SlideShare une entreprise Scribd logo
1  sur  34
Communication Evidence AFENTIS FORENSICS Computer & Communication Analysts www.afentis.com - A Powerful Weapon -
Communication Evidence Ross Patel BSc(Hons),MCSE,CISSP,MCP CCNA,CISA,CHFI,CISM,ACFE,ISEB [email_address] - A Powerful Weapon -
Briefing Structure R v STEELE Primer Q & A Defence Evidence Communication Evidence Sources of Digital Evidence Defence Perspectives  & Challenging Evidence Discussion of future trends Golden Copy & Mappings Cell Site analysis and the evolution
Rettendon Murders ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
Relevant Legislation ,[object Object],Computer Misuse Act 1990 Telecommunication Act 1984 Data Protection Act 1988 Regulation of Inv. Powers Act 2000 Anti-Terror, Crime & Security Act 2001 EU Data Retention Directive 2006 [Article 6] Member States to ensure that communications providers retain, for a period of no less than 6 months and no more than 2 years, all relevant data.
Data Retention ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SIM Card
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Telephone Handset
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Network Records
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Data Mining
Attribution
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Cell Site Analysis
Circular Assessment Cell Site Analysis Peer Review  of prosecution submissions , statements and technical evidence Field Assessment  of key locations, specific cell sites, and regions relating to scene of crime Historical Analysis  using archived telecommunication records and related signal/network data
[object Object],[object Object],ACPO Guide Principles ,[object Object],[object Object]
Roles & Concepts ACPO v3 & Home Office CoP DESIGNATED PERSON  investigator or agent seeking access to privileged data or communication records GOLDEN COPY  permanently preserved data in tamper resistant form (R v SAYER, 2001) SINGLE POINT OF CONTACT  identification of relevant material, application proportionality, case support
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Golden Copy Records
Cell Site Sectors
Start vs End Cells
R v GUNN – Cell Sites
Position Attribution
Radio Spectrum Signal strengths dBm - ‘02 UK’, ‘Orange’, ‘Vodafone’, & ‘T-Mobile’  Note: RED / BLUE cells not available for public use GREEN cells provide service for GSM voice & data (SMS)
Non-Dominance
Cell Foot-printing
Cell Foot-printing
Cell Foot-printing
Key Considerations GSM Spec’ Repeaters Layers Exchanges Coverage / Topology ,[object Object],[object Object],[object Object],[object Object],[object Object]
Handovers & Termination ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cell Layering
Repeaters & Propogation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Future Trends Active Convergence Counter Magic Bullet Civil Counter-forensic techniques and greater criminal appreciation of capability Real-time tracing of signals/suspects Mobile & static computing/ communication devices Managing expectations CSA techniques in civil proceedings
Thank You ! AFENTIS FORENSICS Computer & Communication Analysts www.afentis.com
Find out more… afentis AFENTIS FORENSICS  Digital Evidence Experts, specialists in complex fraud and high technology crime WWW Guides exclusively for Advocates Additional forensic reports and reference materials are available online at:  www.afentis.com/legal   eMail Register today  for early notification on future CPD briefings and seminars:  [email_address]

Contenu connexe

Tendances

Best Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec SolutionsBest Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec SolutionsFORnSECSolutions
 
Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic SoftwaresDhruv Seth
 
Social Issues in Computing : Forensics
Social Issues in Computing : ForensicsSocial Issues in Computing : Forensics
Social Issues in Computing : ForensicsKaruna Kak
 
Electronic Evidence Power Point V6 Final
Electronic Evidence Power Point V6 FinalElectronic Evidence Power Point V6 Final
Electronic Evidence Power Point V6 FinalWilliam Hamilton
 
Chapter 3 cmp forensic
Chapter 3 cmp forensicChapter 3 cmp forensic
Chapter 3 cmp forensicshahhardik27
 
Data validation using CDR (Call Detail Records) and real cell tower coverage
Data validation using CDR (Call Detail Records) and real cell tower coverageData validation using CDR (Call Detail Records) and real cell tower coverage
Data validation using CDR (Call Detail Records) and real cell tower coverageNicola Chemello
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 yearsMehedi Hasan
 
Reduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic PreviewsReduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic PreviewsCellebrite
 
[❤PDF❤] The Basics of Digital Forensics The Primer for Getting Started in Dig...
[❤PDF❤] The Basics of Digital Forensics The Primer for Getting Started in Dig...[❤PDF❤] The Basics of Digital Forensics The Primer for Getting Started in Dig...
[❤PDF❤] The Basics of Digital Forensics The Primer for Getting Started in Dig...AngelinaJacobs2
 
2018 mar-09 - jens jenkins - finjan your claims to patent eligibility (update...
2018 mar-09 - jens jenkins - finjan your claims to patent eligibility (update...2018 mar-09 - jens jenkins - finjan your claims to patent eligibility (update...
2018 mar-09 - jens jenkins - finjan your claims to patent eligibility (update...Workman Nydegger
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20worldAqib Memon
 

Tendances (20)

Best Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec SolutionsBest Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
 
Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic Softwares
 
Lect 4 computer forensics
Lect 4 computer forensicsLect 4 computer forensics
Lect 4 computer forensics
 
Lect 3 Computer Forensics
Lect 3 Computer ForensicsLect 3 Computer Forensics
Lect 3 Computer Forensics
 
Codebits 2010
Codebits 2010Codebits 2010
Codebits 2010
 
Social Issues in Computing : Forensics
Social Issues in Computing : ForensicsSocial Issues in Computing : Forensics
Social Issues in Computing : Forensics
 
Lect 6 computer forensics
Lect 6 computer forensicsLect 6 computer forensics
Lect 6 computer forensics
 
Chap 1 general introduction to computer forensics
Chap 1  general introduction to computer forensicsChap 1  general introduction to computer forensics
Chap 1 general introduction to computer forensics
 
Lect 5 computer forensics
Lect 5 computer forensicsLect 5 computer forensics
Lect 5 computer forensics
 
Electronic Evidence Power Point V6 Final
Electronic Evidence Power Point V6 FinalElectronic Evidence Power Point V6 Final
Electronic Evidence Power Point V6 Final
 
Lect 2 computer forensics
Lect 2 computer forensicsLect 2 computer forensics
Lect 2 computer forensics
 
Chapter 3 cmp forensic
Chapter 3 cmp forensicChapter 3 cmp forensic
Chapter 3 cmp forensic
 
Data validation using CDR (Call Detail Records) and real cell tower coverage
Data validation using CDR (Call Detail Records) and real cell tower coverageData validation using CDR (Call Detail Records) and real cell tower coverage
Data validation using CDR (Call Detail Records) and real cell tower coverage
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 years
 
Reduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic PreviewsReduce Lab Backlog with Mobile Data Forensic Previews
Reduce Lab Backlog with Mobile Data Forensic Previews
 
[❤PDF❤] The Basics of Digital Forensics The Primer for Getting Started in Dig...
[❤PDF❤] The Basics of Digital Forensics The Primer for Getting Started in Dig...[❤PDF❤] The Basics of Digital Forensics The Primer for Getting Started in Dig...
[❤PDF❤] The Basics of Digital Forensics The Primer for Getting Started in Dig...
 
Chap 2 computer forensics investigation
Chap 2  computer forensics investigationChap 2  computer forensics investigation
Chap 2 computer forensics investigation
 
2018 mar-09 - jens jenkins - finjan your claims to patent eligibility (update...
2018 mar-09 - jens jenkins - finjan your claims to patent eligibility (update...2018 mar-09 - jens jenkins - finjan your claims to patent eligibility (update...
2018 mar-09 - jens jenkins - finjan your claims to patent eligibility (update...
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 

En vedette

Global Intelligence Alliance
Global Intelligence AllianceGlobal Intelligence Alliance
Global Intelligence AllianceLie Luo
 
1 g 2g_3g_4g_tutorial
1 g 2g_3g_4g_tutorial1 g 2g_3g_4g_tutorial
1 g 2g_3g_4g_tutorialPreeti Lamba
 
GIS Applied to Mobile Technology
GIS Applied to Mobile TechnologyGIS Applied to Mobile Technology
GIS Applied to Mobile TechnologyEsri
 
Cross-Channel Customer Experience Design in Telecommunications
Cross-Channel Customer Experience Design in TelecommunicationsCross-Channel Customer Experience Design in Telecommunications
Cross-Channel Customer Experience Design in TelecommunicationsHugo de Vries
 
Og 002 service flow of radio network planning issue1.1
Og 002 service flow of radio network planning issue1.1Og 002 service flow of radio network planning issue1.1
Og 002 service flow of radio network planning issue1.1Ketut Widya
 
Basic dt gsm ok
Basic dt gsm okBasic dt gsm ok
Basic dt gsm okbonaruce
 
Smartphone industry analysis
Smartphone industry analysisSmartphone industry analysis
Smartphone industry analysisRishi Banshiwal
 
Analysing Smart City Development in india
Analysing Smart City Development in indiaAnalysing Smart City Development in india
Analysing Smart City Development in indiaOmkar Parishwad
 

En vedette (10)

Global Intelligence Alliance
Global Intelligence AllianceGlobal Intelligence Alliance
Global Intelligence Alliance
 
1 g 2g_3g_4g_tutorial
1 g 2g_3g_4g_tutorial1 g 2g_3g_4g_tutorial
1 g 2g_3g_4g_tutorial
 
