Formal Education: Professional Qualifications: Professional Awards: Membership/Networking:
|
|
- Noreen Washington
- 8 years ago
- Views:
Transcription
1
2 Formal Education: (some) 2006: Indonesian Advanced Police College Award: The Best Graduate in Academic 2009: MSc in Forensic Informatics, University of Strathclyde, UK Final Result: Distinction for Dissertation on Steganography Forensic Professional Qualifications: (some) 2004: Professional Commendation on Crime Scene Management from Senior Investigator (Retired) of New York Police, US 2005: Expert Degree on Computer Forensic from Puslabfor Polri 2007: Computer Hacking Forensic Investigator (CHFI) from EC-Council, US 2008: Certified EC-Council Instructor (CEI) from EC-Council, US 2009: Professional Member (MBCS) from British Computer Society, UK Professional Awards: (some) 2005: 8 year loyalty medal from Indonesian National Police 2008: British Chevening Scholarships Award from UK FCO 2010: Indonesian Super Six UK Alumni from British Council 2013: 16 year loyalty medal from the Republic of Indonesia Membership/Networking: (some) 2007: EC-Council 2009: British Computer Society 2010: Interpol Asian and South Pacific Working Party on IT Crime 2012: Manager of Digital Forensic Analyst Team Indonesia at LinkedIn 2013: Manager of ADFA (Association of Digital Forensic Analyst) at LinkedIn Association of Certified Fraud Examiners
3 Experience as Instructor/Speaker: (some) Indonesian Police Criminal Investigation Board (Bareskrim) Indonesian Police Education Institute (Lemdikpol) Indonesian Police Forensic Lab. Centre (Puslabfor) President Secretary Office of the Republic of Indonesia (Sespri Presiden RI) Indonesian General Attorney Training and Education Board (Badiklat Kejagung) Indonesian Ministry of Communication and Information (Kemenkominfo) Indonesian Ministry of Finance (Kemenkeu) Indonesian Corruption Eradication Commission (KPK) Indonesian State Intelligent Board (BIN) Indonesian Military Attaché in London, UK Banks such as Mandiri Bank, CIMB Niaga Bank, OCBC NISP Bank Universities: - University of Strathclyde, Glasgow, UK - University of Indonesia, Depok - University of Islamic Indonesia, Yogyakarta - Paramadina University, Jakarta - Krida Wacana University, Jakarta - Airlangga University, Surabaya - State Islamic University, Tangerang - Muhammadiyah University, Jember - State Crytptography Institute, Tangerang - State Polytechnic, Batam United Nations Office for Drugs and Crime (UNODC) Asian Pacific Computer Emergency Response Team (AP-CERT) EC-Council Indonesia Association of Certified Fraud Examiners (ACFE), etc.
4 Chief of Forensic Lab Centre Forensic Lab Branches: 6 Secretary Physics and Computer Forensic Dept. Ballistic and Metallurgy Forensic Dept. Document and Counterfeit Forensic Dept. Chemistry and Biology Forensic Dept. Narcotics Forensic Dept. Fire and Accidents Ballistic Document Chemistry Narcotics Special Detection Metallurgy Counterfeit Biology Psychotropic Computer Forensic Explosive Printed Product Toxicology Drugs
5 2000: Started to discuss about the significance of digital forensic to support examination on electronic evidence : Awards of EC-Council s Computer Hacking Forensic Investigator (CHFI) 2009: Award of MSc in Forensic Informatics from the University of Strathclyde, UK 2010: DFAT (Digital Forensic Analyst Team) was founded 2011: Computer Forensic Sub-Department was founded 2014: Computer Forensic Lab. in progress for ISO 17025
6 Computer Forensic Sub-Department Indonesian Police Forensic Laboratory Centre Number of Cases and Evidence, Number of Cases Number of Evidence
7 Computer Forensic Sub-Department Indonesian Police Forensic Laboratory Centre Types of Electronic Evidence, % 6% 40% 1% 3% 1% 35% Handphone/Modem/Tablet Simcard Memory Card PC/Laptop/External HD CD/DVD Flashdisk DVR
8 Computer Forensic Mobile Forensic Audio Forensic Video Forensic Digital Image Forensic Network Forensic
9
10 Mobile Networks 2G: GSM (Global System for Mobile Communication) for voice and text 2.5G: GPRS (Global Packet radio Service) for data with low speed transfer 160 Kbit per second 2.75G: EDGE (Enhanced Data rates for GSM Evolution) for data transfer 400 Kbps 3G: 3 rd Generation, data transfer 800 Kbps, good for video call 3.5G: HSDPA (High Speed Data Packet Access) for 14 Mbps 4G: 4 th Generation, for 1Gbps (in progress for whole implementation)
11 Coverage Area of BTS (Base Transceiver Station)
12 BSC (Base Station Controller) BTS Tower (Base Transceiver Station) MSC (Mobile Switching Centre) MSC (Mobile Switching Centre) BSC (Base Station Controller) BTS Tower (Base Transceiver Station) Cellular Operator A Cellular Operator B ME (Mobile Equipment) Caller A as MO (Mobile Originating) Network SS7 for Internet Access ME (Mobile Equipment) Receiver B as MT (Mobile Terminating)
13 Its main function is to switch telecommunication networks between one/two providers, or data networks between provider and SS7 for internet access To route calls or SMSs from MO to MT To route internet access from/to MO It has database of permanent HLR (Home Location Register) and VLR(Visitor Location Register) of the roaming subscribers It has database regarding with BTS-based subscriber location It has database of CDR (Calls Data Record) containing calls, SMSs, etc. As the location for lawful interceptor
14 Flash Memory External Memory EEPROM (Electronically Erasable and Programmable Read-Only Memory) SIM (Subscriber Identity Module) card RAM (Random Access Memory)
15 RAM (Random Access Memory) Date/Time (mostly old fashioned) Current running applications EEPROM (Electronically Erasable Programmable ROM) Date/Time (latest fashioned) Manufacturer s data: merk, model, version, etc. IMEI (International Mobile Electronic Identifier) Operating System and Software
16 Flash Memory SMS messages Contacts MMS messages Incoming Calls Dialed Calls Missed Calls Calendar Tasks Files, etc.
17 SIM Card IMSI (International Mobile Subscriber Identity) ICCID (Integrated Circuit Card ID) Contacts SMS messages Dialed calls
18 IMSI = 3 digits of MCC (Mobile Country Code) + 2 digits of MNC (Mobile Network Code) digits of MSIN (Mobile Subscription Id. Number) ICCID = 2 digits of MII (Major Industry Identifier: 89 for telp.) digits of Country Code (62 for Indonesia) digits of Issuer Identifier + remaining digits for administrative of provider
19 External Memory Digital image files Video files Audio files Office files Notes, etc.
20 MSC of Operator MSISDN (Mobile Subscribers Identity Services Digital Network) Voice mails CDR (Call Data Records): calls, SMSs, etc. BTS-based location HLR (Home Location Register) VLR (Visitor Location Register) Logs of SS7 network SMS Centre, etc.
21 Various OS: Symbian, Windows Mobile, Blackberry, Android, ios, etc. Applications: limited depending on the OS and make/model It requires SOP (Standard Operating Procedure) as well as other digital forensic branches, to guide all processes done properly Connection: Data Cable Bluetooth Infra Red Forensic Tools: Hardware-based Software-based
22 Hardware-based Tools: (some) UFED of Cellebrite XRY of Microsystemation
23 Software-based Tools: (some) Oxygen Forensic Mobile Field Kit of Paraben s Device Seizure Mobiledit Forensic
24 Physical acquisition is based on sectors of memory, while logical acquisition is based on file system Logical acquisition is faster than physical acquisition Physical can retrieve any information stored in the memory, including deleted data such as deleted SMSs, calls, chats, s, contacts, etc. Logical can only retrieve available data of file system, excluding deleted data. Logical is less sensitive than physical Logical is wider than physical in phone database which can be accessed Physical is firstly performed. If it fails, then do logical
25
26 Do not switch the handphone evidence off, leave it ON In the case of no forensic analyst, switch it off to avoid contamination. The procedure will use the OFF condition Document it by taking forensic photography and date/time as well as specification such as make, model and IMEI by pressing *#06# IMEI = mobile equipment ID number For avoiding contamination, setting up an area without radio signal by jammer or Faraday bag, or switch the handphone into flight mode
27 Prepare analysis workstation with drivers installed and write-protect or prepare portable forensic analysis device Attach the handphone evidence to the workstation/device If possible, do physical acquisition at first, otherwise do logical Physical acquisition/analysis can retrieve deleted data When it finishes, switch it off then pull out the battery Verify the IMEI on the back with the previous one
28 Take simcard, and take a note its make and ICCID, then put it into simcard reader ICCID = administrative numbers of cellular operator Attach the reader to the workstation/device Do physical analysis for the best results Take a note IMSI = authentication numbers When it finishes, put the simcard and battery back to the handphone, do not switch it on
29 If the handphone has external memory card, pull out the card, then put it in the memory card reader Attach the reader to the workstation Do forensic imaging, then verify the md5 hash Search the contents of the card by mounting it physically/logically, or do physical/logical recovery directly on the image When it finishes, put it back to the handphone Comprehensive findings and analysis is confirmed to the investigators in order to configure it out for solving the case
30 Do not switch it ON Take photograph and a note about its make, model and IMEI Pull the simcard out, then do physical acquisition/analysis as the same as the ON condition If external memory is available, do the same as the ON condition Technical procedures are almost the same as the ON condition. The differences: Simcard and memory card acquisition/analysis is performed firstly At last, put the simcard and memory card back to the handphone, then switch it ON. The procedure will be the same as the ON condition
31 Mobile-related electronic evidence: MOBILE PHONE, SIMCARD and MEMORY CARD One of digital forensic measures: MOBILE FORENSIC Mechanism of forensic data: FLASH MEMORY, EXTERNAL MEMORY, SIM CARD, EEPROM and RAM Analysis methodologies: PHYSICAL and LOGICAL
32
33
34
Formal Education: Professional Qualifications: Professional Awards: Membership/Networking:
Formal Education: (some) 2006: Indonesian Advanced Police College Award: The Best Graduate in Academic 2009: MSc in Forensic Informatics, University of Strathclyde, UK Final Result: Distinction for Dissertation
More informationAn Example of Mobile Forensics
An Example of Mobile Forensics Kelvin Hilton K319 kchilton@staffsacuk k.c.hilton@staffs.ac.uk www.soc.staffs.ac.uk/kch1 Objectives The sources of evidence The subscriber The mobile station The network
More informationGlobal System for Mobile Communication Technology
Global System for Mobile Communication Technology Mobile Device Investigations Program Technical Operations Division DHS - FLETC GSM Technology Global System for Mobile Communication or Groupe Special
More informationCellebrite UFED Physical Pro Cell Phone Extraction Guide
Cellebrite UFED Physical Pro Cell Phone Extraction Guide By Colby Lahaie Patrick Leahy Center for Digital Investigation Champlain College May 16, 2012 Table of Contents 1 Introduction... 2 1.1 Research
More informationSmartphone Forensics Analysis: A Case Study
Smartphone Forensics Analysis: A Case Study Mubarak Al-Hadadi and Ali AlShidhani Abstract Smartphone forensics is a sub-set of digital forensics, and refers to the investigation and acquisition of artefacts
More informationMobile Communications
October 21, 2009 Agenda Topic 2: Case Study: The GSM Network 1 GSM System General Architecture 2 GSM Access network. 3 Traffic Models for the Air interface 4 Models for the BSS design. 5 UMTS and the path
More informationEAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server
Application Note EAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server Introduction The demand for wireless LAN (WLAN) access to the public IP network is growing rapidly. It is only
More informationMobile Device Forensics. Rick Ayers
Mobile Device Forensics Rick Ayers Disclaimer Certain commercial entities, equipment, or materials may be identified in this presentation in order to describe an experimental procedure or concept adequately.
More informationGSM v. CDMA: Technical Comparison of M2M Technologies
GSM v. CDMA: Technical Comparison of M2M Technologies Introduction Aeris provides network and data analytics services for Machine-to- Machine ( M2M ) and Internet of Things ( IoT ) applications using multiple
More informationThe GSM and GPRS network T-110.300/301
The GSM and GPRS network T-110.300/301 History The successful analog 1:st generation mobile telephone systems proved that there is a market for mobile telephones ARP (AutoRadioPuhelin) in Finland NMT (Nordic
More informationTest Results for Mobile Device Acquisition Tool: Lantern v2.3
FEB. 203 U.S. Department of Justice Office of Justice Programs National Institute of Justice Special RepoRt Test Results for Mobile Device Acquisition Tool: Lantern v2.3 nij.gov Office of Justice Programs
More informationCertified Digital Forensics Examiner
Cyber Security Training & Consulting Certified Digital COURSE OVERVIEW 5 Days 40 CPE Credits $3,000 Digital is the investigation and recovery of data contained in digital devices. This data is often the
More information1 Test Results for Mobile Device Acquisition Tool viaextract v2.5
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 1 Test s for Mobile Device Acquisition Tool viaextract v2.5 The main item of interest for interpreting the test results is determining the conformance of the tool under
More informationMobile Phone Forensic Analysis
Mobile Phone Forensic Analysis Kevin Curran *, Andrew Robinson, Stephen Peacocke, Sean Cassidy Intelligent Systems Research Centre Faculty of Computing and Engineering, University of Ulster, Northern Ireland,
More information2 System introduction
2 System introduction Objectives After this chapter the student will: be able to describe the different nodes in a GSM network. be able to describe geographical subdivision of a GSM network. be able to
More information!!! "# $ % & & # ' (! ) * +, -!!. / " 0! 1 (!!! ' &! & & & ' ( 2 3 0-4 ' 3 ' Giuseppe Bianchi
!!! "# $ % & & # ' (! ) * +, -!!. / " 0! 1 (!!! ' &! & & & ' ( 2 3 0-4 ' 3 ' "#$!!% "&'! #&'!%! () *+,, 3 & 5 &,! #-!*! ' & '.! #%!* //!! & (0)/!&/, 6 5 /, "! First system: NMT-450 (Nordic Mobile Telephone)
More informationMobile memory dumps, MSAB and MPE+ Data collection Information recovery Analysis and interpretation of results
Mobile memory dumps, MSAB and MPE+ Data collection Information recovery Analysis and interpretation of results Physical Extraction Physical extraction involves either Removing chips from circuit board
More informationInformation Technologies and Fraud
Information Technologies and Fraud Florin Gogoasa CISA, CFE, CGEIT, CRISC ACFE Romania - Founder and Board member Managing Partner Blue Lab Consulting Information Technologies for Fraud investigation A.
More informationCh 2.3.3 GSM PENN. Magda El Zarki - Tcom 510 - Spring 98
Ch 2.3.3 GSM In the early 80 s the European community decided to work together to define a cellular system that would permit full roaming in all countries and give the network providers freedom to provide
More informationTECHNICAL OPERATIONS DIVISION LESSON PLAN
U.S. DEPARTMENT OF HOMELAND SECURITY FEDERAL LAW ENFORCEMENT TRAINING CENTER OFFICE OF TRAINING OPERATIONS TECHNICAL OPERATIONS DIVISION LESSON PLAN CELL PHONE INVESTIGATIONS 3001 SEP/10 WARNING This document
More informationWorldwide attacks on SS7 network
Worldwide attacks on SS7 network P1 Security Hackito Ergo Sum 26 th April 2014 Pierre-Olivier Vauboin (po@p1sec.com) Alexandre De Oliveira (alex@p1sec.com) Agenda Overall telecom architecture Architecture
More informationCERTIFIED DIGITAL FORENSICS EXAMINER
CERTIFIED DIGITAL FORENSICS EXAMINER KEY DATA Course Title: C)DFE Duration: 5 days CPE Credits: 40 Class Format Options: Instructor-led classroom Live Online Training Computer Based Training Who Should
More informationCase Study: Smart Phone Deleted Data Recovery
Case Study: Smart Phone Deleted Data Recovery Company profile McCann Investigations is a full service private investigations firm providing complete case solutions by employing cutting-edge computer forensics
More informationCELLULAR PHONE EVIDENCE DATA EXTRACTION & DOCUMENTATION DET. CINDY MURPHY
CELLULAR PHONE EVIDENCE DATA EXTRACTION & DOCUMENTATION DET. CINDY MURPHY DEVELOPING PROCESS FOR THE EXAMINATION OF CELLULAR PHONE EVIDENCE Digital forensic examiners have seen a remarkable increase in
More informationAgenda 22 maj Micro Systemation vad gör vi? XRY video. Micro Systemation AB. XRY Korta fakta. XRY Video. Mobiltelefoner som bevis.
Mobiltelefoner som bevis i brottsmål Thomas Renman Micro Systemation AB thomas.renman@msab.com Agenda 22 maj Micro Systemation vad gör vi? XRY video Mobiltelefoner som bevis i brottsmål Vad kan man hitta
More informationCertified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
More informationCertified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
More informationDeveloping Process for Mobile Device Forensics
Developing Process for Mobile Device Forensics Det. Cynthia A. Murphy Abstract With the growing demand for examination of cellular phones and other mobile devices, a need has also developed for the development
More informationSolution for Non-Repudiation in GSM WAP Applications
Solution for Non-Repudiation in GSM WAP Applications CRISTIAN TOMA, MARIUS POPA, CATALIN BOJA Economic Informatics Department Academy of Economic Studies Romana Square No. 6, Bucharest ROMANIA cristian.toma@ie.ase.ro
More informationIndian Journal of Advances in Computer & Information Engineering Volume.1 Number.1 January-June 2013, pp.1-5 @ Academic Research Journals.
Cellular System Rajat Chugh, Parag Jasoria, Tushar Arora, Nitin Ginotra and Vivek Anand V Semester, Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas, Farukhnagar,
More informationVehicle Scrutinizing using GPS & GSM Technologies Implemented with Ardunio controller
Vehicle Scrutinizing using GPS & GSM Technologies Implemented with Ardunio controller A.Kalaiarasi 1, Raviram.P 2, Prabakaran. P M 3, ShanthoshKumar.K 4, Dheeraj B P 5 Assistant Professor, Dept. of EEE,
More informationCase Study: Mobile Device Forensics in Texting and Driving Cases
Case Study: Mobile Device Forensics in Texting and Driving Cases Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge
More informationETSI ETR 363 TECHNICAL January 1997 REPORT
ETSI ETR 363 TECHNICAL January 1997 REPORT Source: ETSI TC-SMG Reference: DTR/SMG-101020Q ICS: 33.020 Key words: Digital cellular telecommunications system, Global System for Mobile communications (GSM)
More informationMobile SMS and Data Roaming Explained
Mobile SMS and Data Roaming Explained Mobile SMS and data roaming explained Roaming is the ability of customers to use their mobile phones or other mobile devices outside the geographical coverage area
More informationFree University of Bozen/Bolzano Faculty of Computer Science. Thesis
Free University of Bozen/Bolzano Faculty of Computer Science Thesis A Computational Forensic Methodology for Malicious Application Detection on Android OS Svetlana Voronkova Submitted in partial fulfillment
More informationMobile Phone Terminology Simplifying telecoms management
Mobile Phone Terminology Simplifying telecoms management _ 3G The next generation mobile network, launched in the UK in March 2003, pushed heavily by the company, Hutchison 3. The other major networks
More information1. 8,5 million Km 2. 2. +/- 17.000 Km (PEFRON). 3. +/- 10.000 Km: Coast. 4. 190+ million people. 5. Federative Republic: I. Federal Government.
MINISTRY OF JUSTICE NATIONAL SECRETARY FOR PUBLIC SECURITY PROJECTS, PROGRAMS AND POLICY DEPARTMENTE (DEPRO) NATIONAL COORDINATION FOR FORENSIC ISSUES: (FORENSIC INVESTIGATION, FORENSIC SCIENCES) - Criminalistics,
More informationUsing an approximated One-Time Pad to Secure Short Messaging Service (SMS)
Using an approximated One-Time Pad to Secure Short Messaging Service (SMS) N.J Croft and M.S Olivier Information and Computer Security Architectures (ICSA) Research Group Department of Computer Science
More informationINTEGRITY FORENSICS. Where the Evidence Tells the Truth. Charles M. Pruitt 2545 Bellwood Road Richmond, Virginia 23237 chuck@integrity-forensics.
Charles M. Pruitt 2545 Bellwood Road Richmond, Virginia 23237 chuck@integrity-forensics.com My career began in 1975 with the Newport News Police Department; within four years I was promoted to Detective
More informationGSM Architecture Training Document
Training Document TC Finland Nokia Networks Oy 1 (20) The information in this document is subject to change without notice and describes only the product defined in the introduction of this documentation.
More informationC E L L U L A R P H O N E E V I D E N C E DATA EXTRACTION AND DOCUMENTATION DET. CINDY MURPHY
C E L L U L A R P H O N E E V I D E N C E DATA EXTRACTION AND DOCUMENTATION DET. CINDY MURPHY DEVELOPING PROCESS FOR THE EXAMINATION OF CELLULAR PHONE EVIDENCE Recently, digital forensic examiners have
More informationLocating Mobile Phones using Signalling System #7. Tobias Engel <tobias@ccc.de> twitter: @2b_as
Locating Mobile Phones using Signalling System #7 Tobias Engel twitter: @2b_as What is Signalling System #7? protocol suite used by most telecommunications operators throughout the world
More informationMobile Computing. Basic Call Calling terminal Network Called terminal 10/25/14. Public Switched Telephone Network - PSTN. CSE 40814/60814 Fall 2014
Mobile Computing CSE 40814/60814 Fall 2014 Public Switched Telephone Network - PSTN Transit switch Transit switch Long distance network Transit switch Local switch Outgoing call Incoming call Local switch
More informationStaffing Positions by Programmes / Sub-Programmes 123
FORENSIC SCIENCE LABORATORY Page PART A : OVERVIEW OF MINISTRY/DEPARTMENT Strategic Note 117 Major Achievements for 2011 117 Major Constraints and Challenges and how they are being addressed 118 Strategic
More informationMobile Wireless Overview
Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure
More information9.1 Introduction. 9.2 Roaming
9 Location Updating Objectives After this chapter the student will: be able to define the concepts of roaming and location updating. be able to name the different types of location updating and why they
More informationForensics and the GSM mobile telephone system
Forensics and the GSM mobile telephone system Abstract Svein Yngvar Willassen, M.Sc, Senior Investigator, Computer Forensics, Ibas AS The GSM system has become the most popular system for mobile communication
More informationWireless Mobile Telephony
Wireless Mobile Telephony The Ohio State University Columbus, OH 43210 Durresi@cis.ohio-state.edu http://www.cis.ohio-state.edu/~durresi/ 1 Overview Why wireless mobile telephony? First Generation, Analog
More informationCellular Technology Sections 6.4 & 6.7
Overview Cellular Technology Sections 6. & 6.7 CSC 9 December, 0 Cellular architecture evolution Cellular telephony and internet terminology Mobility for cellular mobiles 6- Components of cellular architecture
More informationGlobal System for Mobile Communications (GSM)
Global System for Mobile Communications (GSM) Nguyen Thi Mai Trang LIP6/PHARE Thi-Mai-Trang.Nguyen@lip6.fr UPMC/PUF - M2 Networks - PTEL 1 Outline Principles of cellular networks GSM architecture Security
More information1 Introduction. 2 Assumptions. Implementing roaming for OpenBTS
Implementing roaming for OpenBTS 1 Introduction One of the main advantages of OpenBTS TM system architecture is absence of a legacy GSM core network. SIP is used for registering, call control and messaging.
