Forensic challenge in mobile network

Assignment Help Computer Network Security
Reference no: EM13780087

Forensic Challenge

School authorities have filed a case to the police department that a student is missing from last 4 days. Police were able to track  some of the information from his mobile network provider like last calls, texts & MMS and from the traffic authorities, they were able to give some pictures that they found .  They found his mobile phone in his room. As a forensic investigator how you trace out the missing student. The police want to find weather they can find any information like did he get any influenced by something or did any one targeted the student by kidnapping. As an investigator you have to find out what is the information that we can get from the student mobile phone.

Make: Motorola Model: V3 (g8.5/9/18/19)

S/W Version: 0E:40.7CR

IMEI: 354904001234567

 SIM: 89302720123456781234

Phone Number: 897-883-3411

 

What are the evidences to be collected of the missing student?   

  As a forensic investigator firstly we have to know the details of the student like height, color and which dress he is wearing during the time of missing as his mobile is found in his room. It is easy to trace by checking the details in his mobile.

 Every object belonging to him should be suspected as he is using mobile, if we check the mobile phone some of the information can be found by examining his mobile, it is found that the data in the mobile is erased completely. Such that if erased data is retrieved we can get the information regarding his missing.

How can the data be retrieved from the Mobile phone

 First take the pictures of the mobile. Check mobile content page by page checking the contact list. If any suspicious names are found note them down and check the images in the mobile and also make a copy of the data from mobile phone to system through USB cable. So that it will be useful in the investigation .As it is seen that all the texts are deleted we have to retrieve the texts to find out what information is there in the texts.

Investigation

  The mobile phone sim card is useful in the investigation. It is useful to extract data, it should be removed from the mobile and attached to the forensic workstation's USB port and copy the data from the sim card to find any data is found and also make a copy of it.

Sim card readers such as USB sim card reader is available for download in the internet by using this software we can restore previously deleted contact list with name and numbers. When a file is deleted, the operating system merely deletes the corresponding pointers in the file table and marks the space occupied by the file as free. The reality is that the file is not deleted and the data it contained still remains on the drive.

Mobile Description

Now that the device in question is known to be the suspect's, gathering key information continues. It only takes a few minutes to note the following: Date/Time device was taken from suspect: May 19st, 2015 at 4pm

Make: Motorola Model: V3 (g8.5/9/18/19)

S/W Version: 0E:40.7CR

IMEI: 354904001234567

 SIM: 89302720123456781234

Phone Number: 897-883-3411

 Information stored in the following databases that would be useful includes the following:  

  • Contacts
  • SMS (Text messages)
  • Calendar
  • Phone Call Logs

 • Phone Hotlist

 • Saved Email Messages

  • Browser Bookmarks
  • Browser URLs

 • Pictures

  • Quick Contacts
  • Map Locations

 • Folders (Email messages are sorted into their respective folder)

 • Email Settings

Tools which the investigator can use to retrieve data from the mobile phone is

AcessData FTK imager

AcessData FTK imager is used to retrieve data from the mobile phone when the texts or images are deleted and by using AcessData FTK imager the messages are retrieved. It is found that he texted to his friend.

  Logical Analysis

   We should take back up of the files for that logical analysis can be used with this it is possible to backup all the present data in the mobile without rooting using android debug bridge.

With the help of the above tools the information is retrieved and found that the information like the student left the school as he got less marks, this information was found in the deleted messages from the mobile phone which are retrieved, in that a message was sent to a friend saying that he is coming to his place .This message is helpful to find out the location of the person to which the text was sent with the help of network service providers and can trace out the missing person.

Reference no: EM13780087

Questions Cloud

Deploy a major update to a mobile application : Database upgrade: This is a project to upgrade several databases to the latest version to enhance manageability, while minimizing downtime.
Family dynamics play a major role in how children develop : Analyze the role that family structure, expectations, parenting styles, and involvement of caregivers played in your development. Reflect on your experiences and share any that you are comfortable sharing. You can use questions such as the followi..
Specific contemporary social problem : Summarize your views on how a specific contemporary social problem is having an impact on your workplace or on workplaces known to you. Identify the problem, and describe what you see as the causes, impacts, and possible solutions to the problem.
Integrated marketing communications (imc) issues : Discuss the components of content marketing and how each component contributes to the integrated marketing communications (IMC).
Forensic challenge in mobile network : As a forensic investigator firstly we have to know the details of the student like height, color and which dress he is wearing during the time of missing as his mobile is found in his room. It is easy to trace by checking the details in his mobile..
How valuable are employee benefit plans : How Valuable Are Employee Benefit Plans?
Compare and contrast the roles the prison system : Compare and contrast the roles the prison system, the family, and the social stratification system play in either contributing to or alleviating the problem of crime.
Identify different segments of market for launching product : A firm has developed a new roofing material that also produces electricity from sunlight. This material is very light and inexpensive. Besides roofing, it could also provide an inexpensive carport roof covering for open-air parking lots. Identify dif..
Develop a thesis pertaining to the assigned film text : Develop a thesis pertaining to the assigned film text and whether or not it, the film, in your view has the power to transform one's political sensibilities.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Describe as the explosive growth in digital crime

Name at least three factors that have lead to what some authors describe as the "explosive growth" in digital crime and cyber victimization. Provide some examples of what an individual can do to reduce the chance of becoming a victim.

  Infa 640 cryptology and data protection

Suppose that Eve runs a key server.  Alice downloads a key from the key server which Eve claims is Bob’s public key.  Bob downloads a key from the key server which Eve claims is Alice’s public key.

  Server program receives a newline character

The server program receives a NewLine character sent from the client, it will display a message like 'Line from the client: - How much will it be to get some help with this small portion of the assignment?

  What is the principle of adequate protection

What is the principle of adequate protection? Do you agree with the principle? What difficulties are associated with implementing it?

  You are the information security officer at a medium-sized

you are the information security officer at a medium-sized company 1500 employees. the cio asks you to explain why you

  Identify physical security methods and the role

Identify physical security methods and the role they play in a network security plan. Compare and contrast the advantages and disadvantages of the physical security methods you identified.

  Case study incident-response policy-gem infosys

Case Study Incident-Response Policy; Gem Infosys, Gem Infosys, a small software company, has decided to better secure its computer systems after a malware attack shut down its network operations for 2 full days

  How the network infrastructure is more secure

The CIO asks you to explain why you believe it is important to secure the Windows and Unix/Linux servers from known shortcomings and vulnerabilities. Explain to your CIO what you can do to make sure the network infrastructure is more secure.

  Examine the quick finance company network diagram and

above is the quick finance company network diagram. the company is a small business and does not invest much in

  Define ethical issues related to information technology

Locate a news article based on a recent event on ethical issues related to information technology. For example, Wikileaks, Snowden, etc.

  Write down a 4 to 5 page paper in which you make a plan for

your sister owns a small clothing store. during a conversation at a family dinner she mentions her frustration with

  What is the value of shared secret key

You have secretly picked the value SA = 17. You begin the session by sending Bob your calculated value of TA. Bob responds by sending you the value TB = 291. What is the value of your shared secret key?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd