Mobile Device Data Population for Tool Testing Rick Ayers.

Slides:



Advertisements
Similar presentations
MMS pictures to the people Johan Montelius
Advertisements

Principles of Information Technology
Social Media.
Objectives Overview Identify the general categories of programs and apps Describe how an operating system interacts with applications and hardware Differentiate.
(C) Oxygen Software, Oxygen Forensic Suite – Premium Mobile Examination Extracting.
Advanced Techniques in Forensic Examination of Smartphones (C) Oxygen Software,
Hong-Kong, Mar Mobile Data in Legal Proceedings and methods for Extraction, Analysis and Delivering Yuval Ben-Moshe Forensics Technical Director.
Chapter 20 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. Forensic Examination of Mobile Devices (online only)
5 th Nov 2003 Mobile Technical Internet Architecture Terminals and Terminal software Samuli Lahnamäki Martta Seppälä
Droid by Motorola with Google. 2 Droid / Google Experience Gmail –Is not required to purchase Google experience devices, but should be activated to experience.
Graphic File Carving Tool Testing Jenise Reyes-Rodriguez National Institute of Standards and Technology AAFS - February 19 th, 2015.
I have lost all my vacation pictures due to memory card corruption. Can I get them back? I have accidently deleted some important Photos, Music files.
Mobile Device Forensics Rick Ayers. Disclaimer  Certain commercial entities, equipment, or materials may be identified in this presentation in order.
Mobile Device Forensics - Tool Testing Richard Ayers.
Advanced Techniques in Forensic Examination of Smartphones 2012 (C) Oxygen Software,
Creating Online Class Communities Jennifer Dorman Discovery Education
Boxee Box by D-Link. Agenda What’s Boxee Box Appearance Applications Positioning Brief Introduction Supported Media Formats Selling Points Comparison.
Skill Area 212 Introduction to Multimedia Internet and MultiMedia for SC 2.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
WINDOWS APPLICATIONS by Jane Cable Also called Accessories Also called Components.
Internet Librarian 2002 Devices Duel: What’s Ahead for Nomadic Computing? Devices Duel: What’s Ahead for Nomadic Computing? Jack Powers Director, International.
NIST CFTT: Testing Disk Imaging Tools James R. Lyle National Institute of Standards and Technology Gaithersburg Md.
Social Bookmarking With del.icio.us del.icio.us Rob Barth Web 2.0 In The Know.
Use of IT Resources for Evidence Gathering & Analysis Use of IT Resources for Evidence Gathering & Analysis Raymond SO Wing-keung Assistant Director Independent.
Discovering Computers 2010 Chapter 2 The Internet and World Wide Web.
4/29/03 Presented by Justin Fain Group Collaboration Tools Segment 2.
1 of6 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Plan My Move & MilitaryINSTALLATIONS May, 2008 Relocation Personnel Roles and Responsibilities MC&FP.
ScreenPlay Director Training By Erik Collett
1 Zamzar The Solution for File Conversion Alison Fricke EDIT 605 Week 6&7 July 15, 2008.
Business Software What is database software? p. 145 Allows you to create, access, and manage data Add, change, delete, sort, and retrieve data Next.
File Name Extensions Computer Applications 7th grade.
91% of windows users have devices …but the Windows device experience has been limited…
Chapter 2 The Internet. Evolution of the Internet History of the internet.
Welcome! Computer 101 Session 3 With Laura Crichton.
Common file formats  Lesson Objective: Understanding common file formats and their differences.  Learning Outcome:  Describe the type of files which.
Disclaimer Certain trade names and company products are mentioned in the text or identified. In no case does such identification imply recommendation or.
M404 Multimedia Elements Form 4.
25/10/20151Gianluca Demartini Desktop Search Evaluation Sergey Chernov and Gianluca Demartini TREC 2006, 16th November 2006 Pre-Track Workshop.
About Openness Letizia Jaccheri Pisa
Mobile Communication MMS. Mobile Communication Multimedia Messaging Service (MMS) is a standard for telephone messaging systems that allows sending messages.
Topic: MediaSMS Contact Backup File APPS About Speaker Name: Sorn Work: Buddhist Library Cambodia Project Org Web:
 Objectives:  Learn what files & folders are & how to use them  Learn common file types, file type extensions, & programs that use them  Learn proper.
Verizon Hub Samir Hamideh MIS 304 March 18, 2009.
File Analysis Dr. John P. Abraham Professor UTPA.
Living Online Lesson 3 Using the Internet IC3 Basics Internet and Computing Core Certification Ambrose, Bergerud, Buscge, Morrison, Wells-Pusins.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
Ms. Sharber Research Assignment Mr. Navas, Library Media Specialist STUDENT WILL learn: 1. How to identify a valid source or work 2. Important computer.
General Architecture of Retrieval Systems 1Adrienn Skrop.
Standard Demo 1 © Hacking Team All Rights Reserved.
JTAG Tool Testing Jenise Reyes-Rodriguez National Institue of Standards and Technology AAFS – February 25 th, 2016.
10. Mobile Device Forensics Part 2. Topics Collecting and Handling Cell Phones as Evidence Cell Phone Forensic Tools GPS (Global Positioning System)
Facebook privacy policy
Principles of Information Technology
Digital Video File Formats
As used within the College of Medicine UGME program
ANALYSIS OF CELL PHONES
Advanced Techniques in Forensic Examination of Smartphones
WhatsApp Messenger WhatsApp Messenger is a social media application for smart phones. It uses the Internet to send text messages, images, video, user location.
FILE CARVING: Reassembling files from fragments of bytes/hex data on a digital device.
File Extension Mini-Lesson
Windows Movie Maker Introduction to TDL.
Windows file management
Introduction To Computing BBA & MBA
Narrative inserted in Speaker notes:
Moving Literacy Forward with 2017 English Standards of Learning
Movie Maker This presentation will get you started with using Windows Movie Maker - Your very own movie studio. It provides step by step instructions for.
GOOGLE DRIVE Guided by GAYATRI INSTITUTE OF COMPUTER AND MANAGEMENT
Principles of Information Technology
Presentation transcript:

Mobile Device Data Population for Tool Testing Rick Ayers

Disclaimer Certain commercial entities, equipment, or materials may be identified in this presentation in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose.

Agenda Mobile Device Forensics Challenges Computer Forensic Tool Testing (CFTT) Program Setup and Test Procedures Mobile Device Data Population Data Types Population Techniques Factors

Challenges Multiple interfaces Acquisition support for old and current models Quality control Closed mobile device operating systems Damaged devices

Disk Imaging Disk Imaging String Searching File Carving Forensic Media Prep Write Blockers Deleted File Recovery Mobile Device Forensics

Setup and Test Procedures Objective: Documentation on data population of target media and test procedures providing third parties with information for an independent evaluation or replication of posted test results. Contents: Data types Test case execution procedures Data population techniques

Mobile Device Data Population Factors Fresh / Unused mobile device PII on device with existing user data Connectivity: Cellular, WiFi, Bluetooth, PC synchronization

Mobile Device Data Subscriber / Equipment related data Useful for uniquely identifying a cellular subscription and physical identification of a mobile device IMEI, ESN/MEID, ICCID, MSISDN, SPN Address Book / Contacts Contact name, associated number, metadata Long, Regular, Special character, Blank, Non-Latin character entries Contact metadata: , address, URL, birthdates, pictures, ring-tones, notes

Mobile Device Data Personal Information Management (PIM) data Datebook / Calendar, Memo (long, regular, special character entries) Call Logs Incoming, outgoing, missed Date / time and duration SMS / Chat / MMS Messages Incoming, outgoing, drafts, deleted Long, Regular, Special character, non-Latin character entries Audio, graphic, video attachments

Mobile Device Data Stand-alone files Audio: wav, aiff, mp3, flac, mp4 Graphic: jpg, gif, bmp, png, tiff Video: 3gp, mov, flv, avi, wmv Incoming, outgoing, drafts, deleted Attachments: audio, graphic, video, txt, doc, pdf, etc. Native / Third-party applications Vary based on manufacturer

Mobile Device Data Internet related data Browsing history Bookmarks Social media data Profile data Status updates PMs GPS data Longitude / Latitude coordinates Geotagged pictures / video

Data Population Techniques Manual input client pairing PC synchronization Bluetooth

Mobile Device Population Techniques Manual input (time consuming) SMS/MMS messages (incoming, outgoing, read, unread, active/deleted, drafts) Call logs (incoming, outgoing, missed, date/time/duration, active/deleted) Third-party application data Social media data GPS related data client pairing Contacts, calendar entries, memos, stand-alone files (audio, graphic, video, docs)

Mobile Device Population Techniques PC Synchronization Stand-alone files (audio, graphic, video, documents) Bluetooth pairing Supported data objects e.g., Contacts, calendar entries, memos Photos, video, audio files

Mobile Device Population Techniques Subscriber / Equipment Data IMEI – battery cavity, *#06# ICCID – printed on UICC MSISDN – mobile device settings

Conclusions Challenges of Mobile Forensics Overview of CFTT Setup and Test Procedures documentation Goal: provide techniques for populating mobile devices used for testing mobile forensic data extraction tools Data Population Factors Common Mobile Device Data Elements Mobile Device Data Population Techniques

Thank You! Contact Information: Rick Ayers