More informationSPYTEC 3000 The system for GSM communication monitoring
SPYTEC 3000 The system for GSM communication monitoring The SPYTEC 3000 system is intended for passive (if system encryption is absent of if A5.2 encryption is used) or semi-active (if A5.1 encryption
More informationGSM GSM 03.07 TECHNICAL November 1996 SPECIFICATION Version 5.0.0
GSM GSM 03.07 TECHNICAL November 1996 SPECIFICATION Version 5.0.0 Source: ETSI TC-SMG Reference: TS/SMG-030307Q ICS: 33.020 Key words: Digital cellular telecommunications system, Global System for Mobile
More informationDesign and Implementation of Forensic System in Android Smart Phone
Design and Implementation of Forensic System in Android Smart Phone Xinfang Lee 1, Chunghuang Yang 1 2, Shihj en Chen, Jainshing Wu 2 1 Graduate Institute of Information and computer Education National
More informationValidating Tools for Cell Phone Forensics
Validating Tools for Cell Phone Forensics Neil Bhadsavle and Ju An Wang Southern Polytechnic State University 1100 South Marietta Parkway Marietta, GA 30060 (01) 678-915-3718 {nbhadsav, jwang}@spsu.edu
More informationNEW RESEARCH DIRECTIONS IN THE AREA OF SMART PHONE FORENSIC ANALYSIS
NEW RESEARCH DIRECTIONS IN THE AREA OF SMART PHONE FORENSIC ANALYSIS Firdous Kausar Department of Computer Science, College of Computer and Information Sciences, Imam University, Riyadh, Saudi Arabia.
More informationComprehensive Digital Forensic Solutions www.paraben.com
Comprehensive Digital Forensic Solutions www.paraben.com Mobile Device Forensic & Security Concerns Presenter Are we addicted? The Best Approach Cases Devices Everywhere PDA Devices Mobile Phones Hybrids
More informationMSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1
MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:
More informationWireless Cellular Networks: 1G and 2G
Wireless Cellular Networks: 1G and 2G Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Audio/Video recordings of this lecture are available
More informationCell Phone Forensics For Legal Professionals
1 Cell Phone Forensics For Legal Professionals Lars E. Daniel, EnCE, ACE, AME, CTNS, SCE, SCCM, SCA Digital Forensics Examiner Cell Phone Acquisition and Examination Collection and Acquiring Cell Phones
More informationTheory and Practice. IT-Security: GSM Location System Syslog XP 3.7. Mobile Communication. December 18, 2001. GSM Location System Syslog XP 3.
Participant: Hack contacting... IT-Security: Theory and Practice Mobile Communication December 18, 2001 Uwe Jendricke uwe@iig.uni-freiburg.de Lecture Homepage: http://www.informatik.uni-freiburg.de/~softech/teaching/ws01/itsec/
More informationProtecting Mobile Networks from SS7 Attacks. Telesoft White Papers
Protecting Mobile Networks from SS7 Attacks Telesoft White Papers Christian Feest 23rd June 2015 SS7 Networks The Challenge The problem with the current SS7 system is that messages can be altered, injected
More informationTELECOMMUNICATIONS REGULATORY AUTHORITY BAHRAIN. Bahrain Number Portability Implementation Routing and Charging specification
TELECOMMUNICATIONS REGULATORY AUTHORITY BAHRAIN Bahrain Number Portability Implementation Routing and Charging specification Version: 0.4 Status: draft Date: 4-0-00 Modification History Issue Date Modification
More informationMOBILE TECHNOLOGIES AND DISTANCE EDUCATION
MOBILE TECHNOLOGIES AND DISTANCE EDUCATION Rostislav Fojtik, Hashim Habiballa Abstract: Rapid advancement of information and communication technologies enables to produce more mobile devices. Most of distance
More informationOXYGEN FORENSIC SUITE 2010 GETTING STARTED
OXYGEN SOFTWARE OXYGEN FORENSIC SUITE 2010 GETTING STARTED 2000-2010 Oxygen Software http://www.oxygen-forensic.com Table of contents Table of contents...2 General information...3 Installation...5 Extracting
More information1G to 4G. Overview. Presentation By Rajeev Bansal Director(Mobile-1) Telecommunication Engineering Centre
1G to 4G Overview Presentation By Rajeev Bansal Director(Mobile-1) Telecommunication Engineering Centre Mobile Networks differentiated from each other by the word Generation 1G, 2G, 2.5G, 2.75G, 3G milestones
More informationUsing Mobiles for On Campus Location Tracking
Using Mobiles for On Campus Location Tracking F. Aloul A. Sagahyroon A. Al-Shami I. Al-Midfa R. Moutassem American University of Sharjah P.O. Box 26666, Sharjah, UAE {faloul, asagahyroon, b00020906, b00020142,
More informationGuidelines on Digital Forensic Procedures for OLAF Staff
Ref. Ares(2013)3769761-19/12/2013 Guidelines on Digital Forensic Procedures for OLAF Staff 1 January 2014 Introduction The OLAF Guidelines on Digital Forensic Procedures are internal rules which are to
More informationManual for USB, GPRS Modem
Manual for USB, GPRS Modem Thank you for using this product for your application. Within this manual, you can find 3 major sections : Hardware, Software and AT command sets. Hardware is for you to understand
More informationWelcome to. Vodafone
Welcome to Vodafone 1 Contents 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Welcome Your SIM card Making calls Voicemail SMS & MMS International Internet on your mobile phone Fax service Useful definitions Any questions?
