Cellular Records Review and Analysis Part 2: Verizon.

Slides:



Advertisements
Similar presentations
Practical Application of Computer Forensics Lisa Outlaw, CISA, CISSP, ITIL Certified.
Advertisements

Intermediate 2 Computing
Unified Communications (UC) Quick Reference Guide USING YOUR UC CLIENT This guide is designed to provide you with a quick overview of the Unified Communications.
A Parent’s Guide to School Communication
The Electronic Office Some supplementary information Corporate websites Office automation Company intranet.
The current System Landline caller The emergency call process starts with a caller dialing (highly simplified) © 2011 Colorado Resource.
PUBLIC RELATIONS/MARKETING/ SOCIAL MEDIA John Bauer, ACG, ALB Public Relations Officer 2014/2015.
(C) Oxygen Software, Oxygen Forensic Suite – Premium Mobile Examination Extracting.
Washington State Archives February 2010 Presented by: Russell Wood – State Records Manager Managing Public Records of Agency Websites.
September 9, 2009 Michael W. McKeehan Executive Director, Internet & Technology Policy Online Safety: Protecting Consumers.
Washington State Archives Documenting Democracy Washington State Archives September 2010 Managing Public Records Websites, Databases, and Social Media.
Communications and Networks
On-Line Database Placement Application Tutorial. How to Change Your Information On York’s System.
Internet Basics 1 Internet Basic includes two lessons:  Lesson 1: The Internet  Lesson 2: The World Wide Web.
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
Information Resources and Communications University of California, Office of the President System-Wide Strategies for Achieving IT Security at the University.
Introduction To Information Technology. Defining Information What is Information? Information is any knowledge that comes to our attention. That could.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.
“Internet” and “Operator” (COPPA Statute) InternetOperator Collectively the myriad of computer and telecommunications facilities, including equipment.
Metadata – Threats, PII at RISK ? Sudesh Gadewar.
Online Algebra I- Ansell Mr. Ansell
MessageSync™ Exclusively By: TELETOUCH PAGING, LP A Critical Alerts System Company.
Mobile Phone Networks Dr. Hassan Nojumi1 MOBLIE PHONE NETWORKS Dr. Hassan Nojumi.
Use of IT Resources for Evidence Gathering & Analysis Use of IT Resources for Evidence Gathering & Analysis Raymond SO Wing-keung Assistant Director Independent.
9/10/2015 What’s New? Edline at Valley View!! Joyce Potempa Technology Department presentation to Building Support Staff February 2, 2010 Institute Day.
Wireless Ads - Six Steps 1.Determining Wireless Ad objectives 2.Developing a Wireless Strategy 3.Considering Types of Wireless Ads 4.Producing Wireless.
Preparing Résumés and Application Letters Business Communication, 15e Lehman and DuFrene Business Communication, 15 th edition by Lehman and DuFrene 
Communications and Networks Chapter 8. 2 Introduction We live in a truly connected society. Increased connectivity potentially means increased productivity,
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
CALEA Market Overview Robert Golden Chief Research Officer Merit Network CALEA and Beyond January 31, 2007.
“E” Products Mobile Data, eRouting, eService Jim Snyder, Peter Schwier, Susan York.
WIRELESS IN YOUR LIBRARY The Anatomy of a Library Communications Network.
What is the Internet? Internet: The Internet, in simplest terms, is the large group of millions of computers around the world that are all connected to.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
TATS – View/Update Consultant Profile Department of Health and Human Services Health Resources and Services Administration HIV/AIDS Bureau.
Machine-to-Machine(M2M) Communication for cdma2000 Systems Orlett W. Pearson, 3GPP2 Liaison Report to TR-50 August 2011.
Activating Clarity  Activating Clarity  Activation  Online Activation  Fax Activation  Review and Verify Activation and License Terms  Updating.
Chapter Secretaries’ Workshop Steven D. Johnson Sooner State Chapter Secretary SCTE.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 2 The HIPAA Privacy Standards HIPAA for Allied Health Careers.
Logging Service Desk calls Need ICT Help?. Contacting ICT Service Desk What information should I supply for computer or account issues What to do once.
UNDERSTANDING YOUR ONLINE OFFICE. When you subscribe to mid global gate, You will be furnished with a Welcome Letter with a 12-digit PIN.. You will be.
ONE® Pages Training Presentation North York General Hospital.
Apple Inc ISO. Organisation chosen Apple Store The company designs, manufactures and markets personal computers, portable digital.
Apple Inc ISO.
Legal Holds Department of State Division of Records Management Kevin Callaghan, Director.
Communication Methods
Cybercrime Courses 1.Child Protection Software 2.Forensic Scan 3.Internet For Investigators 1.Intelligence Gathering On The Internet (Open Source) 1.Covert.
Digital Forensics Market Analysis: By Forensic Tools; By Application (Network Forensics, Mobile Forensics, Database Forensics, Computer Forensics) - Forecast.
Cooperating with Internet Service Providers OSCE, Vienna, 24 th October 2008.
Cell Phone Forensics Investigator - ICFECI
Telephone Call Interception System with GPS / IP based Monitoring with GPS / IP based Monitoring “TCIS”
Digital Forensics and Hand Held Devices Robert Trimble COSC
Dial For Twitter Support Number. How to Join Twitter to Use for Business and Marketing? While the registered users can post and share tweets,
Cellular Records Review and Analysis Part 3: Sprint
Cellular Records Review and Analysis Part 1: AT&T
Oxygen Forensic Detective
Cellular Records Review and Analysis Part 1: AT&T
ANALYSIS OF CELL PHONES
UGA Extension Credit Card Processing Training
Cellular Records Review and Analysis Part 5: Miscellaneous
Cellular Records Review and Analysis Part 4: T-Mobile
No No, Yes Yes: Simple Privacy & Information Security Tips Krista Barnes, J.D. Senior Legal Officer and Director, Privacy & Information Security, Institutional.
Cellular Records Review and Analysis Part 3: Sprint
Red Flags Rule An Introduction County College of Morris
Forensics Week 7.
How to Update your Contact Information (Business- Billing - Technical etc) To Update your Contact Information please submit an request to your Sales.
How to Update your Contact Information (Business- Billing - Technical etc) To Update your Contact Information please submit an request to your Sales.
ShotSpotter, Cellular Data, and the Future of Digital Forensics
Case Study Template Kerecis Aurora Awards
Presentation transcript:

Cellular Records Review and Analysis Part 2: Verizon

PATCtech Glenn K Bard, Chief Technology Officer Scott Lucas, Instructor and Examiner Steve Dempsey, Instructor Kathy Enriquez, Instructor Brian Sprinkle, Case Manager and Software consultant Jim Alsup, Director – PATC Keenan Dolan, Webinar Manager Stefani Lucas, Marketing Director

Glenn K. Bard Public Agency Training Council tech Chief Technical Officer PA State Trooper – Retired NCMEC – Project ALERT CISSP, EnCE, CFCE, CHFI, A+, Network+, Security+, ACE, AME

For Starters What can we get from Verizon?

Cell phone technology What can Verizon provide with appropriate legal process? Call detail logs Cell Sites accessed Cell site sector Azimuth Type of tower (Lucent / Nortel) Beam Width Direction of call (incoming or outgoing) Calling number Dialed number Call Time and duration (Seizure) Location of cell tower

Cell phone technology Subscriber information (Name, address, etc) SMS content ESN / MEID, MIN, MDN of target phone. Phone Model Tower dump Definitions page (Key Codes) Reports of Lost / stolen phone If prepaid, where purchased? Other phones on the same account Cell sites at the time of the incident (Not current) Range To Tower (RTT) Contents of the Cloud

Some important definitions MDN – Mobile Directory Number MIN- Mobile Identification Number ESN – Electronic Serial Number MEID – Mobile Equipment Identifier Element – Switch name Azimuth – The median of the sector accessed RTT – Range To Tower

Some important definitions Beam Width – The width of the sector accessed Seizure date / time – The day and time of the initiation of the call. Seizure duration – Total elapsed time of the call. Alpha / Beta / Gamma – side of the tower accessed.

Some important tips Dates and times are based upon local time zone. You will need both the incoming outgoing calls, and the Element tower locations to do any mapping. The records will come in Excel spreadsheets. Except contents of SMS, those will be in PDF. SMS locations are in RTT only, not in conventional records.

Some important tips Tower Dumps are Voice only. Verizon does use the terms Lucent or Nortel when describing the tower sides. The whole switch must be Lucent or Nortel. For Lucent, you have to subtract one. 4=3, 3=2, 2=1. (Alpha / Beta / Gamma helps with this.) For Nortel, 3=3, 2=2 and 1=1

Contact information Contact Name: Custodian of Records Online Service: Verizon Legal Compliance Online Service Address: 180 Washington Valley Road Bedminster, NJ Phone Number: Fax Number: Preservation Letters Fax: Subpoenas Fax: Court Orders Fax: Electronic Surveillances: Exigent requests:

Warrant language Subscriber information for the number _____________ including name, date of birth, mailing address, alternate phone number, and other numbers on the same account. All communication for the wireless number _______________ for the time period of _______________ to include cellular calls, tower locations and azimuth for the sectors accessed during the communication for all Element’s accessed. Also indicate if the tower was Lucent, Nortel and provide a three sector layout. As well as possible maximum ranges. Additionally RTT (Range To Tower) for the cellular phone number of _____________________ for the time period of _______________. Also, all content for SMS messages for the wireless account of ___________________________ for the time period of ____________________. Additionally, identify the existence of any Verizon cloud services associated with the wireless number of ____________________________ and provide any data held within the cloud to include SMS, MMS, and s communications. Also provide any IP (Internet Protocol Addresses) assigned to the device for the time period of _____________________. Lastly, provide a detailed definitions page which identifies all information in the records. Please provide this information to Detective ________________ in digital format on a compact disc in Excel, PDF or TXT format.

Retention periods Subscriber information: 5 years Call History: 1 years Tower Locations: 1 years SMS Content: 3-5 days officially Tower Dumps: 90 days RTT: 7 days

One Note TracFone sells phones that use the Verizon network, so the records must come from Verizon.

Now let’s see some examples of what you can get:

Follow PATCtech! Updates & PATCtech Research Public Safety News Training Opportunities Forensic Digital Evidence Investigators (LinkedIn Group)