susteen’s datapilot secure view for forensics
TRANSCRIPT
![Page 1: Susteen’s DataPilot Secure View for Forensics](https://reader031.vdocument.in/reader031/viewer/2022012018/61daf19037420919af6b1a36/html5/thumbnails/1.jpg)
Susteen’s DataPilot Secure View for Forensics
Senior Instructor
Federal Law Enforcement Training CenterMobile Device Investigations Program
(b)(6)
![Page 2: Susteen’s DataPilot Secure View for Forensics](https://reader031.vdocument.in/reader031/viewer/2022012018/61daf19037420919af6b1a36/html5/thumbnails/2.jpg)
DataPilot Secure View for Forensics
• Forensic Software Kit – acquire available data based on mobile device capabilities and tools technology
• Large number of supported devices
• Limited by current technology
• Does not support all mobile devices
• One option – Guidance Software vs Access Data
![Page 3: Susteen’s DataPilot Secure View for Forensics](https://reader031.vdocument.in/reader031/viewer/2022012018/61daf19037420919af6b1a36/html5/thumbnails/3.jpg)
• Recommends at least 50% powered device
• Manual Setup as well as Auto Detect
• Presently will also read Memory Cards
• SIM Card Reader in the Alpha testing stage
DataPilot Secure View for Forensics
![Page 4: Susteen’s DataPilot Secure View for Forensics](https://reader031.vdocument.in/reader031/viewer/2022012018/61daf19037420919af6b1a36/html5/thumbnails/4.jpg)
Things to Remember
1. Maintain power to the device
2. If possible seize all cables and accessories
3. This is an active examination – Data changes due to the nature of wireless networks
DataPilot Secure View for Forensics
![Page 5: Susteen’s DataPilot Secure View for Forensics](https://reader031.vdocument.in/reader031/viewer/2022012018/61daf19037420919af6b1a36/html5/thumbnails/5.jpg)
• Understand the basics of wireless technology – Push Technology vs Pull Technology
• Keep the mobile device off the network –Stronghold bag
• Kept software updated – Patches, Bug Fixes, New Capabilities
DataPilot Secure View for Forensics
![Page 6: Susteen’s DataPilot Secure View for Forensics](https://reader031.vdocument.in/reader031/viewer/2022012018/61daf19037420919af6b1a36/html5/thumbnails/6.jpg)
Pages 6 through 51 redacted for the following reasons:- - - - - - - - - - - - - - - - - - - - - - - - - - - -(b)(7)e
![Page 7: Susteen’s DataPilot Secure View for Forensics](https://reader031.vdocument.in/reader031/viewer/2022012018/61daf19037420919af6b1a36/html5/thumbnails/7.jpg)
DataPilot Secure View for Forensics
•
(b)(7)e
![Page 8: Susteen’s DataPilot Secure View for Forensics](https://reader031.vdocument.in/reader031/viewer/2022012018/61daf19037420919af6b1a36/html5/thumbnails/8.jpg)
Pages 53 through 63 redacted for the following reasons:- - - - - - - - - - - - - - - - - - - - - - - - - - - -(b)(6), (b)(7)e