Ask Computer Network & Security Expert

Forensic Challenge

School authorities have filed a case to the police department that a student is missing from last 4 days. Police were able to track  some of the information from his mobile network provider like last calls, texts & MMS and from the traffic authorities, they were able to give some pictures that they found .  They found his mobile phone in his room. As a forensic investigator how you trace out the missing student. The police want to find weather they can find any information like did he get any influenced by something or did any one targeted the student by kidnapping. As an investigator you have to find out what is the information that we can get from the student mobile phone.

Make: Motorola Model: V3 (g8.5/9/18/19)

S/W Version: 0E:40.7CR

IMEI: 354904001234567

 SIM: 89302720123456781234

Phone Number: 897-883-3411

 

What are the evidences to be collected of the missing student?   

  As a forensic investigator firstly we have to know the details of the student like height, color and which dress he is wearing during the time of missing as his mobile is found in his room. It is easy to trace by checking the details in his mobile.

 Every object belonging to him should be suspected as he is using mobile, if we check the mobile phone some of the information can be found by examining his mobile, it is found that the data in the mobile is erased completely. Such that if erased data is retrieved we can get the information regarding his missing.

How can the data be retrieved from the Mobile phone

 First take the pictures of the mobile. Check mobile content page by page checking the contact list. If any suspicious names are found note them down and check the images in the mobile and also make a copy of the data from mobile phone to system through USB cable. So that it will be useful in the investigation .As it is seen that all the texts are deleted we have to retrieve the texts to find out what information is there in the texts.

Investigation

  The mobile phone sim card is useful in the investigation. It is useful to extract data, it should be removed from the mobile and attached to the forensic workstation's USB port and copy the data from the sim card to find any data is found and also make a copy of it.

Sim card readers such as USB sim card reader is available for download in the internet by using this software we can restore previously deleted contact list with name and numbers. When a file is deleted, the operating system merely deletes the corresponding pointers in the file table and marks the space occupied by the file as free. The reality is that the file is not deleted and the data it contained still remains on the drive.

Mobile Description

Now that the device in question is known to be the suspect's, gathering key information continues. It only takes a few minutes to note the following: Date/Time device was taken from suspect: May 19st, 2015 at 4pm

Make: Motorola Model: V3 (g8.5/9/18/19)

S/W Version: 0E:40.7CR

IMEI: 354904001234567

 SIM: 89302720123456781234

Phone Number: 897-883-3411

 Information stored in the following databases that would be useful includes the following:  

  • Contacts
  • SMS (Text messages)
  • Calendar
  • Phone Call Logs

 • Phone Hotlist

 • Saved Email Messages

  • Browser Bookmarks
  • Browser URLs

 • Pictures

  • Quick Contacts
  • Map Locations

 • Folders (Email messages are sorted into their respective folder)

 • Email Settings

Tools which the investigator can use to retrieve data from the mobile phone is

AcessData FTK imager

AcessData FTK imager is used to retrieve data from the mobile phone when the texts or images are deleted and by using AcessData FTK imager the messages are retrieved. It is found that he texted to his friend.

  Logical Analysis

   We should take back up of the files for that logical analysis can be used with this it is possible to backup all the present data in the mobile without rooting using android debug bridge.

With the help of the above tools the information is retrieved and found that the information like the student left the school as he got less marks, this information was found in the deleted messages from the mobile phone which are retrieved, in that a message was sent to a friend saying that he is coming to his place .This message is helpful to find out the location of the person to which the text was sent with the help of network service providers and can trace out the missing person.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91350248
  • Price:- $23

Guranteed 24 Hours Delivery, In Price:- $23

Have any Question?


Related Questions in Computer Network & Security

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

After reading this weeks materials please respond to two 2

After reading this week's materials, please respond to TWO (2) of the following questions. AND PROVIDE CITATION IN APA 1. Describe the differences between bus, ring, star and mesh topologies. 2. Explain the TCP/IP Model ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As