| |
| |
The Cell Phone | |
| |
| |
The Cell Phone is Invented | |
| |
| |
Cell Phone Models and Cell Phone Museums | |
| |
| |
Cell Phone Protocols and Operating Systems | |
| |
| |
Cell Phone Differences Worldwide | |
| |
| |
Cell Phone Internal and External Storage | |
| |
| |
The Need for a Faraday Bag | |
| |
| |
A Survey of Tools to Investigate a Cell Phone | |
| |
| |
The Investigative Computer and Precautions to Take | |
| |
| |
GPS Camera Phones | |
| |
| |
GPS Data in Picture | |
| |
| |
GPS Accuracy and Variables | |
| |
| |
Metadata - Linking Picture to Google Maps | |
| |
| |
Faking GPS Data using Picasa3 and Google Earth | |
| |
| |
Digital Camera | |
| |
| |
Digital Camera History | |
| |
| |
Digital Camera Operating Systems | |
| |
| |
External Media | |
| |
| |
Survey of Tools to Investigate a Digital Camera | |
| |
| |
The Investigative Computer and Precautions to Take | |
| |
| |
PDAs | |
| |
| |
PDA History | |
| |
| |
Learning About PDAs / Museum | |
| |
| |
PDA Protocols, Connectivity, and Operating Systems | |
| |
| |
The Investigative Computer and Precautions to Take | |
| |
| |
Survey of Tools to Investigate a PDA | |
| |
| |
GPS Devices | |
| |
| |
GPS Device History | |
| |
| |
GPS Operating Systems | |
| |
| |
Survey of Tools to Investigate a GPS Device | |
| |
| |
Corporate Investigations on a Netbook | |
| |
| |
Authorized Requestors (Lead Investigations) | |
| |
| |
HR, General Counsel, CIa | |
| |
| |
Incident Response Team | |
| |
| |
Chain of Custody | |
| |
| |
Incident Response Policy | |
| |
| |
Policy Infractions - Selling Stolen Items on eBay at Work | |
| |
| |
The Need for Internet Usage Policies | |
| |
| |
The Need for Computer Usage Policies | |
| |
| |
The Need for Telephone Policies at Work | |
| |
| |
The Need for a LaptoplNetbook Policy | |
| |
| |
Silver Platter Doctrine (Turning Everything to the Police) | |
| |
| |
Cell Phone Investigation Police | |
| |
| |
Police find a Cell Phone at the Crime Scene | |
| |
| |
Getting a Search Warrant | |
| |
| |
Communication Data Warrants | |
| |
| |
Fourth Amendment Exception | |
| |
| |
Chain of Custody for Phone | |
| |
| |
Susteen Secure View / Paraben Device Seizure, Examine Phone | |
| |
| |
Using Evidence From Phone and Getting Suspects to Talk | |
| |
| |
Police Have a Suspect for A Murder | |
| |
| |
Seize Cell Phone | |
| |
| |
Collect Pictures with GPS | |
| |
| |
Metadata shows location of body and grave of victim | |
| |
| |
Recovering Existing or Deleted Data from USB Devices | |
| |
| |
USB Flash Drives | |
| |
| |
USB File Systems | |
| |
| |
Poker Chip USB drive | |
| |
| |
Wristwatch USB drive | |
| |
| |
Thumb Drive - Classic Style | |
| |
| |
Lego Brick USB drive | |
| |
| |
Pen - Digital Video Camera and USB Drive | |
| |
| |
Survey of Tools to Recover Deleted Files | |
| |
| |
Steganography, - Pictures with Embedded Documents | |
| |
| |
Tools to perform Steganography | |
| |
| |
Data Carving Tools to Detect Steganography | |
| |
| |
Places to Work at Investigating Mobile Devices | |
| |
| |
Private Investigators | |
| |
| |
Lawyer | |
| |
| |
Your Own Business | |
| |
| |
Corporation / IT Security and Investigations | |
| |
| |
DoD Contractor in Iraq or Afghanistan | |