Presenter Name. Date

Size: px
Start display at page:

Download "Presenter Name. Date"

Transcription

1 Presenter Name Date

2 Smartphone Forensics! Henry E. Saint-Fleur Antenna NFC microchip Presenter Name Date

3 Smartphone Forensics Background Henry Saint-Fleur! Background! Computer Science / Network Administration / Computer Programing! Forensics! Certified Computer & Mobile Forensic Examiner, Linux Forensic / Canadian Police College! Digital Investigations / Court! Fraud, Mischief to data and unauthorized use of computers, computer examination!

4 Smartphone Forensics

5 Potentially a rich source of evidence Smartphone Forensics The Cell Network Handheld mobile devices Hardware Operating System Security / Apps Data Extraction Process Forensic tools Live DEMO & warrant issues

6 Smartphone Forensics What is a Cell Phone? An electronic device used for mobile telecommunications, i.e. wireless telephony, text messaging or data transmission, through a cellular network. What about the definition of Computer systems Sec 342.1cc!

7 Smartphone Forensics Computer System? What about the definition of Computer systems under Sec cc!

8 !! DATA?! Smartphone Forensics

9 Smartphone Forensics Investigations! Death! National Security! Gangsterism Criminal Organization Offences! Threats, Criminal Harassment! Extortion! Drugs! Fraud! Identity theft! e-vidence Proceeds of Crime (custom excise)!! E-vidence! Communications! "- Voice & multimedia! Documents! Financial records! Location services! "- navigation systems! Internet activities! Logs! Personal life management!

10 Capabilities Smartphone Forensics! Multimedia! Multimedia features: Camera, Voice-audio, Geotagging! Internet access / Wi-Fi connectivity! Social Networking (Live IM, Self-contained)! Games! Tools (Life management, Calendar, To-Do, financial coach)! Banking transaction(s) and payment system(s)! NFC (Near field Communication Tracking

11 Camera Phones Smartphone Forensics Suspects will take their own photos with the evidence and sometime at the crime scene!?!

12 Introduction to Cell Phone Technology Geo Tag example / not Absolute

13

14 The Network o Each phone will have a unique ID o Each transaction creates a record o Tower dumps / Tracking Introduction to Cell Phone Technology!

15 Introduction to Cell Phone Technology! The Network o Tower dumps / Tracking

16 Smartphone Forensics, Handheld Devices

17 Smartphone Forensics, Extraction Process Acquisition TYPES 2007 Sam Brothers

18 Smartphone Forensics, Handheld Devices Circumvent Security? Devices case by case!

19 Smartphone Forensics, Extraction Process Cursory examination?! 1. Sever Network connectivity - Disable all radio transmission 2. Extraction of data 1. Commercial Tools 2. In-circuit 3. Data Chip removal 4. Manual examination 5. Reporting

20 Smartphone Forensics, Extraction Process Selective Extraction & Warrant issues! Selective extraction is not always feasible! What about data embedded in to data SMS in Pic

21 Automated process of Commercial tools " Data format on Mobile Phones! Stored in various formats Smartphone Forensics, Data Process! No consistency between Vendors/models or OS versions! Investigators require some understanding of these formats (binary, Hexadecimal, ASCII or Unicode)

22 Automated process of Commercial tools " Data format on Mobile Phones Smartphone Forensics, Data Process! Some data like the phone number, may be stored onto the phone using the reverse nibble format :! For instance, the phone number is F5! This means that each byte in the number is in reverse order and F is padding to complete the data structure.! Also (little vs Big endian; little-endian 32-bit UNIX date time stamp (Mon Oct 31 10:06: GMT-4) is HEX 4E AE AB 6F and would be stored as 6F AB AE 4E on a Motorola device

23 Smartphone Forensics, Data Process SMS time stamp at arrival! Short Message 6: Status : received - read Service Center Type of Number : international Service Center Numbering plan : E.164 ISDN Service Center Number : 17057****** Message Type (TP-MTI) : SMS-DELIVER Reply Path (TP-RP) : no RP More Messages Indicator (TP-MMS) : no more messages Status Report Indication (TP-SRI) : status report shall be returned Originator Type of Number : international Originator Numbering plan : E.164 ISDN Originating Address (TP-OA) : 17052****** Protocol Identifier (TP-PID) : mobile-mobile Data Coding Scheme-Coding : GSM Data Coding Scheme-Class : Immediate display Data Coding Scheme-Class : Service Centre Time Stamp : 11 Oct 08 20:25:37 GMT+00:00 Information Element 1 : Concatenated message, reference 238. Segment 1 of 3. Text : i dont know what to say cuz lately u havent been knocking it down its been going up. since u were in jail i brought the price down. and ur bro wont pay u

