Evidence, Number of Cases Number of Evidence

7 Computer Forensic Sub-Department Indonesian Police Forensic Laboratory Centre Types of Electronic Evidence, % 6% 40% 1% 3% 1% 35% Handphone/Modem/Tablet Simcard Memory Card PC/Laptop/External HD CD/DVD Flashdisk DVR

8 Computer Forensic Mobile Forensic Audio Forensic Video Forensic Digital Image Forensic Network Forensic

9

10 Mobile Networks 2G: GSM (Global System for Mobile Communication) for voice and text 2.5G: GPRS (Global Packet radio Service) for data with low speed transfer 160 Kbit per second 2.75G: EDGE (Enhanced Data rates for GSM Evolution) for data transfer 400 Kbps 3G: 3 rd Generation, data transfer 800 Kbps, good for video call 3.5G: HSDPA (High Speed Data Packet Access) for 14 Mbps 4G: 4 th Generation, for 1Gbps (in progress for whole implementation)

11 Coverage Area of BTS (Base Transceiver Station)

12 BSC (Base Station Controller) BTS Tower (Base Transceiver Station) MSC (Mobile Switching Centre) MSC (Mobile Switching Centre) BSC (Base Station Controller) BTS Tower (Base Transceiver Station) Cellular Operator A Cellular Operator B ME (Mobile Equipment) Caller A as MO (Mobile Originating) Network SS7 for Internet Access ME (Mobile Equipment) Receiver B as MT (Mobile Terminating)

13 Its main function is to switch telecommunication networks between one/two providers, or data networks between provider and SS7 for internet access To route calls or SMSs from MO to MT To route internet access from/to MO It has database of permanent HLR (Home Location Register) and VLR(Visitor Location Register) of the roaming subscribers It has database regarding with BTS-based subscriber location It has database of CDR (Calls Data Record) containing calls, SMSs, etc. As the location for lawful interceptor

14 Flash Memory External Memory EEPROM (Electronically Erasable and Programmable Read-Only Memory) SIM (Subscriber Identity Module) card RAM (Random Access Memory)

15 RAM (Random Access Memory) Date/Time (mostly old fashioned) Current running applications EEPROM (Electronically Erasable Programmable ROM) Date/Time (latest fashioned) Manufacturer s data: merk, model, version, etc. IMEI (International Mobile Electronic Identifier) Operating System and Software

16 Flash Memory SMS messages Contacts MMS messages Incoming Calls Dialed Calls Missed Calls Calendar Tasks Files, etc.

17 SIM Card IMSI (International Mobile Subscriber Identity) ICCID (Integrated Circuit Card ID) Contacts SMS messages Dialed calls

18 IMSI = 3 digits of MCC (Mobile Country Code) + 2 digits of MNC (Mobile Network Code) digits of MSIN (Mobile Subscription Id. Number) ICCID = 2 digits of MII (Major Industry Identifier: 89 for telp.) digits of Country Code (62 for Indonesia) digits of Issuer Identifier + remaining digits for administrative of provider

19 External Memory Digital image files Video files Audio files Office files Notes, etc.

20 MSC of Operator MSISDN (Mobile Subscribers Identity Services Digital Network) Voice mails CDR (Call Data Records): calls, SMSs, etc. BTS-based location HLR (Home Location Register) VLR (Visitor Location Register) Logs of SS7 network SMS Centre, etc.

21 Various OS: Symbian, Windows Mobile, Blackberry, Android, ios, etc. Applications: limited depending on the OS and make/model It requires SOP (Standard Operating Procedure) as well as other digital forensic branches, to guide all processes done properly Connection: Data Cable Bluetooth Infra Red Forensic Tools: Hardware-based Software-based

22 Hardware-based Tools: (some) UFED of Cellebrite XRY of Microsystemation

23 Software-based Tools: (some) Oxygen Forensic Mobile Field Kit of Paraben s Device Seizure Mobiledit Forensic

24 Physical acquisition is based on sectors of memory, while logical acquisition is based on file system Logical acquisition is faster than physical acquisition Physical can retrieve any information stored in the memory, including deleted data such as deleted SMSs, calls, chats, s, contacts, etc. Logical can only retrieve available data of file system, excluding deleted data. Logical is less sensitive than physical Logical is wider than physical in phone database which can be accessed Physical is firstly performed. If it fails, then do logical

25

26 Do not switch the handphone evidence off, leave it ON In the case of no forensic analyst, switch it off to avoid contamination. The procedure will use the OFF condition Document it by taking forensic photography and date/time as well as specification such as make, model and IMEI by pressing *#06# IMEI = mobile equipment ID number For avoiding contamination, setting up an area without radio signal by jammer or Faraday bag, or switch the handphone into flight mode

27 Prepare analysis workstation with drivers installed and write-protect or prepare portable forensic analysis device Attach the handphone evidence to the workstation/device If possible, do physical acquisition at first, otherwise do logical Physical acquisition/analysis can retrieve deleted data When it finishes, switch it off then pull out the battery Verify the IMEI on the back with the previous one

28 Take simcard, and take a note its make and ICCID, then put it into simcard reader ICCID = administrative numbers of cellular operator Attach the reader to the workstation/device Do physical analysis for the best results Take a note IMSI = authentication numbers When it finishes, put the simcard and battery back to the handphone, do not switch it on

29 If the handphone has external memory card, pull out the card, then put it in the memory card reader Attach the reader to the workstation Do forensic imaging, then verify the md5 hash Search the contents of the card by mounting it physically/logically, or do physical/logical recovery directly on the image When it finishes, put it back to the handphone Comprehensive findings and analysis is confirmed to the investigators in order to configure it out for solving the case

30 Do not switch it ON Take photograph and a note about its make, model and IMEI Pull the simcard out, then do physical acquisition/analysis as the same as the ON condition If external memory is available, do the same as the ON condition Technical procedures are almost the same as the ON condition. The differences: Simcard and memory card acquisition/analysis is performed firstly At last, put the simcard and memory card back to the handphone, then switch it ON. The procedure will be the same as the ON condition

31 Mobile-related electronic evidence: MOBILE PHONE, SIMCARD and MEMORY CARD One of digital forensic measures: MOBILE FORENSIC Mechanism of forensic data: FLASH MEMORY, EXTERNAL MEMORY, SIM CARD, EEPROM and RAM Analysis methodologies: PHYSICAL and LOGICAL

32

33

34

Formal Education: Professional Qualifications: Professional Awards: Membership/Networking:

Formal Education: Professional Qualifications: Professional Awards: Membership/Networking: Formal Education: (some) 2006: Indonesian Advanced Police College Award: The Best Graduate in Academic 2009: MSc in Forensic Informatics, University of Strathclyde, UK Final Result: Distinction for Dissertation

More information

An Example of Mobile Forensics

An Example of Mobile Forensics An Example of Mobile Forensics Kelvin Hilton K319 kchilton@staffsacuk k.c.hilton@staffs.ac.uk www.soc.staffs.ac.uk/kch1 Objectives The sources of evidence The subscriber The mobile station The network

More information

Global System for Mobile Communication Technology

Global System for Mobile Communication Technology Global System for Mobile Communication Technology Mobile Device Investigations Program Technical Operations Division DHS - FLETC GSM Technology Global System for Mobile Communication or Groupe Special

More information

Cellebrite UFED Physical Pro Cell Phone Extraction Guide

Cellebrite UFED Physical Pro Cell Phone Extraction Guide Cellebrite UFED Physical Pro Cell Phone Extraction Guide By Colby Lahaie Patrick Leahy Center for Digital Investigation Champlain College May 16, 2012 Table of Contents 1 Introduction... 2 1.1 Research

More information

Smartphone Forensics Analysis: A Case Study

Smartphone Forensics Analysis: A Case Study Smartphone Forensics Analysis: A Case Study Mubarak Al-Hadadi and Ali AlShidhani Abstract Smartphone forensics is a sub-set of digital forensics, and refers to the investigation and acquisition of artefacts

More information

Mobile Communications

Mobile Communications October 21, 2009 Agenda Topic 2: Case Study: The GSM Network 1 GSM System General Architecture 2 GSM Access network. 3 Traffic Models for the Air interface 4 Models for the BSS design. 5 UMTS and the path

More information

EAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server

EAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server Application Note EAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server Introduction The demand for wireless LAN (WLAN) access to the public IP network is growing rapidly. It is only

More information

Mobile Device Forensics. Rick Ayers

Mobile Device Forensics. Rick Ayers Mobile Device Forensics Rick Ayers Disclaimer Certain commercial entities, equipment, or materials may be identified in this presentation in order to describe an experimental procedure or concept adequately.

More information

GSM v. CDMA: Technical Comparison of M2M Technologies

GSM v. CDMA: Technical Comparison of M2M Technologies GSM v. CDMA: Technical Comparison of M2M Technologies Introduction Aeris provides network and data analytics services for Machine-to- Machine ( M2M ) and Internet of Things ( IoT ) applications using multiple

More information

The GSM and GPRS network T-110.300/301

The GSM and GPRS network T-110.300/301 The GSM and GPRS network T-110.300/301 History The successful analog 1:st generation mobile telephone systems proved that there is a market for mobile telephones ARP (AutoRadioPuhelin) in Finland NMT (Nordic

More information

Test Results for Mobile Device Acquisition Tool: Lantern v2.3

Test Results for Mobile Device Acquisition Tool: Lantern v2.3 FEB. 203 U.S. Department of Justice Office of Justice Programs National Institute of Justice Special RepoRt Test Results for Mobile Device Acquisition Tool: Lantern v2.3 nij.gov Office of Justice Programs

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Cyber Security Training & Consulting Certified Digital COURSE OVERVIEW 5 Days 40 CPE Credits $3,000 Digital is the investigation and recovery of data contained in digital devices. This data is often the

More information

1 Test Results for Mobile Device Acquisition Tool viaextract v2.5

1 Test Results for Mobile Device Acquisition Tool viaextract v2.5 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 1 Test s for Mobile Device Acquisition Tool viaextract v2.5 The main item of interest for interpreting the test results is determining the conformance of the tool under

More information

Mobile Phone Forensic Analysis

Mobile Phone Forensic Analysis Mobile Phone Forensic Analysis Kevin Curran *, Andrew Robinson, Stephen Peacocke, Sean Cassidy Intelligent Systems Research Centre Faculty of Computing and Engineering, University of Ulster, Northern Ireland,

