SlideShare a Scribd company logo
Forensic Computing
RTL Forensics
Connor Willer
Key Points
RTL Aceso – Radio Tactics.
Bespoke all in one unit designed for quick
Mobile Forensics in custody.
Secured with a key card and pin system to
prevent unauthorised access.
Connection Modes
Front Panel
Read and Read /
Write panels
Why do we have
the different
ones?
CF, SD, MS, XD
CD
USB with Power
Only Option
External Devices
USB Bluetooth
Provided
Connections
RTL Cable set
Why do we use
this rather than
OEM / Off Brand?
Aceso Interface
Enter the Keycard and Pin (1234)
Additional Steps
• Remove Key Card
• Calibrate Date and Time
• If available plug in the USB Camera
– We use this to aid the investigation by recording
the onscreen activities of the investigation from
the mobile device itself.
• Select Begin Acquisition
Next Step
• After this stage please observe the impacts of
the network blocking options
– Think about the ACPO Guidelines and the ethical
obligation of the investigator
Experiment
• Look at alternative collection methods
• Look at the blanking sim cards
• Try extracting data from a recoverable media
device
• Try different phones
Example Report
• Identify the key areas of a report
• How could you use this report in a court?
• How does it differ from reports you have seen
so far in this module

More Related Content

Similar to Aceso

Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptx
gouriuplenchwar63
 
Ploughshare intro 2014
Ploughshare intro 2014Ploughshare intro 2014
Ploughshare intro 2014
ctgoff
 
experience_and_perspective_of_security_installation.ppt
experience_and_perspective_of_security_installation.pptexperience_and_perspective_of_security_installation.ppt
experience_and_perspective_of_security_installation.ppt
PawachMetharattanara
 
Network Forensics- Social Media Forensics
Network Forensics- Social Media ForensicsNetwork Forensics- Social Media Forensics
Network Forensics- Social Media Forensics
Don Caeiro
 
Limtech - Presentation Product
Limtech - Presentation ProductLimtech - Presentation Product
Limtech - Presentation Product
Andréa Berry
 
Hugo Fiennes - Security and the IoT - Electric Imp
Hugo Fiennes - Security and the IoT - Electric ImpHugo Fiennes - Security and the IoT - Electric Imp
Hugo Fiennes - Security and the IoT - Electric Imp
Business of Software Conference
 
Top 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA SystemTop 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA System
Inductive Automation
 
Mobile Forensics and Investigation Android Forensics
Mobile Forensics and Investigation Android ForensicsMobile Forensics and Investigation Android Forensics
Mobile Forensics and Investigation Android Forensics
Don Caeiro
 
Retail Location Security Complexities
Retail Location Security ComplexitiesRetail Location Security Complexities
Retail Location Security Complexities
Etienne Liebetrau
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson
 
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
PacSecJP
 
Lect 6 computer forensics
Lect 6 computer forensicsLect 6 computer forensics
Lect 6 computer forensics
Kabul Education University
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3
ShivamSharma909
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
ShivamSharma909
 
Cmpc product update(cp) feb '09-edited
Cmpc product update(cp)   feb '09-editedCmpc product update(cp)   feb '09-edited
Cmpc product update(cp) feb '09-edited
Rene Torres Visso
 
ITAM Portfolio-The Big Umbrella-Slideshare.pptx
ITAM Portfolio-The Big Umbrella-Slideshare.pptxITAM Portfolio-The Big Umbrella-Slideshare.pptx
ITAM Portfolio-The Big Umbrella-Slideshare.pptx
Sandeep Bhatia
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
penetration Tester
 
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...
(Sacon) Sumanth Naropanth  - IoT network & ecosystem security attacks & secur...(Sacon) Sumanth Naropanth  - IoT network & ecosystem security attacks & secur...
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...
Priyanka Aash
 
Io techniques & its types
Io techniques & its typesIo techniques & its types
Io techniques & its types
Nehal Naik
 
IT Best Practices IT Security Assessments 2010
IT Best Practices IT Security Assessments 2010IT Best Practices IT Security Assessments 2010
IT Best Practices IT Security Assessments 2010
Donald E. Hester
 

Similar to Aceso (20)

Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptx
 
Ploughshare intro 2014
Ploughshare intro 2014Ploughshare intro 2014
Ploughshare intro 2014
 
experience_and_perspective_of_security_installation.ppt
experience_and_perspective_of_security_installation.pptexperience_and_perspective_of_security_installation.ppt
experience_and_perspective_of_security_installation.ppt
 
Network Forensics- Social Media Forensics
Network Forensics- Social Media ForensicsNetwork Forensics- Social Media Forensics
Network Forensics- Social Media Forensics
 
Limtech - Presentation Product
Limtech - Presentation ProductLimtech - Presentation Product
Limtech - Presentation Product
 
Hugo Fiennes - Security and the IoT - Electric Imp
Hugo Fiennes - Security and the IoT - Electric ImpHugo Fiennes - Security and the IoT - Electric Imp
Hugo Fiennes - Security and the IoT - Electric Imp
 
Top 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA SystemTop 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA System
 
Mobile Forensics and Investigation Android Forensics
Mobile Forensics and Investigation Android ForensicsMobile Forensics and Investigation Android Forensics
Mobile Forensics and Investigation Android Forensics
 
Retail Location Security Complexities
Retail Location Security ComplexitiesRetail Location Security Complexities
Retail Location Security Complexities
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
 
Lect 6 computer forensics
Lect 6 computer forensicsLect 6 computer forensics
Lect 6 computer forensics
 
Soc analyst course content v3
Soc analyst course content v3Soc analyst course content v3
Soc analyst course content v3
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
 
Cmpc product update(cp) feb '09-edited
Cmpc product update(cp)   feb '09-editedCmpc product update(cp)   feb '09-edited
Cmpc product update(cp) feb '09-edited
 
ITAM Portfolio-The Big Umbrella-Slideshare.pptx
ITAM Portfolio-The Big Umbrella-Slideshare.pptxITAM Portfolio-The Big Umbrella-Slideshare.pptx
ITAM Portfolio-The Big Umbrella-Slideshare.pptx
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...
(Sacon) Sumanth Naropanth  - IoT network & ecosystem security attacks & secur...(Sacon) Sumanth Naropanth  - IoT network & ecosystem security attacks & secur...
(Sacon) Sumanth Naropanth - IoT network & ecosystem security attacks & secur...
 
Io techniques & its types
Io techniques & its typesIo techniques & its types
Io techniques & its types
 
IT Best Practices IT Security Assessments 2010
IT Best Practices IT Security Assessments 2010IT Best Practices IT Security Assessments 2010
IT Best Practices IT Security Assessments 2010
 

Aceso

  • 2. Key Points RTL Aceso – Radio Tactics. Bespoke all in one unit designed for quick Mobile Forensics in custody. Secured with a key card and pin system to prevent unauthorised access.
  • 3. Connection Modes Front Panel Read and Read / Write panels Why do we have the different ones? CF, SD, MS, XD CD USB with Power Only Option External Devices USB Bluetooth Provided Connections RTL Cable set Why do we use this rather than OEM / Off Brand?
  • 5. Enter the Keycard and Pin (1234)
  • 6. Additional Steps • Remove Key Card • Calibrate Date and Time • If available plug in the USB Camera – We use this to aid the investigation by recording the onscreen activities of the investigation from the mobile device itself. • Select Begin Acquisition
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Next Step • After this stage please observe the impacts of the network blocking options – Think about the ACPO Guidelines and the ethical obligation of the investigator
  • 14.
  • 15.
  • 16.
  • 17. Experiment • Look at alternative collection methods • Look at the blanking sim cards • Try extracting data from a recoverable media device • Try different phones
  • 18. Example Report • Identify the key areas of a report • How could you use this report in a court? • How does it differ from reports you have seen so far in this module

Editor's Notes

  1. The convention is designed to eliminate the legislative bombshell when perusing cross-border crimes. Take for example the ambiguity in the data protection act within Europe and the further world. It varies meaning how we protect data may be better or worse than other countries. If a convention was used all countries would work under a single legislation. It can be problematic as every country will have their own opinions and getting the best possible outcome may not be the end result.