Skip to main content
Documents

Hacking Team RCS 9 Analyst’s Guide

Oct. 30, 2014

1/109
Download
Page 1 from Hacking Team RCS 9 Analyst’s Guide
]Haci<ngTeam[ RCS 9 The hacking suite for governmental interception Analyst's Guide Analyst?s Guide - 1Jeri-fl $2131.23 HT
]Haci<ngTeam[ RCS 9 The hacking suite for governmental interception Analyst's Guide Analyst?s Guide - 1Jeri-fl $2131.23 HT
Page 2 from Hacking Team RCS 9 Analyst’s Guide
Information ownership COPYRIGHT 2013, HT S.r.l. All rights reseryed in all countries. No part of this manual can be translated into other languages andfor adapted andf'or reproduced in other formats andf'or mechanically, electronically processed or photocopied, recorded or otherwise without prior written authorization from HackingTeam. All corporations and product names may be legal or registered trademarks, property of their respective owners. Specifically Internet Explorer? is a Microsoft Corporation registered trademark. Albeit text and images being selected with the utmost care, HackingTeam reseryes the right to change andf'or update the information hereto to correct typos andfor errors without any prior notice or additional liability. Any reference to nam es, data and addresses of companies not in the HackingTeam is purely coincidental and, unless otherwise indicated, included as examples to better clarify product use. NOTE: requests for additional copies of this manual or product technical information should be addressed to: HT S.r.l. yia della Moscoya, 13 20121 Milano (MI) Italy Tel.: 39 02 29 060 603 Fax: 39 02 63 118 946 e-mail: info@hackingteam.com
Information ownership COPYRIGHT 2013, HT S.r.l. All rights reseryed in all countries. No part of this manual can be translated into other languages andfor adapted andf'or reproduced in other formats andf'or mechanically, electronically processed or photocopied, recorded or otherwise without prior written authorization from HackingTeam. All corporations and product names may be legal or registered trademarks, property of their respective owners. Specifically Internet Explorer? is a Microsoft Corporation registered trademark. Albeit text and images being selected with the utmost care, HackingTeam reseryes the right to change andf'or update the information hereto to correct typos andfor errors without any prior notice or additional liability. Any reference to nam es, data and addresses of companies not in the HackingTeam is purely coincidental and, unless otherwise indicated, included as examples to better clarify product use. NOTE: requests for additional copies of this manual or product technical information should be addressed to: HT S.r.l. yia della Moscoya, 13 20121 Milano (MI) Italy Tel.: 39 02 29 060 603 Fax: 39 02 63 118 946 e-mail: info@hackingteam.com
Page 3 from Hacking Team RCS 9 Analyst’s Guide
Contents Glossary ._vii Guideintroduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 1 New guide features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 2 Supplied documentation 2 Printconcepts for notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 3 Printconcepts for format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 3 Product and guide addressees 4 Software author identification data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 5 RC5 {Remote Control SystemDifferences between PCS 80 and PCS 16 versions 7? Glossarv . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 7? RC5 Console for the Analyst . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 8 Starting the PCS Console .. 9 What the login page looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 9 Open RCS Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 9 Homepage description .. 10 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10 What it looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 10 Shared interface elements and actions .11 What the PCS Console looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 11 Actions alwavs available on the interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13 Change interface language or password 13 Converting the PCS Console date?time to the actual time zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 13 Table actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14 Analvst's procedures ..15 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15 Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..15 To retrieve importa nt evidence and be alerted -15 Analvzing, selecting and exporting evidence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 To process information obtained on people and places involved in the investigation . . . . . .16 Operation and target What you should know about operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18 What is an operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18 What vou should know about targets .. 18 What is a target . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18 Operation management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 18 Purpose -18 What the function looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18 litn'alvst's Guide ver.1.4 SE P-ECI13 RC8 2CI13EI -pag.
Contents Glossary ._vii Guideintroduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 1 New guide features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 2 Supplied documentation 2 Printconcepts for notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 3 Printconcepts for format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 3 Product and guide addressees 4 Software author identification data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 5 RC5 {Remote Control SystemDifferences between PCS 80 and PCS 16 versions 7? Glossarv . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 7? RC5 Console for the Analyst . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 8 Starting the PCS Console .. 9 What the login page looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 9 Open RCS Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 9 Homepage description .. 10 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10 What it looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 10 Shared interface elements and actions .11 What the PCS Console looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 11 Actions alwavs available on the interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13 Change interface language or password 13 Converting the PCS Console date?time to the actual time zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 13 Table actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14 Analvst's procedures ..15 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15 Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..15 To retrieve importa nt evidence and be alerted -15 Analvzing, selecting and exporting evidence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 To process information obtained on people and places involved in the investigation . . . . . .16 Operation and target What you should know about operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18 What is an operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18 What vou should know about targets .. 18 What is a target . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18 Operation management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 18 Purpose -18 What the function looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18 litn'alvst's Guide ver.1.4 SE P-ECI13 RC8 2CI13EI -pag.
Page 4 from Hacking Team RCS 9 Analyst’s Guide
To learn more .. 19 ?v?ievving operation targets -20 Operation data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20 Operation page .20 Purpose -20 What the function looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21 To learn more ..21 Operation page data .22 Targets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 23 Target page .24 Purpose -24 What the function looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24 To learn more ..25 Exporting target evidence .. 25 Target page data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..26 Icon vievv .26 Table vievv .26 Agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23 Agent page .29 Purpose -29 What the function looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29 To learn more ..30 Agent event log data .30 Command page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..31 Purpose .31 What the function looks like .31 To learn more . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32 Agent log data .32 Evidence analvsis .33 What vou should knovv about evidence .34 Analvsis process .34 Evidence accumulated in the device. -34 Filtering evidence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34 Translating evidence .35 Delete evidence .-35 .tgz file description vvith exported evidence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35 Evidence analvsis {Evidence} .36 Purpose -36 What the function looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36 To learn more ..39 Analvst'sciuitle ver.1.4 R65 9 2013i? HT5.r.l. - peg. ll
To learn more .. 19 ?v?ievving operation targets -20 Operation data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20 Operation page .20 Purpose -20 What the function looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21 To learn more ..21 Operation page data .22 Targets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 23 Target page .24 Purpose -24 What the function looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24 To learn more ..25 Exporting target evidence .. 25 Target page data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..26 Icon vievv .26 Table vievv .26 Agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23 Agent page .29 Purpose -29 What the function looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29 To learn more ..30 Agent event log data .30 Command page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..31 Purpose .31 What the function looks like .31 To learn more . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32 Agent log data .32 Evidence analvsis .33 What vou should knovv about evidence .34 Analvsis process .34 Evidence accumulated in the device. -34 Filtering evidence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34 Translating evidence .35 Delete evidence .-35 .tgz file description vvith exported evidence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35 Evidence analvsis {Evidence} .36 Purpose -36 What the function looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36 To learn more ..39 Analvst'sciuitle ver.1.4 R65 9 2013i? HT5.r.l. - peg. ll
Page 5 from Hacking Team RCS 9 Analyst’s Guide
Preparing evidence for analvsis and export, tagging bv relevance . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 39 Preparing evidence for analvsis and export, tagging for the report 39 Preparing evidence for analvsis and export adding personal notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40 Analvzing evidence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40 Viewing counters divided bv tvpe Exporting displaved evidence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..41 Evidence data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 41 Evidence details ..43 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..43 What the function looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..43 To learn more _.44 Image tvpe evidence actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..45 Audio tvpe evidence actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..45 Evidence export data 46 List of tvpes of evidence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 46 Exploring and retrieving evidence from online devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .43 What vou should know about retrieving evidence 49 Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..49 File 5vstern cornponents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..49 Retrieve evidence from devices {File Svstern} 49 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..49 What the function looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50 To learn more _.51 Exploring file svstern content and downloading files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..51 Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 52 What vou should know about intelligence 53 Intelligence section license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..53 What vou should knovv about entities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..53 Introduction _.53 People involved in the investigation: Target entities and Person entities . . . . . . . . . . . . . . . . . . ..53 The places involved in an investigation: Position entitv and Virtual entitv . . . . . . . . . . . . . . . . . ..54 Managing entities ..54 Target entitv . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 54 Person entitv . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 54 Position entitv ._55 Virtual entitv . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 55 See "What vou should knovv about linksIntroduction _.55 Knovv links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..55 Peer links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .55 ver.1.4 5EP-2013 RES 9 2013 El HT5.r.l. - peg.
Preparing evidence for analvsis and export, tagging bv relevance . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 39 Preparing evidence for analvsis and export, tagging for the report 39 Preparing evidence for analvsis and export adding personal notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40 Analvzing evidence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40 Viewing counters divided bv tvpe Exporting displaved evidence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..41 Evidence data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 41 Evidence details ..43 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..43 What the function looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..43 To learn more _.44 Image tvpe evidence actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..45 Audio tvpe evidence actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..45 Evidence export data 46 List of tvpes of evidence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 46 Exploring and retrieving evidence from online devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .43 What vou should know about retrieving evidence 49 Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..49 File 5vstern cornponents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..49 Retrieve evidence from devices {File Svstern} 49 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..49 What the function looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50 To learn more _.51 Exploring file svstern content and downloading files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..51 Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 52 What vou should know about intelligence 53 Intelligence section license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..53 What vou should knovv about entities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..53 Introduction _.53 People involved in the investigation: Target entities and Person entities . . . . . . . . . . . . . . . . . . ..53 The places involved in an investigation: Position entitv and Virtual entitv . . . . . . . . . . . . . . . . . ..54 Managing entities ..54 Target entitv . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 54 Person entitv . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 54 Position entitv ._55 Virtual entitv . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 55 See "What vou should knovv about linksIntroduction _.55 Knovv links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..55 Peer links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .55 ver.1.4 5EP-2013 RES 9 2013 El HT5.r.l. - peg.
Page 6 from Hacking Team RCS 9 Analyst’s Guide
Managing Peerand Knowlinks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .55 Identity links .55 Managing Identity links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .55 Linktime Value . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 55 What you should know about how intelligence works .55 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 55 Intelligence process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 52 Automatic Know link creation criteria Automatic Peer link creation criteria with Target and Person entities . . . . . . . . . . . . . . . . . .. 5? Automatic Peer link creation criteria with Position entities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .58 Automatic Peer link creation criteria with Virtual entities .. 58 Automatic Identity link creation criteria with Target and Person entities . . . . . . . . . . . . . . .. 58 Intelligence operation management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59 Purpose ?59 What the function looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59 To learn more . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..50 Viewing operation entities ..50 Entity management: icon and table Views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..50 What the function looks like ..50 To learn more . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..52 Viewing entity details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52 Entity management: link View -.52 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..53 What the function looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 To learn more .55 Viewing entity details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .55 Merging two entities .55 Creating a link between two entities .55 Dynamically displaying eVidence on links between entities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 Entity management: Position View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 5? Purpose What the function looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 To learn more . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..20 Viewing entity details .-20 Creating a link between two entities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..20 Dynamically displaying target moVements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 21 Target entity details Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..21 What the function looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..21 Analyst's Guide yer.1.4 23E RES.- 9 201390 -pag. lV
Managing Peerand Knowlinks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .55 Identity links .55 Managing Identity links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .55 Linktime Value . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 55 What you should know about how intelligence works .55 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 55 Intelligence process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 52 Automatic Know link creation criteria Automatic Peer link creation criteria with Target and Person entities . . . . . . . . . . . . . . . . . .. 5? Automatic Peer link creation criteria with Position entities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .58 Automatic Peer link creation criteria with Virtual entities .. 58 Automatic Identity link creation criteria with Target and Person entities . . . . . . . . . . . . . . .. 58 Intelligence operation management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59 Purpose ?59 What the function looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59 To learn more . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..50 Viewing operation entities ..50 Entity management: icon and table Views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..50 What the function looks like ..50 To learn more . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..52 Viewing entity details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52 Entity management: link View -.52 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..53 What the function looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 To learn more .55 Viewing entity details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .55 Merging two entities .55 Creating a link between two entities .55 Dynamically displaying eVidence on links between entities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 Entity management: Position View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 5? Purpose What the function looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 To learn more . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..20 Viewing entity details .-20 Creating a link between two entities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..20 Dynamically displaying target moVements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 21 Target entity details Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..21 What the function looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..21 Analyst's Guide yer.1.4 23E RES.- 9 201390 -pag. lV
Page 7 from Hacking Team RCS 9 Analyst’s Guide
To learn more . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73 Adding the target photo .73 Adding target identification data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73 Viewing frequently contacted people . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73 Viewing most frequently Visited websites .74 Connecting the Target entity with a frequently contacted person . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 7A Connecting the target to a frequently Visited website . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 74 View the last acquired position .75 Viewing frequently Visited places . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .75 Adding a Position entity Visited by the target . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .75 Target entity details -76 Most contacted people table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .76 Most Visited websites table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .76 Person entity details .. 77 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..77 What the function looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .77 To learn more .78 Adding a person's picture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78 Adding a person's identification data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 78 Adding a Position entity Visited by the entity -79 Position entity details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .79 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..79 What the function looks like .79 To learn more . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .80 Adding a picture of the site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..8D Virtual entity details ..81 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..81 What the function looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..81 To learn more ..82 Adding an image of the web address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 82 Adding web addresses to the entity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 82 Monitoring the target?s activities from the Dashboard . .83 What you should know about the Dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 8A Dashboard Corn ponents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .84 Evidence alert process .84 Monitoring eyidence {Dashboard.85 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..85 What the function looks like .85 To learn more . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 86 Adding an element to the Dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..86 Analyst's Guide yer.1.4 RES 9 2618 83' HT 8.r.l. - pag.
To learn more . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73 Adding the target photo .73 Adding target identification data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73 Viewing frequently contacted people . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73 Viewing most frequently Visited websites .74 Connecting the Target entity with a frequently contacted person . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 7A Connecting the target to a frequently Visited website . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 74 View the last acquired position .75 Viewing frequently Visited places . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .75 Adding a Position entity Visited by the target . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .75 Target entity details -76 Most contacted people table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .76 Most Visited websites table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .76 Person entity details .. 77 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..77 What the function looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .77 To learn more .78 Adding a person's picture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78 Adding a person's identification data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 78 Adding a Position entity Visited by the entity -79 Position entity details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .79 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..79 What the function looks like .79 To learn more . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .80 Adding a picture of the site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..8D Virtual entity details ..81 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..81 What the function looks like . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..81 To learn more ..82 Adding an image of the web address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 82 Adding web addresses to the entity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 82 Monitoring the target?s activities from the Dashboard . .83 What you should know about the Dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 8A Dashboard Corn ponents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .84 Evidence alert process .84 Monitoring eyidence {Dashboard.85 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..85 What the function looks like .85 To learn more . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 86 Adding an element to the Dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..86 Analyst's Guide yer.1.4 RES 9 2618 83' HT 8.r.l. - pag.
Page 8 from Hacking Team RCS 9 Analyst’s Guide
?v'ievving evidence indicated in the Dashboard 8? Alert -33 What vou should knovv about alerts ._89 What are alerts .89 Alert rules ..89 Alert rule application field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..89 Alert process .90 Alerting ..9O Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .90 What the function looks like ..91 To learn more ..92 Adding a rule to be alerted .92 Editing an alert rule .92 Adding a rule to automaticallv tag certain evidence or certain intelligence links between entities _.93 ?v?ievving events matching the logged alert ..93 Alert data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..93 Alert rule data ..93 Log data .95 Analvst'stiuide ver.1.4 23E P9013 C?l 201395] -pag. vi
?v'ievving evidence indicated in the Dashboard 8? Alert -33 What vou should knovv about alerts ._89 What are alerts .89 Alert rules ..89 Alert rule application field . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..89 Alert process .90 Alerting ..9O Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .90 What the function looks like ..91 To learn more ..92 Adding a rule to be alerted .92 Editing an alert rule .92 Adding a rule to automaticallv tag certain evidence or certain intelligence links between entities _.93 ?v?ievving events matching the logged alert ..93 Alert data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..93 Alert rule data ..93 Log data .95 Analvst'stiuide ver.1.4 23E P9013 C?l 201395] -pag. vi
Page 9 from Hacking Team RCS 9 Analyst’s Guide
lossa ry The terms and their definitions used in this manual are provided below. A Accounting Console section that manages RC8 access. acquisition sequence Group of complex events. actions and acquisition modules that make up the advanced agent con?guration. Administrator The person who enables user access to the system. creates work groups and de?nes operations. targets and the type ofdata to be collected. Agent Software probes installed on devices to monitor. They are designed to collect evidence and communicate it to the Collector. alert rules Rules that create alerts when new evidence is stored or agents communicate back for the ?rst time. Alerting Console section that manages new evidence alerts. alerting group Group ofusers who receive notifications via mail whenever a system alarm is trig- gered {for example. when the database exceeds available free space limits}. Nor- mally this group is not linked to an operation. Analyst Person in charge of analyzing the data collected during operations. Anonymizer {optional} Protects the server against external attacks and permits anonymity during investigations. Transfers agent data to Collectors. Analyst s-?Eiuitle ver.1.4 I F5333 HT - peg. vii
lossa ry The terms and their definitions used in this manual are provided below. A Accounting Console section that manages RC8 access. acquisition sequence Group of complex events. actions and acquisition modules that make up the advanced agent con?guration. Administrator The person who enables user access to the system. creates work groups and de?nes operations. targets and the type ofdata to be collected. Agent Software probes installed on devices to monitor. They are designed to collect evidence and communicate it to the Collector. alert rules Rules that create alerts when new evidence is stored or agents communicate back for the ?rst time. Alerting Console section that manages new evidence alerts. alerting group Group ofusers who receive notifications via mail whenever a system alarm is trig- gered {for example. when the database exceeds available free space limits}. Nor- mally this group is not linked to an operation. Analyst Person in charge of analyzing the data collected during operations. Anonymizer {optional} Protects the server against external attacks and permits anonymity during investigations. Transfers agent data to Collectors. Analyst s-?Eiuitle ver.1.4 I F5333 HT - peg. vii
Page 10 from Hacking Team RCS 9 Analyst’s Guide
Riff} - Glossary Audit Console section that reports all users' and system actions. Used to monitor abuse of RCS. back end Environment designed to and save collected information. In distributed archi- tecture. it includes Master Node and Shard databases. ERAS {Broadband Remote Access Server} routes traf?c toffrom DSLAM to the ISP network and provides authentication to the ISP subscribers. BSSID {Basic Service Set lDenti?er} Access Point and its client identifier. Collector Receives data sent by agents directly or through the Anonymizer chain. console Computer on which the RCS Console is installed. It directly accesses the RCS Server or Master Node. Dashboard Console section used by the Analyst. Used to have a quick overview of the status of the most important operations. targets and agents. DSLAM {Digital Subscriber Line Access Multiplexer} network device. often located in the tel- ephone exchanges of the telecommunications operators. It connects multiple cus- tomer digital subscriber line interfaces to a high-speed digital communications channel using multiplexing techniques. Guide ver.1.4 I Riff} Lit-131.
Riff} - Glossary Audit Console section that reports all users' and system actions. Used to monitor abuse of RCS. back end Environment designed to and save collected information. In distributed archi- tecture. it includes Master Node and Shard databases. ERAS {Broadband Remote Access Server} routes traf?c toffrom DSLAM to the ISP network and provides authentication to the ISP subscribers. BSSID {Basic Service Set lDenti?er} Access Point and its client identifier. Collector Receives data sent by agents directly or through the Anonymizer chain. console Computer on which the RCS Console is installed. It directly accesses the RCS Server or Master Node. Dashboard Console section used by the Analyst. Used to have a quick overview of the status of the most important operations. targets and agents. DSLAM {Digital Subscriber Line Access Multiplexer} network device. often located in the tel- ephone exchanges of the telecommunications operators. It connects multiple cus- tomer digital subscriber line interfaces to a high-speed digital communications channel using multiplexing techniques. Guide ver.1.4 I Riff} Lit-131.
Page 11 from Hacking Team RCS 9 Analyst’s Guide
C-ZI - Glossary entity Group ofintelligence information linked to the target and people and places involved in the investigation. ESSID {Extended Service Set lDenti?er} Known as SSID. identi?es the network. evidence Collected data evidence. The format depends on the type of evidence image}. evidence alerts Alerts. usually in the form of emails. sent to when new evidence matches the set rule. factory A template for agent con?guration and compiling. front end Environment designed to communicate with agents to collect information and set their con?gurations. In distributed architecture. it includes the Collector and Network Controller. injection rules Settings that define how to identify HTTP traf?c. what resource should be injected and what method is to be used for the injection. Monitor Console section that monitors components and license status. Guide SE Felt-1'5 I Eff}? Ell-13:2: - peg. ix
C-ZI - Glossary entity Group ofintelligence information linked to the target and people and places involved in the investigation. ESSID {Extended Service Set lDenti?er} Known as SSID. identi?es the network. evidence Collected data evidence. The format depends on the type of evidence image}. evidence alerts Alerts. usually in the form of emails. sent to when new evidence matches the set rule. factory A template for agent con?guration and compiling. front end Environment designed to communicate with agents to collect information and set their con?gurations. In distributed architecture. it includes the Collector and Network Controller. injection rules Settings that define how to identify HTTP traf?c. what resource should be injected and what method is to be used for the injection. Monitor Console section that monitors components and license status. Guide SE Felt-1'5 I Eff}? Ell-13:2: - peg. ix
Page 12 from Hacking Team RCS 9 Analyst’s Guide
Ruff} C-ZI - Eilossarv Network Controller Component that checks Network Injector and Anonymizer status and sends them new configurations and software updates. Network Injector Hardware component that monitors the target's network traffic and injects an agent into selected Web resources. It comes in two versions. Appliance or Tactical: the former is for deployment at the ISP. the latter for use on the field. Network Injector Appliance Rackable version of the Network Injector. for installation at ISP. See: Tactical Net- work Injector. 0 operation Investigation aimed at one or more targets. whose devices will be recipients for agents. RC3 em ote Control System I the product documented hereto. RC3 Console Software designed to interact with the RCS Server. RC3 3erver One or more computers. based on the installation architecture. were essential RCS components are installed: Shard databases. Network Controllers and Collector. 33H {Secure a network protocol for secure data communication. remote shell serv- ices or command execution. Guide ver.1.4 I Riff} Lit-131.2: HT - pa 3.
Ruff} C-ZI - Eilossarv Network Controller Component that checks Network Injector and Anonymizer status and sends them new configurations and software updates. Network Injector Hardware component that monitors the target's network traffic and injects an agent into selected Web resources. It comes in two versions. Appliance or Tactical: the former is for deployment at the ISP. the latter for use on the field. Network Injector Appliance Rackable version of the Network Injector. for installation at ISP. See: Tactical Net- work Injector. 0 operation Investigation aimed at one or more targets. whose devices will be recipients for agents. RC3 em ote Control System I the product documented hereto. RC3 Console Software designed to interact with the RCS Server. RC3 3erver One or more computers. based on the installation architecture. were essential RCS components are installed: Shard databases. Network Controllers and Collector. 33H {Secure a network protocol for secure data communication. remote shell serv- ices or command execution. Guide ver.1.4 I Riff} Lit-131.2: HT - pa 3.
Page 13 from Hacking Team RCS 9 Analyst’s Guide
Ruff} C-ZI - Glossary System Console section that manages the system. System administrator The person who installs the servers and consoles. updates software and restores data in case offaults. Tactical Network Injector The portable version ofNetwork Injector. for tactical use. See: Network Injector Appliance. TAP {Test Access Port} a hardware device installed in a network that passively monitors the transmitted data ?ow. target The physical person under investigation. Technician The person assigned by the Administrator to create and manage agents. UPS {Virtual Private Server} a remote server where the Anonymizer is installed. Com- monly available for rent. WPA {Wi Fi Protected Access} WiFi network protection. WPA 2 {Wi Fi Protected Access} WiFi network protection. Guide SE Fill-1'5 I Ruff}? - peg. Xi
Ruff} C-ZI - Glossary System Console section that manages the system. System administrator The person who installs the servers and consoles. updates software and restores data in case offaults. Tactical Network Injector The portable version ofNetwork Injector. for tactical use. See: Network Injector Appliance. TAP {Test Access Port} a hardware device installed in a network that passively monitors the transmitted data ?ow. target The physical person under investigation. Technician The person assigned by the Administrator to create and manage agents. UPS {Virtual Private Server} a remote server where the Anonymizer is installed. Com- monly available for rent. WPA {Wi Fi Protected Access} WiFi network protection. WPA 2 {Wi Fi Protected Access} WiFi network protection. Guide SE Fill-1'5 I Ruff}? - peg. Xi
Page 14 from Hacking Team RCS 9 Analyst’s Guide
Guide introduction resentatio Manual goals This manual is a guide for the Analyst on hovv to use the RC5 Console to: . monitor the target . explore target devices . analvze and export evidence Information on hovv to consult the manual is provided helovv. Content This section includes the following topics: Newguidefeatures 2 Supplied documentation 2 Print concepts for notes 3 Print conceptsforformat 3 Product and guideaddressees 4 Software authoridentification data 5 ritnalvst's Guide ver.1.4 - RES - NEED HT S.r.l. - pag. 1
Guide introduction resentatio Manual goals This manual is a guide for the Analyst on hovv to use the RC5 Console to: . monitor the target . explore target devices . analvze and export evidence Information on hovv to consult the manual is provided helovv. Content This section includes the following topics: Newguidefeatures 2 Supplied documentation 2 Print concepts for notes 3 Print conceptsforformat 3 Product and guideaddressees 4 Software authoridentification data 5 ritnalvst's Guide ver.1.4 - RES - NEED HT S.r.l. - pag. 1
Page 15 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - New guide features New guide features List of release notes and updates to this online help. Reiease Code Software Description a'ate version. 30 sep. Analvst's 9 Updated documentation in the Intelligence section, see tember Guide on page 52 . 2013 1.4 SE P- Updated the Analvst's procedures,see naiyst's procedures" 2013 on page 15 . Updated alert rule documentation, see "Aiert" on page 33. Updated documentation due to improvements to the user interface. Improved the contents. 3 JUIV Analyst's 34 No documentation update. 2013 Guide 15 March Analyst's 33 Added the Intelligence section see "intel'iigence" on page 52 . 2013 Added content export from all file type evidence formats. See 1.3 "Evidence detaiis? on page 43 A user license can be purchased to view evidence content in 2013 the interface language.$ee "Evidence anaiysis Evidence)? on page 36 and see "Evidence detaiis? on page 43 . 15 Analyst's 32 Added filter settings savings on evidence and simpli?ed the October Guide Info filter on evidence. Added delete evidence.$ee "Evidence 2012 12 OCT- anal'ysis Evidence)? on page 36 . 2012 If installed, the texts extracted from a screenshot tvpe evidence can be viewed. See "Evidence detaiis? on page 43 . 301mm Analyst's 3_1 Different folder retrieve from disk. See "Retrieve evidence 2012 Guide from devices (Fiie System)" on page 49 . 1.1 JUN 2012 16 April Analyst's 8.0 First publication 2012 Guide 1.0 AP R- 2012 Supplied documentation The following manuals are supplied with RES software: Analyst's Guide ver.1.4 RC3 9 20131:) - pag. 2
RC5 9 - New guide features New guide features List of release notes and updates to this online help. Reiease Code Software Description a'ate version. 30 sep. Analvst's 9 Updated documentation in the Intelligence section, see tember Guide on page 52 . 2013 1.4 SE P- Updated the Analvst's procedures,see naiyst's procedures" 2013 on page 15 . Updated alert rule documentation, see "Aiert" on page 33. Updated documentation due to improvements to the user interface. Improved the contents. 3 JUIV Analyst's 34 No documentation update. 2013 Guide 15 March Analyst's 33 Added the Intelligence section see "intel'iigence" on page 52 . 2013 Added content export from all file type evidence formats. See 1.3 "Evidence detaiis? on page 43 A user license can be purchased to view evidence content in 2013 the interface language.$ee "Evidence anaiysis Evidence)? on page 36 and see "Evidence detaiis? on page 43 . 15 Analyst's 32 Added filter settings savings on evidence and simpli?ed the October Guide Info filter on evidence. Added delete evidence.$ee "Evidence 2012 12 OCT- anal'ysis Evidence)? on page 36 . 2012 If installed, the texts extracted from a screenshot tvpe evidence can be viewed. See "Evidence detaiis? on page 43 . 301mm Analyst's 3_1 Different folder retrieve from disk. See "Retrieve evidence 2012 Guide from devices (Fiie System)" on page 49 . 1.1 JUN 2012 16 April Analyst's 8.0 First publication 2012 Guide 1.0 AP R- 2012 Supplied documentation The following manuals are supplied with RES software: Analyst's Guide ver.1.4 RC3 9 20131:) - pag. 2
Page 16 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - Print concepts for notes Manaai Addressees Code Distribution for- mat svstem Administrator's System System Administrator?s Guide administrator Guide 1.4 SEP-2013 Administrator's Guide Administrators Administrator?s Guide PDF 1.4 SEP-ZUIB Technician's Guide Technicians Technician?s Guide PDF 1.5 SEP-ZUIB Analvst's Guide {this Anaiyst?s Guide PD manual} 1.4 see-2013 Print concepts for notes Notes foreseen in this document are listed below (Microsoft lvlanual of Style): WARNING: indicates a riskyr situation which, if not avoided, could cause user injuryr or EL equipment damages. 1: CAUTION: indicates a risky situation which, if not avoided, can cause data to be iost. IMPORTANT: offers the indications required to complete the task. While notes can be neglected and do not influence task completion, important indications should not be neglected. NOTE: neutral and positive information that emphasize or add information to the main text. The; provide information that can onlv be applied in special cases. Tip: suggestion for the application of techniques and procedures described in the text according to special needs. It may suggest an alternative method and is not essential to text comprehension. Service caii: the operation may oniy he compieted with the heip of tEChniCGi Print concepts for format A key to print concepts is provided below: Analyst's Guide ver.1.4 RESET 20135:) - pag. 3
RC5 9 - Print concepts for notes Manaai Addressees Code Distribution for- mat svstem Administrator's System System Administrator?s Guide administrator Guide 1.4 SEP-2013 Administrator's Guide Administrators Administrator?s Guide PDF 1.4 SEP-ZUIB Technician's Guide Technicians Technician?s Guide PDF 1.5 SEP-ZUIB Analvst's Guide {this Anaiyst?s Guide PD manual} 1.4 see-2013 Print concepts for notes Notes foreseen in this document are listed below (Microsoft lvlanual of Style): WARNING: indicates a riskyr situation which, if not avoided, could cause user injuryr or EL equipment damages. 1: CAUTION: indicates a risky situation which, if not avoided, can cause data to be iost. IMPORTANT: offers the indications required to complete the task. While notes can be neglected and do not influence task completion, important indications should not be neglected. NOTE: neutral and positive information that emphasize or add information to the main text. The; provide information that can onlv be applied in special cases. Tip: suggestion for the application of techniques and procedures described in the text according to special needs. It may suggest an alternative method and is not essential to text comprehension. Service caii: the operation may oniy he compieted with the heip of tEChniCGi Print concepts for format A key to print concepts is provided below: Analyst's Guide ver.1.4 RESET 20135:) - pag. 3
Page 17 from Hacking Team RCS 9 Analyst’s Guide
RCS 9 - Product and guide addressees Description Exampie Styie See "User data? itaiic Select one of the listed servers Click Add. bold Select the File menu,Save data. Press ENTER UPPER CASE See: Network - Injector Appliance. this indicates a chapter, section, sub-section, paragraph, table or illustration heading in this manual or other publication of reference. indicates text that must be specified by the user according to a certain syntax. In the example is a date and could be "1407i2011?". indicates the object specified in the text that appears in the adjacent image. indicates text on the operator interface, a graphic element table, tab) or screen button display). indicates the name of keyboard keys. suggests you compare the definition of a word in the glossary or content with another word or content. Product and guide addressees Following is the list of professionals that interact with RCS. Addressee Activity System Follows the HackingTeam's instructions provided during the Expert administrator contract phase. Installs and updates RCS servers, Network network Injectors and RCS Consoles. Schedules and manages backups. technician Restores backups if servers are replaced. WARNING: the system administrator must have the required necessary skills. The HackingTeam is not liable for equipment malfunctions or damages due to unprofessional installation. Administrator Creates authorized accounts and groups. Creates operations and investigation target. Monitors system and license status. manager Technician Creates and sets up agents. Sets Network Injector rules Tapping speciaiist technician Analyst Analyzes and exports evidence. Operative Analyst's Guide 1ver.1.?fl RC3 9 20133) - pag. 4
RCS 9 - Product and guide addressees Description Exampie Styie See "User data? itaiic Select one of the listed servers Click Add. bold Select the File menu,Save data. Press ENTER UPPER CASE See: Network - Injector Appliance. this indicates a chapter, section, sub-section, paragraph, table or illustration heading in this manual or other publication of reference. indicates text that must be specified by the user according to a certain syntax. In the example is a date and could be "1407i2011?". indicates the object specified in the text that appears in the adjacent image. indicates text on the operator interface, a graphic element table, tab) or screen button display). indicates the name of keyboard keys. suggests you compare the definition of a word in the glossary or content with another word or content. Product and guide addressees Following is the list of professionals that interact with RCS. Addressee Activity System Follows the HackingTeam's instructions provided during the Expert administrator contract phase. Installs and updates RCS servers, Network network Injectors and RCS Consoles. Schedules and manages backups. technician Restores backups if servers are replaced. WARNING: the system administrator must have the required necessary skills. The HackingTeam is not liable for equipment malfunctions or damages due to unprofessional installation. Administrator Creates authorized accounts and groups. Creates operations and investigation target. Monitors system and license status. manager Technician Creates and sets up agents. Sets Network Injector rules Tapping speciaiist technician Analyst Analyzes and exports evidence. Operative Analyst's Guide 1ver.1.?fl RC3 9 20133) - pag. 4
Page 18 from Hacking Team RCS 9 Analyst’s Guide
RES - Software author identi?cation data Software author identification data HT via della Moscow, 13 20121 Milano Italy TEL: 39 02 29 060 603 Fax: 39 02 63 118 946 e-mail: inf0@hackingteam.c0m RES NEED HT S.r.l. - pag. 5
RES - Software author identi?cation data Software author identification data HT via della Moscow, 13 20121 Milano Italy TEL: 39 02 29 060 603 Fax: 39 02 63 118 946 e-mail: inf0@hackingteam.c0m RES NEED HT S.r.l. - pag. 5
Page 19 from Hacking Team RCS 9 Analyst’s Guide
RCS (Remote Control System) resentatio Introduction RCS {Remote Control System} is a solution that supports investigations by actively and passively tapping data and information from the devices targeted by the investigations. In fact, RCS anonymously creates, sets and installs software agents that collect data and information, sending the results to the central database to be and saved. Content This section includes the follovving topics: Differences between RCS 3.0 and RC5 15 versions Ir' litnalyst's Guide ver.1.4 - RC5 - 20131? HT S.r.l. - pag. 6
RCS (Remote Control System) resentatio Introduction RCS {Remote Control System} is a solution that supports investigations by actively and passively tapping data and information from the devices targeted by the investigations. In fact, RCS anonymously creates, sets and installs software agents that collect data and information, sending the results to the central database to be and saved. Content This section includes the follovving topics: Differences between RCS 3.0 and RC5 15 versions Ir' litnalyst's Guide ver.1.4 - RC5 - 20131? HT S.r.l. - pag. 6
Page 20 from Hacking Team RCS 9 Analyst’s Guide
RC3 C?i - [Differences between RICE- 8.CI and RICE- 1s versions Differences between RCS 8.0 and RCS 7.6 versions Differences with the RC5 16 version are described below Glossary RC5 v. 7.6 RC5 3.0 and higher Activitv Operation Agent Module Anonvr?nizer chain Backdoor Backdoor Class Collection Node Injection Proxv Appliance Log Repositorv Mobile Collection Node Anonvr?nizing chain Agent Factorv Collector Network Injector Appliance Master Node and additional Shard Collector Anonvmizer ver.1.4 RC3 NEED HT S.r.l. - pag. 7'
RC3 C?i - [Differences between RICE- 8.CI and RICE- 1s versions Differences between RCS 8.0 and RCS 7.6 versions Differences with the RC5 16 version are described below Glossary RC5 v. 7.6 RC5 3.0 and higher Activitv Operation Agent Module Anonvr?nizer chain Backdoor Backdoor Class Collection Node Injection Proxv Appliance Log Repositorv Mobile Collection Node Anonvr?nizing chain Agent Factorv Collector Network Injector Appliance Master Node and additional Shard Collector Anonvmizer ver.1.4 RC3 NEED HT S.r.l. - pag. 7'
Page 21 from Hacking Team RCS 9 Analyst’s Guide
RCS Console for the Analyst resentatio The Analyst?s role The role of the Analvst is to: . select and analvze evidence . retrieve evidence from a device . export evidence for the authorities . organize device and ether evidence in your possession to forrnulate solutions for the inves? Uga?on Analyst enabled functions To complete hisfher activities, the Analvst has access to the following functions: . Operation . Intelligence . Dashboard . Alerting Content This section includes the follovving topics: Starting the RC5 Console .. 9 Homepagedescription Shared interface elements and actions 11 Analyst?s procedures ..15 litnalvst's Guide ver.1.4 SE Pitt-13 - RES - Sit-1311:] HT - pag. 8
RCS Console for the Analyst resentatio The Analyst?s role The role of the Analvst is to: . select and analvze evidence . retrieve evidence from a device . export evidence for the authorities . organize device and ether evidence in your possession to forrnulate solutions for the inves? Uga?on Analyst enabled functions To complete hisfher activities, the Analvst has access to the following functions: . Operation . Intelligence . Dashboard . Alerting Content This section includes the follovving topics: Starting the RC5 Console .. 9 Homepagedescription Shared interface elements and actions 11 Analyst?s procedures ..15 litnalvst's Guide ver.1.4 SE Pitt-13 - RES - Sit-1311:] HT - pag. 8
Page 22 from Hacking Team RCS 9 Analyst’s Guide
RCS 9 - Starling the RC5 Console Starting the RC5 Console When started, RCS Console asks you to enter your credentials previously set by the Administrator. What the login page looks like This is what the login page looks like: an: El an Console 9J1 UH:er fit": Area Description 1 Title bar with command buttons: ii Close RCS Console. El Expand window button. El Shrink window button. 2 Login dialog window. Open RC5 Con sole To open RCS Console functions: Step Action 1 In Username and Password, enter the credentials as assigned by the Administrator. 2 In Server, enter the name of the machine or seryer address to connect to. Analyst's Guide yer.1.4 RCSQ 20136:) - pag. 9
RCS 9 - Starling the RC5 Console Starting the RC5 Console When started, RCS Console asks you to enter your credentials previously set by the Administrator. What the login page looks like This is what the login page looks like: an: El an Console 9J1 UH:er fit": Area Description 1 Title bar with command buttons: ii Close RCS Console. El Expand window button. El Shrink window button. 2 Login dialog window. Open RC5 Con sole To open RCS Console functions: Step Action 1 In Username and Password, enter the credentials as assigned by the Administrator. 2 In Server, enter the name of the machine or seryer address to connect to. Analyst's Guide yer.1.4 RCSQ 20136:) - pag. 9
Page 23 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - Homepage description Step Action 3 6 Click the homepage appears with the menus enabled according to your account privileges. See "Homepage description?beiow . Homepage description - click? To View the homepage: Introduction The homepage is displayed when the RC5 Console is started, and is the same for all users. Enabled menus depend on the privileges assigned to the account. What it looks like This is what the homepage looks like, with recently opened items saved. For details on shared elements and actions: ?lm tut-1:6: ?crtla'mcr El ?pv.1r'rr< Tolig'h?uro Tinsl'l'ntr: .- 1.. Tl leaml Globu- '1 Recentl'bems IE- a - {3 a :i"ml Iu'mrnur Ii "x .- xx . I ?lti'w- Area Description 1 Title bar with command buttons. 2 RC5 menu with functions enabled for the user. 3 Search box to search operations, targets, agents and entities, by name or description. Analyst?s Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. 10
RC5 9 - Homepage description Step Action 3 6 Click the homepage appears with the menus enabled according to your account privileges. See "Homepage description?beiow . Homepage description - click? To View the homepage: Introduction The homepage is displayed when the RC5 Console is started, and is the same for all users. Enabled menus depend on the privileges assigned to the account. What it looks like This is what the homepage looks like, with recently opened items saved. For details on shared elements and actions: ?lm tut-1:6: ?crtla'mcr El ?pv.1r'rr< Tolig'h?uro Tinsl'l'ntr: .- 1.. Tl leaml Globu- '1 Recentl'bems IE- a - {3 a :i"ml Iu'mrnur Ii "x .- xx . I ?lti'w- Area Description 1 Title bar with command buttons. 2 RC5 menu with functions enabled for the user. 3 Search box to search operations, targets, agents and entities, by name or description. Analyst?s Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. 10
Page 24 from Hacking Team RCS 9 Analyst’s Guide
RC3 9 - Shared interface elements and actions Area Description 4 Links to the last five elements opened (operation in the Operations section, operation in the Intelligence section, target, agent and entity). Wizard buttons. Logged in user with possibility of changing the language and password. Download area with ability to view progress during export or compiling. Current date and time with possibility of changing the time zone. Shared interface elements and actions Each program page uses shared elements and allows similar actions to be run. For easier manual comprehension, elements and actions shared by some functions are described in this chapter. What the RC5 Console looks like This is what a typical RC5 Console page looks like. A target page is displayed in this example: '1 1 ?an Fu 5 ?L-msm II- aim-yr?: I m..ou l' plu?w Iml-hmm . uyn-n Eli- Maxis a was a ?h-fum- .J--. - I -- - ham-Hem. bani-6r?. .Jrnol-k' I: a. tom] Analyst?s Guide 1tier.1.dfl SE P-2013 RC3 9 2013 - pag. 11
RC3 9 - Shared interface elements and actions Area Description 4 Links to the last five elements opened (operation in the Operations section, operation in the Intelligence section, target, agent and entity). Wizard buttons. Logged in user with possibility of changing the language and password. Download area with ability to view progress during export or compiling. Current date and time with possibility of changing the time zone. Shared interface elements and actions Each program page uses shared elements and allows similar actions to be run. For easier manual comprehension, elements and actions shared by some functions are described in this chapter. What the RC5 Console looks like This is what a typical RC5 Console page looks like. A target page is displayed in this example: '1 1 ?an Fu 5 ?L-msm II- aim-yr?: I m..ou l' plu?w Iml-hmm . uyn-n Eli- Maxis a was a ?h-fum- .J--. - I -- - ham-Hem. bani-6r?. .Jrnol-k' I: a. tom] Analyst?s Guide 1tier.1.dfl SE P-2013 RC3 9 2013 - pag. 11
Page 25 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - What the RC5 Console looks like Area Description 1 Title bar with command buttons: *1 Logout from RC5. Page refresh button. El Expand window button. l;l Shrink window button. 2 a Return to homepage button RCS menu with functions enabled for the user. 3 Operation scroll bar. Descriptions are provided below: icon Description Muriel} Ii It Back to higher level. Show the operation page (Operations section). Show the target page. Show the factorv page. Show the agent page. Show the operation page (Intelligence section). Show the entity page. 4 Buttons to displav all elements regardless of their group membership. Descriptions are provided below: icon Description a Show all operations. Show all targets. 5? Show all agents. Show all entities. 5 Window toolbar. Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 12
RC5 9 - What the RC5 Console looks like Area Description 1 Title bar with command buttons: *1 Logout from RC5. Page refresh button. El Expand window button. l;l Shrink window button. 2 a Return to homepage button RCS menu with functions enabled for the user. 3 Operation scroll bar. Descriptions are provided below: icon Description Muriel} Ii It Back to higher level. Show the operation page (Operations section). Show the target page. Show the factorv page. Show the agent page. Show the operation page (Intelligence section). Show the entity page. 4 Buttons to displav all elements regardless of their group membership. Descriptions are provided below: icon Description a Show all operations. Show all targets. 5? Show all agents. Show all entities. 5 Window toolbar. Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 12
Page 26 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 -Acl]'ons always available on the interface Areo Description 5 Search buttons and box: Object Description {bran?m it Search box. Enter part of the name to display a list of elements that contain the entered letters. Display elements in a table. Display elements as icons. Logged in user with possibility of changing the language and password. 3 Download area with ability to view progress during export or compiling. Files are downloaded to the desktop in RCS Download folder. . top bar: percent generation on server 1: bottom bar: percent download from server to RC5 Console. 9 Current date and time with possibility of changing the time zone. Actions always available on the interface Change interface language or password To change the interface language or password: Step Action 1 Click to display a dialog window with the user's data. 2 Change the language or password and click Save to con?rm and exit. Converting the RC5 Console date-time to the actual time zone To convert all dates-times to the actual time zone: Step Action 1 Click to display a dialog window with the current date-time: UTC time: Greenwich mean time (GMT) Local Time: date-time where the RC5 server is installed Console time: date-time of the console used and which can be converted. 2 Change the time zone and click Save to confirm and exit: all displayed dates-times are converted as requested. Analyst's Guide ver.1.4 SE P-2013 RC8 9 20136:] - pag. 13
RC5 9 -Acl]'ons always available on the interface Areo Description 5 Search buttons and box: Object Description {bran?m it Search box. Enter part of the name to display a list of elements that contain the entered letters. Display elements in a table. Display elements as icons. Logged in user with possibility of changing the language and password. 3 Download area with ability to view progress during export or compiling. Files are downloaded to the desktop in RCS Download folder. . top bar: percent generation on server 1: bottom bar: percent download from server to RC5 Console. 9 Current date and time with possibility of changing the time zone. Actions always available on the interface Change interface language or password To change the interface language or password: Step Action 1 Click to display a dialog window with the user's data. 2 Change the language or password and click Save to con?rm and exit. Converting the RC5 Console date-time to the actual time zone To convert all dates-times to the actual time zone: Step Action 1 Click to display a dialog window with the current date-time: UTC time: Greenwich mean time (GMT) Local Time: date-time where the RC5 server is installed Console time: date-time of the console used and which can be converted. 2 Change the time zone and click Save to confirm and exit: all displayed dates-times are converted as requested. Analyst's Guide ver.1.4 SE P-2013 RC8 9 20136:] - pag. 13
Page 27 from Hacking Team RCS 9 Analyst’s Guide
Table actions RC5 9 -Table actions The RC5 Console displays various data in tables. Tables let you: 0 sort data by column in increasingldecreasing order 0 filter data by column Action Description Sort by column Filter a text Filter based on an option Click on the column heading to sort that column in increasing or decreasing order. Event ?LPath ?in. Sword?sh Sword?sh EVIDENCE Enter part of the text you are searching for: only elements that contain the entered text appear. 71 Info The example shows elements with descriptions like: "myboss" "bossanoya" Select an option: the elements that match the selected option appear. El Acquired Last 24 Hours I Last Week I From iTo 2 Analyst?s Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. 14
Table actions RC5 9 -Table actions The RC5 Console displays various data in tables. Tables let you: 0 sort data by column in increasingldecreasing order 0 filter data by column Action Description Sort by column Filter a text Filter based on an option Click on the column heading to sort that column in increasing or decreasing order. Event ?LPath ?in. Sword?sh Sword?sh EVIDENCE Enter part of the text you are searching for: only elements that contain the entered text appear. 71 Info The example shows elements with descriptions like: "myboss" "bossanoya" Select an option: the elements that match the selected option appear. El Acquired Last 24 Hours I Last Week I From iTo 2 Analyst?s Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. 14
Page 28 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - Analyst?s procedures Action Description Filter based on several Select one or more options: the elements that match all selected options options appear. Elms I Untagged I Law I I II Hiah a Critioal Change the column Select the edge of the column and drag it. size Analyst's procedures Introduction The goal of the Analyst is to provide valid evidence for the investigation in progress. Evidence is: 0 directly retrieved from the device through physical access 0 received from the installed agent To do this, the Analyst can perform the following procedures: Procedures To retrieve important evidence and be alerted To select and retrieve important evidence: Step Action 1 In the File System section, during remote tapping, explore the device hard disks searching for files to be downloaded.$ee "Retrieve evidence from devices (Fiie System)" on page 49 2 In the Dashboard section, add the operation, targets and agents to be monitored to the dashboard. See "Monitoring evidence (Dashboard)? on page 85 3 In the Alerting section, set rules to be alerted when evidence of special interest arrives and to tag evidence according to relevance. See "Alert" on page 88 . Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 15
RC5 9 - Analyst?s procedures Action Description Filter based on several Select one or more options: the elements that match all selected options options appear. Elms I Untagged I Law I I II Hiah a Critioal Change the column Select the edge of the column and drag it. size Analyst's procedures Introduction The goal of the Analyst is to provide valid evidence for the investigation in progress. Evidence is: 0 directly retrieved from the device through physical access 0 received from the installed agent To do this, the Analyst can perform the following procedures: Procedures To retrieve important evidence and be alerted To select and retrieve important evidence: Step Action 1 In the File System section, during remote tapping, explore the device hard disks searching for files to be downloaded.$ee "Retrieve evidence from devices (Fiie System)" on page 49 2 In the Dashboard section, add the operation, targets and agents to be monitored to the dashboard. See "Monitoring evidence (Dashboard)? on page 85 3 In the Alerting section, set rules to be alerted when evidence of special interest arrives and to tag evidence according to relevance. See "Alert" on page 88 . Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 15
Page 29 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - Analyzing, selecting and exporting evidence Analyzing, selecting and exporting evidence To analyze, select and export evidence: Step Action 1 In the Evidence section, analyze evidence and tag them according to relevance and whether or not they are to be exported. See "Evidence analysis Evidence)" on page 36. For evidence of special interest, move on to detailed analysis. See "Evidence details" on page 43 In the Evidence section, export useful evidence. See "Evidence analysis Evidence)" on page 36. In the File System section, export the hard disk structure See "Retrieve evidence from devices (File System)" on page 49 To process information obtained on people and places involved in the investigation To process information obtained on people and places involved in the investigation: Step Action 1 In the Intelligence section, view and manage entities in an operation. See "Entity management: icon and table views" on page 60 "Entity management: link view" on page 62 "Entity management: Position view" on page Viewing or editing entity details.$ee "Target entity details" on page 3?1 "Person entity details" on page If? "Position entity details on page .79 "Virtual entity details" on page 81 See "Evidence details? on page 43 In the Alerting section, build rules to be alerted when the system automatically creates new entities and new links and to tag links according to their relevance. See "Alerting on page 90 Analyst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 16
RC5 9 - Analyzing, selecting and exporting evidence Analyzing, selecting and exporting evidence To analyze, select and export evidence: Step Action 1 In the Evidence section, analyze evidence and tag them according to relevance and whether or not they are to be exported. See "Evidence analysis Evidence)" on page 36. For evidence of special interest, move on to detailed analysis. See "Evidence details" on page 43 In the Evidence section, export useful evidence. See "Evidence analysis Evidence)" on page 36. In the File System section, export the hard disk structure See "Retrieve evidence from devices (File System)" on page 49 To process information obtained on people and places involved in the investigation To process information obtained on people and places involved in the investigation: Step Action 1 In the Intelligence section, view and manage entities in an operation. See "Entity management: icon and table views" on page 60 "Entity management: link view" on page 62 "Entity management: Position view" on page Viewing or editing entity details.$ee "Target entity details" on page 3?1 "Person entity details" on page If? "Position entity details on page .79 "Virtual entity details" on page 81 See "Evidence details? on page 43 In the Alerting section, build rules to be alerted when the system automatically creates new entities and new links and to tag links according to their relevance. See "Alerting on page 90 Analyst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 16
Page 30 from Hacking Team RCS 9 Analyst’s Guide
RICE- - Operation and target Operation and target Presentation Introduction Managing operations sets the targets to be tapped. Content This section includes the following topics: What you should know about operations ..13 What you should knowabouttargets Operation management Operation data .20 Operation page 20 Operation pagedata 22 analyst's Guide uer.1.4 SE Pit-13 RES Jill-131:1 -pag. 17'
RICE- - Operation and target Operation and target Presentation Introduction Managing operations sets the targets to be tapped. Content This section includes the following topics: What you should know about operations ..13 What you should knowabouttargets Operation management Operation data .20 Operation page 20 Operation pagedata 22 analyst's Guide uer.1.4 SE Pit-13 RES Jill-131:1 -pag. 17'
Page 31 from Hacking Team RCS 9 Analyst’s Guide
RC3 9 - Whatvou would know about operations What you should know about operations What is an operation An operation is an investigation to be conducted. An operation contains one or more targets meaning the physical individuals to be tapped. The Technician assigns one or more agents, desktop or mobile, to the target. Thus the agent can be installed on a computer or mobile phone. What you should know about targets What is a target A target is the physical person to be investigated. The Technician assigns one or more agents, desktop or mobile, to the target. Thus the agent can be installed on a computer or mobile phone. Operation management To onoge - Dpe rations scction operations: Purpose This function lets you: it add the operation to the elements to be monitored NOTE: the function is onlv enabled if the user has Operation management authorization. What the function looks like This is what the page looks like: Analvst?s Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 18
RC3 9 - Whatvou would know about operations What you should know about operations What is an operation An operation is an investigation to be conducted. An operation contains one or more targets meaning the physical individuals to be tapped. The Technician assigns one or more agents, desktop or mobile, to the target. Thus the agent can be installed on a computer or mobile phone. What you should know about targets What is a target A target is the physical person to be investigated. The Technician assigns one or more agents, desktop or mobile, to the target. Thus the agent can be installed on a computer or mobile phone. Operation management To onoge - Dpe rations scction operations: Purpose This function lets you: it add the operation to the elements to be monitored NOTE: the function is onlv enabled if the user has Operation management authorization. What the function looks like This is what the page looks like: Analvst?s Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 18
Page 32 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 -To learn more .1 <r-wv 1 Elna-mum l?nlx'cc 2:1":m doc-In 5 l?l Humbug Irw'n I1r nah Alw- a Ilm Inc-ll" I'm. In". - aw J5 urn-In: 2-: I.- I Area Description 1 RC5 menu. 2 Scroll bar. 3 Window toolbar. Descriptions are provided below: icon Description Add the operation to the dashboard. 4 List of created operations: Open operation. If targets were set and agents correctlv installed, collected evidence is received. Fr a Closed operation. All targets are closed and agents uninstalled. All its targets and evidence can still be viewed. 5 Selected operation data. 5 RC5 status bar. To learn more For interface element descriptions See "Shared interface elements and actions" on page 11 . For a description of the data in this window see "Operation data? on the facing page . For more information on operations see "What you should know about operations? on previous page. Analvst?s Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 19
RC5 9 -To learn more .1 <r-wv 1 Elna-mum l?nlx'cc 2:1":m doc-In 5 l?l Humbug Irw'n I1r nah Alw- a Ilm Inc-ll" I'm. In". - aw J5 urn-In: 2-: I.- I Area Description 1 RC5 menu. 2 Scroll bar. 3 Window toolbar. Descriptions are provided below: icon Description Add the operation to the dashboard. 4 List of created operations: Open operation. If targets were set and agents correctlv installed, collected evidence is received. Fr a Closed operation. All targets are closed and agents uninstalled. All its targets and evidence can still be viewed. 5 Selected operation data. 5 RC5 status bar. To learn more For interface element descriptions See "Shared interface elements and actions" on page 11 . For a description of the data in this window see "Operation data? on the facing page . For more information on operations see "What you should know about operations? on previous page. Analvst?s Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 19
Page 33 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - 1 ul'iewing operation targets 1'll'iewing operation targets To view operation targets: Step Action 1 Double-click an operation: the target management page opens. See "Operation page" below Operation data Selected operation data is described below: Data Description Name Operation name. Description User's description Contact Descriptive field used to define, for example, the name of a contact person (Judge, Attorney, etc.). status Operation status and close command: OPEN: the operation is open. If targets were set and agents correctly installed, the RC5 receives the collected evidence. CLOSED: the operation is closed and can not be re-openecl. Agents no longer send data but evidence already received can still be viewed. Groups Groups that can see the operation. Operation page To view on operation: a Operation section, double-click an operation Purpose This function lets you: . acid the target to the elements to be monitored Analyst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 20
RC5 9 - 1 ul'iewing operation targets 1'll'iewing operation targets To view operation targets: Step Action 1 Double-click an operation: the target management page opens. See "Operation page" below Operation data Selected operation data is described below: Data Description Name Operation name. Description User's description Contact Descriptive field used to define, for example, the name of a contact person (Judge, Attorney, etc.). status Operation status and close command: OPEN: the operation is open. If targets were set and agents correctly installed, the RC5 receives the collected evidence. CLOSED: the operation is closed and can not be re-openecl. Agents no longer send data but evidence already received can still be viewed. Groups Groups that can see the operation. Operation page To view on operation: a Operation section, double-click an operation Purpose This function lets you: . acid the target to the elements to be monitored Analyst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 20
Page 34 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - What the function looks like the function looks like This is what the page looks like: I SHED Awuru-g ftp-outlaw: 'u-l?wr. uw? .2 Ar a :IamJu 31:: ID I ?3 .I meme: ".1111: Dunc Cot: Var. Psi-3:31:01: mun-J: EXAM. a . I. 4?13? ram-m1 Jul-Ir tru'lw?x inn. mud Area Description 1 RC5 menu. 2 Scroll bar. 3 Window toolbar. Descriptions are provided below: Icon Function Add the target to the dashboard. Open the target entity page in intel- ligence. 4 Target list: 9 Open target {a Closed target 5 Selected target data. 5 RC5 status bar. To learn more For interface element descriptions See "Shared interface elements and actions" on page 11 . Guide SE P-2013 RC8 9 2013 - pag. 21
RC5 9 - What the function looks like the function looks like This is what the page looks like: I SHED Awuru-g ftp-outlaw: 'u-l?wr. uw? .2 Ar a :IamJu 31:: ID I ?3 .I meme: ".1111: Dunc Cot: Var. Psi-3:31:01: mun-J: EXAM. a . I. 4?13? ram-m1 Jul-Ir tru'lw?x inn. mud Area Description 1 RC5 menu. 2 Scroll bar. 3 Window toolbar. Descriptions are provided below: Icon Function Add the target to the dashboard. Open the target entity page in intel- ligence. 4 Target list: 9 Open target {a Closed target 5 Selected target data. 5 RC5 status bar. To learn more For interface element descriptions See "Shared interface elements and actions" on page 11 . Guide SE P-2013 RC8 9 2013 - pag. 21
Page 35 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - Dpera?on page data For more information on operations see "What you should know about operations" on page 18. For a description of the data in this window see "Operation page data? beiow . Operation page data Selected target data is described below: Data Description Name Target name. Description User's description status Defines the target's status: 6 Open. If the Technician correctly installs agents, RCS receives the collected evidence. Closed, it can no longer be opened. Analyst?s Guide 1uer.1.4 SE P-2013 RC8 9 2013 - pag. 22
RC5 9 - Dpera?on page data For more information on operations see "What you should know about operations" on page 18. For a description of the data in this window see "Operation page data? beiow . Operation page data Selected target data is described below: Data Description Name Target name. Description User's description status Defines the target's status: 6 Open. If the Technician correctly installs agents, RCS receives the collected evidence. Closed, it can no longer be opened. Analyst?s Guide 1uer.1.4 SE P-2013 RC8 9 2013 - pag. 22
Page 36 from Hacking Team RCS 9 Analyst’s Guide
Targets resentatio Introduction A target is a physical person to be monitored. Several agents can be used, one for each device owned by the target. Content This section includes the following topics: Targetpage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ?24 Target page data _.2Ei - RICE. C?i - 201393 HTS-.LI. - pag. 23
Targets resentatio Introduction A target is a physical person to be monitored. Several agents can be used, one for each device owned by the target. Content This section includes the following topics: Targetpage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ?24 Target page data _.2Ei - RICE. C?i - 201393 HTS-.LI. - pag. 23
Page 37 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - Target page Target page To open a target a Operations section, double-click an operation, double-click a target Purpose This function lets you: . export target evidence . open an installed agent 1. open agent evidence . explore the agent device What the function looks like This is what the page looks like: ?perullnni lls-hh''5d be: 3:12-6:50: 311' THEIRKris JHL: nulls aw :hl Ilm- Iwnr' [\Ilu mm 2-1in 34.11? JI-rr-r. .-I II Slur-ll" sq Lad: .- UM Liam a. 4mm! Jo?kp? Area Description 1 RES menu. 2 Scrollbar. Analvst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 24
RC5 9 - Target page Target page To open a target a Operations section, double-click an operation, double-click a target Purpose This function lets you: . export target evidence . open an installed agent 1. open agent evidence . explore the agent device What the function looks like This is what the page looks like: ?perullnni lls-hh''5d be: 3:12-6:50: 311' THEIRKris JHL: nulls aw :hl Ilm- Iwnr' [\Ilu mm 2-1in 34.11? JI-rr-r. .-I II Slur-ll" sq Lad: .- UM Liam a. 4mm! Jo?kp? Area Description 1 RES menu. 2 Scrollbar. Analvst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 24
Page 38 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 -To learn more Area Description 3 Window toolbar. Descriptions are provided below: 0 mm. their data. key displays elements in a list with icon Fanc tion Adding the agent to the dashboard. A Adding the agent to alerts: an alert is generated at each E. Export target evidence in .tgz format. i} . NOTE: the function is only enabled if the user has Evidence export authorization. Eel Open the target entity page in intelligence. 4 Iconsflist of created factories and installed agents. El agent in demo mode. scout agent awaiting verification. 5 Selected factory or agent data. 5 RC5 status bar. To learn more For interface element descriptions See "Shared interface elements and actions? on page 11 . For a description of the data in this window see "Target page data? on next page . Exporting target evidence To export evidence: Step Action 1 Click Export Evidence: the export window opens. Analyst?s Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 25
RC5 9 -To learn more Area Description 3 Window toolbar. Descriptions are provided below: 0 mm. their data. key displays elements in a list with icon Fanc tion Adding the agent to the dashboard. A Adding the agent to alerts: an alert is generated at each E. Export target evidence in .tgz format. i} . NOTE: the function is only enabled if the user has Evidence export authorization. Eel Open the target entity page in intelligence. 4 Iconsflist of created factories and installed agents. El agent in demo mode. scout agent awaiting verification. 5 Selected factory or agent data. 5 RC5 status bar. To learn more For interface element descriptions See "Shared interface elements and actions? on page 11 . For a description of the data in this window see "Target page data? on next page . Exporting target evidence To export evidence: Step Action 1 Click Export Evidence: the export window opens. Analyst?s Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 25
Page 39 from Hacking Team RCS 9 Analyst’s Guide
RC5 E3 - Target page data Step Action 2 Click Ok: evidence is saved in the specified folder. Target page data To view page data: . Operations section, double-click an operation, double-click a target, click Icon view or Table view Page elements can be viewed as icons or a table. Icon view Icons are described below: Doro Description Desktop agent types, in Open status, for operating systems: 0 OS IE 0 Windows a Mobile agent types, in Open status, for operating systems: Android, - a: BlackBerry, 0 bian 0 Windows Mobile NOTE: icons are light grey for CLOSED agents. This is the icon for a mobile agent for Android in Closed status: . NOTE: the scout agent displays a compass next to the device icon. This icon is a Windows desktop scout agent . Table view Data is described below: Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 26
RC5 E3 - Target page data Step Action 2 Click Ok: evidence is saved in the specified folder. Target page data To view page data: . Operations section, double-click an operation, double-click a target, click Icon view or Table view Page elements can be viewed as icons or a table. Icon view Icons are described below: Doro Description Desktop agent types, in Open status, for operating systems: 0 OS IE 0 Windows a Mobile agent types, in Open status, for operating systems: Android, - a: BlackBerry, 0 bian 0 Windows Mobile NOTE: icons are light grey for CLOSED agents. This is the icon for a mobile agent for Android in Closed status: . NOTE: the scout agent displays a compass next to the device icon. This icon is a Windows desktop scout agent . Table view Data is described below: Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 26
Page 40 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 -Tah e view Data Description Name Factorv or agent name. Description Factorv or agent description Status Open: the agent is still active on the device and can continue to send data. Closed: the agent is no longer active. NOTE: a closed agent cannot be reopened. Data in RES can still be viewed. Tvpe Desktop or mobile tvpe. Platform (agent onlv) Operating svstem on which the agent is installed. Version (agent onlv) Agent version. A new version is created when a new configuration is created. Last (agent onlv) Date and time of the last agent ldent (agent onlv) Univocal agent identification. Instance (agent onlv) Univocal identification of the device where the agent is installed. Analvst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 27
RC5 9 -Tah e view Data Description Name Factorv or agent name. Description Factorv or agent description Status Open: the agent is still active on the device and can continue to send data. Closed: the agent is no longer active. NOTE: a closed agent cannot be reopened. Data in RES can still be viewed. Tvpe Desktop or mobile tvpe. Platform (agent onlv) Operating svstem on which the agent is installed. Version (agent onlv) Agent version. A new version is created when a new configuration is created. Last (agent onlv) Date and time of the last agent ldent (agent onlv) Univocal agent identification. Instance (agent onlv) Univocal identification of the device where the agent is installed. Analvst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 27
Page 41 from Hacking Team RCS 9 Analyst’s Guide
Agents resentatio Introduction Agents acquire data from the device on which they are installed and send it to the RC5 Collectors. Their configuration and software can be updated and they can transfer files unnoticed to the target. Content This section includes the following topics: Agent page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Agent event log data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30 Command page -31 Agent log data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32 ?tnelyst'stiiuide uer.1.4 - RC3 - - peg. 28
Agents resentatio Introduction Agents acquire data from the device on which they are installed and send it to the RC5 Collectors. Their configuration and software can be updated and they can transfer files unnoticed to the target. Content This section includes the following topics: Agent page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Agent event log data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30 Command page -31 Agent log data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32 ?tnelyst'stiiuide uer.1.4 - RC3 - - peg. 28
Page 42 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - Agent page Agent page To manage a Operations section, double-click an operation, double-clicka target, double-click an agent agents: Purpose This function lets you: .. check agent activities via the event log. .. vievv evidence collected luv the agent .. explore the file svstem and transfer files from the device where the agent is installed 1ll?lihat the function looks like This is what the page looks like: I1 a. .a GEE IZIp-rlliun: ml I- as-m-Ju I- II- 5 ?cu-.15 HE E. a: a .. sz'lls- 4-1, ,0 u' 1 e. I lam .u?I m" w- n- .. -.-.--.-. 1m:- LU km 311m .nngn: m- hum. Duo.- hut-in- . .. Area Description 1 RES menu. 2 Scrollbar. Analvst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 29
RC5 9 - Agent page Agent page To manage a Operations section, double-click an operation, double-clicka target, double-click an agent agents: Purpose This function lets you: .. check agent activities via the event log. .. vievv evidence collected luv the agent .. explore the file svstem and transfer files from the device where the agent is installed 1ll?lihat the function looks like This is what the page looks like: I1 a. .a GEE IZIp-rlliun: ml I- as-m-Ju I- II- 5 ?cu-.15 HE E. a: a .. sz'lls- 4-1, ,0 u' 1 e. I lam .u?I m" w- n- .. -.-.--.-. 1m:- LU km 311m .nngn: m- hum. Duo.- hut-in- . .. Area Description 1 RES menu. 2 Scrollbar. Analvst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 29
Page 43 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 -To learn more Area Description 3 Window toolbar. icon Description Export agent evidence. up .. .. NOTE: the function is only enabled if the user has Evidence export authorization. Addin the a ent to the dashboard. a 3 Adding the agent to alerts: an alert is generated at each 4 Possible actions on the agent. Descriptions are provided below: icon Description Show the list of evidence collected by the agent. See "Evidence analysis Evidence)" on page 36. Show the device file system. See "Retrieve evidence from devices (Fiie System)? on page 49 . Show the agent event log (info). See "Agent event log data?beiaw Show the results of comm ands run on the device using Execute actions. See "Command page? on next page . Show the agent log. See "Agent log data" on page 32 . 610*?be 5 Agent details. 5 RC5 status bar. To learn more For interface element descriptions See "Shared interface eiements and actions" on page 11 . Agent event log data Descriptions are provided below: Analyst?s Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 30
RC5 9 -To learn more Area Description 3 Window toolbar. icon Description Export agent evidence. up .. .. NOTE: the function is only enabled if the user has Evidence export authorization. Addin the a ent to the dashboard. a 3 Adding the agent to alerts: an alert is generated at each 4 Possible actions on the agent. Descriptions are provided below: icon Description Show the list of evidence collected by the agent. See "Evidence analysis Evidence)" on page 36. Show the device file system. See "Retrieve evidence from devices (Fiie System)? on page 49 . Show the agent event log (info). See "Agent event log data?beiaw Show the results of comm ands run on the device using Execute actions. See "Command page? on next page . Show the agent log. See "Agent log data" on page 32 . 610*?be 5 Agent details. 5 RC5 status bar. To learn more For interface element descriptions See "Shared interface eiements and actions" on page 11 . Agent event log data Descriptions are provided below: Analyst?s Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 30
Page 44 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - Command page Fieid' Description Acquired Date-time of the event acquired on the device. It can be filtered. Last 24 hours is set lav default. Received Date-time of the event logged in RC5. It can be filtered. Last 24 hours is set lav default. content Status information sent by the agent. Command page To manage - Operations section, double-click an operation, double-clicka target, double-click an agent, commondresuits: double-click Commands Purpose This function lets you: 0 check the results of commands run with the Execute action set on the agent 0 check executable file results run during file transfer toifrom the agent What the function looks like This is what the page looks like: II UL qurltlons 11 t-z-rc .-J: 5-5::11 I 1 I Alqul'lh'i I- ?mmnl I- G-nm-um smegma-0c: um: I- oouunu.-I- . -. .u .ull'dw rum: mm 7mm om Dunk Ila-Al. 1.- - m?s-?m?crrn?. .-I-.- pawns-1 um IMJL Analvst?s Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 31
RC5 9 - Command page Fieid' Description Acquired Date-time of the event acquired on the device. It can be filtered. Last 24 hours is set lav default. Received Date-time of the event logged in RC5. It can be filtered. Last 24 hours is set lav default. content Status information sent by the agent. Command page To manage - Operations section, double-click an operation, double-clicka target, double-click an agent, commondresuits: double-click Commands Purpose This function lets you: 0 check the results of commands run with the Execute action set on the agent 0 check executable file results run during file transfer toifrom the agent What the function looks like This is what the page looks like: II UL qurltlons 11 t-z-rc .-J: 5-5::11 I 1 I Alqul'lh'i I- ?mmnl I- G-nm-um smegma-0c: um: I- oouunu.-I- . -. .u .ull'dw rum: mm 7mm om Dunk Ila-Al. 1.- - m?s-?m?crrn?. .-I-.- pawns-1 um IMJL Analvst?s Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 31
Page 45 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 -To learn more Areo Description 1 RC5 menu. 2 Scrollbar. 3 Window toolbar. Descriptions are provided below: icon Description Export the selected command to a .txt ?le. Delete the selected commands. NOTE: the function requires a user license and is only enabled if the user has Evidence deletion authorization. Show selected command details. 5 Command list based on set ?lters. 5 RC5 status bar. To learn more For interface element descriptions See "Shared interface elements and actions" on page 11 . Agent log data Descriptions are provided below: Fieid Description Acquired date-time. It can be filtered. Last 24 hours is set by default. IP IP address used for Address Site vvhere connection was established. Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 32
RC5 9 -To learn more Areo Description 1 RC5 menu. 2 Scrollbar. 3 Window toolbar. Descriptions are provided below: icon Description Export the selected command to a .txt ?le. Delete the selected commands. NOTE: the function requires a user license and is only enabled if the user has Evidence deletion authorization. Show selected command details. 5 Command list based on set ?lters. 5 RC5 status bar. To learn more For interface element descriptions See "Shared interface elements and actions" on page 11 . Agent log data Descriptions are provided below: Fieid Description Acquired date-time. It can be filtered. Last 24 hours is set by default. IP IP address used for Address Site vvhere connection was established. Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 32
Page 46 from Hacking Team RCS 9 Analyst’s Guide
Evidence analysis Presentation Introduction Evidence analvsis on the list or detailed level, select evidence to be exported to the authorities. Content This section includes the following topics: What you should know about evidence .34 Evidenceanalvsis{Evidence} Evidencedata Evidence details .43 Evidenceexport data List oftvpes ofevidence ver.1.4 - RES 9 - 2CI13EI HT 3.r.l. - pag. 33
Evidence analysis Presentation Introduction Evidence analvsis on the list or detailed level, select evidence to be exported to the authorities. Content This section includes the following topics: What you should know about evidence .34 Evidenceanalvsis{Evidence} Evidencedata Evidence details .43 Evidenceexport data List oftvpes ofevidence ver.1.4 - RES 9 - 2CI13EI HT 3.r.l. - pag. 33
Page 47 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - Whatyou should know about evidence What you should know about evidence Analysis process The analysis process is described below: Phase Description 1 As the system collects evidence from the agent, it displays and updates the total counter. 2 The Analyst views all evidence and tags it for easy table consultation and subsequent export. 3 The Analyst analyzes incoming evidence details. 4 At the end of the investigation or upon request, the Analyst exports evidence to a file that can be viewed in a browser. Evidence accumulated in the device. Evidence is sent by the agent to the Collector in order of creation. If a device rarely or has a limited bandwidth, evidence probably accumulates on the device and it will take a long time before the most recent data is received. The same may happen if large-sized evidence is in queue: the most recent evidence can only be sent after having sent this evidence. For this reason, we suggest you delete older evidence andfor evidence that exceeds a certain size. Evidence is deleted at the next See gent page? on page 29 . Filtering evidence Column heading filters can be used to limit the amount of evidence viewed. See "Shared interface elements and actions" on page 11 IMPORTANT: if no evidence is displayed, check the counter at the bottom right. If a value like is displayed, this means that there is a ?lter set that prevents evidence from being displayed. The selected filters can be saved with a short description to be used later. IMPORTANT: if private ?lters are set, they cannot be used by other users. Analyst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 34
RC5 9 - Whatyou should know about evidence What you should know about evidence Analysis process The analysis process is described below: Phase Description 1 As the system collects evidence from the agent, it displays and updates the total counter. 2 The Analyst views all evidence and tags it for easy table consultation and subsequent export. 3 The Analyst analyzes incoming evidence details. 4 At the end of the investigation or upon request, the Analyst exports evidence to a file that can be viewed in a browser. Evidence accumulated in the device. Evidence is sent by the agent to the Collector in order of creation. If a device rarely or has a limited bandwidth, evidence probably accumulates on the device and it will take a long time before the most recent data is received. The same may happen if large-sized evidence is in queue: the most recent evidence can only be sent after having sent this evidence. For this reason, we suggest you delete older evidence andfor evidence that exceeds a certain size. Evidence is deleted at the next See gent page? on page 29 . Filtering evidence Column heading filters can be used to limit the amount of evidence viewed. See "Shared interface elements and actions" on page 11 IMPORTANT: if no evidence is displayed, check the counter at the bottom right. If a value like is displayed, this means that there is a ?lter set that prevents evidence from being displayed. The selected filters can be saved with a short description to be used later. IMPORTANT: if private ?lters are set, they cannot be used by other users. Analyst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 34
Page 48 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - Translating evidence Translating evidence The RCS Translate module is available upon special license to translate evidence. In fact, it communicates with a third party translation software that returns text translated into the interface language. RCS Translate translates the following types of evidence: It clipboard . chat . file i kevlog . message a: screenshot The translation is displayed in the page with the evidence list and the single piece of evidence detail page. Delete evidence This function deletes one or more pieces of evidence no longer deemed useful. This function depends on the type of license installed. Filters can be used to select the evidence to be deleted (similar to selecting evidence to be exported). IMPORTANT: the ?lter onlyr appears when the Delete and ALT keys are pressed simultaneouslv. .tgz file description with exported evidence The exported .tgz file is a compressed ?le that can be opened with most compression programs WinZip, WinRar). Once unzipped, it looks like a folder with an HTML file. To view the ?le: Step Action 1 Open index.html with a browser: the homepage displays the list of days with collected evidence statistics per hour. 2 Click on a day: the list of evidence appears, similar to the one displayed in the Evidence function. 3 The following actions can be performed from this list: in on images: click to view the full image It on audio: click to run the mini pl aver on downloadable files: click ll to download the file Analvst's Guide ver.1.4 SE P-2013 RC8 9 20136:] - pag. 35
RC5 9 - Translating evidence Translating evidence The RCS Translate module is available upon special license to translate evidence. In fact, it communicates with a third party translation software that returns text translated into the interface language. RCS Translate translates the following types of evidence: It clipboard . chat . file i kevlog . message a: screenshot The translation is displayed in the page with the evidence list and the single piece of evidence detail page. Delete evidence This function deletes one or more pieces of evidence no longer deemed useful. This function depends on the type of license installed. Filters can be used to select the evidence to be deleted (similar to selecting evidence to be exported). IMPORTANT: the ?lter onlyr appears when the Delete and ALT keys are pressed simultaneouslv. .tgz file description with exported evidence The exported .tgz file is a compressed ?le that can be opened with most compression programs WinZip, WinRar). Once unzipped, it looks like a folder with an HTML file. To view the ?le: Step Action 1 Open index.html with a browser: the homepage displays the list of days with collected evidence statistics per hour. 2 Click on a day: the list of evidence appears, similar to the one displayed in the Evidence function. 3 The following actions can be performed from this list: in on images: click to view the full image It on audio: click to run the mini pl aver on downloadable files: click ll to download the file Analvst's Guide ver.1.4 SE P-2013 RC8 9 20136:] - pag. 35
Page 49 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - Evidence analysisiEyidence] Tip: there are style sheets in the Style folder for customizations logos, etc.). These style sheets can be copied to the server to be used on all reports generated by the RC5 Console. Evidence analysis (Evidence) To aneiyze a Operations section, double-click an operation, double-clicka target, click Euiclence evidence: It Operations section, double-click an operation, double-clicka target, double-click an agent, click Evidence Purpose This function lets you: .- prepare evidence for analysis, tag it by level of relevance, send it to a report or add per- sonal notes 1: view evidence of interest lay filtering the list a translate eyidence content into the interface language (optional) 1: superficially analyze evidence from the list or entering in detail for more thorough anal- ysis . export eyidence What the function looks like This is what the page looks like: GED .. .u . A UpeMtI-z-ns mix a but .1211 n} o: DJuIrl'u: I you": 5 1} rI-E-ae..oloavaa Hume: 1- IITKW rwl: I'm-alw- Hort-I1 lur'rl- llra'levI Inn-ulna cw. In:- low rm? emu-n-uaamun stls- 14:: -l2I!- 34:: HHMM i amt:- . rams-u.- ram-A11- JifI'n-f? l'mun 4; IL w. - pm: mm: .u-mr, . . .-.- i-u?ll . rm 41:1? . .. . .. .. .udrln: .. Paul-u ?El?nru? .Hnlb??m I, uln.? 421,Manm .. II..U.JJ MIDI 1-- 1 mule-urn Ld-uu-u Analyst?s Guide 1..rer.1.-4l SE P-2013 RC3 9 2013 - pag. 36
RC5 9 - Evidence analysisiEyidence] Tip: there are style sheets in the Style folder for customizations logos, etc.). These style sheets can be copied to the server to be used on all reports generated by the RC5 Console. Evidence analysis (Evidence) To aneiyze a Operations section, double-click an operation, double-clicka target, click Euiclence evidence: It Operations section, double-click an operation, double-clicka target, double-click an agent, click Evidence Purpose This function lets you: .- prepare evidence for analysis, tag it by level of relevance, send it to a report or add per- sonal notes 1: view evidence of interest lay filtering the list a translate eyidence content into the interface language (optional) 1: superficially analyze evidence from the list or entering in detail for more thorough anal- ysis . export eyidence What the function looks like This is what the page looks like: GED .. .u . A UpeMtI-z-ns mix a but .1211 n} o: DJuIrl'u: I you": 5 1} rI-E-ae..oloavaa Hume: 1- IITKW rwl: I'm-alw- Hort-I1 lur'rl- llra'levI Inn-ulna cw. In:- low rm? emu-n-uaamun stls- 14:: -l2I!- 34:: HHMM i amt:- . rams-u.- ram-A11- JifI'n-f? l'mun 4; IL w. - pm: mm: .u-mr, . . .-.- i-u?ll . rm 41:1? . .. . .. .. .udrln: .. Paul-u ?El?nru? .Hnlb??m I, uln.? 421,Manm .. II..U.JJ MIDI 1-- 1 mule-urn Ld-uu-u Analyst?s Guide 1..rer.1.-4l SE P-2013 RC3 9 2013 - pag. 36
Page 50 from Hacking Team RCS 9 Analyst’s Guide
RC8 9 - What the function looks like A reo Description 1 RC5 menu. 2 Scroll bar. analyst's Guide HELL-4 SE P-ECI13 RCSQ 20139:) -pag. 3?
RC8 9 - What the function looks like A reo Description 1 RC5 menu. 2 Scroll bar. analyst's Guide HELL-4 SE P-ECI13 RCSQ 20139:) -pag. 3?
Page 51 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - What the function looks like Area Description 3 Window toolbar. Descriptions are provided below: Icon Description El Show selected evidence details. See "Evidence details" on page 43 Show the total quantities by evidence TYPE- Export selected evidence to a .tgz ?le. Delete selected evidence. NOTE: the function is only enabled if the user has Evidence export authorization. Tip: to delete a set of evidence according to certain criteria data range) sim ultaneouslv press ALT and this button: a window appears where you can set evidence deletion criteria. For field descriptionssee "Evidence export data? on page 46 fields are similar. NOTE: the function requires a user license and is only enabled if the user has Evidence deletion authorization. Apva a level of relevance to the selected evidence. Apva a bookmark to the selected evidence. Edit selected evidence notes. Show evidence ID codes. Saves currently selected filters or loads previouslv saved filter settings. Clear all set filters. View content in the interface language. NOTE: this function requires a user license. Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 38
RC5 9 - What the function looks like Area Description 3 Window toolbar. Descriptions are provided below: Icon Description El Show selected evidence details. See "Evidence details" on page 43 Show the total quantities by evidence TYPE- Export selected evidence to a .tgz ?le. Delete selected evidence. NOTE: the function is only enabled if the user has Evidence export authorization. Tip: to delete a set of evidence according to certain criteria data range) sim ultaneouslv press ALT and this button: a window appears where you can set evidence deletion criteria. For field descriptionssee "Evidence export data? on page 46 fields are similar. NOTE: the function requires a user license and is only enabled if the user has Evidence deletion authorization. Apva a level of relevance to the selected evidence. Apva a bookmark to the selected evidence. Edit selected evidence notes. Show evidence ID codes. Saves currently selected filters or loads previouslv saved filter settings. Clear all set filters. View content in the interface language. NOTE: this function requires a user license. Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 38
Page 52 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - To learn more Area Description 4 Evidence list based on set ?lters. 5 RES status bar. To learn more For interface element descriptions See "Shared interface elements and actions" on page 11 . For a description of the data in this window see "Evidence data" on page 41 For a description of exportable datasee "Evidence export data" on page 46. For more information on evidencesee "What you should know about evidence? on page 34 To view a list of evidence tvpessee "List of types of evidence" on page 46 Preparing evidence for analysis and export, tagging by relevance To assign levels of relevance to evidence, helpful for display and export: Step Action 1 Select one or more pieces of evidence. 2 . Drag Relevance to the required position or . Press the corresponding kev combination. 3 Result: the single pieces of evidence are tagged with a symbol according to their level of relevance. Evidence can be filtered by this symbol and includedfexcluded from export. Preparing evidence for analysis and export, tagging for the report To includefexclude evidence in a report and filter for viewing: Step Action 1 Select one or more pieces of evidence. Analvsl?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 39
RC5 9 - To learn more Area Description 4 Evidence list based on set ?lters. 5 RES status bar. To learn more For interface element descriptions See "Shared interface elements and actions" on page 11 . For a description of the data in this window see "Evidence data" on page 41 For a description of exportable datasee "Evidence export data" on page 46. For more information on evidencesee "What you should know about evidence? on page 34 To view a list of evidence tvpessee "List of types of evidence" on page 46 Preparing evidence for analysis and export, tagging by relevance To assign levels of relevance to evidence, helpful for display and export: Step Action 1 Select one or more pieces of evidence. 2 . Drag Relevance to the required position or . Press the corresponding kev combination. 3 Result: the single pieces of evidence are tagged with a symbol according to their level of relevance. Evidence can be filtered by this symbol and includedfexcluded from export. Preparing evidence for analysis and export, tagging for the report To includefexclude evidence in a report and filter for viewing: Step Action 1 Select one or more pieces of evidence. Analvsl?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 39
Page 53 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - Preparing evidence for analysis and export adding personal notes Step Action 2 1. Click Add Report or . press 3 Result: single pieces of evidence are bookmarked. Evidence can be filtered lav this bol and includedfexcluded from export. Preparing evidence for analysis and export adding personal notes To add personal notes to one or more pieces of evidence: Step Ac tr'on 1 Select one or more pieces of evidence. 2 . Click Edit Note or . press 3 Result: the Notes ?eld can be edited. If several pieces of evidence are selected, the entered text will be copied to all other Note fields. Analvzing evidence To quicklv or thorougth analvze evidence: Step Action 1 Analvze the evidence preview. For example, a mini player can be run for audio files to understand whether the evidence is of interest. 2 Double-click evidence: evidence details appear. See "Evidence details" on page 43 1'll'iewing counters divided bv type To view the total amount of evidence divided lav tvpe: Analvst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 4U
RC5 9 - Preparing evidence for analysis and export adding personal notes Step Action 2 1. Click Add Report or . press 3 Result: single pieces of evidence are bookmarked. Evidence can be filtered lav this bol and includedfexcluded from export. Preparing evidence for analysis and export adding personal notes To add personal notes to one or more pieces of evidence: Step Ac tr'on 1 Select one or more pieces of evidence. 2 . Click Edit Note or . press 3 Result: the Notes ?eld can be edited. If several pieces of evidence are selected, the entered text will be copied to all other Note fields. Analvzing evidence To quicklv or thorougth analvze evidence: Step Action 1 Analvze the evidence preview. For example, a mini player can be run for audio files to understand whether the evidence is of interest. 2 Double-click evidence: evidence details appear. See "Evidence details" on page 43 1'll'iewing counters divided bv type To view the total amount of evidence divided lav tvpe: Analvst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 4U
Page 54 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - Exporting displaved evidence Step Action 1 Click Show Summarv: the evidence tvpe svmbols appear, each with its own counter. 2 Click Hide Summarvr to hide counters. Exporting displaved evidence To select some pieces of evidence and export them: Step Action 1 First tag evidence by: level of relevance and by: whether they should be included in the report (Add report key). 2 Continue selections using the column heading filters on homogeneous groups of evidence (Included in report column). 3 Click Export Evidence: indicate which evidence to be includedfexcluded. Evidence that meets the selected criteria and has the Included report field flagged is exported.$ee "Evidence export data" on page 46 . 4 Click Save: a .tgz file is created and downloaded in folder RES Download. Evidence data Evidence data is described below for both the agent and target: Data Description Acquired Date-time evidence was acquired. It can be filtered. Last 24 hours is set by default. Received Date-time evidence was logged in RES. It can be filtered. Last 24 hours is set by default. u. Tip: this data is helpful when you suspect that the target device's data-time is not updated and thus theAcquired is not valid. Analvst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 41
RC5 9 - Exporting displaved evidence Step Action 1 Click Show Summarv: the evidence tvpe svmbols appear, each with its own counter. 2 Click Hide Summarvr to hide counters. Exporting displaved evidence To select some pieces of evidence and export them: Step Action 1 First tag evidence by: level of relevance and by: whether they should be included in the report (Add report key). 2 Continue selections using the column heading filters on homogeneous groups of evidence (Included in report column). 3 Click Export Evidence: indicate which evidence to be includedfexcluded. Evidence that meets the selected criteria and has the Included report field flagged is exported.$ee "Evidence export data" on page 46 . 4 Click Save: a .tgz file is created and downloaded in folder RES Download. Evidence data Evidence data is described below for both the agent and target: Data Description Acquired Date-time evidence was acquired. It can be filtered. Last 24 hours is set by default. Received Date-time evidence was logged in RES. It can be filtered. Last 24 hours is set by default. u. Tip: this data is helpful when you suspect that the target device's data-time is not updated and thus theAcquired is not valid. Analvst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 41
Page 55 from Hacking Team RCS 9 Analyst’s Guide
Data RC5 9 - Evidence data Description Relevance Level of evidence relevance, automaticallv assigned by alert rules or manually Tvpe Info Notes Report Agent assigned in this list. The level of relevance is set using: 0 the Relevance command in the menu 0 short-cut kevs Short-cut kev list. icon Short-cat keys Description Maximum reievance intermediate reievance DU Normai reievance Minimum reievance No reievance Type of evidence to be selected. See "List of types of evidence? on page 46 Evidence information: text, images, video, audio and so on. Each piece of information is accompanied bv various ?elds ?eld content, program). It can be filtered by simva indicating the full search word or full ?eld name and search word. For example: "boss" searches for the word "boss" or "Boss" in all fields 0 while "content:boss" searches for the word "boss" or "Boss" in content fields onlv. Notes entered lav the Analyst using: 0 Edit Note menu 0 short-cut kev Bookmark, that indicates that evidence mav be includedf?excluded during export. The bookmark is set using: 0 Add Report menu 0 short-cut kev (onlv for target evidence) Name of the agent that logged the evidence. Analvst?s Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 42
Data RC5 9 - Evidence data Description Relevance Level of evidence relevance, automaticallv assigned by alert rules or manually Tvpe Info Notes Report Agent assigned in this list. The level of relevance is set using: 0 the Relevance command in the menu 0 short-cut kevs Short-cut kev list. icon Short-cat keys Description Maximum reievance intermediate reievance DU Normai reievance Minimum reievance No reievance Type of evidence to be selected. See "List of types of evidence? on page 46 Evidence information: text, images, video, audio and so on. Each piece of information is accompanied bv various ?elds ?eld content, program). It can be filtered by simva indicating the full search word or full ?eld name and search word. For example: "boss" searches for the word "boss" or "Boss" in all fields 0 while "content:boss" searches for the word "boss" or "Boss" in content fields onlv. Notes entered lav the Analyst using: 0 Edit Note menu 0 short-cut kev Bookmark, that indicates that evidence mav be includedf?excluded during export. The bookmark is set using: 0 Add Report menu 0 short-cut kev (onlv for target evidence) Name of the agent that logged the evidence. Analvst?s Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 42
Page 56 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - Evidence details Evidence details To view evidence It Operations section, double-click an operation, douhle-clicka target, click Evidence, double- d'etoiis: click a piece of evidence in Operations section, double-click an operation, double-clicka target, double-click an agent, click Evidence, double-click a piece of evidence Purpose This function lets you analyze single evidence details. The interface changes according to the type of evidence - text, audio, image or map. NOTE: the function is onlv enabled if the user has Evidence editing authorization. What the function looks like This is what audio evidence details looks like: at UpthIc-ns a ifs-ova :u I- i-L-we'] II- .I'Illrl'u: I Junans-?1 ?I'Wlm'g- nuns: mm - -- -.-- Immune-m. Lexi: w-m: rl'u'i H: .- i lHIk o.-I HIM .. rt. ?Jr, I I Area Description 1 RES menu. 2 Scroll bar. Analyst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 43
RC5 9 - Evidence details Evidence details To view evidence It Operations section, double-click an operation, douhle-clicka target, click Evidence, double- d'etoiis: click a piece of evidence in Operations section, double-click an operation, double-clicka target, double-click an agent, click Evidence, double-click a piece of evidence Purpose This function lets you analyze single evidence details. The interface changes according to the type of evidence - text, audio, image or map. NOTE: the function is onlv enabled if the user has Evidence editing authorization. What the function looks like This is what audio evidence details looks like: at UpthIc-ns a ifs-ova :u I- i-L-we'] II- .I'Illrl'u: I Junans-?1 ?I'Wlm'g- nuns: mm - -- -.-- Immune-m. Lexi: w-m: rl'u'i H: .- i lHIk o.-I HIM .. rt. ?Jr, I I Area Description 1 RES menu. 2 Scroll bar. Analyst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 43
Page 57 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 -To learn more Area Description 3 Evidence action keys. icon xame ?-a-aamiwi Description Closes the details and returns to the evidence list.See "Evidence analysis Evidence)" on page 36. Show the total quantities by evidence type. Exports evidence to a .tgz file. Deletes evidence. Applies a level of relevance. NOTE: the function requires a user license and is only enabled if the user has Evidence deletion authorization. Applies a bookmark. Edits the notes. Displays the ID code. Saves currently selected filters or loads previously saved filter settings. Clear all set filters. View content in the interface language. NOTE: this function requires a user license. 4 Evidence details. Analysis keys appear according to the type of evidence (audio, im ag e, video). 5 Evidence detail data. 5 RC5 status bar. To learn more For interface element descriptions See "Shared interface elements and actions" on page 11 . Analyst?s Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 44
RC5 9 -To learn more Area Description 3 Evidence action keys. icon xame ?-a-aamiwi Description Closes the details and returns to the evidence list.See "Evidence analysis Evidence)" on page 36. Show the total quantities by evidence type. Exports evidence to a .tgz file. Deletes evidence. Applies a level of relevance. NOTE: the function requires a user license and is only enabled if the user has Evidence deletion authorization. Applies a bookmark. Edits the notes. Displays the ID code. Saves currently selected filters or loads previously saved filter settings. Clear all set filters. View content in the interface language. NOTE: this function requires a user license. 4 Evidence details. Analysis keys appear according to the type of evidence (audio, im ag e, video). 5 Evidence detail data. 5 RC5 status bar. To learn more For interface element descriptions See "Shared interface elements and actions" on page 11 . Analyst?s Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 44
Page 58 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - lmage tvpe evidence acljons For more information on evidence see "What you shouid know about evidence? on page 34 . For a description of the data in this window see "Evidence data? on page 41 . Image tvpe evidence actions Actions that can be run on image evidence are described below: icon Description (screenshot and ?le type evidence only) Shows the extracted text. NOTE: if the unavailable" message appears, this means that the document has not vet been converted and indexed. If the button is not displaved, this means that this function was not installed. Contact your system administrator. (E) (screenshot tvpe evidence only) Return to image vievv. El Full screen view. 1:1 Actual image size view. 9? Expand and shrink image. 4-) (It Rotate image. Anti Reduces the image scaling effect. alias The image becomes the intelligence entitv default image (if the intelligence mod- 0 ule is installed). Audio tvpe evidence actions Actions that can be run on audio evidence are described below: icon Description Ilrl Volume adjustment. II I Start, pause and stop audio. Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 45