More information

2 System introduction

2 System introduction 2 System introduction Objectives After this chapter the student will: be able to describe the different nodes in a GSM network. be able to describe geographical subdivision of a GSM network. be able to

More information

!!! "# $ % & & # ' (! ) * +, -!!. / " 0! 1 (!!! ' &! & & & ' ( 2 3 0-4 ' 3 ' Giuseppe Bianchi

!!! # $ % & & # ' (! ) * +, -!!. /  0! 1 (!!! ' &! & & & ' ( 2 3 0-4 ' 3 ' Giuseppe Bianchi !!! "# $ % & & # ' (! ) * +, -!!. / " 0! 1 (!!! ' &! & & & ' ( 2 3 0-4 ' 3 ' "#$!!% "&'! #&'!%! () *+,, 3 & 5 &,! #-!*! ' & '.! #%!* //!! & (0)/!&/, 6 5 /, "! First system: NMT-450 (Nordic Mobile Telephone)

More information

Mobile memory dumps, MSAB and MPE+ Data collection Information recovery Analysis and interpretation of results

Mobile memory dumps, MSAB and MPE+ Data collection Information recovery Analysis and interpretation of results Mobile memory dumps, MSAB and MPE+ Data collection Information recovery Analysis and interpretation of results Physical Extraction Physical extraction involves either Removing chips from circuit board

More information

Information Technologies and Fraud

Information Technologies and Fraud Information Technologies and Fraud Florin Gogoasa CISA, CFE, CGEIT, CRISC ACFE Romania - Founder and Board member Managing Partner Blue Lab Consulting Information Technologies for Fraud investigation A.

More information

Ch 2.3.3 GSM PENN. Magda El Zarki - Tcom 510 - Spring 98

Ch 2.3.3 GSM PENN. Magda El Zarki - Tcom 510 - Spring 98 Ch 2.3.3 GSM In the early 80 s the European community decided to work together to define a cellular system that would permit full roaming in all countries and give the network providers freedom to provide

More information

TECHNICAL OPERATIONS DIVISION LESSON PLAN

TECHNICAL OPERATIONS DIVISION LESSON PLAN U.S. DEPARTMENT OF HOMELAND SECURITY FEDERAL LAW ENFORCEMENT TRAINING CENTER OFFICE OF TRAINING OPERATIONS TECHNICAL OPERATIONS DIVISION LESSON PLAN CELL PHONE INVESTIGATIONS 3001 SEP/10 WARNING This document

More information

Worldwide attacks on SS7 network

Worldwide attacks on SS7 network Worldwide attacks on SS7 network P1 Security Hackito Ergo Sum 26 th April 2014 Pierre-Olivier Vauboin (po@p1sec.com) Alexandre De Oliveira (alex@p1sec.com) Agenda Overall telecom architecture Architecture

More information

CERTIFIED DIGITAL FORENSICS EXAMINER

CERTIFIED DIGITAL FORENSICS EXAMINER CERTIFIED DIGITAL FORENSICS EXAMINER KEY DATA Course Title: C)DFE Duration: 5 days CPE Credits: 40 Class Format Options: Instructor-led classroom Live Online Training Computer Based Training Who Should

More information

Case Study: Smart Phone Deleted Data Recovery

Case Study: Smart Phone Deleted Data Recovery Case Study: Smart Phone Deleted Data Recovery Company profile McCann Investigations is a full service private investigations firm providing complete case solutions by employing cutting-edge computer forensics

More information

CELLULAR PHONE EVIDENCE DATA EXTRACTION & DOCUMENTATION DET. CINDY MURPHY

CELLULAR PHONE EVIDENCE DATA EXTRACTION & DOCUMENTATION DET. CINDY MURPHY CELLULAR PHONE EVIDENCE DATA EXTRACTION & DOCUMENTATION DET. CINDY MURPHY DEVELOPING PROCESS FOR THE EXAMINATION OF CELLULAR PHONE EVIDENCE Digital forensic examiners have seen a remarkable increase in

More information

Agenda 22 maj Micro Systemation vad gör vi? XRY video. Micro Systemation AB. XRY Korta fakta. XRY Video. Mobiltelefoner som bevis.

Agenda 22 maj Micro Systemation vad gör vi? XRY video. Micro Systemation AB. XRY Korta fakta. XRY Video. Mobiltelefoner som bevis. Mobiltelefoner som bevis i brottsmål Thomas Renman Micro Systemation AB thomas.renman@msab.com Agenda 22 maj Micro Systemation vad gör vi? XRY video Mobiltelefoner som bevis i brottsmål Vad kan man hitta

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student

More information

Developing Process for Mobile Device Forensics

Developing Process for Mobile Device Forensics Developing Process for Mobile Device Forensics Det. Cynthia A. Murphy Abstract With the growing demand for examination of cellular phones and other mobile devices, a need has also developed for the development

More information

Solution for Non-Repudiation in GSM WAP Applications

Solution for Non-Repudiation in GSM WAP Applications Solution for Non-Repudiation in GSM WAP Applications CRISTIAN TOMA, MARIUS POPA, CATALIN BOJA Economic Informatics Department Academy of Economic Studies Romana Square No. 6, Bucharest ROMANIA cristian.toma@ie.ase.ro

More information

Indian Journal of Advances in Computer & Information Engineering Volume.1 Number.1 January-June 2013, pp.1-5 @ Academic Research Journals.

Indian Journal of Advances in Computer & Information Engineering Volume.1 Number.1 January-June 2013, pp.1-5 @ Academic Research Journals. Cellular System Rajat Chugh, Parag Jasoria, Tushar Arora, Nitin Ginotra and Vivek Anand V Semester, Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas, Farukhnagar,

More information

Vehicle Scrutinizing using GPS & GSM Technologies Implemented with Ardunio controller

Vehicle Scrutinizing using GPS & GSM Technologies Implemented with Ardunio controller Vehicle Scrutinizing using GPS & GSM Technologies Implemented with Ardunio controller A.Kalaiarasi 1, Raviram.P 2, Prabakaran. P M 3, ShanthoshKumar.K 4, Dheeraj B P 5 Assistant Professor, Dept. of EEE,

More information

Case Study: Mobile Device Forensics in Texting and Driving Cases

Case Study: Mobile Device Forensics in Texting and Driving Cases Case Study: Mobile Device Forensics in Texting and Driving Cases Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge

More information

ETSI ETR 363 TECHNICAL January 1997 REPORT

ETSI ETR 363 TECHNICAL January 1997 REPORT ETSI ETR 363 TECHNICAL January 1997 REPORT Source: ETSI TC-SMG Reference: DTR/SMG-101020Q ICS: 33.020 Key words: Digital cellular telecommunications system, Global System for Mobile communications (GSM)

More information

Mobile SMS and Data Roaming Explained

Mobile SMS and Data Roaming Explained Mobile SMS and Data Roaming Explained Mobile SMS and data roaming explained Roaming is the ability of customers to use their mobile phones or other mobile devices outside the geographical coverage area

More information

Free University of Bozen/Bolzano Faculty of Computer Science. Thesis

Free University of Bozen/Bolzano Faculty of Computer Science. Thesis Free University of Bozen/Bolzano Faculty of Computer Science Thesis A Computational Forensic Methodology for Malicious Application Detection on Android OS Svetlana Voronkova Submitted in partial fulfillment

More information

Mobile Phone Terminology Simplifying telecoms management

Mobile Phone Terminology Simplifying telecoms management Mobile Phone Terminology Simplifying telecoms management _ 3G The next generation mobile network, launched in the UK in March 2003, pushed heavily by the company, Hutchison 3. The other major networks

More information

1. 8,5 million Km 2. 2. +/- 17.000 Km (PEFRON). 3. +/- 10.000 Km: Coast. 4. 190+ million people. 5. Federative Republic: I. Federal Government.

1. 8,5 million Km 2. 2. +/- 17.000 Km (PEFRON). 3. +/- 10.000 Km: Coast. 4. 190+ million people. 5. Federative Republic: I. Federal Government. MINISTRY OF JUSTICE NATIONAL SECRETARY FOR PUBLIC SECURITY PROJECTS, PROGRAMS AND POLICY DEPARTMENTE (DEPRO) NATIONAL COORDINATION FOR FORENSIC ISSUES: (FORENSIC INVESTIGATION, FORENSIC SCIENCES) - Criminalistics,

More information

Using an approximated One-Time Pad to Secure Short Messaging Service (SMS)

Using an approximated One-Time Pad to Secure Short Messaging Service (SMS) Using an approximated One-Time Pad to Secure Short Messaging Service (SMS) N.J Croft and M.S Olivier Information and Computer Security Architectures (ICSA) Research Group Department of Computer Science

More information

INTEGRITY FORENSICS. Where the Evidence Tells the Truth. Charles M. Pruitt 2545 Bellwood Road Richmond, Virginia 23237 chuck@integrity-forensics.

INTEGRITY FORENSICS. Where the Evidence Tells the Truth. Charles M. Pruitt 2545 Bellwood Road Richmond, Virginia 23237 chuck@integrity-forensics. Charles M. Pruitt 2545 Bellwood Road Richmond, Virginia 23237 chuck@integrity-forensics.com My career began in 1975 with the Newport News Police Department; within four years I was promoted to Detective

More information

GSM Architecture Training Document

GSM Architecture Training Document Training Document TC Finland Nokia Networks Oy 1 (20) The information in this document is subject to change without notice and describes only the product defined in the introduction of this documentation.

More information

C E L L U L A R P H O N E E V I D E N C E DATA EXTRACTION AND DOCUMENTATION DET. CINDY MURPHY

C E L L U L A R P H O N E E V I D E N C E DATA EXTRACTION AND DOCUMENTATION DET. CINDY MURPHY C E L L U L A R P H O N E E V I D E N C E DATA EXTRACTION AND DOCUMENTATION DET. CINDY MURPHY DEVELOPING PROCESS FOR THE EXAMINATION OF CELLULAR PHONE EVIDENCE Recently, digital forensic examiners have

More information

Locating Mobile Phones using Signalling System #7. Tobias Engel <tobias@ccc.de> twitter: @2b_as

Locating Mobile Phones using Signalling System #7. Tobias Engel <tobias@ccc.de> twitter: @2b_as Locating Mobile Phones using Signalling System #7 Tobias Engel twitter: @2b_as What is Signalling System #7? protocol suite used by most telecommunications operators throughout the world

More information

Mobile Computing. Basic Call Calling terminal Network Called terminal 10/25/14. Public Switched Telephone Network - PSTN. CSE 40814/60814 Fall 2014

Mobile Computing. Basic Call Calling terminal Network Called terminal 10/25/14. Public Switched Telephone Network - PSTN. CSE 40814/60814 Fall 2014 Mobile Computing CSE 40814/60814 Fall 2014 Public Switched Telephone Network - PSTN Transit switch Transit switch Long distance network Transit switch Local switch Outgoing call Incoming call Local switch

More information

Staffing Positions by Programmes / Sub-Programmes 123

Staffing Positions by Programmes / Sub-Programmes 123 FORENSIC SCIENCE LABORATORY Page PART A : OVERVIEW OF MINISTRY/DEPARTMENT Strategic Note 117 Major Achievements for 2011 117 Major Constraints and Challenges and how they are being addressed 118 Strategic

More information

Mobile Wireless Overview

Mobile Wireless Overview Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure

More information

9.1 Introduction. 9.2 Roaming

9.1 Introduction. 9.2 Roaming 9 Location Updating Objectives After this chapter the student will: be able to define the concepts of roaming and location updating. be able to name the different types of location updating and why they

More information

Forensics and the GSM mobile telephone system

Forensics and the GSM mobile telephone system Forensics and the GSM mobile telephone system Abstract Svein Yngvar Willassen, M.Sc, Senior Investigator, Computer Forensics, Ibas AS The GSM system has become the most popular system for mobile communication

More information

Wireless Mobile Telephony

Wireless Mobile Telephony Wireless Mobile Telephony The Ohio State University Columbus, OH 43210 Durresi@cis.ohio-state.edu http://www.cis.ohio-state.edu/~durresi/ 1 Overview Why wireless mobile telephony? First Generation, Analog

More information

Cellular Technology Sections 6.4 & 6.7

Cellular Technology Sections 6.4 & 6.7 Overview Cellular Technology Sections 6. & 6.7 CSC 9 December, 0 Cellular architecture evolution Cellular telephony and internet terminology Mobility for cellular mobiles 6- Components of cellular architecture

More information

Global System for Mobile Communications (GSM)

Global System for Mobile Communications (GSM) Global System for Mobile Communications (GSM) Nguyen Thi Mai Trang LIP6/PHARE Thi-Mai-Trang.Nguyen@lip6.fr UPMC/PUF - M2 Networks - PTEL 1 Outline Principles of cellular networks GSM architecture Security

More information

1 Introduction. 2 Assumptions. Implementing roaming for OpenBTS

1 Introduction. 2 Assumptions. Implementing roaming for OpenBTS Implementing roaming for OpenBTS 1 Introduction One of the main advantages of OpenBTS TM system architecture is absence of a legacy GSM core network. SIP is used for registering, call control and messaging.

More information

SPYTEC 3000 The system for GSM communication monitoring

SPYTEC 3000 The system for GSM communication monitoring SPYTEC 3000 The system for GSM communication monitoring The SPYTEC 3000 system is intended for passive (if system encryption is absent of if A5.2 encryption is used) or semi-active (if A5.1 encryption

More information

GSM GSM 03.07 TECHNICAL November 1996 SPECIFICATION Version 5.0.0

GSM GSM 03.07 TECHNICAL November 1996 SPECIFICATION Version 5.0.0 GSM GSM 03.07 TECHNICAL November 1996 SPECIFICATION Version 5.0.0 Source: ETSI TC-SMG Reference: TS/SMG-030307Q ICS: 33.020 Key words: Digital cellular telecommunications system, Global System for Mobile

More information

Design and Implementation of Forensic System in Android Smart Phone

Design and Implementation of Forensic System in Android Smart Phone Design and Implementation of Forensic System in Android Smart Phone Xinfang Lee 1, Chunghuang Yang 1 2, Shihj en Chen, Jainshing Wu 2 1 Graduate Institute of Information and computer Education National

More information

Validating Tools for Cell Phone Forensics

Validating Tools for Cell Phone Forensics Validating Tools for Cell Phone Forensics Neil Bhadsavle and Ju An Wang Southern Polytechnic State University 1100 South Marietta Parkway Marietta, GA 30060 (01) 678-915-3718 {nbhadsav, jwang}@spsu.edu

More information

NEW RESEARCH DIRECTIONS IN THE AREA OF SMART PHONE FORENSIC ANALYSIS

NEW RESEARCH DIRECTIONS IN THE AREA OF SMART PHONE FORENSIC ANALYSIS NEW RESEARCH DIRECTIONS IN THE AREA OF SMART PHONE FORENSIC ANALYSIS Firdous Kausar Department of Computer Science, College of Computer and Information Sciences, Imam University, Riyadh, Saudi Arabia.

