Top Banner
Information Warfare Information Exchange with GeoTagging Atlantic Security Conference Halifax, Nova Scotia March 5, 2011 Adam W. Mosher Senior Security and Network Consultant
32

Adam w. mosher - geo tagging - atlseccon2011

Feb 07, 2017

Download

Technology

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Adam w. mosher - geo tagging - atlseccon2011

Information Warfare

Information Exchange with GeoTagging

Atlantic Security Conference

Halifax, Nova Scotia

March 5, 2011

Adam W. Mosher

Senior Security and Network Consultant

Page 2: Adam w. mosher - geo tagging - atlseccon2011

Importance of GeoTagging?

• Population of the World 6.8 Billion

• Subscription to Mobile devices 5.5 Billion

• 81% of the population has mobile devices

• This has changed the whole landscape for the

way the business world operates and the way the

criminal world operates.

Page 3: Adam w. mosher - geo tagging - atlseccon2011

Attack Vector

• The explosion of technology has closed the gap between the

intersection of cyberspace and real space.

• The attack vector has been diminished from sophistication, to

simplicity.

• Sex related offenses. Analogy of predator vs. prey.

• Identity theft has become a few keystrokes of effort.

• Limitations of certain laws and corporate policies.

Page 4: Adam w. mosher - geo tagging - atlseccon2011

GPS and its potential

in the Forensic World

• ‘Traditional’ mobile device forensics.

• GeoTagging would not exist without GPS.

• Forensics Investigators should understand:

– The basic concept of the Global Positioning System

– The basic concept of the GPS network and how it functions.

– How the underlying technology works?

• Without this basic understanding, it becomes difficult to effectively

take advantage of geotagging technology and information.

Page 5: Adam w. mosher - geo tagging - atlseccon2011

GPS

• Essentially provides reliable time

and location information.

• 24 satellites, positioned 12,000

miles above the Earth orbiting 7,000

miles per hour.

• Satellites circle the earth twice each

day in a very precise orbit and

transmit signal information back to

Earth.

Page 6: Adam w. mosher - geo tagging - atlseccon2011

Satellites

• Powered by solar energy, with

backup battery supply.

• Power boosters ensure proper

travel through the orbit.

• Three signals contain all the

information that is sent

through the radio signal.

Page 7: Adam w. mosher - geo tagging - atlseccon2011

Need to knows

Investigators should be

aware of signal multipathing

and selective availability.

Clock synchronization

What corrects the issues?

• WASS

• A-GPS

• Location Based Services

Page 8: Adam w. mosher - geo tagging - atlseccon2011

GPS Receivers

• 2D position consists of

latitude and longitude.

• 3D position consists of

latitude, longitude and

altitude.

The newer iPhones accuracy even

exceeds that of many stand alone

GPS devices, as the device

determines its position in combination

with cell tower triangulation to +/- 1

meter accuracy

Page 9: Adam w. mosher - geo tagging - atlseccon2011

Carriers

Technology

GSM

Global System of Mobile

Communications

CDMA

Code Division Multiple Access

Much more prevalent due to its World

Wide Usage

America and selected parts of Asia.

EDGE is functionality and less speed EVDO is speed and less functionality

Account information is on SIM card Account information is programmed on

phone.

Page 10: Adam w. mosher - geo tagging - atlseccon2011

Mobile Devices /

Embedded Devices

Page 11: Adam w. mosher - geo tagging - atlseccon2011

GeoTagging

Information

• All GPS enabled devices will carry similar information, just stored in

different locations.

• GPS Remnants – cached map queries, traffic or social networking

applications.

• You will have a gps log file, photograph log file, google earth log file

and a photo index file

• Graphically display the trackpoints, track logs, waypoints and routes.

• Camera metadata.

• How to work around barriers and failures?

Page 12: Adam w. mosher - geo tagging - atlseccon2011

GeoTagging

• GeoTagging allows the insertion of location data into an image, or

other form of media (videos, sms, websites).

• Fault…the definition is narrow. Can contain much more information

than geographical data.

• Can be done manually or automatically. In theory, it is not overtly

complicated.

• Effective when used in image search engines.

• All about finding location based information.

