Guidelines on Mobile Device Forensics
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Mobile Gaming Victor Bahl 8.13.2012 Internet & Devices Growth (Obligatory Slide)
mobile gaming Victor Bahl 8.13.2012 internet & devices growth (obligatory slide) Apps are ~$10 Billion market, growing at ~100% per year Fun Fact: Getting to 1 M users: AOL: 9 years; Facebook: 9 months; “Draw Something”: 9 days Mobility & Networking, Microsoft Research bandwidth demand! 1 ~ 10 billion mobile devices in 2016 10B (1.4 devices / human) 6B 6 2007 2011 2007 2011 2016 2011-2016 ~ 18X growth in mobile data traffic2 (~ 10 exabytes / month) Source: (1) GSMA; (2) Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2011–2016 Mobility & Networking, Microsoft Research gaming today Source: Strategy Analytics - Apptrax4 Mobility & Networking, Microsoft Research …but you already knew that Some things I heard today: . how game analytics was used to increase dwell time . how in-the-wild user behavior may be modeled (& used) . The challenges in getting to MMOG games . wireless peer-to-peer games . power management by making use of saliency All great stuff, let me say a few words about some things I didn’t hear ….. Mobility & Networking, Microsoft Research services behind the games Fun fact: in 2011 ~$12 billion was spent on social/mobile games in 2015 revenue is projected to be ~24 billion (19% CGR) Apps that connect to backends receive higher rankings and more downloads because they are likely dynamic with more fresh content and are more social and contextual - Kinvey Inc., 2012 Xbox LIVE 30% growth year over year 40+ Million Users 2.1 billion hours played per month 35 Countries 176,802,201,383 Gamer Points scored -
Qwertyuiopasdfghjklzxcvbnmqwe
qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb nmqwertyuiopasdfghjklzxcvbnmqwer JASS Training Manual tyuiopasdfghjklzxcvbnmqwertyuiopas Please check with the specific organization that you are assigned to and verify these processes. This is dfghjklzxcvbnmqwertyuiopasdfghjklz meant to be used as a guide only. x 5/2009 cvbnmqwertyuiopasdfghjklzxcvbnmq Latest Update 07/26/2012 wertyuiopasdfghjklzxcvbnmqwertyuio pasdfghjklzxcvbnmqwertyuiopasdfghj klzxcvbnmqwertyuiopasdfghjklzxcvbn mqwertyuiopasdfghjklzxcvbnmqwerty uiopasdfghjklzxcvbnmqwertyuiopasdf ghjklzxcvbnmqwertyuiopasdfghjklzxc vbnmqwertyuiopasdfghjklzxcvbnmrty uiopasdfghjklzxcvbnmqwertyuiopasdf ghjklzxcvbnmqwertyuiopasdfghjklzxc vbnmqwertyuiopasdfghjklzxcvbnmqw 1 ertyuiopasdfghjklzxcvbnmqwertyuiop asdfghjklzxcvbnmqwertyuiopasdfghjkl Table of Contents Telephone Services ......................................................................................................... 4 i. Answering your phone ......................................................................................... 4 ii. How to “pick” a line ............................................................................................ 4 iii. Transferring Calls ................................................................................................ 4 iv. Transferring directly to voicemail ....................................................................... 4 B. Scheduling Services ............................................................................................... -
Part 1 Digital Forensics Module Jaap Van Ginkel Silvio Oertli
Part 1 Digital Forensics Module Jaap van Ginkel Silvio Oertli July 2016 Agenda • Part 1: Introduction – Definitions / Processes • Part 2: Theory in Practice – From planning to presentation • Part 3: Live Forensics – How to acquire a memory image – Investigate the image • Part 4: Advanced Topics – Tools – Where to go from here – And more 2 Disclaimer§ • A one or two-day course on forensics will not make you a forensics expert. – Professionals spend most of their working time performing forensic analysis and thus become an expert. • All we can offer is to shed some light on a quickly developing and broad field and a chance to look at some tools. • We will mostly cover Open Source Forensic Tools. 3 Introduction Forensics in History 4 Forensics – History 2000 BC 1200 BC 5 Introduction Definitions / Processes 6 Forensics – The Field digital forensics Computer Forensics Disk Forensics Mobil Forensics Memory Forensics Datenbase Forensics Live Forensics Network Forensics 7 Forensics - Definition • Digital Forensics [1]: – Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. • Computer Forensics [2]: – Computer forensics (sometimes known as computer forensic science) is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information. 8 Forensics - Definitions • Network Forensics [3]: – Network forensics is a sub-branch of digital forensics relating to the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection.[1] Unlike other areas of digital forensics, network investigations deal with volatile and dynamic information. -
Android Operating System
Software Engineering ISSN: 2229-4007 & ISSN: 2229-4015, Volume 3, Issue 1, 2012, pp.-10-13. Available online at http://www.bioinfo.in/contents.php?id=76 ANDROID OPERATING SYSTEM NIMODIA C. AND DESHMUKH H.R. Babasaheb Naik College of Engineering, Pusad, MS, India. *Corresponding Author: Email- [email protected], [email protected] Received: February 21, 2012; Accepted: March 15, 2012 Abstract- Android is a software stack for mobile devices that includes an operating system, middleware and key applications. Android, an open source mobile device platform based on the Linux operating system. It has application Framework,enhanced graphics, integrated web browser, relational database, media support, LibWebCore web browser, wide variety of connectivity and much more applications. Android relies on Linux version 2.6 for core system services such as security, memory management, process management, network stack, and driver model. Architecture of Android consist of Applications. Linux kernel, libraries, application framework, Android Runtime. All applications are written using the Java programming language. Android mobile phone platform is going to be more secure than Apple’s iPhone or any other device in the long run. Keywords- 3G, Dalvik Virtual Machine, EGPRS, LiMo, Open Handset Alliance, SQLite, WCDMA/HSUPA Citation: Nimodia C. and Deshmukh H.R. (2012) Android Operating System. Software Engineering, ISSN: 2229-4007 & ISSN: 2229-4015, Volume 3, Issue 1, pp.-10-13. Copyright: Copyright©2012 Nimodia C. and Deshmukh H.R. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. -
A Survey Onmobile Operating System and Mobile Networks
A SURVEY ONMOBILE OPERATING SYSTEM AND MOBILE NETWORKS Vignesh Kumar K1, Nagarajan R2 (1Departmen of Computer Science, PhD Research Scholar, Sri Ramakrishna College of Arts And Science, India) (2Department of Computer Science, Assistant Professor, Sri Ramakrishna College Of Arts And Science, India) ABSTRACT The use of smartphones is growing at an unprecedented rate and is projected to soon passlaptops as consumers’ mobile platform of choice. The proliferation of these devices hascreated new opportunities for mobile researchers; however, when faced with hundreds ofdevices across nearly a dozen development platforms, selecting the ideal platform is often met with unanswered questions. This paper considers desirable characteristics of mobileplatforms necessary for mobile networks research. Key words:smart phones,platforms, mobile networks,mobileplatforms. I.INTRODUCTION In a mobile network, position of MNs has been changing due todynamic nature. The dynamic movements of MNs are tracked regularlyby MM. To meet the QoS in mobile networks, the various issuesconsidered such as MM, handoff methods, call dropping, call blockingmethods, network throughput, routing overhead and PDR are discussed. In this paper I analyse the five most popular smartphone platforms: Android (Linux), BlackBerry, IPhone, Symbian, and Windows Mobile. Each has its own set of strengths and weaknesses; some platforms trade off security for openness, code portability for stability, and limit APIs for robustness. This analysis focuses on the APIs that platforms expose to applications; however in practice, smartphones are manufactured with different physical functionality. Therefore certain platform APIs may not be available on all smartphones. II.MOBILITY MANAGEMENT IP mobility management protocols proposed by Alnasouri et al (2007), Dell'Uomo and Scarrone (2002) and He and Cheng (2011) are compared in terms of handoff latency and packet loss during HM. -
Guidelines on Mobile Device Forensics
NIST Special Publication 800-101 Revision 1 Guidelines on Mobile Device Forensics Rick Ayers Sam Brothers Wayne Jansen http://dx.doi.org/10.6028/NIST.SP.800-101r1 NIST Special Publication 800-101 Revision 1 Guidelines on Mobile Device Forensics Rick Ayers Software and Systems Division Information Technology Laboratory Sam Brothers U.S. Customs and Border Protection Department of Homeland Security Springfield, VA Wayne Jansen Booz-Allen-Hamilton McLean, VA http://dx.doi.org/10.6028/NIST.SP. 800-101r1 May 2014 U.S. Department of Commerce Penny Pritzker, Secretary National Institute of Standards and Technology Patrick D. Gallagher, Under Secretary of Commerce for Standards and Technology and Director Authority This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Management Act of 2002 (FISMA), 44 U.S.C. § 3541 et seq., Public Law (P.L.) 107-347. NIST is responsible for developing information security standards and guidelines, including minimum requirements for Federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate Federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130, Section 8b(3), Securing Agency Information Systems, as analyzed in Circular A- 130, Appendix IV: Analysis of Key Sections. Supplemental information is provided in Circular A- 130, Appendix III, Security of Federal Automated Information Resources. Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and binding on Federal agencies by the Secretary of Commerce under statutory authority. -
Ipad Basics Ios9
