Outline - Project 3 - Mobile Incident Response and Investigations
Outline - Project 3 - Mobile Incident Response and Investigations
Outline - Project 3 - Mobile Incident Response and Investigations
Outline
Student’s Name
Institution Affiliations
Professor’s Name
Course
Date
2
The advancement of mobile technology started as a simple idea that will enhance
communication wirelessly.
Simple mobile phones later evolved to mobile computers with the ability to conduct
Mobile technology such as tablets, laptops, and other devices have become an important
Communication through mobile phones entails the transmission of RF signals that are
Mobile phones have two-way radios that enable simultaneous transmission and reception
This entails what happens when a phone call or mobile communication is made.
When a cell phone is turned on, it traces the System Identification Code (SID) and the
The Mobile Switching Centers or MSC entails the foundation or the basis of the network
switching subsystem.
The MSC deals with different functions such as setting up calls, releasing, and routing.
Besides, it routes the messaging services, managing the conference calls, service billing,
In the inter-BSC handover and on detecting that mobile phone device is heading to the
edge of its base cell, the BSC requests handover assistance from the MSC.
The base switching subsystem is a part of the GSM network and is made of two devices
that include the Base Transceiver Station (BTS) and the Base Station Controller (BSC).
The BTS transmits and receives radio signals from the antennas and has encryption and
The BSC is a critical component in the mobile network controller that works alongside
the BTS.
Form Factors
Mobile devices are defined by their capabilities and physical components that enhance
The specifications and characteristics associated with mobile phone hardware are the
form factors.
Smart Devices
Smart devices have become more integrated into many aspects of people's daily lives.
They developed from their ideas, such as smartphones, and went to areas such as
Smart devices are normally integrated into personal, business, and government
operations.
When making consideration of other wireless technologies, Wi-Fi and Bluetooth need to
Some of the major trends in mobile technology that have developed recently include IoT
applications.
The handset transmission types involve three methods used by cell phone networks in the
information transformation.
They include the Frequency Division Multiple Access (FDMA), the Code Division
Multiple Access (CDMA), the Time Division Multiple Access (TDMA), and the Global
Mobile devices need an operating system to execute their functions and capabilities in
communications.
Mobile operating systems are entrenched in every mobile device that varies in brands.
One of the most recognized mobile operating systems is the Apple iOS, which is
proprietary and not an open-source OS designed by Apple Inc. for all the mobile devices
it manufactures.
Challenges
The first challenge is dealing with many different devices in the investigation.
5
The third challenge involves the connectors because mobile devices use different kinds of
connectors.
The fourth challenge comes with the operating system that changes very fast.
The fifth challenge is cloud data, whereby valuable data in the forensic investigation is
The last challenge is for the forensic investigator to know the best toolkit for different
Threats
The topmost threats to mobile devices include data leakage, network spoofing, unsecured
When a mobile device is under forensic investigation, the investigator can use embedded
systems on electronic devices such as gaming consoles, music players, global positioning
devices, and personal data assistants to identify reliable digital evidence to present in the
court of law.
Federal and State government provides laws and regulations for conducting a sound
investigation.
Legal counsel in the investigation process needs to respect the preservation of digital data
Laws governing digital or mobile forensics include the Fourth Amendment, which
Forensic investigators need to develop documents showing that the device is to be used
for analysis.
This entails creating the chain of custody form for the device in hand to track the
Investigative Techniques
The non-invasive technique includes manual extraction, use of device interface, logical
extraction, and the JTAG method that extracts data by connecting the device to Test
Access Ports.
The invasive techniques include the chip-off method that gets data straight from the
device memory chip and the micro-read method that gets the data manually from the
Chip-offs- iSeasamo phone opening tool, chip epoxy glue remover, circuit board holder,
Logical extraction-lantern, SRY logical and oxygen forensic suite (Hua, 2019).
applications, call history, internet details, media, notes, lists, calendars, passwords,
File systems organize files in the mobile device, applications, and OS. Today, consumers
The Apple iOS file system is usually APFS, while the Android OS uses the ext4.
The android OS is examined using the FTK imaging tool. Every OS uses SQLite to store
information. These tools can be used to retrieve current and historical data that could
Third-Party Applications
They are important in conducting forensic investigations due to their diversity in storing
personal information such as calls, messages, and media files such as photos.
Data Carving
Data carving entails the reconstruction of raw files without using metadata or other
guidance.
8
Data carving is usually based on the premise that deleted files from a computer or mobile
device can only be deleted logically but can still be acceded by assembling the residual
File Systems
The four common types of file systems include FAT 32, Extended File System (EXT),
Compound document files work just like the file systems, enabling them to manage the
The main tools used in the examination include Olefile or the Exiftool.
think rapidly changing technology and users' awareness are the biggest threats.