How To Solve A Violent Home Invasion With A United Force



Similar documents
SIMPLIFYING THE COMPLEXITY OF MOBILE DATA FORENSICS

Build Stronger Cases with Mobile Device Link Analysis

Evaluating Mobile Forensics Training & Certification Programs: 5 Questions to Ask

Overview. The TriTech Solution TriTech s Inform RMS is a proven, robust, multi-jurisdictional records management system.

RECORDS MANAGEMENT THAT WORKS THE WAY YOU DO

Massachusetts Digital Evidence Consortium. Digital Evidence Guide for First Responders

CMPD s Predictive Crime Analytics Implementation. Harold Medlock Deputy Chief Charlotte-Mecklenburg Police Department

Digital Forensics. Larry Daniel

Digital Forensics for Attorneys Overview of Digital Forensics

HARDCAT SABRE IS A COMPLETE END TO END LAW ENFORCEMENT INFORMATION MANAGEMENT SYSTEM

EXTRACTING LEGALLY DEFENSIBLE EVIDENCE FROM THE CLOUD

Social Media Use in Law Enforcement:

NUIX WHITE PAPER THE INVESTIGATIVE LAB: A MODEL FOR EFFICIENT COLLABORATIVE DIGITAL INVESTIGATIONS WHITE PAPER

Computer Forensics. Securing and Analysing Digital Information

East Haven Police Department

Don t be a Victim of Violent Crime

POLICE OFFICER. 4. Work in partnership with the District Attorney s Office to obtain and file criminal complaints on arrested subjects.

Case Study: Mobile Device Forensics in Texting and Driving Cases

PROCEDURE Use of Translators and Interpreters. Number: E 0115 Date Published: 1 July 2015

Case Study: Smart Phone Deleted Data Recovery

About Your Presenter. Digital Forensics For Attorneys. Overview of Digital Forensics

d CRIMINAL INVESTIGATION ADMINISTRATION OF JUSTICE 5 Spring 2015

Crime Location Crime Type Month Year Betting Shop Criminal Damage April 2010 Betting Shop Theft April 2010 Betting Shop Assault April 2010

TYPE OF ORDER NUMBER/SERIES ISSUE DATE EFFECTIVE DATE General Order /25/2014 9/25/2014

WILLIAM OETTINGER PHONE (702)

Massachusetts Major City Chiefs. Best Practices in Eyewitness Identification and the Recording of Suspect Interviews

Setting the Standard in Risk Management Consulting and Investigation Services

SharePoint Training DVD Videos

Investigating the prevalence of unsecured financial, health and personally identifiable information in corporate data

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION

WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME

Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation

Guidelines on Digital Forensic Procedures for OLAF Staff

1/26/15. Chapter 2 Crime Scene

Digital Forensics for Attorneys - Part 2

Siebel for Investigative Case Management. An Oracle White Paper August 2007

Pensacola Police Department

Mission. Department Description

Forensic Triage in a Multi-TB Era Ady Cassidy, Nuix

How To Be A Computer Forensics Examiner

Overview of Current Criminal Justice Information Systems

Rules and Procedures. Rule 312 August 23, Rule CRIME LABORATORY - EVIDENCE AND CRIME SCENES

Security and Law Enforcement Community of Interest 1811-Criminal Investigating Career Road Map

Goal to recognize, document and collect evidence at a crime scene

STATE POLICE TROOPER

Overview of Computer Forensics

Battling Current Technological Trends

QUICK REFERENCE GUIDE. Workplace Violence. What You Need to Know to Protect Yourself and Your Employees

CRIMINAL JOURNEY MAPPING

Cool Forensic Investigations Young Women s Leadership Academy. Grand Prairie Police Department Amanda Self, CCSA Leticia Hidalgo

What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes

DOMESTIC VIOLENCE

Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices

Large Scale Cloud Forensics

Jail, Warrants and Court Security

Setting the Standard for Safe City Projects in the United States

SECURITY. SITUATIONAL AWARENESS. INTERAGENCY CONNECTIVITY.

LAKE CITY POLICE DEPARTMENT GENERAL ORDERS MANUAL

SOLUTION. Forensic Video Analysis

Crime Scene Search and Processing

The Enhanced Digital Investigation Process Model

of the Chancellor SUMMARY OF CHANGES

Designated personnel will be trained and authorized to conduct field testing.

The CHICAGO STORY. Use of CCCTV for General Area Surveillance, Crime Hot Spots, Mobile Applications, and Future Developments

IBM Content Analytics: Rapid insight for crime investigation

CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS

PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009

A Victim s Guide to Understanding the Criminal Justice System

Introduction to CCTNS. (Crime & Criminal Tracking and Network System)

A Survey on Mobile Forensic for Android Smartphones

Hands-On How-To Computer Forensics Training

Digital Forensics Tutorials Acquiring an Image with FTK Imager

Criminal Investigation CRJ141. Matthew McCarty

To do Justice, as no one is above the Law nor beneath its protection.

Digital Evidence Collection and Use. CS 585 Fall 2009

MILWAUKEE COUNTY DISTRICT ATTORNEY S OFFICE DISTRICT ATTORNEY JOHN T. CHISHOLM

role in that system. Class discussion and debate will be encouraged. Semester Instructional Unit I

Operation Ruff Rider

1. ABSTRACT PROBLEM SOLVING PROCESS

Greenville, SC Police Department GENERAL ORDER Subject Force Response

The Criminal Justice Dashboard (The Dashboard) Category: Information Communications Technology (ICT) Innovations. State of Maryland.