24 Smartphone Forensics, Data Process SMS date/time discrepancies when comparing two + seized devices! Short Message receiving phone: Short Message sending phone: Status : received - read Status : sent Service Center Type of Number : international Service Center Type of Number : Service Center Numbering plan : E.164 ISDN international Service Center Number : 17057****** Service Center Numbering plan : E.164 ISDN Message Type (TP-MTI) : SMS-DELIVER Service Center Number : 17057****** Reply Path (TP-RP) : no RP Message Type (TP-MTI) : SMS More Messages Indicator (TP-MMS) : no more Reply Path (TP-RP) : no RP messages More Messages Indicator (TP-MMS) : Status Report Indication (TP-SRI) : status report Status Report Indication (TP-SRI) : shall be returned Sending Address : ***** Originator Type of Number : international Originator Type of Number : international Originator Numbering plan : E.164 ISDN Originator Numbering plan : E.164 ISDN Originating Address (TP-OA) : 17052****** Protocol Identifier (TP-PID) : mobile-mobile Protocol Identifier (TP-PID) : mobile-mobile Data Coding Scheme-Coding : GSM Data Coding Scheme-Coding : GSM Data Coding Scheme-Class : Immediate Data Coding Scheme-Class : Immediate display display Data Coding Scheme-Class : Data Coding Scheme-Class : Service Centre Time Stamp : 11 Oct 08 Service Centre Time Stamp : 11 Oct 08 20:23:12 GMT+00:00 20:25:37 GMT+00:00 Information Element 1 : Concatenated Information Element 1 : Concatenated message, reference 238. Segment 2 of 3. message, reference 238. Segment 2 of 3. Text : and he gave u a sled Text : and he gave u a sled instead of paper. that doesnt help any one but instead of paper. that doesnt help any one but him. i just dont understand where my paper is him. i just dont understand where my paper is going. if u loose that bike then what. going. if u loose that bike then what.

25 Smartphone Forensics, Data Process Date-Time Stamp Note the Received: from line contains an IP address in the form we have already learned. Note the IP Address as well as the date & time. Four numbers separated by dots.

26 !! Smartphone Forensics, Data Analysis! Questions? Demo and report! - logs! - SMS / MMS (deleted unread)! - Embedded data (in App databases )! - Notes (date created) Calendar entry! - App analysis (Skype, facebook, maps, breadcrumb trail, Malware)! - Location Services (Consolidated.db, wi-fi / Cell Tower / GPS coordinates )!

27 Smartphone Forensics

SSDD and SSDF Handset seizure Paraben * Seizure test SE K850, SE Xperia

SSDD and SSDF Handset seizure Paraben * Seizure test SE K850, SE Xperia SSDD and SSDF Handset seizure Paraben * Seizure test SE K850, SE Xperia Small Scale Digital Device (SSDD) SSDD definition A Small Scale Digital Device is any of a variety of small form factor devices utilizing

More information

Mobile Devices Villanova University Department of Computing Sciences D. Justin Price Spring 2014

Mobile Devices Villanova University Department of Computing Sciences D. Justin Price Spring 2014 Mobile Devices Villanova University Department of Computing Sciences D. Justin Price Spring 2014 INTRODUCTION The field of computer forensics has long been centered on traditional media like hard drives.

More information

Vocabulary Bank organized by module

Vocabulary Bank organized by module Vocabulary Bank organized by module Module 1: Choosing a Computer Application: also called an "app," it is computer software created for a particular task or tasks; it is increasingly used to mean software

More information

MOBILE DEVICE FORENSICS

MOBILE DEVICE FORENSICS MOBILE DEVICE FORENSICS Smart phones and other handheld electronics have become an important part of our everyday lives and the ever changing technology is making these devices a major source of digital

More information

Digital Evidence: I know it s there, how do I get it?

Digital Evidence: I know it s there, how do I get it? : I know it s there, how do I get it? January 24, 2019 Matthew Rollins Senior Assistant District Attorney Paulding County Judicial Circuit Josh Reed Network Intrusion Forensic Analyst United States Secret

More information

Digital Forensics for Attorneys

Digital Forensics for Attorneys Lars E. Daniel, EnCE, ACE, AME, CTNS Digital Forensics Examiner Digital Forensics for Attorneys Overview of Digital Forensics Digital Forensics For Attorneys Overview of Digital Forensics Types of Digital

More information

How technology changed fraud investigations. Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011

How technology changed fraud investigations. Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011 How technology changed fraud investigations Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011 The Changing Cyberfraud Landscape Underground Economy Malware Authors Organized

More information

10/21/2013. The ubiquity of social media has lead inevitably to the involvement of digital evidence in nearly every segment of Criminal Practice

10/21/2013. The ubiquity of social media has lead inevitably to the involvement of digital evidence in nearly every segment of Criminal Practice Adam Zion Director of Information Technology Office of the Kings County District Attorney The ubiquity of social media has lead inevitably to the involvement of digital evidence in nearly every segment

More information

DIGITAL EVIDENCE TOOL BOX

DIGITAL EVIDENCE TOOL BOX DIGITAL EVIDENCE TOOL BOX Toolbox Page 1 of 23 Introduction This guide is meant to provide a basic understanding of the industry standards, best practices and practical applications for the use of digital

More information

Mobile forensics. SMS (Short Message Service) EMS, MMS, CBS

Mobile forensics. SMS (Short Message Service) EMS, MMS, CBS Mobile forensics SMS (Short Message Service) EMS, MMS, CBS How the Mobiles Work The Route of a Mobile Phone Telephone Call, (or SMS or user data traffic) SIM card Radio access network Core network MS/UE

More information

LOCATION DATA. Location information from mobile devices is typically obtained using the following:

LOCATION DATA. Location information from mobile devices is typically obtained using the following: LOCATION DATA Location information from mobile devices is typically obtained using the following: 1. Cell PING (Triangulation) 2. Stingray device 3. Wi-Fi, Bluetooth tracking 4. Apps and Web browsing 5.

