|A Collection of Informative and Interesting Articles|
|HOME||LOGIN||SUBMIT ARTICLES||TOP AUTHORS||WANT AN ACCOUNT?|
An Approach to Mobile Phone ForensicsBY: Aniruddha Datta | Category: Technology | Submitted: 2012-06-05 06:54:36
Article Summary: "Mobile phone forensics is the science of recovering digital evidence from a mobile phone under forensically sound conditions using accepted methods..."
Mobile phone forensics is the science of recovering digital evidence from a mobile phone under forensically sound conditions using accepted methods. This topic will provide an overlook on Mobile Technology and the Forensics associated with it. Far from being a lifestyle product, Mobiles have now become a necessity. India has seen a huge spur in mobiles in the past 5 years and it has penetrated even to the rural areas of India to a good extent. Cell phones vary in design and are continually undergoing change as existing technologies improve and new technologies are introduced. Mobile phones are highly 'mobile' communications devices that perform an array of functions ranging from that of a simple digital organizer to that of a low-end personal computer.
i) Designed for mobility
iii) Battery Powered
iv) Light Weight.
A mobile phone consists of following things:-
1) A microprocessor
2) Read Only Memory (ROM)
3) Random Access Memory (RAM)
4) A Radio module
5) A Digital Signal Processor
6) A Microphone and Speaker
7) A variety of hardware keys and interfaces
8) A liquid crystal display (LCD).
Mobile Communication mainly two types
• SIM FORENSICS :-Every mobile subscriber is issued with a smart card called a Subscriber Identity Module (SIM) . As physical evidence the SIM provides details printed on the surface of i) Name of the Network Provider ii) Unique ID Number. The SIM's main function entails authenticating the user of the cell phone to the network to gain access to subscribed services. The SIM also provides storage for personal information, such as phone book entries and text messages, as well as service-related information. Every SIM can be protected by a Personal Identification Number (PIN). It is set at point of manufacture. The major features are as follows
i)Can be changed by the Subscriber
ii) Four digit code
iii) Usually 3 attempts before phone is blocked.
SIM Contents the following details of the subscriber
i) Location Area Identifier
ii) Location Area Identifier
iii) Serial Number of SIM
iv) Subscriber Identifier - IMEI and Mobile Phone Number
v) MSISDN - Used for routing of calls
vi) Text Data Message (SMS)
vii) Dialled Numbers.
SIM Forensics that is potential Evidence as Call Records, Phonebook Information, Text Messages and deleted message and call records is done by softwares i) SIM Manager Pro ii) ChipIt iii) SimScan. Cards4Labs that is only available to Law enforcement agencies can produce a text report of analysis.
Major threats to SIM Data are SIM Cloning for illicit use.
• What Mobile Forensic Examination reveals i) Useful info as passwords, network logon names, internet activity ii)Potential Evidence as Call Records, Phonebook Information, Text Messages, E-Mail, Location Information, Web browsing activities, etc. Different Mobile Forensics tools are available .
i) PDA Seizure
ii) Oxygen Phone Manager
i) Cell Seizure
ii) Cell Brite
About Author / Additional Info:
Cyber Forensics journal
Comments on this article: (0 comments so far)
• Why Chelsea Were Right in Sacking Roberto Di Matteo.
• How to Become a Successful Education Training Consultant
• Islam Teaches Universal Brotherhood
• Do You Need to Limit Your Child's Behavior?
Latest Articles in "Technology" category:
• Security Robots on Patrol
• Apple Pay Overview
• Enterprise Mobility - Overview Part 1
• M-OTA: Mobile 'Over-The- Air' (OTA) Overview
• MDM: Mobile Device Management Overview
• 3M MAC Protocol Review
• Build, Deploy and Test - Advanced Software Development Practice - Part 1
Important Disclaimer: All articles on this website are for general information only and is not a professional or experts advice. We do not own any responsibility for correctness or authenticity of the information presented in this article, or any loss or injury resulting from it. We do not endorse these articles, we are neither affiliated with the authors of these articles nor responsible for their content. Please see our disclaimer section for complete terms.
Copyright © 2010 saching.com - Do not copy articles from this website.
|| Home | Disclaimer | Xhtml ||