LAW ENFORCEMENT SENSITIVE
LAW ENFORCEMENT SENSITIVE
Page Script
01_05_03
PIN to PIN Logs
PIN to PIN Logs are similar to call detail records. They include the date, time sent and received, etc.
Notice for each message the source and destination direction will change (for example, depending on
whether the party is initiating or receiving the message).
Internet Browsing Logs
When reviewing the internet browsing logs, you can determine websites visited by the user. This log
shows, for example, that a website called go.flycell.com was visited, as well as the date and time it was
visited. You can use this information to subpoena the ISP and website directly.
You can also use the internet browsing logs to look for other social networking sites such as Facebook,
MySpace, Yahoo, etc. These sites are potential gateways to information and can open doors to
determining who else may be working with your suspect.
01_05_04a
Internet Browsing Logs
By following the trail found in the internet browsing logs, you can use the browsing history to subpoena
records from the websites visited and potentially find additional information that can aid in your
investigation.
01_05_05
Stored Communications Content
Stored communications content may include:
• BlackBerry® Messenger communications (global)
• BlackBerry® hosted email (xxx@Blackberry.net)
• Integrated email accounts (e.g., Hotmail, Yahoo, Gmail, etc.)
Typically stored communications data is routinely deleted from RIM's servers, so it is imperative to
immediately serve a preservation letter to prevent deletion of data. The preservation letter should be
followed by a Search Warrant served to RIM's public safety section.
Real-Time Data Intercept
Capabilities
Real-time data intercept capabilities. The capability to conduct U.S. data intercepts of PIN to PIN and
BlackBerry® Messenger Communications, as well as BlackBerry® Internet Services is possible pursuant to a
court ordered Title III wiretap.
Summary
01_06_01
Summary
This course has provided basic information about Research in Motion and how to exploit BlackBerry
devices during an investigation.
For assistance or questions on BlackBerry device exploitation and other emerging technologies, please
contact the ST Operations Support Unit at (703)495-6500 or email ST - Emerging Technologies Support.