(U) Converged Analysis of Smartphone Devices

Similar documents
GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual

Mobile Phone Monitoring Software

MOBILE PRINTING: Secure Printing From Your Handheld Devices

VoipSwitch softphones

CDR500 Spy Recovery Pro

Your privacy and the safety of your accounts and information is our top priority, which is why we ve added extra security to our mobile services.

cbox YOUR FILES GO MOBILE! FOR ANDROID SMARTPHONES AND TABLETS USER MANUAL

IONU PRO Product Overview

3. GENERALI MOBILE APPLICATION CONTENT. 3 P a g e

Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT

Unified Communications. Increased productivity through communications convergence

Development. SriSeshaa Technologies. Table of Contents

esarinformation Systems Simplifying your Technology Mobile Applications Development Profile

Mobile Phones Operating Systems

Read this first. Copyright

Mobile Printing for Business Made Easy

Monitoring mobile communication network, how does it work? How to prevent such thing about that?

Trust Digital Best Practices

Current Page Location. Tips for Authors and Creators of Digital Content: Using your Institution's Repository: Using Version Control Software:

System Requirements for Microsoft Dynamics NAV 2016

Mobile memory dumps, MSAB and MPE+ Data collection Information recovery Analysis and interpretation of results

FBZ General Information. Cloud Mobile Banking 13,10,14-5. Copyright FBZ All rights reserved

March How Eye-Fi Works Overview Flowcharts

Mobile Softphone. Mobile softphones. iphone mobile softphone

Image Databases INLS 623 Lina Huang Elise Moore Ketan Palshikar Nevin Yang

Introduction to Android

Overview focus on breadth understanding not depth (that s what the labs are for )

User Guide - Table of Contents

RCS - Overview. Rich Communication Suite

/ 1. Online Banking User Guide SouthStateBank.com / (800)

FAQ s. 2. Do I need any special hardware or software to access the tracking data?

Do you know what makes NetSupport Manager so unique?

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

Mobile Security Survival Guide for Journalists. katrin verclas melissa loudon Alix dunn

Blackberry Forensics. Shafik G. Punja Cindy Murphy. SANS DFIR Summit 2014 Austin TX. June-9-14 Copyright QuByte Logic Ltd

App Store Tracking, Track your Rankings - AppStoreShark.com Scam or Work? -->>> Enter Here VISIT WEBSITE => Get it Now

Rushern L. Baker, III County Executive. Presented By: Eben Smith, Contract Compliance Officer Minority Business Development Division

System Requirements for Microsoft Dynamics NAV 2016

Welcome to Mobile Banking. Sunflower Bank Mobile Banking Personal User Guide

Kaspersky Security 10 for Mobile Implementation Guide

Concur Travel and Expense Reporting. Mobile Application

Overview. Internet Connection Requirement: The working GPRS connection required for the application properly work.

CRM. itouch Vision. This document gives an overview of OneTouch Cloud CRM and discusses the different features and functionality.

Exactly the Same, but Different

This document is provided to you by ABC E BUSINESS, Microsoft Dynamics Preferred partner. System Requirements NAV 2016

Brain training center nigeria, brain age 2 free download, brain exercise games free download.

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

Domestic Services Skips Skip Bags Ancillary Products Support Payments Route Management Maps SMS

System Requirements. Microsoft Dynamics NAV 2016

10 Quick Tips to Mobile Security

A User s Introduction to. Global Rescue s GRID TM Mobile Application

Cloud Computing for Education Workshop

Feature List for Kaspersky Security for Mobile

WordPress Security Scan Configuration

Mobile Device Manual for 3G DVRs

HTML5 the new. standard for Interactive Web

Android Security. Device Management and Security. by Stephan Linzner & Benjamin Reimold

VOIP NEXT GENERATION MOBILE TELEPHONY Piyush Yadav, Yogesh Yadav

DLA Internet Bid Board System (DIBBS):

AD SPECIFICATIONS. Standard Banners. Site Served. Creative. Animation DAA Ad Marker * Raw Assets Delivery. Availability. Metrics

System Requirements for Microsoft Dynamics NAV 2016

Mobile Phone & Website Tracking Platform Operation Guide

U.S. Army Training Support Center TCM-TADLP-Courseware Standards and Certification Division. Mobile Best Practices

TEMS PRODUCTS PART ACTIVE IN TESTING WHITE AND MONITORING OF CONVERGED APPLICATIONS

Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU

Increase visibility, control and performance of field resources in the Utilities Industry

A Survey of Existing Technologies, Applications, Products, and Services for Geofencing

Neat Cloud Service + Mobile App

Content Extraction Enhancements For Target Analytics:

This is our best... YOUR best... Online Banking yet!

HOW HOSTED EXCHANGE COMPARES WITH GOOGLE APPS

Administration Guide. WatchDox Server. Version 4.8.0

Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security

Transcription:

(U) Converged Analysis of Smartphone Devices Identification/Processing/Tasking All in a day s work Paula Kuruc, NSA May 2010 1

Smartphone Converged mobile devices offering advanced capabilities, often with PC-like functionality. No set industry standard definition. Boasts powerful processors, memory, larger screens and open operating systems. 2

Economics of Transportation! The gradual blurring of telecommunications, computers, and the Internet! Multifaceted layering technologies! Examples of convergence in SIGINT: " Blackberry, iphone data, Smartphones " VOIP " Wireless Local Loop " GPRS General Packet Radio Service 3

SmartPhone Applications! Visual Communicator Free application that combines Instant Messaging, Photo-Messaging and Push2Talk capabilities on a mobile platform. VC used on GPRS or 3G networks; heavily used in AQI Mosul Network! Symbian Operating System supporting encryption programs.! WinZip, compression and encryption program. 4

Usage/Features! Social Networking via Flixster Social Networking site allowing users to share movie ratings, discover new movies and meet others with similar movie taste.! Google Maps features! Photo capture and editing capabilities! Phone settings! Mobile Facebook Apps (iphone/android) 6

Location Based Services Where is the target?! GPRS Dataset breaking down barriers! Providers catering to users based on location! Android Phones pass GPS data in the clear! No longer DNI/DNR 7

Taking a Closer Look Photo Capture Software -! iphone Geotags for Photos Raw tags coming through from a variety of devices! Flixster App uses GPRS! Flickr/Photobucket! Mobile Facebook Apps Uploads 8

Processing All in the Metadata, not the pretty pictures! Unique applications require unique analysis! GPS Indicators (sent to the server and towers for both phone and application)! VoIP Indicators (multiple services)! Type of Phone and Apps 9

Identification via Xkeyscore! Make use of fingerprints in Xkeyscore via the EXIF metadata plugin! Fingerprints for images (jpeg, tiff, gifs etc.)! Examine the raw XML! Provides device and time/location for the image fingerprint('image/exif/gpscoordinates') = file_ext('jpeg' or 'pjpeg' or 'jpg' or 'pjpg' or 'tiff' or 'gif' or 'png' or 'riff' or 'wav') and 'exif:gpslatitude' or 'exif:gpslongitude' or 'exif:gpsdestlatitude' or 'exif:gpsdestlongitude'; 10

Golden Nugget! Perfect Scenario Target uploading photo to a social media site taken with a mobile device. What can we get? 11

User Activity Leads! Examine settings of phone as well as service providers for geo-location; specific to a certain region! Networks connected! Websites visited! Buddy Lists! Documents Downloaded! Encryption used and supported! User Agents 12

Targeting Targeting both Telephony and DNI systems! Call Logs! SMS! SIM Card Leads! Email address! IMEI/IMSI! Unique Identifiers! Blackberry PINS 13

Why do we care? Additional exploitation Target Knowledge/Leads Location Target Technology Denote Media used 14

Conclusion! Challenge is how to tag data for analysts! We can geo phones from virtually anywhere! Buried GeoStamp from Phone or Apps! Xkeyscore/Marina! Tasking systems 15