Using Physical Collection of Cell Phone Data as an Enhancement to Logical Collection
Abstract: Today’s complex Cell Phones are providing operator/agents ever increasing challenges in the collection of intelligence or evidence. With the storage structures growing in size and the uses of the Cell Phone changing daily the collection of data from these devices is becoming increasingly more challenging. New devices such as IPhone, Android and Blackberry cell phones provide the user with full connectivity to cloud environment allowing the collection of email and connecting to the corporate network. Cell Phones have become portal devices with direct connection to social networks like Facebook and linkedIn. Text and SMS messages have become the new communication standard for many users.(Click the Read More Link to see the PDF document) |
Download Link: Using-Physical-Collection-of-Cell-Phone-Data-as-an-Enhancement-to-Logical-Collection |
[pdf-embedder url="https://www.gohtci.com/wp-content/uploads/2016/03/Using-Physical-Collection-of-Cell-Phone-Data-as-an-Enhancement-to-Logical-Collection.pdf" width="500"]
JTAG and Chipoff for Small Units
Abstract: Today’s combat and terrorist environments rely on the ability to move and communicate seamlessly amongst the population that combatants wish to attack. This ability to move unseen within the community requires that combatants use tools that are common and available in most areas. Cell phones and thumb drives have become instruments that allow enemy combatants to possess a full suite of communication and planning tools readily available and transportable anywhere. The cell phone has also become so common that no one would notice its use in most situations. It also provides its users with a false sense of security and privacy. Many people do not realize the amount of data that is maintained on these devices even after a user deletes it. The ability to retrieve this information is often critical to the collection of actionable intelligence. Many times the devices become damaged or broken. The device cannot be powered in the normal way. Chip-Off techniques allow the operator to collect information directly from the chip-set of these damaged devices. This raw data is then processed to provide usable information. Although it is not guaranteed to provide information the Chip-Off technique is quite reliable, and is being used around the world by Law Enforcement agencies to extract data from evidentiary devices. (Click the Read More Link to see the PDF document) |
Download Link: |
[pdf-embedder url="https://www.gohtci.com/gohtci-oct-17/wp-content/uploads/2016/03/JTAG-and-Chipoff-for-Small-Units.pdf" width="500"]
Using the Forensic Intelligence Toolkit (FIT) for Military Police
Abstract: This article discusses the use of the Forensic Intelligence Toolkit (FIT) investigatorA assigned to Military Police Units. The tool that is referenced in this article has been replaced with a program called DART Pro.(Click the Read More Link to see the PDF document) |
Download Link: Using-the-Forensic-Intelligence-Toolkit-FIT-for-Military-Police |
[pdf-embedder url="https://www.gohtci.com/gohtci-oct-17/wp-content/uploads/2016/03/Using-the-Forensic-Intelligence-Toolkit-FIT-for-Military-Police.pdf" width="500"]
Using the Forensic Intelligence Toolkit used by CID
Abstract: This article discusses the use of the Forensic Intelligence Toolkit (FIT) investigator assigned to DOD Criminal Investigation Divisions. The tool that is referenced in this article has been replaced with a program called DART Pro..(Click the Read More Link to see the PDF document) |
Download Link: |
[pdf-embedder url="https://www.gohtci.com/gohtci-oct-17/wp-content/uploads/2016/03/Using-the-Forensic-Intelligence-Toolkit-used-by-CID.pdf" width="500"]
How Narcotic Investigators use DART Pro
Find a drug crime that doesn’t have one cell phone or mobile device involved. Fortunately for you, that is likely to be an impossible task. Nowadays, mobile devices have infiltrated almost every part of an individual’s day to day life. It is up to the investigator to use the data generated from that device to solve crimes; bringing criminals to justice, closure and peace of mind to the victims and their loved ones, and enhanced safety to our communities.(Click the Read More Link to see the PDF document) |
Download Link: |
[pdf-embedder url="https://www.gohtci.com/gohtci-oct-17/wp-content/uploads/2016/03/How-Narcotic-Investigators-use-DART-Pro.pdf" width="500"]