The next generation in digital forensics Mobile Phones A New Frontier in Digital Forensics BK Forensics.

Slides:



Advertisements
Similar presentations
2 Language of Computer Crime Investigation
Advertisements

Effective Discovery Techniques In Computer Crime Cases.
Serving with pride and confidence Cyber Crime in Thames Valley Police DCS Richard List.
We’ve got what it takes to take what you got! NETWORK FORENSICS.
Mobile forensic analysis for smartphones (C) Oxygen Software, ISS World Europe 2008.
Teaching Computer Forensics Using Student Developed Evidence Files Anna Carlin Cal Poly Pomona.
BACS 371 Computer Forensics
Computer & Network Forensics
CIS 3200 Networking Fundamentals Abdou Illia, Ph.D School of Business Eastern Illinois University (Week 1, Tuesday 1/09/2007)
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
COS/PSA 413 Day 5. Agenda Questions? Assignment 2 Redo –Due September 3:35 PM Assignment 3 posted –Due September 3:35 PM Quiz 1 on September.
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 5: Data, PDA, and Cell Phone Forensics.
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 5: Data, PDA, and Cell Phone Forensics.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Bar|Scan ® Asset Inventory System The leader in asset and inventory management.
Mobile Device Forensics Rick Ayers. Disclaimer  Certain commercial entities, equipment, or materials may be identified in this presentation in order.
Computer Forensics Mr.PRAWEE PROMPONMUANG M.Sc(Forensic Science) NO
Digital Technology Basics Digital Technology Basics includes two lessons:  Lesson 1: The Modern Digital Experience  Lesson 2: Digital Technology & Career.
Introduction To Information Technology. Defining Information What is Information? Information is any knowledge that comes to our attention. That could.
By Drudeisha Madhub Data Protection Commissioner Date:
Role of Technology in Combating Crime Against Woman and Children Presented by Detective Constable Janelle Blackadar Child Exploitation Section Toronto.
T OWARDS S TANDARDS IN D IGITAL F ORENSICS E DUCATION.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
Course Overview Course Requirements Knowledge and Skills Student Expectations.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Use of IT Resources for Evidence Gathering & Analysis Use of IT Resources for Evidence Gathering & Analysis Raymond SO Wing-keung Assistant Director Independent.
Unit 1 — Computer Basics Lesson 1 — Understanding Computers and Computer Literacy.
Objectives Overview Identify the qualities of valuable information Describe various information systems used in an enterprise Identify the components of.
Undergraduate Technology Programs John Baker Johns Hopkins University Carey Business School
CONTENTS Sending and receiving devices Mobile devices connected to networks – Smart phones – Personal digital assistants – Hand-held computers – Netbook.
 Interested in Forensic Science › Watching investigating shows  CSI, CSI NY, CSI Miami  Bones  NCIS  Some Background information › Took Bio-Med 
Computer Forensics Principles and Practices
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
Disclaimer Certain trade names and company products are mentioned in the text or identified. In no case does such identification imply recommendation or.
Guide to Computer Forensics and Investigations Third Edition Chapter 13 Cell Phone and Mobile Devices Forensics.
CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
©SHRM 2007SHRM Weekly Online Survey: July 17, New Hire Orientation Sample comprised of 424 randomly selected HR professionals. Analyzing 424 responses.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
SMARTPHONE FORENSICS 101 General Overview of Smartphone Investigations.
Apple Inc ISO. Organisation chosen Apple Store The company designs, manufactures and markets personal computers, portable digital.
CJ 317 – Computer Forensics
Forensics Jeff Wang Code Mentor: John Zhu (IT Support)
Bringing DoD Technologies to Law Enforcement Applications James Sim Drakontas LLC NIJ Demonstration Project: Situational Awareness Tools.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Mobile Phone Forensics Michael Jones. Overview Mobile phones in crime The mobile phone system Components of a mobile phone The challenge of forensics.
m Online Computer and IT Training Videos  computer training  online computer training  online IT training  computer training.
Detective Sergeant John Powell Detective Division Los Angeles County Sheriff’s Department Cell# Powered.
Digital Forensics Market Analysis: By Forensic Tools; By Application (Network Forensics, Mobile Forensics, Database Forensics, Computer Forensics) - Forecast.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Cell Phone Forensics Investigator - ICFECI
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Digital Forensics and Hand Held Devices Robert Trimble COSC
Investigations 2016 First semester [ 12 week ]-Forensic Analysis of the Windows 7 Registry.
Yahoo is the one of the topmost “internal portal” on the web that is used for  Homepage customization  Search s  Search as a World Wide Web 
10. Mobile Device Forensics Part 2. Topics Collecting and Handling Cell Phones as Evidence Cell Phone Forensic Tools GPS (Global Positioning System)
Associate Degree in Cyber security
Introduction The Regional Computer Forensics Laboratory (RCFL) National Program Office created this toolkit to help law enforcement executives assess.
ANALYSIS OF CELL PHONES
Global Digital Forensics Market Research Digital Forensics Market, Size, Share, Intelligence, Company Profiles, Market Trends, Strategy, Analysis, Forecast.
MagicJack Customer Service: A Stop Solution to all MagicJack Issue.
Intro Cyber forensics needs direction and definition
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
FILE CARVING: Reassembling files from fragments of bytes/hex data on a digital device.
Digital Forensics Chris Rozic.
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
By Anwar Campbell.
GLOBAL DIGITAL FORENSICS MARKET 2017 – 2025 Published by :Accurize Market Research Pvt. Ltd. Copyright © 2019 Accurize Market Research
Presentation transcript:

The next generation in digital forensics Mobile Phones A New Frontier in Digital Forensics BK Forensics

The next generation in digital forensics Cell Phones and Crime Cell phones have become an increasing source of evidence in criminal cases. Cell phones have become robust devices for storing and managing user data. –MP3 players –Camera/pictures –Video devices –Much more! –Address Book – –Text messages –Calendars

The next generation in digital forensics Obstacles in Analysis There are many obstacles to examining cell phones: –Proprietary operating systems specific to each manufacturer. –Various data storage methods –Multiple connectivity and communication protocols

The next generation in digital forensics What are the Solutions ? BKForensics: Offering cell phone forensic solutions since 2003 –Providing research, development, training and support specifically in cell phone forensics –Professionally staffed by active and retired law enforcement, academic and private sector professionals knowledgeable in criminal investigations and digital forensics BKForensics offers complete cell phone forensic solutions –Training –Software –Hardware –Support –Largest list group dedicated to LE and security professionals

The next generation in digital forensics Training Cell Phone Forensics 101 –Covering the basic fundamentals of cell phone operations and best practices The course is NOT a “How to use our software” lesson It is a true hands-on, tool-agnostic approach –In 2007 BKForensics trained over 80 state and local law enforcement officers –Course continually changes to address current technology –Attendees learn: Terminology and Cell phone communication principles SIM analysis and data recovery Logical analysis and interpretation Physical acquisition and date interpretation methods –Attendees Receive over $1000 in equipment: Hardware and cables to acquire over 200 cell phones: (logical and physical) Cell Phone Analyzer, Image recovery software, student CD Tools for disassembly of phones and a comprehensive manual

The next generation in digital forensics NIJ Success BKForensics took immediate action with NIJ funds –Within three weeks of the grant award CPA was released –BK continually updates the makes and models of devices we support to reflect the devices most often encountered by LEOs in the field –CPA is currently the only software that automates “flash” file interpretation from a multiple devices, providing repeatable results much sooner –Free assistance to LE in all active investigations involving the examination of a cell phone –Free technical support to all law enforcement

The next generation in digital forensics Success Stories –CPA and BKForensics assists working investigators in the field every day. –Here are three recent examples Orlando, FL PD: Examination of a cell phone produced picture of homicide weapon (gun) matching the weapon found near the crime scene. The case was several years old and no further information was available. The development of CPA allowed extraction of the image resulting in a conviction for homicide Philadelphia PD/SVU: Examination of a cell phone produced images resulting in an admission of sexual harassment, prior analysis had produced no useable results International: CPA has assisted in the interpretation of phone data related to a recent, well-publicized terrorist investigation in Europe

The next generation in digital forensics Conclusion Without NIJ support we would be unable keep our software and training current; LEOs would not be able to recover data from the most modern devices It is necessary to identify cell phone forensics as a separate discipline from computer forensics Our Company’s Goals –Support for state and local LEOs; offering tools and training that are applicable, affordable and current –Accessible, ongoing support for investigators post-training

The next generation in digital forensics Thanks to NIJ PO Box 205 Warrington, PA Presenter: Brian Wolfinger- Instructor