Expert: 'Flasher' technology digs deeper for digital evidence

Apr 12, 2007

New cybersleuthing technology, already solving crimes in Europe, has the potential to unlock valuable information in thousands of crimes every year in the United States, says a Purdue University expert.

The "flasher boxes" provide deeper access to data -- complete extraction and examination of all the information on a wide range of cell phones. Rick Mislan, an assistant professor of computer and information technology, has integrated the flasher boxes into coursework for a digital forensics class in Purdue's College of Technology.

"The fact is that cell phones are ubiquitous in today's world, and nearly all crimes have a digital component to them," Mislan said. "To be savvy at solving these crimes, we must be one step ahead of criminals in terms of finding, retrieving and interpreting evidence they may be trying to hide in digital devices.

"To get ahead, we must think out of the box, and that is just what we've found that our European counterparts are doing."

The difference between a flasher box and methods now used to retrieve information from digital devices is that the flasher technology allows direct access to everything stored in memory, such as incoming and outgoing calls, text messages and deleted files.

"Currently, investigators are relying upon software that allows them only to issue a specific command and receive only that information," he said. "With the flasher box technology, investigators can plug the cell phone into the box and the entire contents ? including contacts, call history, and deleted images and videos ? spill out into the computer.

"Having direct access to everything that may have existed in the phone is extremely important in criminal cases."

Mislan, a former U.S. Army electronic warfare officer, said another advantage of this method is that some cell phone models don't respond to current command-based forensics methods, but the direct memory access method would eliminate most of those problems.

"Using a flasher box is like taking a snapshot of the cell phone," he said. "This method shows a lot of promise."

Mislan learned about the technology from Steve Hirst and Steve Miller, both constable detectives for the West Yorkshire Police Department who specialize in high-tech crimes. He met the two through a mutual friend during a visit to Michigan. The detectives shared some of the methods that they have been using for several years.

"The United Kingdom and most of the rest of Europe are, and always have been, far ahead of us in terms of mobile forensics because their networks are standardized as GSM (Global System for Mobile Communications)," he said. "In the United States, we work with several different cellular network technologies - GSM, CDMA (Code Division Multiple Access) and iDEN (Integrated Digital Enhanced Network) - which makes any method of retrieval more challenging."

Mislan said the technology works by plugging the cell phone into the flasher box and downloading the files onto a computer. What results is a mass of letters and numbers that, to the naked eye, make no sense. With the right mathematical translation, however, an investigator can turn the code into valuable information.

He said the key to success with this particular method is finding the correct software and cables that match the wide variety of phones on the market today. Mislan believes that the flasher box technology can work on a wide variety of cell phones, but it's currently a matter of understanding the memory mapping of the cell phone and then writing the software for the extraction of that memory.

He said students in his class are being exposed to the latest technology in digital forensics investigation and are learning information that many professionals aren't yet familiar with.

"We're giving them real-world experience that not even the law enforcement community in this country is familiar with," he said. "We're the only university in the country that I am aware of that is testing the flasher box technology."

He said a $240,000 grant he received last year from the National Institute of Justice is allowing him to purchase many of the latest models of cell phones to help increase their knowledge about the various technologies.

In addition to investigators from the United Kingdom, Mislan has been learning about this technology from Ronald van der Knijff, an expert in embedded forensics from the Netherlands Forensic Institute, and Svein Willassen, formerly of the institute. An article co-written by van der Knijff that details this technology will be published in the May issue of the Small Scale Digital Device Forensics Journal, of which Mislan is an editor. The journal can be accessed online at .

Mislan said he frequently helps investigators, including those from various surrounding local and state police and sheriff's departments, retrieve digital information from cell phones, PDAs and smartphones, and this new technology will allow possibilities for even more collaborations.

"Our ultimate goal with this is to be able to train officers to use this technology on a regular basis," he said. "Our country in general is far behind when it comes to cell phone investigations, but by sharing information and collaborating with those overseas, the good news is that we can emulate a lot of what they are doing and stay on top of the ever-changing world of cell phones."

Digital forensics is a graduate program in the college's Department of Computer and Information Technology. The department provides training for police officers, crime scene investigators, federal agents and other law enforcement personnel and has partnerships with the National White Collar Crime Center and the National Institute of Justice's Electronic Crime Partnership Initiative.

Source: Purdue University

Explore further: Why conspiracy theorists won't give up on MH17 and MH370

add to favorites email to friend print save as pdf

Related Stories

Neuron circuit may enable pitch perception applications

22 hours ago

The first FitzHugh-Nagumo neuron circuit designed to include noise and exhibit the Ghost Stochastic Resonance effect has been presented by researchers from Université de Bourgogne in France. Their circuit ...

Scientist exposes new world of forensic analysis

Aug 15, 2014

Over the past 20 years DNA evidence has become the foundation upon which forensic investigation is built. The identification of traces of blood, saliva and other bodily fluids places a suspect directly at ...

Inside the cell, an ocean of buffeting waves

Aug 14, 2014

Conventional wisdom holds that the cytoplasm of mammalian cells is a viscous fluid, with organelles and proteins suspended within it, jiggling against one another and drifting at random. However, a new biophysical ...

Stacking solar cells method could be electricity gain

Aug 07, 2014

Is there a way to stack solar cells and convert more of the energy in sunlight into electricity? Not only has a company developed a method, but, as a headline said Wednesday in MIT Technology Review, the ...

Recommended for you

Why conspiracy theorists won't give up on MH17 and MH370

1 hour ago

A huge criminal investigation is underway in the Netherlands, following the downing of flight MH17. Ten Dutch prosecutors and 200 policemen are involved in collecting evidence to present at the International Criminal Court in the Hague. The inv ...

Here's how you find out who shot down MH17

3 hours ago

More than a month has passed since Malaysia Airlines flight MH17 crashed with the loss of all 298 lives on board. But despite the disturbances at the crash site near the small town of Grabovo, near Donetsk ...

Assange talks of leaving embassy, sowing confusion

Aug 18, 2014

WikiLeaks founder Julian Assange sowed confusion Monday with an announcement that appeared to indicate he was leaving his embassy bolt hole, but his spokesman later clarified that that would not happen unless ...

User comments : 0