Blog

Mobile About Slide

How Mobile Phone Masts Work

19.11.15

Masts, antennae and base stations

Strictly speaking a mast is just that, a tower or pole that sticks up into the air – usually 15m. The parts that actually enable us to send and receive calls are separate elements; antennas and radio base stations. The mast itself simply lifts the antennae to the height where they can transmit and receive radio waves.

When you make a call your phone converts voice or data into radio waves that are transmitted to the nearest base station. The base station determines if the call is to another mobile phone or to a landline and routes the call accordingly. If it is to someone on the same network then the call can be directed via base stations to the site closest to the recipient and transmitted via the antennae.

The role of Cells
The mobile phone network operates on the cell principle. The network operators divide a territory up into thousands (in the case of the UK) of discrete areas – cells – that contain a base station and antennae, plus a mast if required.  Each cell provides coverage for a specific area and because their coverage overlaps calls can be passed between cells as people move around.

Cell density and positioning are driven by population distribution and topography. There are more cells in the urban area to cater for higher traffic levels and, sometimes, to mitigate interference caused by tall buildings. Low power cells called “picocells” can also be deployed inside buildings such as airports where there is a high concentration of users.

Cell Site Analysis
How mobile networks work and the way in which they are configured is extremely important to Disklabs. We need to understand the coverage of the mobile networks in precise detail when conducting Cell Site Analysis, a technique for identifying the movement and use of mobile phones and communications devices. Details about the height of masts, local geography and cell types can mean the difference between a guilty or not guilty verdict, or whether a suspect is apprehended.

Visit the website for more information on Disklabs range of digital forensics and data recovery services or contact us today.

Call us on +44(0)1827 50000 or use our contact form to let us know your requirements.

 

 

Protect your passwords

13.11.15

 A point of vulnerability

Talk Talk, Experian and Ashley Madison are high profile victims of cybercrime but the hackers target individuals directly too. One major area of vulnerability is the reliance for security on a simple collection of letters, numbers and symbols: the password.

Those in the know use the phrase “password cracking” to describe the penetration of a computer, network or system to unlock a resource that has been locked with a password. People using password cracking are sometimes defined as being in one of two groups, hackers or attackers.

A hacker is any person with an inherent interest in computer technology. Hackers are not necessarily someone who wants to do harm, just someone who wants to ‘beat a system’.  They have been known to gain access to a website simply to post a picture of a cat but in gaining access they may damage an individual or organisation by, for instance, making confidential data visible.

Attackers, on the other hand, gain access to cause damage. Motivations for Attackers can range from disgruntled employees trying to get revenge on a former company, a student simply trying to exploit large organisations with their computer systems, or simply a criminal attempt to gain financially by accessing confidential data or through blackmail.

Whether they are hackers or attackers the initial attention is on finding a vulnerability in the computer system they are targetting, corporate or domestic. And the most vulnerable point is the password.

So how do the attackers attack?

There are many ways of attacking a network including:

1. Bin, (or dumpster), diving“ literally going through the rubbish to find possible information that could be a password.

2. Finding a Post-It note on a monitor or underneath a keyboard.

3. Looking at Social Media profiles for details like birth dates, schools, children’s names that are often used in log-in processes.

4. Contacting an IT or customer service department, using relevant facts gained from the above, to fool staff into providing extra details or password resets.

5. Direct contact via email or phone asking people for details or getting them to log-on to a site (a dummy site) which means they expose their details.

6. A “dictionary attack” where a dictionary file of common words is loaded into a password cracking application, such as PRTK or LC4. The applications then attempt multiple logins at very high speed exploiting the fact that most common passwords are simplistic.

7. A “hybrid attack”combining the dictionary attack with the use of numbers to simulate common password set-up.

8. A “brute force attack”, which abandons the subtlety of the dictionary to target a massive number of short password.

What can you do to prevent password attacks

1.Shred office paper waste and consider doing the same for official documents, receipts etc. at home.

2. Check that passwords or ancillary information is not displayed anywhere.

3. Change passwords frequently.  At work change passwords when employees leave.

4. Use difficult to guess passwords – At least 8 characters including numbers, symbols, uppercase and lowercase characters.

5. Consider using free password generator software such as LastPass.

6. Don’t use the same password for more multiple accounts.

7. Enable two step verification where offered on websites.

8. Be aware that there are people out there who want your passwords and never give details away to callers, email contacts or on social media sites…ever.

9. Use dummy accounts rather than administrator accounts for computer systems and websites.

Disklabs has an experienced team of consultants who can advise you on improving your digital security.  We also run one of the UK’s leading digital forensics laboratories that can help you track down the perpetrators of malicious password attacks and bring them to justice.

Call us today on +44(0)1827 50000 or use our contact form to discuss your digital security requirements.

 

Disklabs - Experts in the extraction and analysis of mobile phone data

Computer Forensics IP Theft

02.11.15

Have you been a victim of IP theft?

The theft of intellectual property right (IP) can be hard to prove and even harder to prosecute. Realistically it will take services of a computer forensics company such as Disklabs to provide the victim of IP theft with the skills and resources to gather hard evidence to support their accusations.

IP theft is a complex subject to approach as laws can differ significantly between jurisdictions. Disklabs can provide advice and guidance upon the best way to pursue the investigation into the theft of your intellectual property. Computer forensics techniques such as those perfected by Disklabs are being used more and more as a way to acquire sufficient evidence to support a claim of intellectual property theft.

There are as many reasons for somebody committing IP theft as there are forms of IP theft, regardless of the reason the crime was committed, every instance of IP theft can represent a major financial loss for the victim. Disgruntled employees will often perform malicious acts of IP theft such as e-mailing a customer list to a competing company or deleting mission-critical data such as invoices and other accounting data. At its most serious IP theft sees a member of the executive management team stealing an entire business model to use as a basis for a new commercial venture.

If you suspect that you have been a victim of IP theft you should instantly turn off the computer which was the tool used during the crime, not simply by shutting it down but by physically unplugging it from the mains. You should then take measures to secure the entire machine; it should be locked in a safe place where nobody can gain access to it. Once these initial measures have been taken you should try to make a note of or list any suspicious activities that you have witnessed or any data or documents you think may have been stolen. Then you should contact a computer forensics provider and arrange for the suspected IP theft to be investigated. The result of this forensic analysis will provide you with a technical document in proving or disapproving your suspicions, and arming you with the tools to take your accusations further.

In many cases, once the crime of IP theft can be proven by the documented technical fact the perpetrator will return what was stolen. If they do not, then the victim company is already in possession of the relevant proof and can begin to instruct their legal representatives to take proceedings.

If you believe you have been a victim of IP theft then call us today on +44(0)1827 50000 or use our contact form – Disklabs can help.

Disklabs – Investigating and preventing computer misuse for UK business.

What is Cyber Forensics

20.10.15

Legal and civil investigations

Cyber forensics is the process of extracting, analysing and reporting on digital data obtained from a variety of electronic devices (computers, mobile phones, sat navs etc.).

The outputs from cyber forensics are legally admissible evidence in a court of law, provided its capture follows appropriate procedures.

Disklabs provides cyber forensics services in both criminal and civil cases. An increasing part of our work is in support of organisations that have been the victims of cyber crimes such as IP theft or computer fraud.

The company operates a state of the art forensic laboratory manned by a team of forensic experts. The lab works with a set of clear, standard procedures to maintain an admissible chain of evidence.

Disklabs is renowned for providing concise and understandable reports to its clients, even when the case involves complex information or a convoluted chain of events.

Cyber forensics combines physical examination, the use specialist software and person-to-person interviewing to examine electronic devices and identify improper behaviour. Retrieval of data from disc drives, memory, software logs and other records is often the starting point. This task is made more difficult because data will be lost, hidden, erased or damaged by the perpetrators of the crime.

Disklabs offers comprehensively fixed-price contracts to ensure that there are no unexpected increases in cost and to provide you with the highest standard of service possible. We follow Association of Chief Police Officers guidelines for digital evidence and we are accredited to ISO9001, ISO27001 and ISO17025 standards.

For more information call us today on +44(0)1827 50000 or use our contact form to let us know your requirements.

What is Cell Site Analysis?

02.09.15

Location and movement of mobile phones

Cell Site Analysis is a legally accepted process which identifies the location and movement of a mobile phone over a period time.

The Cell Site Analysis process cross-references of historic call records (including voice, SMS and multimedia messaging) with readings from the cell site masts that transmit and receive mobile communications signals.

Investigators can review Call Data Records (CDR) from the mobile telecommunications providers and carry out field strength surveys. Surveys are required because of variations in signal strength at particular locations caused by distance from a Cell Site or interference from structures or local topography.

Cell Site Analysis allows forensic investigators to;

  • Identify specific locations in which individual and multiple mobile phones have been used.
  • Track changes in physical location and identifies a timeline of use or non-use.
  • Identify electronic contact between different mobile devices content, time and location-based.

The evidence gathered from the Cell Site Analysis can be further correlated with other outputs from the digital forensics process related to specific content such as computer files or CCTV footage, or to digital metadata.

In the context of an investigation Cell Site Analysis can:

  • Test the validity of alibis.
  • Show proximity to a crime scene.
  • Determine if individuals in a case have been in contact or proximity.
  • Identify patterns of movement by suspects and victims.

Disklabs provides Cell Site Analysis services to criminal defence solicitors, law enforcement agencies and corporations. We have the expert forensic capability to extract and analyse data and the communications skills to create easy-to-follow reports.

Visit our website for further details on Disklabs Cell Site Analysis capability, as well as our wider set of digital forensics services or, get in contact. Call us today on +44(0)1827 50000 or use our contact form to let us know your requirements.