Mobile & Technology Exploration
Investigations, Practices and Procedures: Seizure-Forensic Examination-Evidence. Cellular and Satellite Telephones, Call Records-Billing Data, Cell Site Analysis. Telecomms. Computer and Network Analysis. GPS devices & Jammers, Cyber, IoT forensics.
Sunday, June 02, 2024
D-DAY Commemorations 2024: Portsmouth & Normandy
Sunday, August 06, 2023
Practical Digital Forensics (Book 2023)
Practical Digital Forensics. Forensic Lab Setup, Evidence Analysis, and Structured Investigation Across Windows, Mobile, Browser, HDD, and Memory ISBN: 9789355511454
Table of Contents
1. Introduction to Digital Forensics
Introduction
Structure
Objectives
Defining digital forensics
Digital forensics goals
Defining cybercrime
Sources of cybercrime
Computers in cybercrimes
Digital forensics categories
Computer forensics
Mobile forensics
Network forensics
Database forensics
Forensic data analysis
Digital forensics users
Law enforcement
Civil ligation
Intelligence and counterintelligence
Digital forensics investigation types
Forensics readiness
Type of digital evidence
User-created data
Machine and network-created data
Locations of electronic evidence
Chain of custody
Examination process
Seizure
Acquisition
Analysis
Reporting
Conclusion
Multiple choice questions/questions
Learning Section
Answers
See in extra comments below
2. Essential Technical Concepts
Introduction
Structure
Objectives
Decimal (Base-10)
Binary
Hexadecimal (Base-16)
Hexadecimal (Base-64)
Character encoding schema
File carving
File structure
Digital file metadata
Timestamps decoder
Hash analysis
Calculate file hash
System memory
Types of computer memory storage
Primary storage
RAM
ROM
Secondary storage
Backup storage
HDD
Hard disk storage
SSD
DCO and HPA
Considerations for data recovery
File system
NTFS
FAT
Environment for computing
Cloud computing
Software as a service (SaaS)
Platform as a service (SaaS)
Infrastructure as a service (SaaS)
Windows versions
Internet protocol (IP) address
Getting an IP address
Conclusion
3. Hard Disks and File Systems
Introduction
Structure
Objectives
Hard disk and file systems
File systems
Hard disk
Hard disk forensics
Analyzing the registry files
Conclusion
4. Requirements for a Computer Forensics Lab
Introduction
Structure
Objectives
Digital Forensic Lab
Physical requirements
Environment controls
Digital forensic equipment
Forensic hardware
Office electrical equipment
Networked devices
Forensic workstation
Commercial digital forensic workstations
Forensic software applications
Commercial forensics tools
Open-source forensic tools
Linux distributions
Virtualization
Lab information management system (LIMS)
Lab policies and procedures
Documentation
Lab accreditation
Conclusion
5. Acquiring Digital Evidence
Introduction
Structure
Objectives
Raw format
Advanced forensic format
EnCase: Expert witness transfers
Other file formats
Validation of forensic imaging files
Live memory acquisition
Virtual memory: Swap space
Challenges acquiring RAM
Administration privilege
Live RAM capturer
Magnet RAM capture
FTK imager
Acquiring nonvolatile memory
Hard disk acquisition
Acquiring physical resources
Logical acquisition
Sparse acquisition
Capturing hard drives using FTK imager
Network acquisition
Limitations of a forensic tool
Conclusion
6. Analysis of Digital Evidence
Introduction
Structure
Objectives
Arsenal Image Mounter
OSFMount
Autopsy
Analyzing RAM forensic image
Memoryze
Redline
Volatility framework
Conclusion
7. Windows Forensic Analysis
Introduction
Structure
Timeline analysis tools
File recovery
Undeleting files
Recycle bin forensics
Data carving
Associated user account action
Windows registry analysis
Windows registry architecture
Acquiring windows registry
Registry examination
Windows registry program keys
USB device forensics
Most recently used list
Network analysis
Windows shutdown time
UserAssist forensics
Printer registry information
File format identification
Windows thumbnail forensics
Windows 10 forensics
Notification area database
Cortana forensics
Conclusion
8. Web Browser and E-mail Forensics
Introduction
Structure
Objectives
Web browser forensics
Google chrome browser forensics
Top sites and shortcuts
Login data
Web data
Bookmarks
Bookmarks.bak
Cache folder
Mozilla Firefox Browser Forensics
Microsoft Edge browser forensics
Other Web browser investigation tools
Conclusion
References
9. E-mail Forensics
Introduction
Structure
Objectives
E-mails around us
E-mail communication steps
E-mail protocols
Examine e-mail headers
Reveal header information
View Gmail headers
View Outlook mail header
View Mozilla Thunderbird headers
View Outlook mail client header
Analyzing e-mail headers
Determine the sender’s geolocation and time zone
Conclusion
10. Anti-Forensics Techniques and Report Writing
Introduction
Structure
Objectives
Anti-forensics techniques
Digital Steganography
Text Steganography
Image Steganography
Audio-video Steganography
Network Steganography
Metadata manipulation
Encryption techniques
Disk encryption using open-source tools
Anonymity techniques
Digital forensic reports
Conclusion
11. Hands-on Lab Practical
Introduction
Lab 1: FTK imager
Lab 2: Magnet RAM capture
Lab 3: Memory forensics
Lab 4: Malware analysis
Lab 5: data hiding—Steganography
Lab 6: Recovering deleted files
Lab 7: Finding key evidence
Lab 8: Analyzing the registry for evidence
Lab 9: Analyzing Windows pre-fetch files for evidence
Lab 10: Browser forensics
Lab 11: Extracting EXIF data from graphics files
Index
Sunday, July 02, 2023
Device Access Platforms Visual Representation
Device Access Platforms Visual Representation
Back in 2016 I commented briefly about "Exploration - missing the micro-evidence" (https://trewmte.blogspot.com/2016/03/exploration-missing-micro-evidence.html) from which I have copied the image and pasted below.
Please bear in mind that when considering the 3 linked posts (below) with the architecture displayed in the image, it provides a relevant platform for you to visually start attributing where directory and elementary files will be found having first obtained the standard 3GPP TS 31.102 V18.1.0 (2023-06) which is freely available.
USIM Expanded Directories and Files (https://trewmte.blogspot.com/2023/07/usim-expanded-directories-and-files.html)
USIM Expanded Capabilities Pt2 (https://trewmte.blogspot.com/2023/07/usim-expanded-capabilities-pt2.html)
USIM Expanded Capabilities Pt1 (https://trewmte.blogspot.com/2023/07/usim-expanded-capabilities-pt1.html)
Integrated embedded SIMs (eSIMs)
Integrated embedded SIMs (eSIMs)
As more and more devices and products are having eSIMS (embedded SIMs) integrated at the board and circuitry level keeping abreast of the latest specifications and standards are not always easy in a cloud and digital forensics or DFIR (Digital Forensics Incident Response) given we live in today's multi-tech society.
The Machine-to-Machine (M2M) documents below will at least provide for you a list of the current versions of M2M Specifications.
Architecture Specifications
SGP.01 M2M eSIM Architecture
SGP.01 V4.3 Embedded SIM Remote Provisioning Architecture
Current versions of M2M Technical Specifications
SGP.02 eSIM Technical Specifications
SGP.02 V4.3 eSIM Technical Specification
Current versions of M2M Test Specifications
SGP.11 eSIM Test Specifications
SGP.11 v4.2.1 GP Test Suite SGP.11 v4.2.1
Current versions of M2M Compliance Specifications
SGP.16 M2M eSIM Compliance
SGP.16 v1.4 eSIM Compliance Specification
Current versions of M2M Security Evaluation of Integrated eUICC
SGP.08 GSMA Security Evaluation of Integrated eUICC
SGP.08 V1.1 Security Evaluation of Integrated eUICC
SGP.08 V1.2 Security Evaluation of Integrated eUICC based on PP-0084
Current versions of M2M Security Evaluation of Integrated eUICC based on PP-0117
SGP.18 GSMA Security Evaluation of Integrated eUICC based on PP-0117
SGP.18 V1.0 Security Evaluation of Integrated eUICC Security Evaluation of Integrated eUICC based on PP-0117
Current versions of M2M GSMA eUICC Security Assurance Scheme
GSMA eUICC Security Assurance Specifications
SGP.06 V1.0 GSMA eUICC Security Assurance Principle
SGP.07 V1.0 GSMA eUICC Security Assurance Methodology
Current versions of M2M Protection Profile Specifications
SGP.05 M2M eSIM Protection Profile
SGP.05 V4.1 eSIM Protection Profile Specification
Current versions of M2M eUICC PKI Certificate Policy
SGP.14 eUICC PKI Certificate Policy V2.0
SGP.14 eUICC PKI Certificate Policy
USIM Expanded Directories and Files
3GPP TS 31.102 V18.1.0 (2023-06)
3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Characteristics of the Universal Subscriber Identity Module (USIM) application (Release 18)
USIM Expanded Capabilities Pt2
USIM Expanded Capabilities Pt2
3GPP TS 31.102 V18.1.0 (2023-06)
3GPP 3rd Generation Partnership Project
5GCN 5G Core Network
AC Access Condition
ACDC Application specific Congestion control for Data Communication
ACL APN Control List
ADF Application Dedicated File
AID Application Identifier
AK Anonymity key
ALW ALWays
AMF Authentication Management Field
AoC Advice of Charge
APN Access Point Name
ASME Access Security Management Entity
ASN.1 Abstract Syntax Notation One
AuC Authentication Centre
AUTN Authentication token
BDN Barred Dialling Number
BER-TLV Basic Encoding Rule - TLV
B-TID Bootstrapping Transaction Identifier
CAG Closed Access Group
CCP Capability Configuration Parameter
CK Cipher key
CLI Calling Line Identifier
CNL Co-operative Network List
CPBCCH COMPACT Packet BCCH
CS Circuit switched
DCK Depersonalisation Control Keys
DF Dedicated File
DO Data Object
EC-GSM-IoT Extended coverage in GSM for IoT
DUCK Discovery User Confidentiality Key
DUIK Discovery User Integrity Key
DUSK Discovery User Scrambling Key
eDRX Extended Discontinuous Reception
EARFCN Evolved Absolute Radio Frequency Channel Number
EF Elementary File
EPC Evolved Packet Core
ePDG Evolved Packet Data Gateway
EPS Evolved Packet System
FCP File Control Parameters
FFS For Further Study
FQDN Full Qualified Domain Name
GCI Global Cable Identifier
GLI Global Line Identifier
GSM Global System for Mobile communications
HE Home Environment
HNB Home NodeB
HeNB Home eNodeB
IARI IMS Application Reference Identifier
ICC Integrated Circuit Card
ICE In Case of Emergency
ICI Incoming Call Information
ICT Incoming Call Timer
ID Identifier
Idi Identity of the initiator
Idr Identity of the responder
IEI Information Element Identifier
IK Integrity key
IMSI International Mobile Subscriber Identity
IOPS Isolated E-UTRAN Operation for Public Safety
K USIM Individual key
KC Cryptographic key used by the cipher A5
KSI Key Set Identifier
LI Language Indication
LSA Localised Service Areas
LSB Least Significant Bit
MAC Message authentication code
MAC-A MAC used for authentication and key agreement
MAC-I MAC used for data integrity of signalling messages
MBMS Multimedia Broadcast/Multicast Service
MCC Mobile Country Code
MCData Mission Critical Data
MCPTT Mission Critical Push To Talk
MCS Mission Critical Services
MCVideo Mission Critical Video
MexE Mobile Execution Environment
MF Master File
MGV-F MTK Generation and Validation Function
MICO Mobile Initiated Connection Only
MiD Multi-iDentity
MIKEY Multimedia Internet KEYing
MINT Minimization of Service Interruption
MM Multimedia Message
MMI Man Machine Interface
MMS Multimedia Messaging Service
MMSS MultiMode System Selection
MNC Mobile Network Code
MODE Indication packet switched/circuit switched mode
MSB Most Significant Bit
MSK MBMS Service Key
MTC Machine Type Communications
MTK MBMS Traffic Key
MuD Multi-Device
MUK MBMS User Key
NAI Network Access Identifier
NB-IoT Narrowband IoT
NEV NEVer
ngKSI Key Set Identifier in 5G
NG-RAN Next Generation Radio Access Network
NID Network Identifier for SNPN
NPI Numbering Plan Identifier
NSI Network Specific Identifier
NSWO Non-Seamless WLAN Offload
OCI Outgoing Call Information
OCST Operator Contolled Signal Threshold per Access Technology
OCT Outgoing Call Timer
PBID Phonebook Identifier
PGK ProSe Group Key
PIN Personal Identification Number
PL Preferred Languages
PS Packet switched
PSDK Public Safety Discovery Key
PS_DO PIN Status Data Object
PSM Power Saving Mode
PTK ProSe Traffic Key
RAND Random challenge
RANDMS Random challenge stored in the USIM
RES User response
RFU Reserved for Future Use
RLOS Restricted Local Operator Services
RST Reset
SDN Service dialling number
SE Security Environment
SENSE Signal level Enhanced Network SElection
SEQp Sequence number for MGV-F stored in the USIM
SFI Short EF Identifier
SGSN Serving GPRS Support Node
SN Serving Network
SNPN Standalone Non-Public Network
SoLSA Support of Localised Service Areas
SOR-CMCI Steering of roaming connected mode control information
SQN Sequence number
SRES Signed RESponse calculated by a USIM
SUCI Subscription Concealed Identifier
SUPI Subscription Permanent Identifier
SW Status Word
TLV Tag Length Value
TMGI Temporary Mobile Group Identity
TV Television
UAC Unified Access Control
URSP UE Route Selection Policy
USAT USIM Application Toolkit
USD User Service Description
USIM Universal Subscriber Identity Module
V2X Vehicle-to-Everything
VLR Visitor Location Register
WLAN Wireless Local Area Network
WSID WLAN Specific Identifier
XRES Expected user RESponse
USIM Expanded Capabilities Pt1
3GPP TS 31.102 V18.1.0 (2023-06)
3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Characteristics of the Universal Subscriber Identity Module (USIM) application (Release 18)Updating past topics published here. EF-UST (148)
-Services EFUST (USIM Service Table)
Contents: Service n°1: Local Phone Book
Service n°2: Fixed Dialling Numbers (FDN)
Service n°3: Extension 2
Service n°4: Service Dialling Numbers (SDN)
Service n°5: Extension3
Service n°6: Barred Dialling Numbers (BDN)
Service n°7: Extension4
Service n°8: Outgoing Call Information (OCI and OCT)
Service n°9: Incoming Call Information (ICI and ICT)
Service n°10: Short Message Storage (SMS)
Service n°11: Short Message Status Reports (SMSR)
Service n°12: Short Message Service Parameters (SMSP)
Service n°13: Advice of Charge (AoC)
Service n°14: Capability Configuration Parameters 2 (CCP2)
Service n°15: Cell Broadcast Message Identifier
Service n°16: Cell Broadcast Message Identifier Ranges
Service n°17: Group Identifier Level 1
Service n°18: Group Identifier Level 2
Service n°19: Service Provider Name
Service n°20: User controlled PLMN selector with Access Technology
Service n°21: MSISDN
Service n°22: Image (IMG)
Service n°23: Support of Localised Service Areas (SoLSA)
Service n°24: Enhanced Multi-Level Precedence and Pre-emption Service
Service n°25: Automatic Answer for eMLPP
Service n°26: RFU
Service n°27: GSM Access
Service n°28: Data download via SMS-PP
Service n°29: Data download via SMS-CB
Service n°30: Call Control by USIM
Service n°31: MO-SMS Control by USIM
Service n°32: RUN AT COMMAND command
Service n°33: shall be set to '1'
Service n°34: Enabled Services Table
Service n°35: APN Control List (ACL)
Service n°36: Depersonalisation Control Keys
Service n°37: Co-operative Network List
Service n°38: GSM security context
Service n°39: CPBCCH Information
Service n°40: Investigation Scan
Service n°41: MexE
Service n°42: Operator controlled PLMN selector with Access Technology
Service n°43: HPLMN selector with Access Technology
Service n°44: Extension 5
Service n°45: PLMN Network Name
Service n°46: Operator PLMN List
Service n°47: Mailbox Dialling Numbers
Service n°48: Message Waiting Indication Status
Service n°49: Call Forwarding Indication Status
Service n°50: Reserved and shall be ignored
Service n°51: Service Provider Display Information
Service n°52 Multimedia Messaging Service (MMS)
Service n°53 Extension 8
Service n°54 Call control on GPRS by USIM
Service n°55 MMS User Connectivity Parameters
Service n°56 Network's indication of alerting in the MS (NIA)
Service n°57 VGCS Group Identifier List (EFVGCS and EFVGCSS)
Service n°58 VBS Group Identifier List (EFVBS and EFVBSS)
Service n°59 Pseudonym
Service n°60 User Controlled PLMN selector for I-WLAN access
Service n°61 Operator Controlled PLMN selector for I-WLAN access
Service n°62 User controlled WSID list
Service n°63 Operator controlled WSID list
Service n°64 VGCS security
Service n°65 VBS security
Service n°66 WLAN Reauthentication Identity
Service n°67 Multimedia Messages Storage
Service n°68 Generic Bootstrapping Architecture (GBA)
Service n°69 MBMS security
Service n°70 Data download via USSD and USSD application mode
Service n°71 Equivalent HPLMN
Service n°72 Additional TERMINAL PROFILE after UICC activation
Service n°73 Equivalent HPLMN Presentation Indication
Service n°74 Last RPLMN Selection Indication
Service n°75 OMA BCAST Smart Card Profile
Service n°76 GBA-based Local Key Establishment Mechanism
Service n°77 Terminal Applications
Service n°78 Service Provider Name Icon
Service n°79 PLMN Network Name Icon
Service n°80 Connectivity Parameters for USIM IP connections
Service n°81 Home I-WLAN Specific Identifier List
Service n°82 I-WLAN Equivalent HPLMN Presentation Indication
Service n°83 I-WLAN HPLMN Priority Indication
Service n°84 I-WLAN Last Registered PLMN
Service n°85 EPS Mobility Management Information
Service n°86 Allowed CSG Lists and corresponding indications
Service n°87 Call control on EPS PDN connection by USIM
Service n°88 HPLMN Direct Access
Service n°89 eCall Data
Service n°90 Operator CSG Lists and corresponding indications
Service n°91 Support for SM-over-IP
Service n°92 Support of CSG Display Control
Service n°93 Communication Control for IMS by USIM
Service n°94 Extended Terminal Applications
Service n°95 Support of UICC access to IMS
Service n°96 Non-Access Stratum configuration by USIM
Service n°97 PWS configuration by USIM
Service n°98 RFU
Service n°99 URI support by UICC
Service n°100 Extended EARFCN support
Service n°101 ProSe
Service n°102 USAT Application Pairing
Service n°103 Media Type support
Service n°104 IMS call disconnection cause
Service n°105 URI support for MO SHORT MESSAGE CONTROL
Service n°106 ePDG configuration Information support
Service n°107 ePDG configuration Information configured
Service n°108 ACDC support
Service n°109 Mission Critical Services
Service n°110 ePDG configuration Information for Emergency Service support
Service n°111 ePDG configuration Information for Emergency Service configured
Service n°112 eCall Data over IMS
Service n°113 URI support for SMS-PP DOWNLOAD as defined in
Service n°114 From Preferred
Service n°115 IMS configuration data
Service n°116 TV configuration
Service n°117 3GPP PS Data Off
Service n°118 3GPP PS Data Off Service List
Service n°119 V2X
Service n°120 XCAP Configuration Data
Service n°121 EARFCN list for MTC/NB-IOT UEs
Service n°122 5GS Mobility Management Information
Service n°123 5G Security Parameters
Service n°124 Subscription identifier privacy support
Service n°125 SUCI calculation by the USIM
Service n°126 UAC Access Identities support
Service n°127 Control plane-based steering of UE in VPLMN
Service n°128 Call control on PDU Session by USIM
Service n°129 5GS Operator PLMN List
Service n°130 Support for SUPI of type NSI or GLI or GCI
Service n°131 3GPP PS Data Off separate Home and Roaming lists
Service n°132 Support for URSP by USIM
Service n°133 5G Security Parameters extended
Service n°134 MuD and MiD configuration data
Service n°135 Support for Trusted non-3GPP access networks by USIM
Service n°136 Support for multiple records of NAS security context storage for multiple registration
Service n°137 Pre-configured CAG information list
Service n°138 SOR-CMCI storage in USIM
Service n°139 5G ProSe
Service n°140 Storage of disaster roaming information in USIM
Service n°141 Pre-configured eDRX parameters
Service n°142 5G NSWO support
Service n°143 PWS configuration for SNPN in USIM
Service n°144 Multiplier Coefficient for Higher Priority PLMN search via NG-RAN satellite access
Service n°145 KAUSF derivation configuration
Service n°146 Network Identifier for SNPN (NID)
Service n°147 5MBS UE pre-configuration
Service n°148 UE configured for using "Operator controlled signal threshold per access technology
Sunday, January 24, 2021
Cyber: Cyber Security for Consumer Internet of Things (IoT)
Still olden but golden, when it comes to IoT Connected Devices
I have briefly touched upon IoT (Internet of Things) at my blog previously:
Fast moving wireless world
https://trewmte.blogspot.com/2014/10/fast-moving-wireless-world.html
The Internet of Things (IoT)
https://trewmte.blogspot.com/2016/03/the-internet-of-things-iot.html
The Rise of (IoT) Domestic Appliance Forensic Examiners
https://trewmte.blogspot.com/2016/03/the-rise-of-iot-domestic-appliance.html
Smart Phones with Smart Homes
https://trewmte.blogspot.com/2016/06/smart-phones-with-smart-homes.html
eSIM - Observing Possible Outcomes Part 1
https://trewmte.blogspot.com/2019/12/esim-observing-possible-outcomes-part-1.html
I am adding update reference materials available on IoT and Cyber, if you haven't seen this info or weren't aware, which you might find useful.