More information

Cellebrite Digital Forensics for Legal Professionals (CDFL)

Cellebrite Digital Forensics for Legal Professionals (CDFL) Global forensic training Course description Level Intermediate Length Two days (14 hours) Training Track Investigative The two-day Cellebrite Digital Forensics for Legal Professionals course is designed

More information

Challenges and Opportunities for Statistics in Digital Forensics

Challenges and Opportunities for Statistics in Digital Forensics Challenges and Opportunities for Statistics in Digital Forensics Turing Gateway to Mathematics Isaac Newton Institute 1 st December 2016 Dr. James Luck (james.luck@met.police.uk) TOTAL POLICING Date Arial

More information

Technology in Action Complete, 13e (Evans et al.) Chapter 8 Digital Devices and Media: Managing a Digital Lifestyle

Technology in Action Complete, 13e (Evans et al.) Chapter 8 Digital Devices and Media: Managing a Digital Lifestyle Technology in Action Complete, 13e (Evans et al.) Chapter 8 Digital Devices and Media: Managing a Digital Lifestyle 1) Some 3d printers work by controlling the exact locations where a liquid will be exposed

More information

Trends in Mobile Forensics from Cellebrite

Trends in Mobile Forensics from Cellebrite Trends in Mobile Forensics from Cellebrite EBOOK 1 Cellebrite Survey Cellebrite is a well-known name in the field of computer forensics, and they recently conducted a survey as well as interviews with

More information

Running Head: IPHONE FORENSICS 1. iphone Forensics Jaclyn Sottilaro Monica Figueroa-Santos Antonina Spinella Saint Leo University

Running Head: IPHONE FORENSICS 1. iphone Forensics Jaclyn Sottilaro Monica Figueroa-Santos Antonina Spinella Saint Leo University Running Head: IPHONE FORENSICS 1 iphone Forensics Jaclyn Sottilaro Monica Figueroa-Santos Antonina Spinella Saint Leo University IPHONE FORENSICS 2 Abstract With an ever-growing evolution on technology,

More information

Airplane mode Android app application Back key bandwidth

Airplane mode Android app application Back key bandwidth 1G First-generation analog wireless telephone technology. 2G Second-generation wireless technology, the first digital generation and the first to include data services. 3G Third-generation wireless telephone

More information

Unit A: Computer and Internet Basics

Unit A: Computer and Internet Basics Unit A: Computer and Internet Basics TRUE/FALSE 1. Cars and appliances include digital electronics. ANS: T PTS: 1 REF: Concepts 2 2. Usually when people talk about computers, they are talking about a PC.

More information

Digital Forensics Mobile Device Data Extraction. Crime Scene/Digital and Multimedia Division

Digital Forensics Mobile Device Data Extraction. Crime Scene/Digital and Multimedia Division Mobile Device Data Extraction 12. MOBILE DEVICE DATA EXTRACTION PROCEDURE 12.1. Purpose 12.1.1. The purpose of this procedure is to extract data from mobile devices and/or removable media utilizing the

More information

09. Mobile Commerce. Contents. Mobile Computing and Commerce

09. Mobile Commerce. Contents. Mobile Computing and Commerce 09. (Contents) Mobile Commerce Contents 09. Mobile Commerce Mobile Computing and Commerce Code: 166140-01+02 Course: Electronic Commerce Period: Autumn 2011 Professor: Sangwon Lee, Ph.D. 1 09. (Contents)

More information

Topic Course Activities

Topic Course Activities The Absolute Basics What is a computer? 1. What is a computer? 2. What is a screen? 3. What is a keyboard? 4. What is a mouse? What is a laptop? 1. What is a laptop? 2. Using the touchpad 3. How to charge

More information

OXYGEN SOFTWARE OXYGEN FORENSIC KIT

OXYGEN SOFTWARE OXYGEN FORENSIC KIT OXYGEN SOFTWARE OXYGEN FORENSIC KIT Oxygen Forensic Kit complete out-of-the-box solution When to start? Immediately! Oxygen Forensic Kit is a complete set you can quickly use right out of the box. It does

More information

Identifying and Seizing Electronic Evidence. Tyler Wotring Director of Cyber Forensics National White Collar Crime Center

Identifying and Seizing Electronic Evidence. Tyler Wotring Director of Cyber Forensics National White Collar Crime Center Identifying and Seizing Electronic Evidence Tyler Wotring Director of Cyber Forensics National White Collar Crime Center twotring@nw3c.org Cyber Forensics How does technology affect forensics? How does

