digital forensics acquisition is one of the most important part of any investigation. Granting the results comparing the obtained data with third party information is something the investigator should consider. Fake SMS, wrong parsing of the data, and other issues can be prevented if multiple sources are analysed. In this briefly presentation the results of a correlation with SecurCube Phonelog for the CDR analysis and SecurCube BTS tracker for the real cell towers coverage are highlighted.
Comparative Analysis of Digital Forensic Extraction Toolsijtsrd
Computer forensics Process collecting and examining information present in digital format in civil, criminal, or administrative proceedings for use as evidence. It is also a from data recovery, which involves the recovery of data from a system that has been erased by error or lost during a server crash. Tools are designed to extract evidence from the computer and it is the role of the investigator to check whether the crime or policy violation has been committed by the suspect. Investigators use various kinds of tools based on the area or the kind of information which is lost such as digital data, network compromise, cyber breach, web data, email and many more. Varun H M | Dr. Uma Rani Chellapandy | Srividya B G "Comparative Analysis of Digital Forensic Extraction Tools" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd37980.pdf Paper URL : https://www.ijtsrd.com/computer-science/computer-security/37980/comparative-analysis-of-digital-forensic-extraction-tools/varun-h-m
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...Damir Delija
One of draft versios of "Concepts and Methodology in Mobile Devices Digital Forensics Education and Training",
Abstract - This paper presents various issues in digital forensics of mobile devices and how to address these issues in the related education and training process. Mobile devices forensics is a new, very fast developing field which lacks standardization, compatibility, tools, methods and skills. All this drawbacks have impact on the results of forensic process and also have deep influence in training and education process. In this paper real life experience in training is presented, with tools, devices, procedures and organization with purpose to improve process of mobile devices forensics and mobile forensic training and education
Comparative Analysis of Digital Forensic Extraction Toolsijtsrd
Computer forensics Process collecting and examining information present in digital format in civil, criminal, or administrative proceedings for use as evidence. It is also a from data recovery, which involves the recovery of data from a system that has been erased by error or lost during a server crash. Tools are designed to extract evidence from the computer and it is the role of the investigator to check whether the crime or policy violation has been committed by the suspect. Investigators use various kinds of tools based on the area or the kind of information which is lost such as digital data, network compromise, cyber breach, web data, email and many more. Varun H M | Dr. Uma Rani Chellapandy | Srividya B G "Comparative Analysis of Digital Forensic Extraction Tools" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd37980.pdf Paper URL : https://www.ijtsrd.com/computer-science/computer-security/37980/comparative-analysis-of-digital-forensic-extraction-tools/varun-h-m
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...Damir Delija
One of draft versios of "Concepts and Methodology in Mobile Devices Digital Forensics Education and Training",
Abstract - This paper presents various issues in digital forensics of mobile devices and how to address these issues in the related education and training process. Mobile devices forensics is a new, very fast developing field which lacks standardization, compatibility, tools, methods and skills. All this drawbacks have impact on the results of forensic process and also have deep influence in training and education process. In this paper real life experience in training is presented, with tools, devices, procedures and organization with purpose to improve process of mobile devices forensics and mobile forensic training and education
Mobile forensics is a branch of digital forensics. Simply, it is a science of recovering different kinds of evidence from mobile phones. It helps investigators significantly to reach to the criminal.
The use of digital devices in day to day life has increased tremendously. Mobile devices have become an vital part of our day to day routine and they are prone to facilitating illegal activity or otherwise being involved when crimes occur. Whereas computers, laptops, servers, and gaming devices might have many users, in the vast majority of cases, mobile devices generally belong to an individual. The science behind recovering digital evidence from mobile phones is called mobile forensics. Digital evidence is defined as data and information that is stored on, received, or transmitted by an electronic device that is used for investigations. Digital evidence encompasses any and all digital data that can be used as evidence in a case. Mobile devices present many challenges from a forensic viewpoint. With new models being developed each day, it is extremely difficult to develop a single process or tool to address all the possibilities an investigator may face. Court cases also need to be taken into consideration as mobile devices are being seized and analyzed. Mr. I. A. Attar | Mr. M. M. Kapale "Conceptual Study of Mobile Forensics" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-1 , December 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29476.pdfPaper URL: https://www.ijtsrd.com/computer-science/world-wide-web/29476/conceptual-study-of-mobile-forensics/mr-i-a-attar
Digital forensics is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. A Pilot study on methodology and complexity of digital forensics and how digital forensics can be applied in a live environment without the loss or spoilage of valuable data and evidence.
Draft current state of digital forensic and data science Damir Delija
In this presentation we will introduce current state of digital forensics, its positioning in general IT security and relations with data science and data analyses. Many strong links exist among this technical and scientific fields, usually this links are not taken into consideration. For data owners, forensic researchers and investigators this connections and data views presents additional hidden values.
Mobile Phone Basics, Inside Mobile Devices, Digital Networks, Mobile Phone Seizure, Mobile Phone Examination, Mobile Forensics Equipment, Cell Seizure Tool, SIMIS, XRY,
A Comparison Study of Android Mobile Forensics for Retrieving Files SystemCSCJournals
A comparison study of the Android forensic field in terms of Android forensic process for acquiring and analysing an Android disk image is presented. The challenges of Android forensics, including the complexity of the Android application, different procedures and tools for obtaining data, difficulties with hardware set up, using expensive commercial tools for acquiring logical data that fail to retrieve physical data acquisition are described in this paper. To solve these challenges and achieve high accuracy and integrity in Android forensic processes, a new open source technique is investigated. Manual, Logical and physical acquisition techniques are used to acquire data from an Android mobile device (Samsung Android 4.2.2). The mobile phone is identified by taking photos of the device and its individual components, including the memory expansion card, and labelling them with identifying information. Following the manual acquisition, logical acquisition is conducted using the AFLogical application in the ViaExtract tool (by Now secure) installed on a Santoku Linux Virtual Machine. The image file is then created using the AccessData FTK imager tool for physical acquisition. Four tools are utilized to analyse recovered data: one using ViaExtract on a Santoku Linux Virtual Machine, two using the AccessData FTK Imager, and one using file carving in Autopsy on a Kali Linux Virtual Machine. The results of the analysis demonstrate that the technique can retrieve Contacts, photos, Videos, Call Logs, and SMSs. Also, the EaseUS Data Recovery Wizard Free tool is used for the recovery of files from the LOST.DIRon external memory.
New research directions in the area ofIJCNCJournal
The proliferation of smart mobile phones with diverse features makes it possible to increase their use in
criminal activities. The fast technological evolution and presence of different smart phones and their
proprietary operating systems pose great difficulties for investigators and law enforcement officials to
choose the best tool for forensics examination, accurate recovery and speedy analysis of data present on
smart phones. This paper presents a literature review on smart phone forensic techniques for different
platform. As a result of comprehensive analysis of these techniques, it has been found that there is no
generic forensic technique or tool available which can perform the forensic analysis of all currently
available different smart phones. Further, there is a need to develop a generic technique for forensic
analysis of a variety of different smart phones. This generic technique should perform the forensic of
currently available different smart phones on the crime scene without need to attach the smart phone with
computer. Further, it will help the investigators to do their jobs easily and more efficiently. The proposed
technique need to be implemented and tested on different smart phones to validate its performance and
accuracy.
ContentsMobile Forensic3Introduction3What It Is3How I.docxrichardnorman90310
Contents
Mobile Forensic 3
Introduction 3
What It Is 3
How It's Used 3
Steps in Mobile forensics 4
Seizure 4
Airplane mode 4
Phone jammer 4
Faraday bag 4
Acquisition 5
Examination and analysis 6
Invasive methods 6
Chip-off 6
Micro read 7
Case study 7
CSI wife killers case Ireland 7
Phone evidence settled the conviction of a liar and a wife-killer 7
Mobile records checking 8
Conclusion 9
References 10
Mobile Forensic
Introduction
Mobile forensics is obtaining information on a mobile device such as a smartphone or tablet. The technology has grown in sophistication, and it can be used to uncover hidden content on devices, including text messages, apps and wifi connections. Mobile forensics goes beyond mere wireless security breaches. Today's mobile forensic tools can uncover true digital evidence and unlock devices with few endpoints or no recovery partitions to access."
The importance of mobile forensics is rising in the connected world of today. Discover further regarding mobile forensics, its applications, and the significance and procedures of a mobile investigation with a strong forensic foundation in this course.What It Is
Mobile forensics is a digital forensics subfield that focuses well on data extraction from electronic origin. Recovery of evidence from portable digital devices such as tablets, smartwatches, and smartphones is the focus of mobile forensics. Mobile devices are used by numerous people these days, so it seems reasonable that they would hold a large quantity of evidence that might be helpful to investigators. These gadgets search for data and collect and transmit data (Moreb, 2022).
Mobile devices can reveal numerous important pieces of information, such as messages, GPS data, call logs, and internet search activity that discloses the owner's probable whereabouts anywhere at any given moment.How It's Used
The secret to gathering digital evidence is following forensically sound procedures, regardless of who utilizes mobile forensics or how it is applied. According to Duke University's Electronic Discovery Reference Model, the word "forensically sound" refers to "procedures employed for gathering electronic information in a way that assures it is "as originally discovered" and is dependable enough to be allowed into evidence."
This implies that mobile evidence is treated so that it will be admissible in court and that it is not compromised during the forensic procedure. The idea of being forensically sound is based on the fundamental idea that transportable evidence should be kept in the same condition as when it was first discovered.
A defined procedure that helps to guarantee law enforcement or anyone collecting the data follows best practices for doing so lies behind forensically sound mobile evidence collection. Let's examine those actions (
Kumar, 2021,p.102).
Steps in Mobile forensics
Seizure
The cornerstone of digital forensics is the principle that evid.
Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...Marie-Michelle Strah, PhD
Prepared for Ministers and Senior Officials from the Caribbean and distinguished participants and attendees of the Caribbean Telecommunications Union (CTU), the Commonwealth Secretariat, the Organization of American States (OAS), and the International Telecommunication Union (ITU) on the occasion of the Caribbean Stakeholders’ Meeting: The Importance of ICTs and their Impact on Regional Development, May 26-28, 2014 in Port of Spain, Trinidad.
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...DroneSec
Evangelos Mantas (Infili Intelligence)
Talk Recording: https://www.youtube.com/watch?v=W0ZNpj7QZtM
The Global Drone Security Network (GDSN) is the only event of its kind focusing on Cyber-UAV security, Drone Threat Intelligence, Counter-UAS, and UTM security. Watch the full recording here: https://www.youtube.com/watch?v=vZ6sRr65cSk
Speaker: https://www.linkedin.com/in/evangelos-mantas-0aa82619a/
DroneSec is a cyber-uav security and threat intelligence company who hosted this second series of the GDSN community event.
https://dronesec.com/
The SDI Team reports from the ISC West conference, including industry trends, new technologies, and security market observations. Whether you were in attendance at the ISC West conference or not, please find our following takeaways to assist you with keeping your organization up to speed with industry developments.
The Internet of Things: the 4 security dimensions of smart devicesWavestone
Like all major technological revolutions, digital transformation is spreading over many areas. The Internet of Things plays an important role in this trend, trough the emergence of numerous devices.
Mobile forensics is a branch of digital forensics. Simply, it is a science of recovering different kinds of evidence from mobile phones. It helps investigators significantly to reach to the criminal.