Throughput analysis wcdma planet
Throughput analysis wcdma planetThroughput analysis wcdma planet
Throughput analysis wcdma planet
 
GIS Applied to Mobile Technology
GIS Applied to Mobile TechnologyGIS Applied to Mobile Technology
GIS Applied to Mobile Technology
 
Cross-Channel Customer Experience Design in Telecommunications
Cross-Channel Customer Experience Design in TelecommunicationsCross-Channel Customer Experience Design in Telecommunications
Cross-Channel Customer Experience Design in Telecommunications
 
Og 002 service flow of radio network planning issue1.1
Og 002 service flow of radio network planning issue1.1Og 002 service flow of radio network planning issue1.1
Og 002 service flow of radio network planning issue1.1
 
The Mobile Economy 2017
The Mobile Economy 2017The Mobile Economy 2017
The Mobile Economy 2017
 
Basic dt gsm ok
Basic dt gsm okBasic dt gsm ok
Basic dt gsm ok
 
Smartphone industry analysis
Smartphone industry analysisSmartphone industry analysis
Smartphone industry analysis
 
Analysing Smart City Development in india
Analysing Smart City Development in indiaAnalysing Smart City Development in india
Analysing Smart City Development in india
 

Similaire à Mobile Telephone & Communication Evidence

ONLINE ACCESSThank you for purchasing a new copy of Bu.docx
ONLINE ACCESSThank you for purchasing a new copy of Bu.docxONLINE ACCESSThank you for purchasing a new copy of Bu.docx
ONLINE ACCESSThank you for purchasing a new copy of Bu.docxcherishwinsland
 
AI Use-cases in Telecom sector - Part-2.pptx
AI Use-cases in Telecom sector - Part-2.pptxAI Use-cases in Telecom sector - Part-2.pptx
AI Use-cases in Telecom sector - Part-2.pptxSashilReddy1
 
Final presentation
Final presentationFinal presentation
Final presentationtanweerrind
 
Disaster Risk Management in the Information Age
Disaster Risk Management in the Information AgeDisaster Risk Management in the Information Age
Disaster Risk Management in the Information Ageglobal
 
Its Congestion Intellione
Its Congestion IntellioneIts Congestion Intellione
Its Congestion IntellioneIntellione
 
Telecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenesTelecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenesPositiveTechnologies
 
Guideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu KhimaniGuideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu KhimaniDr Raghu Khimani
 
Meetup prague 201811_v01
Meetup prague 201811_v01Meetup prague 201811_v01
Meetup prague 201811_v01Milos Molnar
 
Wireless Technology In Home Care
Wireless Technology In Home CareWireless Technology In Home Care
Wireless Technology In Home Carerobrossi
 
Securing Wireless Cellular Systems
Securing Wireless Cellular SystemsSecuring Wireless Cellular Systems
Securing Wireless Cellular SystemsACMBangalore
 
ENUM in Austria - Approach and Lessons Learned
ENUM in Austria - Approach and Lessons LearnedENUM in Austria - Approach and Lessons Learned
ENUM in Austria - Approach and Lessons LearnedKurt Reichinger
 
Expert Witness & Patent Analyst - Wireless Technologies
Expert Witness & Patent Analyst - Wireless TechnologiesExpert Witness & Patent Analyst - Wireless Technologies
Expert Witness & Patent Analyst - Wireless TechnologiesJerry Kaufman
 
Mobile Networks Architecture and Security (2G to 5G)
Mobile Networks Architecture and Security (2G to 5G)Mobile Networks Architecture and Security (2G to 5G)
Mobile Networks Architecture and Security (2G to 5G)Hamidreza Bolhasani
 
MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - glo...
MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - glo...MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - glo...
MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - glo...MAF InfoCom
 
PLNOG20 - Piotr Gruszczyński - Bezpieczeństwo sieci komórkowej
PLNOG20 - Piotr Gruszczyński - Bezpieczeństwo sieci komórkowejPLNOG20 - Piotr Gruszczyński - Bezpieczeństwo sieci komórkowej
PLNOG20 - Piotr Gruszczyński - Bezpieczeństwo sieci komórkowejPROIDEA
 

Similaire à Mobile Telephone & Communication Evidence (20)

ONLINE ACCESSThank you for purchasing a new copy of Bu.docx
ONLINE ACCESSThank you for purchasing a new copy of Bu.docxONLINE ACCESSThank you for purchasing a new copy of Bu.docx
ONLINE ACCESSThank you for purchasing a new copy of Bu.docx
 
AI Use-cases in Telecom sector - Part-2.pptx
AI Use-cases in Telecom sector - Part-2.pptxAI Use-cases in Telecom sector - Part-2.pptx
AI Use-cases in Telecom sector - Part-2.pptx
 