More information

Investigation and Intelligence Framework. Alan Ho, Kelvin Wong, Anthony Lai, Zetta Ke VXRL

Investigation and Intelligence Framework. Alan Ho, Kelvin Wong, Anthony Lai, Zetta Ke VXRL Investigation and Intelligence Framework Alan Ho, Kelvin Wong, Anthony Lai, Zetta Ke VXRL VXRL Valkyire-X Security Research Lab Non-profit Making group in HK Offensive, Creative and Fun Only one CTF team

More information

The Use of Technology to Enhance Investigation

The Use of Technology to Enhance Investigation The Use of Technology to Enhance Investigation Of High Profile Corruption Cases. Centre for Socio-Legal Studies Objectives By the end of this keynote, participants will be knowledgeable on: 1. Open Source

More information

Mobile Commerce. Electronic Commerce

Mobile Commerce. Electronic Commerce Mobile Commerce Electronic Commerce Code: 008023-01+02 Course: Electronic Commerce Period: Autumn 2013 Professor: Sync Sangwon Lee, Ph. D D. of Information & Electronic Commerce 1 00. Contents 01. Mobile

More information

Mobile Devices. Questions. NCJRL ICAC Webinar Mobile Devices October 25, Don Mason Associate Director, NCJRL. Presenter

Mobile Devices. Questions. NCJRL ICAC Webinar Mobile Devices October 25, Don Mason Associate Director, NCJRL. Presenter Mobile Devices Presenter Don Mason Associate Director, NCJRL 662-915-6898 drmason@olemiss.edu Questions Feel free to email any time to: drmason@olemiss.edu Please include your phone number In case it might

More information

Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition

Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition Chapter 7 Hacking Mobile Phones, PDAs, and Handheld Devices Objectives After completing this chapter,

More information

Sending images from a camera to an Android smartphone (PowerShot G3 X)

Sending images from a camera to an Android smartphone (PowerShot G3 X) Sending images from a camera to an Android smartphone (PowerShot G3 X) IMPORTANT In the following explanation, smartphone setting procedures are indicated by the icon, and camera setting procedures are

More information

Sending images from a camera to an iphone (PowerShot G3 X)

Sending images from a camera to an iphone (PowerShot G3 X) Sending images from a camera to an iphone (PowerShot G3 X) IMPORTANT In the following explanation, smartphone setting procedures are indicated by the icon, and camera setting procedures are indicated by

More information

En Wireless Mobile Utility (ios) User s Manual. D750, D610, D600, D7200, D7100, D5500, D5300, D5200, D3300, Df

En Wireless Mobile Utility (ios) User s Manual. D750, D610, D600, D7200, D7100, D5500, D5300, D5200, D3300, Df 1 En Wireless Mobile Utility (ios) User s Manual Install the Wireless Mobile Utility on your ios device (iphone, ipad, or ipod touch) to download pictures from a camera or take pictures remotely. The Wireless

More information

Facetime Manual Iphone 4s Not Work On 3g

Facetime Manual Iphone 4s Not Work On 3g Facetime Manual Iphone 4s Not Work On 3g in itunes and choose Restore Backup from the Summary tab then follow the instructions. You might find that people are trying to call you, but your iphone is not

More information

Mobile Forensics. Luis Rivera, Michael Zanchelli, Julio Poblete. Capstone: System Security IASP-470. Dr. John Yoon. Due 30 April, 2018

Mobile Forensics. Luis Rivera, Michael Zanchelli, Julio Poblete. Capstone: System Security IASP-470. Dr. John Yoon. Due 30 April, 2018 1 Mobile Forensics Luis Rivera, Michael Zanchelli, Julio Poblete Capstone: System Security IASP-470 Dr. John Yoon Due 30 April, 2018 2 Abstract Cell Phones have become an essential part of any person s

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

OXYGEN SOFTWARE OXYGEN FORENSIC KIT

OXYGEN SOFTWARE OXYGEN FORENSIC KIT OXYGEN SOFTWARE OXYGEN FORENSIC KIT Oxygen Forensic Kit complete out-of-the-box solution When to start? Immediately! Oxygen Forensic Kit is a complete set you can quickly use right out of the box. It does

More information

Chapter 8 Networking and Digital Communication

Chapter 8 Networking and Digital Communication Tomorrow s Technology and You 8/e George Beekman Michael J. Quinn Networking and Digital Communication 2008 Prentice-Hall, Inc. Slide 1 A computer network is any system of two or more computers that are

More information

Mobile Devices. Objectives. Types of Devices 4/25/2012

Mobile Devices. Objectives. Types of Devices 4/25/2012 Mobile Devices Objectives Identify mobile devices Learn how mobile devices obtain and transmit information Identify potential evidence that may be obtained from mobile devices Learn where data is stored

More information

Practice Examination 3

Practice Examination 3 Name Date Click here to enter text. Click here to enter text. Pearson BTEC Level 1 / Level 2 First Information and Creative Technology Unit 1: The Online World Practice Examination 3 This practice examination

