Showing posts with label GPS. Show all posts
Showing posts with label GPS. Show all posts

Saturday, November 3, 2018

FAQ Video Series: Mobile Forensics

What is mobile forensics and how can you use it for your case? In this edition of our Frequently Asked Questions videos, we provide an overview and answers questions about deleted and recovered text messages and more. Apple and Android are different and it's important that your mobile forensic analyst knows the proper approach to the specific device(s) in your case.

 

For more information, visit prodigital4n6.com, call 804-588-9877 or email: inquiries@prodigital4n6.com

Tuesday, September 5, 2017

Cellular GPS Evidence: Waze + Cellebrite + CellHawk




September 5, 2017

Cellular GPS Evidence: Waze + Cellebrite + CellHawk

It’s becoming common knowledge that location evidence on cellular devices can provide a wealth of evidence in any number of civil, criminal and investigative matters.  Law enforcement agencies use cellular location evidence from service providers to help place a criminal suspect at or near a crime scene in a given time frame.  Search and rescue analysts can use cellular call detail records to help locate missing persons as well.  And as we’ve detailed in previous articles, this type of evidence can be useful in any number of other matters, from divorce to alimony to fraud investigations and beyond.

So where does all of this evidence come from and how can we best utilize it?  It can come from a variety of different places, but the two main areas are the mobile device itself and the records from the cellular provider.  Proper legal authority needs to be in place to obtain the data from either source as well, but with the right training and experience, an investigator or consultant can help with obtaining those items.  Once the data is in-hand, any number of tools and approaches can help parse out the relevant data and map locations that may be of interest in the case.



In the example cited in this article, the data was extracted from an Apple iPhone 7 through an advanced logical extraction using Cellebrite Universal Forensic Extraction Device (UFED) Physical Analyzer.  Because I’ve been doing a lot of traveling lately and using the Waze app to find my way around various US-based locations, I decided to use Waze as a case study in location information.  Cellebrite UFED does natively parse this data (see fig. 1), but does not natively map the locations.  

  
Fig. 1: Waze Data parsed in Cellebrite PA

As you can see, Cellebrite adequately pulled GPS locations, dates, times and even addresses that were stored in Waze.  The list is longer, but figure 1 gives us a sample of a few months of Waze usage throughout various locations.

But again, Cellebrite does not natively map this data.  So how can we see this graphically and perhaps even create a demonstrative for use in court?  Enter the cellular record analysis and location mapping tool, CellHawk from Hawk Analytics.  CellHawk is an online tool that will natively read, parse and map location data from any of the major cellular providers as obtained through a search warrant or court order.  However, as I learned recently by attending the CellHawk training, it can also map anything with a date, time and GPS coordinates.  The tool just takes a little manual configuration once the data is exported in Cellebrite.

For this demonstration, I simply had to export the Waze Data into an Excel spreadsheet, which is natively supported in Cellebrite.  From there, the spreadsheet is uploaded into CellHawk, which natively reads the file column headers and asks for some direction about where the pertinent data (date/time/GPS location) is located within the spreadsheet.  Here’s an example of what we get when CellHawk reads and maps the data:


 Fig. 2: Northeast Waze Locations

Our office is located in Richmond, VA, which is listed as the starting point for many of these trips.  But this map details all of the client visits in/around Virginia, Maryland and DC as well as locations where training was delivered in the Philadelphia and Boston areas over a period of more than a year. 

When a map location is clicked, CellHawk natively tries to associate a phone number with that data point.  Because the CellHawk generic location finder was used, the identifier of "Waze" was entered instead of a phone number, but this is user-defined in CellHawk.  Interestingly, the dates and times of the data points are listed and viewable when clicked in CellHawk.  The figure below details a recent trip to Kansas City, KS for the Cellular Analysis and CellHawk training:

Fig. 3: Date, time & location detail in CellHawk

What’s even more interesting about the dataset in general is the historical nature of some of these locations.  Figure 3 also illustrates several locations in and around Chicago and Milwaukee.  I used Waze to navigate in/around the Chicago area and to the Harley Davidson museum in Milwaukee in August, 2012.  Since then, while the Waze user account hasn’t changed, the device has been upgraded through 3 or more different iPhone models. 