iPad Basics iOS9 iPad Air 2 What is an Apple ID? An Apple ID is a user name you use for everything you do with Apple. Creating an account for an Apple service, such as the iTunes Store or the App Store, creates an Apple ID. An Apple ID allows you to access other Apple services. You don't have to create a new account for each service—just use your Apple ID. Home Screen - This is your main screen where you can access all your apps! It may help to think of it as similar to your computer desktop. It's where all of your apps are kept, and it's the first thing you see when you turn on your device. To navigate between home screens, swipe left or right. Dock - Found at the bottom of the home screen. You can customize this to have quick access to your most frequently used apps. Status Bar - Found at the top of the screen; displays current information about your iPad. The chart on the next page further describes some of the icons that you will commonly see in the status bar. What is an app? An app is a software program that is designed for a specific purpose (i.e. game, word processing, social networking, etc.) These work just like a program that you would open on your personal computer, though they look and function a little differently. There are thousands of apps available for download through Apple’s App Store and there’s something for everyone. Many apps are free, but some must be purchased (most are under $5). -
Digital Forensics Concentration
DIGITAL FORENSICS CONCENTRATION The Digital Forensic concentration is available to students Why Enroll in the at Hilbert College who are interested in learning more about Digital Forensics computer-based information applied to legal matters. The concentration is comprised of three computer courses and 2 Concentration? digital forensic courses, some held in Hilbert’s new, modern Low student/teacher computer laboratory classroom. Together these five courses will ratio in all classes provide more in depth exposure to fundamental principles in the Access to all new l use of computers in legal investigations. This concentration is equipment and available to students in all majors, though it is likely of particular instrumentation interest to students in the Forensic Science/CSI department who Unmatched personal wish to obtain a stronger computer-based foundation than what attention to academic is required for their major. advisement Coursework includes one semester of computer systems Opportunity to learn (covering computer architecture and operating systems), one from top-notch semester of computer networking, one semester of computer professors who have crime investigation (covering procedures and techniques of data real-world experience in a digital forensic recovery involved in criminal investigations), one semester of setting computer forensics (covering data seizure, imaging and analysis) Job search guidance and one semester of Advanced Mobile Device Forensics. All in the profession courses in the concentration are three credits. Additionally, the Expanded job courses in the concentration do not require prior exposure to opportunities after graduation: computers as they are designed to be taken sequentially: initially “According to the introducing students to foundational concepts and material and Department of Labor, progressing to more advanced applications of concepts in later demand is expected to grow 22% over the courses. -
How to Shutdown, Silence, and Fly with Your Iphone
STR-105 iPhone Basics - How to Shutdown, Silence, and Fly with your iPhone. Picture yourself attending a solemn religious service or quiet concert and suddenly you hear someone else’s phone ringing. It has to be very embarrassing for the phone’s owner. And in this recipe we want to make sure it is not your iPhone ringing at the worst possible time. We want to ensure that you are able to silence your iPhone, shut it down and put it in airplane mode. Let’s explore some of the key operations of your iPhone. Here are five topics that this Senior Tech Recipe will explore: 1. Sleep 2. Shutdown & restart 3. Silence 4. Volume buttons 5. Airplane mode We will focus on these basic operations of your iPhone and take a tour of some of the essential buttons and controls. Sleep The iPhone has a Sleep/Wake that you probably have already been using. The Sleep/Wake button is on the upper right, either on the upper right side on most of the current iPhone models. You might also find it on the upper right top of the iPhone. It will be easy to confirm you have the right button was pressing it will turn your display on and off. SeniorTechClub.com/104 iPhone Sleep, Shutdown, Silence & Airplane Mode Page 1 What does Sleep do? When you simply press the Sleep/Wake button on your phone, you are putting your phone to sleep and locking it. This is NOT shutting your phone off. Sleep saves the battery. Sleeps darkens the screen. -
Digital Forensics Based Analysis of Mobile Phones
