final Paper

 

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You  may use either for your investigation. However, be aware of legal  issues surrounding your data gathering. If you are using any system you  do not personally control and have authority to investigate/discover,  please get written permission from the owner/operator of the system or  refrain from your forensics analysis of that systems and use a personal  system. For a network, you can use your own personal home network. For a  smartphone, consider using an image from the Internet or a personal  device. There could be issues related to using a live, active, personal  device (example: corruption of the device). If using a personal device,  consider using an old, outdated phone, if available.

 You  will review various forensics tools used with your selected system.  Select a tool and use that tool to gather forensics data for analysis.  You are simulating the process of gathering this data, so you do not  need to investigate a compromised device or system. The project  deliverables are as follows:

 Week  7 – Prepare an investigative report of the forensics data capture  conducted using the tool selected for this purpose. The paper should  provide the following information: 

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
  • Executive  Summary of your investigation, including a description of the device or  systems and the tool used for the forensics analysis
  • Step-by-step description you used to gather data for analysis
  • Report on the information that was obtainable from the device
  • Graphics evidence that you conducted the forensics data gathering and analysis

 The  paper should be in a form that would be used for reporting to a court  or a law enforcement agency. Be sure to provide graphics evidence of  your forensics investigation effort (Screenshots, reports, etc.).  References should be in APA format.

CELLPHONE FORENSIC 4

Cellphone Forensic

Students’ Name

Professors’ Name

Course

Date

A forensic investigation includes the practice of legitimately facts and shreds of evidence that are to be presented in a law court. A crime scene investigator is a person who conducts or responsible for collecting and safeguarding evidence from a crime scene whereby he/she collect and document physical proof, for instance, taking photographs of the wrongdoings in the scenes. (Fick, 2020)Notably, the computer files, emails, transactions, emails, instant posts, images and net histories are instances of data collected from automated devices to provide good evidence that is effective. The mobile phone uses a cloud backup system that provides the forensic investigator with viable data when accessed in the messages and photos taken from a specific phone. The systems can hold 1000-1500 or more of the recent texted messages and received them from that phone device.

Further, the portable device also stores data about the positions where the gadgets have gone and when it was a particular time. Investigators access an average of roughly two hundred cell phones accessed by mobile devices; this information can also be obtained from the satellite triangulation systems and satellite wirelesses in vehicles. (Hikmatyar & Sugiantoro, 2019). Pictures displayed to social media such as Facebook may comprise location evidence too. However, pictures snapped when the global positioning system can contain rich data that shows when and precisely the shot was taken.

There are well analyzed seizing procedure that needs to be followed for accurate smartphone devices, for instance, the device to investigated there needs to be switched off instantly, and battery detached to guarantee the smartphone preserves the location, call logs and stops the phone from being used, which could adjust the information on the phone and much more it may update and compromise data. Secondly, the cell phone should be kept in a faraday bag for isolation and prevent other blocking materials set, such as Wi-Fi, Bluetooth, airplane mode or other communication systems, that must be disabled. Lastly, the device should have a report written in it, which suggests which operation or information to be sorted for, for example, call histories, phone numbers, short messages or images. To avoid misleading information, the first information should be recoded well and the equipment.

Performances of the analysis are done on the data gathered in the laboratory to retrieve data. An analyst follows these steps; contamination should be prevented as much as possible from the crime scene, and in the laboratory, also digital evidence should be prevented from the collection officer. A copy of the evidence analyzed is kept in a clean device not to be altered in any way. The device should be isolated from other wireless devices and examined in the isolation chamber to be fully assured the devices can’t connect to any network and keeps information as clean as possible.

The analyst installs writers- hindering software from stopping any change on the media, the information to be viewed, but nothing can be added or changed. (Samadi, 2020) Once the working duplicate is formed, the analyst will conclude the devices’ make and model and special abstraction software designed to view its content. After the information has been detached, the device is returned to the proof to be evaluated for DNA, evidence traces, fingerprints, etc.

Consequently, the analyst uses the data to view data, hence retrieving the hidden data and restoring the files; also, the deleted files are visible, considering they haven’t been overwritten by new data is helping information to the analysis. The internet, short messaging, websites, emails, timestamps and other encrypted information can be put together and provide a viable claim.

Reference

Fick, J. (2020). Understanding evidence of the benefits of the cellphone. Servatius Community-based Safety and Security Magazine, 113(6), 12-15.

Hikmatyar, F. G., & Sugiantoro, B. (2019). Digital Forensic Analysis on Android Smartphones for Handling Cybercrime Cases. IJID (International Journal on Informatics for Development), 7(2), 64-67.

Samadi, N., Thapa, D., Salimi, M., Parkhimchyk, A., & Tabatabaei, N. (2020). Low-cost active thermography using cellphone infrared cameras: from early detection of dental caries to quantification of THC in oral fluid. Scientific reports, 10(1), 1-13.

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.

Order your essay today and save 30% with the discount code ESSAYHELP