More information

Comprehensive Digital Forensic Solutions www.paraben.com

Comprehensive Digital Forensic Solutions www.paraben.com Comprehensive Digital Forensic Solutions www.paraben.com Mobile Device Forensic & Security Concerns Presenter Are we addicted? The Best Approach Cases Devices Everywhere PDA Devices Mobile Phones Hybrids

More information

MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1

MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1 MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:

More information

Wireless Cellular Networks: 1G and 2G

Wireless Cellular Networks: 1G and 2G Wireless Cellular Networks: 1G and 2G Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Audio/Video recordings of this lecture are available

More information

Cell Phone Forensics For Legal Professionals

Cell Phone Forensics For Legal Professionals 1 Cell Phone Forensics For Legal Professionals Lars E. Daniel, EnCE, ACE, AME, CTNS, SCE, SCCM, SCA Digital Forensics Examiner Cell Phone Acquisition and Examination Collection and Acquiring Cell Phones

More information

Theory and Practice. IT-Security: GSM Location System Syslog XP 3.7. Mobile Communication. December 18, 2001. GSM Location System Syslog XP 3.

Theory and Practice. IT-Security: GSM Location System Syslog XP 3.7. Mobile Communication. December 18, 2001. GSM Location System Syslog XP 3. Participant: Hack contacting... IT-Security: Theory and Practice Mobile Communication December 18, 2001 Uwe Jendricke uwe@iig.uni-freiburg.de Lecture Homepage: http://www.informatik.uni-freiburg.de/~softech/teaching/ws01/itsec/

More information

Protecting Mobile Networks from SS7 Attacks. Telesoft White Papers

Protecting Mobile Networks from SS7 Attacks. Telesoft White Papers Protecting Mobile Networks from SS7 Attacks Telesoft White Papers Christian Feest 23rd June 2015 SS7 Networks The Challenge The problem with the current SS7 system is that messages can be altered, injected

More information

TELECOMMUNICATIONS REGULATORY AUTHORITY BAHRAIN. Bahrain Number Portability Implementation Routing and Charging specification

TELECOMMUNICATIONS REGULATORY AUTHORITY BAHRAIN. Bahrain Number Portability Implementation Routing and Charging specification TELECOMMUNICATIONS REGULATORY AUTHORITY BAHRAIN Bahrain Number Portability Implementation Routing and Charging specification Version: 0.4 Status: draft Date: 4-0-00 Modification History Issue Date Modification

More information

MOBILE TECHNOLOGIES AND DISTANCE EDUCATION

MOBILE TECHNOLOGIES AND DISTANCE EDUCATION MOBILE TECHNOLOGIES AND DISTANCE EDUCATION Rostislav Fojtik, Hashim Habiballa Abstract: Rapid advancement of information and communication technologies enables to produce more mobile devices. Most of distance

More information

OXYGEN FORENSIC SUITE 2010 GETTING STARTED

OXYGEN FORENSIC SUITE 2010 GETTING STARTED OXYGEN SOFTWARE OXYGEN FORENSIC SUITE 2010 GETTING STARTED 2000-2010 Oxygen Software http://www.oxygen-forensic.com Table of contents Table of contents...2 General information...3 Installation...5 Extracting

More information

1G to 4G. Overview. Presentation By Rajeev Bansal Director(Mobile-1) Telecommunication Engineering Centre

1G to 4G. Overview. Presentation By Rajeev Bansal Director(Mobile-1) Telecommunication Engineering Centre 1G to 4G Overview Presentation By Rajeev Bansal Director(Mobile-1) Telecommunication Engineering Centre Mobile Networks differentiated from each other by the word Generation 1G, 2G, 2.5G, 2.75G, 3G milestones

More information

Using Mobiles for On Campus Location Tracking

Using Mobiles for On Campus Location Tracking Using Mobiles for On Campus Location Tracking F. Aloul A. Sagahyroon A. Al-Shami I. Al-Midfa R. Moutassem American University of Sharjah P.O. Box 26666, Sharjah, UAE {faloul, asagahyroon, b00020906, b00020142,

More information

Guidelines on Digital Forensic Procedures for OLAF Staff

Guidelines on Digital Forensic Procedures for OLAF Staff Ref. Ares(2013)3769761-19/12/2013 Guidelines on Digital Forensic Procedures for OLAF Staff 1 January 2014 Introduction The OLAF Guidelines on Digital Forensic Procedures are internal rules which are to

More information

Manual for USB, GPRS Modem

Manual for USB, GPRS Modem Manual for USB, GPRS Modem Thank you for using this product for your application. Within this manual, you can find 3 major sections : Hardware, Software and AT command sets. Hardware is for you to understand

More information

Welcome to. Vodafone

Welcome to. Vodafone Welcome to Vodafone 1 Contents 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Welcome Your SIM card Making calls Voicemail SMS & MMS International Internet on your mobile phone Fax service Useful definitions Any questions?

