xraymemory / haxon

Tooling to retrieve data from Axon Body Cams (aka the ones cops wear)

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

haxon

Python 3 tooling to retrieve data from Axon Body Cams. This code should work for first and second generation non-online models.

Initial tweet threads & context here https://mobile.twitter.com/d0tslash/status/1278413772680507392 https://mobile.twitter.com/unrealchill/status/1283418136738496513

How to retrieve data

Either connect your Axon if you have the cable or open it and insert the micro SD into your PC's port / adapter (see below). The filesystem won't be recognized (more on that later) but on OSX/Linux systems will be readable at a /dev/ location (in my case, /dev/disk2). Then run e.g.

python3 haxon.py /dev/disk2 ~/hax/output/location

where the first arg is the location of the SD card and the second is where you would like the data to be outputted. Haxon copies the data over using (g)dd and then foremost to reconstitute whatever files and write them to disk.

How to retrieve data: command line

(This is an alternative solution : I don't have Python, or do not want to use it)

The solution is composed of the two following commands:

dd if=/dev/disk2 of=~/hax/output/location/disk.img status=progress bs=1M

foremost -dv -i ~/hax/output/location/disk.img -T

Where /dev/disk2 is your source and ~/hax/output/location/disk.img is the output. Obviously you can change these values to anything that makes sense for you.

For information: the first command (dd) is a copy operation to save the data from the device to the selected memory space; the second command is a conversion/recovery operation to transform the data copied from the device in video format.

Why do this? // Implications

First and foremost, this evidence is collected on the public and therefore belongs to the public. Evidence should be democratized and made available to all who wish to view it in full integrity. Secondly, the nature by which we are able to extract this data reveals significant holes in the chain of custody for evidence collection. It is demonstrably simple for a party to erase footage and modify the contents of the device BEFORE any review, even by the proprietary app that is usually required to retrieve footage from these devices.

How to get the SD card

Axon Body Cams look imposing and secure but are actually quite trivial to open. Take any thin edge (box cutter, razor blade, even house keys can work) and work it flat into the ridge corners. Turn it and you should feel the housing start to give and eventually you can pop it off into two halves: the battery and the board. The "board" half will have two circuit boards, one screwed into the housing and a smaller strip secured with orange tape. Flip the smaller board and you'll see the micro SD card with a nice orange tamper tape garnish. Peel it back (but hold on to it if you feel like making your tampering "tamper-proof" later on!) and the card is yours.

TO DO

  • Make available on pypi
  • Figure out what sort of filesystem / structure the SD card uses so it can be formatted and wiped correctly
  • Dump Axon Body Cam 2 firmware and RE functionality

About

Tooling to retrieve data from Axon Body Cams (aka the ones cops wear)

License:GNU General Public License v3.0


Languages

Language:Python 100.0%