Law and Order

DEC 2012

Issue link: http://lawandordermag.epubxp.com/i/98779

Contents of this Issue

Navigation

Page 56 of 67

INVESTIGATIVE TOOLBAR Check out the investigative toolbar described at www.search.org/ fles/pdf/toolbarFriefox-0508.pdf, and downloadable at http:// searchinvestigative.ourtoolbar.com. This works as an executable program on Microsoft Internet Explorer and as an add-on to MozillaFirefox. This provides links to sites that provide info on phones, people, ISPs etc. that apply to cell phone examinations as well as wireless and online investigations. them signals the action to make P2P payments, or share images or contact details. You have to be connected to the Internet or have Wi-Fi. Any time you seize a smartphone, check the apps on the phone. Especially look for banking apps. Near Field Communication (NFC) uses a combination of hardware and software to turn the smartphone into a wallet. You can use P2P to buy even fast food and gas. You no longer need cash, check book or credit cards. With person-to-person Quick Pay, you can send money to nearly anyone with an e-mail address. Bank of America, JPMorgan Chase and Wells Fargo are among the banks that will move money from a checking account using an e-mail address or cell phone number. In addition to normal banking, PayPal payments and prepaid Western Union transfers, other cell phone transactions are becoming common. Boarding passes in the form of a QR symbol sent by major airlines to cell phones is old news. The latest is a hotel key sent via text message to a cell. The text contains the room number and a phone number to activate a code. Touch the cell to the door and an audible code unlocks the door. Of course, both the airline boarding pass and the hotel room key become evidence of this travel activity stored on the smartphone. Cloud Storage Currently, cloud storage is the best thing to happen to law enforcement since cell phones,��� Roberts stated. Cloud storage is nothing more mysterious or cyber-techno than simply saving data to an off-site storage system maintained by a third party. Cloud storage is now extremely common. The Internet provides the connection between the computer (or handset) and the database. The computer (cell phone) user sends copies of fles over the Internet to the remote data server, which saves the information. To retrieve the data, or manipulate the fles, simply gain access to the server through the Web. With cloud storage you can access your data from any location that has Internet access���any A cell site analysis, info from particular cell location. You don���t need to carry towers, will tell you what parts of the storage or memory devices with coverage the handset was in ��� or not in ��� you. You don���t even need to use by date and time. For example, the the same computer (cell phone) handset was between 6/10th and 7/10th of to gain access to the information. a mile from a particular tower within the You can allow other people to accompass readings of WNW and ENE at cess the data fle. the time of the crime. This is a 60-degree iCloud? That is Apple���s cloud beam width tower. storage system that allows you to back up and restore data on your Apply iOS devices like may be covered by grants, such as the Paul iPhone, iPad and iPod. They just need to Coverdell Forensic Science Improvement be connected to the Internet. Text mesGrant. Specialized hardware and/or softsages are on iCloud. So are apps purware will be required. Software-based sochased from iTunes. So are all the photos lutions include Paraben and Secure View. and video on the Camera Roll feature in Hardware-based solutions are available iOS. iCloud keeps bookmarks and reading from Cellebrite. Cellebrite is simple, porlists from the Internet. table and car-adaptable. The unit is a bit The standard for Fourth Amendment expensive, compared to the software-only search and seizure usually observes ���in solutions, including both an initial outlay your personal possession.��� Nothing in the and a yearly subscriber fee. cloud storage is in your full personal posGrant money is available for cell phone session. It is all stored on someone else���s investigative training based in Ohio and computer systems. Anything stored at California. This training is the one-day Google or Facebook, the e-mails stored initial overview training to a 40-hour adon Gmail or Hotmail, cell phone call logs vanced investigative training, and the foron the wireless company���s storage servmal cell-phone forensic training involves ers, fles stored at remote backup services forensic and diagnostic hardware and softlike Carbonite are all, to a large degree, in ware to process the handset and SIM cards. someone else���s possession. All that evidence is there. ���All you have Ed Sanow is the Editorial Director of LAW and to do is ask,��� Roberts noted. The perp ORDER. Christine Roberts may be reached at might delete something from his phone, chris.roberts@ohiohidta.org. but he may forget to delete it from the cloud. The phone company does not keep For information on the class, contact Offcer Norm text messages, but the cloud does. Send a Russell, Advanced Training, Columbus, OH Police at search warrant to Apple or Google and 614-645-4800 x1118 (offce) 614-645-4247 (fax) and asked for cloud contents and you may be nrussell@columbuspolice.org. surprised at the evidence you get back. Post your comments on this story by visiting Formal training is necessary to become a LaO www.lawandordermag.com cell phone forensic specialist. This training www.lawandordermag.com 55

Articles in this issue

Links on this page

Archives of this issue

view archives of Law and Order - DEC 2012