Mobile Technology and Security Forensic

Running head: MOBILE TECHNOLOGY AND SECURITY FORENSICS 1
Mobile Technology and Security Forensic
Name
Institution
MOBILE TECHNOLOGY AND SECURITY FORENSICS 2
Abstract
The focus of information technology has shifted away from the desktop and laptop computers
and become more mobile with innovations in the palm of individuals hands. Being widespread
across every sector of the society, the latest generation of mobile technology is becoming
increasingly utilized. Rather than being used as phones, mobile technology can be applied as
computers due to their powerful computing capabilities, large screens, capacious memories, and
open operating systems that promote and support the development of applications. The mobile
computing has exponentially grown in importance over the past few years. The technology is
transcending common interfaces, banking, business, education, law enforcement, government,
and other sectors in the country. While emerging mobile technologies offer various benefits to
the society, organizations, and individuals, there is an indispensable necessity of raising
awareness on the increasing security, privacy, and probable negative consequences that relate to
the speedy embrace of these technologies. Complicating this further, mobile devices are a target
for criminals to exploit cyber weaknesses while also being an elusive means to coordinate,
sustain, or execute an attack. The rapid development of innovation and embracing new
technologies, applications, and hardware continue to be a challenge for digital forensics and
investigations. This paper provides an objective overview of the digital security forensic and
mobile technology and incident response capabilities for a law enforcement entity that has
limited the understanding and the capacity of the latter. The paper describes mobile investigative
challenges and the techniques and technologies available to perform mobile forensic
examinations. Besides, the personal perspective on the future is expounded in the paper.
Key words: mobile technology, security, mobile forensic, innovation.
MOBILE TECHNOLOGY AND SECURITY FORENSICS 3
Mobile Technology and Security Forensic
Mobile Technology Overview
Mobile technology can be said to be a set of devices that are utilized for cellular
communication. However, for the law enforcement community, the more appropriate definition
would be applications that are both transportable and provide immediate access to a wide range
of information. With various types of mobile technology devices that are accessible today, it is
becoming increasingly apparent that the industry is less location dependent and more portable
like never before. On April 3, 1973, Martin Cooper, a leading engineer at Motorola, made the
world first cell phone call when he called an opponent telecommunication firm and told them
that he was talking through a mobile phone. Cooper was using a phone that weighed 1.1
kilograms, and its dimensions were 228x127x44 mm. Such a kind of the prototype device took
approximately ten hours to charge for 30 minutes of talk-time. Several years later during the
1980s, first business mobile phones referred to as Motorola DynaTAC 8000X that was released
by Motorola Company. The device could store 30 phone numbers, was on standby for six hours,
and provided roughly 30 minutes of talk time ("April 3, 1973: Motorola Calls AT&T ... by Cell,"
2017).
Automated analog cellular networks around the world are referred to as the 1G. It was
first created and deployed in Tokyo in the year 1979 and was vastly spread throughout Japan. In
the same year, Denmark, Finland, Norway, and Sweden also received 1G. It took approximately
two more years before the 1G technology was launched in the United States. The first such a
network in the Northern part of America was referred to as Advanced Mobile Phone System
(AMPS). Significant issues of security arose from such a kind of the network. However, in 1993,
the problems of privacy did not stop the world’s first cell phone from launching the 1G network.
MOBILE TECHNOLOGY AND SECURITY FORENSICS 4
At this point, the consumers could not care about security, and they just call people across the
nation and thought that it was great since they owned a mobile phone.
Despite flaws including the heavy weight, the lower battery life, and the high price tag,
the DynaTAC mobile phone was outrageously successful. The old AMPS by the year 1990 was
substituted by Digital AMPS. Its services were closed across the Northern part of America by
2008. This marked the end of the AMPS era. Digital AMPS (D-AMPS) and AMPS have been
phased out in favor of GSM and CDMA2000. It gave a chance for higher capacity data transfers
for modern services called the wireless Internet access and Multimedia Messaging System. The
CDMA and GSM have allowed a wide variety of mobile devices to connect and transmit data
globally.
AMPS is based on the primary electromagnetic radiations for cellular examination by the
FCC (Federal Communications Commission). It is a typical arrangement for the analog signal
cellular mobile service unit that is used in the USA and other nations. Later, AMPS became the
widely utilized cellular system in the country. Along with the second generation of mobile
devices; the 2G cellular networks began emerging in the year 1990s. At this point, the American
and European networks started splitting and competing against each other. Both of the
arrangements utilized digital transmission technologies instead of the analogs. It allowed for
essential SMS communication and came with more benefits like faster networking and better
security.
Indubitably, the 2G networks initiated cell phone networks to individuals all over the
globe. Surprisingly, almost every person appeared to have the demand for a phone in their daily
living. After a short period, the need outshined the already available 2G technology. In this
regard, the latter could not keep companies and researchers since they wanted the higher speed
MOBILE TECHNOLOGY AND SECURITY FORENSICS 5
and to browse the Internet faster. It led to the occurrence of the 3G network throughout the
world. The first 3G system of the world was once again launched in Tokyo in May 2001.
Moving from 2G to 3G had several benefits including utilizing the packet switching instead of
the circuit switching to transmit information. Besides, it allowed for speedy transmission of data.
Without a doubt, this shift enabled the mobile devices to be fast enough to support music
streaming and online video. There were approximately 295 million users of 3G around the world
by the year 2007.
It became clear that before the end of the first decade of the 21 century, 3G networks
were overpowered by bandwidth-intensive applications. In this regard, the use of 4G network
arose as an improvement of the 3G technology. The 4G offered speeds of up to 10 times faster
than the already existing networks. WiMax and LTE 4G technologies were developed for high-
speed mobile broadband Internet services (Kumar, 2008). Both techniques allow global wireless
data connection network for laptops and mobile devices. In the cellular industry, the current LTE
has proven to be the choice for most cellular companies. LTE is compatible with previous mobile
technologies, provides the superior speed for the mobile users and improved technology for
power utilization of mobile terminals, and can better save battery life of portable terminals over
WiMax.
Understanding the evolution of mobile technology in society illustrates the need to
comprehend the types of mobile devices better ("Get to Know All of the Mobile Computing
Devices Available," 2016). Several kinds of mobile devices exist in the market. There are many
mobile tools available; some of them are highlighted below.
Laptops
MOBILE TECHNOLOGY AND SECURITY FORENSICS 6
Laptops are portable computing devices that are made to carry out the lot that a desktop
personal computer can do. The most portable and smallest notebooks have screen sizes of 13
inch or less and can weigh less than 5 pounds. Laptops are travel-friendly and exceed the
computing power of the cell phone devices.
Netbooks
Netbooks are devices that carry out and execute most of the functions of a laptop or a
desktop but in this case, it is portable. Netbooks look like mini laptops that weigh as little as two
pounds with screens that rarely exceed ten to twelve inches. Netbooks have been in existence
since the year 2008 and are characterized by different dependencies relating to a network.
Netbooks are not expensive and have long battery lives.
Tablet PCs
Tablets are a category of cell phone computing devices. They are less dependent on
weight and size and take input from touch-screen or stylus. Earlier on, tablet personal computers
ran a tablet-customized version of Windows XP and utilized pen-based computing. Currently,
tablets are abandoning running similar OS as laptops and desktops and, instead, are applying
mobile operating systems like Android and iOS. Such kinds of tablets excel at cloud computing
and provide a wealth of mobile applications.
Smartphones
Smartphones are devices that drive mobility for both consumer and professional
purposes. Android phones and iPhones are the devices that show the rapid growth in popularity.
Smartphones are proven to be more practical in the marketplace and with smaller screen sizes
than mobile Internet devices. They are large devices of communication enabling productivity
anywhere and anytime ("Get to Know All of the Mobile Computing Devices Available," 2016).