More information

How to handle SMS messages

How to handle SMS messages How to handle SMS messages This section gives examples of the AT commands for sending and receiving SMS (Small Message Service) messages with the GM12. First we will discuss what an SMS is, and some details

More information

Test Results for Mobile Device Acquisition Tool: Zdziarski s Method

Test Results for Mobile Device Acquisition Tool: Zdziarski s Method 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 Test Results for Mobile Device Acquisition Tool: Zdziarski s Method October 2010 37 38 38 October 2010

More information

Introductory Visualizing Technology

Introductory Visualizing Technology Introductory Visualizing Technology Seventh Edition Chapter 6 Digital Devices and Multimedia Learning Objectives 6.1 Explain the Features of Digital Cameras 6.2 Compare Methods for Transferring Images

More information

Social Media Reputation Management

Social Media Reputation Management Social Media Reputation Management If you are using social media sites such as Facebook or Twitter, there are some simple steps you can take to manage your reputation and protect your identity. Even if

More information

SECTION 2 (Part B) Types And Components Of Computer Systems. Sophia Pratzioti

SECTION 2 (Part B) Types And Components Of Computer Systems. Sophia Pratzioti SECTION 2 (Part B) Types And Components Of Computer Systems 2 Hardware & Software Hardware: is the physical parts of the computer system the part that you can touch and see. Hardware can be either external

More information

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z This glossary provides definitions of terms and acronyms that are used in Premier as well as informative industry terms. Select the first letter of the word you want to find. A B C D E F G H I J K L M

More information

The Cellular Interceptor CC2800 Series

The Cellular Interceptor CC2800 Series The Cellular Interceptor CC2800 Series Operational Parameters The Target Mode enables the user to direct cellular interception by variables such as the IMSI, TMSI, or cellular phone number of the suspect.

More information

WELCOME Mobile Applications Testing. Copyright

WELCOME Mobile Applications Testing. Copyright WELCOME Mobile Applications Testing 1 NETWORK: WiFi ( Hotspots) A HOTSPOT is a physical location where people may obtain Internet access, typically using Wi-Fi technology, via a wireless local area network

More information

Turban and Volonino. Mobile Commerce. Information Technology for Management Improving Performance in the Digital Economy

Turban and Volonino. Mobile Commerce. Information Technology for Management Improving Performance in the Digital Economy Turban and Volonino Chapter 7 Mobile Commerce Information Technology for Management Improving Performance in the Digital Economy 7 th edition John Wiley & Sons, Inc. Slides contributed by Dr. Sandra Reid

More information

ELECTRIC APP - PRIVACY POLICY

ELECTRIC APP - PRIVACY POLICY By accessing the website at http://electricchats.com ( Electric Site ) or any Electric mobile application (e.g., Electric ios, or Electric Android,) ( Electric App ) (collectively, the Electric Service

More information

Skype Mobile Manual For Samsung Galaxy Ace

Skype Mobile Manual For Samsung Galaxy Ace Skype Mobile Manual For Samsung Galaxy Ace Gt-s5830 The main Specifications from Samsung Galaxy Ace GT-S5830 / GT-S5830i : Messenger (BBM) or Line Messenger or Skype or Viber or Path or Pinterest. This

More information

Manual Of Ios 7 Beta 2 Ipad Mini >>>CLICK HERE<<<

Manual Of Ios 7 Beta 2 Ipad Mini >>>CLICK HERE<<< Manual Of Ios 7 Beta 2 Ipad Mini ios is the foundation of iphone, ipad, and ipod touch. It comes with a collection of apps that let you do the everyday things, and the not-so-everyday things. Apple had

More information

MOBILE BANKING. Self Service FAQs

MOBILE BANKING. Self Service FAQs MOBILE BANKING Self Service FAQs General Questions... 2 What is Mobile Banking? 2 Is Mobile Banking secure? 3 Is my personal or financial information stored on my phone? 3 Are there fees to use Mobile

More information

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI)

Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Course 832 EC-Council Computer Hacking Forensic Investigator (CHFI) Duration: 5 days You Will Learn How To Understand how perimeter defenses work Scan and attack you own networks, without actually harming

More information

Welcome to First Security Mobile

Welcome to First Security Mobile Welcome to First Security Mobile Frequently Asked Questions Questions General How much does this service cost? Is it secure? Which wireless carriers are supported? Do I need a data plan? I'm not enrolled

More information

Digital forensics 5/5/18. Cell (mobile) phones. Data on the cell phone

Digital forensics 5/5/18. Cell (mobile) phones. Data on the cell phone Digital forensics Andrej Brodnik Cell (mobile) phones various technologies of data transfer sometimes mostly phones, today mostly computers chapter 20 rich source of personal data call history (incoming,

More information

Personal Cybersecurity

Personal Cybersecurity Personal Cybersecurity The Basic Principles Jeremiah School, CEO How big is the issue? 9 8 7 6 5 4 3 2 1 Estimated global damages in 2018 0 2016 2018 2020 2022 2024 2026 2028 2030 Internet Users Billions

More information

Electronic Crime Scene Investigation: An On-the-Scene Reference for First Responders

Electronic Crime Scene Investigation: An On-the-Scene Reference for First Responders U.S. Department of Justice Office of Justice Programs National Institute of Justice nov. 09 Electronic Crime Scene Investigation: An On-the-Scene Reference for First Responders www.ojp.usdoj.gov/nij U.S.

