Difference between pages "Xmount" and "Cell site analysis"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(External Links)
 
(Created page with "Cell Site Analysis (CSA) is the technical discipline of using mobile telephony signals and network data to triangulate and identify the relative geographic position of a devic...")
 
Line 1: Line 1:
{{Infobox_Software |
+
Cell Site Analysis (CSA) is the technical discipline of using mobile telephony signals and network data to triangulate and identify the relative geographic position of a device.
  name = xmount |
+
  maintainer = [[Daniel Gillen]] |
+
  os = [[Linux]], [[Mac OS X]] |
+
  genre = [[Image mounting]] |
+
  license = {{GPL}} |
+
  website = [https://www.pinguin.lu/index.php www.pinguin.lu] |
+
}}
+
  
Description taken from xmount project site on Pinguin's HQ:
+
Cell site analysis is considered a highly intrusive surveillance technique and as such normally deployed only in sensitive or serious criminal investigations.
  
xmount allows you to convert on-the-fly between multiple input and output harddisk image types. xmount creates a virtual file system using FUSE (Filesystem in Userspace) that contains a virtual representation of the input image.
+
The technique can assist in demonstrating the co-location (meeting) of individuals, their movements over time, proximity to a scene of crime, and to verify the any defence alibi evidence.
  
The virtual representation can be in:
 
* [[Raw Image Format|raw DD]]
 
* DMG
 
* [[Virtual Hard Disk (VHD)|VHD]]
 
* [[Virtual Disk Image (VDI)|VirtualBox's virtual disk file format]]
 
* [[VMWare Virtual Disk Format (VMDK)|VmWare's VMDK file format]]
 
  
Input images can be:
+
== External Links ==
* [[Raw Image Format|raw DD]]
+
* [[Encase image file format|EWF (Expert Witness Compression Format)]]
+
* [[AFF|AFF (Advanced Forensic Format)]]
+
  
In addition, xmount also supports virtual write access to the output files that is redirected to a cache file. This makes it possible to boot acquired harddisk images using QEMU, KVM, VirtualBox, VmWare or alike.
+
[http://afentis.com/telephone-evidence/cell-site-analysis/ Introduction to Cell Site Analysis]
 
+
== See Also ==
+
* [[Disk Images]]
+
 
+
== External Links ==
+
  
* [https://www.pinguin.lu/index.php Pinguin's HQ]
+
[http://www.cellanalyst.com/ Cell Site Analysis Hardware & Survey Toolkit]
* [http://files.pinguin.lu/projects/HOWTO-BootingAcquiredWindows.pdf HOWTO: Booting an acquired hard disk image containing a Windows installation using xmount and OpenGates].
+
* [http://linuxsleuthing.blogspot.ch/2013/03/xmount-when-changing-evidence-isnt-so.html Xmount: When "Changing" the Evidence isn't so Bad], by [[John Lehr]], March 21, 2013
+

Latest revision as of 17:28, 26 May 2014

Cell Site Analysis (CSA) is the technical discipline of using mobile telephony signals and network data to triangulate and identify the relative geographic position of a device.

Cell site analysis is considered a highly intrusive surveillance technique and as such normally deployed only in sensitive or serious criminal investigations.

The technique can assist in demonstrating the co-location (meeting) of individuals, their movements over time, proximity to a scene of crime, and to verify the any defence alibi evidence.


External Links

Introduction to Cell Site Analysis

Cell Site Analysis Hardware & Survey Toolkit