More information

Informatica forense. Mobile Forensics - Approfondimenti tecnici e particolarità degli smartphone

Informatica forense. Mobile Forensics - Approfondimenti tecnici e particolarità degli smartphone Informatica forense Mobile Forensics - Approfondimenti tecnici e particolarità degli smartphone A cura di Matteo Brunati Udine, 11 maggio 2015 Me, Myself & I IT Security consultant Design & development

More information

Sierra Wireless AirCard Watcher Help for Mac OS X

Sierra Wireless AirCard Watcher Help for Mac OS X Sierra Wireless AirCard Watcher Help for Mac OS X Sierra Wireless AirCard Watcher allows you to manage and monitor the connection between your modem and the network. With Watcher, you can: Determine signal

More information

Teltonika FM41XX. Configurator v. 1.0

Teltonika FM41XX. Configurator v. 1.0 Teltonika FM41XX Configurator v. 1.0 1. First steps Connect Teltonika FM41XX (PIN1 for plus and PIN11 ground ) to the voltage supply 10-30 V as shown below and GPS, GSM antennas. (GSM is long and thin,

More information

Dell NetReady Mobile Broadband Service User's Guide

Dell NetReady Mobile Broadband Service User's Guide Dell NetReady Mobile Broadband Service User's Guide Introduction Quick Start Service Coverage Frequently Asked Questions Glossary Information in this document is subject to change without notice. Introduction:

More information

SMS Application Note. SIM5360_SMS_Application_Note_V0.01

SMS Application Note. SIM5360_SMS_Application_Note_V0.01 SMS Application Note 0 Document Title: SIM5360 SMS Application Note Version: 0.01 Date: 2014-02-21 Status: Document ID: Developing General Notes Simcom offers this information as a service to its customers,

More information

BLU Vivo 4.3 User Manual

BLU Vivo 4.3 User Manual BLU Vivo 4.3 User Manual 1 Table of Contents Phone Safety Information... 3 Appearance and Key Functions... 4 Installation and Charging... 5 Phone Operation... 7 Communication... 10 Camera... 11 Gallery...

More information

Cell Phone Science. Criminal Advocacy Program. Financial Advisory Services. October 10, 2014

Cell Phone Science. Criminal Advocacy Program. Financial Advisory Services. October 10, 2014 Cell Phone Science Criminal Advocacy Program October 10, 2014 Financial Advisory Services Select Professionals Brian A. Rosenthal, CISSP, EnCE Brian A. Rosenthal is a Digital Forensic Manager in the Computer

More information

Handoff in GSM/GPRS Cellular Systems. Avi Freedman Hexagon System Engineering

Handoff in GSM/GPRS Cellular Systems. Avi Freedman Hexagon System Engineering Handoff in GSM/GPRS Cellular Systems Avi Freedman Hexagon System Engineering Outline GSM and GSM referemce model GPRS basics Handoffs GSM GPRS Location and Mobility Management Re-selection and routing

More information

How To Understand The Gsm And Mts Mobile Network Evolution

How To Understand The Gsm And Mts Mobile Network Evolution Mobile Network Evolution Part 1 GSM and UMTS GSM Cell layout Architecture Call setup Mobility management Security GPRS Architecture Protocols QoS EDGE UMTS Architecture Integrated Communication Systems

More information

GSM System Architecture

GSM System Architecture Intersystem Operation and Mobility Management David Tipper Associate Professor Graduate Program in Telecommunications and Networking University it of Pittsburgh Telcom 2700 Slides 6 http://www.tele.pitt.edu/tipper.html

More information

EFFICIENT FORENSIC TOOLS FOR HANDHELD DEVICES: A COMPREHENSIVE PERSPECTIVE

EFFICIENT FORENSIC TOOLS FOR HANDHELD DEVICES: A COMPREHENSIVE PERSPECTIVE EFFICIENT FORENSIC TOOLS FOR HANDHELD DEVICES: A COMPREHENSIVE PERSPECTIVE Somasheker Akkaladevi 1 1 Virginia State University Department of Computer Information Systems Petersburg, Virginia 23806, USA

More information

SMS Roaming Service and SMS Interworking Service

SMS Roaming Service and SMS Interworking Service SMS Roaming Service and SMS Interworking Service Takuya Shinozaki, Etsuko Matsubara, Masahiro Kadono and Mayumi Takahashi DoCoMo s SMS Roaming Service and SMS Interworking Service have been launched. It

More information

RECOVERING DELETED DATA FROM FAT PARTITIONS WITHIN MOBILE PHONE HANDSETS USING TRADITIONAL IMAGING TECHNIQUES

RECOVERING DELETED DATA FROM FAT PARTITIONS WITHIN MOBILE PHONE HANDSETS USING TRADITIONAL IMAGING TECHNIQUES RECOVERING DELETED DATA FROM FAT PARTITIONS WITHIN MOBILE PHONE HANDSETS USING TRADITIONAL IMAGING TECHNIQUES KEVIN MANSELL CONTROL-F LTD. KEVIN.MANSELL@CONTROLF.CO.UK DARREN LOLE & FIONA LITCHFIELD SERVICE

More information

Guide to Wireless Communications. Digital Cellular Telephony. Learning Objectives. Digital Cellular Telephony. Chapter 8

Guide to Wireless Communications. Digital Cellular Telephony. Learning Objectives. Digital Cellular Telephony. Chapter 8 Guide to Wireless Communications Digital Cellular Telephony Chapter 2 Learning Objectives Digital Cellular Telephony 3 Describe the applications that can be used on a digital cellular telephone Explain

More information

Piecing Digital Evidence Together. Service Information

Piecing Digital Evidence Together. Service Information Piecing Digital Evidence Together Service Information Services Overview Mobile and Tablet Forensics Mobile Phone Forensics is the legally tested and approved systematic examination of mobile phones, SIM