The use of digital devices in day to day life has increased tremendously. Mobile devices have become an vital part of our day to day routine and they are prone to facilitating illegal activity or otherwise being involved when crimes occur. Whereas computers, laptops, servers, and gaming devices might have many users, in the vast majority of cases, mobile devices generally belong to an individual. The science behind recovering digital evidence from mobile phones is called mobile forensics. Digital evidence is defined as data and information that is stored on, received, or transmitted by an electronic device that is used for investigations. Digital evidence encompasses any and all digital data that can be used as evidence in a case. Mobile devices present many challenges from a forensic viewpoint. With new models being developed each day, it is extremely difficult to develop a single process or tool to address all the possibilities an investigator may face. Court cases also need to be taken into consideration as mobile devices are being seized and analyzed. Mr. I. A. Attar | Mr. M. M. Kapale "Conceptual Study of Mobile Forensics" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-1 , December 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29476.pdfPaper URL: https://www.ijtsrd.com/computer-science/world-wide-web/29476/conceptual-study-of-mobile-forensics/mr-i-a-attar
Digital forensics is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. A Pilot study on methodology and complexity of digital forensics and how digital forensics can be applied in a live environment without the loss or spoilage of valuable data and evidence.
Draft current state of digital forensic and data science Damir Delija
In this presentation we will introduce current state of digital forensics, its positioning in general IT security and relations with data science and data analyses. Many strong links exist among this technical and scientific fields, usually this links are not taken into consideration. For data owners, forensic researchers and investigators this connections and data views presents additional hidden values.
Mobile Phone Basics, Inside Mobile Devices, Digital Networks, Mobile Phone Seizure, Mobile Phone Examination, Mobile Forensics Equipment, Cell Seizure Tool, SIMIS, XRY,
A Comparison Study of Android Mobile Forensics for Retrieving Files SystemCSCJournals
A comparison study of the Android forensic field in terms of Android forensic process for acquiring and analysing an Android disk image is presented. The challenges of Android forensics, including the complexity of the Android application, different procedures and tools for obtaining data, difficulties with hardware set up, using expensive commercial tools for acquiring logical data that fail to retrieve physical data acquisition are described in this paper. To solve these challenges and achieve high accuracy and integrity in Android forensic processes, a new open source technique is investigated. Manual, Logical and physical acquisition techniques are used to acquire data from an Android mobile device (Samsung Android 4.2.2). The mobile phone is identified by taking photos of the device and its individual components, including the memory expansion card, and labelling them with identifying information. Following the manual acquisition, logical acquisition is conducted using the AFLogical application in the ViaExtract tool (by Now secure) installed on a Santoku Linux Virtual Machine. The image file is then created using the AccessData FTK imager tool for physical acquisition. Four tools are utilized to analyse recovered data: one using ViaExtract on a Santoku Linux Virtual Machine, two using the AccessData FTK Imager, and one using file carving in Autopsy on a Kali Linux Virtual Machine. The results of the analysis demonstrate that the technique can retrieve Contacts, photos, Videos, Call Logs, and SMSs. Also, the EaseUS Data Recovery Wizard Free tool is used for the recovery of files from the LOST.DIRon external memory.
New research directions in the area ofIJCNCJournal
The proliferation of smart mobile phones with diverse features makes it possible to increase their use in
criminal activities. The fast technological evolution and presence of different smart phones and their
proprietary operating systems pose great difficulties for investigators and law enforcement officials to
choose the best tool for forensics examination, accurate recovery and speedy analysis of data present on
smart phones. This paper presents a literature review on smart phone forensic techniques for different
platform. As a result of comprehensive analysis of these techniques, it has been found that there is no
generic forensic technique or tool available which can perform the forensic analysis of all currently
available different smart phones. Further, there is a need to develop a generic technique for forensic
analysis of a variety of different smart phones. This generic technique should perform the forensic of
currently available different smart phones on the crime scene without need to attach the smart phone with
computer. Further, it will help the investigators to do their jobs easily and more efficiently. The proposed
technique need to be implemented and tested on different smart phones to validate its performance and
accuracy.
