Mobile Incident Response and Investigations IT Research Paper
Mobile Incident Response and Investigations
“Another mobile...that’s all we’re seeing these days! We’re spending a fortune sending these
out for analysis. We need to get our folks up to speed on handling them!”
“Listen, this is what we picked up last night on 34th. Frankly, the last time our investigators did
a mobile analysis, it didn’t go so well. You’ve had a lot of experience with mobile
forensics...how about jotting down some pointers for us?”
The Sheriff has asked for a white paper on mobile forensics. As lead investigator, you are most
qualified to address the subject. You get the four major topics down on paper and begin.
The mobile platform is experiencing explosive growth, and with that growth comes cyber-incident analysis and response challenges. There are several thousand types of mobile devices, with many types of interfaces, operating systems, and connectivity options. This type of environment has many implications for the incident responder. The number of devices makes it impossible to be well versed in each one, complicating analyses. The sheer number of devices also creates a massive expense simply trying to stay abreast of the major players in the market space. Complicating this further is that mobile devices can be the target of a security incident, but mobile devices can also prove to be an elusive means to coordinate, support, or execute an attack. The nature of mobile devices presents other challenges as well, including the ability to remotely access devices and the ability to remotely wipe out evidence, an evidence destruction process that can occur rapidly in a flash memory environment.
Mobile forensics is an increasingly complex environment for investigators because of the rapid rate of innovation and adoption of new technologies, applications, and hardware. Smartphones are being used in so many different ways that they have become a central focus in digital forensic investigations. The mobile platform is a forensic challenge because of the number of third-party applications found on many devices and the rapidly evolving security measures employed by device manufacturers and application developers.
In this project, you will write a 13-page White Paper that describes the current state of mobile incident response and investigation. The context is that as a forensic investigator, you are providing an objective overview of mobile technology and digital forensics and incident response capabilities for a law enforcement unit that has limited experience and capability with mobile forensics.
Your White Paper will describe mobile investigative challenges and the techniques and technologies available to perform mobile forensic examinations. You will also provide your perspective on the future of mobile forensics -- the biggest threat to mobile forensics in years to come, and the biggest opportunity for investigators of mobile cybercrime. The most successful papers will include references to resources outside of the classroom.
There are six steps in this project. Each step focuses on one required element of the White Paper to be submitted at the end of this project. In Step 1, you will provide an overview of mobile technologies and cellular networks. Are you ready to get started?
When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission.
1.3: Provide sufficient, correctly cited support that substantiates the writer’s ideas.
1.5: Use sentence structure appropriate to the task, message, and audience.
1.6: Follow conventions of Standard Written English.
1.7: Create neat and professional-looking documents appropriate for the project or presentation.
2.1: Identity and clearly explain the issue, question, or problem under critical consideration.
10.1: Demonstrate best practices in organizing a digital forensic investigation.
11.1: Perform report creation, affidavit creation, and preparation to testify.
11.2: Demonstrate the ability to investigate Mobile Technology.
Step 1. Mobile Technology Overview.
You're ready to begin writing your White Paper. The Sheriff has stated that the first section should be an overview of how cellular networks operate. You decide to tackle the topics of how mobile phones communicate with cell sites, cellular to cellular communication, mobile switching centers, and the base switching subsystem. You also want to cover the technology of mobile networks, including form factors, smart devices, and other wireless technologies.
Submit the results of your research (3-5 pages) to the Sheriff (your instructor) for review and ungraded feedback. Incorporate any suggested changes. Your overview will serve as the introduction to the 13-21 page White Paper that you submit upon completion of this project (Step 6).
Mobile technologies are constantly changing and your department needs to keep up so you decide to address trends in mobile technology in the next section of your paper.
Step 2: Trends in Mobile Technology.
With the overview drafted, you now need to describe trends in mobile technology. For this step, you decide to address handset transmission types and mobile operating systems, as well as challenges and threats represented by mobile technology. The "Trends" section would not be complete without addressing the latest in embedded device forensics. Once you have developed the trends in the mobile technology section, you are ready to move on to considerations for the forensic handling of mobile devices.