Page 13: Adam w. mosher - geo tagging - atlseccon2011

GeoTagging

Example

Page 14: Adam w. mosher - geo tagging - atlseccon2011

EXIF

• EXIF – Exchangeable Image File Format.

• Based on TIFF, which is simply a file format for storing images.

• Metadata information is organized into different Image File

Directories (IFD's) within an image

Page 15: Adam w. mosher - geo tagging - atlseccon2011

Flash Memory

NOR

Negated OR Function

NAND

Negated AND Function

Behaves like other random access

devices (SRAM and DRAM)

Part random and part serial.

All about code storage. All about data storage. This is where

the end user reads and writes to.

Page 16: Adam w. mosher - geo tagging - atlseccon2011

GeoTagging

• What geotagging is not?

Page 17: Adam w. mosher - geo tagging - atlseccon2011

GeoTagging

‘cybercasing’

• Cybercasing – tracking someone’s activities through cyber space

• You need to have a target of interest

• The target needs to be attainable

• This is where fantasy and reality turn dangerous.

Page 18: Adam w. mosher - geo tagging - atlseccon2011

Knowledge

Page 19: Adam w. mosher - geo tagging - atlseccon2011

Scripting

Setting our sites on a

target!

Small 40 line code written

in Python.

Will extract enormous

amounts of images from a

site, or sites.

Page 20: Adam w. mosher - geo tagging - atlseccon2011

Blogspot

Page 21: Adam w. mosher - geo tagging - atlseccon2011

We have become

part of this family

First, middle and last

name for each family

member

Name of the child’s

daycare

The other name’s of the

children in the daycare

Emergency contact

information for children

at the daycare

Home address and work

address for both parents

Pictures of inside,

outside of the house.

Pictures of daycare,

doctor’s office and

parents work

Clothe size of the child Name of where the

parent’s work and

organizations they are

involved in

Hours the parents work. A schedule when the

child is dropped off at

daycare and which

parent drops them off

Email addresses

Last time the child was

checked at the doctor.

Who the doctor is.

Chat site the babysitter

uses.

Page 22: Adam w. mosher - geo tagging - atlseccon2011

• ICSL – Internet Commerce Security Laboratory

• Yang’s Scientific Research Institute

Page 23: Adam w. mosher - geo tagging - atlseccon2011

iPhone 4

• Based on direct manipulation

• Four abstraction layers:

– Core OS layer

– Core services layer

– Media layer

– Cocoa touch layer

• Very impressive geotagging capabilities.

• Beyond the base installed applications, all are installed by the user

Page 24: Adam w. mosher - geo tagging - atlseccon2011

iPhone GeoTagging

• Latitude, longitude, altitude, compass heading, accuracy data, time,

make and model

• Videos…information is placed near the end of the file, which is not in

standard EXIF location.

• Cell Tower Data (root/Library/Caches/locationd)

• /Library/Maps (can be from logical or physical)

– History.plist

– Directions.plist

– Bookmark.plist

Page 25: Adam w. mosher - geo tagging - atlseccon2011

Sex Offender

Monitoring

Page 26: Adam w. mosher - geo tagging - atlseccon2011
Page 27: Adam w. mosher - geo tagging - atlseccon2011
Page 28: Adam w. mosher - geo tagging - atlseccon2011
Page 29: Adam w. mosher - geo tagging - atlseccon2011
Page 30: Adam w. mosher - geo tagging - atlseccon2011

Corrections Usage

of GeoTagging

• Standard supervision condition that sex offenders are not supposed

to be in places frequented by kids, strip clubs, adult movie places.

• How can you prove this?

• There is limited cell phone monitoring.

• Computer monitoring software.

• Evidence from social networking sites.

• GPS in ankle bracelets

Page 31: Adam w. mosher - geo tagging - atlseccon2011

Future of GeoTagging

• Search and Seizure

• Wiretaps

• Tracker scraping from p2p sites

• Child Pornography image detection over a p2p network

• Metadata extraction over p2p networks

• Warrants

• Sex offender tracking

• Identity theft

• Criminal activities

• Corporate Security

Page 32: Adam w. mosher - geo tagging - atlseccon2011

If you are interested in a toolkit with all

sorts of tools and descriptions on how to

use them for GeoTagging, please just

drop me an email and I will send you a

link and password.

Useful for forensics investigators

(criminal, corporate, private sector)

[email protected]