ContentsMobile Forensic3Introduction3What It Is3How I.docxrichardnorman90310
Contents
Mobile Forensic 3
Introduction 3
What It Is 3
How It's Used 3
Steps in Mobile forensics 4
Seizure 4
Airplane mode 4
Phone jammer 4
Faraday bag 4
Acquisition 5
Examination and analysis 6
Invasive methods 6
Chip-off 6
Micro read 7
Case study 7
CSI wife killers case Ireland 7
Phone evidence settled the conviction of a liar and a wife-killer 7
Mobile records checking 8
Conclusion 9
References 10
Mobile Forensic
Introduction
Mobile forensics is obtaining information on a mobile device such as a smartphone or tablet. The technology has grown in sophistication, and it can be used to uncover hidden content on devices, including text messages, apps and wifi connections. Mobile forensics goes beyond mere wireless security breaches. Today's mobile forensic tools can uncover true digital evidence and unlock devices with few endpoints or no recovery partitions to access."
The importance of mobile forensics is rising in the connected world of today. Discover further regarding mobile forensics, its applications, and the significance and procedures of a mobile investigation with a strong forensic foundation in this course.What It Is
Mobile forensics is a digital forensics subfield that focuses well on data extraction from electronic origin. Recovery of evidence from portable digital devices such as tablets, smartwatches, and smartphones is the focus of mobile forensics. Mobile devices are used by numerous people these days, so it seems reasonable that they would hold a large quantity of evidence that might be helpful to investigators. These gadgets search for data and collect and transmit data (Moreb, 2022).
Mobile devices can reveal numerous important pieces of information, such as messages, GPS data, call logs, and internet search activity that discloses the owner's probable whereabouts anywhere at any given moment.How It's Used
The secret to gathering digital evidence is following forensically sound procedures, regardless of who utilizes mobile forensics or how it is applied. According to Duke University's Electronic Discovery Reference Model, the word "forensically sound" refers to "procedures employed for gathering electronic information in a way that assures it is "as originally discovered" and is dependable enough to be allowed into evidence."
This implies that mobile evidence is treated so that it will be admissible in court and that it is not compromised during the forensic procedure. The idea of being forensically sound is based on the fundamental idea that transportable evidence should be kept in the same condition as when it was first discovered.
A defined procedure that helps to guarantee law enforcement or anyone collecting the data follows best practices for doing so lies behind forensically sound mobile evidence collection. Let's examine those actions (
Kumar, 2021,p.102).
Steps in Mobile forensics
Seizure
The cornerstone of digital forensics is the principle that evid.
Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...Marie-Michelle Strah, PhD
Prepared for Ministers and Senior Officials from the Caribbean and distinguished participants and attendees of the Caribbean Telecommunications Union (CTU), the Commonwealth Secretariat, the Organization of American States (OAS), and the International Telecommunication Union (ITU) on the occasion of the Caribbean Stakeholders’ Meeting: The Importance of ICTs and their Impact on Regional Development, May 26-28, 2014 in Port of Spain, Trinidad.
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...DroneSec
Evangelos Mantas (Infili Intelligence)
Talk Recording: https://www.youtube.com/watch?v=W0ZNpj7QZtM
The Global Drone Security Network (GDSN) is the only event of its kind focusing on Cyber-UAV security, Drone Threat Intelligence, Counter-UAS, and UTM security. Watch the full recording here: https://www.youtube.com/watch?v=vZ6sRr65cSk
Speaker: https://www.linkedin.com/in/evangelos-mantas-0aa82619a/
DroneSec is a cyber-uav security and threat intelligence company who hosted this second series of the GDSN community event.
https://dronesec.com/
The SDI Team reports from the ISC West conference, including industry trends, new technologies, and security market observations. Whether you were in attendance at the ISC West conference or not, please find our following takeaways to assist you with keeping your organization up to speed with industry developments.