More information

Introduction to. Digital Forensics. Digital Forensics VEHICLE SOLUTIONS!

Introduction to. Digital Forensics. Digital Forensics VEHICLE SOLUTIONS! Introduction to DIGITAL FORENSICS The use of digital devices in everyday life continues to increase as people integrate technology into their lives. It is estimated that as of 2010, there were over 5 billion

More information

11/1/2018 Application Forensics

11/1/2018 Application Forensics 11/1/2018 Application Forensics Eric Swisher Vashaad Fincher Tracey MacLeavy Application Forensics Computer Forensics is the practice of collecting, analyzing and reporting on digital data in a way that

More information

Kodiak Broadband PTT for Public Safety

Kodiak Broadband PTT for Public Safety Kodiak Broadband PTT for Public Safety An Application Brief MOTOROLA SOLUTIONS and KODIAK are trademarks or registered trademarks of Motorola Trademark Holdings, LLC. This document is not an offer, commitment,

More information

FAST Installation (PMRS) Box Contents

FAST Installation (PMRS) Box Contents FAST Installation (PMRS) Box Contents PMRS Unit Video/Power Adapter GPS Antenna 5V Charger u USB Cable 12V 5V Car Adapter PTZ+GPIO Cable Voice splitter GSM Antenna (Optional) LAN Cable Required Items SIM

More information

Thank you for choosing VOYAGER

Thank you for choosing VOYAGER Svenska English Thank you for choosing VOYAGER VOYAGER is a 3G Connected Vehicle Smartphone using software based on Android OS. VOYAGER was created specifically for use in a vehicle. The device was designed

More information

Technology Safety Quick Tips

Technology Safety Quick Tips Technology Safety Quick Tips Spyware: Computer & Phone Monitoring Software It enables a person to secretly monitor someone else s entire computer activity. It can be installed remotely by sending an email,

More information

How Internet Evidence Told the Whole Story:

How Internet Evidence Told the Whole Story: : Criminal Investigation of a DDoS Attack www.encase.com/ceic How Internet Evidence Told the Whole Story: Criminal Investigation of a DDoS Attack About the Speakers Darren Sabourin 26 yrs sworn Federal

More information

MOBILE BANKING. Self Service FAQs

MOBILE BANKING. Self Service FAQs MOBILE BANKING Self Service FAQs General Questions... 2 What is Mobile Banking? 2 Is Mobile Banking secure? 3 Is my personal or financial information stored on my phone? 3 Are there fees to use Mobile

More information

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Glossary A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A App See Application Application An application (sometimes known as an app ) is a computer program which allows the user to perform a specific

More information

Mobile Banking - General Questions

Mobile Banking - General Questions Mobile Banking - General Questions What is Mobile Banking? Mobile Banking allows anyone with an online banking account to access their account information from a mobile phone. Mobile Banking offers three

More information

Sleek And Sociable. The new BlackBerry Curve 9350 smartphone

Sleek And Sociable. The new BlackBerry Curve 9350 smartphone Sleek And Sociable. The new BlackBerry Curve 9350 smartphone Staying social has never looked this cool, or been this easy. Sleek style meets simplicity with the new BlackBerry Curve 9350 smartphone. The

More information

A network is two or more computers, or other electronic devices, connected together so that they can exchange data.

A network is two or more computers, or other electronic devices, connected together so that they can exchange data. Computer Networks What is a Network? A network is two or more computers, or other electronic devices, connected together so that they can exchange data. For example; a network allows computers to share

More information

TERMS AND CONDITIONS FOR USE OF THE SAFARICOM PREPAY BLACKBERRY SERVICE

TERMS AND CONDITIONS FOR USE OF THE SAFARICOM PREPAY BLACKBERRY SERVICE TERMS AND CONDITIONS FOR USE OF THE SAFARICOM PREPAY BLACKBERRY SERVICE The following terms and conditions apply to the Safaricom Prepay Blackberry Service ( Prepay Blackberry Service ) and by using the

More information

CIS Business Computer Forensics and Incident Response. Lab Protocol 02: FileSystems/VM

CIS Business Computer Forensics and Incident Response. Lab Protocol 02: FileSystems/VM Name: CIS 8630 Business Computer Forensics and Incident Response Lab Protocol 02: FileSystems/VM Purpose: Ensure every student has experienced forensics distinctions between imaging digital storage media,

More information

Employee Privacy, Digital Evidence, and the CFE. Kenneth C. Citarella, M.B.A., J.D., CFE Managing Director, Investigations Guidepost Solutions LLC

