Description
Mobile Incident Response and Investigations
[Sheriff, looking at a cracked cellphone on the ground, speaking to you]: Another mobile. That's all we're seeing these days.
We're spending a fortune sending these out for analysis.
We really need to get our own folks up to speed on handling them.
Listen, this is what we picked up last night on 34th.
Frankly, the last time our investigators did a mobile analysis, it didn't go so well.
You've had a lot of experience with mobile forensics.
How about jotting down some pointers for us?
[Narrator]: The sheriff has asked for a white paper on mobile forensics.
As lead investigator, you are most qualified to address the subject.
You get the four major topics down on paper and begin writing.
The mobile platform is experiencing explosive growth, and with that growth comes cyber-incident analysis and response challenges. There are several thousand types of mobile devices, with many types of interfaces, operating systems, and connectivity options. This type of environment has many implications for an incident responder. The number of devices makes it impossible to be well-versed in each one, complicating analyses. The sheer number of devices also creates a massive expense simply trying to stay abreast of the major players in the market. Complicating this further is that mobile devices can be the target of a security incident, but mobile devices can also prove to be a means to coordinate, support, or execute an attack. The nature of mobile devices presents other challenges as well, including the ability to remotely access devices and the ability to remotely wipe out evidence, an evidence destruction process that can occur rapidly in a flash memory environment.
Mobile forensics is an increasingly complex environment for investigators because of the rapid rate of innovation and adoption of new technologies, applications, and hardware. Smartphones are being used in so many ways that they have become a central focus in digital forensic investigations. The mobile platform is a forensic challenge because of the number of third-party applications found on many devices and the rapidly evolving security measures employed by device manufacturers and application developers.
Unformatted Attachment Preview
Purchase answer to see full attachment

Explanation & Answer

View attached explanation and answer. Let me know if you have any questions.
1
Mobile Incident Response and Investigations
Student Name
Course Name
Instructor
Institution
Date
2
Mobile Incident Response and Investigations
Introduction
Mobile technology has grown substantially in the last few decades due to technological
advances in communication. It is projected that by 2030, mobile phone subscribers and users will
exceed 7 billion, implying that 67 percent of the global population would be connected in one
way or another. Research indicates that it is projected that of the 7 billion users, more than 50
percent of the gadgets would be deemed as smart devices or mobile phones (Aminnezhad &
Dehghantanha, 2014). With nearly 70 percent of the global populace having some mobile tool,
the likelihood of a mobile gadget being established in a crime area is probable to happen. The
mobile device would be the only evidence that forensic analysts would have that could
potentially have relevant data that would assist in the investigation process. Hence, it is essential
for forensic investigators to have a firm and informed comprehension of the mobile incident
response, and the analysis method. Cellular networks are instrumental since they have high
speed, exceedingly high-capability data and mobile, which support diverse cellular devices.
These networks have protracted mobile phone capacities and roaming capacities that boost
cellular tools. Many people globally are now utilizing mobile networks for business and
communication purposes due to the growing smart devices. Cellular networks utilize radio
signals through call centers utilized by wireless phone providers to promote network coverage.
Cell towers are used by network providers to provide their clients with stable network.
The radio waves from service providers are transmitted to mobile phone and captured by
antennae, where the cell tower is responsible for transmitting the signals to the switching center
following signal reception. The most common mobile phone cellular networks include Global
3
System of Mobile Communications (GSM), which is a 2G network tech that utilizes digital
signals and voice channels. Consequently, the data transmission apps might be extensively
executed. GSM network is complemented with the Mobile Switching Center (MSC) that
supports the transmission of networks to mobile networks. The networks are crucial in enhancing
forensic investigation because the knowledge concerning the transmission of network will help
forensic investigators to capture crucial data that will function as evidence to unearth a crime on
mobile phone. MSC is situated between the center and the public switched telephone systems or
PSTN that works as intermediary for mobile communications from the switching center. Mobile
phone networks are significant in supporting forensic investigation capabilities that enhances the
forensic investigators by permitting the smart devices and software through distributing
computing environments.
The paper will deliver the method needed for forensic investigation to offer the company
understanding from a forensic investigator’s viewpoint. The paper aims to define how a cell or
mobile phones communicate via cell use using towers, investigating presenting mobile
technology trends, review of laws and regulations applicable for forensic handling of mobile
devices, and challenges confronting the analysis of these devices.
Step 1: Mobile Technology Overview
Mobile devices explosion is on the rise with the global cellular user base growing every
day. While mobile phone devices outstrip computers in the market, mobile phone forensics has
not surpassed that of computers. Even whilst equating sales of smart phones that have some
personal digital assistant (PDA) capacities, to the sale numbers of the definite mobile tools,
mobile phone devices sale carry on to increased whilst personal digital assistant numbers carry
4
on to decrease. The data obtained from mobile phone devices may be utilized as evidence in
crimes, like fraud and identity theft. Mobile phone apps are designed with rapid speed.