The Internet of Things: the 4 security dimensions of smart devicesWavestone
Like all major technological revolutions, digital transformation is spreading over many areas. The Internet of Things plays an important role in this trend, trough the emergence of numerous devices.
Overview of services and research for Blockchain Technology Research Institute, a department of Technology Institute, Frankfurt. Showing usecases for applied blockchain technology to create value-adding use cases in pharmaceutical, automotive and many other industries.
Smart Parking Concept - An Internet of Things SolutionrapidBizApps
Universal access to computational power and bandwidth has allowed people and governments to accept and adopt new technologies that make life easier for everybody. A surge in the availability of low cost connected devices has paved the way for powerful technological advances towards the goal of building smart cities. This eBook presents the concept of smart parking that empowers communities to harness connectivity to manage traffic and optimize parking space that scales alongside demand.
Company: rapidBizApps
Website: www.rapidbizapps.com
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionIJERA Editor
Cloud Computing is a heavily evolving domain in technology. Many public and private entities are shifting their workstations on the cloud due to its robust, remote, virtual environment. Due to the enormity of this domain, it has become increasingly easier to carry out any sort of malicious attacks on such cloud platforms. There is a very low research done to develop the theory and practice of cloud forensics. One of the main challenges includes the inability to collect enough evidence from each and every subscriber of a Cloud Service Provider(CSP) and thus not being able to trace out the roots of the malicious activity committed. In this paper we compare past research done in this field and address the gaps and loopholes in the frameworks previously suggested. Overcoming these, our system/framework facilitates the collection, organization, and thereby the analysis of the evidence sought, hence preserving the essential integrity of the sensitive and volatile data.
Internet of things - Introduction and Variations (Architecture)Mayank Vijh
The slides includes the IOT Architecture introduction and how that is being used in certain use cases around the industries.
Topics include :
Introduction
Trends and Hype cycle
Major IOT Players
Real World Problems
IOT Architecture and variations
Challenges and Tools
Difference between M2M and IOT practice.
KPI and Criteria
Evaluation and Decision
Conclusion
Smart Homes, Smarter Insurance Revolutionizing Home Insurance with IoT Soluti...AeoLogic Technologies
The Solution
to enhance their home insurance offerings, improve risk assessment, and reduce claim Home Insurance Company partnered with an IoT payouts. technology provider to develop and deploy a comprehensive IoT-based solution for their home
Similar to Data validation using CDR (Call Detail Records) and real cell tower coverage (20)
As Europe's leading economic powerhouse and the fourth-largest hashtag#economy globally, Germany stands at the forefront of innovation and industrial might. Renowned for its precision engineering and high-tech sectors, Germany's economic structure is heavily supported by a robust service industry, accounting for approximately 68% of its GDP. This economic clout and strategic geopolitical stance position Germany as a focal point in the global cyber threat landscape.
In the face of escalating global tensions, particularly those emanating from geopolitical disputes with nations like hashtag#Russia and hashtag#China, hashtag#Germany has witnessed a significant uptick in targeted cyber operations. Our analysis indicates a marked increase in hashtag#cyberattack sophistication aimed at critical infrastructure and key industrial sectors. These attacks range from ransomware campaigns to hashtag#AdvancedPersistentThreats (hashtag#APTs), threatening national security and business integrity.
🔑 Key findings include:
🔍 Increased frequency and complexity of cyber threats.
🔍 Escalation of state-sponsored and criminally motivated cyber operations.
🔍 Active dark web exchanges of malicious tools and tactics.
Our comprehensive report delves into these challenges, using a blend of open-source and proprietary data collection techniques. By monitoring activity on critical networks and analyzing attack patterns, our team provides a detailed overview of the threats facing German entities.
This report aims to equip stakeholders across public and private sectors with the knowledge to enhance their defensive strategies, reduce exposure to cyber risks, and reinforce Germany's resilience against cyber threats.
Explore our comprehensive data analysis project presentation on predicting product ad campaign performance. Learn how data-driven insights can optimize your marketing strategies and enhance campaign effectiveness. Perfect for professionals and students looking to understand the power of data analysis in advertising. for more details visit: https://bostoninstituteofanalytics.org/data-science-and-artificial-intelligence/
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...John Andrews
SlideShare Description for "Chatty Kathy - UNC Bootcamp Final Project Presentation"
Title: Chatty Kathy: Enhancing Physical Activity Among Older Adults
Description:
Discover how Chatty Kathy, an innovative project developed at the UNC Bootcamp, aims to tackle the challenge of low physical activity among older adults. Our AI-driven solution uses peer interaction to boost and sustain exercise levels, significantly improving health outcomes. This presentation covers our problem statement, the rationale behind Chatty Kathy, synthetic data and persona creation, model performance metrics, a visual demonstration of the project, and potential future developments. Join us for an insightful Q&A session to explore the potential of this groundbreaking project.
Project Team: Jay Requarth, Jana Avery, John Andrews, Dr. Dick Davis II, Nee Buntoum, Nam Yeongjin & Mat Nicholas
5. The best mobile extraction
● A variety of tools on the
market "profess" to be the best
for specific acquisitions on a
variety of devices
● Cellebrite UFED, MSAB,
Oxygen, … : market leaders
for mobile extractions
● Which is it the most complete?
6. Is the cloud a trusted source?
Cloud is the place where most of the data is stored: photos, chat backups, documents, … there
are many ones, an investigator should consider to get the data from these places.
7. Google Timeline
Not only documents, google timeline stores
user’s positions, while using a google account
connected device.
This information should be acquired as well
8. Download from the cloud
How can you download data from the cloud?
Here there are just a few examples, there are
Many tools that allow you this acquisition
9. But who entered the data into
the phone / cloud?
The user “itself”
What about anti forensics techniques?
What about fake data received from
someone else?
10. Fake information
Can someone create a fake document/information in a
phone/cloud and can an investigator support its alibi?
What if I sent a fake sms to my mobile phone spoofing the
victim’s mobile number to create the «why» of my actions?
11. Google Maps Hack example
99 secondhand smartphones are
transported in a handcart to generate
virtual traffic jam in Google Maps.
Through this activity, it is possible to
turn a green street red which has an
impact in the physical world by
navigating cars on another route to
avoid being stuck in traffic.
#googlemapshacks http://www.simonweckert.com/googlemapshacks.html
14. Third party data that can support/conflict with the
data extracted from a mobile phone or from the
cloud: Telephone (and telematic) phone records
(CDR – Call Detail Records)
● Historical information that cannot
be canceled / modified
● Created by third parties
● Date / time + location (cell) + type
of traffic carried out + device details
& SIM + ...
15. Cell Coverage information
Discover where the connected cell tower
has/hasn’s coverage. This helps to understand
what happened
● OpenCellID/public DB
● Theoretical Coverage
● Electromagnetic Coverage Diagaram
(theoretical)
● Real Coverage (Securcube BTS Tracker
HW and the free APP on Google play)
○ Where the signal actually is spread
○ Where a device can actually exchange
communication
16. Theoretical cell tower coverage and real
coverage obtained from Securcube BTS
tracker survey
17. Idle cell tower VS
Connected cell
tower
This important consideration has to be checked while
Analyzing connected cell tower.
19. More correlation :
License plates, is the suspect's car moving
with its phone?
● Cameras for verifying
insurance coverage / vehicle
inspection /safety emissions
● Installed in many
municipalities
● Can I figure out who the
suspect's passenger is?
22. Conclusions
● Acquire data from various devices in an optimal way (best practices) is the to
do thing
● Validate the extracted data by considering multiple sources of evidence
○ correlate data with multiple sources, to get a thrustworthy proof of
evidence
○ Point out inconsistencies, and refine the investigative idea
23. Thank You for the attention
Ing. NicolaCHEMELLO
www.securcube.net