Review this 3-5 page section of your paper for accuracy and completeness; it will serve as the second section of your final White Paper (Step 6).
Step 3: Laws, Regulations, and the Forensic Handling of Mobile Devices.
After detailing trends in mobile technology, your next step is to discuss laws and regulations governing the search and seizure of mobile devices, as well as the mobile device forensics process, including considerations for handling, investigative techniques, mobile forensic tools, and location of evidence. These subjects are important because mobile devices present unique challenges when it comes to handling and analysis, and court cases are won or lost based on the arresting officer’s understanding of legal technicalities. Upon completion of this section, you will be ready to move on to the next section of your paper: forensic tools and investigative techniques.
Review this 3-5 page section of your paper for accuracy and completeness; it will serve as the third section of your final White Paper (Step 6).
Step 4: Analysis and Presentation of Forensic Information.
You have discussed your research on laws, regulations, and forensic handling. You are now ready to create the fourth section of your White Paper where you describe the analysis and presentation of forensic information. Based on your training, you know you will need to include file system analysis, techniques for working through security measures, and third-party applications in this section. Also, you will address data carving, file system, and compound file analysis and the presentation of a case report.
Review this 3-5 page section of your paper for accuracy and completeness; it will serve as the fourth section of your final White Paper (Step 6).
Step 5: Biggest threat, most promising technology in mobile forensics.
In the previous four steps, you have reported on a variety of topics relating to mobile forensics. You have read and reported on technologies, trends, laws and regulations, handling, and analysis of mobile data. For the final section of your paper, the Sheriff has asked for your perspective on the biggest threat posed by cyber-criminals using mobile technology in the coming years, and a technology that shows promises a solution. Reflect on your in-class and outside readings, as well as your personal and professional experience, to respond to these questions. There are no right or wrong answers, but please provide references for your observations. You will be attaching this 1-page section to the White Paper that you submit in the final step of this project.
Step 6: Submit Completed White Paper: Mobile Incident Response and Investigations.
You have collected the information needed to inform your department's future decisions regarding mobile forensics. In this step, you will combine the five sections that you’ve written into a single, cohesive White Paper. Your 13-page paper should be double-spaced, excluding images and references. Please use a 12-point font and APA format. Submit your paper to TurnItIn before submission.
Include the following five sections:
1) Overview of mobile technology, including network operations and mobile technologies
2) Description of trends in mobile technology, including handset transmission types and embedded device forensics, as well as operating systems, applications, and challenges and threats to forensic investigations
3) Laws, regulations, and considerations for the forensic handling of mobile devices
4) Analysis and presentation of forensic information including file system analysis, techniques for working through security measures, third-party applications, and other forms of mobile data analysis
5) A personal perspective on the greatest biggest threat and greatest opportunity most promising technology in mobile forensics, based on in-class and outside readings, as well as personal/professional experience
Upon completion of Steps 1-5, submit your 15 pages, completed White Paper on Mobile Incident Response and Investigations to the Sheriff (your instructor) for evaluation.
Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them into your work.
1.3: Provide sufficient, correctly cited support that substantiates the writer’s ideas.
1.5: Use sentence structure appropriate to the task, message, and audience.
1.6: Follow conventions of Standard Written English.
1.7: Create neat and professional-looking documents appropriate for the project or presentation.
2.1: Identity and clearly explain the issue, question, or problem under critical consideration.
10.1: Demonstrate best practices in organizing a digital forensic investigation.
11.1: Perform report creation, affidavit creation, and preparation to testify.
11.2: Demonstrate the ability to investigate Mobile Technology.
Note:
1. Clearly stating your paper’s direction is critical. Make sure you have a thesis for your papers. Every paper must have a clear thesis statement in the introductory paragraph. Your thesis statement should alert the reader of what you plan to write or argue for. You are welcome to run thesis statements by your professor before ensure you are on the right track.
2. Just as the thesis is important, you want to make sure that each body paragraph in a paper relates to that thesis so that the paragraphs have focus. Thus, every paragraph must start with a topic sentence in your own words. The topic sentence is like a mini-thesis, relating to the main thesis, and will be the focus of that paragraph. You will not want your paragraphs, for instance, to start with author information.
3. Every paragraph in a paper will be a minimum of three sentences and will have an analysis of each idea. The analysis is critical for showing that you both understand and can apply the concepts, concurrently with your ideas. You want your ideas to be foremost in each paragraph.
4. Void first/second person is your writing. Please use the third person.
5. Avoid contractions such as "don't" or "isn't". Avoid unfocused words like “it” and “they”, spelling errors, grammatical errors, and punctuation errors. All papers are expected to be spell-checked and are expected to use appropriate English writing techniques.
6. Time of deliverable is very important in the paper as well as in text-citation, intext citation must match references.
Mobile Incident Response and Investigations
Author Name
Institutional Affiliation
Introduction
In today’s fast-paced and competitive environment, it is not possible for us to come across a person who does not have a smartphone. Some people use handheld mobile devices to plan their activities, to pay their bills, to browse the internet or social media and to respond to emails or private messages. Because of the extensive use of mobile phones, forensic investigators have started using these devices as pieces of evidence that they present to the court for hearing purposes (Reddy, 2019). They believe that mobile phones can easily hold data needed for different cases. This means an understanding of mobile phones is necessary in order to complete legal investigations. In this paper, we will outline how cell phones communicate with one another and with cell towers. We will also identify different trends of mobile phone technology and review rules and regulations and laws that we have to take care of while handling mobile phones in forensic investigations. It should be noticed that mobile phone technology is changing constantly and at a fast speed and that there are various challenges to face while analyzing data. Different terms and words will be used throughout the paper, such as cell phones, smartphone, and mobile phones. All of them have the same meaning and will be used interchangeably.
Mobile Technology Overview
We can define a mobile phone or cell phone as a handheld telephone that accesses a particular cellular radio system to let us communicate wirelessly with anyone inside or outside the country. The very first cell phone was demonstrated by Motorola in 1973. Previously, Martin Cooper and John F. Mitchell were able to use a handset or a handheld device to make phone calls, but the very first commercially available handheld phone was not presented until 1983 (Winkler & Gomes, 2017). Since long, various revolutions are being made in the way technology is serving us. In the past, mobile phones used to be simple and had only a couple of options and features, but now, mobile phones are lightweight and better than the previously marketed or presented handsets. Carrying a mobile phone nowadays is like having a smart or small computer in your pocket. In the 1980s, a handheld device was simple, but today, mini-computers are extensively used, bought, sold and liked. The computers and the devices present in the past use radio signals to communicate with their respective towers. The towers are responsible for providing signals over a wide area. These signals are also known as network. Different types of networks are now used, with each of them following its own set of rules (also called protocols). The protocols of a particular network are incompatible with another network. Two of the most common digital networks are GSM (global system for mobile communications) and CDMA (code division multiple access). The major difference between these two networks is that GSM is used internationally without any need to change the SIM card. Its operability is built in the hardware. On the other hand, CDMA works only in the United States. If you want to use it to make international calls, you will have to adjust its settings. Qualcomm has designed the CDMA technology that has made the right and appropriate use of a spread spectrum radio link. This link is responsible for spreading digital data or information using the available bandwidth. The term that is interchangeably used with CDMA is IS-95. The most common CDMA mobile phone carriers are Verizon and Sprint. The GSM cellular network was first introduced in Europe and is now being used in all parts of the world. Companies like Nokia and Erikson are relying on this type of system or network. GSM interfaces with that of TDMA technology that communicates differently from CDMA. Some of the least common digital networks include Time Division Multiple Access (TDMA), Digital Advanced Mobile Phone Service (D-AMPS) and Integrated Enhanced Network (iDEN). All of them have their own specifications, features, restrictions, and options, which are partially or totally different from other networks. Even though digital networking technology varies greatly, all these networks are organized in almost the same way. A mobile phone uses a tower to communicate with other mobile phones or similar devices. The towers are set up in a way that allows broad signals to cover a wide area, which is referred to as cell phone coverage. Every large coverage is made up of smaller areas; these areas are known as cells. Every cell stores information that is needed to make communication easy, quick and smooth. Some of the data or information that is stored is in the form of subscriber accounts, and some of the information is in the form of call logs or service contract data. Every tower has different parts, such as radio transceiver equipment, a switching system, and a controller. All these parts work together to communicate with different cell phones. They also manage the workload and are responsible for storing huge amounts of data. Every tower is connected to the base with the help of fiber optics. This can be regarded as the base switching system that acts as the backbone of the respective tower.