MOBILE TECHNOLOGY AND SECURITY FORENSICS 7
Personal Digital Assistant (PDA)
The last, but not the least, are the PDAs that are almost extinct. PDAs’ users exist in
small numbers. PDAs like HP Ipaq and Dell Axim are going out of favor because smartphones
can carry out their functions. The earliest adopters of PDA were the users of business, and
therefore, there is the varied business-oriented PDA software that is still in existence ("Get to
Know All of the Mobile Computing Devices Available," 2016).
The devices discussed above have been significant in the technology of mobile phones
marketplaces. Other various devices can share, create, and synchronize data and information.
These devices include personal navigation devices, digital video cameras, and gaming consoles.
A critical function of mobile technology is connectivity that offers the ability for devices
to pass information over a network. A portable or cellular network is a communication set of
connections that use the last one that is wireless. It is shared over the Earth’s areas referred to as
cells that are served by fixed-location transceivers called cell sites or base stations. In order to
eliminate interference and present guaranteed quality service contained by each cell, the latter
utilizes a distinct set of frequencies from neighboring cells. The said cells offer radio coverage
over a wide geographical area when they are joined together, thus enabling a considerable
number of mobile transceivers to communicate with one another.
Cellular Phone Technology
In mobile phone technology, signals carrying text, voice or digital information are
transmitted through radio waves from one device to the other. The data in cellular networks are
transmitted through a global network of receivers and transmitters. In this case, data is not
broadcasted to a central hub or directly from device to device (Lerner, 2013). Receiving and
transmitting of information are conducted over two distinct frequencies. Each of the base stations
MOBILE TECHNOLOGY AND SECURITY FORENSICS 8
is linked to the primary telephone connection network and, therefore, relays cell phone calls to
landline devices. Base stations are connected via a center switch that tracks and transfers calls
from one base station to the other as callers move from one cell to another. Ideally, the handoff is
unnoticeable and seamless (Lerner, 2013).
Mobile Switching Centers (MSC)
The MSC links call by switching the digital data packs from one path of the network to
the other. Besides, the MSC offers data that is required to give support to the cellular service
subscribers such as authentication of information and user registration. Furthermore, MSC keeps
a record of the locale of mobile users, administers handovers to neighboring base stations, and is
responsible for subscriber’s billing and services. To elucidate on this, a base station controller
(BSC) is an indispensable mobile network element that controls base transceivers stations (BTS)
or cell sites. A BSC removes MSC base station operation management needs, thus giving a
chance to the latter to handle crucial tasks like database management and traffic balancing.
How Mobile Phones Communicate
In real terms, mobile phones utilize radio waves to pass information. Radio waves
transfer or convey еру digitized data or voice in the form of oscillating magnetic and electric
fields that are referred to as EMFs (Electro-Magnetic Field). Radio waves travel in the air at the
speed of light and carry the information. They are transmitted in all directions. Cellular phones
are necessarily a two-way radio that comprises a radio receiver and transmitter. As an instance,
when a person chats with another individual on a mobile phone, the handset transforms a tone of
voice into an electrical signal that is conveyed via radio waves to the adjacent cell tower. The
radio waves are then transferred by the set of connections to the cell phone of another person that
then again converts the electrical signal back to the sound once again.
MOBILE TECHNOLOGY AND SECURITY FORENSICS 9
An antenna is used in receiving and transmitting particular radio wave frequencies. A
modern cell phone has more compact antennas inside. On the other hand, older generations have
extractable and external ones. Besides, modern smartphones have Bluetooth, WI-Fi, and GPS
antennas. In the devices, any metallic components may interact with transmission antennas and
lead to a pattern of the transmitted signal.
Trends in Mobile Technology
Mobile technology trends change consistently, while the whole industry is still growing
at a rapid pace. Learning new devices with evolving technology changes the landscape of mobile
technology on a yearly basis. It means that there are companies and consumers that play a part in
changing the world. When it comes to technology, especially mobile technology, the continuous
evolution strives for new heights such as mobile app development, techniques, and optimized
mobility platforms. The cloud-based mobile applications and services have enabled consumer
and business greater flexibility sharing and syncing data across mobile devices, though the
mobile trends pose a significant challenge for the law enforcement community. There are several
operating systems in the industry today. However, two are leading the way, namely Google
Android and Apple iOS.
Methods of Extracting Information from Mobile Devices
There are various techniques for extracting data and information from mobile phone
devices. The manual operation accesses the phone via the client or user’s interface. The process
is usually videotaped or photographed so that all details are documented and the chain of
protection is preserved (Kubi, Saleem & Popov, 2011). The information that can be retrieved is
the one that is available or that can be accessed through the operating system. Logical acquisition
technique is a method of information extraction that interacts with mobile devices by the use of
MOBILE TECHNOLOGY AND SECURITY FORENSICS 10
protocols like Object exchange (OBEX) and AT commands (Afonin, 2016). In this case, the data
that is reachable through the operating system is extracted. OBEX is a practice or a behavior that
is close to the binary version of the HTTP that is utilized over the communication on the Internet.
Challenges and Threats
With the ever-changing and advancing technological features, the creation and the
explosion of smartphone devices have brought the issues of security of mobile devices into the
focus. Due to the significant improvements and advancements in both the operating systems and
the hardware, such devices have rapidly become winning goals and targets for evil and malicious
attacks. Symbian, iOS, and Android, which are the advanced mobile platforms, increasingly bear
a resemblance to the traditional systems for personal computers. It means that the problems in
implementing or putting into effect the cell phone security are similar to the challenges that are
present in the personal computers platforms. Smartphones can be infected with viruses, worms,
and Trojan horses if a malicious content is installed. The aforementioned can compromise the
privacy and the security of the user, or it can even gain the total control over the gadget. It is due
to advancements in the mobile network technologies that offer mobile devices with the capability
of the constant Internet connection over Wi-Fi or 3G set of connections.
Furthermore, the improvement in the features of the smartphones has introduced new
kinds of concerns regarding security. Malicious applications can gain way in or admittance to
cameras, voice-recording devices, and location information and interrupt SMS messages by
compromising the mobile operating systems. These kinds of security infringements immensely
challenge the privacy of the users.
Mobile devices like smartphones and cell phones have become an integral part of the
daily lives of individuals. As such, the devices are prone to easing and making possible the
MOBILE TECHNOLOGY AND SECURITY FORENSICS 11
activities of criminal acts or, in short, they are involved when a crime takes place. Handheld
devices contain personal information that may include text messages, credit card numbers,
passwords, address books, memos, calendar items, videos, digital images, e-mails, and the call
history. The devices can be utilized in exchanging photos, blogs, connecting to social networks,
accessing the Internet, recording audio and video, taking notes, and communicating. Higher
transmission rates give a chance for people to transfer a considerable amount of data as the
computing power of such gadgets advances. Mobile devices fit into a bag or a pocket, and thus
an individual can carry them wherever he or she goes. It can be utilized to establish and find out
the whereabouts of a person at a specific period.
The data that is associated with and stored in mobile phones can assist in addressing
critical matters and questions in an investigation. In this case, it reveals information on whom
persons were with or have been in contact with, where they have been, and what they have been
communicating. In essence, mobile gadgets are a dynamical scheme that presents challenges
from a perspective of security forensics.
Numerous mobile devices have made it hard to create a single tool or procedure to
address all possible occurrences. There have been a massive number of low-end phones utilizing
legacy operating systems in addition to a growing variety of platforms and mobile devices
comprising of Windows Mobile, Apple iPhone, Blackberry, and Android systems. When
preserving mobiles as a source of proof or evidence, there are some specific considerations to be
made. Most of the mobile gadgets are networked devices that allow for receiving and sending
information via Wi-Fi access points, telecommunication systems, and Bluetooth. Digital
evidence can be wholly lost since it is vulnerable to be overwritten by remote destruction
commands or by new data that it receives or sends over a wireless set of connections.
MOBILE TECHNOLOGY AND SECURITY FORENSICS 12
Indubitably, it is essential to interact with the device to extract data and information. In this case,
it may alter or destroy the already available evidence.
