Skip to content

TechRepublic

  • Top Products
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Big Data
  • Tech Jobs
  • TechRepublic Premium
  • Top Products
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Big Data
  • Tech Jobs
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Security

Gallery: Tools for CSI cybercrime

By Andy Smith August 14, 2008, 1:48 AM PDT

Image
1
of 11

Gallery: Tools for CSI cybercrime

The digital forensics unit (DFU) of the Australia Serious Fraud Office sniffs out incriminating evidence from crime scenes with ZDNet Australia on hand collecting clues.

rnArmed with laptops and suitcases containing specialist forensic tools the 21-strong team can swiftly capture information from nearly any device, from laptops to mobile phones and PCs to games consoles.rn

rnThis Logicube CellDEK forensic tool can pull data from more than 1,100 of the most popular mobile phones and PDAs, capturing information using a plug-in connector, infrared or Bluetooth.rn

rnThe team aims to capture nearly all the data it needs on scene during a police search, storing a complete image of each device on its 300TB of dedicated storage–where it will help solve anything from multi-billion pound corporate price fixing investigations to murders.rn

rnPicking apart the information is a painstaking process as the team first strips out the hundreds of thousands of duplicate, system or application files; most photos; attachments; and malware, to produce a clean set of data.rn

rnCracking encryption is the second major hurdle, with the team employing the brute force of its 100 quad-core PCs to break low-grade encryption, such as password protected files.rn

rnThe team does not attempt to crack high-grade encryption, relying instead on the threat of a prison sentence for individuals refusing to hand over passwords or decrypted files.rn

rnPhoto credit: Nick Heath

Gallery: Tools for CSI cybercrime

One of the biggest challenges faced by the unit is the sheer size and scale of the fast evolving mobile phone market.rn

rnNew forensic tools are constantly being devised to detect emerging devices and the team must carry around scores of connectors for nearly every mobile phone produced, a small selection of which are seen here.rn

rnKeith Foggon, head of the DFU has overseen a revamp of the unit earlier in the summer.rn

rnHe said: “The PC architecture it is usually stable. But with mobile devices they change daily and consumers buy, throw away and upgrade their mobile phones, with new models coming out very, very regularly.rn

rn”That is an area where we are almost playing catch-up, we are never ahead of the mobile device forensic market.”rn

rnPhoto credit: Nick Heath

Gallery: Tools for CSI cybercrime

When forensic tools are unable to capture data from an obscure or new mobile phone it can mean reverting to a painstaking manual process of photographing each screen.rn

rnThis fixed digital camera is used to capture screens from phones, a time-consuming process that can run to hundreds of images but is necessary to produce screenshots to show in court, in the event of a dispute over an issue such as SIM card references.rn

rnPhoto credit: Nick Heath

Gallery: Tools for CSI cybercrime

A small selection of the hundreds of mobile phones that are analysed by the DFU on a regular basis.rn

rnThe unit also probes phones for the City of London Police to allow it to develop tools and resources to tackle the variety of phones on the market.rn

rnFoggon says the DFU can cope with all of the major brands but still comes across handsets that leave it stumped, such as an Amoi phone that initially had it baffled.rn

rnThe DFU has two attached officers from the City of London Police, soon to be increased to four, and provides evidence for a wide range of cases such as people trafficking.rn

rnPhoto credit: Nick Heath

Gallery: Tools for CSI cybercrime

These servers are devoted solely to the 130TB of information, including half-a-billion emails, amassed during the seven-year Operation Holbein investigation into pharmaceutical price fixing.rn

rnThe DFU uses about 60 per cent of its 300TB storage, which is spread over two floors of the Serious Fraud Office (SFO) headquarters.rn

rnThe alleged price-rigging of generic drugs such as penicillin is estimated to have cost the National Health Service as much as two billion pounds.

rnrnPhoto credit: Nick Heath

Gallery: Tools for CSI cybercrime

This degausser generates a magnetic field to wipe clean any hard discs and other storage devices.rn

rnIf a drive or memory stick holds government protected data the unit will first degauss it several times using several different polarities of magnetism and then pulverise them.rn

rnThe degausser comes with a remote control that looks like a car central locking keyring to allow it to be used from a safe distance.rn

rnFoggon warns: “You need to stand back two metres otherwise it degausses you as well. It can be dangerous if you have a pace maker and it can’t be used too close to other equipment because it resets a lot of the machines, it killed our microwave.”rn

rnPhoto credit: Nick Heath

Gallery: Tools for CSI cybercrime

This is the workspace in which the SFO tests out new tools for forensic analysis on emerging hardware, such as solid state hard drives.rn

rnPhoto credit: Nick Heath

Gallery: Tools for CSI cybercrime

These innocuous looking pictures may look identical to the naked eye but the one on the right contains data hidden within almost imperceptible color differences.rn

rnFoggon is concerned that the unit’s job could start becoming far more difficult as criminals embrace stenography as a way of hiding information.rn

rnThe subterfuge only becomes apparent when comparing the number of colours in both pictures, with 46,270 colours in the one of the left and 44,311 on the right.rn