ETSI in February 2019 released the first globally applicable standard for consumer IoT security:
etsi-releases-first-globally-applicable-standard-for-consumer-iot-security?jjj=1611490283528
This publicised event introduced the ETSI Stand ts_103645v010101 (2019)
CYBER; Cyber Security for Consumer Internet of Things
In 2020 ETSI updated the standard ts_103645v020102 with enhanced baseline requirements:
CYBER; Cyber Security for Consumer Internet of Things: Baseline Requirements
The object of these standards is to improve security and privacy. A common default password for all products are to be scrubbed with a unique default password per device applied instead. Moreover, it should not be possible to enable the password set at default in the first place once user changed. Apparently, many IoT (consumer) products on the market may still not (even today) meet this password objectives or other more basic requirements that have been stated in this newly released standard.
Measures vendor companies should understake range from adopting simple installation and user guidance with good documentation in support; good hardware/software security engineering practice; for personal privacy the standard sets out protection objectives for all sensitive personal data required to be stored securely - that is both on devices, themselves, and in any related services e.g. in the cloud. Any personal data should be encrypted and should be protected against attack; and with clear instructions how consumers can easily delete their personal data.
Whilst this standard provides consumers with confidence in their IoT product, it equally has been designed to allow vendors companies sufficient flexibility to enable them to innovate and find the best solution for security and privacy for their particular IoT products. Password protection, encryption, and safe deletion are some solutions. Others could be block-off network ports; close-off software not being used; avoidance of exploited data (OOR) by adoption of a validation approach; secure-boot mechanisms (hardward-based); with ease and secure device software updates (e.g. use- menu selection or autonomic/automated (e.g. ZTP etc)). These are possible solutions.
I did like that ETSI had included specific demands about disclosure in this standard for vendor companies to identify, act upon and promptly report vulnerabilities.
However, from a cyber aspect, the ETSI Technical Committee on Cybersecurity (TC CYBER) has overseen and published over 50 cyber standards, some of which are referenced below:
ETSI TS 103 744 V1.1.1 (2020-12)Published
CYBER; Quantum-safe Hybrid Key Exchanges
ETSI TS 103 523-1 V1.1.1 (2020-12)Published
CYBER; Middlebox Security Protocol; Part 1: MSP Framework and Template Requirements
ETSI TS 103 718 V1.1.1 (2020-10)Published
CYBER; External encodings for the Advanced Encryption Standard
ETSI TR 103 644 V1.2.1 (2020-09)Published
CYBER; Observations from the SUCCESS project regarding smart meter security
ETSI TS 103 485 V1.1.1 (2020-08)Published
CYBER; Mechanisms for privacy assurance and verification
ETSI TR 103 619 V1.1.1 (2020-07)Published
CYBER; Migration strategies and recommendations to Quantum Safe schemes
ETSI EN 303 645 V2.1.1 (2020-06)Published
CYBER; Cyber Security for Consumer Internet of Things: Baseline Requirements
ETSI TS 103 645 V2.1.2 (2020-06)Published
CYBER; Cyber Security for Consumer Internet of Things: Baseline Requirements
ETSI TR 103 306 V1.4.1 (2020-03)Published
CYBER; Global Cyber Security Ecosystem
ETSI TR 103 644 V1.1.1 (2019-12)Published
CYBER; Increasing smart meter security
ETSI TR 103 618 V1.1.1 (2019-12)Published
CYBER; Quantum-Safe Identity-Based Encryption
ETSI TR 103 331 V1.2.1 (2019-09)Published
CYBER; Structured threat information sharing
ETSI TS 103 523-3 V1.3.1 (2019-08)Published
CYBER; Middlebox Security Protocol; Part 3: Enterprise Transport Security
ETSI TS 103 523-3 V1.2.1 (2019-03)Published
CYBER; Middlebox Security Protocol; Part 3: Enterprise Transport Security
ETSI TS 103 645 V1.1.1 (2019-02)Published
CYBER; Cyber Security for Consumer Internet of Things
ETSI TR 103 370 V1.1.1 (2019-01)Published
CYBER; Practical introductory guide to Technical Standards for Privacy
ETSI TS 103 457 V1.1.1 (2018-10)Published
CYBER; Trusted Cross-Domain Interface: Interface to offload sensitive functions to a trusted domain
ETSI TR 103 642 V1.1.1 (2018-10)Published
CYBER; Security techniques for protecting software in a white box model
ETSI TS 103 523-3 V1.1.1 (2018-10)Published
CYBER; Middlebox Security Protocol; Part 3: Profile for enterprise network and data centre access control
ETSI TR 103 617 V1.1.1 (2018-09)Published
CYBER; Quantum-Safe Virtual Private Networks
ETSI TR 103 305-1 V3.1.1 (2018-09)Published
CYBER; Critical Security Controls for Effective Cyber Defence; Part 1: The Critical Security Controls
ETSI TR 103 305-2 V2.1.1 (2018-09)Published
CYBER; Critical Security Controls for Effective Cyber Defence; Part 2: Measurement and auditing
ETSI TR 103 305-3 V2.1.1 (2018-09)Published
CYBER; Critical Security Controls for Effective Cyber Defence; Part 3: Service Sector Implementations
ETSI TR 103 305-5 V1.1.1 (2018-09)Published
CYBER; Critical Security Controls for Effective Cyber Defence; Part 5: Privacy enhancement
ETSI TR 103 305-4 V2.1.1 (2018-09)Published
CYBER; Critical Security Controls for Effective Cyber Defence; Part 4: Facilitation Mechanisms
ETSI TR 103 306 V1.3.1 (2018-08)Published
CYBER; Global Cyber Security Ecosystem
ETSI TS 103 458 V1.1.1 (2018-06)Published
CYBER; Application of Attribute Based Encryption (ABE) for PII and personal data protection on IoT devices, WLAN, cloud and mobile services - High level requirements
ETSI TS 103 307 V1.3.1 (2018-04)Published
CYBER; Security Aspects for LI and RD Interfaces
ETSI TS 103 532 V1.1.1 (2018-03)Published
CYBER; Attribute Based Encryption for Attribute Based Access Control
ETSI TR 103 456 V1.1.1 (2017-10)Published
CYBER; Implementation of the Network and Information Security (NIS) Directive
ETSI TS 102 165-1 V5.2.3 (2017-10)Published
CYBER; Methods and protocols; Part 1: Method and pro forma for Threat, Vulnerability, Risk Analysis (TVRA)
ETSI TR 103 570 V1.1.1 (2017-10)Published
CYBER; Quantum-Safe Key Exchanges
ETSI TR 103 421 V1.1.1 (2017-04)Published
CYBER; Network Gateway Cyber Defence
ETSI TR 103 306 V1.2.1 (2017-03)Published
CYBER; Global Cyber Security Ecosystem
ETSI TS 103 307 V1.2.1 (2016-10)Published
CYBER; Security Aspects for LI and RD Interfaces
ETSI TR 103 305-2 V1.1.1 (2016-08)Published
CYBER; Critical Security Controls for Effective Cyber Defence; Part 2: Measurement and auditing
ETSI TR 103 305-3 V1.1.1 (2016-08)Published
CYBER; Critical Security Controls for Effective Cyber Defence; Part 3: Service Sector Implementations
ETSI TR 103 305-4 V1.1.1 (2016-08)Published
CYBER; Critical Security Controls for Effective Cyber Defence; Part 4: Facilitation Mechanisms
ETSI TR 103 305-1 V2.1.1 (2016-08)Published
CYBER; Critical Security Controls for Effective Cyber Defence; Part 1: The Critical Security Controls
ETSI TR 103 331 V1.1.1 (2016-08)Published
CYBER; Structured threat information sharing
ETSI TR 103 304 V1.1.1 (2016-07)Published
CYBER; Personally Identifiable Information (PII) Protection in mobile and cloud services
ETSI TR 103 369 V1.1.1 (2016-07)Published
CYBER; Design requirements ecosystem
ETSI EG 203 310 V1.1.1 (2016-06)Published
CYBER; Quantum Computing Impact on security of ICT Systems; Recommendations on Business Continuity and Algorithm Selection
ETSI TS 103 307 V1.1.1 (2016-04)Published
CYBER; Security Aspects for LI and RD Interfaces
ETSI TR 103 303 V1.1.1 (2016-04)Published
CYBER; Protection measures for ICT in the context of Critical Infrastructure
ETSI TS 103 487 V1.1.1 (2016-04)Published
CYBER; Baseline security requirements regarding sensitive functions for NFV and related platforms
ETSI TR 103 308 V1.1.1 (2016-01)Published
CYBER; Security baseline regarding LI and RD for NFV and related platforms
ETSI TR 103 306 V1.1.1 (2015-11)Published
CYBER; Global Cyber Security Ecosystem
ETSI TR 103 309 V1.1.1 (2015-08)Published
CYBER; Secure by Default - platform security technology
ETSI TR 103 305 V1.1.1 (2015-05)Published
CYBER; Critical Security Controls for Effective Cyber Defence
Friday, January 01, 2021
CSA Location Determination Investigations - The continuing mission
Recalling that I have posted here at trewmte.blogspot and cellsiteanalysis.blospot over the years was to assist interpretation of data and testing for cell site anslysis and elements that can be used when conducting investigations, I have posted below a few of the weblinks to help this discussion along.
https://trewmte.blogspot.com/2014/07/csa-site-survey-method3mobility-models.html
http://trewmte.blogspot.com/2009/08/cell-site-analysis-csa-images-part-2.html
http://trewmte.blogspot.com/2008/11/mobile-phones-and-fringe-coverage.html
http://cellsiteanalysis.blogspot.com/
https://www.dropbox.com/s/g912o5dji9wkxfk/3G%20Networks%20position%20techniques.pdf
It is noteworthy the ITU in 2017 published a series of documents regarding call details record (CDR) and specified network data that could be captured in CDRs to assist a wide range of tasks to comprehend mobile phone movement caused by migration to determining trip travel and destination. These studies were conduct in Liberia, Sierra Leone and Republic of Guinea:
Liberia CDR reallocation D012A0000C93301PDFE.pdf
CDR Sierra Leone D012A0000CA3301PDFE.pdf
CDR Republic of Guinea D012A0000D03301PDFE.pdf
The reports identify how to obtain, collate, display overlay geodata/mapping and interpolation of the format specification that I rather think is highly useful to CSA investigations. The ITU source highlights CDRs capturing association with PoI, Trip Segmentation, Trajectory and Stay Points etc. I am simplifying in my summary what is undoubtedly more detailed discussion in these reports to show that 'time' and ‘location’ will be highly relevant.
CSA has not been without the knowledge regarding peak-time call traffic, density of call traffic, tracking etc and these are used in call analysis and CSA. In these reports though the defining stay points captured in the call records add useful evidence such as travel, location, co-location (if relevant), association (if relevant), landmarks, so on and so forth.
Consideration of trip segmentation in the report states ""Trip segmentation: Extract stay points from anonymized CDR data, and divide move/stay segments. Figure 7.4 explains how stay points are extracted by applying parameters and thresholds to CDR data." In this regard the threshold parameters for stay points are specified as 'Minimum Time Duration 15 Minutes' and 'Maximum Distance 300 Meter'. To assist further here is a useful image with data from the ITU Liberia report:
To extrapolate such detail require Trip segmentation, Stay point reallocation, Route interpolation, Grid-based aggregation and Visualization and so on. To dig into the detail to assist interpretation:
"Stay point reallocation: Reallocate stay points (Trip OD) to surrounding points of interest (POIs) with a certain probability and fil gap between stay/move segments. POIs are regarded as surrounding a certain cell tower if they are closer to the cell tower location than to the others (Voronoi tessellation). The reallocation is necessary because CDR location data is based on cell tower location, which means that all users in the same area have the same location. Reallocation can make the distributing of people more realistic or likely because POIs can be considered places where people are likely to stay or visit, such as shopping areas, residential houses, villages, and to which people are reassigned rather than concentrating on cell tower locations. A new dataset of POIs was constructed for this process by collecting data from the distribution of buildings from open access Internet data (see Appendix 2). Figure 7.5 shows how POIs are distributed in a city. Areas in blue indicate building POIs with extracted stay points, where location information originally based on antenna location, are reallocated."
Lastly, the reports published in 2017 discussed relevance to 2G, 3G and 4G.