More information

Mobile Communications Chapter 4: Wireless Telecommunication Systems slides by Jochen Schiller with modifications by Emmanuel Agu

Mobile Communications Chapter 4: Wireless Telecommunication Systems slides by Jochen Schiller with modifications by Emmanuel Agu Mobile Communications Chapter 4: Wireless Telecommunication Systems slides by Jochen Schiller with modifications by Emmanuel Agu Market GSM Overview Services Sub-systems Components Prof. Dr.-Ing. Jochen

More information

Managing ios Devices. Andrew Wellington Division of Information The Australian National University XW11

Managing ios Devices. Andrew Wellington Division of Information The Australian National University XW11 Managing ios Devices Andrew Wellington Division of Information The Australian National University About Me Mac OS X Systems Administrator Division of Information (Central IT) Mostly manage servers (about

More information

NTRC Dominica April 28 to May 2, 2014 Fort Young Hotel

NTRC Dominica April 28 to May 2, 2014 Fort Young Hotel NTRC Dominica April 28 to May 2, 2014 Fort Young Hotel Mobile Networks Next Generation Mobile Networks Keith A. Benjamin Operations Manager South Cluster LIME (Cable & Wireless) Global Markets Global Markets

More information

Guidelines on Cell Phone Forensics

Guidelines on Cell Phone Forensics Special Publication 800-101 Sponsored by the Department of Homeland Security Guidelines on Cell Phone Forensics Recommendations of the National Institute of Standards and Technology Wayne Jansen Rick Ayers

More information

Global System for Mobile Communication (GSM)

Global System for Mobile Communication (GSM) Global System for Mobile Communication (GSM) Definition Global system for mobile communication (GSM) is a globally accepted standard for digital cellular communication. GSM is the name of a standardization

More information

Analysis of Methods for Mobile Device Tracking. David Nix Chief Scientific Advisor

Analysis of Methods for Mobile Device Tracking. David Nix Chief Scientific Advisor Analysis of Methods for Mobile Device Tracking David Nix Chief Scientific Advisor October 2013 Table of Contents 1. Document Purpose and Scope 3 2. Overview 3 2.1 Mobile Device Penetration 3 2.2 Mobile

More information

Lecture overview. History of cellular systems (1G) GSM introduction. Basic architecture of GSM system. Basic radio transmission parameters of GSM

Lecture overview. History of cellular systems (1G) GSM introduction. Basic architecture of GSM system. Basic radio transmission parameters of GSM Lecture overview History of cellular systems (1G) GSM introduction Basic architecture of GSM system Basic radio transmission parameters of GSM Analogue cellular systems 70 s In the early 70 s radio frequencies

More information

Mobile Networking. SS7 Network Architecture. Purpose. Mobile Network Signaling

Mobile Networking. SS7 Network Architecture. Purpose. Mobile Network Signaling Purpose The purpose of this white paper is to inform the reader about mobile networking technology. For further information, see. Mobile Network Signaling Telecommunications signaling is the transmission

More information

Mobile network security report: Poland

Mobile network security report: Poland Mobile network security report: Poland GSM Map Project gsmmap@srlabs.de Security Research Labs, Berlin February 2015 Abstract. Mobile networks differ widely in their protection capabilities against common

More information

Telecommunications and the Information Age ET108B. Cell Phone Network

Telecommunications and the Information Age ET108B. Cell Phone Network Telecommunications and the Information Age ET108B Cell Phone Network The Cellular Telephone Network Cellular Telephone Features Carrying Data Across the Cellular Network Satellite Telephone Service Cellular

More information

NUMBERING PLAN FOR SEYCHELLES TELECOMMUNICATION SERVICES (National Numbering Plan)

NUMBERING PLAN FOR SEYCHELLES TELECOMMUNICATION SERVICES (National Numbering Plan) NUMBERING PLAN FOR SEYCHELLES TELECOMMUNICATION SERVICES (National Numbering Plan) Produced by: Office of the President Department of Information Communications Technology Communications Division P.O.

More information

Chapter 10 VoIP for the Non-All-IP Mobile Networks

Chapter 10 VoIP for the Non-All-IP Mobile Networks Chapter 10 VoIP for the Non-All-IP Mobile Networks Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 10.1 GSM-IP: VoIP Service for GSM 256

More information

Are free Android virus scanners any good?

Are free Android virus scanners any good? Authors: Hendrik Pilz, Steffen Schindler Published: 10. November 2011 Version: 1.1 Copyright 2011 AV-TEST GmbH. All rights reserved. Postal address: Klewitzstr. 7, 39112 Magdeburg, Germany Phone +49 (0)

More information

Dimensioning and Deployment of GSM Networks

Dimensioning and Deployment of GSM Networks Case Study: Dimensioning and Deployment of GSM Networks Acknowledgement: some of these slides are based on originals and information kindly provided by Ian O Shea of Altobridge Ltd. 2011 1 GSM System Architecture

More information

Your Phone This section introduces you to the hardware of the device.

Your Phone This section introduces you to the hardware of the device. Your Phone This section introduces you to the hardware of the device. No. Items Functions 1 Earphone jack 2 Strap hole 3 LED / Speaker Use a headset for hands-free conversation or listening to music. It

More information