ANALYSIS OF CELL PHONES

Slides:



Advertisements
Similar presentations
The next generation in digital forensics Mobile Phones A New Frontier in Digital Forensics BK Forensics.
Advertisements

(C) Oxygen Software, Oxygen Forensic Suite – Premium Mobile Examination Extracting.
GETTING BUTTS INTO THE SEATS. SOCIAL MEDIA FACTS As of tomorrow Facebook will be 10 years old and has an estimated 1.3 BILLION users Facebook StatisticsData.
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
Chantelle van der Merwe FORUM Credit Union Marketing Intern July 2011.
Internet Banking Standard and Standard-Hybrid Registration Intuit Financial Services University Internet Banking Certification Training.
E-Safety at MPL and beyond…... What are the risks our children face? Understanding the potential risks and encouraging safe and responsible use of the.
Unit 12 Additional Evidence Nihal. 1.1 I can describe what types of information are needed. Business card Business cards are important because they show.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Comprehensive Training for Distributor on Help Desk Application
Use of IT Resources for Evidence Gathering & Analysis Use of IT Resources for Evidence Gathering & Analysis Raymond SO Wing-keung Assistant Director Independent.
On Saturday 5 th May 2012 Luton will be in the national spotlight as a large scale protest will be taking place in the town centre.
TODAY’S SMS CODE IS CODE HERE TEXT IT THIS NUMBER: TIPS: Add this number as a contact. We suggest as the contact.
ESCCO Data Security Training David Dixon September 2014.
Phones and fieldTask. Session Objective Be familiar with: – selecting smart phones for a survey, – configuring them – and using them – fieldTask (c) Smap.
Stamford Green Primary School E-safety Seminar Part Two.
Move Pictures From Your Mobile Phone to Your PC.  You never know when a photo opportunity is going to arise, which is why having a camera phone can be.
Santa’s s By Becky.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
Evidence Including tools and etiquette.
s By Jordon walker. Sending an attachment.
 To send a you need to first click new.  Then type in the name off the person you want to send it to.  Then write something.  And to finish.
Technology Social Media Unit 1. What is Social Media? Social media is the interaction among people in which they create, share or exchange information.
and the business environment Explain what is and how is it used in a business environment A02 .
“Asean Risk Communication Training for Trainers” Workshop ROLE OF MEDIA IN ASSISTING HEALTH PROFESSIONALS by Yong Soo Heong, Editor- in-Chief, BERNAMA.
Welcome to What is weebly.com? How does weebly.com work? What can I do with a weebly website? Contact Information: Marissa Sampson
What is touchPRO EXPRESS? touchPRO EXPRESS is a way for Associations who meet certain criteria to be able to get a mobile app at a low cost and have their.
Policies and Security for Internet Access
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
By Toby Reed.
Mobile Phone Forensics Michael Jones. Overview Mobile phones in crime The mobile phone system Components of a mobile phone The challenge of forensics.
Mobile Device Collection More Than Just a Phone. More than just a phone… Cell phone Address book Planner & Organizer Messenger Photo & Video camera GPS.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Information Guide to Cyber Bullying. Cyber bullying is a relatively new form of bullying which has started happening a lot on social networking sites,
FLASH MOBILE | 1 Successful Customer SIM Activation Training.
10. Mobile Device Forensics Part 2. Topics Collecting and Handling Cell Phones as Evidence Cell Phone Forensic Tools GPS (Global Positioning System)
UC Riverside Health Training and Development
European Computer Driving Licence
Cellular Records Review and Analysis Part 1: AT&T
E-Safety Parents Evening
How to stay safe using the internet & App’s
Facebook privacy policy
Mobile communication methods
Mrs. Esman Computer Special
Online safety may 2017.
How to stay safe using the internet and app’s?
SafeSurfing Module 2 September 2016.
Documenting Life in the UK
EZ MESSENGER CUSTOMER portal training
Cellular Records Review and Analysis Part 1: AT&T
How to use the internet safely and How to protect my personal data?
Information Security.
How to use the internet safely and How to protect my personal data?
Mobile communication methods
Protecting Devices The Future Citizen.
Protecting Devices The Future Citizen.
Handout 3: Written communication methods
Handout 3: Written communication methods
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
NOTE TO PRESENTER This presentation provides information on the FSA ID that can be used in outreach to students and parents. The presentation was created.
Progress leisure OCR GCSE ICT.
What you can do to support people to be safe online
Protecting Devices The Future Citizen.
in Business.
Mobile Phone Technology
Social Media Safety.
Presented by Anthony J. Campiti Thompson & Knight LLP One Arts Plaza
Guide to Computer Forensics and Investigations Fourth Edition
Members Only Area Guide Book
Presentation transcript:

ANALYSIS OF CELL PHONES

OBJECTIVES: To provide enforcement officers with a basic understanding of how to analyse and retrieve evidence and intelligence from different types of cell phones. FOCUS: During this lesson you will be provided basic information on: What information and intelligence can be obtained from cell phones. How to extract basic information from cell phones. How to present this information for court purposes. EXPECTED RESULTS: By the end of this session the participants will have a more comprehensive understanding of how to analyse and retrieve evidence and intelligence from different types of cell phones.

CAUTION The accessing of information contained within cell phones including SMS history, call history, IMEI number, serial number, photographs, emails etc may require the provisions of a search warrant and/or telephone intercept warrant. Accessing the data may also affect the integrity of the evidence. Only access cell phone information if you have a legal right to do so and only if this access does not jeopardise the integrity of the evidence. If you are not sure, don’t do it.

Cell Phones Cell phones have become an integral part of our life. We not only make telephone calls on them we; Take photographs with them We send and receive email messages on them We organise our lives with them.

Importance for Investigators Cell phones can provide crucial evidence to a crime through evidence gathered from analysing the phone. They can place a suspect in the vicinity of a crime. They can show us who their associates are. They can tell us a lot about how the criminal lives.

‘Watch this video’

What did you see?

What he photographed with his phone

Derek Medina FACEBOOK KILLER

Accessing Information Treat the telephone like a CRIME SCENE. The preferred methods of examining a cell phone are; By your agencies forensic services section. An accredited external Forensic Services Agency. An officer who is trained and equipped to analyse cell phones.

Additional Evidence Emails Address Book SMS history Call History Social Media Notes Recordings Photographs Bank Account Details GPS data

Unique Information I.M.E.I. Number - Phone I.M.I.S. Number – Sim Card Cell Phone Number – Sim Card Serial Number – Phone Serial Number – ICCID Sim Card PUK Code – Sim Card Password – Phone. PIN number – Sim Card SKU number - Phone

I.M.E.I. Number International Mobile Station Equipment Identity number. Unique to each phone handset. Used to identify if a stolen phone is using the network. What SIM cards have been used in a handset.

How to find the IMEI Number Open the phone and it is usually printed inside the battery compartment. If you don’t want to open the phone, or can’t, dial *#06# Criminals will try and change the IMEI number – websites

Sim Cards Subscriber Identity Module. The phone number attached to the SIM card. The SIMs unique serial number – Integrated Circuit Card Identifier (ICCID). Two passwords. One for the user and one for the service provider (PUK code).

How to find the phone number? Sometimes a criminal will not tell you the number of their cell phone. Check their address book. Dial 1800 801 920 Do not ring from your own phone number.

RECORDING EVIDENCE We want to be able to show who had possession or who used the cell phone. We can do this by; Check on SIM card. Check on IMEI number. Address book. Contents of SMS messages. Calls made to and from the cell phone. From photographs/videos stored on the phone. From applications used/stored on the phone.

Criminals take photos with their phones

Forensic Analysis Tools

Forensic Analysis Example of Forensic Analysis to be inserted here.

Manual Analysis of a Cell Phone Things you will need: Camera - Still/Video Notepad Suitable background Photo board. Be aware of reflections off the phone. Remember to wear gloves.

STEP 1 PHOTO BOARD NAME: Person of Interest DATE EXAMINED: ???? OFFENCE: Murder/Drugs etc PHOTOGRAPHER: Rank Officers Name/Reg. O.I.C: Rank Officers Name/Reg. EXHIBIT REF: ???

Photoboard

Template Photograph number. Date photo taken. Time photo taken. Who took the photo. Description of what the photo shows.

Example 1

Sim Card

Pin Code and Screen Shot

Address Book

Contact Details Contact name of Boss. Phone number of +856204569631 +856 – Lao PDR Business name of XAYSAVANG TRADING COMPANY

SMS Message Logs What numbers have sent or received SMS messages from. Here we have a number +61406174795 sending a text message to the phone.

Message Details

Call Log We can see that our phone has made; 1 phone call to 0406174795 Sent 2 SMS to 0406174795 Received 2 SMS from 0406174795. Times call was made and messages sent.

Call Details A call to 0406174795 at 7.43am for 0 seconds. A call to 0406174795 at 6.24am 51 second duration. Text message sent to 0406174795 at 6.21am.

Applications Gallery. Calender. Emails. Internet. Google. Downloads.

Gallery

Messenger Applications This phone has WhatsApp. But could also include; Line Facebook Twitter TextMe

Reflections Gloves Remember to be aware of reflections from light sources and the camera flash. Remember to wear gloves.

Beware…..you may find some strange things when you analyse phones!!

Thank you! Questions? UNODC Regional Centre for East Asia and the Pacific United Nations Building 3rd floor, B Block Rajdamnern Nok Avenue Bangkok 10200 Thailand Tel: (+662) 288.1292 Fax: (+662) 288.2129 http://www.unodc.org/eastasiaandpacific