Question & Answer: Use your cell phone as the basis for this project. Write a paper of three to five pages detailing how you would…..

Need help on my assignment.

Instructions:
Use your cell phone as the basis for this project. Write a paper of three to five pages detailing how you would go about acquiring forensics data from your cell phone if you found it at a crime scene. Identify the model and manufacturer of the phone (select one you would like to have if you don’t have one), specifically identify three tools, hardware or software, which you would use for a forensic examination, and explain your reasons. Identify any applications available from the phone manufacturer or the service carrier that could be used.

Expert Answer

 

An Investigating Officer with the help of a forensic expert/scientist investigates the crime scene thoroughy.There are several techniques for searching the evidences at the scene of crime based on the type of crime scene.The Crime Scene Investigation is a long way process which takes a lot of time and labour as well..
Lab tests are entirely based on the type of evidence..Each Forensic Science Laboratory has several divisions based on the physical evidences like ” Biology” division , “Physics” division , “Chemistry”, ” Questioned Documents”, “Psychology”, etc. .So it depends on what kind of evidences have been found from the scene of crime..For eg. If a suspected blood stain is found at the scene of crime , first of all we test it for whether it is blood stain or not…Then we test for the origin of blood i.e. human blood or any animal’s blood..After this only we go for the other tests.

Mobile phone forensics is a type of electronic data gathering for legal evidence purposes. This is a useful tool for investigators as a method of gathering criminal evidence from a trail of digital data, which is often difficult to delete. Extraction of deleted mobile phone files used as criminal evidence is the primary work of mobile phone forensics investigators.

Types of mobile phone forensics include taped conversations, digital phone pictures, mobile phone texts or emails, phone number lists and sometimes even mobile phone digital video recordings. Once evidence is gathered for legal purposes, it can be saved and stored to prevent deletion or damage of important digital materials through systems developed for mobile phone data extraction. More often than not, mobile phone forensics are applied to digital data retrieval of deleted communications. These may aid legal teams or police detectives, resulting in legal evidence production and presentation.

Nearly two-thirds of the U.S. population use mobile or cell phones. Even consumer purchases of these phones are constantly increasing with the phone memory capacities being constantly increased by manufacturers. Thus allowing users to secretly take photos, record conversations or video. Some organizations offer the consumer private investigation services to extract cell phone data revealing immoral activities such as marital infidelity.

However, the most common use of mobile phone forensics is by law enforcement. Digital data trails are easily left by mobile phones, so criminals must beware. Just as computer information is never truly deleted, the same applies to mobile phone information.

Because of the development of mobile phone forensics, law enforcement can more readily identify pedophiles, stalkers or harassers through mobile phone forensics. Persons experiencing medical emergencies also benefit from these forensics. For example, state or local agencies may automatically link addresses to their mobile phones, especially useful when cell phones are used to report emergencies.

For investigators in particular, a wide array of challenges can occur during the process of mobile-phone evidence gathering. Such hurdles can include formidable file systems within mobile phones, one-of-a-kind operating systems, a plethora of network systems and network providers. Nevertheless, patented cables and connectors also add to the challenge. Proper training of such investigators can combat some of the mobile phone complexities, but it is however, difficult to keep up with the fluidity and uniqueness of mobile phone technologies.

While many law enforcement professionals viewed this decision as a setback, mobile forensic examiners are not powerless in their efforts to crack mobile devices. They can be hackers for good. Here are the five back doors to keep them a step ahead of cybercriminals:

1. Fingerprints

Although a suspect can invoke their Fifth Amendment right not to incriminate themselves by providing their password, police can have them open their iPhone Touch ID with their finger within the first 48 hours before the iPhone touch feature is disabled.

2. Siri

Even if the lock screen is on an iPhone, Siri is still enabled. You can even find a suspect’s incoming and outgoing calls, contacts and entire calendar without having to unlock or crack the phone.

3. Open Clouds

Apple recently changed messaging on iPhone devices. Messages are now end-to-end encrypted, so they can only be decrypted once they reach their destination device. Apple can only see that Person A sent a message to Person B on this date and time, but no other details.

4. Laptop

Often, unencrypted backups of a suspect’s iPhone may live on their laptop. A forensics expert can get what’s called a “pairing record,” the key that tells a phone to remember a trusted PC. Cops can sync the phone to their own computer to get the data.

5. Break-in

If none of these back doors are open, breaking in is sometimes the only way to get the potential evidence you need. In this scenario, digital forensics tools from Access Data – such as MPE+ or nFIELD – may be the best way to get forensics data from a phone. If a phone has been locked, it can still be plugged into nFIELD or MPE+. The best tool for examiners on the scene to gather initial real-time evidence is nFIELD, which is considered a triage tool for those with little to no training on the software. MPE+ takes a deeper look into the initial findings, while FTK gives a complete look back at the lab. While these tools can assist examiners, the people behind the gadgets must know how things are laid out in the device in order to get the right information.

Companies that offer technologies for mobile forensics – the art of extracting digital evidence from smartphones – face a raft of challenges developing tools in today’s breakneck mobile device market.

For one thing, short release cycles are the norm for mobile devices, meaning forensics firms must constantly update their tools to provide legal examiners solutions for current devices.

This program displays the name of the company that manufactured your network card. You can also do a reverse lookup and find the MAC addresses registered by a company.

An OUI {Organizationally Unique Identifier} is a 24-bit number that uniquely identifies a vendor or manufacturer. They are purchased and assigned by the IEEE. The OUI is basically the first three octets of a MAC address. For example, these are examples of OUI:

  • 00:00:0A — this is owned by Omron
  • 00-0D-4B — this is owned by Roku, LLC
Still stressed from student homework?
Get quality assistance from academic writers!