Forensic challenge in mobile network

Assignment Help Computer Network Security
Reference no: EM13780087

Forensic Challenge

School authorities have filed a case to the police department that a student is missing from last 4 days. Police were able to track  some of the information from his mobile network provider like last calls, texts & MMS and from the traffic authorities, they were able to give some pictures that they found .  They found his mobile phone in his room. As a forensic investigator how you trace out the missing student. The police want to find weather they can find any information like did he get any influenced by something or did any one targeted the student by kidnapping. As an investigator you have to find out what is the information that we can get from the student mobile phone.

Make: Motorola Model: V3 (g8.5/9/18/19)

S/W Version: 0E:40.7CR

IMEI: 354904001234567

 SIM: 89302720123456781234

Phone Number: 897-883-3411

 

What are the evidences to be collected of the missing student?   

  As a forensic investigator firstly we have to know the details of the student like height, color and which dress he is wearing during the time of missing as his mobile is found in his room. It is easy to trace by checking the details in his mobile.

 Every object belonging to him should be suspected as he is using mobile, if we check the mobile phone some of the information can be found by examining his mobile, it is found that the data in the mobile is erased completely. Such that if erased data is retrieved we can get the information regarding his missing.

How can the data be retrieved from the Mobile phone

 First take the pictures of the mobile. Check mobile content page by page checking the contact list. If any suspicious names are found note them down and check the images in the mobile and also make a copy of the data from mobile phone to system through USB cable. So that it will be useful in the investigation .As it is seen that all the texts are deleted we have to retrieve the texts to find out what information is there in the texts.

Investigation

  The mobile phone sim card is useful in the investigation. It is useful to extract data, it should be removed from the mobile and attached to the forensic workstation's USB port and copy the data from the sim card to find any data is found and also make a copy of it.

Sim card readers such as USB sim card reader is available for download in the internet by using this software we can restore previously deleted contact list with name and numbers. When a file is deleted, the operating system merely deletes the corresponding pointers in the file table and marks the space occupied by the file as free. The reality is that the file is not deleted and the data it contained still remains on the drive.

Mobile Description

Now that the device in question is known to be the suspect's, gathering key information continues. It only takes a few minutes to note the following: Date/Time device was taken from suspect: May 19st, 2015 at 4pm

Make: Motorola Model: V3 (g8.5/9/18/19)

S/W Version: 0E:40.7CR

IMEI: 354904001234567

 SIM: 89302720123456781234

Phone Number: 897-883-3411

 Information stored in the following databases that would be useful includes the following:  

  • Contacts
  • SMS (Text messages)
  • Calendar
  • Phone Call Logs

 • Phone Hotlist

 • Saved Email Messages

  • Browser Bookmarks
  • Browser URLs

 • Pictures

  • Quick Contacts
  • Map Locations

 • Folders (Email messages are sorted into their respective folder)

 • Email Settings

Tools which the investigator can use to retrieve data from the mobile phone is

AcessData FTK imager

AcessData FTK imager is used to retrieve data from the mobile phone when the texts or images are deleted and by using AcessData FTK imager the messages are retrieved. It is found that he texted to his friend.

  Logical Analysis

   We should take back up of the files for that logical analysis can be used with this it is possible to backup all the present data in the mobile without rooting using android debug bridge.

With the help of the above tools the information is retrieved and found that the information like the student left the school as he got less marks, this information was found in the deleted messages from the mobile phone which are retrieved, in that a message was sent to a friend saying that he is coming to his place .This message is helpful to find out the location of the person to which the text was sent with the help of network service providers and can trace out the missing person.

Reference no: EM13780087

Questions Cloud

Deploy a major update to a mobile application : Database upgrade: This is a project to upgrade several databases to the latest version to enhance manageability, while minimizing downtime.
Family dynamics play a major role in how children develop : Analyze the role that family structure, expectations, parenting styles, and involvement of caregivers played in your development. Reflect on your experiences and share any that you are comfortable sharing. You can use questions such as the followi..
Specific contemporary social problem : Summarize your views on how a specific contemporary social problem is having an impact on your workplace or on workplaces known to you. Identify the problem, and describe what you see as the causes, impacts, and possible solutions to the problem.
Integrated marketing communications (imc) issues : Discuss the components of content marketing and how each component contributes to the integrated marketing communications (IMC).
Forensic challenge in mobile network : As a forensic investigator firstly we have to know the details of the student like height, color and which dress he is wearing during the time of missing as his mobile is found in his room. It is easy to trace by checking the details in his mobile..
How valuable are employee benefit plans : How Valuable Are Employee Benefit Plans?
Compare and contrast the roles the prison system : Compare and contrast the roles the prison system, the family, and the social stratification system play in either contributing to or alleviating the problem of crime.
Identify different segments of market for launching product : A firm has developed a new roofing material that also produces electricity from sunlight. This material is very light and inexpensive. Besides roofing, it could also provide an inexpensive carport roof covering for open-air parking lots. Identify dif..
Develop a thesis pertaining to the assigned film text : Develop a thesis pertaining to the assigned film text and whether or not it, the film, in your view has the power to transform one's political sensibilities.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Describe common security concerns inherent to wired

Describe common security concerns inherent to wired, wireless, and mobile networking.

  The set of laws rules directives and practices that

1.the set of laws rules directives and practices that regulate how an organization manages protects and distributes

  Abc institute of research has sensitive information that

abc institute of research has sensitive information that needs to be protected from its rivals. the institute has

  Outline the various security threats

Develop a strategy no more than 5-6 pages in length. The strategy should outline the various security threats that are specific to Web Security and explain how each effect the consumer, the business, and the potential applications in use.

  Describe the crypto dilemma

AcmeStore is interviewing candidates for the position of Chief Information Officer (CIO). They are asking candidates to describe briefly how they would satisfy AcmeStore's requirements as stated above. How would a successful candidate respond?

  How do you plan to validate the data after acquiring it

What diplomatic strategies should you use with the network administrator and what privacy issues might be a concern with bank records (bank account numbers, customer names, etc.)?

  Assessment of the risks associated with collection

Identify and provide an assessment of the risks associated with collection, processing, and storage of confidential client information (loss of confidentiality).

  Find information about threats and malware active today

From the first e-Activity, analyze the selected two (2) resources that are available for security professionals to find information about threats and / or malware active today

  Examine the quick finance company network diagram and

above is the quick finance company network diagram. the company is a small business and does not invest much in

  Analysis of the network security

You have just been hired as the security administrator of a major organization that was recently breached by a social engineer. After a thorough analysis of the network security, you have determined that there was no security plan in place and no ..

  Analyze the security of the system compriosing the size of

alice has a picture-based password system where she has each user pick a set of their 20 favorite pictures say of cats

  Beat the hacker

A honeypot can be a useful for discovering some of the hacking trends occurring within an organization. Of course, there have to be certain measures placed upon its operation, maintenance, and the reconnaissance information obtained as a result.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd