By Anwar Campbell.

Slides:



Advertisements
Similar presentations
Computer Forensics.
Advertisements

Guide to Computer Forensics and Investigations Fourth Edition
Computer Forensics.
The next generation in digital forensics Mobile Phones A New Frontier in Digital Forensics BK Forensics.
2 Language of Computer Crime Investigation
Mobile forensic analysis for smartphones (C) Oxygen Software, ISS World Europe 2008.
Guide to Computer Forensics and Investigations, Second Edition
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
BACS 371 Computer Forensics
David Benford MSc Forensic Computing & Security David Benford MSc Blackstage Forensics Limited.
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
COS/PSA 413 Day 5. Agenda Questions? Assignment 2 Redo –Due September 3:35 PM Assignment 3 posted –Due September 3:35 PM Quiz 1 on September.
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 5: Data, PDA, and Cell Phone Forensics.
COS/PSA 413 Lab 4. Agenda Lab 3 write-ups over due –Only got 9 out of 10 Capstone Proposals due TODAY –See guidelines in WebCT –Only got 4 out of 10 so.
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 5: Data, PDA, and Cell Phone Forensics.
Computer Forensics Mr.PRAWEE PROMPONMUANG M.Sc(Forensic Science) NO
By Drudeisha Madhub Data Protection Commissioner Date:
MICHAEL ARNOLD DENNIS KIKER The Big Data Challenges of Little Mobile Devices.
Guide to Computer Forensics and Investigations Fifth Edition
By Alessandro Disfano, Gianluigi Me, Francesco Pace 11/08/2013 Fri. Daun Jeong.
MPE+ Access Data Evasi0n iPhone 4s/5 Nexus 4 Market Share Information.
How to discover ephemeral evidence with Live RAM analysis.
Damien Leake. Definition To examine digital media to identify and analyze information so that it can be used as evidence in court cases Involves many.
Data, PDA and Cell Phone Forensics. 2 Introduction It is important to understand how the technology works in order to properly gather evidence from the.
Use of IT Resources for Evidence Gathering & Analysis Use of IT Resources for Evidence Gathering & Analysis Raymond SO Wing-keung Assistant Director Independent.
Digital Crime Scene Investigative Process
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University.
Guide to Computer Forensics and Investigations Third Edition Chapter 13 Cell Phone and Mobile Devices Forensics.
Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How.
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University September 28, 2007.
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
CJ 317 – Computer Forensics
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
Guide to Computer Forensics and Investigations Fifth Edition
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Electronic Evidence Seizure
Mobile Phone Forensics Michael Jones. Overview Mobile phones in crime The mobile phone system Components of a mobile phone The challenge of forensics.
How to Recover Deleted Photos from Android Cell Phone? Android is keeping on improving their products and make sure to provide the best software service.
Computer Forensics Tim Foley COSC 480 Nov. 17, 2006.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
How to Sync Android Phone to Computer (PC/Mac)? Are you a person that always has your Android phone in your hands? Nowadays, a cell phone is not just for.
CHAP 6 – COMPUTER FORENSIC ANALYSIS. 2 Objectives Of Analysis Process During Investigation: The purpose of this process is to discover and recover evidences.
10. Mobile Device Forensics Part 2. Topics Collecting and Handling Cell Phones as Evidence Cell Phone Forensic Tools GPS (Global Positioning System)
COMMON FEATURES. WHAT IS? Processors: To control the functions of the device Microprocessors Internal memory: To store the program instructions into the.
Guide to Computer Forensics and Investigations Fifth Edition
PhD Oral Exam Presentation
DATA SECURITY FOR MEDICAL RESEARCH
Cyber intelligence made easy.
Michael Etse and Maverick Fermill
How to Recover Deleted Voice Memos on iPhone 5/4S/4?
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations Fifth Edition
Mobile Forensics Presented by Dr. Amelia Phillips
How to Fix Android File Transfer Not Working on Mac?
Top 4 Data Recovery Software for Mobile in 2018 for free download
Acquisition and Examination of Forensic Evidence
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
FILE CARVING: Reassembling files from fragments of bytes/hex data on a digital device.
Cell Phone Analysis.
Digital Device Searches
Digital Forensics Andrew Schierberg, Fort Mitchell Police, Schierberg LAw Jay Downs, Kenton County Police.
Guide to Computer Forensics and Investigations Fourth Edition
Presentation transcript:

by Anwar Campbell

What is mobile forensics? A branch of digital forensics used to acquire and analyze digital evidence acquired from mobile devices in an investigation. The information obtained must be kept secured and must not be altered in order to be considered for use in case. Forensic evidence properly obtained from these devices can be used in both civil and criminal trials.

Digital forensic evidence acquisition process

Collecting evidence The guidelines for collecting and reporting data is set by the National Institute of Standards and Technology (NIST). The individuals that collect and preserve the data needs to stay abreast of all the latest technologies. The tools used to collect the evidence are not always compatible with across brands are models. Android devices uses a different tool than is used on iOS devices and tablets and phone can used different tools. SIM Card Call logs GPS Information Phone logs

Common tools used in mobile forensics? Faraday bags Jammer GSM-UMTS-LTE Santoku (software) USB Debugging (Android) Firmware version Cellebrite Access Data Oxygen forensics Blackbag technologies Magnetic forensics MSAB

The Cellebrite forensic tool is capable of analyzing over 3200 mobile devices. It is capable of extracting phonebook, call logs, SMS messages, pictures and file system data from the device. The physical Pro 2 tool is also able to acquire and decode information from the physical memory of the device.

In matters such as human trafficking, it is important that the data is extracted rapidly from these devices before the information is lost or the device is destroyed. Investigators can use both logical and physical means to collect information from a suspected device. Once the information has been lawfully obtained and stored it will then be able to be used in court. A physical collection includes physical possession of the phone and the investigator capture remnants of deleted data from the flash memory chips where the information is stored on these devices. Logical acquisition can be done using software such as iTunes.

Securing the scene and the device As an investigator you need to make sure that the scene and the device are secured before you begin your investigation. You should document the names of everyone who had access to the scene so that you can conduct a proper investigation. The devices you collect needs to be placed into evidence bags If the device was discovered on you need to make sure that the phone does not turn off The investigator needs to make sure that the device cannot be wiped remotely.