From a legal point of view, a significant advantage of mobile devices is that they may
hold information that has been deleted even after a person tries to make it unrecoverable. Flash
memory chips usage to keep data is the underlying reason for the persistence of deleted
information on mobile gadgets. It is difficult to destroy since it is physically durable against
pressure, high temperature, and the general impact. The flash memory has restricted and
constrained a number of writes and can be erased only block by block. The cell phone waits until
a block is complete before deleting or erasing data. During a forensic investigation,
understanding probable locations on mobile devices looks at the SIM card for likely or probable
information. SIM cards consist of RAM, ROM, and a microprocessor that are assigned to a
particular ICC-ID (Integrated Circuit Card Identifier). The latter has what is referred to as the
mobile network code (MNC), the serial number of the card, and the mobile county code (MCC).
These kinds of cards are utilized to validate users on UMTS and GSM set of connections.
Furthermore, the cards have information that relates to the user and the network including
subscribers personal identification number (PIN), authentication key, and phone number.
Besides, the SIM card has an IMSI (International Mobile Subscriber Identity) that is
connected to the subscriber, and it consists of a user’s identification number, a mobile network,
and a country code. The card also may hold a Location Area Identity (LAI) and Temporary
Mobile Subscriber Identity (TMSI) that change every time a gadget moves to a new place within
the mobile set of connections. Commonly, the subscriber does not know or quickly access the
information stored on the SIM card. TMSI is mostly employed over the radio connection to keep
away from revealing the IMSI number to other individuals.
MOBILE TECHNOLOGY AND SECURITY FORENSICS 13
Regulations and Laws Governing the Search and Seizure of Mobile Devices
Specific laws and regulations govern the seizure and the search of mobile gadgets.
Mobile technology has become the mainstream of the life of the American people. Many
individuals throughout the globe spend most of their time using mobile devices and computers to
receive and send email, maintain databases, surf the Internet, and take part in other countless
activities. Regrettably, law offenders use mobile technology in negative ways. In this case, they
utilize network servers, mobile phones, and laptop computers in committing severe criminal
offenses. Indubitably, law enforcement agents and prosecutors should understand how to obtain
electronic evidence that is kept on the devices due to the drastic rise in computer-related crimes.
In criminal cases, electronic documents and records like image files, word processing data, and
email and computer network logs have been increasingly offering the relevant authority the
essential and significant evidence that, in criminal examinations, according to the United States
laws, has two primary sources including the statutory privacy laws codified at 18 U.S.C. §§
3121-27, 18 U.S.C. §§ 2510-22 and 18 U.S.C. §§ 2701- 12 and the Fourth Amendment to the
U.S. Constitution. Even though the legal issues and constitutional matters have common
characteristics in some cases, most situations present a legal problem under the three statutes or a
constitutional question under the Fourth Amendment. A seizure or an examination of property
according to the U.S Supreme Court takes place in a situation where there is the meaningful
interference with the possessory interest of the individual in that property. Besides, the court has
featured the interception of elusive or insubstantial communications as a form of attack.
Consequently, criminal investigators should make a consideration of two things when
asking if a warrant is required by a government search of a computer. First of all, they should
consider if the search or the seizure infringes a reasonable privacy expectation and if it is allowed
MOBILE TECHNOLOGY AND SECURITY FORENSICS 14
since it falls within an exemption to the obligation of a warrant. Techniques of investigation can
then be outlined in a logical or systematic approach ("Forensic Examination of Digital Evidence:
A Guide for Law Enforcement," n.d.). This preliminary step of the forensic examination is very
critical since it assists in determining the features of the incident and defines the best technology
that can be used in identifying, preserving, and gathering evidence. The next consideration is
learning the system description where an investigator begins collecting information regarding a
specific incident. The general configuration and an outline of the operating systems will then be
given, and the procedure turns the evidence acquisition. Probable sources of data are identified to
ensure the chain of custody, acquire non-volatile and volatile data, and verify the integrity of the
information (Pollitt, Noblett, Strang, Kerr & Presley, 2002).
The timeline analysis and investigation would then be developed by the agent. The
aforementioned is a critical phase and indispensable since it involves information like when files
were changed, modified, created, and accessed in a readable form. This step aims to create a
picture of the operations carried out in the system including date, source, action, and artifact
involved. The investigator then assesses the files downloaded, programs executed, browsers
used, files deleted, directories opened, and files clicked. In case the Windows system is being
analyzed, the super timeline can be created to integrate many sources into one file. Another key
step is the memory analysis that is carried out to evaluate the network connections, rogue
procedures, evidence of code injection, user handles, and process paths. Law enforcement should
be aware of the anti-forensic approaches that may impact conclusions as well as the investigation
analysis.
MOBILE TECHNOLOGY AND SECURITY FORENSICS 15
Threats in Mobile Technology
Cyber-security has many facets so it is challenging for the IT department of an
organization, law enforcement community, and telecommunications companies to understand
what to focus their energy on. There are few threats in mobile technology. The first is a need for
cell phones in the daily life, which means that people bring their devices everywhere. It is the
fact that these gadgets can be connected from almost any place. The ability to access personal
information and employer’s information makes data be in open settings for criminals. Not only
can SD cards, SIM cards, and phones be stolen, there can be clones or the steal of information
without exchanging hardware. Clone phones, skimmers, cyber-attacks are only some avenues
used to acquire the information. Connecting to a network when outside at school, in a coffee
shop, a neighbor’s house, a hotel, or a local hotspot becomes the second nature for most
Americans.
People connect to their home alarms systems, online bill pay, thermostat, automobiles,
TV, tablets, and cameras. Connectivity is a beneficial aspect of technologies that provides
convenience and efficiency. The problem is creating more opportunities to become
compromised. The society is giving the criminals the access to people’s data. There are even
countries with the state-sponsored hackers. In cyber security, the risk of being hacked is 1,
meaning that a hack will occur. Therefore, the industry is working to reduce the risk by different
measures. Though the ability of this multilevel connectivity to multiple devices and networks in
a matter of minutes is the great convenience, it provides vulnerabilities to people’s life without
their knowledge. The technology gift is also its curse.
MOBILE TECHNOLOGY AND SECURITY FORENSICS 16
Analysis and Presentation of Forensic Information
This section of the white paper expounds the presentation and analysis of digital forensic
knowledge and report. More often than not, mobile devices and computers are at the heart of
investigations and incidences. Crucial data from electronic gadgets belonging to the affected
parties can be extracted and used in the court of laws as material evidence for the jury. PC proper
investigation is carried out after the standard modernized criminological procedure that includes
investigation, examination, revealing and procurement. Custom criminology devices are utilized
during the analysis of the personal computers from inside the working structure. When managing
encryption file systems, the practice of investigation is indispensable. In this case, before the PC
is shut down, the logical hard drive volume might be imaged in a situation where the encryption
keys might be gathered.
Critical tools that can be used in analysis and investigation of digital forensic data include
recuperation of erased documents, stochastic crime scene investigation and investigation
apparatuses. Under recovery of deleted documents, we find that it is a typical strategy that is
used as part of forensic investigations. Stochastic crime scene evaluation involves exploring
information regarding the robbery. Distinct business apparatuses and open sources exist for
various mobile and PC forensic investigations.
More often than not, digital forensic investigations take standard digital phases and
procedures that comprise of acquisition, analysis, examination, and reporting. In this case,
investigations are carried out on acquired images which are mostly referred to as static data.
Various techniques are utilized during digital forensics investigations including live analysis,
cross-drive analysis, and deleted files. The live analysis involves the investigations of mobile
MOBILE TECHNOLOGY AND SECURITY FORENSICS 17
devices or computers from within the OS by use of existing sysadmin tools or custom forensics
to recover evidence. This practice is indispensable when dealing with encryption of file systems.
Deleted files are a conventional approach that is utilized in digital forensics. Most file systems
and operating systems do not remove or eliminate file data thus giving a chance to the
investigators to retrieve them from physical disk devices. On the other hand, file carving
involves reconstructing erased content and searching for the unknown file headers within the
disk picture. Cross-drive analysis is an approach that correlates data that exist on multiple hard
drives.
File System Analysis and Techniques for Working through Security Measures
Most evidence is found in the record framework of personal computers. In a circumstance
where there is little or no documentation, the record frameworks stand out to be the testing ideas
for computerized agents. Security master Brian Carrier has come up with the definitive reference
for everybody who needs to comprehend and have the capacity to affirm about how the
document framework investigation is carried out. A diagram of the examination and PC
establishments gives a definitive, outline of contemporary volume and document frameworks
that includes crucial data for recuperating erased information and approving the devices (Saukko
& Knight, 2016). On the other hand, it portrays information structures and dissects case circle
pictures.
Third-Party Applications
Third party applications are constraining agents to open their eyes to an entire distinctive
informational index which a significant number of people don't consider on cell phones. Agents
must know how to get to this data keeping in mind the end goal to acquire that evidence. While
MOBILE TECHNOLOGY AND SECURITY FORENSICS 18
there are digital devices accessible that make a decent showing with regards to pulling third party
application information, these apparatuses commonly concentrate on the most well-known
applications (Dawson & Omar, 2015). With new apps turning out each day, it is progressively
troublesome for merchants to keep up. While merchants strive to guarantee their devices are
finding and pulling information, regularly, they are ignorant that they are missing information
until somebody calls attention to out or by discovering it through manual techniques. A manual
examination is prescribed as the most dependable approach to locating information.
Data Carving, File System, and Compound File Analysis
Record cutting is a notable digital forensic investigation term used to represent the ID and
extraction of document varieties from un-allocated bunches utilizing record marks. A document
signature is a content value or numerical used to differentiate a record that is put together. The
reason for cutting is to recognize and remove (cut) the document given this mark data alone.
Scientific Explorer offers cutting backing for more than 300 record sorts. It additionally
underpins layered cutting: Bunch based record cutting in a bunch based record framework like
FAT or NTFS another document must begin in another group. After that, the document signature
shows up almost a bunch limit. Cutting rate is in this manner accomplished via looking for
document marks just close to collection limits (Saukko & Knight, 2016).
The presentation of a case report
This is the last section that will present various strategies for presenting material evidence
to a jury. There are multiple methods in which confirmation can be exhibited to a tribunal with
the goal for them to completely comprehend the way of what they are being told or appeared.
These strategies may incorporate the utilization of visual guides, video film, still photos, indexed
MOBILE TECHNOLOGY AND SECURITY FORENSICS 19
bits of proof, sound recordings and the transcripts of discussions that have occurred. Any of
these strategies might be utilized over the span of a trial and relying upon the way of the
prosecution and the seriousness of the wrongdoing. Besides, it is very critical that the jury visit
the scene of the crime and utilize digital forensic tools in analyzing data.
Biggest Threat
My perspective on the most significant threat by cyber-criminals using mobile
technology in the years to come such as Ransomware attacks increases as cyber offense goes
high tech. Ransomware is found on desktops and mobile tools, and it can also be a threat on
there. Now we are going to talk about the different kinds of mobile Ransomware. Many of
people already recognize what Ransomware is. It is extensive and most aggravating. A type of
desktop Ransomware is mainly the crypto locker where it changes your information and offers to
reinstate it if you forfeit ransom. The main blocker is another Ransomware that blocks browsers
and operating systems from functioning and needs a ransom toward return access. The desktop
blockers are small extensive than crypto Ransomware because the latter is extra well organized
at funneling cash into the hands of criminals. No crypto locker survives on Android devices
because of the operating system, as well as apps that create cloud backups. When an individual
has their files backed up, there is no need to pay a ransom, and the creators have small incentive
toward attack Android clients (Dawson & Omar, 2015).
In conclusion, new phone models are being developed internationally. The focus of
information technology has shifted away from the desktop and laptop computers and become
more mobile with technology in the palm of individuals hands. While emerging mobile
technologies offer various benefits to the society, organizations, and individuals, there is an
MOBILE TECHNOLOGY AND SECURITY FORENSICS 20
indispensable necessity of raising the awareness on the increasing security, privacy, and probable
negative consequences that relate to the speedy embrace of these technologies. This paper
provided an overview of the mobile technology and digital forensic incident response capacities
for a law enforcement entity that has constrained the capacity and the expertise with mobile
forensics. Furthermore, mobile investigative challenges, techniques, and technologies that are
available to perform the forensic examination were also discussed in this paper.
MOBILE TECHNOLOGY AND SECURITY FORENSICS 21
References
Afonin, O. (2016). Mobile forensics ' advanced investigative strategies. Packt Publishing.
April 3, 1973: Motorola calls AT&T ... by cell. (2017). Retrieved from
https://www.wired.com/2008/04/dayintech-0403/.
Dawson, M., & Omar, M. (2015). New threats and countermeasures in digital crime and
cyber terrorism.
Forensic examination of digital evidence: A guide for law enforcement. (n.d.). PsycEXTRA
Dataset. doi:10.1037/e378092004-001.
Get to know all of the mobile computing devices available. (2016). Retrieved from
https://www.lifewire.com/guide-to-mobile-computing-devices-2377708.
How do cell phones work? Pong pulse. (n.d.). Retrieved from
http://www.pongcase.com/blog/cell-phones-work/#sthash.8SPqZVwG.dpbs.
Knight, B., & Saukko, P. J. (2016). Knight's forensic pathology. Boca Raton: CRC Press,
Taylor & Francis Group.
Kubi, A. K., Saleem, S., & Popov, O. (2011). Evaluation of some tools for extracting e-
evidence from mobile devices. 2011 5th International Conference on Application of
Information and Communication Technologies (AICT).
doi:10.1109/icaict.2011.6110999.
Kumar, A. (2008). Mobile broadcasting using WiMAX: A technology overview. Mobile
Broadcasting with WiMAX, 413-438. doi:10.1016/b978-0-240-81040-9.50020-2.
Lerner, T. (2013). Mobile technology and security. Mobile Payment, 39-60. doi:10.1007/978-
3-658-03251-7_4.
MOBILE TECHNOLOGY AND SECURITY FORENSICS 22
Pollitt, M., Noblett, M., Strang, R., Kerr, O., & Presley, L. (2002). Searching and seizing
computers and obtaining electronic evidence. Cyber Forensics.
doi:10.1201/9781420000115.ch8.

Place new order. It's free, fast and safe

-+
550 words

Our customers say

Customer Avatar
Jeff Curtis
USA, Student

"I'm fully satisfied with the essay I've just received. When I read it, I felt like it was exactly what I wanted to say, but couldn’t find the necessary words. Thank you!"

Customer Avatar
Ian McGregor
UK, Student

"I don’t know what I would do without your assistance! With your help, I met my deadline just in time and the work was very professional. I will be back in several days with another assignment!"

Customer Avatar
Shannon Williams
Canada, Student

"It was the perfect experience! I enjoyed working with my writer, he delivered my work on time and followed all the guidelines about the referencing and contents."

  • 5-paragraph Essay
  • Admission Essay
  • Annotated Bibliography
  • Argumentative Essay
  • Article Review
  • Assignment
  • Biography
  • Book/Movie Review
  • Business Plan
  • Case Study
  • Cause and Effect Essay
  • Classification Essay
  • Comparison Essay
  • Coursework
  • Creative Writing
  • Critical Thinking/Review
  • Deductive Essay
  • Definition Essay
  • Essay (Any Type)
  • Exploratory Essay
  • Expository Essay
  • Informal Essay
  • Literature Essay
  • Multiple Choice Question
  • Narrative Essay
  • Personal Essay
  • Persuasive Essay
  • Powerpoint Presentation
  • Reflective Writing
  • Research Essay
  • Response Essay
  • Scholarship Essay
  • Term Paper
We use cookies to provide you with the best possible experience. By using this website you are accepting the use of cookies mentioned in our Privacy Policy.