More informationInformatica forense. Mobile Forensics - Approfondimenti tecnici e particolarità degli smartphone
Informatica forense Mobile Forensics - Approfondimenti tecnici e particolarità degli smartphone A cura di Matteo Brunati Udine, 11 maggio 2015 Me, Myself & I IT Security consultant Design & development
More informationSierra Wireless AirCard Watcher Help for Mac OS X
Sierra Wireless AirCard Watcher Help for Mac OS X Sierra Wireless AirCard Watcher allows you to manage and monitor the connection between your modem and the network. With Watcher, you can: Determine signal
More informationTeltonika FM41XX. Configurator v. 1.0
Teltonika FM41XX Configurator v. 1.0 1. First steps Connect Teltonika FM41XX (PIN1 for plus and PIN11 ground ) to the voltage supply 10-30 V as shown below and GPS, GSM antennas. (GSM is long and thin,
More informationDell NetReady Mobile Broadband Service User's Guide
Dell NetReady Mobile Broadband Service User's Guide Introduction Quick Start Service Coverage Frequently Asked Questions Glossary Information in this document is subject to change without notice. Introduction:
More informationSMS Application Note. SIM5360_SMS_Application_Note_V0.01
SMS Application Note 0 Document Title: SIM5360 SMS Application Note Version: 0.01 Date: 2014-02-21 Status: Document ID: Developing General Notes Simcom offers this information as a service to its customers,
More informationBLU Vivo 4.3 User Manual
BLU Vivo 4.3 User Manual 1 Table of Contents Phone Safety Information... 3 Appearance and Key Functions... 4 Installation and Charging... 5 Phone Operation... 7 Communication... 10 Camera... 11 Gallery...
More informationCell Phone Science. Criminal Advocacy Program. Financial Advisory Services. October 10, 2014
Cell Phone Science Criminal Advocacy Program October 10, 2014 Financial Advisory Services Select Professionals Brian A. Rosenthal, CISSP, EnCE Brian A. Rosenthal is a Digital Forensic Manager in the Computer
More informationHandoff in GSM/GPRS Cellular Systems. Avi Freedman Hexagon System Engineering
Handoff in GSM/GPRS Cellular Systems Avi Freedman Hexagon System Engineering Outline GSM and GSM referemce model GPRS basics Handoffs GSM GPRS Location and Mobility Management Re-selection and routing
More informationHow To Understand The Gsm And Mts Mobile Network Evolution
Mobile Network Evolution Part 1 GSM and UMTS GSM Cell layout Architecture Call setup Mobility management Security GPRS Architecture Protocols QoS EDGE UMTS Architecture Integrated Communication Systems
More informationGSM System Architecture
Intersystem Operation and Mobility Management David Tipper Associate Professor Graduate Program in Telecommunications and Networking University it of Pittsburgh Telcom 2700 Slides 6 http://www.tele.pitt.edu/tipper.html
More informationEFFICIENT FORENSIC TOOLS FOR HANDHELD DEVICES: A COMPREHENSIVE PERSPECTIVE
EFFICIENT FORENSIC TOOLS FOR HANDHELD DEVICES: A COMPREHENSIVE PERSPECTIVE Somasheker Akkaladevi 1 1 Virginia State University Department of Computer Information Systems Petersburg, Virginia 23806, USA
More informationSMS Roaming Service and SMS Interworking Service
SMS Roaming Service and SMS Interworking Service Takuya Shinozaki, Etsuko Matsubara, Masahiro Kadono and Mayumi Takahashi DoCoMo s SMS Roaming Service and SMS Interworking Service have been launched. It
More informationRECOVERING DELETED DATA FROM FAT PARTITIONS WITHIN MOBILE PHONE HANDSETS USING TRADITIONAL IMAGING TECHNIQUES
RECOVERING DELETED DATA FROM FAT PARTITIONS WITHIN MOBILE PHONE HANDSETS USING TRADITIONAL IMAGING TECHNIQUES KEVIN MANSELL CONTROL-F LTD. KEVIN.MANSELL@CONTROLF.CO.UK DARREN LOLE & FIONA LITCHFIELD SERVICE
More informationGuide to Wireless Communications. Digital Cellular Telephony. Learning Objectives. Digital Cellular Telephony. Chapter 8
Guide to Wireless Communications Digital Cellular Telephony Chapter 2 Learning Objectives Digital Cellular Telephony 3 Describe the applications that can be used on a digital cellular telephone Explain
More informationPiecing Digital Evidence Together. Service Information
Piecing Digital Evidence Together Service Information Services Overview Mobile and Tablet Forensics Mobile Phone Forensics is the legally tested and approved systematic examination of mobile phones, SIM
