What is cellular triangulation, and is it as critical as it sounds? Well, essentially it is the examination of call detail records (CDRs) and geo-location artifacts. This evidence is vital to criminal investigations and legal proceedings; whether you are prosecuting or defending a case.
What’s even more pivotal when using this data for legal evidence is the way you select the best forensic specialist to help defend or prosecute your case. The appropriate investigator not only requires the skills to discover essential data – they must also be capable of justifying and testifying to their findings in a court of law.
This post is written with the intention of giving a wider audience a strong grasp on the critical components involved in gathering of cellular triangulation data. Included are insights from Gus Dimitrelos, renowned senior digital cyber forensics consultant, and owner of Cyber Forensics.
Cellular triangulation is much more complex than most people realize; it isn’t just about signals bouncing off towers. Triangulation is a trigonometric method of determining the position of a fixed point from the angles to it – but its use in cellular forensics goes even deeper.
Below are several points to consider as you look deeper into the intricacies of cellular triangulation, as it applies to evidentiary as well as preventative purposes:
Does the company provide immediate response?
Have their results been proven in federal and state courts?
Are they fully educated in the laws guiding collection of data?
What experiences are their procedures based upon?
Who are the key employees and how relevant is their background?
Does the firm offer group courses or private mentorship in data breach prevention?
Are technical security surveys employed to make sure all the bases are covered?
Which of the following methods do they use for cellular triangulation?
How does their method (or methods) contribute to their analysis?
Why is it necessary to perform an analysis at the very beginning, as opposed to using it to support a drawn conclusion?
Is it possible for cellular data to be misused or misunderstood by a lay person or unskilled forensic team?
There have been monumental changes in the way new techniques and technologies affect a criminal case. Which advances have they incorporated in their procedures, and why?
The accumulated expertise of Dimitrelos and his consultants allows the firm of Cyber Forensics to offer an extraordinary list of services. Education is one of their highly regarded specialties – rarely offered in the industry of cyber services – having trained more than 2,000 international law enforcement professionals.
168,000 deleted files were recently recovered from Hunter Biden’s abandoned laptop. The recovered files were…
Further investigation into the documents and data stored on Hunter Biden’s abandoned laptop reveals that…
Cryptocurrency accounts wiped out 'in an instant' by cyber crooks. ABC Action News I-Team Investigator…
Images of child sexual abuse are, unfortunately, nothing new, but a dramatic uptick in their…
Super Bowl security was unbelievably tight this year, and that's despite the fact that the…
A Tampa Bay Syndicate of ABC WFTS broke a story about a massive data breach…