Spreadsheets, word processors besides database-based apps have previously been ported to
mobile phones. They have the capacity to store, as well as print digital records changed these
mobile phones into a message center (Aminnezhad & Dehghantanha, 2014). Short message
service (SMS) messages too converted mobile devices into a message center.
Mobile phones are active systems, which present problems from a forensic view point.
Moreover, new prototypes of mobile phones are being created worldwide, with specialists
advancing that five novel phones are delivered to the market weekly. The increasing figures and
difference of mobile phones makes it hard to design a distinct procedure or device to deal with
challenges. Further to the increasing number of mobile phones along with platforms, comprising
android systems, Windows, Blackberry, and Apple iPhone, there are huge number of low-end
mobile phones utilizing legacy operating systems. Additionally, there exist certain distinctive
reflections when conserving mobile phones as an origin of proof needed to be presented to the
court of law (Sharma et al., 2019). The electronic proof evidence in phone devices may be lost
totally since it is vulnerable to be overwritten by novel data or isolated obliteration commands it
gets over wireless networks. Moreover, to mine data, it is essential to network with the mobile
device, regularly changing the system’s condition. Like other compute systems, networking with
a mobile phone may terminate or change evidence needed to convict a suspect. Fortunately, by
adhering the procedures of proper forensic investigation, it will feasible to acquire useful
forensic proof from phone devices in an effective way satisfactory to the court system.
5
The miniaturization of electronics, besides advancement in battery technologies have
brought in an era where it is conceivable to carry around what traditionally would seem portable
that have been considered a supercomputer in people’s pockets (Barmpatsalou et al., 2018). In
just a few decades, together with their bigger tablet counterparts, they have become
indispensable and made it easy to remain connected to the workplace, friends, and family
anywhere. Mobile devices is advancement that primarily uses cellular communication. Computer
databank is another point of development in the collecting forensic evidence from mobile
phones, which has significantly changed the worth of forensic process in the justice process.
Throughout history, and till the 1980s, forensic investigator was obliged to develop a reference
standard before collecting evidence through fingerprints. The fingerprints was useful for the
investigator to collect the evidence to convict a suspect in the court system (Sheppard, Fieldhous
& Cassella, 2020). Moreover, the manual process of filling records and systems were not
beneficial in matching the fingerprints with the suspect as it would not be applicable in collecting
and analyzing evidence from mobile phones. Similarly, forensic investigators required biological
sample materials from the suspect before blood from the crime scene is considered for possible
evidence for alleged crime. The examiners will mainly helpless in recognizing the weapon that
was used to commit the crime.
More than two decades ago, mobile technology was non-existent; however, nowadays,
mobile phone technology has become a requirement. Since then, mobile technology has changed
from simple SMS and calling gadgets into universal workability for everyday activities. The
technology of producing mobile is growing faster because of technological advances around the
world. The mobile phones available in the market today may perform more sophisticated tasks
6
that some portable computers (PCs) cannot (Cichonski et al., 2013). However, the central
conception on what the cell phone was fashioned has not transformed; the gadget still utilizes
radio signals to connect with towers that supply signals over a vast region.
The mobile technology world has evolved every year due to advancements in technology
that require change. A mobile phone may be described as a handheld telephone device that
accesses cellular radio signals and systems to communicate through wireless means over an
extensive area coverage. Though John F. Mitchell and Martin Cooper introduced the original
handset that enabled the world to make phone calls, the initial commercially accessible mobile
phone was not released until 1983. For many decades, mobile technology has upgraded and
expanded the role of mobile phone communication to the types that carry a small computer in the
pocket (Aminnezhad & Dehghantanha, 2014). Therefore, a handheld gadget or device was
invented during the 1980s for communication purposes, and the modern mini-computers still
utilize radio signals with towers or satellites that offer signals over a wider region or network.
The most common digital network systems are: Code Division Multiple Access
(CDMA), or IS-95, and Global System for Mobile Communications (GSM). The central
difference between the networks is that GSM may be utilized globally devoid of change of SIM
(a functionality built-in the hardware). In contrast, CDMA phone network would only function in
America and should be updated to work globally. Qualcomm developed a CDMA network,
which utilizes a spread spectrum radio connection that distributes digitalized information
utilizing all the accessible bandwidth (Baig et al., 2017). The universal cell phone carriers for
CMDA are Verizon and Sprint. On the other side, the GSM cellular network was created in
Europe and may be used globally by Nokia and Erikson. GSM will interface with Time Division
7
Multiple Access (TDMA) technology, which communicates differently than CDMA. The
Integrated Digital Enhanced Network (iDEN) is another mobile technology that uses a
proprietary protocol invented by Motorola.
The cellular networks supply specific coverage founded on dividing a huge geographical
service region into smaller regions of coverage referred to as cells. Based on the NIST special
publication 800-101 revision 1, as a mobile phone shifts from a single cell to a different one, cell
configuration needs lively linked to being managed and efficiently transmitted between cells to
sustain the link (Cichonski et al., 2013). Accordingly, to administer the cellular net, offer user
services, and correctly bill user accounts, information concerning the service provider agreement
besides linked service actions is netted and s...
