Outline - Project 3 - Mobile Incident Response and Investigations

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

1

Outline

Student’s Name

Institution Affiliations

Professor’s Name

Course

Date
2

Mobile Technology Overview

 The advancement of mobile technology started as a simple idea that will enhance

communication wirelessly.

 Simple mobile phones later evolved to mobile computers with the ability to conduct

many other tasks besides making phone calls.

 Mobile technology such as tablets, laptops, and other devices have become an important

part of our daily lives.

How Mobile Phones communicate with cell sites

 Communication through mobile phones entails the transmission of RF signals that are

projected in every direction.

 Mobile phones have two-way radios that enable simultaneous transmission and reception

of radio frequencies and waves.

Cellular to Cellular Communication

 This entails what happens when a phone call or mobile communication is made.

 When a cell phone is turned on, it traces the System Identification Code (SID) and the

controlling channel to establish the connectivity.

Mobile Switching Centers

 The Mobile Switching Centers or MSC entails the foundation or the basis of the network

switching subsystem.

 The MSC deals with different functions such as setting up calls, releasing, and routing.

Besides, it routes the messaging services, managing the conference calls, service billing,

making fax and network interfacing.


3

 In the inter-BSC handover and on detecting that mobile phone device is heading to the

edge of its base cell, the BSC requests handover assistance from the MSC.

Base Switching Subsystem

 The base switching subsystem is a part of the GSM network and is made of two devices

that include the Base Transceiver Station (BTS) and the Base Station Controller (BSC).

 The BTS transmits and receives radio signals from the antennas and has encryption and

decryption equipment in communication with the BSC.

 The BSC is a critical component in the mobile network controller that works alongside

the BTS.

The technology of Mobile Networks

Form Factors

 Mobile devices are defined by their capabilities and physical components that enhance

the execution of various deliverables.

 The specifications and characteristics associated with mobile phone hardware are the

form factors.

Smart Devices

 Smart devices have become more integrated into many aspects of people's daily lives.

 They developed from their ideas, such as smartphones, and went to areas such as

smartwatches, TVs, home appliances, and security systems.

 Smart devices are normally integrated into personal, business, and government

operations.

Other Wireless Technologies


4

 When making consideration of other wireless technologies, Wi-Fi and Bluetooth need to

be prioritized. Both (Wi-Fi and Bluetooth) enable communication between devices

without having any physical connection.

Trends in Mobile Technology

 Some of the major trends in mobile technology that have developed recently include IoT

applications, block chain applications, augmented reality, virtual reality, machine

learning, artificial intelligence, mobile payments, 5G connectivity, and instant

applications. 

Handset Transmission Types

 The handset transmission types involve three methods used by cell phone networks in the

information transformation.

 They include the Frequency Division Multiple Access (FDMA), the Code Division

Multiple Access (CDMA), the Time Division Multiple Access (TDMA), and the Global

System for Mobile Communications (GSM).

Mobile Operating Systems

 Mobile devices need an operating system to execute their functions and capabilities in

communications.

 Mobile operating systems are entrenched in every mobile device that varies in brands.

 One of the most recognized mobile operating systems is the Apple iOS, which is

proprietary and not an open-source OS designed by Apple Inc. for all the mobile devices

it manufactures.

Challenges

 The first challenge is dealing with many different devices in the investigation.
5

 The second challenge emanates from the mobile device manufacturer.

 The third challenge involves the connectors because mobile devices use different kinds of

connectors.

 The fourth challenge comes with the operating system that changes very fast.

 The fifth challenge is cloud data, whereby valuable data in the forensic investigation is

not saved in the mobile device but on the cloud.

 The last challenge is for the forensic investigator to know the best toolkit for different

scenarios and the tool that extracts as much data as possible.

Threats

 The topmost threats to mobile devices include data leakage, network spoofing, unsecured

Wi-Fi, phishing attacks, improper handling of sessions, and spyware.

Embedded Device Forensics

 When a mobile device is under forensic investigation, the investigator can use embedded

systems on electronic devices such as gaming consoles, music players, global positioning

devices, and personal data assistants to identify reliable digital evidence to present in the

court of law.

Laws, Regulations, and the Forensic Handling of Mobile Devices

 Federal and State government provides laws and regulations for conducting a sound

investigation.

 Legal counsel in the investigation process needs to respect the preservation of digital data

and beware of technology associated with investigations.

 Laws governing digital or mobile forensics include the Fourth Amendment, which

protects people against unwarranted or unlawful searches under US law.


6

Considerations for Handling

 Handling a device that contains evidence in the investigation process is important.

 Forensic investigators need to develop documents showing that the device is to be used

for analysis.

 This entails creating the chain of custody form for the device in hand to track the

ownership of the evidence.

Investigative Techniques

 The non-invasive technique includes manual extraction, use of device interface, logical

extraction, and the JTAG method that extracts data by connecting the device to Test

Access Ports.

 The invasive techniques include the chip-off method that gets data straight from the

device memory chip and the micro-read method that gets the data manually from the

memory chip using the electron microscope. 

Mobile Forensic Tools

Below are tools associated with each category.

 Chip-offs- iSeasamo phone opening tool, chip epoxy glue remover, circuit board holder,

and FEITA digital inspection station.

 Hex-dumping – cellebrite UFED physical analyze, XACT, and Pandora's box.

 Micro Read- Electron Microscope

 Manual extraction- EDEC eclipse, fernico ZRT, and project-A-phone

 Logical extraction-lantern, SRY logical and oxygen forensic suite (Hua, 2019).

Location of the Evidence


7

 The kind of information residing on a mobile device includes a phonebook, messaging

applications, call history, internet details, media, notes, lists, calendars, passwords,

documents, use dictionary, system files, and deleted data.

Analysis and Presentation of Forensic Information

File System Analysis

 File systems organize files in the mobile device, applications, and OS. Today, consumers

use devices with Apple iOS and Android OS.

 The Apple iOS file system is usually APFS, while the Android OS uses the ext4.

 The android OS is examined using the FTK imaging tool. Every OS uses SQLite to store

information. These tools can be used to retrieve current and historical data that could

have been deleted.

Techniques for working through security measures

 Various ways can be used in accessing obstructed devices, including software-based,

hardware-based, and investigative.

Third-Party Applications 

 A third-party application is a common challenge encountered by forensic investigators.

 Third-party applications provide a better user experience; thus, most smartphone

environments are made from third parties.

 They are important in conducting forensic investigations due to their diversity in storing

personal information such as calls, messages, and media files such as photos.

Data Carving

 Data carving entails the reconstruction of raw files without using metadata or other

guidance.
8

 Data carving is usually based on the premise that deleted files from a computer or mobile

device can only be deleted logically but can still be acceded by assembling the residual

data as long as the file's location exists.

File Systems

 Files systems help in storing and retrieving files.

 The four common types of file systems include FAT 32, Extended File System (EXT),

and the New Technology File System (NTFS).

Compound File Analysis 

 Compound document files work just like the file systems, enabling them to manage the

file system from one file to another

 The main tools used in the examination include Olefile or the Exiftool.

Biggest Threat in Mobile Forensics

 On analyzing the potential threats posed by cyber-criminals using mobile technology, I

think rapidly changing technology and users' awareness are the biggest threats.

 In every measure of an attack, there is a countermeasure. In most cases, cyber-criminals

depend on the ignorance of the user or poor data security.

You might also like