Journal of Android and IOS Applications and Testing Volume 4 Issue 3 Digital Forensics Based Analysis of Mobile Phones Pooja V Chavan PG Student, Department of Computer Engineering, K. J. Somaiya College of Engineering, Mumbai, Maharashtra, India Email: [email protected] DOI: Abstract Now-a-day’s ratio of mobile phone is increasing day by day. Digital forensics methodology is use to recover and investigate data that found in a digital devices. Mobile phone usage is more that’s why not only judicial events occurred but also mobile forensics and subdivision of digital forensics are emerged. Some hardware and software are used for mobile phone investigations. Keywords: Digital forensics, digital devices, mobile phone INTRODUCTION because electronic device have a variety of Forensic science’s subdivision is a digital different operating system, technology, forensic, is a one type of process. The storage structure, Features. First identify main objective of this process to find the crime after that digital forensic work evidence in digital devices [1]. Digital on four important steps (Figure 1): forensics are used for the analysis of data, such as audio, video, pictures, etc. After • Collection: The collected of evidence the analysis of electronic devices data that like fingerprints, broken fingernails help for legal process. The usage of blood and body fluids. advanced technology is increasing rapidly. • Examination: The examination of Electronic device have a variety of product process is depending on evidence. like tablet, flash memory, memory card, • Analysis: The crime scenes obtain SD card, etc. When forensic analysis is different digital evidence, analysis is performed at that time data should be done on storage evidence this secure. -
DEFINITY Communications System Generic 2.2 World Class Routing Implementation Copyright 1992 AT&T All Rights Reserved Printed in U.S.A
AT&T 555-105-531 Issue 1 June, 1992 DEFINITY Communications System Generic 2.2 World Class Routing Implementation Copyright 1992 AT&T All Rights Reserved Printed in U.S.A. Notice While reasonable efforts were made to ensure that the information in this document was complete and accurate at the time of printing, AT&T can assume no responsibility for any errors. Changes and corrections to the information contained in this document may be incorporated into future reissues. Your Responsibility for Your System's Security You are responsible for the security of your system. AT&T does not warrant that this product is immune from or will prevent unauthorized use of common-carrier telecommunication services or facilities accessed through or connected to it. AT&T will not be responsible for any charges that result from such unauthorized use. Product administration to prevent unauthorized use is your responsibility and your system administrator should read all documents provided with this product to fully understand the features available that may reduce your risk of incurring charges. Trademarks CALLVISOR is a trademark of AT&T. In this document, CallVisor ASAI Gateway is often abbreviated to ASAI Gateway or ASAI. DIMENSION is a registered trademark of AT&T. ESS is a trademark of AT&T. 5ESS is a registered trademark of AT&T. MEGACOM is a registered service mark of AT&T. DEFINITY is a registered trademark of AT&T. In this document, DEFINITY Communications System Generic 2 is often abbreviated to DEFINITY Generic 2, Generic 2, or G2. Ordering Information The ordering number for this document is 555-105-531. -
RECEIVED DOCKET FILE Copy ORIGINAL
RECEIVED DOCKET FILE COpy ORIGINAL OCT 1 3 ZOOO FCC MAIL ROOM Before the Federal Communications Commission Washington, D.C. 20554 In the Matter of ) ) Implementation of911 Act ) WT Docket No. 00-110 ) The Use ofNIl Codes and Other ) CC Docket No._92-105J Abbreviated Dialing Arrangements ) ) COMMENTS OF THE WIRELESS CONSUMERS ALLIANCE, INC. AND PETITION FOR FURTHER RULEMAKING Wireless Consumers Alliance, Inc. ("WCA") submits these comments with respect to the Commission's Notice ofProposed Rulemakint in the above caption matters and petitions the Commission to include one other core issue in its deliberations. These comments are directed toward the NPRMin Docket No. 92-105.2 1 In the Matter ofImplementation of911 Act (WTDocket No. 00-110) and The Use of NIl Codes and Other AbbreviatedDialing Arrangements (CC Docket No. 92-105), Fourth Report and Order and Third Notice ofProposed Rulemaking (CC Docket No. 92-105) ("NPRM") and Notice ofProposed Rulemaking (WT Docket No. 00-110). 2 Parties were directed to "identify comments for each Docket Number." (§ Y.E.). We support the Commission's recommendations in Docket No. 00-110 however, we think that the objective ofcreating a "seamless, ubiquitous, reliable wireless telecommunications networks"will not be accomplished with negotiations with private carriers who have no incentive to cooperate. There are several current examples ofwireless carrier non-cooperation in Docket 94-102, e.g. the King County Letter and the Texas 911 Group. The reality is the nation's wireless network is neither seamless, ubiquitous or reliable and will not become so by continuing to depend on the voluntary actions ofwireless carriers or market forces.