This historical data was not a one-off or isolated to this trip only.  Fig. 4 below shows map locations from a trip to and around the ALERRT Center in San Marcos, TX where I attended a conference in 2011:


Fig. 4: Waze historical data from 2011 mapped in CellHawk

That’s Great.  Now what?

The data gathered by Cellebrite and mapped by CellHawk is useful to help prove or disprove someone may have been to and navigated around a particular area during a specified time frame.  Further, if a subject of an investigation or litigation claims they cannot drive, Waze can help disprove that claim.  When we factor in dates, times and historical data that is maintained over years and across multiple devices, the potential weight of that data becomes apparent.

There are other ways (no pun intended) to parse and map this data, but both Cellebrite and CellHawk make it fairly easy and intuitive.  In the ever-present questions of who, what, where when, how and perhaps why of any incident, the ability to find, export and analyze this data simply and effectively is a fantastic investigative advantage!

P.S.  If you think this was a cool illustration, I highly recommend checking out CellHawk for you cellular call detail record and cell site mapping.  It’s a fantastic tool for mapping that particular set of data and that’s primarily what it was designed to do.  Be looking for a future blog diving into CellHawk for that purpose.

Author:
Patrick J. Siewert
Principal Consultant
Professional Digital Forensic Consulting, LLC
Virginia DCJS #11-14869
Based in Richmond, Virginia
Available Wherever You Need Us!


We Find the Truth for a Living!
Computer Forensics -- Mobile Forensics -- Specialized Investigation

About the Author:
Patrick Siewert is the Principal Consultant of Pro Digital Forensic Consulting, based in Richmond, Virginia.  In 15 years of law enforcement, he investigated hundreds of high-tech crimes, incorporating digital forensics into the investigations, and was responsible for investigating some of the highest jury and plea bargain child exploitation investigations in Virginia court history.  Patrick is a graduate of SCERS, BCERT, the Reid School of Interview & Interrogation and multiple technical investigation schools. He continues to hone his digital forensic expertise in the private sector while growing his consulting & investigation business marketed toward litigators, professional investigators and corporations, while keeping in touch with the public safety community as a Law Enforcement Instructor.
Twitter: @ProDigital4n6

Saturday, June 20, 2015

Metadata

June 20, 2015

The Relevance of Metadata

There are numerous pieces of evidence that hold value in a digital forensic investigation.  Like all investigations, we try to answer the basic questions: Who, what, where, when, how and, if applicable, why.  In the world of digital forensics, there is perhaps no single category of data that helps answer these questions more than metadata.  Metadata has gotten a lot of [bad] press lately because of the “revelation” that the U.S. government is collecting cellular usage metadata in their ongoing fight against domestic and international terrorism.  But what is metadata?

Simply put, metadata is data about data.  Now, you’re probably reading that and saying “oh, ok… What?!”  So I’ll try to break it down a bit.  One of the most basic and understandable examples is the Microsoft Word document I’m using to write this blog article.  The data is what is contained in the document.  The actual text, pictures, etc.  The metadata is all of the background information -- Who created the document, when it was created or modified or accessed, who the owner of the document is and so forth.  All of this identifying information comes from various sources.  Some of it is created when you first install Windows or other operating system.  When you install the operating system, you generally create a user account and subsequently install utilities on that computer using that account.  This is where some metadata starts.  Then, when you install the utility (like MS Word), it prompts you to enter author/owner information, which is then attributed to every document that is created on that user account through MS Word.  Are you starting to see how this information could be useful in a multitude of investigations?

Take it a step further...

You know that smart phone you carry around in your pocket and take selfies with?  There’s all sorts of metadata about those pictures, too. It’s called EXIF data and it contains a virtual treasure trove of information that we use in our investigations to help prove or disprove a claim in a particular case.  This wealth of information includes the date & time the picture was taken, the device on which the picture was taken, the latitude and longitude (location) where the picture was taken and the operating system of the device.  For stand-alone digital cameras, this EXIF data can also include the shutter speed, aperture settings and other associated photographic data.  It really is quite valuable for investigators.