Employee Privacy, Digital Evidence, and the CFE. Kenneth C. Citarella, M.B.A., J.D., CFE Managing Director, Investigations Guidepost Solutions LLC Employee Privacy, Digital Evidence, and the CFE Kenneth C. Citarella, M.B.A., J.D., CFE Managing Director, Investigations Guidepost Solutions LLC The Good Old Days CFE s Aerial View 1. What Information

More information

Computer Systems. Communication (networks, radio links) Meatware (people, users don t forget them)

Computer Systems. Communication (networks, radio links) Meatware (people, users don t forget them) Computers are useful machines, but they are generally useless by themselves. Computers are usually part of a system a computer system includes: Hardware (machines) Software (programs, applications) Communication

More information

Advanced Diploma on Information Security

Advanced Diploma on Information Security Course Name: Course Duration: Prerequisites: Course Fee: Advanced Diploma on Information Security 300 Hours; 12 Months (10 Months Training + 2 Months Project Work) Candidate should be HSC Pass & Basic

More information

Smartphone Forensics Moves Pretty Fast. If you don t Stay Current, You ll Miss Evidence

Smartphone Forensics Moves Pretty Fast. If you don t Stay Current, You ll Miss Evidence Bueller Bueller Smartphone Forensics Moves Pretty Fast. If you don t Stay Current, You ll Miss Evidence Hank Mahalik heather@smarterforensics.com Twitter: @HeatherMahalik http://smarterforensics.com 3

More information

Preparing Testimony about Cellebrite UFED in a Daubert or Frye Hearing

Preparing Testimony about Cellebrite UFED in a Daubert or Frye Hearing Preparing Testimony about Cellebrite UFED in a Daubert or Frye Hearing Table of Contents The Cellebrite UFED is among the best known and most used mobile forensic extraction and analysis tools in the digital

More information

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps

More information

Securing Cost Savings for Scottish Police

Securing Cost Savings for Scottish Police Securing Cost Savings for Scottish Police Single communications infrastructure improves inter-force collaboration and supports CESG security standards Executive Summary Customer Name Scottish Police Services

More information

Manual Of Ios 7.1 Beta 5 Iphone 4 Performance

Manual Of Ios 7.1 Beta 5 Iphone 4 Performance Manual Of Ios 7.1 Beta 5 Iphone 4 Performance Speed comparison between iphone 4S ios 7.1.2 and 8.0.2 This test was made on 2 iphone. Use the early iphone 4s ios 8.4 reviews to decide if you should install

More information

OXYGEN SOFTWARE OXYGEN FORENSIC KIT

OXYGEN SOFTWARE OXYGEN FORENSIC KIT OXYGEN SOFTWARE OXYGEN FORENSIC KIT Oxygen Forensic Kit complete out-of-the-box solution When to start? Immediately! Oxygen Forensic Kit is a complete set you can quickly use right out of the box. It does

More information

The smartest of smartphones

The smartest of smartphones The smartest of smartphones Samsung Galaxy S II now available on TransACT's Endless mobile plan! Over 250,000 Android TM apps $39 Min cost is $39 on a -to- plan. 500MB SIM only plan Switch to TransACT

More information

Trends in Lawful Interception and Its Applications in National Security

Trends in Lawful Interception and Its Applications in National Security Vol.1 No. 2, 95-99 (2012) Received Aug.2012; Accepted Nov.2012 Trends in Lawful Interception and Its Applications in National Security Abstract Namita Saxena and Mansi Singh Electronics and Communication

More information

ZEED T-Connect User Guide for DA Linkage

ZEED T-Connect User Guide for DA Linkage ZEED T-Connect User Guide for DA Linkage TABLE OF CONTENTS 1. Introduction 1. About DA Linkage 2. Operating Conditions 2. Screen Overview 1. Display Audio (DA) 2. App Suite Screen 3. Before Setup 1. App

More information

Network Investigation Toolkit / 2nd Generation

Network Investigation Toolkit / 2nd Generation NIT Network Investigation Toolkit / nd Generation The Most Powerful Tactic Tool for Internet Content Monitoring and Forensics Analysis on Both Wired and Wireless Networks Video Stream FTP E-Mail PP Chat

More information

Manual Apple Iphone 5s 32gb Price In Usa. Without Contract >>>CLICK HERE<<<

Manual Apple Iphone 5s 32gb Price In Usa. Without Contract >>>CLICK HERE<<< Manual Apple Iphone 5s 32gb Price In Usa Without Contract Apple iphone 5S 32GB "Factory Unlocked" ios 4G LTE Smartphone. USA Seller - No Contract Required - Fast Shipping!! $359.95. Buy It Now. Free Shipping.

