9/20/2015. Cell Phone Data Retrieval and Its Legal Implications COPYRIGHT NOTICE
|
|
- Stella Alexander
- 6 years ago
- Views:
Transcription
1 Cell Phone Data Retrieval and Its Legal Implications COPYRIGHT NOTICE This presentation includes the creative works of others which are being used by permission, license or under a claim of fair use (17 U.S.C. 107). This presentation was prepared under the Fair Use Guidelines for multimedia presentations, and further use or distribution of it is not permitted. WARNING: This presentation contains a lot of nerd talk. We know it is early in the morning, but please stop us if you want to talk about any forensic topics you don t understand. 1
2 What is JTAG ing and Chip Off Current case law regarding cell phones Search Warrants Ethical Issues destruction of evidence How to From the Wiki Joint Test Action Group (JTAG) is the common name for the IEEE Standard Test Access Port and Boundary Scan Architecture. It was initially devised by electronic engineers for testing printed circuit boards using boundary scan and is still widely used for this application. Today, JTAG is also widely used for IC debug ports. In the embedded processor market, essentially all modern processors implement JTAG when they have enough pins. Embedded systems development relies on debuggers communicating with chips with JTAG to perform operations like single stepping and breakpointing. 2
3 Android Phones USB Debugging Not enabled by default Need to enable it to access the phone and move data across the USB. Pattern Locked Phones Broken or damaged USB port Windows Phones No way to bypass locked screen No Physical Dump Apple Phones No JTAG or Chip Off Support Encryption How to you process a phone? Cellebrite? RCFL? JTAG Can recover a full physical image from devices which may provide more Information than a logical image. Forensic desoldering Desolder the non volatile memory chip Connect the chip to a chip reader Benefits Device doesn t need to be functioning Can copy data without changes Risks Possible total data destruction Possible to destroy the chip and contents 3
4 Bypass a security code (not encryption) Data can be recovered if phone is not functional Data can be recovered if phone is physically destroyed (but chip still intact) Phone doesn t need power to chip off All phones are tested by the FCC Need to know what processor and how much memory Get the FCC ID Use the links from ADD screen shots of those sites with example phone i717 as example Currently there are no specific cases addressing JTAG or Chip Off in a published opinion (checked 9/20/15) in any jurisdiction 4
5 Riley v. California, 134 S.Ct (2014) Search incident to arrest interest in protecting officers safety did not justify dispensing with warrant requirement for searches of cell phone data; interest in preventing destruction of evidence did not justify dispensing with warrant requirement for searches of cell phone data. People v. Omwanda, 338 P.2d 1145 (Colo.App.2014) Search incident to arrest Consent to search the car found drugs paraphernalia (electronic scales, pill bottle with cocaine) Officer read 3 text messages on the phone Remanded for further hearing on independent source This cases is effectively overruled: People v. Taylor, 2012 COA 91 (Colo.App. 2012) (June 7, 2012) 5
6 Remember the independent source doctrine Illegal discovery did not affect the officer s decision to seek a warrant that provided independent source The redacted warrant established probable cause People v. Arapu, 2012 COA 42, 283 P.3d 680 (Colo.App.2012) People v. Nelson, 2012 COA 80, 296 P.3d 294 (Colo.App.2012) Crim.P. 41 and C.R.S Must provide a nexus between information sought and what is being searched Text messages (preparation of crime, correspondence with witnesses) Pictures (drugs, scoping of crime scene, weapons) GPS coordinates (contained within apps and photos) and map apps Timeline of events (using text messages or other apps) Due consideration should be given to LE s experience and training. People v. Dunkin, 888 P.2d 305, 309 (Colo.App.1994) Destruction of Evidence Constitutional Statutory 6
7 Constitutional People v. Greathouse, 742 P.2d 334 (Colo.1987) 3 part test The evidence was suppressed or destroyed by prosecution The evidence possessed an exculpatory value that was apparent before it was destroyed The defendant was unable to obtain comparable evidence by other reasonably available means See California v. Trombetta, 467 U.S. 479 (1984) Defendant has duty to prove all 3 prongs Constitutional Absent bad faith on the part of law enforcement, failure to preserve useful evidence does not constitute a due process violation. People v. Wyman, 788 P.2d 1278 (Colo.1990) People v. Scarlett, 985 P.2d 36 (Colo.App.1998) where police did not willfully destroy evidence and was only negligent, no due process violation (storage of vehicle). People v. Abdu, 215 P.3d 1265 (Colo.App.2009) evidence must have apparent exculpatory value to be considered. Constitutional Greathouse: when police conduct scientific tests, they must preserve samples to permit the defendant to accomplish independent testing, permit the defendant s expert to monitor the police testing, or provide some other suitable means to allow the defendant to verify independently the appropriateness of the procedures and the accuracy of the results of the testing. 7
8 Statutory C.R.S When evidence is seized in so small a quantity or unstable condition that qualitative laboratory testing will not leave a sufficient quantity of the evidence for independent analysis by the defendant s expert and when a state agent can reasonably foresee that the evidence might be favorable to the defendant, the trial court shall not suppress the prosecution s evidence if the court determines that the testing was performed in good faith and in accordance with regular procedures designed to preserve the evidence which might have been favorable to the defendant. Statutory Factors for the Court to consider: Whether or not a suspect has been identified, arrested, or retained counsel Whether the state should have used an available test more likely to preserve the results of seized evidence Whether, when test results are susceptible to subjective interpretation, the state should have photographed or otherwise documented the test results as evidence Whether the state should have preserved the used test samples Whether it was necessary for the state agency to conduct quantitative analysis of the evidence Whether there is a sufficient sample for the defendant s expert to utilize for analysis and the suspect or defendant has made a specific request to preserve such sample. Whether it was reasonable for the state to have contacted the defendant to determine if he wished his expert to be present during the testing. Statutory When evidence (or potential evidence) has an unknown evidentiary value, it cannot possess an exculpatory value that was apparent before it is lost. People v. Austin, 799 P.2d 408 (Colo.App.1990) 8
9 Evidence will be inaccessible (Chip Off) Evidence may be destroyed (if chip is destroyed) Is there an apparent exculpatory value? The evidence is probably unknown Is there another way to get the data? Possibly think of cloud back up of data Known data to Defendant that can be recreated Remember that chip off involves desoldering of the non volatile memory chip from the phone Chip Off work station Fancy hair dryer Stationary mount 9
10 Alcatel One Touch Rear case opened SIM Card SD Card Battery Removed FCC info Removal of case 10
11 SIM Card removed SD Card removed SIM Card Separate analysis can be done High tech tools! Guitar pick 11
12 Mother board Heat shield Chip sets Remove mother board Heat shield Chip set 12
13 Heat shield removed like a sardine can Battery removal 13
14 Battery removal Heat application to chip set Gently pry out chip 14
15 The chip is off Need to find correct reader for chip 15
16 Perfect fit Reader has found the chip and can read it Select the data to copy 16
17 Creating an image of the information contained in the chip Forensic tool to identify which case this image is associated with Starting to collect the contents of the physical drive 17
18 Sometimes this can take a while Chip Off Chip Off HTC Rezound Broken Power Broken Screen And bad USB 18
19 Chip Off HTC Rezound Chip Removed No going back Chip Off HTC Rezound Chip Off HTC Rezound 19
20 Chip Off HTC Rezound Remember you need to be able to power the phone and attach (solder) wires to the correct taps Cell phone board removed Power attached 20
21 Close up of JTAG contact points 21
22 Riff Box Flasher Box Lots of other Boxes About $200 Made for phone repair Such as IMEI Carrier unlocks Bricked phone Damaged Rooted phone Typically used to WRITE to memory of the phone But can also READ the full memory all ROMS (even more than cell phone forensics tools.) All we really want is ROM1 (User partition) Look for your phone 22
23 Phone information Info on chip size FCC info click on it Pick one often duplicate info on this site 23
24 Look for internal photos that has the best info Someone has done the work for us. Now we know what we ll find and where Samsung Galaxy Note i717 24
25 Samsung Galaxy Note i717 Smashed screen Samsung Galaxy Note i717 Samsung Galaxy Note i717 25
26 Samsung Galaxy Note i717 Power supply needed in JTAG Samsung Galaxy Note i717 This takes a LONG time Samsung Galaxy Note i717 26
27 Samsung Galaxy Note i717 Samsung Galaxy Note i717 Samsung Galaxy Note i717 27
28 Samsung Galaxy Note i717 Samsung Galaxy Note i717 Kyocera S
29 Kyocera S2150 Kyocera S2150 Kyocera S
30 Kyocera S2150 Additional Information / Resources JTAG Wiki Teel Technologies Class I took on JTAG GSM Forums All the different flasher boxes and repair dongles Wild PCS Mobile phone repair training JTAG repair and chip off repair kits Read more about it: iphones currently at 9.0 OS Will wipe the phone after 10 failed attempts Used to be able to write a search warrant Directly to Apple for unlocking Not since ios 8 ( Sept. 17 th, 2014) Apple no longer has backup encryption keys Apple devices since iphone 4S are encrypted Combo of hardware and software 30
31 What does Apple have? Still might have a Cloud Backup Phone could have been synced to a computer Apple might have IP logs to different services Always put into Airplane Mode Can be wiped remotely Timothy L. Johnson Deputy District Attorney 20 th Judicial District tjohnson@bouldercounty.org Detective Jeremy Shavin Boulder County Sheriff s Office jshavin@bouldercounty.org 31
PRESS RELEASE. Computer Forensic Investigations Explode For Chester County Law Enforcement
CHESTER COUNTY DISTRICT ATTORNEY S OFFICE TELEPHONE: 610-344-6801 FAX: 610-344-5905 THOMAS P. HOGAN DISTRICT ATTORNEY 201 W. MARKET STREET, SUITE 4450 POST OFFICE BOX 2748 WEST CHESTER, PA 19380-0991 March
More informationIntro. This program can retrieve messages, call logs, pictures, contacts, apps, calendar events, s, passwords, deleted data, and much more.
FAQ Intro Thank you for purchasing MOBILedit Forensic Express. This tool preforms mobile phone content extractions and is used by professionals in law enforcement, military as well as the corporate and
More informationCellebrite Digital Forensics for Legal Professionals (CDFL)
Global forensic training Course description Level Intermediate Length Two days (14 hours) Training Track Investigative The two-day Cellebrite Digital Forensics for Legal Professionals course is designed
More informationCellular Site Simulator Usage and Privacy
Policy 609 Cellular Site Simulator Usage and Privacy 609.1 PURPOSE AND SCOPE The purpose of this policy is to set guidelines and requirements pertaining to cellular site simulator technology usage and
More information4 having been first duly sworn, testified as follows: 6 Q. (BY MS. REYNA) Good afternoon, Officer. 7 Could you please introduce yourself to our jury?
197 Eric Johnson - June 2, 2014 Cross-Examination by Mr. Davis 1 may have a seat, sir. 2 THE WITNESS: Thank you. 3 MARK WILSON, 4 having been first duly sworn, testified as follows: 5 DIRECT EXAMINATION
More informationDigital Forensics Mobile Device Data Extraction. Crime Scene/Digital and Multimedia Division
Mobile Device Data Extraction 12. MOBILE DEVICE DATA EXTRACTION PROCEDURE 12.1. Purpose 12.1.1. The purpose of this procedure is to extract data from mobile devices and/or removable media utilizing the
More informationRunning Head: IPHONE FORENSICS 1. iphone Forensics Jaclyn Sottilaro Monica Figueroa-Santos Antonina Spinella Saint Leo University
Running Head: IPHONE FORENSICS 1 iphone Forensics Jaclyn Sottilaro Monica Figueroa-Santos Antonina Spinella Saint Leo University IPHONE FORENSICS 2 Abstract With an ever-growing evolution on technology,
More informationGathering and Using Cell Phone and Location Evidence in Criminal Cases
Gathering and Using Cell Phone and Location Evidence in Criminal Cases Jerome D. Greco Legal Aid Society Digital Forensics Staff Attorney Kings County Criminal Bar Association October 18, 2018 Interactive
More informationScientific Working Group on Digital Evidence
SWGDE Requirements for Report Writing in Digital and Multimedia Forensics Disclaimer: As a condition to the use of this document and the information contained therein, the SWGDE requests notification by
More informationSSDD and SSDF Handset seizure Paraben * Seizure test SE K850, SE Xperia
SSDD and SSDF Handset seizure Paraben * Seizure test SE K850, SE Xperia Small Scale Digital Device (SSDD) SSDD definition A Small Scale Digital Device is any of a variety of small form factor devices utilizing
More informationANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS
ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps
More informationComputer forensics Aiman Al-Refaei
Computer forensics Aiman Al-Refaei 29.08.2006 Computer forensics 1 Computer forensics Definitions: Forensics - The use of science and technology to investigate and establish facts in criminal or civil
More informationJustice or a Game of Gotcha? Emerging Standards Concerning Preservation (and Spoliation) of Electronically Stored Information
Presented: 35 th Annual Conference on Securities Regulation and Business Law February 7-8, 2013 Austin, Texas Justice or a Game of Gotcha? Emerging Standards Concerning Preservation (and Spoliation) of
More informationIncident Response Data Acquisition Guidelines for Investigation Purposes 1
Incident Response Data Acquisition Guidelines for Investigation Purposes 1 1 Target Audience This document is aimed at general IT staff that may be in the position of being required to take action in response
More informationThis version has been archived. Find the current version at on the Current Documents page. Archived Version. Capture of Live Systems
Scientific Working Group on Digital Evidence Capture of Live Systems Disclaimer: As a condition to the use of this document and the information contained therein, the SWGDE requests notification by e-mail
More informationMOBILE DEVICE FORENSICS
MOBILE DEVICE FORENSICS Smart phones and other handheld electronics have become an important part of our everyday lives and the ever changing technology is making these devices a major source of digital
More informationScientific Working Group on Digital Evidence
SWGDE Best Practices for Mobile Device Evidence Collection & Preservation, The version of this document is in draft form and is being provided for comment by all interested parties for a minimum period
More informationDATA DISASTER AVERTED! HOW TO BACK UP YOUR ANDROID SMARTPHONE
DATA DISASTER AVERTED! HOW TO BACK UP YOUR ANDROID SMARTPHONE Planning ahead is the easiest way to make sure your data isn t lost to the ether, even if your phone is destroyed. Luckily, Google automatically
More informationElectronic Discovery in Employment Cases: What Every Employer Needs to Know. Presented By: Shannon Cohorst Johnson
Electronic Discovery in Employment Cases: What Every Employer Needs to Know Presented By: Shannon Cohorst Johnson Understand e-discovery and the latest tactics by claimants and counsel Understand your
More informationMatt Danner Flashback Data
Preservation Strategies and Data Collection from a Forensic Expert's Point of View Best practices on executing preservation and administering collection protocols with emphasis on forensically sound methods
More informationMPE+ Frequently Asked Questions & Troubleshooting
MPE+ Frequently Asked Questions & Troubleshooting Version 7 (4.5.0.45078) 2011 AccessData Group, LLC Table of Contents Mobile Forensics Background Knowledge... 4 Q. What is the difference between Computer
More information25 ESI and E-Discovery Terms. (in 75 minutes!) for Mediators
25 ESI and E-Discovery Terms (in 75 minutes!) for Mediators chopkins@mcdonaldhopkins.com Christopher Hopkins M c D o n a l d H o p k i n s L L C W e s t P a l m B e a c h Lawyer, mediator, and arbitrator.
More informationCourse 832 EC-Council Computer Hacking Forensic Investigator (CHFI)
Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Duration: 5 days You Will Learn How To Understand how perimeter defenses work Scan and attack you own networks, without actually harming
More informationParaben s Photo Backup Stick V2.1. User Manual
Paraben s Photo Backup Stick V2.1 User Manual About Paraben s Photo Backup Stick The Photo Backup Stick is an easy-to-use picture and video backup tool for Windows computers, Apple iphones and ipads, and
More informationDigital Cameras. An evaluation of the collection, preservation and evaluation of data collected from digital
Ronald Prine CSC 589 - Digital Forensics New Mexico Institute of Mining and Technology October 17, 2006 Digital Cameras Executive Summary An evaluation of the collection, preservation and evaluation of
More informationElectronic Surveillance & Constitutional/Legislative Protections
Electronic Surveillance & Constitutional/Legislative Protections Eric Vos Federal Defender District of Puerto Rico Eric_Vos@ao.uscourts.gov What is Electronic Surveillance? Not? What We Will Cover Cell
More informationER-380. SmartPhone Recovery Pro TM Suite. User Guide. Rev iphone Data Recovery Software for Windows OS
ER-380 SmartPhone Recovery Pro TM Suite iphone Data Recovery Software for Windows OS User Guide Rev. 1.1 iphone Data Recovery Software for Win OS Contents Page Introduction 1 System Requirements 2 Installation
More informationCertified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Title: Certified Digital Forensics Examiner Duration: 5 days Class Format Options: Instructor-led classroom Live Online Training Prerequisites: A minimum of
More informationSAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE
SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE COURSE TITLE: CODE NO. : SEMESTER: Fall 2011 PROGRAM: AUTHOR: Computer Engineering Technologist - Networking Dan Kachur
More informationDigital Evidence: I know it s there, how do I get it?
: I know it s there, how do I get it? January 24, 2019 Matthew Rollins Senior Assistant District Attorney Paulding County Judicial Circuit Josh Reed Network Intrusion Forensic Analyst United States Secret
More informationWhen Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.
When Recognition Matters WHITEPAPER CLFE www.pecb.com CONTENT 3 4 5 6 6 7 7 8 8 Introduction So, what is Computer Forensics? Key domains of a CLFE How does a CLFE approach the investigation? What are the
More informationHtc Verizon Use Manual For Samsung Galaxy S3 User's
Htc Verizon Use Manual For Samsung Galaxy S3 User's Find out how to use and troubleshoot your Samsung Galaxy S III with interactive simulators, View your User Guide Manage your device in My Verizon. If
More informationIphone Restore Backup Files Location Windows 8.1
Iphone Restore Backup Files Location Windows 8.1 If you upgraded to icloud Drive, use these steps to download files stored in icloud Drive 7 or later, you can copy your files from the icloud Drive folder
More informationComputer Forensics US-CERT
Computer Forensics US-CERT Overview This paper will discuss the need for computer forensics to be practiced in an effective and legal way, outline basic technical issues, and point to references for further
More informationDigital Forensics for Attorneys
Lars E. Daniel, EnCE, ACE, AME, CTNS Digital Forensics Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital
More informationMilitary Forensics COLLECT, EXPLOIT, AND REACT IN THE FIELD
Military Forensics COLLECT, EXPLOIT, AND REACT IN THE FIELD Military Forensics : COLLECT, EXPLOIT, AND REACT IN THE FIELD 2 Collect, Exploit, and React in the Field Timely access to battlefield intelligence
More informationFAQ for KULT Basic. Connections. Settings. Calls. Apps. Media
FAQ for KULT Basic 1. What do the Icons mean that can be found in notifications bar at the top of my screen? 2. How can I move an item on the home screen? 3. How can I switch between home screens? 4. How
More informationAUGUST 31 ST, 2015 GET YOUR PHONE READY TO SELL:
AUGUST 31 ST, 2015 GET YOUR PHONE READY TO SELL: HTC M8 Music, memories and money. Your entire life is right there on your phone, easily accessible with just a few swipes. With three simple steps, we ll
More informationCOMPUTER FORENSICS THIS IS NOT CSI COLORADO SPRINGS. Frank Gearhart, ISSA Colorado Springs
COMPUTER FORENSICS THIS IS NOT CSI COLORADO SPRINGS Frank Gearhart, ISSA Colorado Springs TECHNOLOGY + INVESTIGATION + STORYTELLING Know the case Find the evidence Follow the facts Create the timeline
More informationScientific Working Group on Digital Evidence
SWGDE Best Practices for Digital & Multimedia Evidence Video Acquisition from The version of this document is in draft form and is being provided for comment by all interested parties for a minimum period
More informationProposed Spoliation Rules Would Impact Apple-Samsung Trial
Published in: Law Technology News July 31, 2012 Proposed Spoliation Rules Would Impact Apple-Samsung Trial By Henry Kelston The jury trial in the multibillion dollar patent war between Apple and Samsung
More informationTypical Investigative Steps and Traveler cases
Typical Investigative Steps and Traveler cases Thomas K. Clancy copyright, Thomas K. Clancy, all rights reserved, 2012. "inside the box, outside the box" Outside the box The Box Sender (AOL) obtaining
More informationCase 1:14-cr KBF Document 57 Filed 09/05/14 Page 1 of 10 : : : : : : : : : DECLARATION OF CHRISTOPHER TARBELL
Case 114-cr-00068-KBF Document 57 Filed 09/05/14 Page 1 of 10 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - UNITED STATES OF
More informationDuo Travel Guide. duo.com
Duo Travel Guide duo.com Overview As a member of an organization protected by Duo, you already have secure access to applications and assets. This guide is designed to help you maintain that trusted access
More informationScientific Working Group on Digital Evidence
SWGDE Best Practices for Digital & Multimedia Evidence Video Acquisition from Disclaimer: As a condition to the use of this document and the information contained therein, the SWGDE requests notification
More informationTypical Investigative Steps and Legal Framework
Typical Investigative Steps and Legal Framework National Center For Justice And The Rule Of Law University of Mississippi School of Law Thomas K. Clancy Director www.ncjrl.org investigating on the internet
More informationCertified Digital Forensics Examiner
Certified Digital Forensics Examiner ACCREDITATIONS EXAM INFORMATION The Certified Digital Forensics Examiner exam is taken online through Mile2 s Assessment and Certification System ( MACS ), which is
More informationMOBILedit Forensic Express
MOBILedit Forensic Express All-in-one phone forensic tool from pioneers in the field MOBILedit Forensic Express is a phone and cloud extractor, data analyzer and report generator all in one solution. A
More informationHow To Factory Reset Iphone 4 When Locked Out Without A Computer
How To Factory Reset Iphone 4 When Locked Out Without A Computer Learn what to do if you have forgotten your ios device passcode, or if your device displays a If you enter the wrong passcode into an ios
More informationManual For Galaxy S Ii Review Cnet T Mobile
Manual For Galaxy S Ii Review Cnet T Mobile Its screen and camera disappoint, but Samsung's Galaxy Avant is one of T-Mobile's better options at this price. - Page 1. Samsung Galaxy S II T989 Android smartphone.
More informationMobile Devices Villanova University Department of Computing Sciences D. Justin Price Spring 2014
Mobile Devices Villanova University Department of Computing Sciences D. Justin Price Spring 2014 INTRODUCTION The field of computer forensics has long been centered on traditional media like hard drives.
More informationManual Does Iphone 5 Apple Replace My Broken >>>CLICK HERE<<<
Manual Does Iphone 5 Apple Replace My Broken Apple's policies for water-damaged, smashed or broken iphone replacements Try Apple's iphone 5 power button replacement programme include but are not limited
More informationDigital Forensics at a University. Calvin Weeks Director, Oklahoma Digital Forensics Lab University of Oklahoma
Digital Forensics at a University Calvin Weeks Director, University of Oklahoma Calvin Weeks Director, Former Director of IT Security Certified EnCASE Examiner (EnCE) VP of the local chapter of HTCIA Co-Chair
More informationManual For Android Phones From Verizon
Manual For Android Phones From Verizon Wireless New Non-smartphones More than 20 smartphones, including the exclusive Droid Turbo by Motorola, are If you don't want to buy a new prepaid cell phone, Verizon
More informationELECTRIC APP - PRIVACY POLICY
By accessing the website at http://electricchats.com ( Electric Site ) or any Electric mobile application (e.g., Electric ios, or Electric Android,) ( Electric App ) (collectively, the Electric Service
More informationIphone error code 0xe
Iphone error code 0xe8000015 If you don't like the data syncing that will be caused by using itunes, you can use a completely FREE itunes alternative introduced in. Step 11: Lastly make selection of the
More informationReviewing the Results of the Forensic Analysis
CYBERSECURITY FORENSICS WORKSHOP Reviewing the Results of the Forensic Analysis Ian M Dowdeswell Incident Manager, Q-CERT 2 CYBERSECURITY FORENSICS WORKSHOP Caveats This is not an actual crime it has been
More informationBEAT 2.0 USER MANUAL
BEAT 2.0 USER MANUAL FCC ID: 2ADLJBEAT20 The device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and
More informationSearching Securely: Technical Issues with Warrants for Remote Search. Steven M. Bellovin June 28,
Searching Securely: Technical Issues with Warrants for Remote Search Steven M. Bellovin June 28, 2015 1 The Fourth Amendment to the U.S. Constitution The right of the people to be secure in their persons,
More informationiphone 4S LCD Screen in BLACK - urepair High-End Repair Kit, High by Step instructions), Simcard Remover, Microfiber Cloth, iphone A1387 Unlocked.
Instructions For Unlocking Iphone 4s Screen Replacing Kit Compatible with all iphone 4S models. iphone 4S Replacement Battery - Fix Kit Install a new battery in eight easy steps and breathe new life into
More informationQuick Start User Guide For Cellebrite Extraction Reports
I.R.I.S. LLC Quick Start User Guide For Cellebrite Extraction Reports Impartial, objective advocates for the truth Quick start user guide for opening, navigating and creating custom reports in Cellebrite.
More informationPreservation, Retrieval & Production. Electronic Evidence: Tips, Tactics & Technology. Issues
Electronic Evidence: Preservation, Retrieval & Production Issues Tips, Tactics & Technology April 19, 2004 Discussion Outline 21 st Century Discovery E-Evidence Uncovered Preservation / Spoliation Computer
More informationCOMP116 Final Project. Shuyan Guo Advisor: Ming Chow
Digital Forensics with ios Devices COMP116 Final Project Shuyan Guo Shuyan.guo@tufts.edu Advisor: Ming Chow Abstract This project focuses on ios device forensics. The study provides a general overview
More informationAndroid Forensics: Automated Data Collection And Reporting From A Mobile Device
DIGITAL FORENSIC RESEARCH CONFERENCE Android Forensics: Automated Data Collection And Reporting From A Mobile Device By Justin Grover Presented At The Digital Forensic Research Conference DFRWS 2013 USA
More informationInControl INCONTROL OVERVIEW
INCONTROL OVERVIEW InControl uses smartphone and in-vehicle mobile technology, to remotely connect the vehicle to a number of services and convenience features. Note: For further information, access the
More informationQuicksilver 606 TR-606 CPU Upgrade
Quicksilver 606 TR-606 CPU Upgrade D650C 128 Installation Guide Social Entropy Electronic Music Instruments TABLE OF CONTENTS WARNINGS... 1 OVERVIEW... 2 WHAT'S IN THE BOX... 3 OPENING THE TR-606 CASE...
More informationBody Worn Cameras 9/11/2015. Body Worn Camera Legislation S.47 GETTING STARTED
Body Worn Cameras Body Worn Camera Legislation S.47 A few key points: The Law Enforcement Training Council shall develop guidelines for the use of body-worn cameras by state and local law enforcement agencies
More informationMobile Device Support. Jeff Dove February
Mobile Device Support Jeff Dove February 18 2017 Apple is a vertical company. Apple and IOS Control of type and design of hardware components Control over phone operating system and updates Control over
More informationLOCATION DATA. Location information from mobile devices is typically obtained using the following:
LOCATION DATA Location information from mobile devices is typically obtained using the following: 1. Cell PING (Triangulation) 2. Stingray device 3. Wi-Fi, Bluetooth tracking 4. Apps and Web browsing 5.
More informationMobile Devices. Objectives. Types of Devices 4/25/2012
Mobile Devices Objectives Identify mobile devices Learn how mobile devices obtain and transmit information Identify potential evidence that may be obtained from mobile devices Learn where data is stored
More informationFederal Rules of Civil Procedure IT Obligations For
Federal Rules of Civil Procedure IT Obligations For Email Message Logic is a business unit of Data Storage Corporation. 212-564-4922 www.messagelogic.net or www.datastoragecorp.com 2013 Data Storage Corporation,
More informationCHALLENGES IN MOBILE FORENSICS TECHNOLOGY, METHODOLOGY, TRAINING, AND EXPENSE
UDC 343.3/.7:340.6 Pregledni rad CHALLENGES IN MOBILE FORENSICS TECHNOLOGY, METHODOLOGY, TRAINING, AND EXPENSE American University in Bosnia & Herzegovina, BOSNIA & HERZEGOVINA, e-mail: edita.bajramovic@gmail.com
More informationAfter the Attack. Business Continuity. Planning and Testing Steps. Disaster Recovery. Business Impact Analysis (BIA) Succession Planning
After the Attack Business Continuity Week 6 Part 2 Staying in Business Disaster Recovery Planning and Testing Steps Business continuity is a organization s ability to maintain operations after a disruptive
More informationHead-to-head: Which will win for your business?
Head-to-head: Which will win for your business? When it comes to mobile operating systems (OS), chances are you re already pretty familiar with the big two Apple and Android. There s probably a device
More informationR E F E R E N C E L I B R A R I A N. Jane Larrington Faculty Services & Reference Librarian sandiego.edu
R E F E R E N C E L I B R A R I A N Jane Larrington Faculty Services & Reference Librarian jlarrington@ sandiego.edu 619.260.4766 Dangers of metadata for the uninitiated attorney Professional responsibilities
More informationCase 5:16-cm SP Document Filed 03/10/16 Page 1 of 6 Page ID #:2395
Case :-cm-0000-sp Document - Filed 0/0/ Page of Page ID #: 0 0 EILEEN M. DECKER United States Attorney PATRICIA A. DONAHUE Assistant United States Attorney Chief, National Security Division TRACY L. WILKISON
More informationUse of Personal Mobile Phone Whilst on Duty
Use of Personal Mobile Phone Whilst on Duty (Incorporating Smartphones and Hand Held Devices) Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland
More informationIntroducing. Introducing...
Introducing Introducing How PhotoFast EVO Plus is different It s the only flash drive that is cross platform The USB 3.0 is compatible with all USB based computers, and at the other end it works with ipod
More informationOFFICE OF THE PROSECUTING ATTORNEY DANIEL R. LUTZ 215 N. GRANT STREET WOOSTER, OHIO BAD CHECK PACKET
OFFICE OF THE PROSECUTING ATTORNEY DANIEL R. LUTZ 215 N. GRANT STREET WOOSTER, OHIO 44691 330-287-5633 BAD CHECK PACKET Requirements for Prosecution - Non-sufficient Funds (NSF) Checks: 1) Check must have
More informationDIGITAL FORENSICS FORENSICS FRAMEWORK FOR CLOUD COMPUTING
17.09.24 DIGITAL FORENSICS FORENSICS FRAMEWORK FOR CLOUD COMPUTING FORENSICS FRAMEWORK FOR CLOUD COMPUTING OUTLINE Abstract Introduction Challenges in cloud forensics Proposed solution Conclusion Opinion
More informationSPRING-FORD AREA SCHOOL DISTRICT
No. 801.1 SPRING-FORD AREA SCHOOL DISTRICT SECTION: TITLE: OPERATIONS ELECTRONIC RECORDS RETENTION ADOPTED: January 25, 2010 REVISED: October 24, 2011 801.1. ELECTRONIC RECORDS RETENTION 1. Purpose In
More informationQuick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.
Quick Heal Total Security for Android Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights Complete protection for your Android device that
More informationTIME SYSTEM SECURITY AWARENESS HANDOUT
WISCONSIN TIME SYSTEM Training Materials TIME SYSTEM SECURITY AWARENESS HANDOUT Revised 11/16/2017 2018 Security Awareness Handout All System Security The TIME/NCIC Systems are criminal justice computer
More information10/13/11. Objectives. Live Acquisition. When do we consider doing it? What is Live Acquisition? The Order of Volatility. When do we consider doing it?
Live Acquisition Objectives Understand what Live Acquisition is and when it is appropriate Understand the concept of Order of Volatility Understand live acquisition issues and limitations Be able to perform
More informationMobile Devices. Questions. NCJRL ICAC Webinar Mobile Devices October 25, Don Mason Associate Director, NCJRL. Presenter
Mobile Devices Presenter Don Mason Associate Director, NCJRL 662-915-6898 drmason@olemiss.edu Questions Feel free to email any time to: drmason@olemiss.edu Please include your phone number In case it might
More informationHard Reset Iphone 5 Without Lock Button >>>CLICK HERE<<<
Hard Reset Iphone 5 Without Lock Button My wife's iphone 5 phone, since we upgraded to ios 8 and now ios 8.1, has I have hard reset (home/lock button) multiple times and the screen is still locked. My
More informationUnderstanding Computer Forensics
Understanding Computer Forensics also known as: How to do a computer forensic investigation... and not get burned Nick Klein SANS Canberra Community Night 11 February 2013 The scenario... Your boss tells
More informationSample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited.
Sample BYOD Policy Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. SAMPLE BRING YOUR OWN DEVICE POLICY TERMS OF USE This Sample Bring
More informationCh 1: The Mobile Risk Ecosystem. CNIT 128: Hacking Mobile Devices. Updated
Ch 1: The Mobile Risk Ecosystem CNIT 128: Hacking Mobile Devices Updated 1-12-16 The Mobile Ecosystem Popularity of Mobile Devices Insecurity of Mobile Devices The Mobile Risk Model Mobile Network Architecture
More information(Geo)Location, Location, Location.!! Matt Blaze University of Pennsylvania
(Geo)Location, Location, Location!! Matt Blaze University of Pennsylvania Mobile Devices Computers, but you carry them with you they have lots of sensors (GPS, etc) they transmit (cell, wifi, bluetooth,
More informationSamsung Galaxy S3 Repair Video Calls Not Working
Samsung Galaxy S3 Repair Video Calls Not Working Hello, I have a problem with my galaxy s3, no caller voice when recieve or make a call and after No sound during calls (samsung galaxy s3 problem)support
More informationChecklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery
Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery To aid and advance the ability for a litigation to successfully employ computer-based discovery, Rule 16(c) of the Federal Rules
More informationiphone Encryption, Apple, and The Feds David darthnull.org
iphone Encryption, Apple, and The Feds David Schuetz @DarthNull darthnull.org NoVA Hackers October 13, 2014 Background Apple s new privacy page, On devices running ios 8 : Apple cannot bypass your passcode
More informationNew Model for Cyber Crime Investigation Procedure
New Model for Cyber Crime Investigation Procedure * *Dept. of IT & Cyber Police, Youngdong University, Rep. of Korea ydshin@youngdong.ac.kr doi:10.4156/jnit.vol2.issue2.1 Abstract In this paper, we presented
More informationWhen this policy mentions WanderJaunt, we, us, or our, it refers to the WanderJaunt, Inc.
WanderJaunt Privacy Policy Last Updated: June 20, 2018 Thank you for using WanderJaunt! This Privacy Policy describes how we collect, use, process, and disclose your information, including personal information,
More informationANALYSIS AND VALIDATION
UNIT V ANALYSIS AND VALIDATION Validating Forensics Objectives Determine what data to analyze in a computer forensics investigation Explain tools used to validate data Explain common data-hiding techniques
More informationQuick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.
Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights Complete protection for your Android device that simplifies security and significantly
More informationSamsung Galaxy S3 Repair Video Formats Support File
Samsung Galaxy S3 Repair Video Formats Support File How to Convert Video to Samsung Galaxy Format H.264 video and MP3, Here we list the supported file formats for Samsung Galaxy S5, S4, S3, S2 and S:.
More informationIn the chemical plant, gas station and other explosives near, Don't use watch on the plane. Please check whether the
Attention, Please read the following information before using. In the chemical plant, gas station and other explosives near, please shut down. Don't use watch on the plane. Please check whether the mobile
More informationMobile Device Investigations: From Android to iphone and Back. February 2017
Mobile Device Investigations: From Android to iphone and Back February 2017 1 Agenda Introduction to Mobile Forensics Mobile device 101 Different types of mobile devices Preservation of data on mobile
More information