Law Enforcement Records Management Systems

Android Physical Extraction - FAQ

TE AS FORENSIC SCIENCE ACADEMY TM

Speaker Sheldon Silver. Breaking New York s Addiction to Prison: Reforming New York s Rockefeller Drug Laws

Transcription:

Use Case SOLVING VIOLENT CRIMES WITH A UNIFIED WORKFLOW In a Violent Home Invasion Investigation, the UFED Series Seamlessly Unifies Workflows from Field to Lab A series of violent home invasions has everyone in a community, police included, on the edge. The investigators know they need to tie these crimes to an underlying motive, which experience has led them to suspect involves narcotics, gang or other organized criminal activity. Under pressure from the mayor, city council, media, and residents themselves, the investigators are prepared to deploy the right tools to identify key evidence from social media, mobile device data, detailed call records and other sources and to put a stop to the crimes. 1

In progress: Home invasion with assault Patrol officers respond to the scene of a Saturday night home invasion robbery with assault in progress. They apprehend two suspects fleeing the home on foot. As officers take them into custody, one of the suspects manages to throw his smartphone to the ground and crush it with his foot. Officers seize the other suspect s smartphone without incident as they are taking both individuals into custody, and they separately bag and tag each device as evidence. In the field: Background investigation Statements from the two victims, in which both independently confirm the suspects talking to each other about someone named Jiggy, lead officers to believe that the suspects were not acting on their own. Officers think this incident is another in the series of home invasions they ve been responding to. 2

At the station: The initial search Officers obtain a search warrant for the undamaged device and use a UFED Camera to photograph both devices as part of their evidence intake process. Based on collected statements, the officers warrant empowers them to bypass the device s password and search for all communications data, including call logs, text messages, and app data from the past week. Developing the first leads After bypassing the suspect s password, the UFED InField search reveals: A set of messages, which appear out of context or out of sequence, using a popular messaging app to communicate with Jiggy. Officers believe some messages have been deleted. Photos of the victims home from various angles. A series of call logs showing both sent and received calls from four other numbers. Officers compile their extraction report in UFDR format and submit it, together with the victims statements, their reports, both devices and the photographs, to their digital forensic lab. 3

At the lab: The follow-up search The forensic examiners validate the officers UFDR report using UFED Ultimate. They then obtain additional search warrants for each mobile device to extract deleted data and geolocation metadata from the same time frame, one week previously, as the original search warrant. From the undamaged device, examiners recover deleted message fragments from the messaging app and geolocation data consistent with not only the images of the home, but also with prior incidents. 4

Overcoming the challenge of a damaged device Examiners are able to extract data from the damaged device using JTAG methods. Decoding the data in UFED Physical Analyzer, they find: A clear link between the two suspects in the planning of the home invasion. Examiners notice that the address number is transposed in several of the messages sent by the second suspect. Additional fragments of messages with Jiggy via a different social media app. The messages include drug dealers lingo, but they are incomplete, and the provider is known to be hostile to law enforcement legal process. The examiners warn investigators that there is a risk the provider will not supply the messages at all, leaving the case without critical evidence. Developing the first leads Now believing this to be a case of mistaken identity, the officers obtain a new search warrant to use social media account credentials on both devices. UFED Cloud Analyzer shows that the social media messages with Jiggy explicitly refer to drug deals. They provide probable cause to arrest that individual, who investigators learn is a dealer in a neighboring community. Search warrants on his devices provide the final context for the case. 5

Building the case Using UFED Link Analysis, investigators are able to show how the three suspects are tied together in the coordination and execution of six armed robbery/home invasions. Clear patterns of communication show Jiggy, an alias for the mastermind, giving orders to the two subordinates to hit particular houses. Mapping the subordinates geolocation data shows them casing the homes in the days leading up to the robberies. In addition, Jiggy s private social media posts show his paranoia and motivation to dominate the drug market in the region. 6

Taking criminals off the street The investigators are able to build a solid case against all of the suspects for the armed robberies, assaults, and drug distribution. Leveraging UFED Reader, they present the entire case to their prosecutor, detailing a timeline of robbery-related events over a period of three months. In turn, the prosecutor charges all three suspects with multiple felony counts. This takes them off the street and puts an end to their criminal activities. The UFED Series delivers the most comprehensive mobile forensics extraction, decoding and analysis capabilities on the market, empowering investigators to unlock critical mobile device evidence and focus their investigations on the leads that matter. By leveraging the UFED Field Series and UFED Pro Series together as part of an end-to-end solution, law enforcement agencies can simplify complex analytical tasks, cultivate more leads in less time, and present evidence they can stand behind in court. About Cellebrite Cellebrite is the world leader in delivering cutting-edge mobile forensic solutions. Cellebrite provides flexible, field proven and innovative cross platform solutions for lab and field via its UFED Pro and UFED Field Series. The company s comprehensive Universal Forensic Extraction Device (UFED) is designed to meet the challenges of unveiling the massive amount of data stored in the modern mobile device. The UFED Series is able to extract, decode, analyze and report data from thousands of mobile devices, including, smartphones, legacy and feature phones, portable GPS devices, tablets, memory cards and phones manufactured with Chinese chipsets. With more than 30,000 units deployed across 100 countries, UFED Series is the primary choice for forensic specialists in law enforcement, military, intelligence, corporate security and ediscovery. Founded in 1999, Cellebrite is a subsidiary of the Sun Corporation, a publicly traded Japanese company (6736/JQ) To learn more, visit www.cellebrite.com For more information contact sales 2015 Cellebrite Mobile Synchronization LTD. All rights reserved. 7