RC5 9 - lmage tvpe evidence acljons For more information on evidence see "What you shouid know about evidence? on page 34 . For a description of the data in this window see "Evidence data? on page 41 . Image tvpe evidence actions Actions that can be run on image evidence are described below: icon Description (screenshot and ?le type evidence only) Shows the extracted text. NOTE: if the unavailable" message appears, this means that the document has not vet been converted and indexed. If the button is not displaved, this means that this function was not installed. Contact your system administrator. (E) (screenshot tvpe evidence only) Return to image vievv. El Full screen view. 1:1 Actual image size view. 9? Expand and shrink image. 4-) (It Rotate image. Anti Reduces the image scaling effect. alias The image becomes the intelligence entitv default image (if the intelligence mod- 0 ule is installed). Audio tvpe evidence actions Actions that can be run on audio evidence are described below: icon Description Ilrl Volume adjustment. II I Start, pause and stop audio. Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 45
Page 59 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - Evidence export data icon Description Volume balance on local (target) and remote source (speaker). Evidence export data Data required to export evidence is described below. IMPORTANT: onlvr evidence that meets the specified criteria will be exported! Data Description From Time range for the evidence to be exported. To Acquired It considers the date as the evidence acquisition date on the target device. Received It considers the date as the evidence receipt date. Relevance Level of relevance for the evidence to be exported. Type Types of evidence to be exported. NOTE: when no type of evidence is selected, RC5 autom aticallv exports all types. Report If selected, only evidence with the Report field selected will be exported. Notes can be included or excluded from the export. Report Exported file name. By? default, RC5 names the file as follows: Name Evidence exported from Fiie name page Target target name - agent name - Evidence Export.tgz Agent agent name - Evidence Export.tgz List of types of evidence Available types of evidence are described below: Modaie Fiie type Accessed ?les text (desktop oniy} documents or images opened by the target. Analvst?s Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 46
RC5 9 - Evidence export data icon Description Volume balance on local (target) and remote source (speaker). Evidence export data Data required to export evidence is described below. IMPORTANT: onlvr evidence that meets the specified criteria will be exported! Data Description From Time range for the evidence to be exported. To Acquired It considers the date as the evidence acquisition date on the target device. Received It considers the date as the evidence receipt date. Relevance Level of relevance for the evidence to be exported. Type Types of evidence to be exported. NOTE: when no type of evidence is selected, RC5 autom aticallv exports all types. Report If selected, only evidence with the Report field selected will be exported. Notes can be included or excluded from the export. Report Exported file name. By? default, RC5 names the file as follows: Name Evidence exported from Fiie name page Target target name - agent name - Evidence Export.tgz Agent agent name - Evidence Export.tgz List of types of evidence Available types of evidence are described below: Modaie Fiie type Accessed ?les text (desktop oniy} documents or images opened by the target. Analvst?s Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 46
Page 60 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - List of types ofevidence Moduie File type Addressbook text contocts. Application text oppiicotions used. Calendar text coiendor. can audio coiis (phone, Skype, camera im age Webcom imoges. Chat text Chm- cnPbuaI-d text infon'notion copied to the ciipboord. Device text system information. File text fiies opened by torget. File svstem text hard disk thot con be expiored in the Fiie System function. See "Retrieve evidence from devices {Fiie System)" on page 49 text informotion provided by the ogent and defined in settings. Keymg text keys pressed on the keyboord. Messages text E'm?ii- mic audio oudio. Mouse image mouse ciick. Password text Password- pgsitign im age torget?s geogrophic position. Print im age printed poges. image imoges on the target?s screen. URL text visited websites. Analyst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. :47
RC5 9 - List of types ofevidence Moduie File type Addressbook text contocts. Application text oppiicotions used. Calendar text coiendor. can audio coiis (phone, Skype, camera im age Webcom imoges. Chat text Chm- cnPbuaI-d text infon'notion copied to the ciipboord. Device text system information. File text fiies opened by torget. File svstem text hard disk thot con be expiored in the Fiie System function. See "Retrieve evidence from devices {Fiie System)" on page 49 text informotion provided by the ogent and defined in settings. Keymg text keys pressed on the keyboord. Messages text E'm?ii- mic audio oudio. Mouse image mouse ciick. Password text Password- pgsitign im age torget?s geogrophic position. Print im age printed poges. image imoges on the target?s screen. URL text visited websites. Analyst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. :47
Page 61 from Hacking Team RCS 9 Analyst’s Guide
7 Exploring and retrieving evidence from online devices resentatio Introduction Gradual device exploration lets vou find and download evidence of interest. Content This section includes the following topics: What you should know about retrieving evidence 49 Retrieve evidence from devices {File System] 49 limalvst ver.1.?i - Riff} 9 - 2C-1'ilri'; HT - peg. 48
7 Exploring and retrieving evidence from online devices resentatio Introduction Gradual device exploration lets vou find and download evidence of interest. Content This section includes the following topics: What you should know about retrieving evidence 49 Retrieve evidence from devices {File System] 49 limalvst ver.1.?i - Riff} 9 - 2C-1'ilri'; HT - peg. 48
Page 62 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - Whatvou should know about retrieving evidence What you should know about retrieving evidence Description The function shows the Filesvstem tree structure of the device where the agent is installed (or several devices if exploring a target Filesvstem). The Filesvstem tree structure can be graduallv explored, first reading the first level structure (Retrieve default command) and then exploring folders, followed by reading or re-reading the selected folder (Retrieve subtree command). Once the concerned file is found, it can be downloaded and saved as file evidence (Download command) 0 NOTE: a folder is read or a file is downloaded after File System components The structure of each device shows the folders to be explored and those explored: Exompie Description :13 hue-1m Device root. Hermann-a Folder not yet explored. Il??tle-ere Explored folder. Retrieve evidence from devices (File System) To manage the - Operations section, doublevclick an operation, doublevclicka target, click File System device I Operations section, douh e~c ick an operation, douh e~c icka target, douh e~click an agent, Fiie System: click File System Purpose This function lets you: i explore the Filesvstem tree structure of the device where the agent is installed (or several devices if exploring a target Filesvstem). in Select the ?le to be added to the agent's download queue at export the explored structure (file system) Analvst's Guide ver.1.4 SE P-2013 RC8 9 20136:] - pag. 49
RC5 9 - Whatvou should know about retrieving evidence What you should know about retrieving evidence Description The function shows the Filesvstem tree structure of the device where the agent is installed (or several devices if exploring a target Filesvstem). The Filesvstem tree structure can be graduallv explored, first reading the first level structure (Retrieve default command) and then exploring folders, followed by reading or re-reading the selected folder (Retrieve subtree command). Once the concerned file is found, it can be downloaded and saved as file evidence (Download command) 0 NOTE: a folder is read or a file is downloaded after File System components The structure of each device shows the folders to be explored and those explored: Exompie Description :13 hue-1m Device root. Hermann-a Folder not yet explored. Il??tle-ere Explored folder. Retrieve evidence from devices (File System) To manage the - Operations section, doublevclick an operation, doublevclicka target, click File System device I Operations section, douh e~c ick an operation, douh e~c icka target, douh e~click an agent, Fiie System: click File System Purpose This function lets you: i explore the Filesvstem tree structure of the device where the agent is installed (or several devices if exploring a target Filesvstem). in Select the ?le to be added to the agent's download queue at export the explored structure (file system) Analvst's Guide ver.1.4 SE P-2013 RC8 9 20136:] - pag. 49
Page 63 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - What the function looks like NOTE: the function is only enabled if the user had File system browsing on agent authorization. What the function looks like This is what the page looks likerun-,E U'Pmr?anW314 El .f a a I saw5353.?.de ?Em-0121 SUI: I'r.'rr..'rI1H1q1: w- :ur-uu ms I: Inc nu:- um]; mam: Flu mm.- Islzuu "mamma- I I nanny gran" resin-nurture gam- v: Lmll'nul 1:4:91 Ham-u arse-hem? j'lm 3: 1 1 . 1 IICIL Ii nun-mu Inna-umva a: sen: -.1s: jun.- m. an 1 arm-m Ins-cumin: I a ,1 El Area Description 1 RC5 menu. 2 Scroll bar. 3 Window toolbar. Descriptions are provided below: icon Description Export the complete structure to a .tgz file. Download the selected ?le to File type evidence. Explore the selected folder content. Request the first level disk structure. ?ilJlb'?! View the list of currently suspended Filesvstem requests awaiting next svn- chronization. Analvst?s Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 50
RC5 9 - What the function looks like NOTE: the function is only enabled if the user had File system browsing on agent authorization. What the function looks like This is what the page looks likerun-,E U'Pmr?anW314 El .f a a I saw5353.?.de ?Em-0121 SUI: I'r.'rr..'rI1H1q1: w- :ur-uu ms I: Inc nu:- um]; mam: Flu mm.- Islzuu "mamma- I I nanny gran" resin-nurture gam- v: Lmll'nul 1:4:91 Ham-u arse-hem? j'lm 3: 1 1 . 1 IICIL Ii nun-mu Inna-umva a: sen: -.1s: jun.- m. an 1 arm-m Ins-cumin: I a ,1 El Area Description 1 RC5 menu. 2 Scroll bar. 3 Window toolbar. Descriptions are provided below: icon Description Export the complete structure to a .tgz file. Download the selected ?le to File type evidence. Explore the selected folder content. Request the first level disk structure. ?ilJlb'?! View the list of currently suspended Filesvstem requests awaiting next svn- chronization. Analvst?s Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 50
Page 64 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - To learn more Area Description 4 Device hard disk structure. 5 RES status bar. To learn more For interface element descriptions See "Shared interface elements and actions" on page 11 . For more information on exploring the file-svstemsee "What you should know about retrieving evidence? on page 49 Exploring file system content and downloading files To explore content and download content of interest: Step Action 1 Select a folder. 2 . Click Retrieve and set the level of depth of sub-folders . Click Save: the structure of the sub-folders up to the required level will be returned at the next rum Tip: request a few levels at a tim e, proceed graduallv. - 3 Repeat steps 1-2 on the sub-folders to be explored. 4 After identifying the file of interest, select it and click Download: the file will be downloaded as File type evidence at the next Analvst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 51
RC5 9 - To learn more Area Description 4 Device hard disk structure. 5 RES status bar. To learn more For interface element descriptions See "Shared interface elements and actions" on page 11 . For more information on exploring the file-svstemsee "What you should know about retrieving evidence? on page 49 Exploring file system content and downloading files To explore content and download content of interest: Step Action 1 Select a folder. 2 . Click Retrieve and set the level of depth of sub-folders . Click Save: the structure of the sub-folders up to the required level will be returned at the next rum Tip: request a few levels at a tim e, proceed graduallv. - 3 Repeat steps 1-2 on the sub-folders to be explored. 4 After identifying the file of interest, select it and click Download: the file will be downloaded as File type evidence at the next Analvst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 51
Page 65 from Hacking Team RCS 9 Analyst’s Guide
RES - In telligenc Intelligence resentatio Introduction The section lets vou represent interactions between targets at a high level, matching evidence received hv agents with other information alreadv possessed. Content This section includes the following topics: What you should know about intelligence 53 Intelligence operation management ..59 Entitv management:icon and table views Entitv management:link view Entitv management: Position view Target entitv details Target entitv details Person entitv details ?If? Position entitv details ?v?irtualentitv details ritnalvst's Guide ver.1.4 SE RES 20131:] -pag. 52
RES - In telligenc Intelligence resentatio Introduction The section lets vou represent interactions between targets at a high level, matching evidence received hv agents with other information alreadv possessed. Content This section includes the following topics: What you should know about intelligence 53 Intelligence operation management ..59 Entitv management:icon and table views Entitv management:link view Entitv management: Position view Target entitv details Target entitv details Person entitv details ?If? Position entitv details ?v?irtualentitv details ritnalvst's Guide ver.1.4 SE RES 20131:] -pag. 52
Page 66 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - Whatyou dtould know aboutintelligence What you should know about intelligence Presentation Introduction The Analyst processes the investigation information in hisfher possession in the Intelligence section. The people under investigation, other people and places involved in the investigation are represented by entities. The relations between people and between people and places are represented as links between entities. The system creates new entities and new links between entities based on the evidence received from target devices. The analyst interprets and organizes this information, adding, editing or deleting entities according to the evolution of the investigation. Intelligence section license Intelligence functions are sold under license. Without a user license the analyst can only use the Intelligence section to view and add details on targets in the operation; the system does not process information based on collected evidence. The only entities included are the Targets and they can only be viewed as icons or in tables,see "Entity management: icon and table views? on page 60. To learn more See "What you should know about entities" below If See "See "What you should know about links . on page 55 See "What you should know about how intelligence works" on page 56. What you should know about entities Introduction The entity represents a person or place involved in an investigation. Each entity is defined by detailed information that allow the system to identify relations between entities. People involved in the investigation: Target entities and Person entities The system defines two types of entities to represent the people involved in an investigation: Analyst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 53
RC5 9 - Whatyou dtould know aboutintelligence What you should know about intelligence Presentation Introduction The Analyst processes the investigation information in hisfher possession in the Intelligence section. The people under investigation, other people and places involved in the investigation are represented by entities. The relations between people and between people and places are represented as links between entities. The system creates new entities and new links between entities based on the evidence received from target devices. The analyst interprets and organizes this information, adding, editing or deleting entities according to the evolution of the investigation. Intelligence section license Intelligence functions are sold under license. Without a user license the analyst can only use the Intelligence section to view and add details on targets in the operation; the system does not process information based on collected evidence. The only entities included are the Targets and they can only be viewed as icons or in tables,see "Entity management: icon and table views? on page 60. To learn more See "What you should know about entities" below If See "See "What you should know about links . on page 55 See "What you should know about how intelligence works" on page 56. What you should know about entities Introduction The entity represents a person or place involved in an investigation. Each entity is defined by detailed information that allow the system to identify relations between entities. People involved in the investigation: Target entities and Person entities The system defines two types of entities to represent the people involved in an investigation: Analyst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 53
Page 67 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 -' 11e placesinvolved in an investigation: Position entity and Virtual entity I :Target type, for the people being tapped . I Person type, for the people not being tapped The places involved in an investigation: Position entity and Virtual entity The system defines two types of entities to represent the places involved in an investigation: 0 Position type, physical sites :?v'irtual type, virtual sites like web pages Managing entities The analyst manages entities so they represent the evolution of the investigation, thus: 0 it adds entities to monitor other people and places deemed of interest 0 it adds details to the entities to provide new data to the system to identify relations between entities in it eliminates entities when the people or places are deemed insigni?cant to the inves- ?ga?on Target entity The Target entity is automatically created when the target is created in the Operations section. The name and description are the same ones assigned in the Operations section. 0 NOTE: Target entities cannot be eliminated from the Intelligence section. To eliminate them, targets must be eliminated from the Operations section. NOTE: the Target name and description can be changed without any impact on the Operations section. The system adds Target entity details with information gathered from evidence photos, most frequently contacted people). The analyst can add other information in his,/her possession.$ee "Target entity detaiis? on page 71 Person entity The Person entity can be manually created by the analyst or automatically by the system. The Person entity is defined by IDs s,/he uses to communicate, by phone or internet phone number, Skype contact). 0 NOTE: the more information in the entity detail sheet, the higher the probability the system identifies links between that entity and other entities. See "Person entity detoiis" on page 77 Analyst?s Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 54
RC5 9 -' 11e placesinvolved in an investigation: Position entity and Virtual entity I :Target type, for the people being tapped . I Person type, for the people not being tapped The places involved in an investigation: Position entity and Virtual entity The system defines two types of entities to represent the places involved in an investigation: 0 Position type, physical sites :?v'irtual type, virtual sites like web pages Managing entities The analyst manages entities so they represent the evolution of the investigation, thus: 0 it adds entities to monitor other people and places deemed of interest 0 it adds details to the entities to provide new data to the system to identify relations between entities in it eliminates entities when the people or places are deemed insigni?cant to the inves- ?ga?on Target entity The Target entity is automatically created when the target is created in the Operations section. The name and description are the same ones assigned in the Operations section. 0 NOTE: Target entities cannot be eliminated from the Intelligence section. To eliminate them, targets must be eliminated from the Operations section. NOTE: the Target name and description can be changed without any impact on the Operations section. The system adds Target entity details with information gathered from evidence photos, most frequently contacted people). The analyst can add other information in his,/her possession.$ee "Target entity detaiis? on page 71 Person entity The Person entity can be manually created by the analyst or automatically by the system. The Person entity is defined by IDs s,/he uses to communicate, by phone or internet phone number, Skype contact). 0 NOTE: the more information in the entity detail sheet, the higher the probability the system identifies links between that entity and other entities. See "Person entity detoiis" on page 77 Analyst?s Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 54
Page 68 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - Position entity Position entity The Position entity can be manually created by the analyst or automatically by the system. The Position entity is defined by the geographic coordinates (latitude and longitude) or address of the site that it represents and a range of precision. NOTE: the range of precision must be suited to the type of place 50-100m for a building, much more for a park). See "Position entity detaiis" on page 79 Virtual entity The Virtual entity must be manually created by the Analyst. The Virtual entity is defined by one or more URL addresses for the web page they represent. See "Virtual entity details? on page 81 See "What you should know about links". Introduction A link is a relationship between entities. There can be only one link between two entities. There are three types of links: . Peer . Identity Know links Know links represent a know type relationship. Two entities haye a Know link when at least one of the two has the other in hislher address book. A Know link can be directional or bi-directional. Peer links Peer links indicate that there was a contact between the two entities. Two entities that represent people have a Peer link when there was a direct communication between the two entities phone call, chat). The relationship can be directional and bi- directional. An entity that represents a person and one that represents a place have a Peer link when the person was in that place (physical or on the web). The relationship is only directional: from the entity that represents a person to the one that represents a place. Peer links represent a stronger relationship than know links, thus they replace any Know link between the entities. Analyst?s Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. 55
RC5 9 - Position entity Position entity The Position entity can be manually created by the analyst or automatically by the system. The Position entity is defined by the geographic coordinates (latitude and longitude) or address of the site that it represents and a range of precision. NOTE: the range of precision must be suited to the type of place 50-100m for a building, much more for a park). See "Position entity detaiis" on page 79 Virtual entity The Virtual entity must be manually created by the Analyst. The Virtual entity is defined by one or more URL addresses for the web page they represent. See "Virtual entity details? on page 81 See "What you should know about links". Introduction A link is a relationship between entities. There can be only one link between two entities. There are three types of links: . Peer . Identity Know links Know links represent a know type relationship. Two entities haye a Know link when at least one of the two has the other in hislher address book. A Know link can be directional or bi-directional. Peer links Peer links indicate that there was a contact between the two entities. Two entities that represent people have a Peer link when there was a direct communication between the two entities phone call, chat). The relationship can be directional and bi- directional. An entity that represents a person and one that represents a place have a Peer link when the person was in that place (physical or on the web). The relationship is only directional: from the entity that represents a person to the one that represents a place. Peer links represent a stronger relationship than know links, thus they replace any Know link between the entities. Analyst?s Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. 55
Page 69 from Hacking Team RCS 9 Analyst’s Guide
RES - Managing Peer and Know links Managing Peer and Know links The analvst manages links so they represent the evolution of the investigation, thus: . adds or edits links between two entities when in possession of information that prove a relationship between the two . assigns a level of relevance to links to represent the relationship's relevance in the inves? Hgahon . deletes links when in possession of information that prove the lack of relations or that the relationship is insignificant to the investigation. Identity links Identitv links represent a suggestion of an identity relationship between two entities that represent people. This tvpe of link is automaticallvr created bv the svstem when the two entities share at least one identification phone number}. ldentitvr links do not have directions. Managing Identity links The analvst must decide the reason for identitv links and how to act accordinglv: . if thew,?r are the same person, the two entities must be merged; . if thev are two different people that used the same identification, the shared identification must be deleted from one of the entities and the link eliminated. Link time value Links are the result of an automatic or manual process completed at a certain time. However, the time the linkis created, meaning when the first relationship was formed between entities, is onlv logged for Peer links automaticallv created bv the svstem. This wav, an analvsis period can be selected to see when certain relationships were created. For the other links, once thev are created {automaticallv or manuallv} thev are considered as created at the beginning bv the svstem. What you should know about how intelligence works Introduction Intelligence supports the analvst in processing the investigation evidence and data. ritnalvst's Guide ver.1.4 SE RES 201MB -pag. 56
RES - Managing Peer and Know links Managing Peer and Know links The analvst manages links so they represent the evolution of the investigation, thus: . adds or edits links between two entities when in possession of information that prove a relationship between the two . assigns a level of relevance to links to represent the relationship's relevance in the inves? Hgahon . deletes links when in possession of information that prove the lack of relations or that the relationship is insignificant to the investigation. Identity links Identitv links represent a suggestion of an identity relationship between two entities that represent people. This tvpe of link is automaticallvr created bv the svstem when the two entities share at least one identification phone number}. ldentitvr links do not have directions. Managing Identity links The analvst must decide the reason for identitv links and how to act accordinglv: . if thew,?r are the same person, the two entities must be merged; . if thev are two different people that used the same identification, the shared identification must be deleted from one of the entities and the link eliminated. Link time value Links are the result of an automatic or manual process completed at a certain time. However, the time the linkis created, meaning when the first relationship was formed between entities, is onlv logged for Peer links automaticallv created bv the svstem. This wav, an analvsis period can be selected to see when certain relationships were created. For the other links, once thev are created {automaticallv or manuallv} thev are considered as created at the beginning bv the svstem. What you should know about how intelligence works Introduction Intelligence supports the analvst in processing the investigation evidence and data. ritnalvst's Guide ver.1.4 SE RES 201MB -pag. 56
Page 70 from Hacking Team RCS 9 Analyst’s Guide
RCS 9 - Intelligence process Intelligence process Phase Description 1 The system creates an operation in the Intelligence section when an operation is opened in the Operations section. The system creates a Target entity when a target is created in the Operations sec- tion. The system, based on the evidence collected from target devices, creates links with target entities and creates new entities. The analyst adds entities to represent people, places and web pages deemed of interest for the investigation and adds details. The system continues to update entities and their links based on new evidence and information added by the analyst. The analyst interprets and manages entities and their links to propose solutions for the investigation. NOTE: the analyst can set an alert rule to be alerted when the system creates an entity or link. See "Alerting on page 90. Automatic Know link creation criteria If the evidence indicates targets identification 00321456? address book target 00321456? for TargetfPerson entity Paul in The system have their Paul in John and son entity son entity John has identification a directional Know link from John to Paul his address book Automatic Peer link creation criteria with Target and Person entities If the evidence indicates targets 00321456? The system a Person entity with identi?cation 00321456? 10h? 30d Pal-ll a directional Peer link from John to the Person comm unicated with identi?cation entity 4. a directional Peer link from Paul to the Person entity Analyst?s Guide ver.1.4 5E P-2013 RC5 9 2013 - pag. 57 a Person entity with identification 00321456? a directional Know link from John to the Per- a directional Know link from John to the Per-
RCS 9 - Intelligence process Intelligence process Phase Description 1 The system creates an operation in the Intelligence section when an operation is opened in the Operations section. The system creates a Target entity when a target is created in the Operations sec- tion. The system, based on the evidence collected from target devices, creates links with target entities and creates new entities. The analyst adds entities to represent people, places and web pages deemed of interest for the investigation and adds details. The system continues to update entities and their links based on new evidence and information added by the analyst. The analyst interprets and manages entities and their links to propose solutions for the investigation. NOTE: the analyst can set an alert rule to be alerted when the system creates an entity or link. See "Alerting on page 90. Automatic Know link creation criteria If the evidence indicates targets identification 00321456? address book target 00321456? for TargetfPerson entity Paul in The system have their Paul in John and son entity son entity John has identification a directional Know link from John to Paul his address book Automatic Peer link creation criteria with Target and Person entities If the evidence indicates targets 00321456? The system a Person entity with identi?cation 00321456? 10h? 30d Pal-ll a directional Peer link from John to the Person comm unicated with identi?cation entity 4. a directional Peer link from Paul to the Person entity Analyst?s Guide ver.1.4 5E P-2013 RC5 9 2013 - pag. 57 a Person entity with identification 00321456? a directional Know link from John to the Per- a directional Know link from John to the Per-
Page 71 from Hacking Team RCS 9 Analyst’s Guide
RCS 9 - Automatic Peer link creation criteria with Position entities target John communicated with Targetfpermn entity paui a dIrectIonal Peer link from John to Paul a Person entity with identi?cation 003214567i target John often communicates Wim identi?cation 00321456? .- a directional Peer link from John to the Person entity Automatic Peer link creation criteria with Position entities If the evidence indicates The system . a Position entity with the geographic coordinates for targets John and Paul were in ?"135 SFluarE Square at the same time 1. a dIrectIonal Peer link from John to the PosItI on entity 1- a directional Peer link from Paul to the Position entity target John was in the place associated with John's of?ce a direction Peer link from John toJohn's of?ce entity Position entity 1- a Position entity with the geographic coordinates for Times Square 1- a directional Peer link from John to the Position entity target John is often in Tim es Square NOTE: for the system, a target visited a place if they were there for at least 15 minutes. Two targets visited the same place at the same time if they were there at the same time for at least 15 minutes. Automatic Peer link creation criteria with Virtual entities If the evidence indicates The system target John yisited URL linked to the Virtual entity Secret places website a direction Peer link from John to Secret places website Automatic Identity link creation criteria with Target and Person entities If the system detects The system TargetfPerson entity John has 003214567i in his identification data and Targetherson entity an Identity link between John and Paul Paul has 00321456? in his Analyst?s Guide 1yer.1.dfi SE P-2013 RC5 9 2013 - pag. 58
RCS 9 - Automatic Peer link creation criteria with Position entities target John communicated with Targetfpermn entity paui a dIrectIonal Peer link from John to Paul a Person entity with identi?cation 003214567i target John often communicates Wim identi?cation 00321456? .- a directional Peer link from John to the Person entity Automatic Peer link creation criteria with Position entities If the evidence indicates The system . a Position entity with the geographic coordinates for targets John and Paul were in ?"135 SFluarE Square at the same time 1. a dIrectIonal Peer link from John to the PosItI on entity 1- a directional Peer link from Paul to the Position entity target John was in the place associated with John's of?ce a direction Peer link from John toJohn's of?ce entity Position entity 1- a Position entity with the geographic coordinates for Times Square 1- a directional Peer link from John to the Position entity target John is often in Tim es Square NOTE: for the system, a target visited a place if they were there for at least 15 minutes. Two targets visited the same place at the same time if they were there at the same time for at least 15 minutes. Automatic Peer link creation criteria with Virtual entities If the evidence indicates The system target John yisited URL linked to the Virtual entity Secret places website a direction Peer link from John to Secret places website Automatic Identity link creation criteria with Target and Person entities If the system detects The system TargetfPerson entity John has 003214567i in his identification data and Targetherson entity an Identity link between John and Paul Paul has 00321456? in his Analyst?s Guide 1yer.1.dfi SE P-2013 RC5 9 2013 - pag. 58
Page 72 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - Intelligence operation management Intelligence operation management To manage - Intelligence section intelligence operations: Purpose This function lets you: 0 View intelligence operations What the function looks like This is what the page looks like: .1 El! l.l 3mm: Ina-lumen Bach?s-m1 Ful?Iln: IKJ: inn-1:1 11'? rum. JJ J. urnqn In Ex .I Help: a -u I u-H I1 Area Description 1 RC5 menu. 2 Operation list: a Open operation. E3 All operations. Shows entities in all operations. 3 Selected operation data. 4 RC5 status bar. Guide 1uer.1.4 SE P-2013 RC8 9 2013 - pag. 59
RC5 9 - Intelligence operation management Intelligence operation management To manage - Intelligence section intelligence operations: Purpose This function lets you: 0 View intelligence operations What the function looks like This is what the page looks like: .1 El! l.l 3mm: Ina-lumen Bach?s-m1 Ful?Iln: IKJ: inn-1:1 11'? rum. JJ J. urnqn In Ex .I Help: a -u I u-H I1 Area Description 1 RC5 menu. 2 Operation list: a Open operation. E3 All operations. Shows entities in all operations. 3 Selected operation data. 4 RC5 status bar. Guide 1uer.1.4 SE P-2013 RC8 9 2013 - pag. 59
Page 73 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - To learn more To learn more For interface element descriptions See "Shared interface elements and actions" on page 11 . Viewing operation entities To view operation entities Step Action 1 Double-click an operation; the entity management page opens.$ee "Entity management: link View? on page 62 Entity management: icon and table views To manage I Intelligence section, double-click an operation and click Icon View or Table View entities: Purpose This function lets you: view operation entities manage operation entities open the target page linked to the Target entity I i ll NOTE: the only entities viewed and managed without a user license are Target entities. 6 NOTE: the function is only enabled if the user has Entity management authorization. What the function looks like This is what the page looks like: Analyst?s Guide yer.1.4 SE P-2o13 Rcsa 2:313 -pag. 60
RC5 9 - To learn more To learn more For interface element descriptions See "Shared interface elements and actions" on page 11 . Viewing operation entities To view operation entities Step Action 1 Double-click an operation; the entity management page opens.$ee "Entity management: link View? on page 62 Entity management: icon and table views To manage I Intelligence section, double-click an operation and click Icon View or Table View entities: Purpose This function lets you: view operation entities manage operation entities open the target page linked to the Target entity I i ll NOTE: the only entities viewed and managed without a user license are Target entities. 6 NOTE: the function is only enabled if the user has Entity management authorization. What the function looks like This is what the page looks like: Analyst?s Guide yer.1.4 SE P-2o13 Rcsa 2:313 -pag. 60
Page 74 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - What the function looks like .1 man Inn-Imam DIM-CH1 I 1 I l- i- seashelmaxArea Description 1 RC5 menu. 2 Scroll bar. 3 Window toolbar. Descriptions are provided below: Function Creates a new entity Edits an entity Deletes an entity Exports entity data in . format EM Opens the target page linked to the entity.$ee "Target page" on page 24 Analyst?s Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. 61
RC5 9 - What the function looks like .1 man Inn-Imam DIM-CH1 I 1 I l- i- seashelmaxArea Description 1 RC5 menu. 2 Scroll bar. 3 Window toolbar. Descriptions are provided below: Function Creates a new entity Edits an entity Deletes an entity Exports entity data in . format EM Opens the target page linked to the entity.$ee "Target page" on page 24 Analyst?s Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. 61
Page 75 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 -To learn more Area Description 4 View and search box buttons: Object Description ?own?m Search box. Enter part of the name or description to display a list of entities that contain the entered letters. Displays the entities in a table. Displays entities as icons ?t Displays Target and Position entities and their links on a map. See "Entity management: Position View" on page 6? if Displays entities and their links in a graph. See "Entity management: link View" below 5 Entity list 5 Selected entity data. 7 RC5 status bar. To learn more For interface element descriptions See "Shared interface eiements and actions? on page 11 . To learn more on intelligence see "What you should know about on page 53 see "What you should know about entities? on page 53 Viewing entity details To View entity details: Step Action 1 Double-click an entity: the detail page opens. "Target entity details? on page .71 . 0 "Person entity detaiis" on page 77 . 1- "Position entity details? on page 79 . 1. "Virtual entity detaiis" on page 81 . Entity management: link View To manage - Intelligence section, double-click an operation, click Link View entities: Analyst?s Guide 1tier.1.dfl SE P-2013 RC8 9 2013 - pag. 62
RC5 9 -To learn more Area Description 4 View and search box buttons: Object Description ?own?m Search box. Enter part of the name or description to display a list of entities that contain the entered letters. Displays the entities in a table. Displays entities as icons ?t Displays Target and Position entities and their links on a map. See "Entity management: Position View" on page 6? if Displays entities and their links in a graph. See "Entity management: link View" below 5 Entity list 5 Selected entity data. 7 RC5 status bar. To learn more For interface element descriptions See "Shared interface eiements and actions? on page 11 . To learn more on intelligence see "What you should know about on page 53 see "What you should know about entities? on page 53 Viewing entity details To View entity details: Step Action 1 Double-click an entity: the detail page opens. "Target entity details? on page .71 . 0 "Person entity detaiis" on page 77 . 1- "Position entity details? on page 79 . 1. "Virtual entity detaiis" on page 81 . Entity management: link View To manage - Intelligence section, double-click an operation, click Link View entities: Analyst?s Guide 1tier.1.dfl SE P-2013 RC8 9 2013 - pag. 62
Page 76 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - Purpose Purpose This function lets you: . display operation entities and their links on a graph . manage entities .- manage entity links . open the target page linked to the Target entity . open eyidence associated with a link .- dynamically yiew eyidence associated with entity links a NOTE: this function requires a user license. Without a license, the default operation entity view is the icon yiew,see "Entity management: icon and table views" on page 60. NOTE: the function is only enabled if the user has Entity management authorization. What the function looks like This is what the page looks like: Inf-all 9 arm-ml .-.1 El 3km!? a suxex a same w. u. - .-.- ..-. -. .- . -. In.- -- 4m: J.- DIME- lam. r? um, .. l. on; Lullwuulol .J Ful?ll? II :42: I'll] 9i i El . Ill? . --.H ?i ?flx up. yu- In." w'u-nual 11- (Iva .- nun?.- ?unnum- 1m as a Area Description 1 RES menu. 2 Scroll bar. Analyst?s Guide yer.1.4 SE P-2013 RC3 9 2013 - pag. 63
RC5 9 - Purpose Purpose This function lets you: . display operation entities and their links on a graph . manage entities .- manage entity links . open the target page linked to the Target entity . open eyidence associated with a link .- dynamically yiew eyidence associated with entity links a NOTE: this function requires a user license. Without a license, the default operation entity view is the icon yiew,see "Entity management: icon and table views" on page 60. NOTE: the function is only enabled if the user has Entity management authorization. What the function looks like This is what the page looks like: Inf-all 9 arm-ml .-.1 El 3km!? a suxex a same w. u. - .-.- ..-. -. .- . -. In.- -- 4m: J.- DIME- lam. r? um, .. l. on; Lullwuulol .J Ful?ll? II :42: I'll] 9i i El . Ill? . --.H ?i ?flx up. yu- In." w'u-nual 11- (Iva .- nun?.- ?unnum- 1m as a Area Description 1 RES menu. 2 Scroll bar. Analyst?s Guide yer.1.4 SE P-2013 RC3 9 2013 - pag. 63
Page 77 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - What the function looks like Area Description 3 Window toolbar. Descriptions are provided below: Icon Function Creates a new entity Editing an entity Deletes an entity Exports entity data in . format Merges two entities Opens the target page linked to the entity.$ee "Target page? on page 24 . Opens the evidence associated with the selected link. See "Evidence analysis Evidence)" on page 36 Creates a link Edits a link Deletes a link Applies a level of relevance to a link Exports the entity graph in . raphml format. Analyst?s Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 64
RC5 9 - What the function looks like Area Description 3 Window toolbar. Descriptions are provided below: Icon Function Creates a new entity Editing an entity Deletes an entity Exports entity data in . format Merges two entities Opens the target page linked to the entity.$ee "Target page? on page 24 . Opens the evidence associated with the selected link. See "Evidence analysis Evidence)" on page 36 Creates a link Edits a link Deletes a link Applies a level of relevance to a link Exports the entity graph in . raphml format. Analyst?s Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 64
Page 78 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 -To learn more Area Description 4 View and search box buttons: Object Description immune i Search box. Enter part of the name or description to display a list of entities that contain the entered letters. Displays the entities in a table. See Entity management: icon and tabie views" on page 60 Displays entities as icons See ?Entity management: icon and tabie views? on page 60 Displa 5 Target and Position entitiesIalnd their links on a map ee "Entity management: Position View? on page 67 53' Displays entities and their links in a graph. 5 Filter area 5 Entity graph and links based on set filters NOTE: the Know, Identity and manually created links are always displayed regardless of the selected period. NOTE: the entity with the most links is placed at the center of the graph. 7 Selected entity data. 8 Command that dynamically displays the quantity, direction and frequency of evidence that define the links between the entities displayed in the graph based on the set filters. 9 RC5 status bar. To learn more For interface element descriptions See "Shared interface eiements and actions? on page 11 . To learn more on intelligence see "What you shouid know about on page 53 see "What you shouid know about entities? on page 53 Viewing entity details To view entity details: Analyst?s Guide 1tier.1.dfl SE P-2013 RC8 9 2013 - pag. 65
RC5 9 -To learn more Area Description 4 View and search box buttons: Object Description immune i Search box. Enter part of the name or description to display a list of entities that contain the entered letters. Displays the entities in a table. See Entity management: icon and tabie views" on page 60 Displays entities as icons See ?Entity management: icon and tabie views? on page 60 Displa 5 Target and Position entitiesIalnd their links on a map ee "Entity management: Position View? on page 67 53' Displays entities and their links in a graph. 5 Filter area 5 Entity graph and links based on set filters NOTE: the Know, Identity and manually created links are always displayed regardless of the selected period. NOTE: the entity with the most links is placed at the center of the graph. 7 Selected entity data. 8 Command that dynamically displays the quantity, direction and frequency of evidence that define the links between the entities displayed in the graph based on the set filters. 9 RC5 status bar. To learn more For interface element descriptions See "Shared interface eiements and actions? on page 11 . To learn more on intelligence see "What you shouid know about on page 53 see "What you shouid know about entities? on page 53 Viewing entity details To view entity details: Analyst?s Guide 1tier.1.dfl SE P-2013 RC8 9 2013 - pag. 65
Page 79 from Hacking Team RCS 9 Analyst’s Guide
RCS 9 - Merging two en??esin one Step Action 1 Double-click an entity: the detail page opens. "Target entity details? on page ?1 . a "Person entity detaiis" on page If? . "Position entity details" on page 19 . "Virtual entity detaiis" on page 81 . Merging two entities in one To merge two entities in one: Step Action 1 Select the two entities holding down the key on the keyboard. NOTE: only a Target entity can be merged with a Person entity or two Person entities. 2 Click Merge. Result: an entity with the name and description of the first entity is displayed in the graph with the details on both. a NOTE: if a Target entity is merged with a Person entity, the Target entity remains with the Person entity details. Creating a link between two entities To create a link between two entities: Step Action 1 Select the two entities holding down the key on the keyboard. 2 Select the direction, type and level of rel eyance of the link and click Saye. Result: the link is displayed in the graph Dynamically displaying eyidence on links between entities To dynamically display eyidence on links between entities: Step Action 1 Make sure the entities displayed on the graph and the selected time period are those required. Use the filters to set preferences. Analyst?s Guide yer.1.4SEP-2013 Rcsa 2013 -pag. 66
RCS 9 - Merging two en??esin one Step Action 1 Double-click an entity: the detail page opens. "Target entity details? on page ?1 . a "Person entity detaiis" on page If? . "Position entity details" on page 19 . "Virtual entity detaiis" on page 81 . Merging two entities in one To merge two entities in one: Step Action 1 Select the two entities holding down the key on the keyboard. NOTE: only a Target entity can be merged with a Person entity or two Person entities. 2 Click Merge. Result: an entity with the name and description of the first entity is displayed in the graph with the details on both. a NOTE: if a Target entity is merged with a Person entity, the Target entity remains with the Person entity details. Creating a link between two entities To create a link between two entities: Step Action 1 Select the two entities holding down the key on the keyboard. 2 Select the direction, type and level of rel eyance of the link and click Saye. Result: the link is displayed in the graph Dynamically displaying eyidence on links between entities To dynamically display eyidence on links between entities: Step Action 1 Make sure the entities displayed on the graph and the selected time period are those required. Use the filters to set preferences. Analyst?s Guide yer.1.4SEP-2013 Rcsa 2013 -pag. 66
Page 80 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - Entity:r management: Posi?on view Step Action 2 Click Plavr to display. Result: red balls slide along links to represent collected evidence. 0 NOTE: the direction in which the ball slides indicates the direction of the evidence the red ball slides from the John entity to the Paul entitv ifJohn sent an email to Paul). 0 NOTE: the number of balls indicates the quantitv of evidence: one ball indicates that at least 10 pieces of evidence were collected, two balls between 10 and SD pieces, three balls if more than 50 pieces of evidence were collected. NOTE: if the link was created on that day, that dav is displaved on the map. 3 Click Stop to stop the display. Entity management: Position view To manage a Intelligence section, double-click an operation, click Position View entities: Purpose This function lets vou: . displav Target entities and Position entities for an operation and their links on a map. . manage Target and Position entities .- manage links between Target and Position entities . open the target page linked to the Target entitv . open evidence associated with a link .- dvnamicallv displav target entitv movements NOTE: the function requires a user license and is onlv enabled if the user has Entitvr management authorization. Analvst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 67
RC5 9 - Entity:r management: Posi?on view Step Action 2 Click Plavr to display. Result: red balls slide along links to represent collected evidence. 0 NOTE: the direction in which the ball slides indicates the direction of the evidence the red ball slides from the John entity to the Paul entitv ifJohn sent an email to Paul). 0 NOTE: the number of balls indicates the quantitv of evidence: one ball indicates that at least 10 pieces of evidence were collected, two balls between 10 and SD pieces, three balls if more than 50 pieces of evidence were collected. NOTE: if the link was created on that day, that dav is displaved on the map. 3 Click Stop to stop the display. Entity management: Position view To manage a Intelligence section, double-click an operation, click Position View entities: Purpose This function lets vou: . displav Target entities and Position entities for an operation and their links on a map. . manage Target and Position entities .- manage links between Target and Position entities . open the target page linked to the Target entitv . open evidence associated with a link .- dvnamicallv displav target entitv movements NOTE: the function requires a user license and is onlv enabled if the user has Entitvr management authorization. Analvst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 67
Page 81 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - What the function lookalike What the function looks like This is what the page looks like: .1 lrl'w-En-rc'I-I'Iw SHED A Inn-Ingma- liuhh-ui r- :msnuu i- ts? a team Pia Rt Len-1 Ann-mar. 4- . -- Human-.11: I in?: (ink 1.- 4-5.ram-Ira.- ?hM?lg . ?uwr' Wile"EraInman-1a up: eff 1. TIFT. - a El. .-. -nr 3,1 _ak?'?yf .15.: 53 5 h, I i rahKit! I .-. .. .. 0c:- mulu_ .- . Wail-:00! ?nk-Tar: :l.x 1 .. Ll Emu-u LI: a. 4mm! HIPX- Area Description 1 RES menu. 2 Scrallbar. Analyst?s Guide new 2013 -pag. 68
RC5 9 - What the function lookalike What the function looks like This is what the page looks like: .1 lrl'w-En-rc'I-I'Iw SHED A Inn-Ingma- liuhh-ui r- :msnuu i- ts? a team Pia Rt Len-1 Ann-mar. 4- . -- Human-.11: I in?: (ink 1.- 4-5.ram-Ira.- ?hM?lg . ?uwr' Wile"EraInman-1a up: eff 1. TIFT. - a El. .-. -nr 3,1 _ak?'?yf .15.: 53 5 h, I i rahKit! I .-. .. .. 0c:- mulu_ .- . Wail-:00! ?nk-Tar: :l.x 1 .. Ll Emu-u LI: a. 4mm! HIPX- Area Description 1 RES menu. 2 Scrallbar. Analyst?s Guide new 2013 -pag. 68
Page 82 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - What the function looks like Area Description 3 Window toolbar. Descriptions are provided below: icon Function Creates a new entity Editing an entity Deletes an entity Exports entity data in - format Opens the target page linked to the entity.$ee "Target page? on page 24 . Opens the evidence associated with the selected link. See "Evidence anaiysis Evidence)" on page 36 Creates a link Deletes a link Applies a level of relevance to a link 4 View and search box buttons: Object Description Iku ccl'n Dce Search box. Enter part of the name or description to display a list of entities that contain the entered letters. Displays the entities in a table. See Entity management: icon and tabie views" on page 60. Displays entities as icons See "Entity management: icon and tabie views? on page 60 . Displays Target and Position entities and their links on a map. {3 Displays entities and their links in a graph. See "Entity management: iinir view" on page 62 . 5 Filter area Analyst?s Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 69
RC5 9 - What the function looks like Area Description 3 Window toolbar. Descriptions are provided below: icon Function Creates a new entity Editing an entity Deletes an entity Exports entity data in - format Opens the target page linked to the entity.$ee "Target page? on page 24 . Opens the evidence associated with the selected link. See "Evidence anaiysis Evidence)" on page 36 Creates a link Deletes a link Applies a level of relevance to a link 4 View and search box buttons: Object Description Iku ccl'n Dce Search box. Enter part of the name or description to display a list of entities that contain the entered letters. Displays the entities in a table. See Entity management: icon and tabie views" on page 60. Displays entities as icons See "Entity management: icon and tabie views? on page 60 . Displays Target and Position entities and their links on a map. {3 Displays entities and their links in a graph. See "Entity management: iinir view" on page 62 . 5 Filter area Analyst?s Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 69
Page 83 from Hacking Team RCS 9 Analyst’s Guide
RCS 9 - To learn more Area Description 5 Entity map and links based on set filters NOTE: the target entity is positioned in the last position acquired in the selected period. NOTE: manually created links are always displayed regardless of the selected period. Selected entity data. 8 Command to display Target entity movements based on set filters. 9 RES status bar. To learn more For interface element descriptions See "Shared interface elements and actions" on page 11 . To learn more on intelligence see "What you should know about intelligence" on page 53 see "What you should know about entities? on page 53 1ll'iewing entity details To view entity details: Step Action 1 Double-click an entity: the detail page opens. . "Target entity details" on next page . "Person entity details" on page If? . . "Position entity details" on page ?9 . Creating a link between two entities To create a link between two entities: Step Action 1 Select a Target entity and Position entity holding down the key on the keyboard. 2 Select the level of relevance and click Save. Result: the link is displayed in the graph Analyst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 70
RCS 9 - To learn more Area Description 5 Entity map and links based on set filters NOTE: the target entity is positioned in the last position acquired in the selected period. NOTE: manually created links are always displayed regardless of the selected period. Selected entity data. 8 Command to display Target entity movements based on set filters. 9 RES status bar. To learn more For interface element descriptions See "Shared interface elements and actions" on page 11 . To learn more on intelligence see "What you should know about intelligence" on page 53 see "What you should know about entities? on page 53 1ll'iewing entity details To view entity details: Step Action 1 Double-click an entity: the detail page opens. . "Target entity details" on next page . "Person entity details" on page If? . . "Position entity details" on page ?9 . Creating a link between two entities To create a link between two entities: Step Action 1 Select a Target entity and Position entity holding down the key on the keyboard. 2 Select the level of relevance and click Save. Result: the link is displayed in the graph Analyst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 70
Page 84 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - Dynamically displaying target movements Dynamically displaying target movements To manage dynamically displayed target movements: Step Action 1 Make sure the entities displayed on the graph and the selected time period are those required. Use the filters to set preferences. 2 Click Play to display. Result: the Target entities displayed on the map move according to the movements logged in evidence. 0 NOTE: if there is no evidence on the target position in the selected period, the Target entity remains on the last position acquired but its icon slowly fades until it disappears or appears in the next logged position. 3 Click Stop to stop the display. Target entity details To view entityr detail's: Intelligence section, double-click an operation, double-click a Target entity Purpose This function lets you: 1. view detailed information on the Target entity processed by the system I add detailed information on the Target entity .- create new entities connected to the Target entity NOTE: some details and some actions are only enabled with the user license. NOTE: the function is only enabled if the user has Entity management auth?rlzatl?n- 1ll?lihat the function looks like This is what the page looks like: Analyst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. i1
RC5 9 - Dynamically displaying target movements Dynamically displaying target movements To manage dynamically displayed target movements: Step Action 1 Make sure the entities displayed on the graph and the selected time period are those required. Use the filters to set preferences. 2 Click Play to display. Result: the Target entities displayed on the map move according to the movements logged in evidence. 0 NOTE: if there is no evidence on the target position in the selected period, the Target entity remains on the last position acquired but its icon slowly fades until it disappears or appears in the next logged position. 3 Click Stop to stop the display. Target entity details To view entityr detail's: Intelligence section, double-click an operation, double-click a Target entity Purpose This function lets you: 1. view detailed information on the Target entity processed by the system I add detailed information on the Target entity .- create new entities connected to the Target entity NOTE: some details and some actions are only enabled with the user license. NOTE: the function is only enabled if the user has Entity management auth?rlzatl?n- 1ll?lihat the function looks like This is what the page looks like: Analyst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. i1
Page 85 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - What the function looks like .1 cr-m man . . 0- 4mm: Inn-Imam Lem-cm l- ?mum l- i- JmeyPagl -mrI lillJ'JlliILln' I um. nun-uncu- .. Lmluz-I mas: mnan _t Tum a s? - g? inl?lb91.; - l- 1 :1 nan-um5:1. 9 Jr 1., 3. :15. a. 1. 2' uld'rrw'h'nln Area Description 1 RC5 menu. 2 Scroll bar. 3 Window toolbar. Descriptions are provided below: Icon Function Edit entity data. Exports entity data in . format 3 Opens the target page linked to the entity.$ee "Target page" on page 24 . r?r 4 Photo of the target linked to the entity. It is the first image captured by the webcam by default. 5 List of target identification data identified by evidence or manually added. 5 Table with the most frequently contacted people and most frequently yisited websites based on the selected period. Double-click to open the page of evidence for that data. 3' Search period. 3 Map indicating: 0 last position acquired from the target, 0 places most frequently visited in the selected period, it manually entered places visited by the target. 9 RC5 status bar Analyst?s Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. 72
RC5 9 - What the function looks like .1 cr-m man . . 0- 4mm: Inn-Imam Lem-cm l- ?mum l- i- JmeyPagl -mrI lillJ'JlliILln' I um. nun-uncu- .. Lmluz-I mas: mnan _t Tum a s? - g? inl?lb91.; - l- 1 :1 nan-um5:1. 9 Jr 1., 3. :15. a. 1. 2' uld'rrw'h'nln Area Description 1 RC5 menu. 2 Scroll bar. 3 Window toolbar. Descriptions are provided below: Icon Function Edit entity data. Exports entity data in . format 3 Opens the target page linked to the entity.$ee "Target page" on page 24 . r?r 4 Photo of the target linked to the entity. It is the first image captured by the webcam by default. 5 List of target identification data identified by evidence or manually added. 5 Table with the most frequently contacted people and most frequently yisited websites based on the selected period. Double-click to open the page of evidence for that data. 3' Search period. 3 Map indicating: 0 last position acquired from the target, 0 places most frequently visited in the selected period, it manually entered places visited by the target. 9 RC5 status bar Analyst?s Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. 72
Page 86 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - To learn more To learn more For interface element descriptions See "Shared interface elements and actions" on page 11 . To learn more on intelligence see "What you should know about intelligence" on pope 53 see "What you should lmow about entities? on pope 53 Adding the target photo To add the photos: Step Action 1 . Click and select a photo or in the Evidence page open webcam tvpe evidence details and select an image Result: the selected image becomes the default image. Adding target identi?cation data To add identi?cation data: Step Action 1 Click and enter data. NOTE: the Account field is the target's true identity the Name ?eld in an optional name to be linked to the identification data John). Result: the identification data is added to the list. Viewing contacted people To view frequently contacted people: Step Action 1 Select the period of interest 2 In the text box next to Most contacted, enter the number of people per type of communication means to be viewed. Analvst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. ?3
RC5 9 - To learn more To learn more For interface element descriptions See "Shared interface elements and actions" on page 11 . To learn more on intelligence see "What you should know about intelligence" on pope 53 see "What you should lmow about entities? on pope 53 Adding the target photo To add the photos: Step Action 1 . Click and select a photo or in the Evidence page open webcam tvpe evidence details and select an image Result: the selected image becomes the default image. Adding target identi?cation data To add identi?cation data: Step Action 1 Click and enter data. NOTE: the Account field is the target's true identity the Name ?eld in an optional name to be linked to the identification data John). Result: the identification data is added to the list. Viewing contacted people To view frequently contacted people: Step Action 1 Select the period of interest 2 In the text box next to Most contacted, enter the number of people per type of communication means to be viewed. Analvst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. ?3
Page 87 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - 1 ul'iewing most frequently 1:.risited websites Step Action 3 Press Enter on the keyboard. Result: the information on the people most frequently contacted in the selected period appears in the table, see "Target entity details" on page .76 1'ii'iewing most frequently 1yisited websites To view the most frequently visited websites: Step Action 1 Select the period of interest 2 In the text box next to Most visited websites, enter the number of websites to be viewed. 3 Press Enter on the keyboard. Result: the information on the websites most frequently visited in the selected period appears in the table, see "Target entity details" on page 2'6 Connecting the Target entity with a frequently contacted person To connect the Target entity with a frequently contacted person: Step Action 1 In the Most Contacted table, click Add as Entity in the required row and enter data. Result: a Person entity with the selected identi?cation data is added to the list of operation entities along with a Peer link with the Target entity. NOTE: the result is the same if a Person entity is manually created with the table identi?cation data and a Peer link added between the Target and created entity. Connecting the target to a frequently visited website To connect the target to a frequently yisited website: Analyst?s Guide yer.1.4 SE P-2013 RC3 9 2013 - pag. T4
RC5 9 - 1 ul'iewing most frequently 1:.risited websites Step Action 3 Press Enter on the keyboard. Result: the information on the people most frequently contacted in the selected period appears in the table, see "Target entity details" on page .76 1'ii'iewing most frequently 1yisited websites To view the most frequently visited websites: Step Action 1 Select the period of interest 2 In the text box next to Most visited websites, enter the number of websites to be viewed. 3 Press Enter on the keyboard. Result: the information on the websites most frequently visited in the selected period appears in the table, see "Target entity details" on page 2'6 Connecting the Target entity with a frequently contacted person To connect the Target entity with a frequently contacted person: Step Action 1 In the Most Contacted table, click Add as Entity in the required row and enter data. Result: a Person entity with the selected identi?cation data is added to the list of operation entities along with a Peer link with the Target entity. NOTE: the result is the same if a Person entity is manually created with the table identi?cation data and a Peer link added between the Target and created entity. Connecting the target to a frequently visited website To connect the target to a frequently yisited website: Analyst?s Guide yer.1.4 SE P-2013 RC3 9 2013 - pag. T4
Page 88 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 ?lilies-L.r the last acquired posi?on Step Action 1 In the Most 1yisited websites table, click Add as Entity in the required row and enter data. Result: a Virtual entity with the selected URL is added to the list of operation entities along with 3 Peer link with the Target entity. I I NOTE: the result is the same if a Virtual entity is manually created with the table URL address and a Peer link added between the Target and created entity. View the last acquired position To view the target's last position on the map: Step Action 1 Select the Last position combo box. Result: a blue flag indicates the corresponding position. Viewing frequently 1yisited places To view frequently visited places on the map: Step Action 1 Select the Most 1yisited places combo box. Result: the most visited positions are displayed on the map with red flags. Adding a Position entity 1H'isited by the target To manually add 3 Position entity visited by the target: Analyst?s Guide yer.1.4 SE P-2013 RC3 9 2013 - pag. 75
RC5 9 ?lilies-L.r the last acquired posi?on Step Action 1 In the Most 1yisited websites table, click Add as Entity in the required row and enter data. Result: a Virtual entity with the selected URL is added to the list of operation entities along with 3 Peer link with the Target entity. I I NOTE: the result is the same if a Virtual entity is manually created with the table URL address and a Peer link added between the Target and created entity. View the last acquired position To view the target's last position on the map: Step Action 1 Select the Last position combo box. Result: a blue flag indicates the corresponding position. Viewing frequently 1yisited places To view frequently visited places on the map: Step Action 1 Select the Most 1yisited places combo box. Result: the most visited positions are displayed on the map with red flags. Adding a Position entity 1H'isited by the target To manually add 3 Position entity visited by the target: Analyst?s Guide yer.1.4 SE P-2013 RC3 9 2013 - pag. 75
Page 89 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - Target entity details Step Action 1 In the map, click and enter data. Ii? Tip: add a significant Name and a Description that no.4: help to identify the relationship between the target and place. Result: a Position entity with a Peer link with the Target entity is added to the operation list of entities. NOTE: the result is the same if a Position entity is manually created and a Peer link added between the Target and the created entity. Target entity details Most contacted people table Following is a description of the data indicated in the table of people most frequently contacted by the target: Data Description first communication method icon and the person's identification data. column second col- number of target contacts with the person in the selected period. umn third col- percent of target communications with the person in the selected periodNOTE: calculations are based on the comm unlcatlon mean and considering the displayed contacts. button to create a Person entity with that identification data and to create a peer - link with the target entity. Most visited websites table Following is a description of the data indicated in the most yisited websites table: Data Description first column yisited website URL address. second col- number of target yisits to the website in the selected period. umn Analyst?s Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. 76
RC5 9 - Target entity details Step Action 1 In the map, click and enter data. Ii? Tip: add a significant Name and a Description that no.4: help to identify the relationship between the target and place. Result: a Position entity with a Peer link with the Target entity is added to the operation list of entities. NOTE: the result is the same if a Position entity is manually created and a Peer link added between the Target and the created entity. Target entity details Most contacted people table Following is a description of the data indicated in the table of people most frequently contacted by the target: Data Description first communication method icon and the person's identification data. column second col- number of target contacts with the person in the selected period. umn third col- percent of target communications with the person in the selected periodNOTE: calculations are based on the comm unlcatlon mean and considering the displayed contacts. button to create a Person entity with that identification data and to create a peer - link with the target entity. Most visited websites table Following is a description of the data indicated in the most yisited websites table: Data Description first column yisited website URL address. second col- number of target yisits to the website in the selected period. umn Analyst?s Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. 76
Page 90 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - Person entity details Date Description third col- percent of target visits to the website in the selected periodNOTE: calculated considering the displayed websites. button to create a Virtual entity with that URL address and to create a Peer link - with the Target entity. Person entity details a Intelligence section, double-click on operation, double-click a Person entityr To View entity details: Purpose This function lets you: view detailed information on the Person entity add detailed information on the Person entity create Position entities connected to the Person entity II 0 0 NOTE: the function requires a user license and is only enabled if the user has Entity management authorization. What the function looks like This is what the page looks like: 9 up?. .-.1 "In akin-.1? inn-I'm. a El -.. .I Jane ?TV-ll I I ?yew-u um fang]: a. .. .. Analyst?s Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. 77
RC5 9 - Person entity details Date Description third col- percent of target visits to the website in the selected periodNOTE: calculated considering the displayed websites. button to create a Virtual entity with that URL address and to create a Peer link - with the Target entity. Person entity details a Intelligence section, double-click on operation, double-click a Person entityr To View entity details: Purpose This function lets you: view detailed information on the Person entity add detailed information on the Person entity create Position entities connected to the Person entity II 0 0 NOTE: the function requires a user license and is only enabled if the user has Entity management authorization. What the function looks like This is what the page looks like: 9 up?. .-.1 "In akin-.1? inn-I'm. a El -.. .I Jane ?TV-ll I I ?yew-u um fang]: a. .. .. Analyst?s Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. 77
Page 91 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 -To learn more Area Description 1 RC5 menu. 2 Scrollbar. 3 Window toolbar. Descriptions are provided below: icon Function Edit entity data. Exports entity data in . format is 4 Photos of the person linked to the entity. 5 List of identification data for people linked to with the entity. 5 Map indicating positions connected to the entity. 7 RC5 status bar. To learn more For interface element descriptions See "Shared interface elements and actions" on page 11 . To learn more on intelligence see "What you should know about intelligence? on page 53 see "What you should know about entitles? on page 53 Adding a person's picture To add an image: Step Action 1 Click and select a photo Result: the selected image becomes the default image. Adding a person's identi?cation data To add identi?cation data: Analyst?s Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. l8
RC5 9 -To learn more Area Description 1 RC5 menu. 2 Scrollbar. 3 Window toolbar. Descriptions are provided below: icon Function Edit entity data. Exports entity data in . format is 4 Photos of the person linked to the entity. 5 List of identification data for people linked to with the entity. 5 Map indicating positions connected to the entity. 7 RC5 status bar. To learn more For interface element descriptions See "Shared interface elements and actions" on page 11 . To learn more on intelligence see "What you should know about intelligence? on page 53 see "What you should know about entitles? on page 53 Adding a person's picture To add an image: Step Action 1 Click and select a photo Result: the selected image becomes the default image. Adding a person's identi?cation data To add identi?cation data: Analyst?s Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. l8
Page 92 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - Adding a Position entity 1urisjted by the entity Step Action 1 Click and enter data. 0 NOTE: the Account field is the person's actual identity the Name field is an optional name to be linked to the identification data John). Result: the identification data is added to the list. Adding a Position entity yisited by the entity To manually add a Position entity visited by the entity: Step Action 1 In the map, click and enter data. Tip: add a significant Name and a Description that Mini help to identify the relationship between the person and place. Result: a Position entity with a Peer link with the Person entity is added to the operation list of entities. NOTE: the result is the same if a Position entity is manually created and a Peer link added between the Person entity and the created entity. Position entity details To View entityr details: Intelligence section, double-click on operation, double-click 2: Position entity Purpose This function lets you: i view detailed information on the Position entity 1 add a photo of the place linked to the entity NOTE: the function requires a user license and is only enabled if the user has Entity management authorization. What the function looks like This is what the page looks like: Analyst?s Guide 1..rer.1.-4l SE P-2013 RC3 9 2013 - pag. T9
RC5 9 - Adding a Position entity 1urisjted by the entity Step Action 1 Click and enter data. 0 NOTE: the Account field is the person's actual identity the Name field is an optional name to be linked to the identification data John). Result: the identification data is added to the list. Adding a Position entity yisited by the entity To manually add a Position entity visited by the entity: Step Action 1 In the map, click and enter data. Tip: add a significant Name and a Description that Mini help to identify the relationship between the person and place. Result: a Position entity with a Peer link with the Person entity is added to the operation list of entities. NOTE: the result is the same if a Position entity is manually created and a Peer link added between the Person entity and the created entity. Position entity details To View entityr details: Intelligence section, double-click on operation, double-click 2: Position entity Purpose This function lets you: i view detailed information on the Position entity 1 add a photo of the place linked to the entity NOTE: the function requires a user license and is only enabled if the user has Entity management authorization. What the function looks like This is what the page looks like: Analyst?s Guide 1..rer.1.-4l SE P-2013 RC3 9 2013 - pag. T9
Page 93 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 -To learn more wu- El?l-l :rmdm: Inn-Imam DIM-CH1 u::nln.- l- mom11as". ., 4} Jll'lL 4?9- f: I. I I. :14. a 1v, F, 3? "ii. '4 i q. 53mm ,2 an? q- -.I Area Description 1 RC5 menu. 2 Scroll bar. 3 Window toolbar. Descriptions are provided below: icon Function Edit entity data. E. Exports entity data in . format is 4 Photo of the place linked to the entity. 5 Map indicating the place linked to the entity. 5 RC5 status bar. To learn more For interface element descriptions See "Shared interface elements and actions" on page 11 . To learn more on intelligence see "What you should know about intelligence? on page 53 . Adding a picture of the site To add an image: Analyst?s Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. 80
RC5 9 -To learn more wu- El?l-l :rmdm: Inn-Imam DIM-CH1 u::nln.- l- mom11as". ., 4} Jll'lL 4?9- f: I. I I. :14. a 1v, F, 3? "ii. '4 i q. 53mm ,2 an? q- -.I Area Description 1 RC5 menu. 2 Scroll bar. 3 Window toolbar. Descriptions are provided below: icon Function Edit entity data. E. Exports entity data in . format is 4 Photo of the place linked to the entity. 5 Map indicating the place linked to the entity. 5 RC5 status bar. To learn more For interface element descriptions See "Shared interface elements and actions" on page 11 . To learn more on intelligence see "What you should know about intelligence? on page 53 . Adding a picture of the site To add an image: Analyst?s Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. 80
Page 94 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - 1 ulirmal entity details Step Action 1 Click and select an image. Result: the selected image becomes the default image. Virtual entity details To View er'rtityr detaiis: a Intelligence section, double-click an operation, double-click a Virtual entity Purpose This function lets you: . yiew detailed information on the Virtual entity 1. add detailed information on the Virtual entity NOTE: the function requires a user license and is only enabled if the user has Entity management authorization. What the function looks like This is what the page looks like: ?l?l?l Sputum: low-Imam Bach's-m1 i- awn-m1 i- ?EHern'nJ' i- a Hr .111 Discussion Forum 'ltl'J Mr 'lu.1l n: nun- Ili Inau- Areo Description 1 RES menu. 2 Scroll bar. Analyst?s Guide 1..ier.1.-4l SE P-2013 RC3 9 2013 - peg. 81
RC5 9 - 1 ulirmal entity details Step Action 1 Click and select an image. Result: the selected image becomes the default image. Virtual entity details To View er'rtityr detaiis: a Intelligence section, double-click an operation, double-click a Virtual entity Purpose This function lets you: . yiew detailed information on the Virtual entity 1. add detailed information on the Virtual entity NOTE: the function requires a user license and is only enabled if the user has Entity management authorization. What the function looks like This is what the page looks like: ?l?l?l Sputum: low-Imam Bach's-m1 i- awn-m1 i- ?EHern'nJ' i- a Hr .111 Discussion Forum 'ltl'J Mr 'lu.1l n: nun- Ili Inau- Areo Description 1 RES menu. 2 Scroll bar. Analyst?s Guide 1..ier.1.-4l SE P-2013 RC3 9 2013 - peg. 81
Page 95 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 -To learn more Area Description 3 Window toolbar. Descriptions are provided below: icon Function Edit entity data. Exports entity data in . format up 4 Image of the address content linked to the entity. 5 List of web addresses linked to the entity. 5 Map indicating the position of the web address automatically identified by the system via IP address. 3' RC5 status bar. To learn more For interface element descriptions See "Shared interface elements and actions? on page 11 . To learn more on intelligence see "What you should know about intelligence? on page 53 see "What you should know about entities? on page 53 Adding an image of the web address To add images: Step Action 1 Click and select an image. Result: the selected image becomes the default image. Adding web addresses to the entity To add web addresses to the entity: Step Action 1 Click and enter data. Result: the address is added to the list. Analyst?s Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. 82
RC5 9 -To learn more Area Description 3 Window toolbar. Descriptions are provided below: icon Function Edit entity data. Exports entity data in . format up 4 Image of the address content linked to the entity. 5 List of web addresses linked to the entity. 5 Map indicating the position of the web address automatically identified by the system via IP address. 3' RC5 status bar. To learn more For interface element descriptions See "Shared interface elements and actions? on page 11 . To learn more on intelligence see "What you should know about intelligence? on page 53 see "What you should know about entities? on page 53 Adding an image of the web address To add images: Step Action 1 Click and select an image. Result: the selected image becomes the default image. Adding web addresses to the entity To add web addresses to the entity: Step Action 1 Click and enter data. Result: the address is added to the list. Analyst?s Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. 82
Page 96 from Hacking Team RCS 9 Analyst’s Guide
8 Monitoring the target's activities from the Dashboard resentatio Introduction The Dashboard helps vou to monitor connected agent activities and the incoming evidence flovv. Content This section includes the following topics: What you should know about the Dashboard 34 Monitoring evidence [Dashboard] 35 litnalvst ver.1.?i - Riff} 9 - 2C-1'ilri'; HT - peg. 83
8 Monitoring the target's activities from the Dashboard resentatio Introduction The Dashboard helps vou to monitor connected agent activities and the incoming evidence flovv. Content This section includes the following topics: What you should know about the Dashboard 34 Monitoring evidence [Dashboard] 35 litnalvst ver.1.?i - Riff} 9 - 2C-1'ilri'; HT - peg. 83
Page 97 from Hacking Team RCS 9 Analyst’s Guide
RC3 9 - What 1vou should know about the Dashboard What you should know about the Dashboard Dashboard Components The Dashboard is made up of one or more elements selected by the user from: 0 operation 0 target .- agent Each element shows the total amount of evidence collected. Values are updated at each Red number: amount of evidence received at last 1- Black number: amount of evidence received since login. Example Description Operation evidence: Operation targets and the amount of evidence per target appear. a 1 1 Ed TEST Timeline Target evidence: The target's evidence and the amount of evidence per tvpe appear. Elsi: Agent evidence: The agent's evidence and the amount of evidence per tvpe appear. 1? El El?n NOTE: the lack of numbers indicates that evidence has not yet arrived since login. To view the complete list of evidence types see "List of types of evidence" on page 46 . Evidence alert process The evidence alert process is described below: Analvst?s Guide ver.1.4 SE P-2013 RC5 9 2013 - pag. 34
RC3 9 - What 1vou should know about the Dashboard What you should know about the Dashboard Dashboard Components The Dashboard is made up of one or more elements selected by the user from: 0 operation 0 target .- agent Each element shows the total amount of evidence collected. Values are updated at each Red number: amount of evidence received at last 1- Black number: amount of evidence received since login. Example Description Operation evidence: Operation targets and the amount of evidence per target appear. a 1 1 Ed TEST Timeline Target evidence: The target's evidence and the amount of evidence per tvpe appear. Elsi: Agent evidence: The agent's evidence and the amount of evidence per tvpe appear. 1? El El?n NOTE: the lack of numbers indicates that evidence has not yet arrived since login. To view the complete list of evidence types see "List of types of evidence" on page 46 . Evidence alert process The evidence alert process is described below: Analvst?s Guide ver.1.4 SE P-2013 RC5 9 2013 - pag. 34
Page 98 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - Monitoring evidence [Dashboard] Phase Description 1 The Analyst adds the operation, target or agent elements whose evidence is to be monitored to the Dashboard. 2 The system updates counters the next time agents are if evidence is received. 3 The Analyst checks the most recent evidence, those indicated by the red number. To view details, click on the corresponding icon. 4 The system resets numbers when the user exits the current session. Monitoring evidence (Dashboard) To monitor received - Dashboard section evidence: Purpose The Dashboard lets you monitor certain operations, targets or agents and view incoming evidence. Settings are fully customizable. For example, a Dashboard can be set to only monitor some target devices. 1li?li'hat the function looks like This is what the page looks like: ITI DI ?.'Iilr i-ii-HI inm' -'-Iii Iisn't-I11 :paul dM'irrci can: r'I; tie-and: a G) I M1111 El M5 I'll'llil'?di'll'll'l?IIH ThinTusLTiIm-Ilinv lulu-NI 1 'ul -I- ?53 life rafma?e'of?a you, Analyst?s Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 85
RC5 9 - Monitoring evidence [Dashboard] Phase Description 1 The Analyst adds the operation, target or agent elements whose evidence is to be monitored to the Dashboard. 2 The system updates counters the next time agents are if evidence is received. 3 The Analyst checks the most recent evidence, those indicated by the red number. To view details, click on the corresponding icon. 4 The system resets numbers when the user exits the current session. Monitoring evidence (Dashboard) To monitor received - Dashboard section evidence: Purpose The Dashboard lets you monitor certain operations, targets or agents and view incoming evidence. Settings are fully customizable. For example, a Dashboard can be set to only monitor some target devices. 1li?li'hat the function looks like This is what the page looks like: ITI DI ?.'Iilr i-ii-HI inm' -'-Iii Iisn't-I11 :paul dM'irrci can: r'I; tie-and: a G) I M1111 El M5 I'll'llil'?di'll'll'l?IIH ThinTusLTiIm-Ilinv lulu-NI 1 'ul -I- ?53 life rafma?e'of?a you, Analyst?s Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 85
Page 99 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 -To learn more Area Description 1 RC5 menu. 2 Window toolbar. Descriptions are provided below: icon Description - Add a new element to be monitored. Shrink or expand all Dashboard element windows. It 3 Keys used to shrink or delete elements from the dashboard. 4 Dashboard element name and description. 5 Last element date. In progress: in progress. Idle: not in progress 5 Evidence recently acquired in an operation, target or agent. 7 RC5 status bar. To learn more For interface element descriptions See "Shared interface elements and actions? on page 11 . For more information on the Dashboard see "What you should know about the Dashboard? on page 84 . Adding an element to the Dashboard To add a new element to the Dashboard: Step Action 1 Click Add to Dashboard: a window opens to search for elements to be added. 2 Enter part of the element name or description to be added: the list of elements that match the search appears. 3 0 Select the element from the list: the element is automatically added to the Dashboard and the search window is left open for a new search. 0 Repeat steps 2 and 3 until all required elements are added. Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. 86
RC5 9 -To learn more Area Description 1 RC5 menu. 2 Window toolbar. Descriptions are provided below: icon Description - Add a new element to be monitored. Shrink or expand all Dashboard element windows. It 3 Keys used to shrink or delete elements from the dashboard. 4 Dashboard element name and description. 5 Last element date. In progress: in progress. Idle: not in progress 5 Evidence recently acquired in an operation, target or agent. 7 RC5 status bar. To learn more For interface element descriptions See "Shared interface elements and actions? on page 11 . For more information on the Dashboard see "What you should know about the Dashboard? on page 84 . Adding an element to the Dashboard To add a new element to the Dashboard: Step Action 1 Click Add to Dashboard: a window opens to search for elements to be added. 2 Enter part of the element name or description to be added: the list of elements that match the search appears. 3 0 Select the element from the list: the element is automatically added to the Dashboard and the search window is left open for a new search. 0 Repeat steps 2 and 3 until all required elements are added. Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. 86
Page 100 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 -Uiewing evidence indicated in the Dashboard Step Action 5 After adding elements, click 3? to close the search window and return to the Dashboard. Viewing evidence indicated in the Dashboard To view Dashboard evidence NOTE: click a target or operation to open the selected object's work area where the Analyst can view the required agents. Step Action 1 For the operation element: 0 double-click the target to open the target page. See "Target page? on page 24 For the target element: 0 double-click the agent: the agent page opens.$ee gent page? on page 29 . For the agent element: 0 double-click the evidence type: the evidence page appears. See "Evidence analysis Evidence)" on page 36 Analvst?s Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 87
RC5 9 -Uiewing evidence indicated in the Dashboard Step Action 5 After adding elements, click 3? to close the search window and return to the Dashboard. Viewing evidence indicated in the Dashboard To view Dashboard evidence NOTE: click a target or operation to open the selected object's work area where the Analyst can view the required agents. Step Action 1 For the operation element: 0 double-click the target to open the target page. See "Target page? on page 24 For the target element: 0 double-click the agent: the agent page opens.$ee gent page? on page 29 . For the agent element: 0 double-click the evidence type: the evidence page appears. See "Evidence analysis Evidence)" on page 36 Analvst?s Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 87
Page 101 from Hacking Team RCS 9 Analyst’s Guide
Alert resentatio Introduction Alerts signal when eyidence is receiyed, agents are or entities are automatically created or connected by the system, Furthermore, they let you automatically tag evidence and links for analyses and export, Content This section includes the following topics: What you should know about alerts .39 Alerting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30 Alert data ._93 ?tnelyst'stiiuide yer.1.4 - RICE. - 201393 - peg. 88
Alert resentatio Introduction Alerts signal when eyidence is receiyed, agents are or entities are automatically created or connected by the system, Furthermore, they let you automatically tag evidence and links for analyses and export, Content This section includes the following topics: What you should know about alerts .39 Alerting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30 Alert data ._93 ?tnelyst'stiiuide yer.1.4 - RICE. - 201393 - peg. 88
Page 102 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - What 1vou should know about alerts What you should know about alerts What are alerts During the investigation phase, being "alerted" on special events that concern the target in real- time via e-mail or notification on RCS Console, can be helpful. Alerts can be received when: . new evidence arrives the agent . entities are automaticallv created and connected (intelligence) For example, if awaiting evidence from a target for a long time, an alert rule can be created to send an e-mail and record a log for each piece of evidence received. This wav, users are immediatelv notified when the target resumes activities. The rule can be disabled later and evidence can sim be viewed as it arrives. Or, if intelligence is used, it could be helpful to be "alerted" when a link is created with a certain entitv or a new entitv is created in the operation. Alert rules Alert rules set which events generate alerts. They can also be used to automaticallv assign levels of relevance to evidence or intelligence links which can be used in the analysis phase. Alert rule application field Rules that alert the arrival of evidence can be created on the following levels: 1. Operation: all evidence for all operation targets 1- Target: all evidence for all target agents 1- Agent: all agent evidence Rules that alert the automatic creation of an intelligence entity can be created on the following levels: . Operation: alerts when an entity is created for that operation Rules that alert the automatic creation of an intelligence link can be created on the following levels: 1- Operation: alerts when a link is created for anv entitv in the operation 1- Entitv: alerts when a link is created for that entity 6? NOTE: each user will be alerted according to the? SET Analvst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 89
RC5 9 - What 1vou should know about alerts What you should know about alerts What are alerts During the investigation phase, being "alerted" on special events that concern the target in real- time via e-mail or notification on RCS Console, can be helpful. Alerts can be received when: . new evidence arrives the agent . entities are automaticallv created and connected (intelligence) For example, if awaiting evidence from a target for a long time, an alert rule can be created to send an e-mail and record a log for each piece of evidence received. This wav, users are immediatelv notified when the target resumes activities. The rule can be disabled later and evidence can sim be viewed as it arrives. Or, if intelligence is used, it could be helpful to be "alerted" when a link is created with a certain entitv or a new entitv is created in the operation. Alert rules Alert rules set which events generate alerts. They can also be used to automaticallv assign levels of relevance to evidence or intelligence links which can be used in the analysis phase. Alert rule application field Rules that alert the arrival of evidence can be created on the following levels: 1. Operation: all evidence for all operation targets 1- Target: all evidence for all target agents 1- Agent: all agent evidence Rules that alert the automatic creation of an intelligence entity can be created on the following levels: . Operation: alerts when an entity is created for that operation Rules that alert the automatic creation of an intelligence link can be created on the following levels: 1- Operation: alerts when a link is created for anv entitv in the operation 1- Entitv: alerts when a link is created for that entity 6? NOTE: each user will be alerted according to the? SET Analvst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 89
Page 103 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - Alert process Alert process The alert process is described below: NOTE: sending an e-mail is optional. Phase Description 1 The Analyst creates rules to be alerted of the arrival of certain evidence, agent or the automatic creation of intelligence entities or links. Rules log the alerts, notify them on the RC5 Console and send them via e-m ail (optional). 2 The system taps the incoming evidence or analvzes the element it is creating and compares it with the alert rules. if the corresponds The svstem saves the evidence as evidence or adds the entity or to an alert link to the operation, generating an alert that autom aticallv applies rule the selected level of relevance. An e-m ail notification can be sent lav the system as an option. does not The system saves the evidence as evidence or adds the entity or correspond link to the operation without generating an alert. to an alert rule 3 The Analvst receives an alert e-m ail (if set lav the alert rule) and checks the alert log. From an alert, directlv open the evidence that generated it or the created entitv or the link view. 4 After checking, the Analvst deletes the alert logs. To receive eieris from the tar- I Alerting section get: Purpose This function lets you: receive alerts when a certain type of evidence is tapped, when the target device svn- chronizes with RES or when intelligence autom aticallv creates entities or entitv links. automaticallv tag evidence or intelligence link by relevance, to facilitate later analvsis. monitor all logged alerts and directlv open the event that generated them. Analvst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - peg. 90
RC5 9 - Alert process Alert process The alert process is described below: NOTE: sending an e-mail is optional. Phase Description 1 The Analyst creates rules to be alerted of the arrival of certain evidence, agent or the automatic creation of intelligence entities or links. Rules log the alerts, notify them on the RC5 Console and send them via e-m ail (optional). 2 The system taps the incoming evidence or analvzes the element it is creating and compares it with the alert rules. if the corresponds The svstem saves the evidence as evidence or adds the entity or to an alert link to the operation, generating an alert that autom aticallv applies rule the selected level of relevance. An e-m ail notification can be sent lav the system as an option. does not The system saves the evidence as evidence or adds the entity or correspond link to the operation without generating an alert. to an alert rule 3 The Analvst receives an alert e-m ail (if set lav the alert rule) and checks the alert log. From an alert, directlv open the evidence that generated it or the created entitv or the link view. 4 After checking, the Analvst deletes the alert logs. To receive eieris from the tar- I Alerting section get: Purpose This function lets you: receive alerts when a certain type of evidence is tapped, when the target device svn- chronizes with RES or when intelligence autom aticallv creates entities or entitv links. automaticallv tag evidence or intelligence link by relevance, to facilitate later analvsis. monitor all logged alerts and directlv open the event that generated them. Analvst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - peg. 90
Page 104 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - What the function looks like 1ll?ll'hat the function looks like This is what the page looks like: -I .p-nr - . All-tnn5'1: 1? Ia.? Area Description 1 RC5 menu. Alarth indicates the amount of alerts received. The counter is automatically reset after two weeks or when noti?cations are deleted. 2 Alert rule toolbar. Descriptions are provided below: icon Description Create a new alert rule. NOTE: the function is only enabled if the user has Alerts creation authorization. EdIt the selected alert rule. Delete the selected alert rule. CAUTION: crii generated noti?cations ore deie ted. I Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. 91
RC5 9 - What the function looks like 1ll?ll'hat the function looks like This is what the page looks like: -I .p-nr - . All-tnn5'1: 1? Ia.? Area Description 1 RC5 menu. Alarth indicates the amount of alerts received. The counter is automatically reset after two weeks or when noti?cations are deleted. 2 Alert rule toolbar. Descriptions are provided below: icon Description Create a new alert rule. NOTE: the function is only enabled if the user has Alerts creation authorization. EdIt the selected alert rule. Delete the selected alert rule. CAUTION: crii generated noti?cations ore deie ted. I Guide yer.1.4 SE P-2013 RC8 9 2013 - pag. 91
Page 105 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 -To learn more Area Description 3 Alert log toolbar. Descriptions are provided below: icon Description Delete the selected alert log. xx Delete all alert logs. 4 RCS menu. To learn more For interface element descriptions See "Shared interface elements and actions? on page 11 . For a description of the data in this window see "Alert data on next page For more information on alertssee "What you should know about alerts? on page 89 . Adding a rule to be alerted A rule must be set in order for you to be alerted: Step Action 1 Click New Alert: data entry fields appear. 2 0 Enter the required data indicating the alert method in Type. 0 Select the Enabled box to apply the rule. 3 Click Save: the new alert rule appears in the main work area. An alert is sent as soon as the system logs an event that matches the rule. Editing an alert rule To edit an alert rule Step Action 1 Select the alert rule to be edited Click Edit: the data to be edited appears. 2 0 Edit data. 0 Select the Enabled box to immediately apply the rule. Guide 1uer.1.4 SE P-2013 RC8 9 2013 - pag. 92
RC5 9 -To learn more Area Description 3 Alert log toolbar. Descriptions are provided below: icon Description Delete the selected alert log. xx Delete all alert logs. 4 RCS menu. To learn more For interface element descriptions See "Shared interface elements and actions? on page 11 . For a description of the data in this window see "Alert data on next page For more information on alertssee "What you should know about alerts? on page 89 . Adding a rule to be alerted A rule must be set in order for you to be alerted: Step Action 1 Click New Alert: data entry fields appear. 2 0 Enter the required data indicating the alert method in Type. 0 Select the Enabled box to apply the rule. 3 Click Save: the new alert rule appears in the main work area. An alert is sent as soon as the system logs an event that matches the rule. Editing an alert rule To edit an alert rule Step Action 1 Select the alert rule to be edited Click Edit: the data to be edited appears. 2 0 Edit data. 0 Select the Enabled box to immediately apply the rule. Guide 1uer.1.4 SE P-2013 RC8 9 2013 - pag. 92
Page 106 from Hacking Team RCS 9 Analyst’s Guide
RES - Adding a rule to automaticallv tag certain evidence or certain intelligence links between entities Step Action 3 Click Save: the new alert rule appears in the main work area. An alert is sent as soon as the svstem logs an event that matches the rule. Adding a rule to automaticallv tag certain evidence or certain intelligence links between entities To automaticallv tag certain evidence or certain link without logging or sending alerts: Step Action 1 Click New Alert: data entrv fields appear. 2 . Setting criteria to select evidence or links . In Tvpe select None. . In Relevance set the relevance level . Select the Enabled box to apva the rule. 3 Click Save: the new alert rule appears in the main work area. As soon as the svstem receives evidence matching this rule, the evidence is tagged. Viewing events matching the logged alert To view evidence matching an alert: Step Action 1 Select the alert rule with at least one log {Logs column}: all logged alerts appear in the list. 2 Double?click on the row in the logged alert list. Result: it directlv opens: . the list of evidence that generated the alert {Evidence event}. . entitvdetails{Entitv event} - link view {Link event} Alert data Alert rule data Alert rule data is described below: ver.1.4 SE RES 2CI13EI -pag. 93
RES - Adding a rule to automaticallv tag certain evidence or certain intelligence links between entities Step Action 3 Click Save: the new alert rule appears in the main work area. An alert is sent as soon as the svstem logs an event that matches the rule. Adding a rule to automaticallv tag certain evidence or certain intelligence links between entities To automaticallv tag certain evidence or certain link without logging or sending alerts: Step Action 1 Click New Alert: data entrv fields appear. 2 . Setting criteria to select evidence or links . In Tvpe select None. . In Relevance set the relevance level . Select the Enabled box to apva the rule. 3 Click Save: the new alert rule appears in the main work area. As soon as the svstem receives evidence matching this rule, the evidence is tagged. Viewing events matching the logged alert To view evidence matching an alert: Step Action 1 Select the alert rule with at least one log {Logs column}: all logged alerts appear in the list. 2 Double?click on the row in the logged alert list. Result: it directlv opens: . the list of evidence that generated the alert {Evidence event}. . entitvdetails{Entitv event} - link view {Link event} Alert data Alert rule data Alert rule data is described below: ver.1.4 SE RES 2CI13EI -pag. 93
Page 107 from Hacking Team RCS 9 Analyst’s Guide
RC5 9 - Alert rule data Data Description Lugs (only in a table) Am ount of noti?cations received matching the rule. Enabled Enables or disables the alert rule. Event Type of event that triggers the alert: 1: Evidence: triggers the rule when evidence that meets the criteria below arrives. Sync: triggers the rule when the agent indicated below runs syn- chronization. Instance: triggers the rule when the agent created (instanced) by the fac- tory indicated below runs the first Entity: triggers the rule when the system automatically creates a new intelligence entity in the indicated operation. . Link: triggers the rule when the system automatically creates a link between intelligence entities in an operation or with the indicated entity. path operation, target, entity, agent and factory to be monitored. Thus it indicates the rule application field. For example, for Evidence event, if an operation is selected, all operation evidence is monitored. If an agent is selected, that agent's evidence is monitored. Evidence (only Evidence type events) Type of evidence that generates alerts. r: Tip: indicates all types of evidence. . For a description of all types see "List of types of evidence" on page 46 (only Evidence type events) Keyword that the evidence must contain to trigger the alert. For example, keyword "password" creates an alert when the evidence (audio, docum ent) contains the word "password". Tag (only Evidence or Link type events) Automatically tags evidence or the link with different levels of relevance to facilitate analysis: Icon Description Eli: lvlaximum relevance. 11 Intermediate relevance. Normal relevance. Minimum relevance. No relevance. Analyst?s Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 94
RC5 9 - Alert rule data Data Description Lugs (only in a table) Am ount of noti?cations received matching the rule. Enabled Enables or disables the alert rule. Event Type of event that triggers the alert: 1: Evidence: triggers the rule when evidence that meets the criteria below arrives. Sync: triggers the rule when the agent indicated below runs syn- chronization. Instance: triggers the rule when the agent created (instanced) by the fac- tory indicated below runs the first Entity: triggers the rule when the system automatically creates a new intelligence entity in the indicated operation. . Link: triggers the rule when the system automatically creates a link between intelligence entities in an operation or with the indicated entity. path operation, target, entity, agent and factory to be monitored. Thus it indicates the rule application field. For example, for Evidence event, if an operation is selected, all operation evidence is monitored. If an agent is selected, that agent's evidence is monitored. Evidence (only Evidence type events) Type of evidence that generates alerts. r: Tip: indicates all types of evidence. . For a description of all types see "List of types of evidence" on page 46 (only Evidence type events) Keyword that the evidence must contain to trigger the alert. For example, keyword "password" creates an alert when the evidence (audio, docum ent) contains the word "password". Tag (only Evidence or Link type events) Automatically tags evidence or the link with different levels of relevance to facilitate analysis: Icon Description Eli: lvlaximum relevance. 11 Intermediate relevance. Normal relevance. Minimum relevance. No relevance. Analyst?s Guide ver.1.4 SE P-2013 RC8 9 2013 - pag. 94
Page 108 from Hacking Team RCS 9 Analyst’s Guide
RCS 9 - Log data Data Description Type Tvpe of alert to be received when evidence arrives: . Log: alert logged and noti?ed on the RC5 Console. . Mail: e-mail and alert logged . None: no logged alert nor e-mail. Useful to automaticallv tag evidence by relevance (Tag) suppression (onlv Mail tvpe alerts) Latencv time for sending identical alert e-mails. Used to Time avoid identical e- mails after the first. For example, if the target has not communicated its evidence for a while and e-m ail alert was selected, vou may be bombarded with e-mails when the first evidence arrives. Set a 30- minute Suppression time to receive one e-m ail even; 30 minutes. NOTE: this setting onlv limits e-mail deliverv. Events are alvvavs logged. Log data Alert logs are described below: Data Description Date alert time-date. path Range of action from which the alert was generated. For example, if a target was selected in the rule Path, the name of the target and the name of the operation it belongs to will appear here. Info Quantity and type of events that generated the alert. Analvst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 95
RCS 9 - Log data Data Description Type Tvpe of alert to be received when evidence arrives: . Log: alert logged and noti?ed on the RC5 Console. . Mail: e-mail and alert logged . None: no logged alert nor e-mail. Useful to automaticallv tag evidence by relevance (Tag) suppression (onlv Mail tvpe alerts) Latencv time for sending identical alert e-mails. Used to Time avoid identical e- mails after the first. For example, if the target has not communicated its evidence for a while and e-m ail alert was selected, vou may be bombarded with e-mails when the first evidence arrives. Set a 30- minute Suppression time to receive one e-m ail even; 30 minutes. NOTE: this setting onlv limits e-mail deliverv. Events are alvvavs logged. Log data Alert logs are described below: Data Description Date alert time-date. path Range of action from which the alert was generated. For example, if a target was selected in the rule Path, the name of the target and the name of the operation it belongs to will appear here. Info Quantity and type of events that generated the alert. Analvst?s Guide ver.1.4 SE P-2013 RC3 9 2013 - pag. 95
Page 109 from Hacking Team RCS 9 Analyst’s Guide
]Hacki?gTeam[ HT 5.r.l. via della Moscova, 13 RES 9 Analyst's Guide 20121 Milano (M Analyst's Guide 1.4 SE P-2013 Italy COPYRIGHT 2013 tel.: 39 02 29 060 603 info@hackingteam.com fax:+ 39 02 63 113 946
]Hacki?gTeam[ HT 5.r.l. via della Moscova, 13 RES 9 Analyst's Guide 20121 Milano (M Analyst's Guide 1.4 SE P-2013 Italy COPYRIGHT 2013 tel.: 39 02 29 060 603 info@hackingteam.com fax:+ 39 02 63 113 946