1
Outline
Student’s Name
Institution Affiliations
Professor’s Name
Course
Date
2
Mobile Technology Overview
The advancement of mobile technology started as a simple idea that will enhance
communication wirelessly.
Simple mobile phones later evolved to mobile computers with the ability to conduct
many other tasks besides making phone calls.
Mobile technology such as tablets, laptops, and other devices have become an important
part of our daily lives.
How Mobile Phones communicate with cell sites
Communication through mobile phones entails the transmission of RF signals that are
projected in every direction.
Mobile phones have two-way radios that enable simultaneous transmission and reception
of radio frequencies and waves.
Cellular to Cellular Communication
This entails what happens when a phone call or mobile communication is made.
When a cell phone is turned on, it traces the System Identification Code (SID) and the
controlling channel to establish the connectivity.
Mobile Switching Centers
The Mobile Switching Centers or MSC entails the foundation or the basis of the network
switching subsystem.
The MSC deals with different functions such as setting up calls, releasing, and routing.
Besides, it routes the messaging services, managing the conference calls, service billing,
making fax and network interfacing.
3
In the inter-BSC handover and on detecting that mobile phone device is heading to the
edge of its base cell, the BSC requests handover assistance from the MSC.
Base Switching Subsystem
The base switching subsystem is a part of the GSM network and is made of two devices
that include the Base Transceiver Station (BTS) and the Base Station Controller (BSC).
The BTS transmits and receives radio signals from the antennas and has encryption and
decryption equipment in communication with the BSC.
The BSC is a critical component in the mobile network controller that works alongside
the BTS.
The technology of Mobile Networks
Form Factors
Mobile devices are defined by their capabilities and physical components that enhance
the execution of various deliverables.
The specifications and characteristics associated with mobile phone hardware are the
form factors.
Smart Devices
Smart devices have become more integrated into many aspects of people's daily lives.
They developed from their ideas, such as smartphones, and went to areas such as
smartwatches, TVs, home appliances, and security systems.
Smart devices are normally integrated into personal, business, and government
operations.
Other Wireless Technologies
4
When making consideration of other wireless technologies, Wi-Fi and Bluetooth need to
be prioritized. Both (Wi-Fi and Bluetooth) enable communication between devices
without having any physical connection.
Trends in Mobile Technology
Some of the major trends in mobile technology that have developed recently include IoT
applications, block chain applications, augmented reality, virtual reality, machine
learning, artificial intelligence, mobile payments, 5G connectivity, and instant
applications.
Handset Transmission Types
The handset transmission types involve three methods used by cell phone networks in the
information transformation.
They include the Frequency Division Multiple Access (FDMA), the Code Division
Multiple Access (CDMA), the Time Division Multiple Access (TDMA), and the Global
System for Mobile Communications (GSM).
Mobile Operating Systems
Mobile devices need an operating system to execute their functions and capabilities in
communications.
Mobile operating systems are entrenched in every mobile device that varies in brands.
One of the most recognized mobile operating systems is the Apple iOS, which is
proprietary and not an open-source OS designed by Apple Inc. for all the mobile devices
it manufactures.
Challenges
The first challenge is dealing with many different devices in the investigation.
5
The second challenge emanates from the mobile device manufacturer.
The third challenge involves the connectors because mobile devices use different kinds of
connectors.
The fourth challenge comes with the operating system that changes very fast.
The fifth challenge is cloud data, whereby valuable data in the forensic investigation is
not saved in the mobile device but on the cloud.
The last challenge is for the forensic investigator to know the best toolkit for different
scenarios and the tool that extracts as much data as possible.
Threats
The topmost threats to mobile devices include data leakage, network spoofing, unsecured
Wi-Fi, phishing attacks, improper handling of sessions, and spyware.
Embedded Device Forensics
When a mobile device is under forensic investigation, the investigator can use embedded
systems on electronic devices such as gaming consoles, music players, global positioning
devices, and personal data assistants to identify reliable digital evidence to present in the
court of law.
Laws, Regulations, and the Forensic Handling of Mobile Devices
Federal and State government provides laws and regulations for conducting a sound
investigation.
Legal counsel in the investigation process needs to respect the preservation of digital data
and beware of technology associated with investigations.
Laws governing digital or mobile forensics include the Fourth Amendment, which
protects people against unwarranted or unlawful searches under US law.
6
Considerations for Handling
Handling a device that contains evidence in the investigation process is important.
Forensic investigators need to develop documents showing that the device is to be used
for analysis.
This entails creating the chain of custody form for the device in hand to track the
ownership of the evidence.
Investigative Techniques
The non-invasive technique includes manual extraction, use of device interface, logical
extraction, and the JTAG method that extracts data by connecting the device to Test
Access Ports.
The invasive techniques include the chip-off method that gets data straight from the
device memory chip and the micro-read method that gets the data manually from the
memory chip using the electron microscope.
Mobile Forensic Tools
Below are tools associated with each category.
Chip-offs- iSeasamo phone opening tool, chip epoxy glue remover, circuit board holder,
and FEITA digital inspection station.
Hex-dumping – cellebrite UFED physical analyze, XACT, and Pandora's box.
Micro Read- Electron Microscope
Manual extraction- EDEC eclipse, fernico ZRT, and project-A-phone
Logical extraction-lantern, SRY logical and oxygen forensic suite (Hua, 2019).
Location of the Evidence
7
The kind of information residing on a mobile device includes a phonebook, messaging
applications, call history, internet details, media, notes, lists, calendars, passwords,
documents, use dictionary, system files, and deleted data.
Analysis and Presentation of Forensic Information
File System Analysis
File systems organize files in the mobile device, applications, and OS. Today, consumers
use devices with Apple iOS and Android OS.
The Apple iOS file system is usually APFS, while the Android OS uses the ext4.
The android OS is examined using the FTK imaging tool. Every OS uses SQLite to store
information. These tools can be used to retrieve current and historical data that could
have been deleted.
Techniques for working through security measures
Various ways can be used in accessing obstructed devices, including software-based,
hardware-based, and investigative.
Third-Party Applications
A third-party application is a common challenge encountered by forensic investigators.
Third-party applications provide a better user experience; thus, most smartphone
environments are made from third parties.
They are important in conducting forensic investigations due to their diversity in storing
personal information such as calls, messages, and media files such as photos.
Data Carving
Data carving entails the reconstruction of raw files without using metadata or other
guidance.
8
Data carving is usually based on the premise that deleted files from a computer or mobile
device can only be deleted logically but can still be acceded by assembling the residual
data as long as the file's location exists.
File Systems
Files systems help in storing and retrieving files.
The four common types of file systems include FAT 32, Extended File System (EXT),
and the New Technology File System (NTFS).
Compound File Analysis
Compound document files work just like the file systems, enabling them to manage the
file system from one file to another
The main tools used in the examination include Olefile or the Exiftool.
Biggest Threat in Mobile Forensics
On analyzing the potential threats posed by cyber-criminals using mobile technology, I
think rapidly changing technology and users' awareness are the biggest threats.
In every measure of an attack, there is a countermeasure. In most cases, cyber-criminals
depend on the ignorance of the user or poor data security.