More information

Typical Investigative Steps and Traveler cases

Typical Investigative Steps and Traveler cases Typical Investigative Steps and Traveler cases Thomas K. Clancy copyright, Thomas K. Clancy, all rights reserved, 2012. "inside the box, outside the box" Outside the box The Box Sender (AOL) obtaining

More information

ANALYSIS AND VALIDATION

ANALYSIS AND VALIDATION UNIT V ANALYSIS AND VALIDATION Validating Forensics Objectives Determine what data to analyze in a computer forensics investigation Explain tools used to validate data Explain common data-hiding techniques

More information

Verizon Bluetooth Use Manual For Samsung Galaxy S3 On T Mobile

Verizon Bluetooth Use Manual For Samsung Galaxy S3 On T Mobile Verizon Bluetooth Use Manual For Samsung Galaxy S3 On T Mobile Hi, my Galaxy S3 bluetooth can't even scan my Jabra BT2080 headset and also my itech bluetooth headset. There was no need to use this menu,

More information

Offline Location Based Services Using Android OS Implemented In Smartphone and Beagleboard Xm

Offline Location Based Services Using Android OS Implemented In Smartphone and Beagleboard Xm ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:

More information

DATA RECOVERY FROM PROPRIETARY- FORMATTED CCTV HARD DISKS

DATA RECOVERY FROM PROPRIETARY- FORMATTED CCTV HARD DISKS Chapter 15 DATA RECOVERY FROM PROPRIETARY- FORMATTED CCTV HARD DISKS Aswami Ariffin, Jill Slay and Kim-Kwang Choo Abstract Digital video recorders (DVRs) for closed-circuit television (CCTV) commonly have

More information

BlackBerry Bold 9650

BlackBerry Bold 9650 BlackBerry Bold 9650 The only time a Tata phone won t be accessible. Please switch off your mobile phones during presentations. Be safe and help create a safe environment. Acquaint all on Safety. Take

More information

Wireless Public Alerting

Wireless Public Alerting Wireless Public Alerting 1. What is wireless public alerting? Wireless public alerting allows governments across Canada to send public safety messages directly to smartphones in a region. If there is an

More information

A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES

A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES A QUALITY SUPPORT FOR YOUR FINAL YEAR PROJECT DEVELOPMENT & RESEARCH WORK ANDROID TOPICS RESEARCH AND CONFERENCE ORIENTED TITLES We are experts in, CODING SUPPORT FOR FINAL YEAR PROJECT JOURNAL PREPARATION

More information

COMP327 Mobile Computing Session: Lecture Set 6 - Personal Area Networks and Wireless Connections - Part 2

COMP327 Mobile Computing Session: Lecture Set 6 - Personal Area Networks and Wireless Connections - Part 2 COMP327 Mobile Computing Session: 2017-2018 Lecture Set 6 - Personal Area Networks and Wireless Connections - Part 2 35 Recap from Part 1 Wireless Connection Technologies Wireless Personal Area Networks

More information

Faheem, Muhammad; Le-Khac, Nhien-An; Kechadi, Tahar. Journal of Information Security, 5 :

Faheem, Muhammad; Le-Khac, Nhien-An; Kechadi, Tahar. Journal of Information Security, 5 : Provided by the author(s) and University College Dublin Library in accordance with publisher policies. Please cite the published version when available. Title Smartphone Forensic Analysis: A Case Study

More information

2010 American Mobile Consumer Report

2010 American Mobile Consumer Report 2010 American Mobile Consumer Report March 5, 2010 Experian and the marks used herein are service marks or registered trademarks of Experian Information Solutions, Inc. Other product and company names

More information

Manual Of Ios 7 Beta 3 Iphone 5 A1429) >>>CLICK HERE<<<

Manual Of Ios 7 Beta 3 Iphone 5 A1429) >>>CLICK HERE<<< Manual Of Ios 7 Beta 3 Iphone 5 A1429) ios 8 3 Beta 3 build 12F5047f with Activation for iphone 5 Model A1429 CDMA. DOWNLOAD Instructions.rtf 837 Byte June 3, 2015, 7:38 pm by Azul posted. 4 (GSM Rev iphone4,1

More information

Manual For Android Phones From Verizon

Manual For Android Phones From Verizon Manual For Android Phones From Verizon Wireless New Non-smartphones More than 20 smartphones, including the exclusive Droid Turbo by Motorola, are If you don't want to buy a new prepaid cell phone, Verizon

More information

Introduction to Volume Analysis, Part I: Foundations, The Sleuth Kit and Autopsy. Digital Forensics Course* Leonardo A. Martucci *based on the book:

Introduction to Volume Analysis, Part I: Foundations, The Sleuth Kit and Autopsy. Digital Forensics Course* Leonardo A. Martucci *based on the book: Part I: Foundations, Introduction to Volume Analysis, The Sleuth Kit and Autopsy Course* Leonardo A. Martucci *based on the book: File System Forensic Analysis by Brian Carrier LAM 2007 1/12h Outline Part

More information

Get Smart. Get Smart. This is not about. What kind of phone you have Specific farming apps Actually size doesn t matter 30/04/2015

Get Smart. Get Smart. This is not about. What kind of phone you have Specific farming apps Actually size doesn t matter 30/04/2015 Get Smart Presented by: Marlene Williamson and Dr Debbie Care Get Smart Morning: Definitions & Understandings Afternoon: Camera & GPS Calendars & Tasks Collaboration Tools Documents This is not about.

More information