More informationMobile Communications Chapter 4: Wireless Telecommunication Systems slides by Jochen Schiller with modifications by Emmanuel Agu
Mobile Communications Chapter 4: Wireless Telecommunication Systems slides by Jochen Schiller with modifications by Emmanuel Agu Market GSM Overview Services Sub-systems Components Prof. Dr.-Ing. Jochen
More informationManaging ios Devices. Andrew Wellington Division of Information The Australian National University XW11
Managing ios Devices Andrew Wellington Division of Information The Australian National University About Me Mac OS X Systems Administrator Division of Information (Central IT) Mostly manage servers (about
More informationNTRC Dominica April 28 to May 2, 2014 Fort Young Hotel
NTRC Dominica April 28 to May 2, 2014 Fort Young Hotel Mobile Networks Next Generation Mobile Networks Keith A. Benjamin Operations Manager South Cluster LIME (Cable & Wireless) Global Markets Global Markets
More informationGuidelines on Cell Phone Forensics
Special Publication 800-101 Sponsored by the Department of Homeland Security Guidelines on Cell Phone Forensics Recommendations of the National Institute of Standards and Technology Wayne Jansen Rick Ayers
More informationGlobal System for Mobile Communication (GSM)
Global System for Mobile Communication (GSM) Definition Global system for mobile communication (GSM) is a globally accepted standard for digital cellular communication. GSM is the name of a standardization
More informationAnalysis of Methods for Mobile Device Tracking. David Nix Chief Scientific Advisor
Analysis of Methods for Mobile Device Tracking David Nix Chief Scientific Advisor October 2013 Table of Contents 1. Document Purpose and Scope 3 2. Overview 3 2.1 Mobile Device Penetration 3 2.2 Mobile
More informationLecture overview. History of cellular systems (1G) GSM introduction. Basic architecture of GSM system. Basic radio transmission parameters of GSM
Lecture overview History of cellular systems (1G) GSM introduction Basic architecture of GSM system Basic radio transmission parameters of GSM Analogue cellular systems 70 s In the early 70 s radio frequencies
More informationMobile Networking. SS7 Network Architecture. Purpose. Mobile Network Signaling
Purpose The purpose of this white paper is to inform the reader about mobile networking technology. For further information, see. Mobile Network Signaling Telecommunications signaling is the transmission
More informationMobile network security report: Poland
Mobile network security report: Poland GSM Map Project gsmmap@srlabs.de Security Research Labs, Berlin February 2015 Abstract. Mobile networks differ widely in their protection capabilities against common
More informationTelecommunications and the Information Age ET108B. Cell Phone Network
Telecommunications and the Information Age ET108B Cell Phone Network The Cellular Telephone Network Cellular Telephone Features Carrying Data Across the Cellular Network Satellite Telephone Service Cellular
More informationNUMBERING PLAN FOR SEYCHELLES TELECOMMUNICATION SERVICES (National Numbering Plan)
NUMBERING PLAN FOR SEYCHELLES TELECOMMUNICATION SERVICES (National Numbering Plan) Produced by: Office of the President Department of Information Communications Technology Communications Division P.O.
More informationChapter 10 VoIP for the Non-All-IP Mobile Networks
Chapter 10 VoIP for the Non-All-IP Mobile Networks Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 10.1 GSM-IP: VoIP Service for GSM 256
More informationAre free Android virus scanners any good?
Authors: Hendrik Pilz, Steffen Schindler Published: 10. November 2011 Version: 1.1 Copyright 2011 AV-TEST GmbH. All rights reserved. Postal address: Klewitzstr. 7, 39112 Magdeburg, Germany Phone +49 (0)
More informationDimensioning and Deployment of GSM Networks
Case Study: Dimensioning and Deployment of GSM Networks Acknowledgement: some of these slides are based on originals and information kindly provided by Ian O Shea of Altobridge Ltd. 2011 1 GSM System Architecture
More informationYour Phone This section introduces you to the hardware of the device.
Your Phone This section introduces you to the hardware of the device. No. Items Functions 1 Earphone jack 2 Strap hole 3 LED / Speaker Use a headset for hands-free conversation or listening to music. It
More information