Mobile Phone Forensics Michael Jones. Overview Mobile phones in crime The mobile phone system Components of a mobile phone The challenge of forensics.

Slides:



Advertisements
Similar presentations
Aspire Vertical Markets Executive Suite Solution.
Advertisements

CS4032 Presentation SMS, SIM, MMS and Barcodes Richard Drysdale.
Networks & Components Discuss the components required for successful communications Explain the purpose of communications software Identify various sending.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 13 Cell Phone and Mobile Devices Forensics.
POC Security System High security system combining PIN-on-Card, information security, physical access, control and alarm – all in one system.
GSM Security and Encryption
Islamic University-Gaza Faculty of Engineering Electrical & Computer Engineering Department Global System for Mobile Communication GSM Group Alaa Al-ZatmaHosam.
CELL PHONE CLONING Presented by: NAVRATNA OJHA EC IIIrd YEAR
GSM Network. GSM-Introduction Architecture Technical Specifications Frame Structure Channels Security Characteristics and features Applications Contents.
GS3055-I GSM Universal Wireless Alarm Communicator
Aloaha protects Mobile M2M Communication with secureSIM.
By Neha choudhary Asst.Professor CSE/IT LHST-A.  GSM-Introduction  Architecture  Technical Specifications  Characteristics and features  Applications.
Communications and Networks
COS 413 Day 21. Agenda Assignment 6 is Due Lab 6 Corrected –1 A, 4 B’s, 1 C, 2 D’s and 1 non submit LAB 7 write-up not corrected –Missing two Assignment.
GSM Security Overview (Part 1)
MOBILE PHONE ARCHITECTURE & TECHNOLOGY. HISTORY  The idea of the first cellular network was brainstormed in 1947  Disadvantages  All the analogue system.
Winner Follow Me Presented by Telecom Transborder Services.
By Paul Capers.  A cell phone is a portable telephone that does not use a wired connection. It connects to a wireless carrier network using radio waves.
Evolution from GMS to UMTS
Cellular Networks How do Mobile & Satellite Phones work? What can we do with them?
Information Security for Managers (Master MIS)
Grover Kearns, PhD, CPA, CFE Class Videos 2 How works Spoofing
SEMINAR ON “ GPRS “ GPRS- General Packet Radio Service provides a direct link into the Internet from a GSM phone Downloaded From Projectsbhangar.com.
Mobile Phone Networks Dr. Hassan Nojumi1 MOBLIE PHONE NETWORKS Dr. Hassan Nojumi.
Use of IT Resources for Evidence Gathering & Analysis Use of IT Resources for Evidence Gathering & Analysis Raymond SO Wing-keung Assistant Director Independent.
 Global System for Mobile Communications (GSM) is a second generation (2G) cellular standard developed to cater voice services and data delivery using.
COMMUNICATION SYSTEM (2) CT1401 LECTURE-9 : MOBILE PHONE BY : AFNAN ALAYYASH SUPERVISION : DR.OUIEM BCHIR.
Members of our Presentation  (Bsts09-08) Hafiz Umer Ejaz  (Bsts09-09) Rai-Habib Ullah  (Bsts09-31) M.Arsalan Qureshi  (Bsts09-32) Shoaib Ansari 
Computer Concepts 2014 Chapter 5 Local Area Networks.
GSM Network Structure Lance Westberg.
GS3055-I GSM Universal Wireless Alarm Communicator
MOBILE COMMUNICATION G.S.M. & G.P.R.S.. Evolution of mobile telephone systems Cellular subscriber growth worldwide Currently more than 45 million cellular.
Guide to Computer Forensics and Investigations Third Edition Chapter 13 Cell Phone and Mobile Devices Forensics.
Network components of the Switching Subsystem The switching Subsystem comprises the following subsystems. MSC (Mobile Switching Centre) HLR (Home location.
Paradox Communication Solution GPRS / GSM
Mobile Communication Session #1 Dr. C.H. Vithalani Head of the E.C. Department A.V. Parekh Technical Institute, Rajkot.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
PHONE CLONING TECHNOLOGY
Cellular Communication SNSCE - CS2402 Mobile Pervasive Computing.
Transferring data.  Most commercial computer users need to allow their employees to share data.  It also needs more than one employee to access the.
A SEMINAR REPORT ON CELLULAR SYSTEM Introduction to cellular system The cellular concept was developed and introduce by the bell laboratories in the.
Wireless Telecommunications Networks personal area network (PAN) A wireless telecommunications network for device-to-device connections within a very short.
Private Branch eXchange (PBX)
Overview of cellular system
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Presented by: Gurpreet Singh Assistant Professor Department of School of Computing and Engineering Galgotias University Cellular Communication.
Topic 6, Lesson 3: The Internet Computer Communications and Networking.
 GPRS What’s in this slide?  Introduction to GPRS.  History  GPRS Service.  GPRS Speeds.  GPRS Mobile Devices.  Services of GPRS.  GPRS in practice.
GPRS General Packet Radio Service Shay Toder – Ori Matalon The Department of Communication System Engineering Ben-Gurion University June 19, 2002.
Sniffer for Detecting Lost Mobiles
Sniffer for Detecting Lost Mobile Created By:. Contents Introduction What Sniffer is ? IMEI Design Working Advantages Conclusion References.
GLOBAL SYSTEM FOR MOBILE COMMUNICATION
Digital Forensics and Hand Held Devices Robert Trimble COSC
1 Wireless Networks Lecture 17 GPRS: General Packet Radio Service (Part I) Dr. Ghalib A. Shah.
Page 1 bY MCA, M.Tech (pursuing) Lecturer Dept.of Computer Scinece SHAFI Degree College, Bisalpur (Pilibhit) UP, INDIA.
10. Mobile Device Forensics Part 2. Topics Collecting and Handling Cell Phones as Evidence Cell Phone Forensic Tools GPS (Global Positioning System)
Mobile communication methods
Overview of the GSM for Cellular System
Circuit Switching and Telephone Network
Wireless Network PMIT- By-
GLOBAL SYSTEM FOR MOBILE COMMUNICATION
GSM SECURITY AND ENCRYPTION
SEMINAR ON “ GPRS “ GPRS- General Packet Radio Service provides a direct link into the Internet from a GSM phone.
Mobile communication methods
ANALYSIS OF CELL PHONES
Networks Learning Outcome 1
ECEN “Internet Protocols and Modeling”
Dept. of Business Administration
Guide to Computer Forensics and Investigations Fourth Edition
Presentation transcript:

Mobile Phone Forensics Michael Jones

Overview Mobile phones in crime The mobile phone system Components of a mobile phone The challenge of forensics So many handsets, so little time… Michael Jones2Mobile Phone Forensics

Mobile Phones in Crime Direct: the phone as an instrument of crime – Terrorism – Cyber bullying Indirect: the phone as an accessory – Contacts – Phone calls and messaging General – The phone is a ‘must have 24/7’ device Michael JonesMobile Phone Forensics3

Data Recovered from a Mobile Phone Same questions as for all investigations Is the data valid? – Is it an accurate reflection of events? – Is it complete? Is the data reliable? – Are the measurements accurate? – Could they have been tampered with? Michael JonesMobile Phone Forensics4

The Mobile Phone System First mobile telephone system was developed and inaugurated in the U.S. in 1945 in St. Louis, Missouri. – Bell Laboratories were responsible for most developments The system (still, today) uses a number of hexagonal ‘cells’ that handle connections with mobile devices Cells use different frequencies Communication is full duplex Michael JonesMobile Phone Forensics5

Mobile Phone Generations 1G – Analogue 2G (includes 2.5, 2.75) – Digital, mostly GSM, circuit switched 3G – High speed IP data networks and mobile broadband), packet switched 4G – All IP networks. Use of Internet, LAN, etc. Michael JonesMobile Phone Forensics6

Cell Phone Channels Carriers are allocated a number of channels per city/geographical area – One channel = 1 form of communication There is therefore a capacity on each cell – Each phone call needs 2 channels for full duplex – And some channels are reserved for control communications Michael JonesMobile Phone Forensics7

Making a call The caller’s phone sends a request to the nearest cell – The cell controlling the callee is then located – The request is then sent to that phone And the phone rings When a person moves – There is a handover to the nearest cell Many issues with this Michael JonesMobile Phone Forensics8

Components of a Mobile Phone IMEI number – International Mobile Equipment Identity – Unique at the point of manufacture SIM card – Subscriber Identity/Identification Module – Includes: service-subscriber key (IMSI) security authentication and ciphering information temporary information related to the local network a list of the services the user has access to two passwords (PIN for usual use and PUK for unlocking) – Uses Public Key Infrastructure (PKI) Michael JonesMobile Phone Forensics9

Capture – Should the phone be turned off? – What about fingerprints? Investigation – Where is the data? SIM card Phone memory – How to access the data? Michael JonesMobile Phone Forensics10

Accessing the Data Types of access – Physical and logical Logical – Most phones use a proprietary storage format This may be becoming less common This complicates investigation of physical acquisition – The meaning of what is stored is often not clear Many manufacturers include their own ‘features’ Michael JonesMobile Phone Forensics11

A Forensic Investigation Need to use a forensic investigation ‘kit’ This reads the data in a forensically sound manner – Read only, write blocking The kit needs to have – All the relevant connectors and battery connections – Up-to-date software to locate and read the data Michael JonesMobile Phone Forensics12

Communications SIM card reader WiFi Bluetooth Michael JonesMobile Phone Forensics13

What Data is Included? Logs – Calls, missed calls, SMS messages Contacts – Including ‘speed dial’ numbers Locations – If GPS enabled Michael JonesMobile Phone Forensics14

Issues Multiple phones – Have you captured all relevant phones? Pay-as-you-go – Unregistered phones Multiplicity of phones – Thousands of models available – Most with proprietary OS and filing systems Time and cost Storage – Faraday bag Michael JonesMobile Phone Forensics15

Summary Mobile phones are a valuable source of data – Location(s) – Activities Most people own at least one – And phones are (generally) reliably unique Criminals are aware of the capabilities of mobile forensics Michael JonesMobile Phone Forensics16