Difference between pages "SIM Card Forensics" and "Cell site analysis"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(Hardware)
 
(Created page with "Cell Site Analysis (CSA) is the technical discipline of using mobile telephony signals and network data to triangulate and identify the relative geographic position of a devic...")
 
Line 1: Line 1:
== Procedures ==
+
Cell Site Analysis (CSA) is the technical discipline of using mobile telephony signals and network data to triangulate and identify the relative geographic position of a device.
  
Acquire [[SIM Card]] and analyze the following:
+
Cell site analysis is considered a highly intrusive surveillance technique and as such normally deployed only in sensitive or serious criminal investigations.
  
* ICCID - Integrated Circuit Card Identification
+
The technique can assist in demonstrating the co-location (meeting) of individuals, their movements over time, proximity to a scene of crime, and to verify the any defence alibi evidence.
* MSISDN - Subscriber phone number
+
* IMSI - International Mobile Subscriber Identity
+
* LND - Last Dialed numbers
+
* [[LOCI]] - Location Information
+
* LAI - Location Area Identifier
+
* ADN - Abbreviated Dialing Numbers (Contacts)  
+
* FDN - Fixed Dialing Numbers (Provider entered Numbers)
+
* SMS - (Short Messages)
+
* SMSP - Text Message parameters
+
* SMSS - Text message status
+
* Phase - Phase ID
+
* SST - SIM Service table
+
* LP - Preferred languages variable
+
* SPN - Service Provider name
+
* EXT1 - Dialing Extension
+
* EXT2 - Dialing Extension
+
* GID1 - Groups
+
* GID2 - Groups
+
* CBMI - Preferred network messages
+
* PUCT - Calls per unit
+
* ACM - Accumulated Call Meter
+
* ACMmax - Call Limit
+
* HPLMNSP - HPLMN search period
+
* PLMNsel - PLMN selector
+
* FPLMN - Forbidden PLMNs
+
* CCP - Capability configuration parameter
+
* ACC - Access control class
+
* BCCH - Broadcast control channels
+
* Kc - Ciphering Key
+
  
  
== Hardware ==
+
== External Links ==
  
=== Serial ===
+
[http://afentis.com/telephone-evidence/cell-site-analysis/ Introduction to Cell Site Analysis]
  
* [[MicroDrive 120]] with SmartCard Adapter
+
[http://www.cellanalyst.com/ Cell Site Analysis Hardware & Survey Toolkit]
 
+
=== USB ===
+
 
+
* [[ACR 38T]]
+
* [http://www.scmmicro.com/products-services/smart-card-readers-terminals/smart-card-reader/scr3311.html SCR3311]
+
* [http://www.scmmicro.com/products-services/smart-card-readers-terminals/smart-card-reader/scr335.html SCR335]
+
* [http://www.dekart.com/products/hardware/sim_card_reader/ Dekart SIM Card reader]
+
 
+
== Software ==
+
 
+
Wiki Links
+
* [[ForensicSIM]]
+
* [[Paraben SIM Card Seizure]]
+
* [[SIMiFOR]]
+
* [[SIMIS]]
+
 
+
External Links
+
* [http://www.forensicts.co.uk SIMiFOR]
+
* [http://www.simcon.no/ SIMcon]
+
* [http://www.quantaq.com/usimdetective.htm USIM Detective]
+
* [http://www.dekart.com/products/card_management/sim_explorer/ SIM Explorer], [http://www.youtube.com/watch?v=P5dJS7g1o_c video demo of SIM Explorer]
+
* [http://www.data-recovery-mobile-phone.com/ Pro Data Doctor]
+
* [http://www.becker-partner.de/index.php?id=17 Forensic Card Reader (FCR) - German]
+
* [http://www.txsystems.com/sim-manager.html SIM Manager]
+
* [http://vidstrom.net/otools/simquery/ SIMQuery]
+
* [http://users.net.yu/~dejan/ SimScan]
+
* [http://www.nobbi.com/download.htm SIMSpy]
+
* [http://vidstrom.net/stools/undeletesms/ UnDeleteSMS]
+
* [http://www.bkforensics.com/FCR.html Forensic SIM Card Reader]
+
* [http://www.dekart.com/products/card_management/sim_manager/ Dekart SIM Manager], [http://www.youtube.com/watch?v=VaBaqZiNW4U video tutorial on how to recover a deleted SMS]
+
* [http://www.brickhousesecurity.com/cellphone-spy-simcardreader.html Cell Phone SIM Card Spy]
+
* [http://www.mobile-t-mobile.com/mobile-network/SIM-card-reader.html SIM Card Reader]
+
* [http://www.download3000.com/download_46892.html Sim Card Reader Software]
+
* [http://www.freedownloadscenter.com/Utilities/Backup_and_Copy_Utilities/Sim_Card_Recovery.html Sim Card Recovery]
+
* [http://www.spytechs.com/phone-recorders/sims-card-reader.htm Sim Recovery Pro]
+
 
+
== Recovering SIM Card Data ==
+
 
+
* [[Damaged SIM Card Data Recovery]]
+
 
+
== Security ==
+
 
+
SIM cards can have their data protected by a PIN, or Personal Identification Number.  If a user has enabled the PIN on their SIM card, the SIM will remain locked until the PIN is properly entered.  Some phones provide the option of using a second PIN, or PIN2, to further protect data.  If a user incorrectly enters their PIN number multiple times, the phone may request a PUK, or Personal Unblocking Key.  The number of times a PIN must be incorrectly entered before the phone requests the PUK will vary from phone to phone.  Once a phone requests a PUK, the SIM will remain locked until the PUK is correctly entered.  The PUK must be obtained from the SIM's network provider.  If a PUK is incorrectly entered 10 times the SIM will become permanently locked and the user must purchase a new SIM card in order to use the phone.  In some cases the phone will request a PUK2 before it permanently locks the SIM card.
+
 
+
== See also ==
+
 
+
* [[SIM Cards]]
+
 
+
== References ==
+
 
+
E-evidence Info - http://www.e-evidence.info/cellular.html
+
Purdue Phone Phorensics Knowledge Base - http://mobileforensicsworld.com/p3/
+

Latest revision as of 17:28, 26 May 2014

Cell Site Analysis (CSA) is the technical discipline of using mobile telephony signals and network data to triangulate and identify the relative geographic position of a device.

Cell site analysis is considered a highly intrusive surveillance technique and as such normally deployed only in sensitive or serious criminal investigations.

The technique can assist in demonstrating the co-location (meeting) of individuals, their movements over time, proximity to a scene of crime, and to verify the any defence alibi evidence.


External Links

Introduction to Cell Site Analysis

Cell Site Analysis Hardware & Survey Toolkit