So what does metadata look like to the digital forensic examiner?  Various forensic tools we use parse this data, but you can look at it too.  For instance, this picture was taken recently during a presentation for the Private Investigator’s Association of Virginia (PIAVA) in Mclean, VA:


By using a free tool called Irfanview, I’m able to extract and view the native EXIF data:

Filename - _DSC1749 Lo Rez.jpg
Orientation - Top left
ImageWidth - 4928
ISOSpeedRatings - 640
ImageLength - 3280
ExifVersion - 0221
BitsPerSample - 8 8 8
DateTimeOriginal - 2015:06:18 20:13:47
PhotometricInterpretation - 2
DateTimeDigitized - 2015:06:18 20:13:47
Make - NIKON CORPORATION
ShutterSpeedValue - 1/60 seconds
Model - NIKON D4S
ApertureValue - F 6.30
Orientation - Top left
ExposureBiasValue - -0.33
SamplesPerPixel - 3
MaxApertureValue - F 2.83
XResolution - 150.00
ExifImageWidth - 1050
YResolution - 150.00
ExifImageHeight - 826
ResolutionUnit - Inch
FocalPlaneXResolution - 1368.89
Software - Adobe Photoshop CC 2014 (Windows)
FocalPlaneYResolution - 1368.89
Copyright - Ron XXXX
FocalPlaneResolutionUnit - Centimeter
ExifOffset - 332
SensingMethod - One-chip color area sensor
ExposureTime - 1/60 seconds
FileSource - DSC - Digital still camera
Orientation - Top left
SceneType - A directly photographed image
SamplesPerPixel - 3
CustomRendered - Normal process
ResolutionUnit - Inch
ExposureMode - Auto
Software - Adobe Photoshop CC 2014 (Windows)
ISOSpeedRatings - 640
DateTime - 2015:06:19 09:16:26
ExifVersion - 0221
Artist - Ron XXXX
ExifOffset - 332

As you can see, this EXIF data provides much more information about the picture that the user hardly ever sees.  This particular camera does not have GPS enabled, but your smart phone does, providing even more detailed information about the location the picture was taken.  The evidence contained in the photograph itself is only the beginning.

This data isn’t restricted to documents and photographs.  In fact, metadata at a basic level is an extremely important string of information in digital forensic examinations.  Data like this can not only accompany documents, images, etc., but also be stored in the file table of the operating system or piece of external media (i.e., thumb drives, SD cards, etc.) that you’re using to store other documents, pictures, etc. upon.  File tables are created when you format a particular piece of media to keep track of the files and allow operating systems ease of access to the files.  External media like thumb drives and SD cards store only basic metadata in the file tables, while your Windows or Mac operating systems store much more.  Even more valuable can sometimes be the natively created copies, backups and shadows of your operating system that can store historical data about when files may have been altered, previously existed upon or removed from the system. 

Digital forensic examiners pull the threads and unravel the tapestry of the evidence.  We look for the information that shows us what was going on and, hopefully, who was responsible.  With data storage devices at everyone’s fingertips in the digital age, this information and evidence is invaluable in helping to prove or disprove a claim.  As I tell groups of attorneys, investigators and information security officers all the time, the data doesn’t lie.  It helps paint a clearer picture of what happened, which is ultimately what everyone is after: The truth.

Author:
Patrick J. Siewert, SCERS, BCERT, LCE
Principal Consultant
Professional Digital Forensic Consulting, LLC
Based in Richmond, Virginia
Available Globally

About the Author:

Patrick Siewert is the Principal Consultant of Pro Digital Forensic Consulting, based in Richmond, Virginia.  In 15 years of law enforcement, he investigated hundreds of high-tech crimes, incorporating digital forensics into the investigations, and was responsible for investigating some of the highest jury and plea bargain child exploitation cases in Virginia court history.  A graduate of both SCERS and BCERT (among others), Siewert continues to hone his digital forensic expertise in the private sector while growing his consulting business marketed toward litigators, professional investigators and corporations.

Twitter: @ProDigital4n6