rnPhoto credit: Nick Heath

Gallery: Tools for CSI cybercrime

Here the pictures are filtered through a specialized viewer and magnified to reveal the tiny differences in their make-up. The area of the picture that has been altered to hide the data has been circled.rn

rnFoggon says it would make uncovering evidence far more difficult if its use starts to become more widespread.rn

rnHe said: “We have tools to help us analyze it but it’s a long process to help us do that, it’s not an easy job at all.”rn

rnPhoto credit: Nick Heath

Gallery: Tools for CSI cybercrime

Here are some of the variety of tape drives that the DFU uses to process the back-up tapes seized on searches.rn

rnPhoto credit: Nick Heath

Gallery: Tools for CSI cybercrime

These are the Rainbow Tables that contain lists of password hashes for common applications, such as those made by Microsoft and Adobe, to allow the DFU to quickly crack password protected files relating to this software.rn

rnPhoto credit: Nick Heath

  • Security
  • Account Information

    Share with Your Friends

    Gallery: Tools for CSI cybercrime

    Your email has been sent

Share: Gallery: Tools for CSI cybercrime
Image of Andy Smith
By Andy Smith
  • Account Information

    Contact Andy Smith

    Your message has been sent

  • |
  • See all of Andy's content

Daily Tech Insider

If you can only read one tech story a day, this is it.

Cybersecurity Insider

Stay abreast of the latest cybersecurity news, solutions, and best practices

TechRepublic Premium

  • TechRepublic Premium

    Quick Glossary: Business Intelligence and Analytics

    Business intelligence and data analytics give tech decision makers a clearer idea of how well their companies are running and whether they’re meeting goals. Because BI incorporates data from across the enterprise — revenue operations, sales, supply chain and logistics — its insight is beneficial in areas such as customer profiling, customer support and market ...

    Published:  November 28, 2023, 4:00 PM EST Modified:  November 29, 2023, 9:00 AM EST Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    Hiring Kit: Video Game Producer

    Even for the smallest and most independent developers, creating a successful modern video game requires the coordination of designers, programmers, testers, artists, musicians, animators and a multitude of other talented personnel. Getting all these moving parts to work together, synchronize their production and do it on time and on budget is the role of the ...

    Published:  November 28, 2023, 4:00 PM EST Modified:  November 29, 2023, 9:00 AM EST Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    Quick Glossary: Foodtech

    Food stands as a fundamental necessity for human survival. Our bodies rely on the nutrients found in food that enable us to carry out our day-to-day activities and responsibilities. However, in our modern, fast-paced world, the convenience of readily available food is often prioritized, notwithstanding the expense of food safety due to potential contaminants. This ...

    Downloads
    Published:  November 27, 2023, 4:00 PM EST Modified:  November 28, 2023, 8:28 AM EST Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    Hiring Kit: Compliance Analyst

    Recruiting a compliance analyst with the right combination of industry compliance expertise and collaboration skills will require a comprehensive screening process. This hiring kit from TechRepublic Premium provides an adjustable framework your business can use to find the right person for the job. From the hiring kit: DETERMINING FACTORS, DESIRABLE PERSONALITY TRAITS AND SKILLSETS Regulatory ...

    Downloads
    Published:  November 27, 2023, 4:00 PM EST Modified:  November 28, 2023, 8:44 AM EST Read More See more TechRepublic Premium articles

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information
  • Careers

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • Editorial Policy
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice
CLOSE

Create a TechRepublic Account

Get the web's best business technology news, tutorials, reviews, trends, and analysis—in your inbox. Let's start with the basics.

Already registered? Sign In
Use Facebook
Use Linkedin

* - indicates required fields

CLOSE

Sign in to TechRepublic

Not a member? Create an account
Use Facebook
Use Linkedin

Lost your password? Request a new password

CLOSE

Reset Password

Please enter your email adress. You will receive an email message with instructions on how to reset your password.

Check your email for a password reset link. If you didn't receive an email don't forgot to check your spam folder, otherwise contact support.

Back to login
1 Finish Profile
2 Newsletter Preferences
CLOSE

Welcome. Tell us a little bit about you.

This will help us provide you with customized content.

No thanks, continue without
1 Finish Profile
2 Newsletter Preferences
CLOSE

Want to receive more TechRepublic news?

Newsletter Name
Subscribe
Daily Tech Insider
Daily Tech Insider AU
TechRepublic UK
TechRepublic News and Special Offers
TechRepublic News and Special Offers International
Executive Briefing
Innovation Insider
Project Management Insider
Microsoft Weekly
Cloud Insider
Data Insider
Developer Insider
TechRepublic Premium
Apple Weekly
Cybersecurity Insider
Google Weekly
Toggle All
No thanks, continue without

You're All Set

Thanks for signing up! Keep an eye out for a confirmation email from our team. To ensure any newsletters you subscribed to hit your inbox, make sure to add newsletters@nl.technologyadvice.com to your contacts list.

Back to Home Page