Final presentation
Final presentationFinal presentation
Final presentation
 
Disaster Risk Management in the Information Age
Disaster Risk Management in the Information AgeDisaster Risk Management in the Information Age
Disaster Risk Management in the Information Age
 
M Commerce
M CommerceM Commerce
M Commerce
 
Its Congestion Intellione
Its Congestion IntellioneIts Congestion Intellione
Its Congestion Intellione
 
Telecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenesTelecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenes
 
Guideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu KhimaniGuideline for Call Data Record Analysis by Raghu Khimani
Guideline for Call Data Record Analysis by Raghu Khimani
 
Meetup prague 201811_v01
Meetup prague 201811_v01Meetup prague 201811_v01
Meetup prague 201811_v01
 
Wireless Technology In Home Care
Wireless Technology In Home CareWireless Technology In Home Care
Wireless Technology In Home Care
 
THECONSULTING
THECONSULTINGTHECONSULTING
THECONSULTING
 
GSM
GSMGSM
GSM
 
Securing Wireless Cellular Systems
Securing Wireless Cellular SystemsSecuring Wireless Cellular Systems
Securing Wireless Cellular Systems
 
On the ENUM Forefront
On the ENUM ForefrontOn the ENUM Forefront
On the ENUM Forefront
 
ENUM in Austria - Approach and Lessons Learned
ENUM in Austria - Approach and Lessons LearnedENUM in Austria - Approach and Lessons Learned
ENUM in Austria - Approach and Lessons Learned
 
Expert Witness & Patent Analyst - Wireless Technologies
Expert Witness & Patent Analyst - Wireless TechnologiesExpert Witness & Patent Analyst - Wireless Technologies
Expert Witness & Patent Analyst - Wireless Technologies
 
Mobile Networks Architecture and Security (2G to 5G)
Mobile Networks Architecture and Security (2G to 5G)Mobile Networks Architecture and Security (2G to 5G)
Mobile Networks Architecture and Security (2G to 5G)
 
MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - glo...
MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - glo...MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - glo...
MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - glo...
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
PLNOG20 - Piotr Gruszczyński - Bezpieczeństwo sieci komórkowej
PLNOG20 - Piotr Gruszczyński - Bezpieczeństwo sieci komórkowejPLNOG20 - Piotr Gruszczyński - Bezpieczeństwo sieci komórkowej
PLNOG20 - Piotr Gruszczyński - Bezpieczeństwo sieci komórkowej
 

Dernier

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 

Dernier (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 

Mobile Telephone & Communication Evidence

  • 1. Communication Evidence AFENTIS FORENSICS Computer & Communication Analysts www.afentis.com - A Powerful Weapon -
  • 2. Communication Evidence Ross Patel BSc(Hons),MCSE,CISSP,MCP CCNA,CISA,CHFI,CISM,ACFE,ISEB [email_address] - A Powerful Weapon -
  • 3. Briefing Structure R v STEELE Primer Q & A Defence Evidence Communication Evidence Sources of Digital Evidence Defence Perspectives & Challenging Evidence Discussion of future trends Golden Copy & Mappings Cell Site analysis and the evolution
  • 4.
  • 5.  
  • 6.  
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 14.
  • 15. Circular Assessment Cell Site Analysis Peer Review of prosecution submissions , statements and technical evidence Field Assessment of key locations, specific cell sites, and regions relating to scene of crime Historical Analysis using archived telecommunication records and related signal/network data
  • 16.
  • 17. Roles & Concepts ACPO v3 & Home Office CoP DESIGNATED PERSON investigator or agent seeking access to privileged data or communication records GOLDEN COPY permanently preserved data in tamper resistant form (R v SAYER, 2001) SINGLE POINT OF CONTACT identification of relevant material, application proportionality, case support
  • 18.
  • 20. Start vs End Cells
  • 21. R v GUNN – Cell Sites
  • 23. Radio Spectrum Signal strengths dBm - ‘02 UK’, ‘Orange’, ‘Vodafone’, & ‘T-Mobile’ Note: RED / BLUE cells not available for public use GREEN cells provide service for GSM voice & data (SMS)
  • 28.
  • 29.
  • 31.
  • 32. Future Trends Active Convergence Counter Magic Bullet Civil Counter-forensic techniques and greater criminal appreciation of capability Real-time tracing of signals/suspects Mobile & static computing/ communication devices Managing expectations CSA techniques in civil proceedings
  • 33. Thank You ! AFENTIS FORENSICS Computer & Communication Analysts www.afentis.com
  • 34. Find out more… afentis AFENTIS FORENSICS Digital Evidence Experts, specialists in complex fraud and high technology crime WWW Guides exclusively for Advocates Additional forensic reports and reference materials are available online at: www.afentis.com/legal eMail Register today for early notification on future CPD briefings and seminars: [email_address]