Now we have given sufficient details on how mobile devices or smartphones communicate with one another; it is time to dig deeper and talk about the types of mobile devices that are in use nowadays. As time has gone on, mobile phones have gotten smarter, lighter but more powerful and amazing. These days, almost all devices have RAM and better power than ordinary computer devices or laptops. People now use their devices to connect to the internet and to browse social media websites. The best part is that mobile devices are constantly updated and better versions and options are provided to the users so that they can reach out to the network that allows them to perform backups or to connect to any available WiFi and Bluetooth. This type of technology is not limited to mobile devices; almost all other devices or gadgets like tablets and laptops have started using cellular networks to make communication easier and better than ever and to store more and more data. Health trackers, home monitoring systems and smart-watches have also been launched and are newer types of technology. These are used to store both simple and complex types of data and are frequently overlooked in investigations. Depending on the nature of a case or its complexity, the investigator can use all of these technologies simultaneously or individually. The aim should be to come up with a sufficient number of proofs so that investigations are carried on smoothly and that the court is provided with a great number of proofs to determine whether or not the suspect should be punished.
Trends in Mobile Technology
The world of mobile phone technology is changing rapidly, so it is important for an investigator to stay up to date about new researches, programs, and tools before starting the investigation or examining a particular area to collect evidence from. The first trend is that new and new applications are launched; some of them are updated and the others are replaced by improved and better options (Zivic, 2011). When such an app is installed, it will be easy for the investigator to carry on investigations and he or she will not have to rely on traditional computer systems. Social media apps are another good option. These have changed the way data is stored and are known for their ability to let users share files, images and other types of data in different formats. An investigator should not trust all these applications blindly. Instead, he or she should verify the operating system and the application that is likely to be used. Updates in operating systems can cause problems for examiners because mobile service providers use these systems to patch holes. Android and iOS are two of the best-operating systems to go with. Android is an open-source system; it is easy to be modified and will help the investigator collect and store as many pieces of evidence as he or she wants. On the other hand, iOS devices are easy to be modified, but these are not in much use nowadays. When an investigator will modify the operating system, this will mean that he or she is trying to gain access to the partition of the handset or the mobile phone. This may lead the carrier to lock certain features and options. The two terms that are associated with this process or concept are rooting (for Android) and jailbreaking (for iPhone). Windows and Blackberry are also good options. These are relatively tricky devices, but once they have been used, it will be easy for the investigator to analyze data and he or she will not require any other operating system for further investigations.
It is important for an investigator to use the latest and updated versions of different tools, apps, and mobile phones. On one hand, this will benefit them because the investigator will be able to get the maximum use of the latest options and features, and on the other hand, this can pose a lot of challenges. For example, some apps and programs may not be compatible with their current mobile or computer devices and this can keep them from carrying on investigations. In addition, it can put a lot of pressure on the investigator as he or she is always required to perform thorough exams and to submit investigation reports on time. The chance is that the updated or new version of a particular mobile device, tool or application will not be understandable for the investigator, and this could keep them from working efficiently. So, the investigator should always review the details of a case and must think out of the box to collect digital evidence as soon as possible before the in-hand mo...
π Other Visitors are Viewing These APA Essay Samples:
-
Use of Access Data Tools (Forensic toolkit Investigations) Research
6 pages/β1650 words | 4 Sources | APA | IT & Computer Science | Research Paper |
-
Cybersecurity Trends. IT & Computer Science Research Paper
4 pages/β1100 words | 7 Sources | APA | IT & Computer Science | Research Paper |
-
Federal and State policy comparison IT Science Research Paper
3 pages/β825 words | 4 Sources | APA | IT & Computer Science | Research Paper |