Forensic challenge in mobile network

Assignment Help Computer Network Security
Reference no: EM13780087

Forensic Challenge

School authorities have filed a case to the police department that a student is missing from last 4 days. Police were able to track  some of the information from his mobile network provider like last calls, texts & MMS and from the traffic authorities, they were able to give some pictures that they found .  They found his mobile phone in his room. As a forensic investigator how you trace out the missing student. The police want to find weather they can find any information like did he get any influenced by something or did any one targeted the student by kidnapping. As an investigator you have to find out what is the information that we can get from the student mobile phone.

Make: Motorola Model: V3 (g8.5/9/18/19)

S/W Version: 0E:40.7CR

IMEI: 354904001234567

 SIM: 89302720123456781234

Phone Number: 897-883-3411

 

What are the evidences to be collected of the missing student?   

  As a forensic investigator firstly we have to know the details of the student like height, color and which dress he is wearing during the time of missing as his mobile is found in his room. It is easy to trace by checking the details in his mobile.

 Every object belonging to him should be suspected as he is using mobile, if we check the mobile phone some of the information can be found by examining his mobile, it is found that the data in the mobile is erased completely. Such that if erased data is retrieved we can get the information regarding his missing.

How can the data be retrieved from the Mobile phone

 First take the pictures of the mobile. Check mobile content page by page checking the contact list. If any suspicious names are found note them down and check the images in the mobile and also make a copy of the data from mobile phone to system through USB cable. So that it will be useful in the investigation .As it is seen that all the texts are deleted we have to retrieve the texts to find out what information is there in the texts.

Investigation

  The mobile phone sim card is useful in the investigation. It is useful to extract data, it should be removed from the mobile and attached to the forensic workstation's USB port and copy the data from the sim card to find any data is found and also make a copy of it.

Sim card readers such as USB sim card reader is available for download in the internet by using this software we can restore previously deleted contact list with name and numbers. When a file is deleted, the operating system merely deletes the corresponding pointers in the file table and marks the space occupied by the file as free. The reality is that the file is not deleted and the data it contained still remains on the drive.

Mobile Description

Now that the device in question is known to be the suspect's, gathering key information continues. It only takes a few minutes to note the following: Date/Time device was taken from suspect: May 19st, 2015 at 4pm

Make: Motorola Model: V3 (g8.5/9/18/19)

S/W Version: 0E:40.7CR

IMEI: 354904001234567

 SIM: 89302720123456781234

Phone Number: 897-883-3411

 Information stored in the following databases that would be useful includes the following:  

  • Contacts
  • SMS (Text messages)
  • Calendar
  • Phone Call Logs

 • Phone Hotlist

 • Saved Email Messages

  • Browser Bookmarks
  • Browser URLs

 • Pictures

  • Quick Contacts
  • Map Locations

 • Folders (Email messages are sorted into their respective folder)

 • Email Settings

Tools which the investigator can use to retrieve data from the mobile phone is

AcessData FTK imager

AcessData FTK imager is used to retrieve data from the mobile phone when the texts or images are deleted and by using AcessData FTK imager the messages are retrieved. It is found that he texted to his friend.

  Logical Analysis

   We should take back up of the files for that logical analysis can be used with this it is possible to backup all the present data in the mobile without rooting using android debug bridge.

With the help of the above tools the information is retrieved and found that the information like the student left the school as he got less marks, this information was found in the deleted messages from the mobile phone which are retrieved, in that a message was sent to a friend saying that he is coming to his place .This message is helpful to find out the location of the person to which the text was sent with the help of network service providers and can trace out the missing person.

Reference no: EM13780087

Questions Cloud

Deploy a major update to a mobile application : Database upgrade: This is a project to upgrade several databases to the latest version to enhance manageability, while minimizing downtime.
Family dynamics play a major role in how children develop : Analyze the role that family structure, expectations, parenting styles, and involvement of caregivers played in your development. Reflect on your experiences and share any that you are comfortable sharing. You can use questions such as the followi..
Specific contemporary social problem : Summarize your views on how a specific contemporary social problem is having an impact on your workplace or on workplaces known to you. Identify the problem, and describe what you see as the causes, impacts, and possible solutions to the problem.
Integrated marketing communications (imc) issues : Discuss the components of content marketing and how each component contributes to the integrated marketing communications (IMC).
Forensic challenge in mobile network : As a forensic investigator firstly we have to know the details of the student like height, color and which dress he is wearing during the time of missing as his mobile is found in his room. It is easy to trace by checking the details in his mobile..
How valuable are employee benefit plans : How Valuable Are Employee Benefit Plans?
Compare and contrast the roles the prison system : Compare and contrast the roles the prison system, the family, and the social stratification system play in either contributing to or alleviating the problem of crime.
Identify different segments of market for launching product : A firm has developed a new roofing material that also produces electricity from sunlight. This material is very light and inexpensive. Besides roofing, it could also provide an inexpensive carport roof covering for open-air parking lots. Identify dif..
Develop a thesis pertaining to the assigned film text : Develop a thesis pertaining to the assigned film text and whether or not it, the film, in your view has the power to transform one's political sensibilities.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Reasonable to compute rsa signature on long message

Would it be reasonable to compute an RSA signature on a long message by first finding what the message equals, mod n, and signing that?

  What is the order of the public key

What is the order of the public key and Which masking keys kM are possible - Decrypt the message without computing Bob's private key

  Determine with justification the equation of the curve

Determine with justification the equation of the curve and determine with justification all values oft for which there is no point (x, y) on the curve.

  The set of laws rules directives and practices that

1.the set of laws rules directives and practices that regulate how an organization manages protects and distributes

  Give the security levels top secret-secret and confidential

Give the security levels Top SECRET,SECRET,CONFIDENTIAL, and UNCLASSIFIED (order from highest to lowest), and catergories A, B,C, specify what type of access (read,write, both or neither) is allowed in each of the following situations .

  Question on security infrastructure and protocols

Question on Security infrastructure and protocols

  What is the total number of public key

An organization has 100 members. It is desired that each member of the organization be able to communicate securely with any other member, without any other member being able to decrypt their messages.

  Corporate governance and a company''s cybersecurity posture

Analyze the connection between corporate governance and a company's cybersecurity posture. Provide at least three (3) points to justify whether or not there is an impactful relationship between corporate governance and a company's cybersecurity po..

  Define cybercrimes and computer security

Evaluate how teamwork and leadership are effective tools for financial forensic investigations. Provide support for your evaluation.

  How is biometric method more beneficial than keypad

Those links are just for downloading required files. There is no work needed from any links. How is this biometric method more beneficial than keypad where the employee just presses in Pin number?

  Define information security and risk management

Recommend and expound upon a course of action in support of Information Security & Risk Management.

  Assignment on beat the hacker

A honeypot can be a useful for discovering some of the hacking trends occurring within an organization. Of course, there have to be certain measures placed upon its operation, maintenance, and the reconnaissance information obtained as a result. D..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd